Showing 3,441 - 3,460 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3441

    Barriers and Enablers of AI Adoption in Human Resource Management: A Critical Analysis of Organizational and Technological Factors by Mitra Madanchian, Hamed Taherdoost

    Published 2025-01-01
    “…Change aversion, data security worries, and integration expenses are major roadblocks, but strong digital leadership, company culture, and advancements in NLP and machine learning are key enablers. …”
    Get full text
    Article
  2. 3442

    Toward Safer E-Commerce Transactions: The Influence of System Quality, Information Accuracy, and Government Oversight by Megawati SIMANJUNTAK, Anna MARIA TRI ANGGRAINI

    Published 2024-12-01
    “…To improve public knowledge about transaction security in e-commerce, thorough socialization and education are needed, targeting all parties involved in online transactions, including marketplaces, payment providers, and delivery services. …”
    Get full text
    Article
  3. 3443

    Extensive Surgical Emphysema in a Child after Primary Closure of Tracheocutaneous Fistula by R. Gurung, B. M. Shakya, H. Dutta

    Published 2020-01-01
    “…We gave him oxygen supplementation, removed surgical stitch, and inserted a 4 mm tracheostomy tube to secure airway. Chest X-ray ruled out pneumothorax or pneumomediastinum. …”
    Get full text
    Article
  4. 3444

    A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features by P. Amudha, S. Karthik, S. Sivakumari

    Published 2015-01-01
    “…Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. …”
    Get full text
    Article
  5. 3445

    Leaking Network Devices with Rubber Ducky Attack by Zeynep Rana Donmez, Şeyma Atmaca, Yıldıray YALMAN

    Published 2024-12-01
    “…By placing the module in a device connected to the target network, a network scan was performed to determine the security status, IP addresses, port information, and version information of all devices. …”
    Get full text
    Article
  6. 3446

    Participation of Citizens in Pre-Trial Hearings. Review of an Experiment in the Netherlands by Barbara Brink, Albert T. Marseille

    Published 2014-10-01
    “…In 2011 the Dutch Central Appeals Tribunal, the highest Dutch court of appeal in legal areas pertaining to social security and the civil service, started consulting the parties of a dispute at an early stage in the procedure, in order to include them in the decisions about the procedural steps to be taken in the settlement of the appeal. …”
    Get full text
    Article
  7. 3447

    Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations by Marzieh Faridi Masouleh, Ali Harounabadi, Asal Sayyad

    Published 2022-03-01
    “…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
    Get full text
    Article
  8. 3448

    Design of Fully Automatic Drone Parachute System with Temperature Compensation Mechanism for Civilian and Military Applications by Basem AL-Madani, Marius Svirskis, Gintautas Narvydas, Rytis Maskeliūnas, Robertas Damaševičius

    Published 2018-01-01
    “…Due to high cost of top-end drones and requirements for secure landing, development of reliable drone recovery systems is a hot topic now. …”
    Get full text
    Article
  9. 3449

    Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service by Jiaxing Qu, Guoyin Zhang, Zhou Fang

    Published 2017-01-01
    “…In this paper, we design a Prophet framework, which provides an effective security scheme for users sharing their location information. …”
    Get full text
    Article
  10. 3450

    Navigating the landscape of remote patient monitoring in Canada: trends, challenges, and future directions by Khayreddine Bouabida, Khayreddine Bouabida, Khayreddine Bouabida, Khayreddine Bouabida, Breitner Gomes Chaves, Enoch Anane, Navaal Jagram

    Published 2025-02-01
    “…We explore the regulatory, technical, and operational challenges that RPM faces, including critical issues around data privacy, security, and interoperability, factors essential for sustainable integration. …”
    Get full text
    Article
  11. 3451

    The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food by Soohyoun Ahn, Keith R. Schneider, Michelle D. Danyluk, Renee Goodrich-Schneider

    Published 2014-09-01
    “…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
    Get full text
    Article
  12. 3452

    Parish revival in Southern Russia in the context of revolutionary upheavals and the Civil War by Yu. A. Biryukova

