Showing 5,281 - 5,300 results of 5,943 for search '"securities"', query time: 0.08s Refine Results
  1. 5281

    Book history's recent methodological trend: national and intemational outlines by Jyrki Hakapää

    Published 2024-08-01
    “…The international approaches may offer new insights about the past, but do they also offer better chances to secure project funding and reach contemporary readers? …”
    Get full text
    Article
  2. 5282

    Robotic-assisted costectomy using a Gigli saw for fibrous dysplasia by Chen Yang, Lei Chen, Hui Wang, Qianyun Wang

    Published 2025-01-01
    “…Conclusions The utilization of a three-port robotic-assisted costectomy in conjunction with a Gigli saw represents a viable, secure, and efficient approach for treating isolated benign rib lesions. …”
    Get full text
    Article
  3. 5283
  4. 5284

    Chemical Profiling of the White and Brown Teff (Eragrostis tef (Zuccagni) Trotter) Injera and Their Nutritional Properties by Hagos Yisak, Estifanos Ele Yaya, Mesfin Redi-Abshiro, Bhagwan Singh Chandravanshi

    Published 2024-01-01
    “…Teff (Eragrostis tef (Zuccagni) Trotter) is one of the underutilized crops that can contribute to food security with distinct nutritional values. The present study was aimed to determine the total phenolic content, total fat content, and fatty acid profiles and evaluate the nutritional values of the white and brown Injera (ready-to-eat food) using UV-Vis and GC-MS methods. …”
    Get full text
    Article
  5. 5285

    Long-Term Monitoring of Individuals With Chronic Obstructive Pulmonary Disease Using Digital Health Technology: Qualitative Study by Shih-Ying Chien, Han-Chung Hu, Hsiu-Ying Cho

    Published 2025-02-01
    “…By addressing identified barriers and capitalizing on facilitators, advancements can be made in the development and use of DHT, especially in overcoming challenges such as information security and operational methods. The implementation of the recommended strategies will likely lead to improved COPD care outcomes.…”
    Get full text
    Article
  6. 5286
  7. 5287
  8. 5288

    Evaluating the Impacts of Discharging the Effluent of Al-Gabal Al-Asfar Wastewater Treatment Plant on Ismailia Canal in Egypt to Maximize Revenue and Ensure Sustainability by Marwa M Aly, Mohamed SM Zayed, Mahmoud S Salem, Mohamed K Mostafa

    Published 2025-02-01
    “…The findings indicated that the fifth scenario (recycling 46% of the treated water, which amounts to 1.15 million cubic meters daily) is the optimal scenario for keeping the concentration of the studied parameters in the Ismailia Canal within the allowable limits and ensuring the canal’s cross-section remains hydraulically secure. Nonetheless, the fourth scenario (reusing 1.50 million cubic meters per day) might be feasible if the efficiency of the plant is enhanced by lowering the ammonium-nitrogen concentration in the effluent. …”
    Get full text
    Article
  9. 5289
  10. 5290

    The growth–environment nexus amid geopolitical risks: cointegration and machine learning algorithm approaches by Md. Idris Ali, Md. Atikur Rahaman, Mohammed Julfikar Ali, Md. Ferdausur Rahman

    Published 2025-02-01
    “…These risks disrupt economic growth, destabilize energy supply chains, and foster economic uncertainty, often prioritizing energy security over environmental sustainability. Existing literature inadequately addresses how geopolitical risks interact with environmental sustainability, particularly within developed economies like Canada. …”
    Get full text
    Article
  11. 5291
  12. 5292

    Evaluating Machine Unlearning: Applications, Approaches, and Accuracy by Zulfiqar Ali, Asif Muhammad, Rubina Adnan, Tamim Alkhalifah, Sheraz Aslam

    Published 2025-01-01
    “…In many cases, ML models may memorize sensitive or personal data, raising concerns about data privacy and security. Machine unlearning (MU) techniques offer a solution to these concerns by selectively removing sensitive data from trained models without significantly compromising their performance. …”
    Get full text
    Article
  13. 5293

    Meal Pattern in the Colombian Population: Results of the National Nutrition Survey. ENSIN, 2015 by María del Pilar Zea, Oscar F. Herrán

    Published 2022-01-01
    “…The number of meals/day (mean ± SD) was 4.4 ± 0.0, without differences by sex P=0.068, current weight P=0.336 , or wealth index P=0.480, but there were differences in the level of education of the head of the household P<0.0001 and the level of food security of the household P<0.0001. A total of 96.8% of the population eats 3 or more meals/day (95% CI: 96.2, 97.2). …”
    Get full text
    Article
  14. 5294

    Corruption criminal offences: concept and classification by R. I. Login

    Published 2024-03-01
    “…Corruption criminal offences are also classified on the basis of the generic object of the criminal offence: corruption criminal offences against property, in the field of economic activity, against public security, in the field of trafficking in narcotic drugs, psychotropic substances, their analogues or precursors, against the authority of state authorities, local self-government bodies and associations of citizens, in the field of official activity and professional activity related to the provision of public services, against the established procedure for military service. …”
    Get full text
    Article
  15. 5295

    BREEDING FOR ANTIOXIDANT CONTENT IN GRAIN AS A PROMISING TREND IN OBTAINING HEALTHY FOOD PRODUCTS by V. I. Polonskiy, I. G. Loskutov, A. V. Sumina

    Published 2018-05-01
    “…According to the Food Security Doctrine of the Russian Federation, there are plans for the nearest future to expand the assortment of healthy food products for the country’s population, so a search for relevant food sources is needed. …”
    Get full text
    Article
  16. 5296

    High-Temperature Environmental Protection Metal Material 3D Printing Equipment Development and Process Research by Jiaofei Huo, Guangpeng Zhang

    Published 2021-01-01
    “…The price of 3D printing equipment is expensive, and there are some security risks in the process of learning operation. …”
    Get full text
    Article
  17. 5297
  18. 5298

    Perinatal Outcomes among Cases of Predicted and Unpredicted Macrosomia by Merita Isaku, Enxhi Vrapi, Tedi Bimbashi, Ina Cala, Kizjona Perdja, Redi Hoxhallari, Astrit Bimbashi

    Published 2023-08-01
    “…Data were stored in a secure database. The review board of the institution approved the study. …”
    Get full text
    Article
  19. 5299

    CAPABILITIES OF APPLYING VISIBLE LIGHT RAYS IN THE SYSTEMS OF HIDDEN INFORMATION TRANSMITTING by I. V. Pyslar, V. V. Brailovsky, M. G. Rozhdestvenska, M. M. Ivanchuk

    Published 2018-06-01
    “…Security In the paper some aspects of visible light pulses using for hidden information transmitting are considered. …”
    Get full text
    Article
  20. 5300