Showing 3,481 - 3,500 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 3481

    Why Aceh-Indonesia Conflict Resolution can’t be Copy-Paste in Bangsamoro-Philippines Issue? by Sidik Jatmika, Nanang Sumanang, Ajeng Puspa Marlinda, Chalilla Raihan Nabilazka, Muhammad Indrawan Jatmika

    Published 2022-06-01
    “…The main objective is to identify similarities rational choice (survival, security, economy/welfare, prestige, and influence) especially how political elites would still feel enjoy to conduct those agreements in both regions. …”
    Get full text
    Article
  2. 3482

    Labor Issues that the H2A Temporary Agricultural Worker Policy Attempts to Resolve in Florida by Jonathan C. Stephens, John Lai, Bachir Kassas

    Published 2024-03-01
    “…We rely on food, fiber, and natural resources, and effective agricultural labor is a critical social need, but the challenges inherent in the effort to secure agricultural labor are many and difficult to solve. …”
    Get full text
    Article
  3. 3483

    Perspectives of Turkish foreign policy based on analysis of Romanian documents by Ionuț Cojocaru

    Published 2024-09-01
    “…The Treaty of Lausanne and then the Treaty of Montreux were vital – in the first – for the security of the new Turkish state, but also for the states bordering the Black Sea. …”
    Get full text
    Article
  4. 3484
  5. 3485

    Two decades of research capacity strengthening and reciprocal learning on sexual and reproductive health in East Africa – a point of (no) return by Caroline Frisendahl, Emelie Looft-Trägårdh, Amanda Cleeve, Susan Atuhairwe, Elin C. Larsson, Othman Kakaire, Herbert Kayiga, Annette Aronsson, Anne Kihara, Marleen Temmerman, Marie Klingberg Allvin, Josaphat Byamugisha, Kristina Gemzell Danielsson

    Published 2024-12-01
    “…As the world is facing challenges such as pandemics, climate change, conflicts, and changing political landscapes, the need to secure access to safe and high-quality abortion care is more urgent than ever. …”
    Get full text
    Article
  6. 3486

    How Does Nursing Staff Perceive the Use of Electronic Handover Reports? A Questionnaire-Based Study by Torbjørg Meum, Gro Wangensteen, Karen S. Soleng, Rolf Wynn

    Published 2011-01-01
    “…A web-based anonymous and secure questionnaire was distributed by e-mail to all nursing staff at a psychogeriatric ward at a university hospital. …”
    Get full text
    Article
  7. 3487

    Espaces de l’insécurité : réalités territoriales et réponses locales à la délinquance by Igor Lefèvre

    Published 2014-07-01
    “…It thus questioned the relevance of the résidentialist paradigm (that is to say, the assumption of a crime would depend in form and intensity of urban, sociological , economic and demographic patterns and trends) and its impact on work organization and missions of law enforcement forces, but also all the local actors involved in security policy and crime prevention. At the level of Midi-Pyrénées, this contribution will give synthetically to know which transformations frameworks and patterns of public policies could emerge in the decade 2000-2010, in different situations, but all with a common element: the need to respond to situations perceived by local actors as risky or dangerous for the safety of citizens.…”
    Get full text
    Article
  8. 3488

    Environmental Taxation: New Evidence for Energy Taxes by Maja Grdinić, Maja Klun, Žiga Kotnik

    Published 2015-12-01
    “…Various economic instruments, including taxation, may help policy makers in the EU meet environmental targets, among them a more secure and competitive green economy in Europe. The focus of this paper is on empirically investigating the direct effect of environmental taxes and the indirect effect of environmental expenditures sourced from environmental taxes on greenhouse gas (GHG) emissions in the energy sector. …”
    Get full text
    Article
  9. 3489

    An Overview of Global Wheat Market Fundamentals in an Era of Climate Concerns by Aliakbar Enghiad, Danielle Ufer, Amanda M. Countryman, Dawn D. Thilmany

    Published 2017-01-01
    “…In addition to gradually and consistently increasing global wheat demand, these market drivers are posited to impact world prices and, ultimately, food security. To investigate how these factors differentially influence wheat markets, an extensive survey of literature regarding wheat market fundamentals was conducted, as well as a trend analysis using a uniquely compiled data set specific to significant wheat-producing areas. …”
    Get full text
    Article
  10. 3490

    Self-Adaptive Firefly-Algorithm-Based Unified Power Flow Controller Placement with Single Objectives by Selvarasu Ranganathan, S. Rajkumar

    Published 2021-01-01
    “…The selection of positions for unified power flow controller (UPFC) placement in transmission network is an essential factor, which aids in operating the system in a more reliable and secured manner. This paper focuses on strengthening the power system performance through UPFC placement employing self-adaptive firefly algorithm (SAFA), which selects the best positions along with parameters for UPFC placement. …”
    Get full text
    Article
  11. 3491

