Showing 8,541 - 8,560 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 8541
  2. 8542

    TRANSNATIONAL THREATS AND FOREIGN POLICY SHIFTS: INVESTIGATING THE IMPACT OF GLOBALIZATION ON WEST AFRICAN COUNTRIES by AHMED OLAWALE MOLIKI, NURUDEEN ABIDEMI AKANBI

    Published 2024-08-01
    “…Therefore, the findings revealed that globalisation, while promoting economic growth, cultural interaction, and technical progress in West Africa states, has also given rise to non-state actors like terrorists and has disruptive consequences for sovereignty and national security. Therefore, the paper concluded that it is necessary for West Africa nations to establish efficient governance systems, regional collaboration platforms, and policies that capitalise on the advantages of globalisation while minimising its negative consequences. …”
    Get full text
    Article
  3. 8543

    RESIDENTS’ COMPLIANCE WITH BUILDING SETBACKS IN IBADAN NORTH LOCAL GOVERNMENT AREA OF OYO STATE, NIGERIA by ADEJUMO, S. A., FATIMAH O. BADIRU

    Published 2024-08-01
    “…The majority of the setbacks that were converted to other uses in low residential areas was used for security post (81.6%) while the largest proportion (35.4%) in medium and high-density areas (15.7%) were used for shop construction. …”
    Get full text
    Article
  4. 8544

    TIBW: Task-Independent Backdoor Watermarking with Fine-Tuning Resilience for Pre-Trained Language Models by Weichuan Mo, Kongyang Chen, Yatie Xiao

    Published 2025-01-01
    “…This work provides a secure and reliable IP protection mechanism for NLP models, ensuring watermark integrity across diverse applications.…”
    Get full text
    Article
  5. 8545

    From the guest editors by Gerardo Chowell, Zhilan Feng, Baojun Song

    Published 2013-07-01
    “…Specifically, he co-authored a textbook in Mathematical Biology in 2001 (second edition in 2012); a volume (with Harvey Thomas Banks) on the use of mathematical models in homeland security published in SIAM's Frontiers in Applied Mathematics Series (2003); and co-edited volumes in the Series Contemporary Mathematics entitled ``Mathematical Studies on Human Disease Dynamics: Emerging Paradigms and Challenges'' (American Mathematical Society, 2006) and Mathematical and Statistical Estimation Approaches in Epidemiology (Springer-Verlag, 2009) highlighting his interests in the applications of mathematics in emerging and re-emerging diseases. …”
    Get full text
    Article
  6. 8546

    Insider threat detection based on operational attention and data augmentation by Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN

    Published 2023-06-01
    “…In recent years, there has been an increased focus on the issue of insider threats.Insider threats are a major cause security breaches in organizations and pose an ongoing challenge.By analyzing the existing insider threat data, it was identified that the biggest challenge in insider threat detection lies in data imbalance and the limited number of labeled threat samples.In the Cert R4.2 dataset, which is a classic dataset for insider threat detection, there are over 3.22 million log data, but only 7,423 are marked as malicious operation logs.Furthermore, most of the operation types in the logs are not related to malicious behavior, and only two types of operations are highly correlated with malicious behavior, such as leaking company data, creating interference in the detection process.To address this challenge, a data processing framework was designed based on operational attention and data augmentation.Anomaly evaluation was first performed on operations by the framework, and operations with low anomaly scores were then masked.This makes the model better focus on operations related to malicious behavior, which can be considered as a hard attention mechanism for operations.Next, the characteristics of the insider threat dataset were analyzed, and three rules were designed for data augmentation on malicious samples to increase the diversity of samples and alleviate the substantial imbalance between positive and negative samples.Supervised insider threat detection was regarded as a time-series classification problem.Residual connections were added to the LSTM-FCN model to achieve multi-granularity detection, and indicators such as precision rate and recall rate were used to evaluate the model.The results indicate superior performance over existing baseline models.Moreover, the data processing framework was implemented on various classic models, such as ITD-Bert and TextCNN, and the results show that the methods effectively improve the performance of insider threat detection models.…”
    Get full text
    Article
  7. 8547

    Burden of scabies in a Ghanaian penitentiary. by Yaw Ampem Amoako, Michael Ntiamoah Oppong, Dennis Odai Laryea, Gloria Kyem, Solomon Gyabaah, Abigail Agbanyo, Bernadette Agbavor, Nana Konama Kotey, Irene Dzathor, Felicia Owusu-Antwi, Kingsley Asiedu, Richard Odame Phillips, Ymkje Stienstra

    Published 2024-01-01
    “…Therefore, we aimed to assess the burden of scabies and ascertain if prevalence was high enough to warrant mass drug administration (MDA) with ivermectin in a medium security prison in central Ghana.<h4>Methods</h4>We conducted a cross-sectional study in December 2022 and recruited inmates at the Kumasi central prison in Ghana. …”
    Get full text
    Article
  8. 8548

    About a concept of creating a social network users information aggregation and data processing system by L. V. Rudikova, O. R. Myslivec

