Showing 2,741 - 2,760 results of 5,943 for search '"securities"', query time: 0.08s Refine Results
  1. 2741

    AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system by C. Rajathi, P. Rukmani

    Published 2025-12-01
    “…In today’s digital landscape, maintaining security has become increasingly difficult. Many organizations implement security mechanisms to protect their valuable resources from potential threats. …”
    Get full text
    Article
  2. 2742

    Numerical Assessment of a Safety System to Minimize Injuries during a Cyclist Run-Over by E. H. López-García, M. F. Carbajal-Romero, J. A. Flores-Campos, C. R. Torres-SanMiguel

    Published 2021-01-01
    “…The computed results were divided into groups, A for the run-over test without a passive security system and B for the run-over test with a passive security system. …”
    Get full text
    Article
  3. 2743

    Association between Cardiac Hypertrophy and Sex of Patients from a Hospital in Ecuador by Guido Nino Guida Acevedo, María Fernanda Cueva Moncayo, Piedad Elizabeth Acurio Padilla

    Published 2024-01-01
    “…<br /><strong>Objective:</strong> determine the association between cardiac hypertrophy and sex of patients in a hospital of the Ecuadorian Institute of Social Security. <br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out in December 2022 in a hospital of the Ecuadorian Social Security Institute. 88 patients were analyzed distributed into two groups: male and female, each with 44 patients. …”
    Get full text
    Article
  4. 2744

    Dynamics of Cropland Non-Agriculturalization in Shaanxi Province of China and Its Attribution Using a Machine Learning Approach by Huiting Yan, Hao Chen, Fei Wang, Linjing Qiu

    Published 2025-01-01
    “…Cropland is a critical component of food security. Under the multiple contexts of climate change, urbanization, and industrialization, China’s cropland faces unprecedented challenges. …”
    Get full text
    Article
  5. 2745

    Driving simulator study of text messaging and phone conversations: Effects of messages’ valence, drivers’ values and self-reported driving behaviors by Ivars Austers, Inese Muzikante, Ronalds Cinks

    Published 2025-01-01
    “…Self-reported values of power, security, and universalism were significantly correlated with objective driving measures: power was associated with riskier driving behaviors, whereas security and universalism were linked to safer driving patterns. …”
    Get full text
    Article
  6. 2746

    Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen by Phillip D. Rodgers, Elizabeth F. Pienaar, Mark Lotz, Darrell Land

    Published 2016-11-01
    “…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
    Get full text
    Article
  7. 2747

    Solar Drying for Domestic and Industrial Applications: A Comprehensive Review of Innovations and Efficiency Enhancements by Md Atiqur Rahman, S. M. Mozammil Hasnain, Prabhu Paramasivam, Rustem Zairov, Abinet Gosaye Ayanie

    Published 2025-02-01
    “…Abstract Global challenges such as energy scarcity and food security are intensified by a growing population and substantial post‐harvest food losses, contributing to alarming hunger levels. …”
    Get full text
    Article
  8. 2748
  9. 2749

    Promoting Healthy Lifestyle Strategies among Couples for Sustainable Family Survival in Oyo State, Nigeria by Taiwo Adekemi Akinyemi, Olajide Olatunde Adeola, Halimot Omobola Toriola

    Published 2024-12-01
    “…Healthy lifestyle can be encouraged through mindfulness, with secure communities and local mental support resources playing a key role. …”
    Get full text
    Article
  10. 2750

    The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field by Ijaz Khalid, Tariq Shah, Khalid Ali Almarhabi, Dawood Shah, Muhammad Asif, M. Usman Ashraf

    Published 2022-01-01
    “…The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for secure data communication as it provides high security while utilizing the same size as the secret key. …”
    Get full text
    Article
  11. 2751

    The Effectiveness and Mechanisms of China’s Grain Support Policies in Relation to Grain Yield—An Evaluation of a Wide Range of Policies by Tianjian Li, Fan Yang, Haotian Zhang, Qingning Lin

    Published 2025-01-01
    “…These conclusions are of great significance for improving grain production support and protection systems, enhancing incentives for farmers to grow food and for local governments to control food, and achieving the goal of food security.…”
    Get full text
    Article
  12. 2752

    Blockchain enabled traceability in the jewel supply chain by Aman Patel, Siva Sai, Ankit Daiya, Harshal Akolekar, Vinay Chamola

    Published 2025-01-01
    “…The system incorporates robust security measures, addressing vulnerabilities such as reentrancy attacks and unauthorized access. …”
    Get full text
    Article
  13. 2753

    Effect of Banana Production on Poverty Reduction in Kabuyanda Sub-County, Isingiro District. by Arinda, Edgar

    Published 2024
    “…Additionally, diversifying banana products like flour, chips, and juice was suggested to enhance food security and create additional income streams through value addition. …”
    Get full text
    Thesis
  14. 2754
  15. 2755

    The system of entities providing territorial defence of Ukraine and the role of local self-government bodies within it by I. V. Romanskyi

    Published 2023-09-01
    “…It has been found that the system of entities providing territorial defence of Ukraine consists of: 1) The Verkhovna Rada of Ukraine is responsible for establishing the legislative framework for the territorial defence of Ukraine and for exercising parliamentary control over the compliance with the requirements of the legislation in this area by the committees established by it; 2) The President of Ukraine and the National Security and Defence Council of Ukraine are responsible for the global management and control over the functioning of the entire defence and security sector of Ukraine, including territorial defence, and ensure the deployment of territorial defence if necessary; 3) The Cabinet of Ministers of Ukraine, ministries and other central executive authorities whose activities are aimed at building the organisational and administrative architecture of territorial defence, determining the vector of development and implementation of the state policy in the field of defence and territorial defence of Ukraine; 4) target subjects of territorial defence implementation including regional state administrations, military authorities and law enforcement agencies. …”
    Get full text
    Article
  16. 2756

    The Rise and Fall of the Iraqi Sunni Awakening Movement by Ramiz Sevdimaliyev

    Published 2023-03-01
    “…The disintegration of the Awakening was strongly influenced by two US decisions that were of strategic importance to Iraq: (a) support for al-Maliki following his defeat in the 2010 parliamentary elections, won by the secular Sunni-Shiite coalition; (b) poor timing of the withdrawal of American troops from Iraq, as by the end of 2011, the Iraqi security forces were still not ready to ensure the country's security. …”
    Get full text
    Article
  17. 2757
  18. 2758
  19. 2759

    THE WASSENAAR ARRANGEMENT AND RUSSIAN HIGH-TECH EXPORT by L. S. Revenko, N. S. Revenko

    Published 2016-02-01
    “…The dilemma between the need to support exporters by reducing administrative barriers and the ensuring security interests of the country gain momentum in current stage of scientific-and-technological advance development.…”
    Get full text
    Article
  20. 2760

    CONFLICT BETWEEN PASTORALISTS AND FARMERS IN NIGERIA AND ITS POTENTIALS FOR REGIONAL INSECURITY IN AFRICA by Angela Ajodo-Adebanjoko, Joy Ede Ukoje

    Published 2023-09-01
    “…To manage the conflict, the author recommends that African governments should muster the political will to address the security challenges posed to the African continent by the conflict by reviewing the ECOWAS Transhumance Protocol among others. …”
    Get full text
    Article