Showing 8,981 - 9,000 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 8981
  2. 8982

    Localization and detection of deepfake videos based on self-blending method by Junfeng Xu, Xintao Liu, Weiguo Lin, Wenqing Shang, Yuefeng Wang

    Published 2025-01-01
    “…Abstract Deepfake technology, which encompasses various video manipulation techniques implemented through deep learning algorithms-such as face swapping and expression alteration-has advanced to generate fake videos that are increasingly difficult for human observers to detect, posing significant threats to societal security. Existing methods for detecting deepfake videos aim to identify such manipulated content to effectively prevent the spread of misinformation. …”
    Get full text
    Article
  3. 8983

    Formation of Russian magistracy: implementation of the digital economy requests in the educational process by E. V. Voevodina

    Published 2020-02-01
    “…As the main results, information on the use of modern educational technologies in the preparation of Russian undergraduates has been given – a conclusion has been made about the small distribution of on-line education and network programs in universities.The research data characterizing the degree of digital competencies of Russian graduate students have been adduced: information search and processing, use of IT technologies, information security, ability to work with «big» data. It has been noted, that these skills are well developed among modern students, but the participation of universities in their development is low. …”
    Get full text
    Article
  4. 8984

    Wind Energy Resource Prediction and Optimal Storage Sizing to Guarantee Dispatchability: A Case Study in the Kenyan Power Grid by Hampfrey Odero, Cyrus Wekesa, George Irungu

    Published 2022-01-01
    “…Thus, after their installation and integration into the grid, they impose a new challenge for the secure, reliable, and economic operation of the system. …”
    Get full text
    Article
  5. 8985

    Comparative analysis of the concepts of “law enforcement agencies” and “discretionary powers” in the international legal systems by O. A. Prysyazhnyuk

    Published 2024-12-01
    “…An important part of the study is an assessment of how national legal systems interpret the powers of law enforcement agencies, including the police, prosecutors and other state institutions that contribute to law enforcement and security. Particular attention is paid to how these powers affect the efficiency and effectiveness of law enforcement, as well as the ability of law enforcement officers to make decisions in real, often unpredictable situations. …”
    Get full text
    Article
  6. 8986

    A Novel Rapeseed Mapping Framework Integrating Image Fusion, Automated Sample Generation, and Deep Learning in Southwest China by Ruolan Jiang, Xingyin Duan, Song Liao, Ziyi Tang, Hao Li

    Published 2025-01-01
    “…Rapeseed mapping is crucial for refined agricultural management and food security. However, existing remote sensing-based methods for rapeseed mapping in Southwest China are severely limited by insufficient training samples and persistent cloud cover. …”
    Get full text
    Article
  7. 8987

    Risks-based Stand Normality for Sustainable Yield Forest Plantation in Perum Perhutani by Rohman Rohman, Sofyan P Warsito, Ris Hadi Purwanto, Nunuk Supriyatno

    Published 2013-07-01
    “…In any situation, either secure or insecure, teak forest plantations encounter high risks due to ecological and social disturbances, causing degradation and decrease their normality in terms of areas and standing stock. …”
    Get full text
    Article
  8. 8988

    Determinants of Seed Distribution System: The Case of Womberma District, North West Ethiopia by Gizachew Wosene Minwagaw, Wubalem Gobie Ejigu

    Published 2021-01-01
    “…Bread wheat also known as common wheat is one of the most important crops for food security and job opportunities for many smallholders as well as the urban population in Ethiopia. …”
    Get full text
    Article
  9. 8989

    Geospatial monitoring and analysis of agricultural drought to identify hotspots and risk assessment for Senegal by Gurjeet Singh, Narendra N. Das, P.V. Vara Prasad

    Published 2025-02-01
    “…Agricultural drought, characterized by insufficient soil moisture crucial for crop growth, poses significant challenges to food security and economic sustainability, particularly in water-scarce regions like Senegal. …”
    Get full text
    Article
  10. 8990

    Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations by Phuc Hao do, Tran Duc Le, Truong Duy Dinh, van Dai Pham

    Published 2025-01-01
    “…The integration of KAN-based models into existing cybersecurity frameworks can enhance the detection and mitigation of sophisticated botnet threats, thus contributing to more resilient and secure IoT ecosystems.…”
    Get full text
    Article
  11. 8991

    Displacing the Christian Theodicy of Hell: Yi Kwangsu’s Search for the Willful Individual in Colonial Modernity by Jun-Hyeok Kwak, Mengxiao Huang

