Showing 3,941 - 3,960 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3941

    “Big Challenges” and Regional Technical University: Values and Actions by R. V. Aginey, O. I. Belyaeva

    Published 2020-03-01
    “…There is a distinction between civilization and globalist paradigms of Russia positioning, as well as a distinction between well-being and security as two strategies of values generalization. …”
    Get full text
    Article
  2. 3942

    Higher Education as Soft Power Potential of Russia by M. M. Lebedeva, J. Fort

    Published 2009-12-01
    “…At the same time the USA has secured the leading role in international education. …”
    Get full text
    Article
  3. 3943

    Operational Risk Assessment of Distribution Network Equipment Based on Rough Set and D-S Evidence Theory by Cunbin Li, Gefu Qing, Peng Li, Tingting Yin

    Published 2013-01-01
    “…Therefore, scientific assessment of power distribution equipment operation risk is significant to the security of power distribution system. In order to get the satisfactory assessment conclusions from the complete and incomplete information and improve the assessment level, an operational risk assessment model of distribution network equipment based on rough set and D-S evidence theory was built. …”
    Get full text
    Article
  4. 3944

    The urgency of addressing zoonotic diseases surveillance: Potential opportunities considering One Health approaches and common European Data Spaces by Nicola Riccetti, Serena Signorelli, Angela Fanelli, Emanuele Massaro, Manlio Bacco, Wojciech Szewczyk, Dolores Ibarreta, Juan Carlos Ciscar, Alessandro Cescatti, Sandra Coecke, Ilaria Capua

    Published 2025-04-01
    “…Consequently, this approach might foster data sharing from Member States by leveraging existing developments within data spaces in terms of, for example, data security. It could also support researchers and developers in accessing transdisciplinary, stratified, and quality-controlled data for their projects.…”
    Get full text
    Article
  5. 3945

    Improving wheat yield prediction through variable selection using Support Vector Regression, Random Forest, and Extreme Gradient Boosting by Juan Carlos Moreno Sánchez, Héctor Gabriel Acosta Mesa, Adrián Trueba Espinosa, Sergio Ruiz Castilla, Farid García Lamont

    Published 2025-03-01
    “…Plant breeding centers, in their relentless pursuit of more productive and resilient wheat varieties, have generated vast data repositories that are fundamental to ensuring global food security. This study uses these data to develop a wheat grain yield (GY) prediction model, using machine learning techniques such as Random Forest (RF), Support Vector Regression (SVR), and Extreme Gradient Boosting (XGBoost). …”
    Get full text
    Article
  6. 3946

    The use of Telenomus remus (Nixon, 1937) (Hymenoptera: Scelionidae) in the management of Spodoptera spp.: potential, challenges and major benefits by Yelitza Coromoto Colmenarez, Dirk Babendreier, Francisco Ramón Ferrer Wurst, Carlos Luis Vásquez-Freytez, Adeney de Freitas Bueno

    Published 2022-01-01
    “…Abstract Spodoptera frugiperda (Smith, 1797) (Lepidoptera: Noctuidae), also known as fall armyworm (FAW) is a polyphagous pest which can cause significant losses and is considered a global threat to different crops and a risk to food security. Currently, in maize, the pest is predominantly controlled by pesticides or transgenic events. …”
    Get full text
    Article
  7. 3947

    Risk Assessment of an Existing Metro Tunnel in Close Proximity to New Shield Tunnels following Construction by Yong Xu, Ming Xia, Wei Zhang, Zheyu Li, Zhiqiang Zhang

    Published 2022-01-01
    “…The threshold of indicators in the existing tunnel structure risk assessment system was determined based on the tunnel function and structure security. Then, we described the membership vector determination method, weight vector determination method, and comprehensive evaluation vector processing method. …”
    Get full text
    Article
  8. 3948

    Trade policy uncertainty and corporate financialization: strategic implications for non-financial firms in China by Mingyao Wang, Normaziah Mohd Nor, Norhuda Abdul Rahim, Faisal Khan, Ziyu Zhou

    Published 2025-12-01
    “…This analysis emphasizes the significance of legislators in ensuring policy stability and fostering a secure business environment. Furthermore, the robustness of these results was sustained when alternative key variables and methodologies were applied.…”
    Get full text
    Article
  9. 3949

    Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm by Tingzhe Pan, Jue Hou, Xin Jin, Chao Li, Xinlei Cai, Xiaodong Zhou

    Published 2025-01-01
    “…To address the data heterogeneity and security issues encountered in load forecasting for smart grids, this paper proposes a load-forecasting framework suitable for residential energy users, which allows users to train personalized forecasting models without sharing load data. …”
    Get full text
    Article
  10. 3950

    Optimization tool for small hydropower plant resource planning and development: A case study by Antans Sauhats, Hasan Huseyin Coban

    Published 2022-09-01
    “…In order to decrease carbon dioxide emissions, fight climate change, not being attached to fuel resources, and increase energy security while decreasing dependence on foreign countries, governments of many countries are increasing the share of renewable energy in electricity production and have taken actions to exploit their domestic resources, which is why renewable energy is an essential and important issue in today‘s world and also in the future it may continue to play a globally essential role. …”
    Get full text
    Article
  11. 3951

