Showing 4,421 - 4,440 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 4421
  2. 4422

    Platform Tolerant RFID Tag Antenna Design for Safety and Real-Time Tracking of On-site Workers at Riskier Workplaces by Aarti Bansal, Rajesh Khanna, Surbhi Sharma

    Published 2023-01-01
    “…Furthermore, WTMiddleware (Worker Tracking Middleware) using Javascript, CSS, and HTML has been implemented to demonstrate a real-time secured web-based remote access of workers to provide their actual on-site monitoring and tracking of construction equipment carried/operated by the workers for tracking solutions. …”
    Get full text
    Article
  3. 4423
  4. 4424

    Research Progress on the Extraction and Identification of Key Components of Grain Odorants and Their Applications in Grain Storage by LI Hui, HONG Xiwen, WANG Zhengyan, WANG Yanyan

    Published 2025-01-01
    “…Finally, we outline the application of odorants in the field of food security and storage, and we suggest that in-depth analysis and mining of data on grain odorants and development of new predictive models for rapid and accurate detection of grain quality will be an important direction for future research on grain odorants. …”
    Get full text
    Article
  5. 4425

    The Contemporary Chinese Policy in Southeast Asia by N. V. Vlasov

    Published 2015-06-01
    “…Bilateral relations in political and security as well as defense spheres have been also steadily expanding. …”
    Get full text
    Article
  6. 4426

    Hispanic-serving HBCUs: towards an anti-colonial meso-relevant theory of organizational identity in sacred spaces of Black education by Dwuana Bradley, Gina Tillis

    Published 2025-01-01
    “…Findings also emphasize the need for dual federal designation for HB-eHSIs to secure funding and legitimacy.…”
    Get full text
    Article
  7. 4427

    High-Dimensional Quantum Key Distribution by a Spin-Orbit Microlaser by Yichi Zhang, Haoqi Zhao, Tianwei Wu, Zihe Gao, Li Ge, Liang Feng

    Published 2025-02-01
    “…Quantum key distribution offers a promising avenue for establishing secure communication networks. However, its performance is significantly hampered by the conventional two-level information carriers (i.e., qubits) due to their limited information capacity and noise resilience. …”
    Get full text
    Article
  8. 4428

    Forecast of brine blowout zones in the Amu Darya basin and analysis of brine blowout in oil and gas fields by Deryaev Annaguly

    Published 2024-01-01
    “…The obtained findings have practical value for the oil and gas industry, contributing to improving the efficiency of hydro-carbon extraction and processing processes, which are essential for the sustainable development of the industry and ensuring regional energy security.…”
    Get full text
    Article
  9. 4429

    Automatic system for blood donors control with seropositive results in epidemiological tests. by Ariel Menéndez Barrios, Darian Álvarez Rodríguez, Pedro Sánchez Frenes, Enrique Castillo Monzón, Nancy Piloto, Yenixey Lòpez

    Published 2008-04-01
    “…It also permits to elaborate reports of these patients from any PC of the blood bank acceding with the security password of the program. <strong><br />Conclusions:</strong> It constitutes a beneficial tool which permits to improve the notification system established in the program of the web about sexually transmitted diseases from the Minister of Public Health in Cuba.…”
    Get full text
    Article
  10. 4430

    Integration of investment strategies in the system of strategic planning of territorial development by O. V. Kozhevina

    Published 2019-06-01
    “…An empirical study of the implementation of investment processes in Russian regions has showed, that legal regulation is heterogeneous, but in general, well presented and allows improving the investment climate and encouraging investment, as well as to some extent influencing the economic security of the regions. The experience of the functioning of specialized organizations to attract investment and work with investors, the organization of public-private partnership at the regional level has been studied. …”
    Get full text
    Article
  11. 4431

    How do health workers build resilience after family loss, covid-19 infection, and social stigma during the pandemic? by Nungky Taniasar, Seger Handoyo, Fendy Suhariadi, Fiona Niska Dinda Nadia

