Showing 5,301 - 5,320 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 5301

    Sustainability Goals in Economic Policy — Economic Considerations by Achim Wambach, Christine Zulehner

    Published 2022-05-01
    “…This should be prevented by formulating the goals as concretely and legally securely as possible and by building up competence in the authorities entrusted with their implementation.…”
    Get full text
    Article
  2. 5302

    USE OF CORPORATE ACCOUNTING AND CONTROL SYSTEM IN MANAGEMENT by T. M. Rogulenko, A. V. Bodyko

    Published 2019-12-01
    “…According to the results of the study a conclusion has been made, that the corporate accounting and control system is one of the modern algorithmized and automated tools of the corporate management system of economic development strategy in a highly competitive environment and the unpredictability of the behavior of economic entities in the market of goods, works, services, currency, securities, etc., which is integrated with other management systems in the mode of their parallel automation.…”
    Get full text
    Article
  3. 5303

    Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems by Benjamin Glas, Oliver Sander, Vitali Stuckert, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. …”
    Get full text
    Article
  4. 5304

    Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans by Ethan T. Noel, Elizabeth F. Pienaar, Mike Orlando

    Published 2017-06-01
    “…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.­http://edis.ifas.ufl.edu/uw429 …”
    Get full text
    Article
  5. 5305

    Cattell-Braasch Maneuver: A Gadget to Manipulate Abdominal Aortic Aneurysm in a Patient with a Left-Sided Inferior Vena Cava by Akiko Tobe, Takuro Shirasu, Takatoshi Furuya, Motoki Nagai, Yukihiro Nomura

    Published 2019-01-01
    “…He underwent open surgery, and we employed the Cattell-Braasch maneuver to approach the abdominal aortic aneurysm from the right side. This enabled securing of the abdominal aortic aneurysm neck without mobilizing or dissecting the inferior vena cava. …”
    Get full text
    Article
  6. 5306

    Bedřich ze Strážnice a husitské posádky ve Slezsku by Martin Čapský

    Published 2020-12-01
    “…In Silesia, the priest Bedřich of Strážnice helped to transform the system operating among the garrisons in Central and South Moravia, including the collection of food in the form of tributes, obtaining the spoils of war, supplying through the convoys sent from the Hussite domain, and the cooperation with local elites. At the same time, securing supplies determined the main features of military operations. …”
    Get full text
    Article
  7. 5307

    Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks by Tamás Holczer, Levente Buttyán

    Published 2011-10-01
    “…More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. …”
    Get full text
    Article
  8. 5308

    Piracy around the Horn of Africa by Joshua Ho

    Published 2009-09-01
    “…Piracy around the Horn of Africa has risen to a level serious enough for the international community to take concerted action to secure an international sea lane. However, the efforts so far have been initiated mainly by the international community while regional efforts are only just beginning. …”
    Get full text
    Article
  9. 5309

    A Review of Semantic Sensor Technologies in Internet of Things Architectures by Gergely Marcell Honti, Janos Abonyi

    Published 2019-01-01
    “…Intelligent sensors should be seamlessly, securely, and trustworthy interconnected to enable automated high-level smart applications. …”
    Get full text
    Article
  10. 5310

    Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm by Bin Li, Jingpeng Wang, Hailong Bao, Huiying Zhang

    Published 2014-01-01
    “…Islanding detection is essential for secure and reliable operation of microgrids. Considering the relationship between the power generation and the load in microgrids, frequency may vary with time when islanding occurs. …”
    Get full text
    Article
  11. 5311

    Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act by Melissa M. Kreye, Elizabeth F. Pienaar, Raoul K. Boughton, Lindsey Wiggins

    Published 2016-02-01
    “… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
    Get full text
    Article
  12. 5312

    The Art of Storytelling in Science: A Personal Journey by Bruno Bezerril Andrade

    Published 2025-02-01
    “…Drawing from my experiences across Brazil, the United States of America, India, and South Africa, I explore how crafting compelling narratives enhances scientific communication, increasing the likelihood of publishing, securing funding, and building collaborations. Reflecting on formative “hot seat” sessions at the National Institutes of Health, in the United States, I emphasize the importance of structuring ideas clearly, regardless of language fluency. …”
    Get full text
    Article
  13. 5313

    Market Efficiency and Organizational Corruption: Study on the Impact on Shareholder Value by Renata Crosara Miari, José Marcos Carvalho de Mesquita, Daniel Jardim Pardini

    Published 2015-01-01
    “…We selected 28 events for analysis and we observed negative and positive variations of the securities in relation to the market, in the days before the disclosure, as in most o f the 20 days after publication. …”
    Get full text
    Article
  14. 5314

    Tributary by James Davoll, Paul Dolan, Pete Howson

    Published 2023-05-01
    “…Tributary explores covert, 'black-boxed' data centres (remote and highly secure sites) by tracking water and geothermal sources to the infrastructure required to power and house these physical locations of intensive computational processing. …”
    Get full text
    Article
  15. 5315

    Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act by Melissa M. Kreye, Elizabeth F. Pienaar, Raoul K. Boughton, Lindsey Wiggins

    Published 2016-02-01
    “… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
    Get full text
    Article
  16. 5316

    Identification of critical nodes in supply chain networks by Zhen Hua, Yongxiang Xia, Yucheng Chen, Weigang Sun

    Published 2025-01-01
    “…The accurate identification of the critical nodes in a SCN is important for securing the supply chain. This study proposes a new method for identifying critical nodes in SCNs based on the topological and functional characteristics of SCNs. …”
    Get full text
    Article
  17. 5317

    A Laryngoscope with Shape Memory Actuation by Fischer Nikola, Ho Patty, Marzi Christian, Schuler Patrick, Mathis-Ullrich Franziska

    Published 2024-09-01
    “…Endotracheal intubation is a medical procedure to secure a patient’s airways, which can be challenging in emergency situations due to an individual’s anatomy. …”
    Get full text
    Article
  18. 5318

    Long-Term Remission of a Spinal Atypical Teratoid Rhabdoid Tumor in Response to Intensive Multimodal Therapy by Fahd Refai, Haneen Al-Maghrabi, Hassan Al Trabolsi, Jaudah Al-Maghrabi

    Published 2019-01-01
    “…Provided clinical and diagnostic suspicion is high, the histopathological diagnosis is relatively straightforward to secure by testing for the characteristic loss of the tumor suppressor protein SMARCB1/INI1. …”
    Get full text
    Article
  19. 5319

    Effectiveness of pre-employment card policy on employment transition during covid-19: evidence from Indonesian dual labor market by Beni Teguh Gunawan, El Bram Apriyanto, Hennigusnia Hennigusnia, Ivan Lilin Suryono, Ardhian Kurniawati

    Published 2024-11-01
    “…The effectiveness of the PEC policy is measured through key indicators such as labor absorption rates, reduction in unemployment, and the likelihood of securing formal employment over informal alternatives. …”
    Get full text
    Article
  20. 5320

    Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms by Pushpa Mala Siddaraju, Devappa Jayadevappa, Kaliyamoorthy Ezhilarasan

    Published 2015-01-01
    “…Watermarking plays an important role in protecting, sharing, and securing medical data. In this work, a robust nonblind medical image watermarking scheme is proposed. …”
    Get full text
    Article