Showing 2,541 - 2,560 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 2541

    The Small Wars Doctrine of the US Marine Corps and Colonial Experience of the European Powers by S. G. Malkin

    Published 2023-12-01
    “…The findings broaden the understanding of the modern leading powers’ approaches to internal security models transfer, as well as of its limits.…”
    Get full text
    Article
  2. 2542

    Speeding Violation Type Prediction Based on Decision Tree Method: A Case Study in Wujiang, China by Zeyang Cheng, Jian Lu, Zhenshan Zu, Yunxuan Li

    Published 2019-01-01
    “…This study is approved by the Traffic Police Brigade of Wujiang Public Security Bureau and aims to explore the characteristic of the speeding violation behaviour and attempt to make an effective prediction about it. …”
    Get full text
    Article
  3. 2543

    Artificial Intelligence in Pediatric Epilepsy Detection: Balancing Effectiveness With Ethical Considerations for Welfare by Marina Ramzy Mourid, Hamza Irfan, Malik Olatunde Oduoye

    Published 2025-01-01
    “…However, ethical considerations around privacy, data security, and model bias remain crucial for responsible AI integration. …”
    Get full text
    Article
  4. 2544
  5. 2545
  6. 2546

    Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks by Yongli Tang, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu, Baodong Qin

    Published 2024-12-01
    “…Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence.…”
    Get full text
    Article
  7. 2547
  8. 2548
  9. 2549
  10. 2550
  11. 2551

    Tea Growing and Socio-Economic Development of Small Holder Farmers: A Case Study of Rushoroza Kabale District. by Byamukama, Hillary

    Published 2025
    “…The study findings indicated that there were contributions of tea growing to welfare they included; poverty alleviation, food security, illiteracy level, financial support, capital base, collateral security, and illiteracy level. …”
    Get full text
    Thesis
  12. 2552

    A Green′s function for a convertible bond using the Vasicek model by R. Mallier, A. S. Deakin

    Published 2002-01-01
    “…We consider a convertible security where the underlying stock price obeys a lognormal random walk and the risk-free rate is given by the Vasicek model. …”
    Get full text
    Article
  13. 2553

    Usefulness of 3-Dimensional Flexible Endoscopy in Esophageal Endoscopic Submucosal Dissection in an Ex Vivo Animal Model by Kazutoshi Higuchi, Mitsuru Kaise, Hiroto Noda, Go Ikeda, Teppei Akimoto, Hiroshi Yamawaki, Osamu Goto, Nobue Ueki, Seiji Futagami, Katsuhiko Iwakiri

    Published 2019-01-01
    “…The degree of sense of security using 3D vision (3.67 [0.82]) was significantly higher than that using 2D vision (2.67 [0.52]) in trainees (P=.04), but was equivalent in experts. …”
    Get full text
    Article
  14. 2554

    Nurturing care during COVID-19: a rapid review of early evidence by Bernadette Daelmans, Tarun Dua, Vanessa Cavallera, Kristy Hackett, Kerrie Proulx, Rachel Lenzi-Weisbecker, Rachel Hatch, Carina Omoeva

    Published 2022-06-01
    “…A relatively large number of studies examined child safety and security and indicate a reduction in maltreatment referrals. …”
    Get full text
    Article
  15. 2555

    Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes by Obinna P. Fidelis, Caleb Stubbs, Katrina L. Easton, Caroline Billings, Alisha P. Pedersen, David E. Anderson, Dustin L. Crouch

    Published 2025-01-01
    “…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
    Get full text
    Article
  16. 2556

    Impact of nurturing care educational videos focusing on children with nutritional problems aged 6-23 months on mothers' knowledge and child growth by Fitri Haryanti, Lely Lusmilasari, Sri Hartini, Ayyu Sandhi, Ika Parmawati, Akhmadi Akhmadi, Nisa Nur Hasanah, Fitriana Andarwati, Hani Risnawati, Alissa Nur Pratiwi, Ananda Sekar Kusumawati, Redyta Dwi Cahyani

    Published 2024-12-01
    “…Results: The intervention group showed significant improvements in nurturing care knowledge (p = 0.012), responsive caregiving (p = 0.018), and safety and security (p = 0.006). A significant difference in safety and security was observed between groups at posttest 1 (p = 0.020). …”
    Get full text
    Article
  17. 2557

    Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques by Stephanie Ness, Vishwanath Eswarakrishnan, Harish Sridharan, Varun Shinde, Naga Venkata Prasad Janapareddy, Vineet Dhanawat

    Published 2025-01-01
    “…Anomaly detection in network traffic is a critical aspect of network security, particularly in defending against the increasing sophistication of cyber threats. …”
    Get full text
    Article
  18. 2558

    An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy by Chunyun Xu, Yubao Shang, Yongwei Yang, Chengye Zou

    Published 2025-01-01
    “…To simultaneously augment security and optimize encryption efficiency, we undertake a dual-pronged approach. …”
    Get full text
    Article
  19. 2559

    TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices by Jaemin Park, Sungjin Park

    Published 2025-01-01
    “…In the IoT era, RA is an important security feature because verifiers make critical decisions based on the RA result. …”
    Get full text
    Article
  20. 2560

    An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems by Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, Pooja Anand, Pradeep Kumar Singh, Tewabe Chekole Workneh

    Published 2022-01-01
    “…The security challenges such as privacy, scalability, authenticity, trust, and centralization thwart the quick adaptation of the smart services; hence, effective solutions are needed to be in place. …”
    Get full text
    Article