Showing 7,841 - 7,860 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 7841

    Analysis of Changes in Intercity Highway Traffic Travel Patterns under the Impact of COVID-19 by Mingchen Gu, Shuo Sun, Feng Jian, Xiaohan Liu

    Published 2021-01-01
    “…The unprecedented COVID-19 pandemic impacts negatively on the security and development of human society. Comparison and analysis of intercity highway travel patterns before and during the COVID-19 pandemic can bring vital insights for the prevention and control of the pandemic. …”
    Get full text
    Article
  2. 7842

    Anomaly detection in virtual machine logs against irrelevant attribute interference. by Hao Zhang, Yun Zhou, Huahu Xu, Jiangang Shi, Xinhua Lin, Yiqin Gao

    Published 2025-01-01
    “…Virtual machine logs may contain some abnormal logs that indicate security risks or system failures of the virtual machine platform. …”
    Get full text
    Article
  3. 7843
  4. 7844

    Issues of arms control in transatlantic relations (1963–1975) by V. A. Veselov

    Published 2024-07-01
    “…Against the backdrop of the rapid degradation and destruction of the international security architecture dating back to the Cold War, the problems of arms control in general and the proliferation of nuclear weapons in particular assume new significance. …”
    Get full text
    Article
  5. 7845

    Theoretical and numerical study of profit in agricultural sector model using wavelet method by Yeshwanth R., Kumbinarasaiah S.

    Published 2025-03-01
    “…Agriculture is crucial in India’s economy and society, supporting rural livelihood and national food security. India is one of the world’s largest agricultural producers, with diverse crops and farming practices. …”
    Get full text
    Article
  6. 7846

    Gridlocked Streets or Simply Disinterested? Urban Youth and Unconventional Political Participation in Zimbabwe’s Second Republic by Octavious Masunda

    Published 2024-12-01
    “…The pervasive use of lawfare and state security apparatus continues to deter young people from exercising their constitutional rights as outlined in Sections 58 (freedom of assembly and association), and 59 (freedom to demonstrate and petition). …”
    Get full text
    Article
  7. 7847
  8. 7848

    General Data Protection Regulation Compliance and Privacy Protection in Wearable Health Devices: Challenges and Solutions by Mazlum Özçağdavul

    Published 2024-12-01
    “…Key themes were identified through thematic analysis, focusing on consent management, data minimization, encryption, and privacy-by-design strategies.Results: The review found that security breaches and informed consent are the most significant challenges in ensuring GDPR compliance. …”
    Get full text
    Article
  9. 7849

    Development of problem-based learning practicum modules for the dangerous goods course by Dwi Candra Yuniar, Herlina Febiyanti, Shabrina Ramadhani, R.R. Retno Sawitri Wulandari

    Published 2023-12-01
    “…Providing Dangerous Goods material aims to discover how to handle and pack dangerous goods under predetermined regulations, not to endanger flight safety and security. However, the cadets felt that the Dangerous Goods course was challenging due to the lack of modules and difficulty understanding the very thick Dangerous Goods book. …”
    Get full text
    Article
  10. 7850

    Revenue policy features as an important direction of social policy by M. A. Biganova

    Published 2020-01-01
    “…The author rightly notes, that the income policy is aimed at solving such important tasks as helping vulnerable groups of the population by resorting to the use of the social security system and leveling the inflationary processes that affect the income and savings of citizens. …”
    Get full text
    Article
  11. 7851

    Family Green Financial Education Based on Local Wisdom: Exploring the Values of Coastal Communities’ Local Wisdom in Promoting Green Financial Literacy by Kurniadi Romi, Dwijayanti Novia Sri, Sari Nurmala

    Published 2025-01-01
    “…The findings reveal that the coastal communities of the Batang Hari River integrate local wisdom into their financial and resource management, prioritizing long-term security and sustainability. They view saving and asset ownership as essential for future stability and employ eco-friendly practices such as using durable goods, organic fertilizers, and sustainable fishing methods. …”
    Get full text
    Article
  12. 7852

    Model-Based Design, HIL Testing, and Rapid Control Prototyping of a Low-Cost POC Quadcopter with Stability Analysis and Control by Abdullah Irfan, Muhammad Gufran Khan, Arslan Ahmed Amin, Syed Ali Mohsin, Muhammad Adnan, Adil Zulfiqar

    Published 2022-01-01
    “…Unmanned aerial vehicles (UAVs), particularly quadcopters, have several medical, agriculture, surveillance, and security applications. However, the use of this innovative technology for civilian applications is still very limited in low-income countries due to the high cost, whereas low-cost controllers available in the market are often tuned using the hit and trial approach and are limited for specific applications. …”
    Get full text
    Article
  13. 7853
  14. 7854

