Showing 4,361 - 4,380 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 4361

    Impacts and challenges of industry 4.0 in manufacturing: a systematic literature review by Tamires Fernanda Barbosa Nunes, Roselaine Ruviaro Zanini, Ariane Ferreira Porto Rosa, Lizandra Garcia Lupi Vergara

    Published 2022-12-01
    “…Additionally, six potential challenges faced by manufacturing in adopting digital transformation were found: (i) management, (ii) government, (iii) implementation, (iv) workforce, (v) operation, and (vi) security. The results indicated that accurate understanding of the concepts and scope of Industry 4.0 are under construction and that knowledge sharing will be decisive in shaping the future of the transition from current business models to smart manufacturing. …”
    Get full text
    Article
  2. 4362

    Decision making about increased building automation – barriers, drivers and motivation factors by Anna-Lena Lane, Anna-Lena Lane, Andreas Selhammer, Patrik Thollander, Patrik Thollander, Mathias Cehlin

    Published 2025-01-01
    “…An important knowledge barrier was found as knowledge is needed for decisions about investments, use of BMS and decisions regarding IT security, such as handling of data. A key conclusion is the need for a facilitator, as knowledge is needed for decisions about BMS investments and for its use. …”
    Get full text
    Article
  3. 4363

    Application and Thinking of Deep Learning in Predicting Lateral Cervical Lymph Node Metastasis of Papillary Thyroid Cancer by Shengli SHAO, Jiheng WANG, Shanting LIU

    Published 2025-01-01
    “…With the establishment and sharing of large datasets, automated annotation, algorithm optimization, and resolution of data security issues, deep learning is expected to accurately predict lateral neck lymph node metastasis in PTC. …”
    Get full text
    Article
  4. 4364

    Position Verification in Connected Vehicles for Cyber Resilience Using Geofencing and Fuzzy Logic by Maria Drolence Mwanje, Omprakash Kaiwartya, Abdallah Naser

    Published 2024-01-01
    “…Position verification is essential in connected and autonomous vehicle technology to enable secure vehicle-to-everything communication. Previous attempts to verify location information have used specific hardware, traffic parameters, and statistical model-based techniques dependent on neighbouring vehicles and roadside infrastructure and whose judgements can be influenced by untrustworthy entities. …”
    Get full text
    Article
  5. 4365

    Digital Cognitive Behavioral Therapy for the Average Person in Developing Countries by Muhammad Abdullah, Muhammad Yahya Saeed

    Published 2024-12-01
    “…The results reveal that only 5% of individuals seek in-person therapy often, with 68% having limited knowledge of online mental health resources. 77% of survey participants have never used online mental health resources and express concerns about privacy and security. Based on the findings and literature review the study guides the development of strategies to enhance access to DCBT resources. …”
    Get full text
    Article
  6. 4366

    Cryo-EM structure of Sudan ebolavirus glycoprotein complexed with its human endosomal receptor NPC1 by Fan Bu, Gang Ye, Hailey Turner-Hubbard, Morgan Herbst, Bin Liu, Fang Li

    Published 2025-02-01
    “…Abstract Sudan ebolavirus (SUDV), like Ebola ebolavirus (EBOV), poses a significant threat to global health and security due to its high lethality. However, unlike EBOV, there are no approved vaccines or treatments for SUDV, and its structural interaction with the endosomal receptor NPC1 remains unclear. …”
    Get full text
    Article
  7. 4367

    A Method for Trust Quantification in Cloud Computing Environments by Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang

    Published 2016-02-01
    “…In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. …”
    Get full text
    Article
  8. 4368

    Recent Research Progress on Ground-to-Air Vision-Based Anti-UAV Detection and Tracking Methodologies: A Review by Arowa Yasmeen, Ovidiu Daescu

    Published 2025-01-01
    “…Integrating this novel aerial traffic into existing airspace frameworks presents unique challenges, particularly regarding safety and security. Consequently, there is an urgent need for robust contingency management systems, such as Anti-UAV technologies, to ensure safe air traffic. …”
    Get full text
    Article
  9. 4369
  10. 4370

    Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems by Denis Benka, Dusan Horvath, Lukas Spendla, Gabriel Gaspar, Maximilian Stremy

    Published 2025-01-01
    “…Advanced preventive measures are necessary because, despite their significance, many ICS continue to rely on outdated technologies with few security features. This paper proposes a machine learning (ML)-based approach to anomaly detection in ICS communication networks, focusing on techniques such as 1D Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, Support Vector Machines (SVMs), and Isolation Forest (iForest) algorithms. …”
    Get full text
    Article
  11. 4371

    The Centrality of Prosocial Values in Work Motivation among Public and Private Sector Employees by Egle Vaidelytė, Vaidas Morkevičius, Egle Butkevičienė, Michiel de Vries

