Showing 3,881 - 3,900 results of 5,943 for search '"securities"', query time: 0.08s Refine Results
  1. 3881

    Towards Dynamic Remote Data Auditing in Computational Clouds by Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, Nor Badrul Anuar

    Published 2014-01-01
    “…The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server.…”
    Get full text
    Article
  2. 3882

    The use of technology in civil and family oral trials as an innovative source of human rights in Mexico by Dra. Blanca Torres Espinosa, Carlos Ernesto Arcudia Hernández, Sara Berenice Orta Flores

    Published 2025-01-01
    “… The Declaration of the Rights of Man and of the Citizen of 1789 recognizes basic rights, including the right to life, liberty, security, equality, property and the expression of ideas and opinions through the press or any other medium. …”
    Get full text
    Article
  3. 3883

    Design and Analysis of Nuclear Transportation Cask Using Phase Changing Material by Girish Venkatesh Gudi, R. G. Nagraj, Abhijit Dandavate

    Published 2025-01-01
    “…In the nuclear sector, secure transportation of radioactive materials is crucial in the nuclear sector, and cask design and analysis are crucial for maintaining fuel integrity. …”
    Get full text
    Article
  4. 3884

    Social policy of the Scandinavian countries in relation to women victims of domestic violence by R. M. Sadykov, N. L. Bolshakova

    Published 2023-11-01
    “…It was also revealed that the support programs are mainly aimed at protecting and establishing the security boundary, restoring the self-esteem of victims of domestic violence.…”
    Get full text
    Article
  5. 3885

    Optimal PV‐storage capacity planning for rail transit self‐consistent energy systems considering extreme weather conditions by Siyu Guo, Liuyang Cai, Haiyi Wu, Guanghui Song, Li Lin, Yanbo Chen

    Published 2024-12-01
    “…Abstract With the rapid development of electrified rail transportation, the traction load demand of rail transportation has increased sharply, and its operational security under extreme conditions has been highlighted. …”
    Get full text
    Article
  6. 3886

    Emotional distress of adolescents from dysfunctional families as a subject of scientific research by N. M. Nikitaev, N. A. Tsvetkova

    Published 2024-11-01
    “…The social significance of the topic is noted: the emotional distress of adolescent children not only makes unhappy themselves, but also reduces the level of social health of the family and the whole society, affecting social security. The purpose of the research is a theoretical analysis of sources of scientific information which, presumably, can form a methodological basis for studying family predictors of the adolescent emotional distress. …”
    Get full text
    Article
  7. 3887

    Mechanism of Support Optimization and Confined Blasting of Thick and Hard Rock with a Wedge-Structure Immediate Roof: A Case Study by Tong Zhao, Peilin Gong, Kaan Yetilmezsoy, Majid Bahramian, Changyou Liu, Xiaofei Gong

    Published 2021-01-01
    “…These key parameters were determined as 20–25 m and 1.15–1.28 MPa, respectively, and the mining strategy was successfully applied in working face 880, performing high security and reasonable economical efficiency.…”
    Get full text
    Article
  8. 3888

    Artificial Intelligence Bias and the Amplification of Inequalities in the Labor Market by Matjaz Perc, H. Eren Suna, Mahmut Özer

    Published 2024-06-01
    “…We assess these threats by studying data from various labor fields, including justice, security, healthcare, human resource management, and education.…”
    Get full text
    Article
  9. 3889

    Werner Syndrome Caused by Homozygous Frameshift Variant c.1578del in WRN by Jovita Patricija Druta, Gunda Petraitytė, Aušra Sasnauskienė, Eglė Preikšaitienė

    Published 2024-12-01
    “…Molecular diagnosis brings better treatment of manifestations and monitoring options for the patients, helping to establish more sufficient and secure patient care. …”
    Get full text
    Article
  10. 3890

    Evaluation of Barriers to Digital Transformation in Maritime Logistics Based on A Spherical Fuzzy Multi-Criteria Decision-Making Framework by Veysel Tatar

    Published 2025-02-01
    “…When the results obtained from the study were examined, ‘Technology’ is the most important barrier category (B1) (0.341) for the adoption of digital transformation in maritime logistics, followed by the main barrier categories related to “Security” (B4) (0.266), “Environment” (B3) (0.223) and “Organisation” (B2) (0.171) respectively. …”
    Get full text
    Article
  11. 3891

