Showing 3,181 - 3,200 results of 5,943 for search '"securities"', query time: 0.05s Refine Results
  1. 3181

    Energy Conservation, Singular Orbits, and FPGA Implementation of Two New Hamiltonian Chaotic Systems by Enzeng Dong, Guanghan Liu, Zenghui Wang, Zengqiang Chen

    Published 2020-01-01
    “…Since the conservative chaotic system (CCS) has no general attractors, conservative chaotic flows are more suitable for the chaos-based secure communication than the chaotic attractors. …”
    Get full text
    Article
  2. 3182

    Advanced Facial Recognition Systems for Real-Time Embedded Applications by Guerbaoui Mohammed, Misbah Nouhaila, Selmani Abdelouahed, El Faiz Samira, Benhala Bachir, Ed-Dahhak Abdelali, Lachhab Abdeslam

    Published 2025-01-01
    “…Addressing mounting concerns in security and surveillance, this project aims to develop an advanced facial recognition system using a 2D detection approach. …”
    Get full text
    Article
  3. 3183

    Estate Planning by Martie Gillen, Josephine Turner, Vervil Mitchell

    Published 2012-03-01
    “…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
    Get full text
    Article
  4. 3184

    Internal agricultural policy of the government of A. V. Kolchak by E. A. Koshechkina

    Published 2020-10-01
    “…This circumstance eventually secured the victory of Bolshevism…”
    Get full text
    Article
  5. 3185

    How the industrial journalist can promote good relations by Dirk Venter, Bosman Olivier

    Published 2022-11-01
    “…Managements must inform and motivate their employees at all times, drawing them closer to the heart of the company or organisation through messages conveyed by management supporting their job security, remuneration and recognition and increasing their insight and knowledge of the total work environment. …”
    Get full text
    Article
  6. 3186

    La lutte contre la piraterie au large de la Somalie by Vice-amiral Gérard Valin

    Published 2024-03-01
    “…At the end of the day, only a global approach of the Somalian issues will be able to secure the Gulf of Aden, which is a strategic Sea Line Of Communication for the world trade. …”
    Get full text
    Article
  7. 3187

    Asymptotic analysis of American call options by Ghada Alobaidi, Roland Mallier

    Published 2001-01-01
    “…American call options are financial derivatives that give the holder the right but not the obligation to buy an underlying security at a pre-determined price. They differ from European options in that they may be exercised at any time prior to their expiration, rather than only at expiration. …”
    Get full text
    Article
  8. 3188
  9. 3189
  10. 3190
  11. 3191
  12. 3192
  13. 3193

    Survey on Byzantine attacks and defenses in federated learning by ZHAO Xiaojie, SHI Jinqiao, HUANG Mei, KE Zhenhan, SHEN Liyan

    Published 2024-12-01
    “…Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. …”
    Get full text
    Article
  14. 3194

    Floridians’ Perceptions of GMOs: GMOs and Florida Citrus by Nicole M. W. Dodds, Laura M. Gorham, Joy N. Rumble

    Published 2014-10-01
    “… Worldwide and in Florida, food-related issues such as food safety, food security, and use of new food technologies continue to be top concerns. …”
    Get full text
    Article
  15. 3195

    Qualification problems of war-related criminal offences documented on the de-occupied territories of Ukraine by Yu. V. Orlov, N. O. Pribytkova

    Published 2022-09-01
    “…Based on the analysis and synthesis of the experience of investigators from the National Police, the Security Service of Ukraine, as well as prosecutors on the de-occupied territories of Ukraine, four basic problematic subject areas with the corresponding typical situations of the law on criminal liability application have been identified: criminal legal qualification of artillery shelling, mining, causing death to a person, and other actions of physically detained representatives of the aggressor state. …”
    Get full text
    Article
  16. 3196

    Fibrodysplasia Ossificans Progressiva and Pregnancy: A Case Series and Review of the Literature by Alexandra D. Forrest, Danielle M. Vuncannon, Jane E. Ellis, Zvi Grunwald, Frederick S. Kaplan

    Published 2022-01-01
    “…These cases posed unique anesthetic and obstetric technical challenges, particularly when securing the airway and performing cesarean delivery. …”
    Get full text
    Article
  17. 3197

    SDN-Enabled Communication Network Framework for Energy Internet by Zhaoming Lu, Chunlei Sun, Jinqian Cheng, Yang Li, Yong Li, Xiangming Wen

    Published 2017-01-01
    “…Finally, we evaluate and verify the performance of this framework in terms of latency, reliability, and security by both theoretical analysis and real-world experiments.…”
    Get full text
    Article
  18. 3198

    Study on Helicopter Antitorque Device Based on Cross-Flow Fan Technology by Du Siliang, Tang Zhengfei, Xu Pei, Ji Mengjiang

    Published 2016-01-01
    “…In order to improve low-altitude flight security of single-rotor helicopter, an experimental model of a helicopter antitorque device is developed for wind tunnel test. …”
    Get full text
    Article
  19. 3199

    Automatic exchange of financial information from the perspective of tax fairness and transparency by Isnaini Isnaini, Joni Emirzon, Ridwan Ridwan

    Published 2024-11-01
    “…Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. …”
    Get full text
    Article
  20. 3200

    A Mislocated Intrauterine Device Migrating to the Urinary Bladder: An Uncommon Complication Leading to Stone Formation by Mohamed Ali Nouioui, Tarek Taktak, Seif Mokadem, Houssem Mediouni, Ramzi Khiari, Samir Ghozzi

    Published 2020-01-01
    “…We report a case of an IUD migrating from its normal position in the uterine cavity into the urinary bladder causing chronic low urinary tract symptoms in a 43-year-old female patient. The device was securely removed without complications using grasping forceps under cystoscopy, and no parietal defect was detected. …”
    Get full text
    Article