Showing 9,161 - 9,180 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 9161

    Psychotropic medications: a descriptive study of prescription trends in Tabriz, Iran, 2021–2022 by Mostafa Farahbakhsh, Ali Fakhari, Ali Azimian, Amin Khameneh, Mahsa Matinkia, Ehsan Aghajani

    Published 2025-01-01
    “…Method A descriptive study was conducted using data extracted from the Social Security Organization in Iran. We analyzed prescriptions in Tabriz from March 2021 to March 2022. …”
    Get full text
    Article
  2. 9162

    Моделі самоорганізації колективу однорідних безпілотних літальних апаратів при рішенні слабоформалізованих завдань... by А.В. Тристан, Д.І. Жуков

    Published 2024-09-01
    “…A number of problems and shortcomings related to the organization of the control system, route planning, role assignment, speed and completeness of information receipt, processing and transmission are being addressed, which in turn improves the security and performance of the system. …”
    Get full text
    Article
  3. 9163

    Unmasking Job Satisfaction: Insights from Tribal India’s Nurses amongst the COVID-19 Pandemic by Vikrant Kabirpanthi, Vikas Gupta, Subramani Palaniyandi

    Published 2024-12-01
    “…Conclusion: The findings of the study might be of great reference value for improving the job satisfaction level of nursing staff during public health emergencies, developing nursing staff security policies, and promoting the establishment of emergency response teams.…”
    Get full text
    Article
  4. 9164

    Moral grounds and social norms of safe prosocial behaviour of young people by P. A. Kislyakov, E. A. Shmeleva, M. O. Aleksandrovich

    Published 2020-12-01
    “…The current research is based on the theory of moral grounds, the theory of social norms of prosocial behaviour, and the theory of social and psychological security. The following psychodiagnostic methods were applied: “Diagnostics of the Level of Moral and Ethical Responsibility of the Individual” (by I. …”
    Get full text
    Article
  5. 9165

    The impact of spray-induced gene silencing on cereal phyllosphere microbiota by Poorva Sundararajan, Samrat Ghosh, Bekele Gelena Kelbessa, Stephen C. Whisson, Mukesh Dubey, Aakash Chawade, Ramesh Raju Vetukuri

    Published 2025-01-01
    “…The frequency and severity of FHB epidemics has increased in recent years, threatening global food security. Spray-induced gene silencing (SIGS) is an alternative technique for tackling this devastating disease through foliar spraying with exogenous double-stranded RNA (dsRNA) to silence specific pathogen genes via RNA interference. …”
    Get full text
    Article
  6. 9166

    Crop wild relatives in the protected areas of the Republic of Bashkortostan by S. R. Miftakhova, L. M. Abramova, N. M. Saifullina, O. V. Yusupova

    Published 2022-12-01
    “…Comprehensive research into crop wild relatives (CWR) is essential to ensure food security. Protected areas serve as the main reserves for CWR in situ conservation and their population genetics studies. …”
    Get full text
    Article
  7. 9167
  8. 9168

    Prevalence and correlates of facemask usage during the second wave of COVID-19 pandemic in Uganda. by Nelson Onira Alema, Christopher Okot, Emmanuel Olal, Eric Nzirakaindi Ikoona, Freddy Wathum Drinkwater Oyat, Steven Baguma, Denish Omoya Ochula, Patrick Odong Olwedo, Johnson Nyeko Oloya, Francis Pebalo Pebolo, Pamela Okot Atim, Godfrey Smart Okot, Ritah Nantale, Judith Aloyo, David Lagoro Kitara

    Published 2025-01-01
    “…Although this prevalence is within acceptable rates, the strict enforcement of the practice by security forces has raised concerns among many community members and human rights advocates. …”
    Get full text
    Article
  9. 9169

    Explosive Performance Assessment of Buried Steel Pipeline by Seyed-Mohammad Seyed-Kolbadi, Mohammad Safi, Ayoub Keshmiri, S. Mahdi S. Kolbadi, Masoud Mirtaheri

    Published 2021-01-01
    “…It is certain that social security is related to overcoming on these perils and protection from country. …”
    Get full text
    Article
  10. 9170

    Understanding how, for whom and under what circumstances telecare can support independence in community-dwelling older adults: a realist review by Lauren Fothergill, Niall Hayes, Yvonne Latham, Jenny Hamilton, Saiqa Ahmed, Carol Holland

    Published 2025-01-01
    “…To improve telecare implementation, consideration must be given to these mechanisms; otherwise, interventions risk being abandoned or underutilised and, as a result, may not adequately support older adults to remain living at home safely, creating a false sense of security. Conclusions Assessments of an individual’s needs and preferences should be carried out to ensure that telecare enables autonomy, supports the goal of remaining at home, facilitates connections to social support, and promotes integration into everyday life. …”
    Get full text
    Article
  11. 9171

