Showing 8,641 - 8,660 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 8641

    Rural Households’ Vulnerability to Food Insecurity and Its Determinants in North Shewa Zone of Ethiopia by Debebe Cheber, Fekadu Beyene, Jema Haji, Tesfaye Lemma

    Published 2025-01-01
    “…Accordingly, based on the intensity of their vulnerability, households were grouped as chronic food insecure (43.72%), transient food insecure (12.57%), highly vulnerable-food secure (16.23%), and low vulnerable-food secure (27.49%). …”
    Get full text
    Article
  2. 8642
  3. 8643

    Surgical Synechiolysis of Iridocapsular Adhesion and Sulcus Placement of a Rigid Intraocular Lens on an Oversized Residual Capsular Rim by Jiao Lyu, Qi Zhang, Haiying Jin, Tingyi Liang, Jili Chen, Peiquan Zhao

    Published 2018-01-01
    “…A preserved capsulorhexis after sufficient synechiolysis, which can secure the IOL optic intraoperatively, may yield better stability of the IOL position.…”
    Get full text
    Article
  4. 8644

    NEGATIVE INTEREST RATES: CENTRAL BANKS INITIATED AN EXPERIMENT by A. N. Burenin

    Published 2016-08-01
    “…Such new tools could be represented by futures contracts on interest rates securities.…”
    Get full text
    Article
  5. 8645

    Food-Insecure Women Eat a Less Diverse Diet in a More Temporally Variable Way: Evidence from the US National Health and Nutrition Examination Survey, 2013-4 by Daniel Nettle, Melissa Bateson

    Published 2019-01-01
    “…Previous research using food recalls suggests that the total energy intake of food-insecure women is not elevated, though macronutrient composition may differ from that of food-secure women. There is limited evidence on temporal patterns of food consumption. …”
    Get full text
    Article
  6. 8646

    Pressure and rolling torque in high-speed finishing blocks of wire mills with account of mass forces in deformation zones by A. A. Gorbanev, S. M. Zhuchkov, V. V. Filippov, V. A. Tischenko, A. B. Steblov

    Published 2001-08-01
    “…Tasks of working out of theoretical bases of continuos high-speed rolling of rolled wire are set forth and solved with considerańon of influence of mass forces securing necessary acceleration in deformation zones.…”
    Get full text
    Article
  7. 8647

    Feasibility and parameter optimization of ground-to-satellite uplink continuous-variable quantum key distribution by Jin Cheng, Yujie Chen, Ao Liu, Xin Sun, Junjie Guo, Bohan Yang, Peng Yin, Wenbo Liu, Lanjian Chen, Chen Dong

    Published 2025-01-01
    “…Driven by the necessitates of wide-area quantum secure communication networks, ground-to-satellite quantum key distribution (QKD) has been highlighted in the field of quantum information. …”
    Get full text
    Article
  8. 8648

    Relationship Between Attachment and Social Skills in Adulthood Education in the Digital Society by Raquel Muñoz-Pradas, María de la Fuente Benítez, Antonio Palacios-Rodríguez, Mª Victoria Fernández Scagliusi

    Published 2025-01-01
    “…After carrying out the analyses, the existence of a statistically significant relationship was detected between the social skills variable and Attachment Scale 3, corresponding to subjects with good abilities to express feelings and comfort with relationships (secure attachment). It is concluded by stating that subjects who have developed a secure attachment will have more satisfactory social relationships.…”
    Get full text
    Article
  9. 8649
  10. 8650

    Mellem Skylla og Charybdis – træk af legalitetsprincippets historie i dansk strafferet by Morten Kjær

    Published 2017-02-01
    “…While the principle of legality was designed to secure the predictability of the criminal law, measures were also taken in order to secure flexibility in the application of the code by the courts. …”
    Get full text
    Article
  11. 8651

    Parallel remote state preparation for fully device-independent verifiable blind quantum computation by Sean A. Adamson

    Published 2025-01-01
    “…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. …”
    Get full text
    Article
  12. 8652

    Une alliance de circonstance : l’Italie et les musulmans d’Albanie (1912-1920) by Renaud Dorlhiac, Fabrice Jesné

    Published 2017-06-01
    “…While its military intervention aimed at securing the Adriatic Sea, it draws Roma to claim protection over the Albanian Muslims in front of the competing powers in the Balkans. …”
    Get full text
    Article
  13. 8653

    Staying in Marriage is Not Enough: Influence of Marital Commitment and Adult Attachment Style on Marital Flourishing by Sri Juwita Kusumawardhani, Anggi Mayangsari, Reny Rustyawati, Ilham Phalosa Reswara

    Published 2024-06-01
    “…The results showed that marital commitment (p = .000) and a secure attachment style (p = .000) significantly predict marital flourishing. …”
    Get full text
    Article
  14. 8654

    A Rare Complication of Tracheal Intubation: Tongue Perforation by Loreto Lollo, Tanya K. Meyer, Andreas Grabinsky

    Published 2012-01-01
    “…Laryngoscopy demonstrated the ETT to perforate the base of the tongue. The airway was secured with tracheostomy and the ETT was removed. …”
    Get full text
    Article
  15. 8655

    An Overview on The Pandemic Coronavirus Disease 2019 (COVID-19) Outbreak by Mariwan Abdulla Hama Salih

    Published 2020-05-01
    “…The other objective of this review was to encourage publics to treat the virus in safe way based on the discovery by researchers toward secure life of million peoples that could be infected by the 2019 new coronavirus. …”
    Get full text
    Article
  16. 8656

    Acceptability of donor funding for clinical trials in the UK: a qualitative empirical ethics study using focus groups to elicit the views of research patient public involvement gro... by Simon Bowman, Heather Draper, Alexander Masters, Dominic Nutt, Kirstie Shearman

    Published 2022-06-01
    “…Existing governance processes will do some of this work, but additional REC guidance, particularly in relation to donors securing a place on the trial, may be necessary to help RECs navigate ethical concerns consistently.…”
    Get full text
    Article
  17. 8657

    La crise de l’oléoduc Edjeleh-Gabès : Au cœur des enjeux de souveraineté du Maghreb (1954-1962) by Sarah Adjel-Debbich

    Published 2018-06-01
    “…While the French-Libyan discussions (1954-1956) were retaining the attention of French oil companies, Paris was focusing on securing the evacuation of oil from the Algerian Sahara during the Algerian War (1954-1962). …”
    Get full text
    Article
  18. 8658

    Sensor Relocation Technique Based Lightweight Integrated Protocol for WSN by J. Joy Winston, B. Balan Paramasivan

    Published 2014-06-01
    “…However, this approach fails to focus on connectivity issue due to node migration and secured communication too, which may compromise our collecting data. …”
    Get full text
    Article
  19. 8659

    A requirement-driven approach for competency-based collaboration in industrial data science projects by Marius Syberg, Nikolai West, Jörn Schwenken, Rebekka Adams, Jochen Deuse

    Published 2024-01-01
    “…Simultaneously, especially manufacturing companies need to gain and secure knowledge in the field of Industrial Data Science (IDS) and to collaborate with partners to form a competitive value chain. …”
    Get full text
    Article
  20. 8660

    Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the... by Dave Klein, Aisha Montgomery, Mark Begale, Scott Sutherland, Sherilyn Sawyer, Jacob L McCauley, Letheshia Husbands, Deepti Joshi, Alan Ashbeck, Marcy Palmer, Praduman Jain

    Published 2025-01-01
    “…Participants were recruited by in-person, print, and online digital campaigns. Participants securely accessed the DHRP via web and mobile apps, either independently or with research staff support. …”
    Get full text
    Article