Showing 5,061 - 5,080 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 5061

    Geography of Sand and Gravel Mining in the Lower Mekong River by Jean-Paul Bravard, Marc Goichot, Stéphane Gaillot

    Published 2013-12-01
    “…Currently, the most important issue in the Mekong basin is certainly the threat to the delta coastline because of its importance in terms of food security for the growing populations of Vietnam and Cambodia. …”
    Get full text
    Article
  2. 5062

    Addressing technology-mediated stigma in sexual health-related digital platforms: Insights from design team members. by Abdul-Fatawu Abdulai, Amanda Fuchsia Howard, Paul J Yong, Leanne M Currie

    Published 2025-02-01
    “…., pop-up notifications, infographics, and video-based testimonials, and avoiding the use of cookies or other security-risk features) and non-functional design considerations (i.e., adopting an interprofessional and collaborative approach to design, educating software designers on domain knowledge about stigma, and ensuring consistent user testing of content). …”
    Get full text
    Article
  3. 5063

    Managing agricultural water use in the Western United States: A search for efficient climate adaptation institutions by Frank A. Ward, Nicholas A. Potter, R. Aaron Hrozencik

    Published 2025-03-01
    “…The contribution of this work is to fill a gap in previous research by assessing the economic performance of various water trading arrangements for adapting to water shortages. We secured U.S. Department of Agriculture data on irrigation water use patterns in the central part of the Rio Grande Basin of the American Southwest to support formulation of a mathematical model predicting water use patterns to assess impacts on farm income associated with a range of water shortages and water trading arrangements for adapting to these shortages. …”
    Get full text
    Article
  4. 5064

    Human drone interaction in delivery of medical supplies: A scoping review of experimental studies. by Franziska Stephan, Nicole Reinsperger, Martin Grünthal, Denny Paulicke, Patrick Jahn

    Published 2022-01-01
    “…Users must become integral part of the whole development process of medical drone services to reduce concerns, and to improve security, usability and usefulness of the system. Human drone interaction should be developed according to the identified categories of human drone interaction by using demand- and technology-driven approaches.…”
    Get full text
    Article
  5. 5065

    Advancing Sustainable Development Goals through Earth Observation Satellite Data: Current Insights and Future Directions by Qiang Zhao, Le Yu

    Published 2025-01-01
    “…For example, Sentinel data support both marine ecosystem monitoring (SDG 14) and climate adaptation (SDG 13), while Landsat data contribute to food security (SDG 2) and water resource management (SDG 6). …”
    Get full text
    Article
  6. 5066

    War and Peace of Peter the Great by E. V. Anisimov

    Published 2021-12-01
    “…Petersburg, the transfer of the capital to it, the construction of a defensive system at the mouth of the Neva all this was aimed at securing the mouth of the Neva for Russia. Russia agreed to the conclusion of a peace, according to which it received only Ingria and Karelia – the old Russian provinces.After the victory under Poltava in 1709, a new struggle for peace began. …”
    Get full text
    Article
  7. 5067

    Factors influencing academic staff satisfaction and continuous usage of generative artificial intelligence (GenAI) in higher education by Maria Ijaz Baig, Elaheh Yadegaridehkordi

    Published 2025-02-01
    “…The social influence did not correlate positively with the use of GenAI. Security and privacy were positively associated with staff satisfaction. …”
    Get full text
    Article
  8. 5068

    Process of effective management of the Eurasian transport system on the terms of integration by E. V. Pustynnikova

    Published 2023-12-01
    “…Ensuring stability, security and prosperity in the Eurasian region meets interests of many states, primarily Russia and China, as well as their closest partners. …”
    Get full text
    Article
  9. 5069
  10. 5070

    Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery by Adam Cuellar, Daniel Brignac, Abhijit Mahalanobis, Wasfy Mikhael

    Published 2025-01-01
    “…Recognizing targets in infra-red images is an important problem for defense and security applications. A deployed network must not only recognize the known classes, but it must also reject any new or <i>unknown</i> objects without confusing them to be one of the known classes. …”
    Get full text
    Article
  11. 5071

    Public Perception of Genetically Modified Organisms and the Implementation of Biosafety Measures in Kenya by Kunyanga Nkirote Catherine, B. Roy Mugiira, N. Josephat Muchiri

    Published 2024-01-01
    “…Fifty-seven percent of the respondents indicated GMOs and genetically modified (GM) foods are a solution to food security in Africa. A majority believe that the introduction of GMO technology and the use of GM food is beneficial (52.3%). …”
    Get full text
    Article
  12. 5072
  13. 5073

    Philosophical Ideas of Arne Næss in the Humanitarian Diplomacy of Norway by M. G. Zubov

    Published 2015-06-01
    “…The author of the arcticle makes it a point to show on separate examples to what extend the ideas of Næss A. are compatible with the basic principles of Norway's contemporary humanitarian diplomacy - humanity, neutrality, impartiality and independence, - as well as with the aims put forward by Norway in this respect which are to encure the needed with the necessery security and assistance; to finance humanitarian actions based on the international principles of humanity, neutrality, impartiality and independence; to prepare international community to responses to global humanitarian challenges of the future; to prevent and respond to humanitarian crises and participate in eleminating their aftermath. …”
    Get full text
    Article
  14. 5074
  15. 5075
  16. 5076

    Neural Networks Application for the Data of PID Controller for Acrobot by Nguyen Cong Danh

    Published 2022-01-01
    “…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
    Get full text
    Article
  17. 5077

    The concept and significance of forensic characteristics of the unlawful seizure of enterprise, institution or organisation property by S. V. Stetsenko

    Published 2023-12-01
    “…This criminal offence causes economic losses to both business entities and the state as a whole, reduces the level of economic security and, as a result, the level of investment, discredits the work of government agencies, undermines the authority of the state at the international level, etc. …”
    Get full text
    Article
  18. 5078

    Mediterranean refugee traffic: main routes and problems of control by Vasily D. Ostanin-Golovnya, Anna A. Pavliukova

    Published 2024-11-01
    “…The authors also cited forecasts from the European Union Agency for the Security of its External Borders for 2023–2024, which say that the pandemic and the economic crisis have affected migration flows, which will grow in the near future. …”
    Get full text
    Article
  19. 5079

    A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS by Dana Marsetiya Utama, Muhammad Faisal Ibrahim, Ahmed Nedal Abid Al Kareem Jabari

    Published 2025-01-01
    “…System quality has been identified as a critical factor in the selection of an open-source ERP system, with particular emphasis on aspects such as security and reliability. These sub-criteria are considered the most influential in determining the suitability of a system. …”
    Get full text
    Article
  20. 5080