Showing 2,861 - 2,880 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 2861

    Analysis of new varieties adoption behavior of Chinese turbot farmer based on the perspective of heterogeneity by Qilei Ding, Zhengyong Yang, Renjie Xu, Yifei Chen

    Published 2025-01-01
    “…China is the largest turbot farming in the world, where germplasm source security is closely related to national security. To further promote the sustainable development of the turbot aquaculture industry, the China Marine Fish Industry Technology System team has developed a new variety of fast-growing turbot (hereinafter referred to as new varieties) in 2012. …”
    Get full text
    Article
  2. 2862

    ORGANIC FARMING: A RELIABLE STRATEGY FOR SUSTAINABLE AGRICULTURE IN NEPAL by Sushmita Tiwari, Shreya Rai, Jasmin Adhikari, Samarth Bista

    Published 2024-01-01
    “…As a result, it becomes increasingly important to address how to achieve food security while simultaneously addressing the imbalance in the ecosystem. …”
    Get full text
    Article
  3. 2863

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, Mohamed Abdallah, Hamid Menouar, Saif Al-Kuwari, Ala Al-Fuqaha

    Published 2024-01-01
    “…Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.…”
    Get full text
    Article
  4. 2864

    From data to diagnosis: leveraging deep learning in IoT-based healthcare by Miracle A. Atianashie, Chukwuma Chinaza Adaobi

    Published 2024-11-01
    “…Ethical and legal considerations are also critical as the deployment of artificial intelligence in healthcare necessitates careful consideration of patient consent and data security. The future of deep learning in healthcare IoT is geared toward enhancing data security, improving device integration, and creating patient-centric models through innovative technologies such as blockchain and edge computing. …”
    Get full text
    Article
  5. 2865

    Factors Influencing QRIS Adoption in Warkops by Muhammad Zahran Nurendra, Liliana Inggrit Wijaya, Bobby Ardiansyahmiraja, Jun Kajee

    Published 2025-01-01
    “…In contrast, perceived security, risk, anxiety, and comfort do not significantly affect the intention to adopt QRIS. …”
    Get full text
    Article
  6. 2866

    Enhancing RF Fingerprint Generation in Power Amplifiers: Unequally Spaced Multitone Design Approaches and Considerations by Chengyu Fan, Junting Deng, Ethan Chen, Vanessa Chen

    Published 2024-01-01
    “…The rapid growth of Internet of Things (IoT) devices and communication standards has led to an increasing demand for data security, particularly with limited hardware resources. …”
    Get full text
    Article
  7. 2867

    Healthcare assessment tools—a valid source of data for pre-hospital care? Usability for ensuring medical care in the event of a disaster by Robert Konrad, Robert Konrad, Denise Schuster, HJ Heppner, HJ Heppner

    Published 2025-02-01
    “…Currently, only the German Armed Forces (Bundeswehr) offer an internally secured infrastructure that allows all those involved in the care of soldiers to access all important medical data quickly and easily from any location.…”
    Get full text
    Article
  8. 2868

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “… Information security is paramount for individuals, companies, and governments. …”
    Get full text
    Article
  9. 2869

    The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review by Wasif ur Rehman, Mohsin Ali Koondhar, Samandar Khan Afridi, Lutfi Albasha, Idris H. Smaili, Ezzeddine Touti, Mouloud Aoudia, Wassim Zahrouni, Ibrahim Mahariq, M.M.R. Ahmed

    Published 2025-03-01
    “…Additionally, the paper explores development optimization of various nodes, fault detection, self-healing mechanisms, AI application optimization, and security issues specific to 5G-enabled smart agriculture. …”
    Get full text
    Article
  10. 2870

    The implications of the ongoing war on Gaza for food sustainability by Abdo Hassoun, Ahmed Hamad, Dalal Iriqat, Mohammed Nijim, Yamina Bouchikh, Mohamed Buheji, Tahani Z. Aldahdouh

    Published 2025-06-01
    “…This work investigates the impact of the ongoing war on food security and food-related sustainable development goals (SDGs) from local, regional, and global perspectives. …”
    Get full text
    Article
  11. 2871

    Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method by Rikou Miyawaki, Yukiko Yokoi

    Published 2024-10-01
    “…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
    Get full text
    Article
  12. 2872

    Comparative Study of Microorganisms in Diabetic and non-diabetic Patients with Moderate and Severe Periodontitis by Grace Alejandra Cabezas Cantos, Jonathan Armando Yanza Freire, Ingrid Polethe Morillo Gavilema, Aisha Adamarys Pineda Gómez

    Published 2024-07-01
    “…<br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out at the Hospital of the Ecuadorian Social Security Institute and at the González Suárez Health Center in the period June-August 2023. …”
    Get full text
    Article
  13. 2873

    Research on the Architecture of a Basic Reconfigurable Information Communication Network by Ruimin Wang, Lei Zhuang, Yuqiang Luo, Hongchang Chen

    Published 2013-01-01
    “…The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. …”
    Get full text
    Article
  14. 2874

    Iterative algorithms with seminorm-induced oblique projections by Yair Censor, Tommy Elfving

    Published 2003-01-01
    “…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
    Get full text
    Article
  15. 2875

    Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber by Bingyang Cao, Zhen He, Weili Zhang

    Published 2025-01-01
    “…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
    Get full text
    Article
  16. 2876

    Generation a shared secret using artificial neural networks by U. F. Holikau, M. L. Radziukevich

    Published 2019-08-01
    “…There are no recommendations on the choice of parameters of the used networks, ensuring acceptable speed and guaranteed confidentiality of the generated general secret.In this regard, it is interesting to substantiate the rational values of the parameters of ANN from the point of view of cryptographic requirements and security analysis of the proposed method of formation of cryptographic keys.…”
    Get full text
    Article
  17. 2877

    Pedestrian inertial navigation: An overview of model and data-driven approaches by Itzik Klein

    Published 2025-03-01
    “…The task of indoor positioning is fundamental to several applications, including navigation, healthcare, location-based services, and security. An emerging field is inertial navigation for pedestrians, which relies only on inertial sensors for positioning. …”
    Get full text
    Article
  18. 2878

    Asymptotic Exponential Arbitrage in the Schwartz Commodity Futures Model by Tesfamariam Tadesse Welemical, Jane Akinyi Aduda, Martin Le Doux Mbele Bidima

    Published 2019-01-01
    “…Next, we find by comparison that, under some similar conditions, our result is a corresponding commodity assets (stronger) version of Föllmer and Schachermayer’s result stated in the modeling setting of geometric Ornstein-Uhlenbeck process for financial security assets.…”
    Get full text
    Article
  19. 2879

    On Family Relationships under the Laws of Hammurabi by K. V. Karpenko

    Published 2012-10-01
    “…The family in the Hammurabi Code represents the basis not only for economic and financial power of the state, but also for its political stability and security. The rights and obligations of spouses are not equal, but they are together, though each in his own way, achieving the main goal of the marital union - the birth and upbringing of children.…”
    Get full text
    Article
  20. 2880

    Electricity Prices of the Future by Justus Haucap, Jonathan Meinhof

    Published 2022-06-01
    “…Secondly, additional instruments are needed to safeguard the security of supply. An thirdly, network charges need to account for the different role of the distribution network, which operates more and more as a platform. …”
    Get full text
    Article