    Published 2023-09-01
    “…Its functions were to be extended to the level of a grass-roots zemstvo, to ensure the legal and economic security of the parishioners, and to influence the surrounding society.…”
    Get full text
    Article
  13. 3453

    Discharge against Medical Advice in Surgical Patients with Posttraumatic Stress Disorder: A Case Report Series Illustrating Unique Challenges by Marek Brzezinski, Maren Gregersen, Luiz Gustavo Schuch, Ricarda Sawatzki, Joy W. Chen, Grant Gauger, Jasleen Kukreja, Brian Cason

    Published 2017-01-01
    “…In all three subjects, the stress of feeling misunderstood by clinicians and the distress of public detainment by hospital security in the setting of chronic PTSD led to aggressive and risky behavior. …”
    Get full text
    Article
  14. 3454

    Industry 4.0: digital twins characteristics, applications, and challenges in-built environments by Heni Zribi, Taycir Ben Abid, Abdelkarim Elloumi, Yasmina Hani, Besma Bechir Graba, Aderrahman Elmhamedi

    Published 2025-12-01
    “…Despite these potential benefits, several challenges prevent the widespread adoption of DT technology such as data security and ownership concerns, the lack of common data standards and interoperability, and difficulties in managing diverse source systems.…”
    Get full text
    Article
  15. 3455

    NOISE A FAVORITE FACTOR IN THE INDUSTRIAL WORK ENVIRONMENT by Vergilică HARALAMBIE, Oana Roxana CHIVU, Claudia BORDA, Dan NITOI, Marilena GHEORGHE, Villi PASARE, Marinela MARINESCU, Larisa BUTU, Ioana - Cătălina ENACHE

    Published 2023-05-01
    “…After the implementation of the measures at the organization level, the increase in the level of security and the decrease in the level of risk will result. …”
    Get full text
    Article
  16. 3456

    Anesthetic Management for Emergent Repair of Tracheoinnominate Fistula by Vinayak Nadar, Ratan K. Banik

    Published 2020-01-01
    “…The tracheostomy tube was then removed over a Cook catheter to maintain secure passage in case of airway collapse. The oral endotracheal tube was then inserted distal to the arterial and tracheal defect. …”
    Get full text
    Article
  17. 3457

    Morphological and molecular characterization of Stenocranus pacificus (Hemiptera: Delphacidae) on maize plants by Anivea Fachmi, Dita Megasari, Ramadhani Mahendra Kusuma

    Published 2024-11-01
    “…Additionally, maize contributes to food diversification and security. One of the main threats to maize production is pest attacks, including Stenocranus pacificus and Peregrinus maidis. …”
    Get full text
    Article
  18. 3458

    Review on Cement Stabilization/Solidification of Municipal Solid Waste Incineration Fly Ash by Chengcheng Fan, Baomin Wang, Tingting Zhang

    Published 2018-01-01
    “…Municipal solid waste incineration (MSWI) fly ash must be treated properly prior to being disposed in the security landfill due to its serious pollution toxicity. …”
    Get full text
    Article
  19. 3459

    Optimizarea generării de itinerarii pentru ghizi turistici autonomi prin integrarea datelor în timp real în algoritmi genetici by Cristian SANDU, Luminița DUMITRIU, Ioan ȘUȘNEA

    Published 2024-12-01
    “…Research in the field of autonomous vehicles has made good progress in the last years, but mass adoption is unlikely to happen very soon due to, in most part, important ethical and security concerns. The authors consider that niche uses of autonomous vehicles are more likely to be researched and developed, since they can substantially make an immediate difference in specific applications. …”
    Get full text
    Article
  20. 3460

    Distributed Power Trading System Based on Blockchain Technology by Shuguo Chen, Weibin Ding, Zhongzheng Xiang, Yuanyuan Liu

    Published 2021-01-01
    “…The traditional centralized power trading model has some problems, such as low data security and trust crisis of regulators. Blockchain technology provides prominent ideas for solving these problems. …”
    Get full text
    Article