    From Boole to Leggett-Garg: Epistemology of Bell-Type Inequalities by Karl Hess, Hans De Raedt, Kristel Michielsen

    Published 2016-01-01
    “…This implies that the Leggett-Garg inequality does not mean that the SQUID flux is not there when nobody looks, as Leggett and Garg suggest, but instead that the probability measures may not be what Leggett and Garg have assumed them to be, when no data can be secured that directly relate to them. We show that similar considerations apply to other quantum interpretation-puzzles such as two-slit experiments.…”
    Get full text
    Article
  12. 3892

    Victims’ profile by firearm related injuries in the municipality of the state of Rio de Janeiro by Graciele Oroski Paes, Simone Mendes Carvalho, Celso Alexandre Tavares Rodrigues, Joyce Maria dos Santos de Faria

    Published 2015-07-01
    “…The study contribution is anchored in orientation to preventive actions to the local population as well as to the elaboration of security public policies and awareness for the participation to combat and minimize the collaborative indexes of the local urban violence.…”
    Get full text
    Article
  13. 3893

    A strategy of the new “green revolution” in wheat breeding: celebrating the jubilee of Lyudmila A. Bespalova, Full Member of the Russian Academy of Sciences by E. K. Khlestkina

    Published 2022-04-01
    “…Lukyanenko National Grain Center is a practically proven strategy of the new “green revolution” capable of ensuring the global food security.…”
    Get full text
    Article
  14. 3894

    Radiofrequency Ablation of Hepatocellular Carcinoma: A Literature Review by Yasunori Minami, Masatoshi Kudo

    Published 2011-01-01
    “…An accurate evaluation of treatment response is very important to secure successful RFA therapy since a sufficient safety margin (at least 0.5 cm) can prevent local tumor recurrences. …”
    Get full text
    Article
  15. 3895

    Assessment of Negative Symptoms in Schizophrenia: From the Consensus Conference-Derived Scales to Remote Digital Phenotyping by Armida Mucci, Stefan Leucht, Giulia M. Giordano, Luigi Giuliani, Sophia Wehr, Lucia Weigel, Silvana Galderisi

    Published 2025-01-01
    “…Despite the potential to overcome traditional assessment barriers, challenges remain in aligning these digital measures with clinical ratings and ensuring data security. Equally important is patient acceptance, as the success of remote digital phenotyping relies on the willingness of patients to use these technologies. …”
    Get full text
    Article
  16. 3896

    Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study by Riccardo Mennilli, Luigi Mazza, Andrea Mura

    Published 2025-01-01
    “…This approach minimizes latency, enhances data security, and reduces the bandwidth required for data transmission, making it ideal for industrial applications that demand immediate response times. …”
    Get full text
    Article
  17. 3897

    Simulation modeling of student enrolment to solve operations problems: A case of the Saad Al- Abdullah Academy in Kuwait by Rashed M.F. Al-Therwah, Mahmoud Heshmat, Mahmoud El-Sharief, Ibrahim Mohamed Hassab -Allah

    Published 2025-04-01
    “…It focuses on a case study of the new student registration procedure at Kuwait's Saad Al-Abdullah Academy for Security Sciences. The paper represents and replicates each stage of the student enrollment procedure. …”
    Get full text
    Article
  18. 3898

    Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection by S Mekid, D Wu, R Hussain, K Youcef-Toumi

    Published 2017-11-01
    “…This will support the on-device power management to secure large autonomy operations. Experimental tests have shown that the overall received energy was mixed with ambient energy if the latter is sent at the same frequency and that the optimum frequency range used to transmit energy was rather at low frequency range of 100–200 MHz.…”
    Get full text
    Article
  19. 3899

    Efficiency of Semantic Web Implementation on Cloud Computing: A Review by Kazheen Ismael Taher, Rezgar Hasan Saeed, Rowaida Kh. Ibrahim, Zryan Najat Rashid, Lailan M. Haji, Naaman Omar, Hivi Ismat Dino

    Published 2021-06-01
    “…As a result, issues with portability, interoperability, security, selection, negotiation, discovery, and definition of cloud services and resources may arise. …”
    Get full text
    Article
  20. 3900

    Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method by Ting Ma, Xiaofeng Zhang, Zhexin Miao

    Published 2024-12-01
    “…Experimental results indicate that the proposed model achieved a high accuracy of 99.79% in detecting GPS spoofing attacks, demonstrating its potential effectiveness in enhancing UAV security.…”
    Get full text
    Article