Showing 5,341 - 5,360 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 5341

    PCR-based detection of Botryosphaeria canker pathogens in fig trees by Mahdiyeh Ghaedi, Zeinab Bolboli, Hamed Negahban, Reza Mostowfizadeh-Ghalamfarsa

    Published 2025-02-01
    “…Abstract Canker and dieback, caused by members of the Botryosphaeriaceae family, pose significant threats to plant productivity, food security, and natural ecosystems, particularly in economically important woody crops including fig trees. …”
    Get full text
    Article
  2. 5342
  3. 5343

    A Spatial–Temporal Difference Aggregation Network for Gaofen-2 Multitemporal Image in Cropland Change Area by Chuang Liu, Liyang Bao, Zhiqi Zhang

    Published 2025-01-01
    “…Food security is an important guarantee of peace and development in the world. …”
    Get full text
    Article
  4. 5344
  5. 5345

    Evaluasi Penerapan IT Governance pada Bank berdasarkan Cobit 5 (Studi Kasus pada Bank XYZ) by Surjandy Surjandy, Erick Fernando, A.Raharto Condrobimo, Mohammad Rizky Yudho

    Published 2020-05-01
    “…The Framework Process Evaluation Model (PAM) of COBIT 5 includes elements of data security and Information Technology governance. The conclusion of the evaluation of the study show that there is still a need to improve the development of the system in the bank …”
    Get full text
    Article
  6. 5346
  7. 5347

    Cancellation of a preventive measure in the form of detention under martial law in the context of Art. 616 of the CPC of Ukraine by A. H. Harkusha

    Published 2022-09-01
    “…The norm provided for by Art. 616 of the Criminal Procedure Code of Ukraine, is aimed at realizing the right of a suspect, an accused person to apply to the prosecutor with a request for the cancellation of a preventive measure in the form of detention for the purpose of military service during mobilization, for a special period in the event of the introduction of martial law in Ukraine or some of its localities , implementation of measures to ensure national security and defense, repel and deter armed aggression by the Russian Federation and/or other states against Ukraine. …”
    Get full text
    Article
  8. 5348

    Intelligent information systems for power grid fault analysis by computer communication technology by Ronglong Xu, Jing Zhang

    Published 2025-01-01
    “…Abstract This study aims to enhance the intelligence level of power grid fault analysis to address increasingly complex fault scenarios and ensure grid stability and security. To this end, an intelligent information system for power grid fault analysis, leveraging improved computer communication technology, is proposed and developed. …”
    Get full text
    Article
  9. 5349

    Post-Socialist Ethnic Symbolism, Suppression of Yugoslav Social Memory, and Radical Populism Psychology by Faruk Hadžić

    Published 2023-12-01
    “…Moreover, the approach toward the fascist ideology symbols disregards the communist social memory of stability and human security and a collectivism-oriented community. Neoliberal globalization has strengthened national identities, supported by the war-related creation of ethnic homogenous territories. …”
    Get full text
    Article
  10. 5350

    Instrumental aspects of proportionality in civil proceedings by O. H. Bortnik, T. V. Stepanenko

    Published 2022-06-01
    “…It has been concluded that fair is justice, which guarantees a balanced, necessity-based limitation of opportunities in the realization of procedural and legal interests, in the exercise of rights, as well as compliance with the procedure established by law, which is a reflection of public interests in legal security. It has been emphasized that proportionality is an instrumental principle that allows to ensure legal discourse, which is a means of achieving a balanced legal and social result, which is connected with ensuring the rule of law during the exercise of power. …”
    Get full text
    Article
  11. 5351
  12. 5352

    Localization and detection of deepfake videos based on self-blending method by Junfeng Xu, Xintao Liu, Weiguo Lin, Wenqing Shang, Yuefeng Wang

    Published 2025-01-01
    “…Abstract Deepfake technology, which encompasses various video manipulation techniques implemented through deep learning algorithms-such as face swapping and expression alteration-has advanced to generate fake videos that are increasingly difficult for human observers to detect, posing significant threats to societal security. Existing methods for detecting deepfake videos aim to identify such manipulated content to effectively prevent the spread of misinformation. …”
    Get full text
    Article
  13. 5353

