Showing 4,981 - 5,000 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 4981
  2. 4982

    Evaluation of current gene pool of Kholmogor and Black-and-white cattle breeds based on whole genome SNP analysis by A. V. Dotsev, A. A. Sermyagin, A. V. Shakhin, I. A.  Paronyan, K. V. Plemyashov, H. Reyer, K. Wimmers, G. Brem, N. A. Zinovieva

    Published 2018-09-01
    “…Conservation of local cattle genetic resources is an important strategy for achieving Russia’s food security. During last decades, in the Russian Federation, local livestock populations were either crossbred or replaced by highly productive imported breeds, which led to a loss of the major part of original breeds identities. …”
    Get full text
    Article
  3. 4983

    Cross‐ethnicity face anti‐spoofing recognition challenge: A review by Ajian Liu, Xuan Li, Jun Wan, Yanyan Liang, Sergio Escalera, Hugo Jair Escalante, Meysam Madadi, Yi Jin, Zhuoyuan Wu, Xiaogang Yu, Zichang Tan, Qi Yuan, Ruikun Yang, Benjia Zhou, Guodong Guo, Stan Z. Li

    Published 2021-01-01
    “…Abstract Face anti‐spoofing is critical to prevent face recognition systems from a security breach. The biometrics community has achieved impressive progress recently due to the excellent performance of deep neural networks and the availability of large datasets. …”
    Get full text
    Article
  4. 4984

    Optimal power flow using recent red-tailed hawk optimization algorithm by Ahmed M Nassef, Mohammad Ali Abdelkareem, Mohamed Louzazni

    Published 2025-03-01
    “…The optimal power flow (OPF) solution determines the most efficient and secure operating point by considering certain objective functions and ensuring the system's operational restrictions are met. …”
    Get full text
    Article
  5. 4985

    ECONOMIC ASPECT OF CRIMINAL LAW COUNTERACTION TO JUSTIFICATION OF ARMED AGGRESSION AGAINST UKRAINE: RISKS FOR THE STATE BUDGET IN THE LIGHT OF THE PRACTICE OF THE EUROPEAN COURT OF... by Andrii Lapkin, Daryna Yevtieieva, Daria Kukovynets

    Published 2024-12-01
    “…It has been determined that the criminal law provisions stipulated in Article 4362 of the CCU, by virtue of their subject matter and nature, give rise to the potential for restrictions on the rights to privacy (Article 8), freedom of speech and expression (Article 10), and, in a indirect capacity, the prohibition of torture (Article 3) and the liberty and security of the person (Article 5) as guaranteed by the Convention. …”
    Get full text
    Article
  6. 4986
  7. 4987

    Advancements in MEMS Micromirror and Microshutter Arrays for Light Transmission Through a Substrate by Shilby Baby, Mustaqim Siddi Que Iskhandar, Md Kamrul Hasan, Steffen Liebermann, Jiahao Chen, Hasnain Qasim, Shujie Liu, Eslam Farrag, Dennis Löber, Naureen Ahmed, Guilin Xu, Hartmut Hillmer

    Published 2025-01-01
    “…Additionally, this platform technology with planarized MEMS elements can be used for laser safety goggles to shield pilots, tram, and bus drivers as well as security personal from laser threats, and is also presented in this paper.…”
    Get full text
    Article
  8. 4988
  9. 4989

    EVOLUTION OF THE PHENOMENON OF CITIZENSHIP IN THE CONTEXT OF HISTORICAL DEVELOPMENT OF THE WESTERN EUROPE by L. Y. Maximova

    Published 2018-02-01
    “…At the same time, social rights were given special development, which enabled citizens did not worry about their survival and security. Currently, researchers note the following problems in the development of the phenomenon of citizenship: the actual remaining inequality with the declared equality of all citizens, “citizenship without participation,” when a citizen is a passive consumer of social services provided by the state. …”
    Get full text
    Article
  10. 4990
  11. 4991

    Educating the digital generation: the role of virtual communities by E. M. Kharlanova, N. V. Sivrikova, S. V. Roslyakova, E. G. Chernikova

    Published 2024-01-01
    “…Moreover, the article established that the strategy of digital educational transformation should set a course to the transition from ensuring accessibility and security in a virtual environment to managing virtual communities for the purpose of the self-development and self-realization.                …”
    Get full text
    Article
  12. 4992

    USSR in World War II by M. Yu. Myagkov

    Published 2020-09-01
    “…Under these conditions, for the USSR, its own security and the conclusion of a non-aggression pact with Germany began to come to the fore, defining the "spheres of interests" of the parties in order to limit the advance of German troops towards the Soviet borders in the event of German aggression against Poland. …”
    Get full text
    Article
  13. 4993
  14. 4994

    Comparing the Technological and Intraoperative Performances of Da Vinci xi and DaVinci 5 Robotic Platforms in Patients Undergoing Robotic-Assisted Radical Prostatectomy by Ahmed Gamal, Marcio Covas Moschovas, Shady Saikali, Sumeet Reddy, Yu Ozawa, Rohan Sharma, Avaneesh Kunta, Travis Rogers, Vipul Patel

    Published 2025-01-01
    “…Force feedback instruments provide three degrees of tactile feedback, enhancing tissue manipulation. A new security system ensures instruments can only be inserted when clear of tissues and obstructions, reducing the risk of errors. …”
    Get full text
    Article
  15. 4995

    Experimental Study on the Influence of Buried Geothermal Pipes on the Temperature Field of Concrete Roads by Yan Tan, Jun Song, Zhi Chen, Henglin Xiao

    Published 2021-01-01
    “…Snow removal is a critical security issue for concrete roads, but geothermal methods can be an environmentally friendly and efficient alternative to traditional approaches for snow removal. …”
    Get full text
    Article
  16. 4996

    FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications by Kazım Kılıç, İsmail Atacak, İbrahim Alper Doğru

    Published 2025-02-01
    “…Applications installed from third-party environments threaten users’ privacy and security. Deep learning-based methods are popular for detecting Android malware. …”
    Get full text
    Article
  17. 4997
  18. 4998

    Water conservation assessment and its influencing factors identification using the InVEST and random forest model in the northern piedmont of the Qinling Mountains by Song He, Hui Qian, Yuan Liu, Xiaoguang Zhao, Fengmei Su, Huan Ma, Zilong Guan, Tao Zhang

    Published 2025-02-01
    “…The results and conclusions of this study could provide scientific insights for water security and ecosystem management in the NPQM region.…”
    Get full text
    Article
  19. 4999
  20. 5000