    Published 2022-11-01
    “…Significance: This research also shows that differences between employees adhering to intrinsic, extrinsic, and prosocial motivations are relative, as almost all employees – irrespective of where they work – assess values of job security and having an interesting job to be the most important work motivators. …”
    Get full text
    Article
  12. 4372

    Introducing the Canadian Thoracic Society Framework for Guideline Dissemination and Implementation, with Concurrent Evaluation by Samir Gupta, Christopher Licskai, Anne Van Dam, Louis-Philippe Boulet

    Published 2013-01-01
    “…The framework outlines expert methodological support for KT planning, development and evaluation including a practical guide for implementers and a novel ‘Clinical Assembly – KT Action Team’, and in-kind logistical support and assistance in securing peer-reviewed funding.…”
    Get full text
    Article
  13. 4373

    Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology by K. C. Okafor, Ifeyinwa E. Achumba, Gloria A. Chukwudebe, Gordon C. Ononiwu

    Published 2017-01-01
    “…With the Internet of Everything (IoE) paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. …”
    Get full text
    Article
  14. 4374

    A Finite Element Analysis-Based Modeling and Evaluation Method for Sternum Support Brace by Linhua Lv, Junyi Hu, Wanquan Liu, Jianqing Peng

    Published 2025-01-01
    “…Sternum support braces are commonly used in thoracic surgery to secure the chest after open chest procedures. Despite their widespread use in postoperative recovery, current modeling and performance evaluation methods have significant limitations that hinder the optimization and improvement of sternum support braces. …”
    Get full text
    Article
  15. 4375

    Comparative Analysis of Pre-trained based CNN-RNN Deep Learning Models on Anomaly-5 Dataset for Action Recognition by Fayaz Ahmed Memon, Umair Ali Khan, Pardeep Kumar, Imtiaz Ali Halepoto, Farida Memon

    Published 2024-10-01
    “… Action recognition in videos is one of the essential, challenging and active area of research in the field of computer vision that adopted in various applications including automated surveillance systems, security systems and human computer interaction. In this paper, we present an in-depth comparative analysis of five CNN-RNN models based on pre-trained networks such as InceptionV3, VGG16, MobileNetV2, ResNet152V2 and InceptionResNetV2 with recurrent LSTM units for action recognition on Anomaly-5 dataset. …”
    Get full text
    Article
  16. 4376

    Modeling of winter wheat yield prediction based on solar-induced chlorophyll fluorescence by machine learning methods by Minxue Zheng, Han Hu, Yue Niu, Qiu Shen, Feng Jia, Xiaolei Geng

    Published 2025-12-01
    “…Timely and accurate prediction of large-scale crop yields is critical for national food security. Solar-induced chlorophyll fluorescence (SIF), an indicator of photosynthesis, has emerged as a promising predictor of crop yields. …”
    Get full text
    Article
  17. 4377

    The impact of terahertz radiation on an extremophilic archaean Halorubrum saccharovorum proteome by T. N. Goryachkovskaya, S. H. Konstantinova, I. A. Meshcheriakova, S. V. Bannikova, E. A. Demidov, A. V. Bryanskaya, M. A. Scheglov, A. I. Semenov, D. Yu. Oshchepkov, V. M. Popik, S. E. Peltek

    Published 2017-02-01
    “…Terahertz radiation is increasingly used in security and inspection systems, medical and scientific appliances due to its low quant energy, which does not cause severe effects on organisms as other radiation types with higher quant energies do. …”
    Get full text
    Article
  18. 4378

    Assessing the Impacts of Climatic and Water Management Scenarios in a Small Mountainous Greek River by Angeliki Mentzafou, Anastasios Papadopoulos, Elias Dimitriou

    Published 2025-01-01
    “…Transboundary cooperation, data exchange mechanisms, common policy frameworks, and monitoring, reporting, and evaluation systems, could reduce human and ecosystems’ vulnerabilities and improve the water security of the area.…”
    Get full text
    Article
  19. 4379

    Childhood Injury Prevention: Intervention in the Bedouin City of Rahat by Michal Hemmo-Lotem, Efrat Merrick, Liri Endy-Findling, Aziza Abu Freh, Claudia Jinich-Aronowitz, Liat Korn, Joav Merrick

    Published 2005-01-01
    “…The main goal was to identify hazards and dangerous obstacles in public places in Rahat, then remove or repair the obstacles found, in order to secure a safe public environment for children. “Obstacle” was defined as any barrier that could endanger the safety of a child. …”
    Get full text
    Article
  20. 4380

    Trends, contradictions, and patterns of functioning of interregional and inter-municipal cooperation institutions by R. F. Gataullin, E. R. Chuvashaeva

    Published 2025-01-01
    “…Among the patterns in the institutions development it is necessary to define their focus on functioning in the context of horizontal links globalization, growth of development sustainability and population mobility, digitalization and innovativeness, ensuring security on the basis of risk management, which implies legal integration and standards harmonization, intensive exchange of the best projects, activation of local authorities and population in projects implementation. …”
    Get full text
    Article