    Advances and Challenges in Islet Transplantation: Islet Procurement Rates and Lessons Learned from Suboptimal Islet Transplantation by Annette Plesner, C. Bruce Verchere

    Published 2011-01-01
    “…Once the islets are engrafted, both prompt revascularization and protection from beta-cell death and graft rejection are key to secure long-term survival and function. To facilitate the engraftment of more robust islets suitable for combating the challenging isolation period and proinflammatory transplantation milieu, numerous approaches have been employed to prevent beta-cell dysfunction and death including immune modulation, prevention of apoptosis and hypoxia, as well as stimulation of growth factors, angiogenesis, and reinnervation. …”
    Get full text
    Article
  12. 3952

    A framework to evaluate public green spaces with an emphasis on recreational values for sustainable urban and rural areas: A systematic review and content analysis by Amirmohammad Ghavimi, Frank Schuessler, Roland Pesch

    Published 2025-01-01
    “…Employing a systematic review of 130 publications sourced from Web of Science, Scopus, and Google Scholar and ensuing content analysis, we identified and elaborated on 14 distinct qualities, including accessibility, connectedness, responsiveness, variety of activity, social interactions, facilities, safety and security, spaciousness, biodiversity, perceptual value, aesthetic value, and symbolic value. …”
    Get full text
    Article
  13. 3953

    Reusable and robust fuzzy extractor for CRS-dependent sources by Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen

    Published 2025-01-01
    “…Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. …”
    Get full text
    Article
  14. 3954

    Drivers influencing the adoption of cryptocurrency: a social network analysis approach by K. Kajol, Srijanani Devarakonda, Ranjit Singh, H. Kent Baker

    Published 2025-02-01
    “…It has the potential to be faster, cheaper, and more secure than existing payment networks, making it a game-changer in the global economy. …”
    Get full text
    Article
  15. 3955

    Optimal Pest Control Strategies with Cost-effectiveness Analysis by Ihza Rizkia Fitri, Farida Hanum, Ali Kusnanto, Toni Bakhtiar

    Published 2021-01-01
    “…Pest and plant diseases cause damages and economic losses, threatening food security and ecosystem services. Thus, proper pest management is indispensable to mitigate the risk of losses. …”
    Get full text
    Article
  16. 3956

    Contracting account audit on social networks by Jakovljević Nemanja, Jakovljević Stefan

    Published 2022-01-01
    “…Social network account audit is an independent review of social network activities to express a professional opinion on the fulfillment of objectives, business compliance, and information security of orders on social networks. It is in principle a voluntary activity and is not subject to legal obligation like some other types of audit such as the audit of financial statements. …”
    Get full text
    Article
  17. 3957

    Public attitude and media governance of biometric information dissemination in the era of digital intelligence by Wenyi Zhang, Hengtian Zhang, Zhouyang Deng

    Published 2025-01-01
    “…While PT and perceived availability (PA) significantly enhance the adoption of biometric technologies, TP exhibited an unexpected positive influence, suggesting that cautious users may still embrace biometrics if perceived as secure and trustworthy. These results emphasize the urgency of refining legal and regulatory frameworks, improving risk mitigation strategies, and enhancing user confidence to foster the responsible adoption and utilization of biometric technologies. …”
    Get full text
    Article
  18. 3958

    A Static State Estimation Scheme in Microgrid Utilizing μPMU Measurements by Kunal Kumar, Prince Kumar, Susmita Kar, Aashish Kumar Bohre, Samuel Amde Gebereselassie

    Published 2023-01-01
    “…The operation of power systems needs uninterrupted and precise wide-area real-time monitoring for secure and automated control of power networks, therefore, there is a requirement of robust state estimation (SE) by the smart control centre. …”
    Get full text
    Article
  19. 3959

    Enhancing plant disease detection through deep learning: a Depthwise CNN with squeeze and excitation integration and residual skip connections by Asadulla Y. Ashurov, Mehdhar S. A. M. Al-Gaashani, Nagwan A. Samee, Reem Alkanhel, Ghada Atteia, Hanaa A. Abdallah, Mohammed Saleh Ali Muthanna

    Published 2025-01-01
    “…In light of increasing global challenges related to food security and sustainable agriculture, this research focuses on developing a highly efficient and accurate automated system for identifying plant diseases, thereby contributing to enhanced crop protection and yield optimization. …”
    Get full text
    Article
  20. 3960

    Prompt injection attacks on vision language models in oncology by Jan Clusmann, Dyke Ferber, Isabella C. Wiest, Carolin V. Schneider, Titus J. Brinker, Sebastian Foersch, Daniel Truhn, Jakob Nikolas Kather

    Published 2025-02-01
    “…However, here, we demonstrate that current VLMs applied to medical tasks exhibit a fundamental security flaw: they can be compromised by prompt injection attacks. …”
    Get full text
    Article