Showing 3,761 - 3,780 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3761

    COPING UP WITH CLIMATE CHANGE: A Case Study of a Banten Muslim Community by Al Chaidar Abdurrahman Puteh, Herdi Sahrasad, Satrio Dwicahyo Rahadi

    Published 2024-07-01
    “…The article argues that the farmers' resilience and agency are crucial for ensuring food security and livelihoods in the face of climate change. …”
    Get full text
    Article
  2. 3762

    Shock and adaption: The economic impact of COVID-19 in the Mentawai Islands, West Sumatra, Indonesia by Setiawati Sri, Yonariza Yonariza, Pal Indrajit, Priyono Eko, Agustinus Agustinus, Tasirikeru Aron

    Published 2025-01-01
    “…People responded to the lower-income by intensifying their involvement in the agricultural and fishery sectors to meet their food security needs. This study highlights the importance of strengthening access to local resources to cope with disasters in the island’s region.…”
    Get full text
    Article
  3. 3763

    Buzzing Guardians Buzzing Guardians: Protecting Pollinators in Agricultural Landscapes by Hunasikote Shamappa Venu, Amala Udayakumar, A.N. Shylesha, Timalapur M. Shivalingaswamy

    Published 2024-11-01
    “…By acclimatizing an integrated, collaborative and convincing approach for pollinator conservation, we can assure and predict the sustainability and productivity of ecosystem, that eventually supports biodiversity and food security. …”
    Get full text
    Article
  4. 3764

    A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks by Jianhua Liu, Guangxue Yue, Shigen Shen, Huiliang Shang, Hongjie Li

    Published 2014-01-01
    “…It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security.…”
    Get full text
    Article
  5. 3765

    The Conflict in Mali: Causes, Actors, and Challenges by Wardah Shahid

    Published 2025-01-01
    “…This essay examines the interconnected roles of local, regional, and international stakeholders in perpetuating the conflict, highlighting the need for a multifaceted approach to address root causes, rebuild governance, and foster sustainable peace through coordinated humanitarian, security, and developmental efforts. …”
    Get full text
    Article
  6. 3766

    Design and Performance of Solar PV Integrated Domestic Vapor Absorption Refrigeration System by Divya Arputham Selvaraj, Kirubakaran Victor

    Published 2021-01-01
    “…This technology might sound like a luxury on the surface, but they are in high demand to achieve food security. They can also help lifesaving vaccines to reach even the isolated parts of the world. …”
    Get full text
    Article
  7. 3767

    Development and Validation of the Interpreting Learning Engagement Scale (ILES) by Wenting Yu, Chenggang Wu

    Published 2024-12-01
    “…Additionally, the scale’s scores showed a significant correlation with grit, securing the external validity of the ILES. This study not only contributes a validated instrument for assessing student engagement in interpreting learning but also provides implications for promoting engagement through potential interventions, with the ultimate aim of achieving high levels of interpreting competence.…”
    Get full text
    Article
  8. 3768

    East and West: global technological confrontation by S. S. Belikova, A. V. Belikov

    Published 2023-10-01
    “…As China’s economy grows and its technological capabilities expand, the USA is increasingly concerned about the consequences of China’s rapid technological growth for national security, economic competitiveness and for global dominance of the USA. …”
    Get full text
    Article
  9. 3769

    Comparative Analysis of Nextcloud and Owncloud Performance as Infrastructure as a Service (IaaS) Based Cloud Storage by Prita Haryani, Renna Yanwastika Ariyana, Iqbal Abdul Majid, Fx. Guntur Putra Susanto

    Published 2024-12-01
    “…Numerous cloud storage applications now feature advanced functionalities; however, each cloud storage company varies regarding access speed, storage capacity, security, and costs. This study aims to analyze the performance of two cloud storage applications, Nextcloud and Owncloud, using throughput as a parameter. …”
    Get full text
    Article
  10. 3770

    Analysis of renewable energy potential in the Asia-Europe geographical axis by Alexandru Marius Tătar

    Published 2023-12-01
    “…It also investigated the opportunities associated with renewable energy sources, such as energy security. …”
    Get full text
    Article
  11. 3771

    Britain’s Safety Arguments: French Nuclear Testing in Algeria duringNigerian Decolonisation (1959-60) by Chloë Mayoux

    Published 2024-10-01
    “…In 1959, as African anti-nuclear sentiment grew, Britain suddenly faced the unique situation of having to preserve its relationship with France whilst securing post-independence ties with Nigeria, who was soon to become independent. …”
    Get full text
    Article
  12. 3772

