Showing 2,781 - 2,800 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 2781

    Machine learning models and methods for solving optimization and forecasting problems of the work of seaports by M. N. Lukashevich, M. Y. Kovalyov

    Published 2022-12-01
    “…A special attention is paid to the port planning and development a wide range of topics in port operations, including port planning and development, their safety and security, water and land port operations.…”
    Get full text
    Article
  2. 2782

    La ira anticlerical de mayo de 1931. Religión, política y propaganda by Mirta Núñez Díaz-Balart

    Published 2017-07-01
    “…The involvement of uncontrolled groups in the incidents caused the first clash between members of the Administration regarding the use of public security forces. The de facto adversaries of the Republicans, including the powerful Catholic Church, were forced into taking a political stance. …”
    Get full text
    Article
  3. 2783

    On the optimal exercise boundary for an American put option by Ghada Alobaidi, Roland Mallier

    Published 2001-01-01
    “…An American put option is a derivative financial instrument that gives its holder the right but not the obligation to sell an underlying security at a pre-determined price. American options may be exercised at any time prior to expiry at the discretion of the holder, and the decision as to whether or not to exercise leads to a free boundary problem. …”
    Get full text
    Article
  4. 2784

    Cybercrimes: A Proposed Taxonomy and Challenges by Harmandeep Singh Brar, Gulshan Kumar

    Published 2018-01-01
    “…We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of cybersecurity. …”
    Get full text
    Article
  5. 2785

    Determinants of Market Liquidity of Shares Traded on the BM&FBOVESPA by Laíse Ferraz Correia, Hudson Fernandes Amaral

    Published 2014-01-01
    “…The greater the difference between the price offered and the demanded on a security (bid-ask spread), the greater its illiquidity. …”
    Get full text
    Article
  6. 2786

    Estate Planning by Martie Gillen, Josephine Turner, Vervil Mitchell

    Published 2012-03-01
    “…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
    Get full text
    Article
  7. 2787

    China’s Cooperation in Latin America: Implications for Development Assistance by Adriana Erthal Abdenur, Danilo Marcondes de Souza Neto

    Published 2013-09-01
    “…Over the past decade, Chinese cooperation in Latin America and the Caribbean has gained momentum, propelled not only by growing trade, but also by increasingly diverse political, security, technological, and cultural ties. While this cooperation has brought tangible benefits, it has also generated new dynamics of competition, including among the actors involved in development assistance. …”
    Get full text
    Article
  8. 2788

    “Colombia, the only risk is wanting to stay” by Marie-Laure Guilland

    Published 2012-03-01
    “…The link between risk or danger and Colombia is well established in the transnational imaginary and it is difficult to separate the two in the current ideological climate of international security. This imaginary of risk is so persistent that state-organised promotion of tourism is forced to take it into account in order to refute it. …”
    Get full text
    Article
  9. 2789
  10. 2790

    Spatiotemporal analysis of rainfall and temperature variability and trends for a mixed crop-livestock production system: its implications for developing adaptation strategies by Sintayehu Alemayehu, Daniel Olago, Opere Alfred, Tadesse Terefe Zeleke, Sintayehu W. Dejene

    Published 2024-10-01
    “…This connection is crucial for developing targeted adaptation strategies and policies, thereby offering actionable insights for enhancing agricultural practices and food security in the region. The originality of this work lies in its comprehensive analysis and practical relevance, making it a valuable contribution to both climate science and regional agricultural planning.…”
    Get full text
    Article
  11. 2791

    Impact of nurturing care educational videos focusing on children with nutritional problems aged 6-23 months on mothers' knowledge and child growth by Fitri Haryanti, Lely Lusmilasari, Sri Hartini, Ayyu Sandhi, Ika Parmawati, Akhmadi Akhmadi, Nisa Nur Hasanah, Fitriana Andarwati, Hani Risnawati, Alissa Nur Pratiwi, Ananda Sekar Kusumawati, Redyta Dwi Cahyani

    Published 2024-12-01
    “…Results: The intervention group showed significant improvements in nurturing care knowledge (p = 0.012), responsive caregiving (p = 0.018), and safety and security (p = 0.006). A significant difference in safety and security was observed between groups at posttest 1 (p = 0.020). …”
    Get full text
    Article
  12. 2792

    Attention-enhanced optimized deep ensemble network for effective facial emotion recognition by Taimoor Khan, Muhammad Yasir, Chang Choi

    Published 2025-04-01
    “…Facial emotion recognition (FER) is rapidly advancing, with significant applications in healthcare, human-computer interactions, and biometric security, driven by recent advances in artificial intelligence (AI), computer vision, and deep learning. …”
    Get full text
    Article
  13. 2793
  14. 2794

    The COVID-19 pandemic and self-reported food insecurity among women in Burkina Faso: evidence from the performance monitoring for action (PMA) COVID-19 survey data by Ortis Yankey, Marcellinus Essah, Prince M. Amegbor

    Published 2025-02-01
    “…Burkina Faso, a country with pre-existing vulnerabilities in food security, experienced considerable challenges during this period. …”
    Get full text
    Article
  15. 2795
  16. 2796

    Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks by Abdinasir Hirsi, Mohammed A. Alhartomi, Lukman Audah, Adeb Salh, Nan Mad Sahar, Salman Ahmed, Godwin Okon Ansa, Abdullahi Farah

    Published 2025-01-01
    “…However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. …”
    Get full text
    Article
  17. 2797
  18. 2798

    Evaluation of Nutritional and Antinutritional Properties of African Yam Bean (Sphenostylis stenocarpa (Hochst ex. A. Rich.) Harms.) Seeds by Taofeek T. Adegboyega, Michael T. Abberton, AbdelAziz H. AbdelGadir, Mahamadi Dianda, Busie Maziya-Dixon, Olaniyi A. Oyatomi, Sam Ofodile, Olubukola O. Babalola

    Published 2020-01-01
    “…It is suggested to have the potential to significantly boost food security in sub-Saharan Africa due to its considerable nutritional qualities but still yet underutilized. …”
    Get full text
    Article
  19. 2799

    The global energy challenge: second-generation feedstocks on marginal lands for a sustainable biofuel production by Claudio Russo, Valerio Cirillo, Nausicaa Pollaro, Fabio Terribile, Andrea Chiodini, Albino Maggio

    Published 2025-01-01
    “…Biofuels represent a renewable source of energy, but their production has raised concerns regarding their possible impacts on food security. Indeed, the current biofuel production primarily relies on food crops and arable lands. …”
    Get full text
    Article
  20. 2800

    AI augmented edge and fog computing for Internet of Health Things (IoHT) by Deepika Rajagopal, Pradeep Kumar Thimma Subramanian

    Published 2025-01-01
    “…It has been noted how the use of modern technologies, such as narrow band-IoT (NB-IoT) for wider coverage and Blockchain technology for security, is transforming IoHT. The last part of the review focuses on the future challenges posed by advanced technologies and services. …”
    Get full text
    Article