Showing 4,061 - 4,080 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 4061

    Psychiatric and Behavioral Complications of GPi DBS in an Adolescent with Myoclonus Dystonia by Graciela Kriegel, Melanie I. Stuckey

    Published 2019-01-01
    “…The patient was transferred to a secure treatment centre where he was able to gain control over his behaviors with intense dialectical behavior therapy, but the aggressive behavior and safety concerns continue to persist today.…”
    Get full text
    Article
  2. 4062

    The current state of international economic relations between Russia and African countries by M. M. Mahamat

    Published 2024-08-01
    “…There are also difficulties in securing financing for projects, especially for small and medium-sized enterprises.…”
    Get full text
    Article
  3. 4063

    Socialisation of student youth in social networks by T. Shcherban, O. Samoilov

    Published 2024-06-01
    “…It was noted that the protection of privacy and the development of critical thinking are important for ensuring the security and information competence of social network users. …”
    Get full text
    Article
  4. 4064
  5. 4065

    Minasse Tcheraz’s Contacts of Europe and His Impressions of Berlin Congress by Serdar, Sakin

    Published 2015-06-01
    “…Before Berlin Congress assembled, Armenian Patriarch Nerses Varjabedyan had sent a delegation to the Congress in order to present the countries participating in the Congress with a memorandum that contained the requests of Armenian people and to secure these countries’ support throughout the Congress. …”
    Get full text
    Article
  6. 4066

    Playing by the rules: Government regulation and consumer trust in the online poker industry by Kahlil S. Philander, Bradley S. Wimmer

    Published 2025-03-01
    “…Players are willing to pay an extra $1.83 per hour to play on government-regulated sites and players who view these sites as more secure are willing to pay even more. However, the size of the regulatory premium falls and, in some cases, becomes negative when players believe that government regulation increases the likelihood that their winnings will be taxed. …”
    Get full text
    Article
  7. 4067

    National Defense as fiscal policy during the Mauricio Macri administration (2015-2019) by Sergio Gabriel Eissa

    Published 2020-09-01
    “…The article establishes that, although the security-oriented discourse was apparently predominant, in the end, a fiscal adjustment rationale prevailed over all the other proposals. …”
    Get full text
    Article
  8. 4068
  9. 4069

    Human-Terrestrial Wildlife Conflict in Ethiopia: A Systematic Review by Getahun Shanko, Bekele Tona

    Published 2022-01-01
    “…About 178 keywords’ analysis revealed a focus on “coexistence,” “mitigation,” and “food security.” The literature focused mainly on larger mammals, led by Ethiopian authors, and excluded the social dimensions of HWC. …”
    Get full text
    Article
  10. 4070

    Preparations of the Shipping Company “Żegluga Polska SA” for the Second World War by Jordan Siemianowski

    Published 2024-01-01
    “…Important preparations also included securing the port by state authorities.…”
    Get full text
    Article
  11. 4071

    Side Trip Multipath Routing Protocol for Spatial Node Failure in Data-Gathering WSNs by Keisuke Fujita, Yumi Takaki, Chikara Ohta, Hisashi Tamaki

    Published 2016-04-01
    “…We compare the ST scheme, STNC scheme, and two existing multipath protocols (i.e., H-SPREAD (Hybrid-Secure Protocol for REliable dAta Delivery) scheme and SMRP (Subbranch Multipath Routing Protocol) scheme) by means of a self-developed simulator. …”
    Get full text
    Article
  12. 4072

    Risk-based approach in external migration public management by V. A. Volokh, T. N. Dmitrieva

    Published 2024-03-01
    “…External migration state management should be aimed at solving the socio-economic development problems in Russia and ensuring national security and at the same time should minimize potential risks of social and cultural nature. …”
    Get full text
    Article
  13. 4073

    Implementation of Simplified Data Encryption Standard on FPGA using VHDL by salim Qadir Mohammed

    Published 2022-03-01
    “…Due to enormous development in communication devices, globally internet-connected network largely used in all human activities. The security of information has been becoming a major concern for all users and clients, whom depend on network system. …”
    Get full text
    Article
  14. 4074

    TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs by Zhenjing Zhang, Maode Ma, Zhigang Jin

    Published 2015-07-01
    “…In view of these defects, we propose a novel solution to address the selfish and security issues in social DTNs. Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
    Get full text
    Article
  15. 4075

    The war inside your mind: unprotected brain battlefields and neuro-vulnerability by Robert McCreight

    Published 2024-02-01
    “…Experts in neuromedicine, technology, societal security, and strategy must grasp that a variety of technologies that arguably enhance brain function, influence or augment intelligence, link brains with computers, and enablenon invasice access to the brain-are highly attractive. …”
    Get full text
    Article
  16. 4076

    Modeling the Grain Import Trade: A Cointegration Analysis of China’s Panel Data by Feng Zhao, Pingping Sun, Jie Zhang

    Published 2021-01-01
    “…Therefore, China should pay close attention to the impact of international factors on the fluctuation of its own food prices and enhance its ability to rationally utilize the international food market and international agricultural resources to ensure domestic food security.…”
    Get full text
    Article
  17. 4077

    The Political Economy of the Gifts on Tiktok by Cristina-Oana Cristea

    Published 2025-02-01
    “…It is a multifaceted object of study, allowing research on various topics such as security and surveillance, algorithms and addiction, and communication and online interactions. …”
    Get full text
    Article
  18. 4078

    On Facial Expression Recognition Benchmarks by Ebenezer Owusu, Jacqueline Asor Kumi, Justice Kwame Appati

    Published 2021-01-01
    “…There are several applications of facial expressions in diverse fields including medicine, security, gaming, and even business enterprises. Thus, currently, automatic facial expression recognition is a hotbed research area that attracts lots of grants and therefore the need to understand the trends very well. …”
    Get full text
    Article
  19. 4079

    CAUSES OF PROLIFERATION OF SMALL ARMS AND LIGHT WEAPON ON NATION BUILDING ON THE PEOPLE OF UROMI (1970-1991) by Esezobor Paul, Fidelis Achoba

    Published 2023-08-01
    “…Government’s monopoly of arms and the security forces would be overwhelmed and unorganized groups and armed militias will constitute threat to the development of citizens of not only Esanland in Edo State but Nigeria as a whole. …”
    Get full text
    Article
  20. 4080

    Research on Information Fusion of Computer Vision and Radar Signals in UAV Target Identification by Yuan Wei, Tao Hong, Chaoqun Fang

    Published 2022-01-01
    “…The small size, sluggish flying speed, low flight altitude, and low electromagnetic intensity of unmanned aerial vehicles (UAVs) have put enormous strain on air traffic management and airspace security. It is urgent to achieve effective UAV target detection. …”
    Get full text
    Article