    End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT by Matthew Boeding, Michael Hempel, Hamid Sharif

    Published 2025-01-01
    “…Furthermore, this framework can test protocol compliance, performance, and security in a controlled environment before deploying devices in live production networks and addressing cybersecurity concerns.…”
    Get full text
    Article
  12. 9172

    Registered Nurses' Experience of Person‐Centred Care Through Digital Aids in Primary Care Setting During the COVID‐19 Pandemic by Annika Kjällman Alm, Ove Hellzen, Malin Rising‐Holmström

    Published 2025-01-01
    “…Registered nurses within primary care settings had to adjust to new meeting forums with patients and in collaborations with other organisations to transfer patients from hospital to home care in a safe and secure manner using digital aids. Design Interviews with 17 registered nurses within primary care settings were conducted. …”
    Get full text
    Article
  13. 9173

    Tampered text detection via RGB and frequency relationship modeling by Yuxin WANG, Boqiang ZHANG, Hongtao XIE, Yongdong ZHANG

    Published 2022-06-01
    “…In recent years, the widespread dissemination of tampered text images on the Internet constitutes an important threat to the security of text images.However, the corresponding tampered text detection (TTD) methods have not been sufficiently explored.The TTD task aims to locate all text regions in an image while judging whether the text regions have been tampered with according to the authenticity of the texture.Thus, different from the general text detection task, TTD task further needs to perceive the fine-grained information for real-world and tampered text classification.TTD task has two main challenges.One the one hand, due to the high similarity in texture between real-world texts and tampered texts, TTD methods that only learn from RGB domain features have limited capability to distinguish these two-category texts well.On the other hand, as the different detecting difficulty exists in real-world texts and tampered texts, the network cannot well balance the learning process of the two-category texts, resulting in the imbalance detection performance between real-world and tampered texts.Compared with RGB domain features, the discontinuity of text texture in frequency domain can help the network to identify the authenticity of text instances.Accordingly, a new TTD method based on RGB and frequency information relationship modeling was proposed.The features in the RGB and frequency domains were extracted by independent feature extractors respectively.Thus, the identification ability of tampered texture can be enhanced by introducing frequency information during the texture perception.Then, a global RGB-frequency relationship module (GRM) was introduced to model the texture authenticity relationship between different text instances.GRM referred to the RGB-frequency features of other text instances in the same image to assist in judging the authenticity of the current text instance, which solved the problem of imbalanced detection performance.Furthermore, a new TTD dataset (Tampered-SROIE) was proposed to evaluate the effectiveness of proposed method, which contains 986 images (626 training images and 360 test images).By evaluating on the Tampered-SROIE, the proposed method obtains 95.97% and 96.80% in F-measure for real-world and tampered texts respectively and reduces the imbalanced detection accuracy by 1.13%.The proposed method will give new insights to the TTD community from the perspective of network structure and detection strategy.Tampered-SROIE also provides an evaluation benchmark for future TTD methods.…”
    Get full text
    Article
  14. 9174

    War and criminal law policy of Ukraine: challenges and responses by Yu. V. Orlov, N. O. Pribytkova

    Published 2022-06-01
    “…The empirical basis of the study is made up of the materials of 225 court verdicts for the commission of criminal offenses provided for by Articles 111, 111-1, 111-2, 114-2, 436-2, 438 of the Criminal Code of Ukraine, as well as the results of expert assessments and surveys of 92 employees of pre-trial investigation bodies of the National of the police, 35 employees of the prosecutor’s office, 30 investigators of the Security Service of Ukraine in Kharkiv, Odesa and Zaporizhzhia regions. …”
    Get full text
    Article
  15. 9175

    Validation of the Food Safe Zone questionnaire for families of individuals with Prader-Willi syndrome by Elisabeth M. Dykens, Elizabeth Roof, Hailee Hunt-Hawkins, Theresa V. Strong

    Published 2025-02-01
    “…To avoid life-threatening obesity in their children, families implement food security strategies (e.g., locking food sources, constant supervision around food, alerting others). …”
    Get full text
    Article
  16. 9176

    Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online by Ferzha Putra Utama, Gusman Wijaya, Ruvita Faurina, Arie Vatresia

    Published 2023-10-01
    “…This study proposes applying several cryptographic methods to secure and ensure the authenticity of online exam data using AES 256 CBC, Base 64, and SHA 256 algorithms. …”
    Get full text
    Article
  17. 9177
  18. 9178
  19. 9179

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…Initial tests of the prototype confirm the feasibility and robustness of the proposed solution, illustrating how blockchain can facilitate traceability and preserve confidentiality.DiscussionThe blockchain-based design addresses pressing concerns surrounding data security and accountability in large-scale health insurance systems. …”
    Get full text
    Article
  20. 9180