Showing 3,361 - 3,380 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3361

    Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT by Di Fan, Wenxue Sun, Huiyuan Zhao, Wenshuo Kang, Changzhi Lv

    Published 2022-01-01
    “…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
    Get full text
    Article
  2. 3362

    IMPACT OF THE WHISTLEBLOWING POLICY IN THE FIGHT AGAINST CORRUPTION IN NIGERIA by NIMCHAK NANSAK EMMANUEL, MOSES DANJUMA BOT

    Published 2023-12-01
    “…This work, therefore, recommends, among other things, that the whistle blowers should be given adequate legal and security protection and adequate public awareness be embarked upon to educate the people of the need to expose corrupt individuals. …”
    Get full text
    Article
  3. 3363

    Genes for editing to improve economic traits in aquaculture fish species by Zituo Yang, Guihong Fu, May Lee, Shadame Yeo, Gen Hua Yue

    Published 2025-01-01
    “…Aquaculture, a critical sector for global food security, faces the challenge of meeting growing demand while protecting wild fish populations. …”
    Get full text
    Article
  4. 3364

    Les échos de la presse dans le silence du cabinet. La posture médiatique flaubertienne à la lumière de la correspondance by Nejma Omari

    Published 2021-06-01
    “…While Flaubert’s financial security exempted him from the daily publications that contemporary writers-journalists had to produce, it did not necessarily means disinterest. …”
    Get full text
    Article
  5. 3365

    Permanent pacemaker implantation. Access to the apex of the right ventricle using fluoroscopy only at the last moment by Cynthia Torres Acosta

    Published 2021-12-01
    “…Although it is not currently practiced, during the stage that it was applied in the hospital, it provided security to patients and health personnel, so its use should be resumed.…”
    Get full text
    Article
  6. 3366

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. …”
    Get full text
    Article
  7. 3367

    The Correlation Between External and Internal Factors of the Libyan Crisis by E. N. Koposova

    Published 2015-10-01
    “…The importance of this region is determined by its geopolitical position, concentration of large natural resources, as well as the fact that it represents the greatest threat to the international security - the bases of terrorist organizations, the strengthening role of the group "Islamic State", drug trafficking and the proliferation of weapons of mass destruction (WMD). …”
    Get full text
    Article
  8. 3368

    Who calls the shots in Naomi's life? Reading the Naomi-Ruth story within the African religio-cultural context

    Published 2016-12-01
    “…Such a worldview, in which the Sacred Other, the living and the (living) dead formed an integral whole, can also be observed at critical points in Naomi’s life: when Naomi bid farewell to her daughters-in-law (Rt 1:8-9); Naomi’s confession about Yahweh’s faithfulness to both the living and the dead (Rt 2:20); Naomi’s plan to seek security for Ruth through “levirate” marriage (Rt 3:1), and when she acted as a nurse to Mahlon’s son (Rt 4:5, 16). …”
    Get full text
    Article
  9. 3369

    Analysis of the Thermal Characteristics of Surrounding Rock in Deep Underground Space by Liu Chen, Jiangbo Li, Fei Han, Yu Zhang, Lang Liu, Bo Zhang

    Published 2019-01-01
    “…With the development of society, the economy, and national security, the exploitation of deep underground space has become an inevitable trend in human society. …”
    Get full text
    Article
  10. 3370

    Machine Learning Applications based on SVM Classification A Review by Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
    Get full text
    Article
  11. 3371

    Main street retail districts or shopping centers? comparing the preferences of low-income consumers by Juracy Parente, Marcelo Moll Brandão, Ana Paula Miotto, Flávia Plutarco

    Published 2012-01-01
    “…While shopping malls received better evaluation on environment, infrastructure, variety of stores and security, the street districts were judged to be better regarding access and value. …”
    Get full text
    Article
  12. 3372

    An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks by Chen-Yang Cheng, Iuon-Chang Lin, Shu-Yan Huang

    Published 2015-09-01
    “…Furthermore, our scheme provides enough scalability and security. The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.…”
    Get full text
    Article
  13. 3373

    Electronic Records Management Practices and Academic Performance of Higher Institutions of Learning: A Case Study of Kabale University. by Tukahirwa, Elizabeth

    Published 2024
    “…The findings revealed a reliance on mass storage devices for data accumulation and a strong emphasis on security and privacy measures by the university. However, inefficiencies were noted due to limited system integration. …”
    Get full text
    Thesis
  14. 3374

    Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children by Meredith B. Haag, Catlin H. Dennis, Steven McGaughey, Tess A. Gilbert, Susan DeFrancesco, Adrienne R. Gallardo, Benjamin D. Hoffman, Kathleen F. Carlson

    Published 2024-11-01
    “…Our results suggest that rapid-access devices may be the most preferable firearm storage devices for distribution by secure storage programs, and costs are likely minimal given parental/caregiver willingness to pay.…”
    Get full text
    Article
  15. 3375

    Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing by Fahmi Fachri

    Published 2023-02-01
    “…Penetration testing is defined as an official attempt to exploit the system with the aim of finding weaknesses in the web server and improving system security. This penetration test is carried out on a web server which is an Academic Information System at a university. …”
    Get full text
    Article
  16. 3376

    Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum by Muhammad Fajar Sidiq, Akbari Indra Basuki, Halim Firdaus, Muhammad Aldi Baihaqi

    Published 2020-12-01
    “…The existing researches are unable to provide a secure, centralized monitoring system that satisfies three security aspects, namely: availability, integrity, and confidentiality. …”
    Get full text
    Article
  17. 3377
  18. 3378
  19. 3379

    Evaluation of Ecosystem Services and Tradeoff and Synergy in the Alpine and Canyon Region of Southwest China Based on Multi-source Geographic Data by LIU Jing, XIANG Jiayi, ZHANG Donghai, LAN Mengyao, GUAN Yinghui

    Published 2024-12-01
    “…[Objective] The alpine and canyon region of Southwest China is a crucial ecological security barrier within the national “Three Zones and Four Belts” strategy, and it plays an essential role in ensuring national ecological security and promoting regional high-quality development. …”
    Get full text
    Article
  20. 3380

    Closed-loop systems for plants expressing animal proteins: a modernized framework to safeguard the future of agricultural innovation by Kristin A. Bresnahan, Justin M. Ferber, J. Thomas Carrato, Thomas J. Stoddard, Patrick V. Palad, Magi Richani

    Published 2025-01-01
    “…By implementing these rigorous systems, the PMF industry can realize its potential to contribute significantly to sustainable agriculture and food security.…”
    Get full text
    Article