Showing 7,861 - 7,880 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 7861

    La politique nationale de réconciliation et de relocalisation des populations déplacées dans le Liban d’après-guerre by Dima de Clerck

    Published 2022-01-01
    “…Such a policy on a nation-wide scale could only be elaborated and implemented by the state, since it required important financial resources, specific legislation and even security measures. A ministry and a fund for the displaced were created in 1992 to ensure the return of all displaced people in Lebanon. …”
    Get full text
    Article
  2. 7862

    Lentil plant disease and quality assessment: A detailed dataset of high-resolution images for deep learning researchMendeley Data by Eram Mahamud, Md Assaduzzaman, Shayla Sharmin

    Published 2025-02-01
    “…By leveraging this dataset, researchers can explore innovative approaches to tackle challenges in lentil farming, contributing to sustainable agricultural practices and food security. Moreover, the dataset serves as a valuable resource for training and testing machine learning algorithms tailored to agricultural settings, facilitating advancements in automated agricultural technologies. …”
    Get full text
    Article
  3. 7863

    Spatio-temporal Distribution Characteristics and Future Trend Analysis of Extreme Climate Indices in Nenjiang River Basin over the Past 60 Years by GONG Xiao, DAI Changlei, LI Shuling, XIAO Yue

    Published 2025-01-01
    “…The study of extreme climate change in the Nenjiang River Basin is of great significance for ensuring ecological security and agricultural production. Based on the observation data such as daily temperature and precipitation from 12 meteorological stations in the Nenjiang River Basin between 1960 and 2020, this paper selects 26 extreme climate indices. …”
    Get full text
    Article
  4. 7864

    Human Capital Accounting and Financial Performance of Manufacturing Firms in Nigeria by THANKGOD OZEGBE

    Published 2025-01-01
    “…Research was undertaken from the Security and Exchange Commission platform on listed manufacturing firms spanning from 2010-2019. …”
    Get full text
    Article
  5. 7865

    Negotiations on a Ceasefire in the Process of Resolving an International Conflict: Theory and Practice by Sergii Tolstov

    Published 2024-12-01
    “…In this context, creating conditions for ending the active phase of military actions seems to be an important and urgent task ensuring the end of a dangerous military crisis that has destroyed the foundations of European security.…”
    Get full text
    Article
  6. 7866

    Drought and Wetness Variability and the Respective Contribution of Temperature and Precipitation in the Qinghai-Tibetan Plateau by Lele Zhang, Liming Gao

    Published 2021-01-01
    “…Quantifying drought and wetness fluctuations is of great significance to the regional ecological environment and water resource security, especially in the fragile Qinghai-Tibetan Plateau (QTP). …”
    Get full text
    Article
  7. 7867

    Hybrid Botnet Detection Based on Host and Network Analysis by Suzan Almutairi, Saoucene Mahfoudh, Sultan Almutairi, Jalal S. Alowibdi

    Published 2020-01-01
    “…Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. …”
    Get full text
    Article
  8. 7868

    Gender and affiliation differences in topic selection in U.S. congressional speeches by Lenard Dragana Božić, Omazić Marija

    Published 2018-12-01
    “…The analyses showed that there are overall gender and affiliation differences in topic selection by the male and female politicians in the 113th Congress, some confirming the trend of long-standing prevalence of home-related references in women’s speeches, and death and religion references in men’s speeches, others marking a social shift for some of the categories compared to previous studies on the topic, such as the increasing share of references to work, money achievement in women’s speeches, as well as women’s preference for security, and men’s preference for competitiveness, as signaled by their lexical choices. …”
    Get full text
    Article
  9. 7869

    Prevention or Promotion? Predicting Author's Regulatory Focus by Aswathy Velutharambath, Kai Sassenberg, Roman Klinger

    Published 2023-09-01
    “…For instance, some people seek growth and show eagerness, whereas others prefer security and are vigilant. The concept of regulatory focus is employed in psychology, to explain and predict this goal-directed behavior of humans underpinned by two unique motivational systems – the promotion and the prevention system. …”
    Get full text
    Article
  10. 7870