    The Main Directions of Construction of Red Army in Days of the Great Patriotic War by N. M. Vasilyev

    Published 2015-02-01
    “…The current situation in the world draws public attention to the problems of building the armed forces and keeping their readiness to provide defense and security of the country. Rigid centralization of military construction in such collective bodies as the State Defense Committee, the General Headquarters of the Supreme Commander, determination and meticulous work of folk commissioners and the General Staff to identify areas of building and resource mobilization for the implementation of decisions taken can serve as a guide for solving similar problems in our days. …”
    Get full text
    Article
  13. 3773

    analysis the effective factors on the formation of women\'s ideal territory in urban parks (Case study: El Goli, shams , valiasr of Tabriz) by sara ghahri lalaklou, rasool darskhan, mahsa faramarzi asli, morteza mirgholami, samad sabbagh dehkharghani

    Published 2023-09-01
    “…At first at the descriptive level were investigated with subject statistics indicators and then at the inferential level used of exploratory factor analysis to determine the model.the results include 5 influential components.these components are landscape-functional-security-morphology-psychological.…”
    Get full text
    Article
  14. 3774

    Optical Image Encryption Using Devil’s Vortex Toroidal Lens in the Fresnel Transform Domain by Hukum Singh, A. K. Yadav, Sunanda Vashisth, Kehar Singh

    Published 2015-01-01
    “…The use of a DVTL-based structured mask enhances security by increasing the key space for encryption and also aids in overcoming the problem of axis alignment associated with an optical setup. …”
    Get full text
    Article
  15. 3775

    Estimation of Minimum Torsional Reinforcement of Reinforced Concrete and Steel Fiber-Reinforced Concrete Members by Hyunjin Ju, Sun-Jin Han, Dichuan Zhang, Jong Kim, Wei Wu, Kang Su Kim

    Published 2019-01-01
    “…However, since there are many researches, in which even the concrete members with the minimum torsional reinforcement fail to secure sufficient reserved strength after torsional cracking, continuous research needs to be carried out. …”
    Get full text
    Article
  16. 3776

    Comparative analysis of state support for agricultural producers in Russia and in the world by A. V. Loseva, A. V. Fedosinа, E. V. Dupliy

    Published 2023-07-01
    “…In the conditions of the WTO member countries open markets, the world countries food security, including Russia, largely depends not only on the competitiveness of their own agriculture, but also on the support of their own agricultural sector commensurate with other states. …”
    Get full text
    Article
  17. 3777

    <i>Heterotis niloticus</i> (African Bonytongue) Domestication: Potentials, Efforts, and Challenges by Johnny Ogunji, Onyedikachi Evulobi, Stanley Iheanacho, Sven Wuertz

    Published 2024-12-01
    “…Overcoming these challenges is essential to promote the full potential of <i>H. niloticus</i> aquaculture and contribute to improved food security. Future research should focus on refining breeding programs, improving water quality management, and exploring innovative aquaculture systems. …”
    Get full text
    Article
  18. 3778

    Economic valuation of the thermal inertization of asbestos waste—an Italian case study by Silvia Ferrini, Filippo Pampaloni, Francesco Delogu, Giulia Goffetti, Cecilia Viti, Giancarlo Capitani

    Published 2024-10-01
    “…However, their success is contingent on securing public funding, a thorough examination of hidden environmental costs and risks, and the establishment of supportive regulations fostering a circular economy. …”
    Get full text
    Article
  19. 3779

    Vitamin D, Essential Minerals, and Toxic Elements: Exploring Interactions between Nutrients and Toxicants in Clinical Medicine by Gerry K. Schwalfenberg, Stephen J. Genuis

    Published 2015-01-01
    “…It appears preferable to secure essential mineral status in conjunction with adequate vitamin D, as intake of vitamin D in the absence of mineral sufficiency may result in facilitation of toxic element absorption with potential adverse clinical outcomes.…”
    Get full text
    Article
  20. 3780

    THE IMPACT OF DEMOGRAPHIC CHANGES ON THE PENSION SYSTEM FINANCING SUSTAINABILITY IN THE FEDERATION OF BOSNIA AND HERZEGOVINA by Slavo Vukić, Danijel Knežević

    Published 2014-05-01
    “…According to long-term projections of the reformed pension system of the FBiH, the greater stability of initial and average pensions, as well as stable social security of pensioners, will result in a relatively stable share of pension expenditures in GDP, of about 10%. …”
    Get full text
    Article