Showing 4,121 - 4,140 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 4121

    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model by Basim Mahbooba, Mohan Timilsina, Radhya Sahal, Martin Serrano

    Published 2021-01-01
    “…Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. …”
    Get full text
    Article
  2. 4122

    Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency by Zhiwei Jin, Hesong Di, Tingpeng Hu, Peng Wang

    Published 2025-01-01
    “…Whether a processor can meet the real-time requirements of a system is a crucial factor affecting the security of real-time systems. Currently, the methods for evaluating hardware real-time performance and the quality of real-time performance are not comprehensive. …”
    Get full text
    Article
  3. 4123

    Oath-Taking, Peacebuilding and Conflict Resolution in Traditional African Society: The Izzi Example by Kelechi Johnmary Ani, Anselm Aleke Oyon

    Published 2024-12-01
    “…Over the ages, African men have continued to search for peace and security in their immediate environment. Hence, to ensure that man lives safely and peacefully, the forefathers of different African societies invented the culture of oath-taking as a means of survival. …”
    Get full text
    Article
  4. 4124

    The Exploitation of Nanotechnology in Herbicides and Bioherbicides: A Novel Approach for Sustainable Weed Management by Mirko La Iacona, Aurelio Scavo, Sara Lombardo, Giovanni Mauromicale

    Published 2025-01-01
    “…The growing global demand for food security requires a paradigm shift towards sustainable agricultural practices, particularly in weed management. …”
    Get full text
    Article
  5. 4125

    Legal Protection of Innovations in the Regime of Commercial Secrets, Industrial Property: Comparative Analysis by L. D. Rudenko

    Published 2020-06-01
    “…The legal regime of industrial property is a legal monopoly, as it provides the receipt of a security document (patent, declaratory patent). The trade secret regime is provided by a de facto monopoly, as it is ensured by the application of certain protective measures. …”
    Get full text
    Article
  6. 4126

    Research and Software Design of an Φ-OTDR-Based Optical Fiber Vibration Recognition Algorithm by Bernard Marie Tabi Fouda, Dezhi Han, Bowen An, Xiangzhi Chen

    Published 2020-01-01
    “…Distributed optical fiber vibration signal plays a significant role in the communication and safety of any perimeter security monitoring system. It uses light as an information carrier and optical fiber as a means of signal transmission and communication. …”
    Get full text
    Article
  7. 4127

    Perspectives on Soft Actor–Critic (SAC)-Aided Operational Control Strategies for Modern Power Systems with Growing Stochastics and Dynamics by Jinbo Liu, Qinglai Guo, Jing Zhang, Ruisheng Diao, Guangjun Xu

    Published 2025-01-01
    “…The ever-growing penetration of renewable energy with substantial uncertainties and stochastic characteristics significantly affects the modern power grid’s secure and economical operation. Nevertheless, coordinating various types of resources to derive effective online control decisions for a large-scale power network remains a big challenge. …”
    Get full text
    Article
  8. 4128

    Identification of Ecological Priority Areas Based on Nested-Scale Analysis: A Case Study of Metropolitan Nanjing, China by Yuxi Zhu, Jianqiang Yang, Le Zhu, Liping Sun

    Published 2024-12-01
    “…Rapid urbanization has led to severe fragmentation of ecological spaces in high-density metropolitan regions, threatening urban ecological security and environmental well-being. While cities explore various restoration strategies, the systematic identification of ecological priority areas remains an urgent challenge, particularly due to the limitations of multi-scale evaluation methods. …”
    Get full text
    Article
  9. 4129

    A Multistory Building Evacuation Model Based on Multiple-Factor Analysis by Yang Zhou, Tanghong Wu, Gaofan Zhang, Zichuan Fan

    Published 2019-01-01
    “…Emergency evacuation is an important issue in public security. To make a considerate plan, various situations are presented including blocking the accident area and letting the emergency access path available. …”
    Get full text
    Article
  10. 4130

    Comprehensive dataset from high resolution UAV land cover mapping of diverse natural environments in Serbia by Bojana Ivošević, Nina Pajević, Sanja Brdar, Rana Waqar, Maryam Khan, João Valente

    Published 2025-01-01
    “…Abstract This study highlights the vital role of high-resolution (HR), open-source land cover maps for food security, land use planning, and environmental protection. …”
    Get full text
    Article
  11. 4131