    Effective Combination of Advancing Transplantation Date with High-Yielding Cultivars for Paddy Rice Could Increase the Yield Potential Under Climate Warming in China by He Zhang, Guangsheng Zhou, Qijin He

    Published 2025-01-01
    “…Rice is one of the main grains in the world, the stability of its production and supply is directly related to global food security. Based on field observation data from 2000 to 2012 and a biophysical process-oriented CERES-Rice crop model at three typical sites, we investigated the effects of cultivar improvement, different transplanting dates and their interactions on rice yield potential in the major paddy rice production areas of China. …”
    Get full text
    Article
  11. 7871

    Re-Analyzing of Consequences and Methods of Climatological Changes Managements (Case Study: Iran’s Central Basin) by Sadegh Karami

    Published 2020-12-01
    “…Human beings can only provide security and the community with knowledge and management against its negative consequences. …”
    Get full text
    Article
  12. 7872

    Adversarial detection based on feature invariant in license plate recognition systems by ZHU Xiaoyu, TANG Peng, ZHANG Haochen, QIU Weidong, HUANG Zheng

    Published 2024-12-01
    “…The presence of adversarial samples poses a significant threat to the application of deep neural networks, especially in security-sensitive scenarios like license plate recognition systems. …”
    Get full text
    Article
  13. 7873

    Noise-attention-based forgery face detection method by Bolin ZHANG, Chuntao ZHU, Qilin YIN, Jingqiao FU, Lingyi LIU, Jiarui LIU, Hongmei LIU, Wei LU

    Published 2023-08-01
    “…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
    Get full text
    Article
  14. 7874

    “NEW PERIPHERY” AS A FACTOR FOR STRENGTHENING THE POSITIONS OF ISRAEL IN THE MIDDLE EAST by Y. I. Kostenko

    Published 2016-04-01
    “…The "periphery doctrine" was a grand strategy, meant to attain the major political-security goal of countering Arab hostility through relations with alternative regional powers and potential allies. …”
    Get full text
    Article
  15. 7875

    Europol’s Counter-Terrorism Role: over 25 Years of Partnership by Antonio Ortiz

    Published 2024-10-01
    “…Value: The value of this article lies in its practical insights offering an internal perspective from a seasoned security practitioner focusing on operational and institutional realities as opposed to theoretical frameworks. …”
    Get full text
    Article
  16. 7876

    Interest Rate and Loan Portfolio Performance of Commercial Banks in Uganda: Case of Stanbic Bank. by Mwebesa, Samson

    Published 2023
    “…The findings show that the effect of prime lending on loan portfolio performance is that Central bank rate and collateral security have non-significant effects on loan portfolio performance. …”
    Get full text
    Thesis
  17. 7877

    Is Aquaculture a Success? Evidence from Africa by Okoth, Sharon, Hounsounou, Hilda R.B., Turyasingura, Benson, Moenga, Kelvin O., Mwalughali, Thoko B. S., Lubembi, Sharon Indasi

    Published 2023
    “…Since its introduction in Africa, however, changes have been seen as it has contributed to food security and malnutrition and improved livelihoods by creating jobs and generating income. …”
    Get full text
    Article
  18. 7878

    The Effect of Poverty on The Social Welfare of Households in Kyanamira Sub-County Kabale District. by Natukunda, Barnabas

    Published 2023
    “…The study concluded by recommending a multifaceted approach. including income diversification, improved education 11ccess, healthcare infrastructure enhancement, targeted food security interventions, and vocational training to empower youth and enhance employment opportunities. …”
    Get full text
    Thesis
  19. 7879

    INSTITUTIONAL INNOVATIONS AND FINANCIAL INCLUSION AMONG RURAL HOUSEHOLDS IN UGANDA, by moses Agaba

    Published 2024
    “…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
    Get full text
    Article
  20. 7880

    An Automated Voice Control Home System Using Arduino and Bluetooth Module Hc-05. by Abamwesiga, Bless, Tumwekwatse, Armson

    Published 2024
    “…Also, it suggests that Google Cloud Messaging be integrated to control our lighting system from the Internet as well as introduce security-sensitive functionality on the voice application.…”
    Get full text
    Thesis