    Published 2025-01-01
    “…Specifically, first, we will show that Yi’s Christian imaginary of hell is reformulated through the traditional imaginaries of hell in which, regardless of the existence of God’s sovereignty over the created order, the sufferings of sinners in hell function to secure social norms and orders. In doing so, we claim that the Christian imaginary of hell in <i>The Heartless</i> is relegated to a rhetorical means to beget the need for the self-awakening of the inner-self through which individual desires can be freed from the influences of Confucian morality as well as Christian theodicy. …”
    Get full text
    Article
  12. 8992

    Administrative and Legal Status of Law Enforcement Agencies as Subjects of Interaction with Financial Institutions in the Sphere of Combating the Legalization of Criminal Proceeds by A. V. Steblianko

    Published 2019-12-01
    “…Such agencies are the National Anti-Corruption Bureau of Ukraine, the agencies of the Security Service, the National Police and Prosecutor’s Office, the State Bureau of Investigation, the tax police units of the State Fiscal Service of Ukraine. …”
    Get full text
    Article
  13. 8993

    Magnitude and Predictors of Dietary Diversity among HIV-Infected Adults on Antiretroviral Therapy: The Case of North-Western, Ghana by Louis Nebayeng Mornah, Mahama Saaka, Diana Pireh

    Published 2024-01-01
    “…Starchy staple foods and flesh food were the most consumed foods, while organ meats, dairy products, and eggs were eaten less. Having a secured salary paid job, not taking cotrimoxazole prophylaxis, and being a young adult were strong predictors of a high dietary diversity score. …”
    Get full text
    Article
  14. 8994

    Application of Blockchain Technology in Carbon Trading Market: A Systematic Review by Timileyin P. Abiodun, Nnamdi I. Nwulu, Peter O. Olukanmi

    Published 2025-01-01
    “…The rapid expansion of the market and the accompanying challenges underscore the need for blockchain technology (BCT), which offers a decentralised, secure, and tamper-proof system. Although several research publications have demonstrated the potential enhancements that BCT could contribute to the carbon market, no systematic review has yet examined the optimal implementation of BCT within the context of carbon trading and taxation. …”
    Get full text
    Article
  15. 8995

    NEW «PARASITIC CLASS»: ON THE CONCEPT OF MIKHAIL VOSLENSKY by Сергій САВЧЕНКО, Катерина ПРОКОФ’ЄВА, Оксана РЕШЕТІЛОВА

    Published 2024-12-01
    “…Particular attention is paid to the subordination of the security forces to party control through mechanisms of the Central Committee, which minimized risks to the nomenklatura system. …”
    Get full text
    Article
  16. 8996

    Combined application of vermicompost and mineral K fertilizer improves root yield of sweet potato [Ipomoea batatas (L.) Lam] in Southern Ethiopia by Alemu Degwale, Geletaw Kebede, Ashenafi Woldeselassie, Fanuel Laekemariam

    Published 2025-02-01
    “…Eventually, this has led to a decline in food security. Although the rate depends on many factors, organic inputs such as vermicomposts are suggested as alternatives or combined with mineral fertilizers. …”
    Get full text
    Article
  17. 8997

    Ottoman Approach to Shia and Sunni State Officers of Syria in the Examples of Fakhreddin Maanoğlu and Ali Canpolad between 1570s and 1630s by Birol Gündoğdu

    Published 2024-12-01
    “…In the meantime, we shall also shortly explore how the Ottoman formidable enemies of the time interpreted the religious sectarianism and identity politics for the sake of their own security and interests.…”
    Get full text
    Article
  18. 8998
  19. 8999

    A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression&#x2014;An Azure Machine Learning Perspective by V. K. Daliya, T. K. Ramesh

    Published 2025-01-01
    “…The experiment is performed and implemented in Microsoft&#x2019;s Azure cloud, using Azure Machine Learning service, that leverages the advantages of cloud computing with respect to scalability, security and its potential integration possibilities into IoT-based smart healthcare systems.This aspect highlights its versatility and impact with respect to remote monitoring of patients as well. …”
    Get full text
    Article
  20. 9000

    Venezuela: Political Confrontation and the World Community by Z. W. Iwanowski, D. M. Rozental

    Published 2020-11-01
    “…The inability or unwillingness of external forces to reach compromise and to bring the parties to the negotiating table can pose a threat to peace and international security.As a result, Venezuela has become one of the most turbulent countries in the region. …”
    Get full text
    Article