Showing 3,541 - 3,560 results of 5,943 for search '"securities"', query time: 0.09s Refine Results
  1. 3541

    The Role of Organic Extracts and Inorganic Compounds as Alleviators of Drought Stress in Plants by Pedro Garcia-Caparros, Michele Ciriello, Youssef Rouphael, Maria Giordano

    Published 2025-01-01
    “…Climate changes have exacerbated the progression of drought conditions on a global scalethreating to crop production and heightening concerns over food security. Water scarcity enforces alterations in fundamental morphology, physiology and biochemical traits in crops. …”
    Get full text
    Article
  2. 3542

    Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks by Ammar Alsinai, José Roberto Castilho Piqueira, Waqar Ul Hassan, Azmat Ullah Khan Niazi, Farida Safder

    Published 2025-01-01
    “…Utilizing a constant time headway spacing policy with gap adjustments, we derive control gains that secure internal platoon stability. A Lyapunov-based stability approach is employed to mitigate the destabilizing effects of Byzantine attacks, ensuring robust performance even in adverse conditions. …”
    Get full text
    Article
  3. 3543

    Risk Assessment Method for Offshore Structure Based on Global Sensitivity Analysis by Zou Tao, Li Huajun, Liu Defu

    Published 2012-01-01
    “…The calculation result sufficiently demonstrates the new risk assessment method’s rationality and security.…”
    Get full text
    Article
  4. 3544

    Implementation of Peer-Led Seeking Safety for Women in Jail by Kathryn M. M. Nowotny, Danielle Lee Estes, Krystle Nicole Culbertson, Ladies Empowerment and Action Program

    Published 2025-01-01
    “…We describe several “lessons learned” related to the jail context, including structure and security processes and vicarious and retraumatization experiences among facilitators. …”
    Get full text
    Article
  5. 3545

    Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency by Chen Qiu, Ziang Wu, Haoda Wang, Qinglin Yang, Yu Wang, Chunhua Su

    Published 2025-01-01
    “…To this end, this paper designs a hierarchical federated-learning framework for heterogeneous IoT systems, focusing on enhancing communication efficiency and ensuring data security through lightweight encryption. By leveraging hierarchical aggregation, lightweight stream encryption, and adaptive device participation, the proposed framework provides an efficient and robust solution for federated learning in dynamic and resource-constrained IoT environments. …”
    Get full text
    Article
  6. 3546

    Good governance based on service information system applications administration population via smartphones by Sitna Hajar Malawat, Dewi Merdayanty, Junaidy Junaidy, Syahrial Shaddiq

    Published 2023-12-01
    “…If applied to an application platform that manages population administration services, the principles of Good Governance can secure the smooth running of these services, in line with the needs of the community. …”
    Get full text
    Article
  7. 3547

    Strategies for Implementing Building Operability Certificate to Improve Performance of Building Management: A Case Study in Probolinggo City, Indonesia by Dwi Putranto Riau, null Rulinawaty, Dwi Siswahyudi, null Muhtarom

    Published 2024-01-01
    “…The building operability certificate concerns occupants’ safety before the building is used and is directed by Law Government Regulation 16 of 2021 for building security. This article discusses implementing a building operability certificate underperforming and the strategy for implementing the building operability certificate (SLF) policy. …”
    Get full text
    Article
  8. 3548

    Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network by Weiheng Jiang, Wenjiang Feng

    Published 2015-01-01
    “…The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. …”
    Get full text
    Article
  9. 3549

    Simplified Technique for Sealing Corneal Perforations Using a Fibrin Glue-Assisted Amniotic Membrane Transplant-Plug by Selcuk Kara, Sedat Arikan, Ismail Ersan, Arzu Taskiran Comez

    Published 2014-01-01
    “…An amniotic membrane patch was placed over the plug, which was then secured by a bandage contact lens. Result. Surgery to restore corneal stromal thickness without recurrence of perforation. …”
    Get full text
    Article
  10. 3550

    THE RELATIONSHIP BETWEEN ECONOMIC GROWTH AND MIGRATION IN TERMS OF 14 EUROPEAN UNION COUNTRIES AND TURKEY by Hasan Yavuz, Agnieszka Parlinska

