Showing 3,421 - 3,440 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3421

    Analysis of Digital Image Watermarking Techniques through Hybrid Methods by Mahbuba Begum, Mohammad Shorif Uddin

    Published 2020-01-01
    “…For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by hybridizing different domains, such as spatial and transform domains. …”
    Get full text
    Article
  2. 3422

    EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH by Dragan Gabrić

    Published 2015-11-01
    “… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
    Get full text
    Article
  3. 3423

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. …”
    Get full text
    Article
  4. 3424
  5. 3425

    Le droit du travail et les migrants ruraux : instituer un nouveau salariat en Chine by Muriel Périsse

    Published 2014-06-01
    “…Labour law appears as a solution whose goal is to ensure the viability of this new working class with socially inclusive policies and then institutionalises its economic security. Furthermore, in a context characterised by the socialist legacy and the lack of democracy, we have to question the relations with the law and the State. …”
    Get full text
    Article
  6. 3426

    Disaster Tips for People with Disabilities by Carolyn S. Wilken

    Published 2005-08-01
    “…Departments of Homeland Security and the Federal Emergency Management Agency for people with disabilities. …”
    Get full text
    Article
  7. 3427

    Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks by Minghua Wang, Ran Ou, Yan Wang

    Published 2022-03-01
    “…Large-scale deployment of mobile wireless sensor networks has been widely used in some dangerous and hostile urban security surveillance scenarios. As a new network architecture, software-defined networks was introduced into wireless sensor networks to form a new software-defined wireless sensor networks to solve the problem of balanced large-scale deployment of sensor networks and simplify the complexity of network management. …”
    Get full text
    Article
  8. 3428

    Political Elites as an Object of Coercive Influence in Contemporary World Politics by A. I. Podberezkin, M. V. Kharkevich

    Published 2015-10-01
    “…The assumption then is that the main object of the security and the securitization in world politics is to be political elite. …”
    Get full text
    Article
  9. 3429

    Research and Implementation of SVDU Simulator Based on Emulation Technology by Yanqun Wu, Mingxing Liu, Qi Chen, Xu Zhang, Xufeng Tian, Yu Zhang, Meiyuan Chen

    Published 2021-01-01
    “…With the development of multiple engineering application requirements, such as configuration verification and operator training, this stimulator has been applied in several virtual security level DCS projects.…”
    Get full text
    Article
  10. 3430

    Advances in auxin synthesis, transport, and signaling in rice: implications for stress resilience and crop improvement by Mengmeng Hou, Yuanbo Zhang, Xinyi Xu, Hao Ai

    Published 2025-01-01
    “…By synthesizing these findings, we provide a comprehensive overview of how auxin research informs strategies for developing rice varieties with enhanced adaptability and optimized growth, contributing to food security and sustainable agriculture.…”
    Get full text
    Article
  11. 3431

    ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS by Małgorzata Garstka

    Published 2020-06-01
    “…The accessibility ofinformation is connected with the level of security of engaging in business activities. Makingchanges in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be onesolution for the problem of insufficient information. …”
    Get full text
    Article
  12. 3432

    The Beneficial Role of Polysaccharide Hydrocolloids in Meat Products: A Review by Hanxiao Bao, Yuxi Wang, Yue Huang, Yuhao Zhang, Hongjie Dai

    Published 2025-01-01
    “…Then, the beneficial roles of polysaccharide hydrocolloids in meat products are comprehensively summarized and highlighted, including retarding lipid and protein oxidation, enhancing nutritional properties, improving texture and color quality, providing antibacterial activity, monitoring freshness, acting as a cryoprotectant, improving printability, and ensuring security. Finally, the challenges and opportunities of polysaccharide hydrocolloids in meat products are also introduced.…”
    Get full text
    Article
  13. 3433

    Comparison Between Domestic and Hostile Applications of Wireless Sensor Networks by Salwa El-Morsy

    Published 2022-03-01
    “…This idea has boosted the success rate of different experiments in the fields of health, Finance, Security, etc. where simple factors like temperature, motion, smoke, pressure etc. are used to muster the required data. …”
    Get full text
    Article
  14. 3434

    On Key Evolution over Wireless Channels by Zhihong Liu, Yong Zeng, Pingjuan Zhang, Qiping Huang

    Published 2015-07-01
    “…In this paper, we focus on the problem of developing key agreement schemes for secure communication across wireless channels and propose a key evolution scheme to alleviate the assumption. …”
    Get full text
    Article
  15. 3435

    Stability of password authentication in infocommunication networks by M. N. Bobov, A. V. Kurylovich

    Published 2020-09-01
    “…It is shown that for social networks with a large number of users, widely used assessment of the security of password systems based on the calculation of the determination probability is not sufficient. …”
    Get full text
    Article
  16. 3436

    Facial Recognition Databases: Recent Developments and Review of Methods by Waleed Ayad, Siraj Qays, Asanka G. Perera, Ali Al-Naji

    Published 2023-12-01
    “… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. …”
    Get full text
    Article
  17. 3437

    Human-induced water loss potentially threatens sustainable development of sandy regions in China by Runa A, Xinliang Pan, Liudi Zhu, Kelvin T. F. Chan, Zhangcai Qin, Enliang Guo, Yuhai Bao, Song Qing, Tingwei Cui

    Published 2025-01-01
    “…This depletion potentially threatens both regional sustainability and national ecological security. This study calls for urgent scientific regulations on water resources, including strict control of local consumption and enhancement of supply capacity.…”
    Get full text
    Article
  18. 3438

    Living the liquid life: Gender, precarity, and journalism in the post-#metoo era by Melin Margareta, Wiik Jenny

    Published 2024-09-01
    “…Increasing demands for flexibility have institutionalised temporary contracts, eroded job security, and expanded job precarity, with women and young journalists disproportionately affected. …”
    Get full text
    Article
  19. 3439

    Green actions for innovative cities. The new agri-food landscape by Emanuele Sommariva, Nicola Valentino Canessa, Giorgia Tucci

    Published 2022-06-01
    “…Specifically, urban agriculture and community gardens play an important role, helping to secure various socio-ecological benefits on a local basis and to promote access to healthy, Zero Km sources. …”
    Get full text
    Article
  20. 3440

    Spanish refugees in Portugal and the Portuguese solidarity (1936-1945) by Fábio A. Faria

    Published 2024-12-01
    “…Due to its authoritarian nature, Salazar´s regime proved reluctant to receive them and developed a repression directed at these refugees, considered “undesirable,” visible in the increase of the number of border posts and their reinforcement and in the collaboration between different authorities, namely PVDE (State Surveillance and Defense Police), GNR (Republican National Guard), PSP (Public Security Police) and GF (Fiscal Guard), leading to their concentration in large national prisons. …”
    Get full text
    Article