Showing 3,601 - 3,620 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3601

    New Locked-Wire-Type External Fixator (the Ichi-Fixator) for Fourth and Fifth Carpometacarpal Joint Dislocation by Satoshi Ichihara, Masao Suzuki, Akira Hara, Toshiya Kudo, Yuichiro Maruyama

    Published 2018-01-01
    “…Linked external wire-type fixation enables enhanced security of fixation, facilitates postoperative mobilization, and may allow an immediate return to work.…”
    Get full text
    Article
  2. 3602

    Fast Antinoise RFID-Aided Medical Care System by Ming-Hour Yang, Jia-Ning Luo

    Published 2015-10-01
    “…We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. …”
    Get full text
    Article
  3. 3603

    Machine Learning-Based Anomaly Prediction for Proactive Monitoring in Data Centers: A Case Study on INFN-CNAF by Andrea Asperti, Gabriele Raciti, Elisabetta Ronchieri, Daniele Cesini

    Published 2025-01-01
    “…Anomaly prediction in time series is crucial for ensuring the stability and security of data centers, especially in scientific contexts such as INFN-CNAF, the National Center for Research and Development in Information and Communication Technology of the National Institute for Nuclear Physics. …”
    Get full text
    Article
  4. 3604

    Development of Accounting Through Automation and Artificial Intelligence by Claudiu BRÂNDAȘ, Ioan MINDA

    Published 2025-01-01
    “…Furthermore, the study underscores the critical need for responsible AI usage, emphasizing the importance of transparency, data security, and compliance with regulatory standards. …”
    Get full text
    Article
  5. 3605

    Review of the application of fgOTN in the interconnection of artificial intelligence data centers by SHI Qingna, WANG Jiaxue, LI Shiyu, CAI Mengru, LIU Xiaodong, YIN Shan, HUANG Shanguo

    Published 2025-01-01
    “…The fine grain optical transport network (fgOTN), which serves as a continuation of synchronous digital hierarchy (SDH) technology and an extension of optical transport network (OTN) technology, is applied in the interconnection of artificial intelligence data centers to meet their multiple requirements for flexible scheduling, efficient transmission, strict security isolation, and low latency. Firstly, the basic concepts, technical architecture, and application scenarios of fgOTN were introduced. …”
    Get full text
    Article
  6. 3606

    Review of Digital Construction of UHV Projects Based on Building Information Modeling Technology by QI Lizhong, LIU Ding, ZHANG Zhuoqun, XIE Rongzhen, RONG Jingguo, ZHANG Su, YUAN Bo, SUN Yi

    Published 2025-02-01
    “…As major national infrastructure projects, UHV projects are key to ensuring power grid security, promoting energy consumption, and optimizing resource allocation. …”
    Get full text
    Article
  7. 3607

    Interpersonal Cognitive Distortions: What is the Role of Childhood Trauma and Attachment? by Meva Demir-Kaya, Feridun Kaya, Yüksel Eroğlu

    Published 2023-10-01
    “…These findings provide evidence that childhood trauma, mediated by anxious attachment, might contribute to interpersonal cognitive distortions in adulthood. However, secure and avoidant attachment had no statistically meaningful direct impact on interpersonal cognitive distortions. …”
    Get full text
    Article
  8. 3608
  9. 3609

    The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare by WRÓBLEWSKI Wojciech, WIŚNIEWSKI Michał

    Published 2024-09-01
    “…Using complementary tools such as process analysis, risk assessment, Petri nets, and Bayesian network in the form of the Critical Infrastructure Security Situational Management methodology, the authors provide a comprehensive solution for modeling how to protect the life and health of the civilian population. …”
    Get full text
    Article
  10. 3610

    A Rising E-Channel Tide Lifts All Boats? The Impact of Manufacturer Multichannel Encroachment on Traditional Selling and Leasing by Wei Yan, Youwei Li, Ying Wu, Mark Palmer

    Published 2016-01-01
    “…With either marketing strategy, the additional expansion of an e-channel territory may secure Pareto gains, in which all members benefit.…”
    Get full text
    Article
  11. 3611

