Showing 2,621 - 2,640 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 2621

    Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things by Jianrong Wang, Pan Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang

    Published 2022-11-01
    “…Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.…”
    Get full text
    Article
  2. 2622

    Quantum Private Comparison Protocol with Cluster States by Min Hou, Yue Wu

    Published 2025-01-01
    “…In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their private information. …”
    Get full text
    Article
  3. 2623

    A one health approach to plant health by Vivian Hoffmann, Birthe Paul, Titilayo Falade, Arshnee Moodley, Navin Ramankutty, Janice Olawoye, Rousseau Djouaka, Elikana Lekei, Nicoline de Haan, Peter Ballantyne, Jeff Waage

    Published 2022-09-01
    “…In this opinion piece, based on a webinar of the same name, we argue that a One Health perspective can help optimize net benefits from plant protection, realizing food security and nutrition gains while minimizing unintentional negative impacts of plant health practices on people, animals and ecosystems. …”
    Get full text
    Article
  4. 2624

    Making Simple Repairs: Holes in the Wall by Mary N. Harrison

    Published 2019-05-01
    “… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
    Get full text
    Article
  5. 2625

    Asymmetric Information and Quantization in Financial Economics by Raymond J. Hawkins, B. Roy Frieden

    Published 2012-01-01
    “…We illustrate the utility of this approach by deriving arbitrage-free derivative-security dynamics.…”
    Get full text
    Article
  6. 2626

    Profiles of the Hard to Employ and the Implications for Job Success by Elizabeth B. Bolton

    Published 2003-03-01
    “… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
    Get full text
    Article
  7. 2627

    Employer Sponsored Retirement Savings Plans by Rachel Dorman, Lisa M. Leslie, Michael S. Gutter, Martie Gillen, Josephine Turner

    Published 2012-05-01
    “…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
    Get full text
    Article
  8. 2628

    Employer Sponsored Retirement Savings Plans by Rachel Dorman, Lisa M. Leslie, Michael S. Gutter, Martie Gillen, Josephine Turner

    Published 2012-05-01
    “…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
    Get full text
    Article
  9. 2629

    Making Simple Repairs: Holes in the Wall by Mary N. Harrison

    Published 2019-05-01
    “… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
    Get full text
    Article
  10. 2630

    Profiles of the Hard to Employ and the Implications for Job Success by Elizabeth B. Bolton

    Published 2003-03-01
    “… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
    Get full text
    Article
  11. 2631

    MODERN CYBERNETIC TERRORISM AND HIS SOCIAL CONSEQUENCES by N. Grigoriev, E. Rodyukov

    Published 2016-05-01
    “…Given that policy now covers all spheres of public life and, therefore, increasing the problem of information security of society in General and each person in particular. …”
    Get full text
    Article
  12. 2632

    Signature Scheme Using the Root Extraction Problem on Quaternions by Baocang Wang, Yupu Hu

    Published 2014-01-01
    “…The performance and other security related issues are also discussed.…”
    Get full text
    Article
  13. 2633
  14. 2634
  15. 2635

    Dataset of shotgun metagenomic evaluation of Sorghum bicolor rhizosphere microbiome in soils preceded by Glycine maxNCBINCBINCBINCBI by Olubukola Oluranti Babalola, Ben Jesuorsemwen Enagbonma

    Published 2025-02-01
    “…Furthermore, the functional data and the function unknown from this dataset could enrich our understanding of microbial roles in nutrient cycling, plant growth promotion, and stress mitigation, which are critical for addressing challenges in food security and environmental sustainability.…”
    Get full text
    Article
  16. 2636
  17. 2637
  18. 2638

    The role of wireless sensor networks in the modern landscape: a concise examination by Salwa El-Morsy

    Published 2022-06-01
    “…Wireless sensor networks are fast process of connection in part such as agriculture, healthcare, environmental monitoring, security, and manufacturing and also it thesaurus and measure physical signals and it also have wireless communication. …”
    Get full text
    Article
  19. 2639

    Why most African states may be at war with each other in 2063 by Francis Onditi, Shadrack Mulei Kithiia

    Published 2019-10-01
    “…The Agenda 2063, which was created in 2015, groups its objectives into four broad categories: inclusive growth; integration; governance; security; cultural identity; women and youth; and partnership …”
    Get full text
    Article
  20. 2640

    Kink of Subclavian Artery Mimicking Stenosis by Hatice S. Kemal, Aziz Gunsel, Murat Kocaoglu, Levent Cerit, Hamza Duygu

    Published 2016-01-01
    “…In this asymptomatic case, we have merged clinical and multiple imaging modalities to secure the diagnosis and treatment plan.…”
    Get full text
    Article