Showing 3,401 - 3,420 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3401

    Cugoano on Redressing Slavery: The Demands of Liberty by Iziah C Topete

    Published 2025-01-01
    “…Cugoano envisioned legal redress to necessitate that all Afro-diasporic laborers be enfranchised, securing the conditions for a free community. By examining his vision for liberation, the article reconstructs Cugoano’s idea of liberty as a social and common good. …”
    Get full text
    Article
  2. 3402

    From Travel to Text: Reverends Wolff and Lansdell’s Missions to Bokhara by Irina Kantarbaeva-Bill

    Published 2024-03-01
    “…My paper will examine the strategies Wolff and Lansdell employed in writing their journeys to Central Asian sensitive border regions under the imperial security constraints of the moment. Their failure of self-censorship in fact erupts in concealed messages to certain sections of Victorian readership able to read between the lines, revealing the undisclosed and unsaid.…”
    Get full text
    Article
  3. 3403
  4. 3404

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
    Get full text
    Article
  5. 3405

    Identity, imaginary and tourism in the tuareg region, in Niger by Emmanuel Grégoire, Marko Scholze

    Published 2012-12-01
    “…Finally, the authors consider the decline of tourism, as a result of the 2007-2009 rebellion, and the presence in the neighboring Northern Mali of the Salafist brigade Al Qaeda in the Islamic Maghreb (AQIM), which prohibits access to the region to foreigners for security reasons.The brutal halt in the tourist activity came with the decline of the Tuareg subculture that had been forged through their entrepreneurial dedication to tourism.…”
    Get full text
    Article
  6. 3406

    Le nouveau Xinjiang : intégration et recompositions territoriales d’une périphérie chinoise by Alain Cariou

    Published 2009-06-01
    “…That’s the reason why central government take active measures for an acceleration of the economic development in the region with the aim of promoting regional security, cultural and économic integration. Nowadays, an unprecedent change taken place in Xinjiang with the improvements in transportation infrastructure. …”
    Get full text
    Article
  7. 3407

    Colonial and Postcolonial Logistics by Giulia Scotto

    Published 2018-11-01
    “…The analysis of infrastructure development in postcolonial Zambia illustrates the competing strategies through which imperialist powers attempted to secure a new form of control on Africa and elucidates the role of logistics as a decisive tool to shape the African territory.…”
    Get full text
    Article
  8. 3408

    Big Data with Cloud Computing: Discussions and Challenges by Amanpreet Kaur Sandhu

    Published 2022-03-01
    “…Various research challenges are defined in terms of distributed database storage, data security, heterogeneity, and data visualization.…”
    Get full text
    Article
  9. 3409

    Southern Madagascar, polycrisis and project failures: A scoping review. by Léo Delpy, Claire Gondard Delcroix, Maxime Galon, Benoît Lallau, Isabelle Droy

    Published 2024-01-01
    “…The southern region of Madagascar experiences a series of crises related to agro-climatic, nutritional, security, institutional, and political conditions despite the presence of numerous development aid projects over several decades. …”
    Get full text
    Article
  10. 3410

    Les Indiens d’Antananarivo, des citadins comme les autres ? by Catherine Fournet-Guérin

    Published 2024-03-01
    “…However, precisely because of their dominant social position, Indians are characterised by mobility practices that are constrained by security concerns, and express a strong sense of spatial vulnerability. …”
    Get full text
    Article
  11. 3411

    Quels espaces scolaires pour le bien-être relationnel ? Enquête sur le ressenti des collégiens français by Thibaut Hébert, Éric Dugas

    Published 2017-02-01
    “…In other words, what spatial modifications could be thought out in order to guarantee a feeling of security and pupils’ well-being. The results show that spaces which are not under surveillance are seen as risky by secondary school children (n =544). …”
    Get full text
    Article
  12. 3412

    Genome Editing: A Promising Approach for Achieving Abiotic Stress Tolerance in Plants by Navdeep Kaur, Shubham Sharma, Mirza Hasanuzzaman, Pratap Kumar Pati

    Published 2022-01-01
    “…The susceptibility of crop plants towards abiotic stresses is highly threatening to assure global food security as it results in almost 50% annual yield loss. …”
    Get full text
    Article
  13. 3413

    An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks by Wei Yuan

    Published 2014-01-01
    “…Different from previous anonymous secure routing protocols, this paper proposes an anonymous routing protocol, ARAKE, which not only makes the sender and the receiver anonymous but also hides the intermediate nodes from the network simultaneously. …”
    Get full text
    Article
  14. 3414
  15. 3415

    Three-Dimensional Human Modeling Applications in Sport Sciences by Mehmet İmamoğlu, Osman İmamoğlu

    Published 2018-08-01
    “…Virtual objects, which are transferred to virtual environments by a designer or a design team using various software, has been used many important areas such as health, security, education and sports which are using computer technology. …”
    Get full text
    Article
  16. 3416
  17. 3417

    Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos by Jian Wang

    Published 2016-01-01
    “…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
    Get full text
    Article
  18. 3418

    Omilayers: a Python package for efficient data management to support multi-omic analysis by Dimitrios Kioroglou

    Published 2025-02-01
    “…Conducting an effective analysis of these datasets necessitates a data management system that meets a specific set of requirements, such as rapid storage and retrieval of data with varying numbers of features and mixed data-types, ensurance of reliable and secure database transactions, extension of stored data row and column-wise and facilitation of data distribution. …”
    Get full text
    Article
  19. 3419

    ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS by Małgorzata Garstka

    Published 2022-06-01
    “…The accessibility of information is connected with the level of security of engaging in business activities. Making changes in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be one solution for the problem of insufficient information. …”
    Get full text
    Article
  20. 3420

    Pouvoir et opposition en Algérie : vers une transition prolongée ? by Louisa Dris-Aït Hamadouche, Yahia H. Zoubir

    Published 2009-11-01
    “…Radical Islamism and the eruption of terrorist violence have offered the governing elite an opportunity to renege on the progress that had been made. In the name of security, the opposition’s room for maneuver has been largely reduced. …”
    Get full text
    Article