    Bitcoin, Libra and Central Bank Digital Currencies — Elements of a New Monetary System? by Jonas Groß, Bernhard Herz, Jonathan Schiller

    Published 2020-09-01
    “…Central bank digital currencies could be viewed as a public sector response to these private projects to secure central banks’ predominant role in the monetary system of the future.…”
    Get full text
    Article
  12. 3612

    Identifying groundwater potential zones in a typical irrigation district using the geospatial technique and analytic hierarchy process by QianYu Song, Meng Ma, YuYu Liu, ZhongPeng Wang, WenYong Wu, ZhengHe Xu, Jianwen Xue

    Published 2025-12-01
    “…Proper management and utilization of groundwater are essential for ecological balance and food security, especially in agricultural regions. This study delineates Groundwater Potential Zones (GWPZs) in the Heping Irrigation District of Heilongjiang Province using GIS and AHP. …”
    Get full text
    Article
  13. 3613

    Encoding and Decoding of Secret Messages Using Matrices. by Niwagaba, James

    Published 2023
    “…Due to the great need of security for passing sensitive information from one person to another or from one organization to another through electronic technology, there is need for cryptography as a solution to this problem. …”
    Get full text
    Thesis
  14. 3614

    Faith-Based Organizations and Health Empowerment of The Needy in Kitunga Sub-County Ntungamo District. by Tusiime, Cresent

    Published 2024
    “…FBOs have for a long time committedly made positive contributions towards the provision of education, support in agriculture, skills, and health to enhance social welfare but some people in rural areas still have low income, poor health standards, no food security, and limited skills and lack employment due to low levels of education hence poor social welfare. …”
    Get full text
    Thesis
  15. 3615

    A feasibility of land consolidation in kigezi region, south western Uganda: a solution to land fragmentation, land shortage, farmer’s productivity and economic development by George Stanley, Kinyata, Nafiu, Lukman Abiodun

    Published 2022
    “…The article compares the benefits of the land under fragmentation and the land under consolidation systems and recommends strategies to transform Kigezi Region’s informal and subsistence farming system to modern, commercial agriculture to achieve food security and increase incomes of the population and economic development of the area.…”
    Get full text
    Article
  16. 3616

    A critical evaluation of religious syncretism among the Igbo Christians of Nigeria by E.C. Anizoba

    Published 2021-12-01
    “…Besides the belief in ritualistic charms, many Igbo/Igbo-speaking Christians consult diviners for various reasons, including security and prosperity, causes of illness and death, ways of preserving life, as well as to discern the mind of God about one’s future and destiny. …”
    Get full text
    Article
  17. 3617

    Relieve Adversarial Attacks Based on Multimodal Training by Lai Hongjie

    Published 2025-01-01
    “…However, the emergence of adversarial attacks has exposed shortages of neural networks, forcing people to confront their limitations and further increasing concerns about the security of deep learning models. Adversarial training is an effective defense mechanism that incorporates adversarial samples into the training data, enabling models to better detect and resist attacks. …”
    Get full text
    Article
  18. 3618

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…Both methods look different; however, they have similar security goals and they both feature distribution transforming encoders based on statistical schemes. …”
    Get full text
    Article
  19. 3619

    Transformer Inrush Current and Internal Fault Discrimination Using Multitypes of Convolutional Neural Network Techniques by Abedalgany Abedallah Athamneh, Ali Mohammad Alqudah

    Published 2024-01-01
    “…To maintain the security of transformer differential protection, it is essential to restrain its response to oversetting differential current caused by the inrush current or other switching conditions. …”
    Get full text
    Article
  20. 3620

    Improving the Complexity of the Lorenz Dynamics by María Pilar Mareca, Borja Bordel

    Published 2017-01-01
    “…The new system is especially designed to improve the complexity of Lorenz dynamics, which, despite being a paradigm to understand the chaotic dissipative flows, is a very simple example and shows great vulnerability when used in secure communications. Here, we demonstrate the vulnerability of the Lorenz system in a general way. …”
    Get full text
    Article