Showing 4,321 - 4,340 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 4321

    DESIGN OF A PROPERTY PRODUCT RECOMMENDATION SYSTEM USING ASSOCIATION RULE METHOD BASED ON USER INTERACTION PATTERNS by Susi Wagiyati Purtiningruma, Yudi Irawan Chandrab, Dian Gustinaa, Nafisah Yuliania, Fahrul Nurzamana, Jhonny Z.Aa, Agus Wismoa

    Published 2024-07-01
    “…User data and privacy must be secured to optimize the recommendation system. Association rule and user engagement patterns can transform property recommendations. …”
    Get full text
    Article
  2. 4322

    Evaluation of the effect of physical-environmental factors of public spaces on the mental health of citizens (Case study: Ardabil city) by Elmira Azimi, Dariush Sattarzadeh, Lida Bolillan, Akbar Abdollahzadeh Tarf, Mahsa Faramarzi Asli

    Published 2020-12-01
    “…The results of this study showed that legibility and visual quality, access to urban green space, security of urban space, quality of urban furniture, mixing and variety of uses have a positive and significant effect on the mental health of citizens. …”
    Get full text
    Article
  3. 4323

    ArtDiff: Integrating IoT and AI to enhance precision in ancient mural restoration by Yuhan Yan, Bowen Chai, Jiapeng Li

    Published 2025-01-01
    “…Using real-time environmental and structural health surveillance, in conjunction with security mechanisms, this framework markedly improves precision and efficiency in forecasting and identifying potential risks.Furthermore, in the context of mural restoration, this paper introduces the ArtDiff model. …”
    Get full text
    Article
  4. 4324

    Specialized contact sites regulate the fusion of chlamydial inclusion membranes by Christine Linton, Jordan Wesolowski, Anna Lobley, Toshiyuki Yamaji, Kentaro Hanada, Fabienne Paumet

    Published 2024-10-01
    “…As IncA concentrates within ICSs, its C-terminus likely interacts in trans with IncA on the apposing membrane, securing a high concentration of IncA at fusion sites. …”
    Get full text
    Article
  5. 4325

    The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers by A. V. Sushko

    Published 2024-05-01
    “…In addition to the image itself, which became the reason for writing this article, the source for the study is the forensic investigative documentation of the Soviet state security agencies, during and after the end of the Great Patriotic War, interrogating captured employees of the German special services, Ukrainian nationalists and witnesses to their war crimes. …”
    Get full text
    Article
  6. 4326

    Applying Big Data Based Deep Learning System to Intrusion Detection by Wei Zhong, Ning Yu, Chunyu Ai

    Published 2020-09-01
    “…With vast amounts of data being generated daily and the ever increasing interconnectivity of the world’s internet infrastructures, a machine learning based Intrusion Detection Systems (IDS) has become a vital component to protect our economic and national security. Previous shallow learning and deep learning strategies adopt the single learning model approach for intrusion detection. …”
    Get full text
    Article
  7. 4327

    Blockchain technology in healthcare strengthening: The Nigerian case by Godsave Binlak Wazhi, Nengak Precious Danladi, Sesugh Daniel Terver, Stephen Ebuka Ukaobasi

    Published 2024-12-01
    “…Blockchain technology has many practical applications in the healthcare sector, including precision medicine and interoperability, supply chain management, authorization exchange of health information, security, and authorization, all of which are pivotal for effective health systems and quality health services. …”
    Get full text
    Article
  8. 4328

    Deep learning‐based unmanned aerial vehicle detection in the low altitude clutter background by Zeyang Wu, Yuexing Peng, Wenbo Wang

    Published 2022-07-01
    “…Abstract Unmanned aerial vehicles (UAVs), widely used due to their low cost and versatility, pose security and privacy threats, which calls for their reliable recognition at low altitudes. …”
    Get full text
    Article
  9. 4329

    A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme by Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan

    Published 2020-01-01
    “…Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. …”
    Get full text
    Article
  10. 4330

    Importance Analysis of Causative Nodes for Accident Chains of Railway Locomotive Operation Based on STPA-PageRank Method by Ping WAN, Wei-Lun YANG, Jie-Wen LUO, Xiao-Feng MA

    Published 2025-02-01
    “…For those nodes with high value of PageRank, some targeted security measures should be adopted, so as to save risk management investment and improve the overall safety level of the locomotive operation system.…”
    Get full text
    Article
  11. 4331

    Safety-involved co-optimization of speed trajectory and energy management for fuel cell-battery electric vehicle in car-following scenarios by Longlong Zhu, Fazhan Tao, Zhumu Fu, Mengyang Li, Guoqu Deng