    Multiscale Structural Health Monitoring of Cable-Anchorage System Using Piezoelectric PZT Sensors by Khac-Duy Nguyen, Jeong-Tae Kim, Young-Hwan Park

    Published 2013-11-01
    “…Structural health monitoring of the cable-anchorage system is very important to secure the integrity of the cable-stayed bridge. The cable-anchorage system carries most of the self-weight, so that any damage in the system may significantly reduce the load carrying capacity of the bridge. …”
    Get full text
    Article
  12. 3492

    Signal Processing Techniques for Through-Wall Object Imaging Using UWB Antipodal Vivaldi Antenna by Sajjad Ahmed, Arslan Ahmed Sohoo, Fawad Salam Khan, Imran Khan Keerio, Sarfraz Ahmed

    Published 2024-12-01
    “…Through-wall imaging (TWI) is a critical application in various domains, including security, surveillance, search and rescue, and structural assessment. …”
    Get full text
    Article
  13. 3493

    Video Multiple Watermarking Technique Based on Image Interlacing Using DWT by Mohamed M. Ibrahim, Neamat S. Abdel Kader, M. Zorkany

    Published 2014-01-01
    “…Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. …”
    Get full text
    Article
  14. 3494

    Newly Licensed RNs Describe What They Like Best about Being a Nurse by Maja Djukic, Linda H. Pellico, Christine T. Kovner, Carol S. Brewer

    Published 2011-01-01
    “…Five themes emerged: “providing holistic patient care,” “having an autonomous and collaborative practice,” “using diverse knowledge and skills to impact patient outcomes,” “receiving recognition,” and “having a job that is secure and stimulating.” Strategies are discussed that organizations might employ in helping NLRNs to realize what they best like about their work, which might lead to improved retention rates.…”
    Get full text
    Article
  15. 3495

    Research on the Heat Dissipation Characteristics of Lithium Battery Spatial Layout in an AUV by Zhaoyong Mao, Shaokun Yan

    Published 2016-01-01
    “…The lithium battery heat dissipation properties not only affect the underwater vehicle performance but also bring some security risks. Based on the widespread application of lithium batteries, lithium batteries in an AUV are taken as an example to investigate the heat dissipation characteristics of the lithium battery spatial layout in an AUV. …”
    Get full text
    Article
  16. 3496

    Support Vector Machine for Behavior-Based Driver Identification System by Huihuan Qian, Yongsheng Ou, Xinyu Wu, Xiaoning Meng, Yangsheng Xu

    Published 2010-01-01
    “…Since human driving behaviors belong to a dynamic biometrical feature which is complex and difficult to imitate compared with static features such as passwords and fingerprints, we find that this novel idea of utilizing human dynamic features for enhanced security application is more effective. In this paper, we first describe our experimental platform for collecting and modeling human driving behaviors. …”
    Get full text
    Article
  17. 3497

    Possibilities in Blockchain technology application by Bačević Jelena

    Published 2023-01-01
    “…The paper represents a comprehensive review of possibilities in Blockchain technology application in contemporary business environment, its benefits and shortcomings as well as security problems appearing in theory and practice. …”
    Get full text
    Article
  18. 3498

    Nano colonies: Rearing honey bee queens and their offspring in small laboratory arenas by Zachary S. Lamas, Serhat Solmaz, Cory Stevens, Jason Bragg, Eugene V. Ryabov, Shayne Madella, Miguel Corona, Jay D. Evans

    Published 2025-01-01
    “…The process creates a bridge between field research and laboratory trials and provides a secure system for contagious or regulated elements while maintaining many of the intrinsic characteristics of a honey bee colony.…”
    Get full text
    Article
  19. 3499

    Jurisprudential Welfare Through the Transformation of the “Rendang-Mu” Qurban Meat Management System by Mardiyan Hayati, Mamdukh Budiman, Mirza Mahbub Wijaya, Mowafg Masuwd

    Published 2024-12-01
    “…The findings indicate that the Rendang-Mu Program represents a transformation in the pattern of meat management and distribution, implementing a system of qurban meat management through canning and packaging with three essential benefits that facilitate and enhance its utility: (1) prolonged consumption and distribution over an extended period, (2) practical, delicious, and nutritious, (3) more evenly distributed reach, (4) high flexibility in achieving community food security, and (5) compliance with Islamic law.…”
    Get full text
    Article
  20. 3500

    Indigenous Identity in the Global Sustainable Project by Yusril Ihza Mahendra, Eduardus Andhika Kurniawan, Balya Arung Segara

    Published 2025-02-01
    “…Developing countries can secure funding from developed countries to preserve their forests. …”
    Get full text
    Article