Showing 3,721 - 3,740 results of 5,943 for search '"securities"', query time: 0.10s Refine Results
  1. 3721

    AFM-DViT: A framework for IoT-driven medical image analysis by Jiacheng Yang

    Published 2025-02-01
    “…The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
    Get full text
    Article
  2. 3722

    Coordinative Discourse of Strategic Sovereignty Tilting the European Union’s Institutional Balance by T. A. Romanova, S. V. Mazanik

    Published 2022-11-01
    “…The article uses the cases of the EU industrial, trade policy, and the common security and defense policy to demonstrate the changing institutional balance.The results of the study show that the main institutional beneficiary of "strategic sovereignty" is the European Commission. …”
    Get full text
    Article
  3. 3723

    A Chromosome level assembly of pomegranate (Punica granatum L.) variety grown in arid environment by Himanshu V. Patankar, Luis F. Rivera, Fatima Omari Alzahrani, Rod A. Wing, Ikram Blilou

    Published 2025-01-01
    “…Pomegranates can tolerate arid climates and are considered among the fruits that will play a major role in food security. However, the genomics resources of pomegranate growing in arid regions are scarce. …”
    Get full text
    Article
  4. 3724

    Ruling the streets: the policing of protest and political violence in Madrid during the Second Republic, 1931-1936 by Sergio Vaquero Martínez

    Published 2025-02-01
    “…The incoherent alternation of both repertoires followed politically motivated criteria and fostered an escalation of violence that increased the number of victims and obstructed the democratisation of the security apparatus. …”
    Get full text
    Article
  5. 3725

    An improved lightweight ConvNeXt for rice classification by Pengtao Lv, Heliang Xu, Qinghui Zhang, Lei Shi, Heng Li, Youyang Chen, Yana Zhang, Dengke Cao, Zhongyang Liu, Yixin Liu, Jingwen Han, Zhan Zhang, Yiran Qi

    Published 2025-01-01
    “…As a major food crop widely grown around the world, the seed type of rice plays a key role in ensuring food security and optimizing agricultural productivity. …”
    Get full text
    Article
  6. 3726

    From forensic chemistry: an educational experience by González Graciela A.

    Published 2024-10-01
    “…In this way, it contributes to generating awareness about safety and security, ethics, and the professional responsibilities of chemists. …”
    Get full text
    Article
  7. 3727

    Linear gate bounds against natural functions for position-verification by Vahid Asadi, Richard Cleve, Eric Culf, Alex May

    Published 2025-01-01
    “…The scheme is feasible for a prover with linear classical resources and $O(1)$ quantum resources, and secure against sub-linear quantum resources.…”
    Get full text
    Article
  8. 3728

    Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks by Prathaban Mookiah, John M. Walsh, Rachel Greenstadt, Kapil R. Dandekar

    Published 2013-10-01
    “…The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.…”
    Get full text
    Article
  9. 3729

    Japan’s Foreign Policy Shifting in 2022 by Khaira Anisa, Juan Miguel Carboni Martínez

    Published 2024-07-01
    “…This article examines Japan's significant foreign policy changes in 2022, focusing on three crucial documents: the National Security Strategy (NSS), the National Defence Strategy (NDS), and the Medium-Term Defence Force Buildup Program (MTDP), issued on December 6, 2022. …”
    Get full text
    Article
  10. 3730

    Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing by Zepei Li, Peng Zheng, Yanjia Tian

    Published 2025-04-01
    “…The framework leverages blockchain technology to ensure data transparency and security, while smart contracts automate exception handling to enhance efficiency. …”
    Get full text
    Article
  11. 3731

    Design of an Uninterrupted Power Supply with Li-Ion Battery Pack: A Proposal for a Cost-Efficient Design with High Protection Features by Thealfaqar A. Abdul-jabbar, Adel A. Obed, Ahmed J. Abid

