Showing 8,741 - 8,760 results of 9,720 for search '"Securities ', query time: 0.16s Refine Results
  1. 8741

    Case studies in adaptation: centring equity in global health education during the COVID-19 pandemic and beyond by Anna Pancheshnikov, C Nicholas Cuneo, Wilfredo R Matias, Rebeca Cázares-Adame, Abner Gamaliel Santos López, Ryan M Paxton, Chi Chiung Grace Chen

    Published 2023-04-01
    “…The COVID-19 pandemic disrupted all aspects of life globally and laid bare the pervasive inequities in access to education, employment, healthcare and economic security in both high-resource and low-resource settings. …”
    Get full text
    Article
  2. 8742

    Enhancing voice spoofing detection in noisy environments using frequency feature masking augmentation by Soyul Han, Jaejin Seo, Sunmook Choi, Taein Kang, Sanghyeok Chung, Seungeun Lee, Seoyoung Park, Seungsang Oh, Il-Youp Kwak

    Published 2025-03-01
    “…This technological evolution, however, introduces heightened security vulnerabilities such as voice spoofing attacks. …”
    Get full text
    Article
  3. 8743

    Temporal–Spatial Dynamics and Collaborative Effects of Cropland Resilience in China by Liang Luo, Yetong Li, Wenjie Ma, Jianbo Rong, Jie Wei, Yong Cui, Tingting Qu

    Published 2025-01-01
    “…Cropland resilience is vital for ensuring national food security, promoting sustainable agricultural development, and adapting to global climate change. …”
    Get full text
    Article
  4. 8744

    Bleeding control of an injury to the infrarenal inferior vena cava and right external iliac vein by ipsilateral internal iliac artery and superficial femoral vein ligation after bl... by Hoonsung Park, Maru Kim, Dae-Sang Lee, Tae Hwa Hong, Doo-Hun Kim, Hangjoo Cho

    Published 2023-12-01
    “…This reduced the amount of bleeding, enabling us to secure the surgical field. We ultimately controlled the bleeding, and approximately 5 L of blood products were infused intraoperatively. …”
    Get full text
    Article
  5. 8745

    Age-Stage, Two-Sex Life Table of <i>Leptinotarsa decemlineata</i> (Coleoptera: Chrysomelidae) Experiencing Cadmium Stress by Bingyu He, Jiebo Zhang, Yang Hu, Yi Zhang, Jianan Wang, Chao Li

    Published 2025-01-01
    “…This study holds valuable implications for more effective implementation of pest control strategies in the future, offering robust scientific evidence to support the safeguarding of food security.…”
    Get full text
    Article
  6. 8746

    The genomic pattern of insertion/deletion variations during rice improvement by Xia Zhou, Jilong Li, Lei Chen, Minjie Guo, Renmin Liang, Yinghua Pan

    Published 2024-12-01
    “…Abstract Background Rice, as one of the most important staple crops, its genetic improvement plays a crucial role in agricultural production and food security. Although extensive research has utilized single nucleotide polymorphisms (SNPs) data to explore the genetic basis of important agronomic traits in rice improvement, reports on the role of other types of variations, such as insertions and deletions (INDELs), are still limited. …”
    Get full text
    Article
  7. 8747

    Does heatwaves/above-average temperature increase interpersonal violent behavior? A scoping review by Daniela ACQUADRO MARAN, Gaia DIBIASE, Sofia FILIPPETTI, Riccardo SANDRETTO, Antonella VARETTO, Claudio Giovanni CORTESE, Elisabetta CARRARO

    Published 2024-12-01
    “…., promoting green spaces and reducing pollution) and at the level of individual city institutions, which can monitor the phenomenon and take action, such as increasing the presence of security personnel in anticipation of periods of highest temperatures.…”
    Get full text
    Article
  8. 8748
  9. 8749

    A file archival integrity check method based on the BiLSTM + CNN model and deep learning by Jinxun Li, Tingjun Wang, Chao Ma, Yunxuan Lin, Qing Yan

    Published 2025-03-01
    “…The findings set a new standard for archiving system integrity testing by showing the model’s dependability and security in several use scenarios.…”
    Get full text
    Article
  10. 8750
  11. 8751

    Optimization and standardization of the work of a health care facility during a chemical accident by O.V. Hudoshyna, N.V. Kurdil

    Published 2024-06-01
    “…It is established that the special management group, which includes representatives of various services, is of decisive impor­tance in the effective management of a health care facility during a chemical incident: administration; communication department; security department; management of nurses and the department of infection control; human resources department; pharmacy; intensive care unit; department of engineering maintenance and repair; laboratory; kitchen; laundry; cleaning service and waste management. …”
    Get full text
    Article
  12. 8752