    Published 2024-12-01
    “…Abstract Vehicle connectivity technologies has propelled integrated optimization of vehicle’s motion and power splitting becoming a hotspot in eco-driving control research. However, the security issues and power sources life loss of fuel cell-battery hybrid electric vehicle (FCHEV) are still challenging due to disturbances and power sources degradation. …”
    Get full text
    Article
  12. 4332

    The role of artificial intelligence in aortic valve stenosis: a bibliometric analysis by Shanshan Chen, Shanshan Chen, Changde Wu, Zhaojie Zhang, Lingjuan Liu, Yike Zhu, Dingji Hu, Chenhui Jin, Haoya Fu, Jing Wu, Songqiao Liu, Songqiao Liu, Songqiao Liu

    Published 2025-02-01
    “…Despite the progress, challenges such as model transparency and data security remain. Future research should focus on overcoming these challenges while enhancing collaboration among international institutions to further advance AI applications in cardiovascular medicine.…”
    Get full text
    Article
  13. 4333

    Radiation Dynamics on Crop Productivity in Different Cropping Systems by I. Nur Arina, M. Y. Martini, S. Surdiana, R. Mohd Fauzi, S. Zulkefly

    Published 2021-01-01
    “…Intercropping is one of the alternatives of agronomic practices that is widely practiced in ensuring food security and enhancing yield stability. Strip, mixed, and relay intercropping can be practiced to increase crop production. …”
    Get full text
    Article
  14. 4334

    Formal Verification of ERC-Based Smart Contracts: A Systematic Literature Review by Rim Ben Fekih, Mariam Lahami, Salma Bradai, Mohamed Jmaiel

    Published 2025-01-01
    “…Despite the trusted implementations that smart contracts offer, including those based on standards, different security problems and vulnerabilities arise during their development and execution. …”
    Get full text
    Article
  15. 4335

    Mapping Groundwater Vulnerability in Arid Regions: A Comparative Risk Assessment Using Modified DRASTIC Models, Land Use, and Climate Change Factors by Simone A. Williams, Sharon B. Megdal, Adriana A. Zuniga-Teran, David M. Quanrud, Gary Christopherson

    Published 2024-12-01
    “…This framework offers actionable strategies for improving groundwater protection and sustainable management in arid and semi-arid regions facing water security challenges.…”
    Get full text
    Article
  16. 4336

    Determining the factors affecting the happiness levels of divorced individuals by ordered logistics regression analysis by Burak Uyar, Cevdet Büyüksu

    Published 2022-12-01
    “…It has been determined that divorced individuals are registered with the Social Security Institution and their happiness levels are higher than those who are not registered.…”
    Get full text
    Article
  17. 4337

    Cloud-Based Software Development Lifecycle: A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis by Santhosh S, Narayana Swamy Ramaiah

    Published 2023-06-01
    “…All cloud vendors are not the same in terms of the number of services, infrastructure availability, security strategies, cost per customer, and reputation in the market. …”
    Get full text
    Article
  18. 4338

    Comparative analysis of achievements of eighth-grade students of civic education and students of religioous education on ICCS 2022 study by Ranđelović Branislav M., Trbojević Tanja M., Đukić Danijela P.

    Published 2024-01-01
    “…This study covers areas that are considered to be increasingly important in today's modern society: sustainable development and global citizenship education, migration and diversity, digital citizenship education (the use of ICT to participate in social and political events), young people's views on political systems (trust in institutions, system, media) and individual feeling of freedom and security. Given the similarities covered in ICCS research and the curriculum of Civic Education, the logical question is whether the achievements of students attending Civic Education and those students attending Religious Education are different. …”
    Get full text
    Article
  19. 4339

    Effect of Moisture on the Macro Failure Characteristics of Weakly Consolidated Mudstone: Mesomechanism by Jiahui Xu, Guichen Li, Haoyu Rong, Mohamed Elgharib Gomah, Changlun Sun, Jinghua Li, Suhui Zhang

    Published 2022-01-01
    “…Mudstone, whose significant characteristic is water-weakening, widely exists in all kinds of geotechnical engineering, which brings great security risks to engineering safety. In this paper, through a series of macro and meso test methods, the macro and meso action mechanism of water on the weakly consolidated plane of mudstone was studied. …”
    Get full text
    Article
  20. 4340

    Exogenous dsRNA-Mediated RNAi: Mechanisms, Applications, Delivery Methods and Challenges in the Induction of Viral Disease Resistance in Plants by Emmadi Venu, Akurathi Ramya, Pedapudi Lokesh Babu, Bhukya Srinivas, Sathiyaseelan Kumar, Namburi Karunakar Reddy, Yeluru Mohan Babu, Anik Majumdar, Suryakant Manik

    Published 2024-12-01
    “…Practical applications of this technology against various plant viruses and its potential to ensure food security are emphasized. The review also delves into regulatory considerations, risk assessments, and the challenges associated with off-target effects and pathogen resistance. …”
    Get full text
    Article