    Published 2021-06-01
    “…Besides, li-ion batteries require a safe and secure ground to reach the best performance and decrease the explosion risk. …”
    Get full text
    Article
  12. 3732

    Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty by Septyanto Galan Prakoso, Royce Kharisma Agung Wibowo, Nadia Dian Ardita, Ferdian Ahya Al Putra, Retnaningtyas Puspitasari

    Published 2025-01-01
    “…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
    Get full text
    Article
  13. 3733

    Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks by A. M. Balamurugan, A. Sivasubramanian

    Published 2014-01-01
    “…However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). …”
    Get full text
    Article
  14. 3734

    Exploring the relationship between learning emotion and cognitive behaviors in a digital game by Li Chen, Zehui Zhan, Han Chen, Linlin Zheng

    Published 2024-09-01
    “…The study demonstrates that high‐level learners maintained a high level of insightful emotion throughout the game, excelled at constructing strategic formations to control more significant chessboard areas, and preferred to reserve powerful pieces until the end to secure a winning advantage. Conversely, low‐level learners exhibit a predominant level of neutral emotion, especially during unrelated behaviors, and struggle to maintain a strategic overview, focusing instead on smaller, immediate gains, which hamper the application of deeper strategies.…”
    Get full text
    Article
  15. 3735

    Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty by Septyanto Galan Prakoso, Royce Kharisma Agung Wibowo, Nadia Dian Ardita, Ferdian Ahya Al Putra, Retnaningtyas Puspitasari

    Published 2025-01-01
    “…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
    Get full text
    Article
  16. 3736

    Touristic destination image in light of the service dominant logic of marketing by Edar da Silva Añaña, Francisco Antonio dos Anjos, Melise de Lima Pereira

    Published 2018-07-01
    “…Results indicate that values related to self-respect, security and excitement influence the assessment of some TDI components, and that the last four constructs influence the likelihood of individuals to visit or to recommend the destinations.…”
    Get full text
    Article
  17. 3737

    Adaptive Coordinated Variable Speed Limit between Highway Mainline and On-Ramp with Deep Reinforcement Learning by Ming Cheng, Chenghao Zhang, Hui Jin, Ziming Wang, Xiaoguang Yang

    Published 2022-01-01
    “…This research provides insights into the management of highway capacity so as to secure traffic efficiency and reliability for the merging zone.…”
    Get full text
    Article
  18. 3738

    The Rare Coincidence: Nonrecurrent Laryngeal Nerve Pointed by a Zuckerkandl's Tubercle by Emin Gurleyik, Sami Dogan, Omer Gunal, Mevlut Pehlivan

    Published 2012-01-01
    “…Anatomical and embryological variations of the inferior laryngeal nerve (ILN), of the thyroid gland itself and unusual relations between ILN and the gland threaten operation security are discussed. The patient with toxic multinodular goiter is treated with total thyroidectomy. …”
    Get full text
    Article
  19. 3739

    An Analysis of the Social Wellbeing of Youth in Turkey Based on the “2017 Global Youth Wellbeing Index” by Hülya Eker, Esra Burcu

    Published 2023-12-01
    “…The ‘2017 Global Youth Wellbeing Index’ (GYWI) is an international index explaining the social wellbeing status of the youth of different countries in terms of ‘civil participation’, ‘economic opportunities’, ‘education’, ‘health’, ‘information and communication technologies’, ‘safety and security’, and ‘gender equality’. In the current study, the social wellbeing of the youth in Turkey was analyzed on the basis of the data related to the specified domains of this index. …”
    Get full text
    Article
  20. 3740

    Implementation of Static Line Voltage Stability Indices for Improved Static Voltage Stability Margin by Natakorn Thasnas, Apirat Siritaratiwat

    Published 2019-01-01
    “…This paper presents an approach for enhancing the static voltage stability margin and reducing the power losses of the system with voltage security-constrained optimal power flow (VSC-OPF) that is based on static line voltage stability indices. …”
    Get full text
    Article