    Formation of Russian magistracy: implementation of the digital economy requests in the educational process by E. V. Voevodina

    Published 2020-02-01
    “…As the main results, information on the use of modern educational technologies in the preparation of Russian undergraduates has been given – a conclusion has been made about the small distribution of on-line education and network programs in universities.The research data characterizing the degree of digital competencies of Russian graduate students have been adduced: information search and processing, use of IT technologies, information security, ability to work with «big» data. It has been noted, that these skills are well developed among modern students, but the participation of universities in their development is low. …”
    Get full text
    Article
  14. 5354

    Wind Energy Resource Prediction and Optimal Storage Sizing to Guarantee Dispatchability: A Case Study in the Kenyan Power Grid by Hampfrey Odero, Cyrus Wekesa, George Irungu

    Published 2022-01-01
    “…Thus, after their installation and integration into the grid, they impose a new challenge for the secure, reliable, and economic operation of the system. …”
    Get full text
    Article
  15. 5355

    Comparative analysis of the concepts of “law enforcement agencies” and “discretionary powers” in the international legal systems by O. A. Prysyazhnyuk

    Published 2024-12-01
    “…An important part of the study is an assessment of how national legal systems interpret the powers of law enforcement agencies, including the police, prosecutors and other state institutions that contribute to law enforcement and security. Particular attention is paid to how these powers affect the efficiency and effectiveness of law enforcement, as well as the ability of law enforcement officers to make decisions in real, often unpredictable situations. …”
    Get full text
    Article
  16. 5356

    A Novel Rapeseed Mapping Framework Integrating Image Fusion, Automated Sample Generation, and Deep Learning in Southwest China by Ruolan Jiang, Xingyin Duan, Song Liao, Ziyi Tang, Hao Li

    Published 2025-01-01
    “…Rapeseed mapping is crucial for refined agricultural management and food security. However, existing remote sensing-based methods for rapeseed mapping in Southwest China are severely limited by insufficient training samples and persistent cloud cover. …”
    Get full text
    Article
  17. 5357

    Determinants of Seed Distribution System: The Case of Womberma District, North West Ethiopia by Gizachew Wosene Minwagaw, Wubalem Gobie Ejigu

    Published 2021-01-01
    “…Bread wheat also known as common wheat is one of the most important crops for food security and job opportunities for many smallholders as well as the urban population in Ethiopia. …”
    Get full text
    Article
  18. 5358

    Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations by Phuc Hao do, Tran Duc Le, Truong Duy Dinh, van Dai Pham

    Published 2025-01-01
    “…The integration of KAN-based models into existing cybersecurity frameworks can enhance the detection and mitigation of sophisticated botnet threats, thus contributing to more resilient and secure IoT ecosystems.…”
    Get full text
    Article
  19. 5359

    Displacing the Christian Theodicy of Hell: Yi Kwangsu’s Search for the Willful Individual in Colonial Modernity by Jun-Hyeok Kwak, Mengxiao Huang

    Published 2025-01-01
    “…Specifically, first, we will show that Yi’s Christian imaginary of hell is reformulated through the traditional imaginaries of hell in which, regardless of the existence of God’s sovereignty over the created order, the sufferings of sinners in hell function to secure social norms and orders. In doing so, we claim that the Christian imaginary of hell in <i>The Heartless</i> is relegated to a rhetorical means to beget the need for the self-awakening of the inner-self through which individual desires can be freed from the influences of Confucian morality as well as Christian theodicy. …”
    Get full text
    Article
  20. 5360

    Administrative and Legal Status of Law Enforcement Agencies as Subjects of Interaction with Financial Institutions in the Sphere of Combating the Legalization of Criminal Proceeds by A. V. Steblianko

    Published 2019-12-01
    “…Such agencies are the National Anti-Corruption Bureau of Ukraine, the agencies of the Security Service, the National Police and Prosecutor’s Office, the State Bureau of Investigation, the tax police units of the State Fiscal Service of Ukraine. …”
    Get full text
    Article