Showing 2,641 - 2,660 results of 5,943 for search '"securities"', query time: 0.10s Refine Results
  1. 2641

    Two new species in the green lacewing genus Santocellus (Neuroptera, Chrysopidae, Leucochrysini) by Catherine A. Tauber

    Published 2025-02-01
    “…As a result, the genus, which now contains five known species, becomes more securely defined. An updated catalog and an illustrated key to the known Santocellus species are provided.…”
    Get full text
    Article
  2. 2642

    Best Practices for Grant Development: Starting With the Idea by Kathryn A. Stofer

    Published 2024-06-01
    “…However, aside from a few workshops provided by the university, new faculty may feel like they have few resources to help them sharpen their practices at applying for and securing grant funding. This publication is meant to support Extension professionals, especially at the county level, in building good grant development habits. …”
    Get full text
    Article
  3. 2643

    Food economics : industry and markets / by Hansen, Henning Otte, 1959-

    Published 2013
    View in OPAC
    Book
  4. 2644

    A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy by Yaoying Wang

    Published 2023-09-01
    “…The findings indicate that the detector based on entropy exhibits efficacy in detecting both stochastic and purposeful attacks, thereby augmenting the security of interconnected gas and electricity networks.…”
    Get full text
    Article
  5. 2645

    Attitudes and preferences toward the adoption of voice-controlled intelligent personal assistants: Evidence from Croatia by Antun Biloš, Bruno Budimir, Borna Kraljević

    Published 2023-06-01
    “…The main research focus was set on attitudes and perceptions of users and non-users related to benefits and barriers of IPA adoption, privacy and security issues, trust as well as mobile phone usage patterns, motivators, and associated smartphone digital literacy. …”
    Get full text
    Article
  6. 2646

    RUSSIA IN THE GLOBAL INFORMATION SOCIETY by E. S. Zinovieva

    Published 2016-06-01
    “…Russian diplomacy is trying to foster the development of global rules regulating the information society and information security based on respect for sovereignty and equality of states. …”
    Get full text
    Article
  7. 2647

    Empowering drones in vehicular network through fog computing and blockchain technology. by Shivani Wadhwa, Divya Gupta, Shalli Rani, Maha Driss, Wadii Boulila

    Published 2025-01-01
    “…The contribution includes a systematic architecture design and integration of blockchain technology for secure data storage. Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. …”
    Get full text
    Article
  8. 2648

    Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing by Zikui Lu, Zixi Chang, Mingshu He, Luona Song

    Published 2025-01-01
    “…Experimental results on IoT datasets demonstrate that AG-ZSL achieves exceptional performance in classifying both known and unknown traffic, highlighting its potential for enhancing secure and efficient traffic management at the network edge.…”
    Get full text
    Article
  9. 2649

    Effects of Integrated Soil Fertility Management Technologies on the Productivity of Sorghum in the Drier Parts of Upper Eastern Kenya by Hezron Mogaka, Shadrack Kiprotich

    Published 2025-01-01
    “…Similarly, the results have wider policy effects for agriculture, especially in places where ISFM may be very important for long-term food security and agricultural productivity.…”
    Get full text
    Article
  10. 2650

    La politique de réconciliation nationale en Algérie : une approche sécuritaire by Mansour Kedidir

    Published 2022-01-01
    “…In order to restore peace and security, the government undertook a reconciliation process characterized by three phases: Clemency measures in the criminal field and two policies of civil concord and national reconciliation. …”
    Get full text
    Article
  11. 2651
  12. 2652

    A Data-Driven Approach for Reactive Power Optimization Incorporating Interval Values for Renewable Power Generation by Honglei Jia, Cong Zhang, Jieming Du, Na Kuang

    Published 2023-01-01
    “…The increasing integration of renewable energy sources into modern electric grids has led to a rise in uncertain factors that must be managed to maintain voltage security during reactive power optimization (RPO). …”
    Get full text
    Article
  13. 2653

    EFFECT OF SOCIAL MEDIA IN PROMOTING INSECURITY AND PROPAGANDA IN NIGERIA by ABDULWAHAB ABDULKABIR, NURUDEEN SOLA IBRAHIM

    Published 2024-07-01
    “…It was also discovered that the regulation of social media in Nigeria for security purpose is very poor, which is a matter of concern to the citizens. …”
    Get full text
    Article
  14. 2654

    Frequency-bin-encoded entanglement-based quantum key distribution in a reconfigurable frequency-multiplexed network by Anahita Khodadad Kashi, Michael Kues

    Published 2025-01-01
    “…Abstract Large-scale quantum networks require dynamic and resource-efficient solutions to reduce system complexity with maintained security and performance to support growing number of users over large distances. …”
    Get full text
    Article
  15. 2655

    Important factors in municipality-based pediatric palliation from healthcare professionals’ perspective: A qualitative study by Kristin Skjærseth, Natalie Preminger, May Aasebø Hauken

    Published 2025-01-01
    “…Conclusion: The importance of establishing security and predictability in municipality-based PPC was emphasized. …”
    Get full text
    Article
  16. 2656
  17. 2657

    Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review by S. Kumar Reddy Mallidi, Rajeswara Rao Ramisetty

    Published 2025-01-01
    “…Abstract As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. …”
    Get full text
    Article
  18. 2658

    Emergency Water Supply Dispatching Model for Saving and Storing Fresh Water in River Network Areas Influenced by Saltwater Intrusion by DING Bo, HE Xinchun, WANG Cuiting, WANG Linghe

    Published 2025-01-01
    “…Besides, when the salinity of Modaomen Waterway exceeds the standard level, Tielushan Reservoir is employed to drain the fresh water and regulate the salinity, which can further improve the water supply security and alleviate the influence of saltwater intrusion.…”
    Get full text
    Article
  19. 2659
  20. 2660

    Digital Literacy Education Among Students: Status, Pathways, and Implications in the Current Digital Era by Wang Yi, Wang Siqian

    Published 2025-02-01
    “…However, students from urban areas demonstrate significantly higher digital literacy levels compared to those from rural areas, particularly in security and privacy domains. The findings underscore the need for targeted interventions to enhance digital literacy in areas such as digital content creation and problem-solving. …”
    Get full text
    Article