    Published 2019-02-01
    “…The developed universal system is based on the information technology of data warehousing, and it has the following aspects: an expandable complex subject area, the integration of stored data that come from various sources, the invariance of stored data in time with mandatory labels, relatively high data stability, the search for necessary trade-off in data redundancy, modularity of individual system units, fl and extensibility of the architecture, high security requirements vulnerable data.The proposed system organizes the process of collecting data and filling the database from external sources. …”
    Get full text
    Article
  9. 8549

    Corneal Debridement Combined with Intrastromal Voriconazole for Recalcitrant Fungal Keratitis by Yajie Sun, Zhuo Sun, Yukai Chen, Guohua Deng

    Published 2018-01-01
    “…Corneal debridement combined with intrastromal voriconazole is a secure and effective treatment for recalcitrant fungal keratitis.…”
    Get full text
    Article
  10. 8550

    Realizacja prawa człowieka do żywności: uwagi wstępne na temat oceny bezpieczeństwa żywnościowego by Jarosław Kowalski, Aleksandra Kowalska

    Published 2022-03-01
    “…Celem pracy jest analiza realizacji prawa do żywności w różnych krajach oraz określenie wyzwań związanych z interpretacją wartości globalnego wskaźnika bezpieczeństwa żywnościowego (Global Food Security Index, GFSI). Liczba osób niedożywionych zwiększa się w Afryce Subsaharyjskiej i Południowej Azji, a jednocześnie rośnie udział osób z nadwagą w Ameryce Północnej i Europie. …”
    Get full text
    Article
  11. 8551

    An Exploratory Investigation of Chatbot Applications in Anxiety Management: A Focus on Personalized Interventions by Alexia Manole, Răzvan Cârciumaru, Rodica Brînzaș, Felicia Manole

    Published 2024-12-01
    “…However, limitations persist, such as the lack of human empathy, ethical and privacy concerns related to data security, and technical challenges in understanding complex human emotions. …”
    Get full text
    Article
  12. 8552

    ECONOMIC SANCTIONS AS A CONCEPT OF POWER POLITICS by I. N. Timofeev

    Published 2018-07-01
    “…Such an asymmetry fuels a debate between those who consider sanctions as an effective and legitimate instrument (US, EU and other developed states) and those who believe that only the UN Security Council can be a legal source of sanctions, while others are illegal (supported by Russia, China and several dozens of developing countries). …”
    Get full text
    Article
  13. 8553

    Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones. by Sarah D Draugelis, Erik C Brown, Donald A Donahue, Justin Hickman, Sean G Smith, Philip Sutherland, George A Yendewa, Amir M Mohareb

    Published 2025-01-01
    “…Ongoing and future work in adapting electronic health records to international humanitarian response will emphasize data security, patient privacy, equity, and the rapid translation of electronic health data to improve population health. …”
    Get full text
    Article
  14. 8554

    Special criminology measures for preventing unvoluntary leaving a military unit or place of service by P. I. Tkachenko

    Published 2023-10-01
    “…This problem can have a negative impact on the effectiveness of military operations, the security of the country and trust in the representatives of the military management and defense sector. …”
    Get full text
    Article
  15. 8555

    Why do people use a mobile wallet? The case of fintech companies in Jordan by Ohoud Khasawneh, Rana AlBahsh

    Published 2024-04-01
    “…Meanwhile, perceived value, security, privacy, and social influence had a moderate effect. …”
    Get full text
    Article
  16. 8556

    The blue revolution: sustainable water management for a thirsty world by Amarachi Paschaline Onyena, Kabari Sam

    Published 2025-01-01
    “…Abstract The twenty-first century presents critical challenges to global water resources, with rising consumption, scarcity, and security issues threatening human well-being and ecosystem health. …”
    Get full text
    Article
  17. 8557

    Combating land degradation for sustainable smallholder agriculture and food sovereignty in Ghana’s Volta Region by Armstrong Francis Tumawu, George Yao Kafu, Anthony Kangah, Mary Magdalene M. Tumawu

    Published 2025-01-01
    “…It offers valuable insights for policymakers and practitioners, underscoring the urgent need for targeted interventions to address land degradation while supporting sustainable agriculture and food security in Ghana and similar contexts.…”
    Get full text
    Article
  18. 8558

    Semi-in-situ cutting force measurement of a jigsaw by Sándor Apáti, György Hegedűs, Sándor Hajdu

    Published 2025-03-01
    “…A measurement rig was designed to securely mount the saw, the load cell, and the inductive sensors needed for speed measurements, making it possible to measure cutting forces accurately under different working conditions. …”
    Get full text
    Article
  19. 8559
  20. 8560

    Spatiotemporal analysis of urban expansion and its impact on farmlands in the central Ethiopia metropolitan area by Kalid Hassen Yasin, Anteneh Derribew Iguala, Tadele Bedo Gelete

    Published 2025-01-01
    “…Abstract Urban growth in sub-Saharan Africa presents significant challenges to sustainable development, food security, and environmental conservation. The rapid urban expansion and impact on agricultural land reduction in central Ethiopian metropolitan areas (Addis Ababa and Sheger city) exemplify these issues while simultaneously offering opportunities for sustainable development. …”
    Get full text
    Article