    Published 2022-12-01
    “…The literature on migration is often studied in the economic, political and security fields. This study focuses on the relationship of migration with economic growth. …”
    Get full text
    Article
  11. 3551

    Market Mechanisms as a Social Deadlock for Russian Education by A. M. Osipov

    Published 2019-06-01
    “…Basing on foreign and domestic sources, the author proves that the marketization of education is generated by neo-liberal attitude of the financial and economic elites seeking to reduce state budget expenditures in the social sphere and keep up the disintegration of society and to secure their future domination. The state, the bureaucratic apparatus of the education system, educators’ and researchers’ communities do not take up the problem of education marketization and its consequences. …”
    Get full text
    Article
  12. 3552

    Quantile and interquantile regression models for returns to education by economic sector and vulnerable population in Colombia by Jacobo Campo-Robledo, Cristian Castillo-Robayo, Julimar da silva Bichara

    Published 2024-12-01
    “…Traditional Mincerian socioeconomic variables such as gender, experience, hours worked, marital status, relationship with the head of the household, and social security affiliation, were controlled for. Results show that while there is a positive effect between educational level and income in all economic sectors studied, this relationship varies in magnitude and form along the wage distribution.…”
    Get full text
    Article
  13. 3553

    Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator by Łukasz Matuszewski, Mieczysław Jessa, Jakub Nikonowicz

    Published 2024-12-01
    “…This feature enhances the security of the produced sequences, as eavesdroppers are unable to observe the continuous random bit generation process, such as through monitoring power lines. …”
    Get full text
    Article
  14. 3554

    PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN by Gilang Surya Pratama, Agus Munandar

    Published 2025-01-01
    “…Major implementation challenges include data quality, infrastructure limitations, and data security. Development opportunities are identified in blockchain integration, hybrid models, and preprocessing automation. …”
    Get full text
    Article
  15. 3555

    An Image Encryption Algorithm Based on the Improved Sine-Tent Map by Zijing Gao, Zeyu Liu, Lichan Wang

    Published 2021-01-01
    “…The correlation of the ciphertext image pixels is very low, and the algorithm is highly secure as a conclusion.…”
    Get full text
    Article
  16. 3556

    Enhancing e-government in digital transformation: integrating archive management and digital solutions in Pekanbaru, Indonesia by Khairul Rahman, Dita Fisdian Adni, M Ari Tri Putra Nasution

    Published 2024-08-01
    “…The study's results identified challenges to SRIKANDI implementation, including inadequate technological infrastructure, the need for skilled human resources in information technology, attention to data security, changes in organizational culture, and ongoing technical support. …”
    Get full text
    Article
  17. 3557

    Estimation of Tabriz population based on exponential and logistic growth models for water scarcity analysis by Saeed Imani, Yagob Dinpashoh, Esmaeil Asadi, Ahmad Fakheri Fard

    Published 2024-12-01
    “…In addition, by using this method, it is possible to better plan for the future of this city in terms of water scarcity, water demand and consumption, and water security. The used method can be applied to other cities and regions to predict the population numbers and to assess water scarcity.…”
    Get full text
    Article
  18. 3558

    Stretchable and body conformable electronics for emerging wearable therapies by Benzhao Huang, Qian Wang, Wei Li, Desheng Kong

    Published 2025-01-01
    “…Furthermore, the article delineates the crucial characteristics of wearable therapeutic devices, such as biocompatibility, secure skin attachment, and effective moisture management. …”
    Get full text
    Article
  19. 3559

    THE ETHICAL AND LEGAL ASPECTS OF HEALTH POLICY ON ELECTRONIC MEDICAL RECORDS IN INDONESIA by Ta Larasati, Ahmad Irzal Fardiansyah, Dwi Saketi, Azelia Nusa Dewiarti

    Published 2024-10-01
    “…The use of electronic medical records raises concerns about potential data leaks, necessitating the establishment of security measures and identification of responsible parties in case of breaches. …”
    Get full text
    Article
  20. 3560

    A Method of Intrusion Detection Based on WOA-XGBoost Algorithm by Yan Song, Haowei Li, Panfeng Xu, Dan Liu

    Published 2022-01-01
    “…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
    Get full text
    Article