    A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure by Sardar Muhammad Ali, Abdul Razzaque, Muhammad Yousaf, Sardar Sadaqat Ali

    Published 2025-01-01
    “…The modern digital world is experiencing growing security risks, with cyber threats happening more often and becoming more complicated. …”
    Get full text
    Article
  13. 8753

    Validation of a scale based on the DigComp framework on internet navigation and cybersecurity in older adults by Francisco de Paula Rodríguez-Miranda, Rocio Illanes-Segura, Yolanda Ceada-Garrido, Juan Carlos Infante-Moro

    Published 2025-01-01
    “…This literacy refers to how they safely search for and manage information, as well as their competencies with regard to the security of their own devices. This scale was created through the adaptation of competencies 1.1, which consist of “browsing, searching and data filtering,” as well as 4.1, which considers “protecting devices,” from the DigComp model. …”
    Get full text
    Article
  14. 8754

    A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks by Nouman Imtiaz, Abdul Wahid, Syed Zain Ul Abideen, Mian Muhammad Kamal, Nabila Sehito, Salahuddin Khan, Bal S. Virdee, Lida Kouhalvandi, Mohammad Alibakhshikenari

    Published 2025-01-01
    “…These results highlight XIoT’s capability to enhance IoT security by addressing real-world challenges, ensuring robust, scalable, and interpretable protection for IoT networks against sophisticated cyber threats.…”
    Get full text
    Article
  15. 8755

    Digital therapeutics in Korea: current status, challenges, and future directions – a narrative review by Hee Jun Shin, Ik Tae Cho, Wan Suk Choi, Hong Rae Kim, Min Bong Kang, Won Jong Yang

    Published 2025-01-01
    “…The key challenges include underdeveloped regulatory frameworks, issues with data quality and security, and a lack of established reimbursement pathways. …”
    Get full text
    Article
  16. 8756

    Implementing sustainability frameworks at a product-level – Exploring the usability by Paule Bhérer-Breton, Anna Woodhouse, Bente Aspeholen Åby, Hilke Bos-Brouwers, Melanie Kok, Hanne Fjerdingby Olsen

    Published 2025-02-01
    “…Based on the development of usability criteria and applying a waterfall selection process, we identified two frameworks (Food System Sustainable framework and Sustainable Nutrition Security framework) for further analysis. To test against usability, both frameworks were applied towards a case study of seven food products produced in Norway: milk, greenhouse tomatoes, greenhouse cucumbers, wheat, beef, sheep and pork. …”
    Get full text
    Article
  17. 8757

    Perceptions of cultural and provisioning ecosystem services and human wellbeing indicators amongst indigenous communities neighbouring the greater limpopo transfrontier conservatio... by N.A. Nyathi, W. Musakwa, D.M. Azilagbetor, N.J. Kuhn

    Published 2025-01-01
    “…Overall, participants reported that both ESs contribute to their human wellbeing and livelihoods through life satisfaction, happiness, living standards, safety, security, and good health. Finally, this study's findings uniquely offer a baseline for these ESs accounting, demonstrating their direct and indirect benefits to indigenous communities' livelihoods and well-being.…”
    Get full text
    Article
  18. 8758

    Efficient Implementation of Mahalanobis Distance on Ferroelectric FinFET Crossbar for Outlier Detection by Musaib Rafiq, Yogesh Singh Chauhan, Shubham Sahay

    Published 2024-01-01
    “…Mahalanobis distance, the multivariate equivalent of the Euclidean distance, is used to detect the outliers in the correlated data accurately and finds widespread application in fault identification, data clustering, singleclass classification, information security, data mining, etc. However, traditional CMOS-based approaches to compute Mahalanobis distance are bulky and consume a huge amount of energy. …”
    Get full text
    Article
  19. 8759

    A Novel Mobility Concept for Terrestrial Wheel-Legged Lunar Rover by Mubarak Yakubu, Yahya Zweiri, Laith Abuassi, Rana Azzam, Ahmad Abubakar, Amna Busoud, Lakmal Seneviratne

    Published 2025-01-01
    “…This mobility concept offers the advantage of a self-locking function, which secures the leg positions even in the event of component failure - an improvement over systems with individual motors for each leg. …”
    Get full text
    Article
  20. 8760

    An action research study on the needs and perspectives of medical students and junior residents on peer physical examination guidelines to respect medical students’ autonomy and pr... by Emily Suzuki, Nobutoshi Nawa, Eriko Okada, Yu Akaishi, Ayako Kashimada, Mitsuyuki Numasawa, Kumiko Yamaguchi, Kazuki Takada, Masanaga Yamawaki

    Published 2025-02-01
    “…Additionally, the need to take a balance between respecting students’ autonomy and securing model patients was noted. Conclusion Medical students and junior residents generally supported the PPE guidelines. …”
    Get full text
    Article