    Published 2024-11-01
    “…Affective responses, such as a sense of security from social support and optimism, cognitive responses like positive thinking and acceptance, and behavioral capacities, including increased worship and professionalism, were prominent. …”
    Get full text
    Article
  12. 4432

    An Examination of International Humanitarian Law of Armed Conflict: Perspective from the Legal Issues on War Crimes in Africa by NWALA Paul

    Published 2022-12-01
    “…This study concludes that there should be adequate unilateral and collective security and sanctionable measures by the United Nationssufficient enough to protect innocent civilians, basic survival infrastructures, surrendered combatants, prisoners of war during armed conflict and that any warlord(s) who must have acted in contrary to the law of war as was codified at the Hague Conference of 1889 and 1907 as well as in fundamental breach of international law should be prosecuted accordingly by the International Criminal Court. …”
    Get full text
    Article
  13. 4433

    ACTUAL DISCOURE ABOUT TIPES FND DEVELOPMENT TENDENCIES NATIONAL STATE by E. G. Ponomareva

    Published 2013-08-01
    “…However, despite the uncertainty and ambiguity of the ways of the development of the modern world, it can be argued that in the foreseeable future it is the states that will maintain the role of the main actors in world politics and bear the responsibility for global security and development. All this naturally makes urgent the issues related to the search for optimal models of nation state development. …”
    Get full text
    Article
  14. 4434

    Reflections on Korea in 2010: Trials and prospects for recovery of common sense in 2011 by Paik Nak-chung

    Published 2011-01-01
    “…To make matters worse, the incompetence and sloppiness of the South Korean government in its initial response caused uneasiness among the citizens, and its belated displays of toughness and escalation of tension, proclaiming "readiness for a full-scale war," has added to South Korean people's sense of insecurity and even stirred their anger.Taking advantage of the security crisis, members of the ruling Grand National Party (GNP) on December 8 unilaterally and employing physical force rammed through the National Assembly the annual budget and other disputed bills. …”
    Get full text
    Article
  15. 4435

    Study on the Path of Cultivating and Enhancing National Maritime Awareness Under the Threshold of the Great Power Game by WANG Fuxin, GE Yuxuan

    Published 2024-09-01
    “…In the current context, the game in the maritime domain extends beyond military and security aspects to encompass various fields such as maritime economy, maritime politics, maritime culture, and maritime ecology. …”
    Get full text
    Article
  16. 4436

    The Impact of Oil and Gas Resources In the Arctic on the Development of the Transport System in the Region by V. I. Salygin, I. A. Guliyev, A. O. Khubaeva

    Published 2015-08-01
    “…Given the key role of the energy sector in the economic balance of the country, as well as the problem of exhaustion of hydrocarbon resources, the Arctic is of particular interest from an economic and geopolitical point of view, ensuring the energy security of Russia. Active development of the region leads to the development of transport infrastructure, which is one of the priorities of Russia's energy policy. …”
    Get full text
    Article
  17. 4437

    Analisis Kestabilan Mobil Hemat Energi Adyatma Pada Kondisi Jalan Berbelok by muri febrian

    Published 2022-04-01
    “…This can happen because the level of security of a vehicle is not good, such as the stability of the vehicle when turning. …”
    Get full text
    Article
  18. 4438

    An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud by Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu

    Published 2020-02-01
    “…To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. Security analysis shows that enhanced media ciphertext-policy attribute-based encryption can successfully resist chosen-plaintext attacks under the decisional bilinear Diffie–Hellman assumption. …”
    Get full text
    Article
  19. 4439
  20. 4440

    Oil palm-cattle integration: Farmer perception of Ganoderma infection by Suteky Tatiek, Dwatmadji Dwatmadji, Bustaman Hendri

    Published 2025-01-01
    “…The findings indicated that although farmers perceive several potential benefits from integrating cattle into oil palm plantations, they also confront challenges concerning security, finance, knowledge, feed availability, and disease in the cattle. …”
    Get full text
    Article