    MARIJUANA USE WITHIN THE CONSTRUCTION WORKFORCE: THEORETICAL CONSIDERATIONS AND A RESEARCH PROPOSAL by Fred Sherratt, Matthew Hallowell, Marzia Hoque Tania

    Published 2017-12-01
    “…The social determinants of health negatively associated with work (the reasons why people drink or take recreational drugs) can be readily identified in construction work with temporary contracts, long working hours, and a lack of employment security for work within high-pressure and high-hazard environments. …”
    Get full text
    Article
  15. 7855

    Numerical Simulation of Tide and Tidal Current in Mangrove Creek by LI Yichun, LIU Shitong

    Published 2021-01-01
    “…Mangrove coast is one of the typical coasts in low latitude area.Mangrove is widely distributed in southern coastal cites of China,which is of great significance for tide resistance,shoal reinforcement,environmental protection and ecological security.However,mangrove hydrodynamics develops slowly in estuarine and coastal research.This paper establishes a two-dimensional hydrodynamic numerical model based on high-resolution scheme and ‘slot method’ to simulate and study the hydrodynamic characteristics of small-scale mangrove creek,and builds a simplified theoretical model based on water conservation to explore the relationship between maximum velocity and tide level.The results show that:The tidal current asymmetry in the creek is mainly affected by the incident tidal wave,and the topography in the creek cannot cause the alternation of asymmetric nature of tidal current;The mangrove is favorable for the flow structure in the creek to maintain the tidal flat and gather the materials;Mangrove has significant impact on the decrease of the longitudinal velocity on the tidal flat,but little effect on the transverse velocity;The density of natural mangrove has little effect on the velocity,and the increase of width of the deep channel promotes the flood-dominated tidal velocity;The tide level at maximum velocity is related to the depth-width ratio of the deep channel,the slope of the tidal flat and the scale of the deep channel,and affected by the flood-ebb time-asymmetry;The influence by tidal flat slope mainly comes from the change of tidal prism in the creek.The flood tide process is mainly controlled by the incident tidal wave at the entrance,while the ebb tide process is mainly affected by the volume of tidal prism in the creek.…”
    Get full text
    Article
  16. 7856

    واقع استخدام شبکة التواصل الاجتماعى الفیسبوک فى الأرشیفات الوطنیة العربیة والأجنبیة : دراسة تحلیلیة مقارنة... by د. تفیدة سمیر محمود

    Published 2018-04-01
    “…The study found that the existence of Arabarchives on internet is almost weak, and that some Arab archives do not use themeans of social communication in general due to lack of financial and humanresources and legal risks and security risks.The foreign archives update their face book pages almost daily ,whichmakes it logical to users to visit these pages on a regular basis ,and thecontinuity and updating of the update shows the importance given by the nationalarchives of its presence on face book unlike Arabic archives.The study also found that the Arab archives method is linked to web 1,and that the presence of Arab archives on the social networking site face book isan important presence of existence only on face book and does not reflect thehistorical value found in the Arab national archives.…”
    Get full text
    Article
  17. 7857

    Evaluasi Kebijakan Spasial Perlindungan Lahan Pertanian Pangan Berkelanjutan di Kecamatan Kaliwungu Kabupaten Kendal by Widya Kusuma Harniawati, Kismartini Kismartini, Hartuti Purnaweni

    Published 2021-01-01
    “…Researchers recommend that the socialization, cooperation between agencies and the implementation of activities to protect sustainable agricultural land should be carried out quickly, carefully and precisely in order to achieve food security in Kaliwungu District in particular and Indonesia in general.…”
    Get full text
    Article
  18. 7858

    An Analysis on Determinants of Cash and L/C Export: Findings from Türkiye’s Export by Ahmed Yusuf Sarıhan

    Published 2024-04-01
    “…The use of a letter of credit payment method by banks serves a protective role, enabling the parties to engage in trade more securely. While the expenses linked to this approach are sometimes viewed as challenging for the involved parties, it is considered a significant enabler, particularly in new trade alliances. …”
    Get full text
    Article
  19. 7859

    Constructing method of opaque predicate based on type conversion and operation of floating point numbers by Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE

    Published 2023-10-01
    “…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
    Get full text
    Article
  20. 7860

    Access to Healthcare in Rural Communities: A Bibliometric Analysis by Ariya Natarajan, Murdoc Gould, Anjali Daniel, Rohan Mangal, Latha Ganti

    Published 2023-12-01
    “…However, in the subsequent years of 2020 to 2022, there was a slight decline of 3 percent in the volume of U.S. publications. Australia secured the second position in terms of publications within the aforementioned timeframe of 2015 to 2022. …”
    Get full text
    Article