    Niqivut (our food)—dimensions of Inuit country food harvesting and significance in Arctic Canada: bountiful, seasonal, “soul food” by Natalie Ann Carter, Nicolien van Luijk, Jackie Dawson, Colleen Parker, Kayla Grey, Jennifer Provencher, Chantel Emiktaut, Natasha Simonee, Gloria Song, Sonia Wesche

    Published 2025-01-01
    “…A holistic understanding of the diversity and seasonality of harvesting is needed to support Inuit food sovereignty and security. Our goals were (a) to develop a broader understanding of the diversity and seasonality of harvesting country food across varied geographic contexts in Arctic Canada, and (b) further document the significance and benefits of country food as part of Inuit food sovereignty and systems across a range of communities. …”
    Get full text
    Article
  12. 4132

    Employer Branding and Brand Building in the Aviation Industry by Gabrišová Ivana, Koman Gabriel

    Published 2025-01-01
    “…To build customer loyalty, airlines should focus on meeting diverse needs based on travel types, offering memorable experiences, and ensuring website security. By strengthening their brand, companies can enhance their attractiveness to job seekers, boost employee and customer satisfaction and loyalty, and improve overall business performance.…”
    Get full text
    Article
  13. 4133

    A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction by Md. Alamin Talukder, Majdi Khalid, Nasrin Sultana

    Published 2025-02-01
    “…Abstract Intrusion detection systems are essential for securing wireless sensor networks (WSNs) and Internet of Things (IoT) environments against various threats. …”
    Get full text
    Article
  14. 4134

    Intervention Protocol to Address the Difficult Airway. An Alternative for the Anesthesiologist’s Performance by Fernando Márquez Ercia, José Julio Ojeda González, Bárbara Lucia Cabezas Poblet, Magda Robaina Pérez

    Published 2012-02-01
    “…<p><strong>Background</strong>: The ability to secure the airway in a variety of patients and clinical circumstances constitutes an essential domain for the health team. …”
    Get full text
    Article
  15. 4135

    Regulating Working Hours in the Transition to Flexible Work by Olena Lutsenko, Anatolii P. Getman, Vladyslav S. Tkachenko, Ehor S. Nazymko

    Published 2024-12-01
    “…The findings offer recommendations for reforming Ukraine’s labor laws, aligning them with global trends, and advancing education in labor law and social security disciplines.…”
    Get full text
    Article
  16. 4136

    A learning‐based approach to regression analysis for climate data–A case of Northeast China by Jiaxu Guo, Yidan Xu, Liang Hu, Xianwei Wu, Gaochao Xu, Xilong Che

    Published 2025-01-01
    “…Precipitation is an important climatic feature for agricultural development and food security, and the study of precipitation and its associated climatic factors is important for the analysis of global change. …”
    Get full text
    Article
  17. 4137

    Towards understanding the character of quality sampling in deep learning face recognition by Iurii Medvedev, João Tremoço, Beatriz Mano, Luís Espírito Santo, Nuno Gonçalves

    Published 2022-09-01
    “…Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. …”
    Get full text
    Article
  18. 4138

    How to Develop Renewable Power in China? A Cost-Effective Perspective by Rong-Gang Cong, Shaochuan Shen

    Published 2014-01-01
    “…To address the problems of climate change and energy security, Chinese government strived to develop renewable power as an important alternative of conventional electricity. …”
    Get full text
    Article
  19. 4139

    Guest editorial: Advanced signal processing for integration of radar and communication (IRC) by Bin Liao, Wei Liu, Ziyang Cheng, Tianyao Huang

    Published 2022-09-01
    “…Besides the military field, radar has been widely employed in daily life including weather service, air traffic control, autonomous driving and security monitoring. Meanwhile, these applications rely Largely on information transmission through wireless communications. …”
    Get full text
    Article
  20. 4140

    Agent Based Simulation of Group Emotions Evolution and Strategy Intervention in Extreme Events by Bo Li, Duoyong Sun, Shuquan Guo, Zihan Lin

    Published 2014-01-01
    “…This paper also provides an effective method of how to use agent-based simulation for the study of complex collective behavior evolution problem in extreme incidents, emergency, and security study domains.…”
    Get full text
    Article