Showing 5,201 - 5,220 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 5201

    Acceptability of donor funding for clinical trials in the UK: a qualitative empirical ethics study using focus groups to elicit the views of research patient public involvement gro... by Simon Bowman, Heather Draper, Alexander Masters, Dominic Nutt, Kirstie Shearman

    Published 2022-06-01
    “…Existing governance processes will do some of this work, but additional REC guidance, particularly in relation to donors securing a place on the trial, may be necessary to help RECs navigate ethical concerns consistently.…”
    Get full text
    Article
  2. 5202

    An Agent-Based Auction Protocol on Mobile Devices by Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen, Dai-Lun Chiang, Yu-Ting Chen

    Published 2014-01-01
    “…This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. …”
    Get full text
    Article
  3. 5203

    Kelekatan dan Kesejahteraan Psikologis Anak dan Remaja: Studi Meta-Analisis by Hepi Wahyuningsih, Resnia Novitasari, Fitri Ayu Kusumaningrum

    Published 2021-01-01
    “…The results show that (1) the correlation effect between secure attachment and positive psychological well-being was significant; (2) the correlation effect of secure attachment with negative psychological well-being indicates a significant value; (3) the correlation effect between avoidance and positive psychological well-being was significant; (4) the correlation effect between avoidance and negative psychological well-being was significant; (5) the correlation effect between anxious and positive psychological well-being was not significant; (6) the correlation effect between anxious and negative psychological well-being was significant; (7) the correlation effect between disorganized with positive psychological well-being was significant; (8) the correlation effect between disorganized and negative psychological well-being was significant. …”
    Get full text
    Article
  4. 5204

    Ureteric Injury due to the Use of LigaSure by Muazzam Tahir, William Gilkison

    Published 2013-01-01
    “…The use of LigaSure has made securing haemostasis and tissue dissection relatively easy especially in laparoscopic surgery; however, if not used with care it can cause damage to the surrounding structures through lateral spread of energy. …”
    Get full text
    Article
  5. 5205

    An Optimal Routing Framework for an Integrated Urban Power–Gas–Traffic Network by Mohammad Jadidbonab, Hussein Abdeltawab, Yasser Abdel-Rady I. Mohamed

    Published 2024-01-01
    “…The developed non-probabilistic framework provides decision-makers with various secure options to avoid worst-case scenarios and promote social and environmental benefits. …”
    Get full text
    Article
  6. 5206

    Chaotic Motions in the Real Fuzzy Electronic Circuits by Shih-Yu Li, Cheng-Hsiung Yang, Chin-Teng Lin, Li-Wei Ko, Tien-Ting Chiu

    Published 2013-01-01
    “…In the research field of secure communications, the original source should be blended with other complex signals. …”
    Get full text
    Article
  7. 5207

    Quantification of nipple size and shape among an ethnically diverse sample of US women by Peter Wildfeuer, Alexis Alban, Bob Worrell, Shilo Ben Zeev, Judith Shamian, Mike Woolridge

    Published 2023-09-01
    “…Viable data were secured from 78% of the scans undertaken, yielding 538 datasets from 329 participants. …”
    Get full text
    Article
  8. 5208

    A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics by Zhuo Hao, Sheng Zhong, Nenghai Yu

    Published 2013-01-01
    “…We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. …”
    Get full text
    Article
  9. 5209

    Calculation of the quantity of oxygen required for maintenance of the predetermined temperature of steel during its boiling period in a steel-melting arc furnace by I. G. Biokh, S. A. Fomenko, S. M. Kozlov, O. G. Khopova, M. P. Guljaev, M. G. Pshonik

    Published 2000-08-01
    “…The article provides а mathematical model of steel smelting in a steel-melting arc furnace with provision for calculation of necessary quantity of oxygen for maintenance of preset temperature of steel when arcs are switched off It shows that oxygen supply during the arcs disconnection period secures energy consumption reduction.…”
    Get full text
    Article
  10. 5210

    Simulation of bond prices by Jelena Artamonova

    Published 2005-12-01
    “…The proposed methods are illustrated by the Lithuanian Government securities. The results show that a squared binomial (two-factor) bond market model approximates the bond prices more precisely than analogous quadronomial (one-factor) model. …”
    Get full text
    Article
  11. 5211

    Resource Mobilization Policy Guidelines by Kabale University

    Published 2022
    “…It is intended to enhance capacity of University stakeholders in securing resources for Kabale University’s mandate as documented in the Statutory Instrument No. 36 of July 2015, establishment of Kabale University…”
    Get full text
    Other
  12. 5212

    Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles by Min Yang, Yong Feng, Xiaodong Fu, Qian Qian

    Published 2019-07-01
    “…The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme.…”
    Get full text
    Article
  13. 5213

    Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture by Andrea Mølgaard

    Published 2024-01-01
    “…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
    Get full text
    Article
  14. 5214

    Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes by Obinna P. Fidelis, Caleb Stubbs, Katrina L. Easton, Caroline Billings, Alisha P. Pedersen, David E. Anderson, Dustin L. Crouch

    Published 2025-01-01
    “…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
    Get full text
    Article
  15. 5215

    Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments by Karim El-Khanchouli, Hanaa Mansouri, Nawal El Ghouate, Hicham Karmouni, Nour-Eddine Joudar, Mhamed Sayyouri, S. S. Askar, Mohamed Abouhawwash

    Published 2025-01-01
    “…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
    Get full text
    Article
  16. 5216
  17. 5217

    U.S. strategy in Central Asia by V. N. Zemskov

    Published 2013-04-01
    “…In this connection, the author notes that successive governments of the USA, the American political and expert community, business circles traditionally in the last twenty years pay particular attention to this region, bringing to secure the U.S. presence in the region the concept of "Big Central Asia".…”
    Get full text
    Article
  18. 5218

    What determines investment in the Nippon Individual Savings Account? an investigation of Japan's tax-exempt investment account. by Takuya Katauke, Mostafa Saidur Rahim Khan, Yoshihiko Kadoya

    Published 2025-01-01
    “…Taking advantage of the launch of the revamped NISA, we analyzed data collected in late 2022 of 95,632 active investors in a leading securities company to explore their preferences in the previous NISA. …”
    Get full text
    Article
  19. 5219

    Oil and Iran Regions Rural Economic Structure Alteration by Hassan Afrakhteh, Mohammad Hajipur, Farhad Javan

    Published 2018-03-01
    “…The oil has gradually obtained a predominant place in national economy since 1950 and nowadays, is the main important resource securing country financial needs. Two questions are the base of this research regarding contradiction of oil rent and traditional economic sectors including agriculture and livestock rearing which always have been intensified. …”
    Get full text
    Article
  20. 5220

    An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application by You-Boo Jeon, Keun-Ho Lee, Doo-Soon Park, Chang-Sung Jeong

    Published 2013-11-01
    “…We have successfully included the establishment of secure channels, the detection of replay attacks, mutual cluster authentication, prevention of vehicle identity fabrication, and secure distribution of provisional session key.…”
    Get full text
    Article