Showing 9,161 - 9,180 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 9161

    Strategic Resource Planning for Sustainable Biogas Integration in Hybrid Renewable Energy Systems by Pooriya Motevakel, Carlos Roldán-Blay, Carlos Roldán-Porta, Guillermo Escrivá-Escrivá, Daniel Dasí-Crespo

    Published 2025-01-01
    “…It demonstrates how optimized biomass flow can secure energy needs during high demand or when other renewables are unavailable. …”
    Get full text
    Article
  2. 9162

    Photorheologic Silicone Composites with Adaptive Properties by Utilizing Light‐Degradable Organosilica Nanoparticles as Fillers by Florian Klodwig, Laura Finck, Nina Ehlert, Peter Behrens, Henning Menzel, Sebastian Polarz

    Published 2025-02-01
    “…Vinyl groups are attached to the surfaces to secure a homogeneous distribution of the filler particles inside the polymer matrix. …”
    Get full text
    Article
  3. 9163

    Therapy of Osteoporosis in Men with Teriparatide by Natalie E. Cusano, Aline G. Costa, Barbara C. Silva, John P. Bilezikian

    Published 2011-01-01
    “…Fracture reduction data in men are less secure because the number of study subjects is small and the studies have not been powered to document this endpoint. …”
    Get full text
    Article
  4. 9164

    Stability analysis of the tunnel face adjacent to longitudinal stratigraphic interface using the upper bound theorem by Jian Shi, Shilin Zhang, Binghe Zhang, Sen Teng, Mingkai Zhao

    Published 2025-01-01
    “…The secure condition of the tunnel face perpetually remains as a matter of substantial concern throughout the execution of tunnel-construction endeavors. …”
    Get full text
    Article
  5. 9165

    A Novel Surgical Technique for Fixation of Recurrent Acromioclavicular Dislocations: AC Dog Bone Technique in Combination with Autogenous Semitendinosus Tendon Graft by Patrick Holweg, Wolfgang Pichler, Gerald Gruber, Ellen Tackner, Franz Josef Seibert, Patrick Sadoghi, Gloria Hohenberger

    Published 2017-01-01
    “…This is the first case in literature that utilizes the artificial dog bone ligament securing the autograft in an anatomic AC reconstruction.…”
    Get full text
    Article
  6. 9166

    Carotid Baroreceptor Stimulation for the Treatment of Resistant Hypertension by Vasilios Papademetriou, Michael Doumas, Charles Faselis, Constantinos Tsioufis, Stella Douma, Eugene Gkaliagkousi, Chrysanthos Zamboulis

    Published 2011-01-01
    “…While accumulating evidence indicates that carotid baroreceptor stimulation exerts its benefits beyond blood pressure reduction, further research is necessary to assess the spectrum of beneficial effects and evaluate potential hazards, before the extraction of secure conclusions.…”
    Get full text
    Article
  7. 9167

    Signal theory based encryption of faster-than-Nyquist signals for fiber and wireless transmission by Abhinand Venugopalan, Karanveer Singh, Janosch Meier, Thomas Schneider

    Published 2025-01-01
    “…The encryption is simple, fast and power efficient, and offers a solution for secure data transmission in existing and future communication networks.…”
    Get full text
    Article
  8. 9168

    Higher Education as Soft Power Potential of Russia by M. M. Lebedeva, J. Fort

    Published 2009-12-01
    “…At the same time the USA has secured the leading role in international education. …”
    Get full text
    Article
  9. 9169

    The fungicidal effect of Rosa Damascena Mill extracts against fungal infections invading Plants in Al Taif by Ali Dosh Mohammed Hassan, Alamri Saleh Hamdan, Al-Ghamdi Saleh Bakheet, Al-Zahrani Salma A., El-Sayed Sahar A., Melebari Mohammad, Gazi Khaled S., Alharthi Haitham Abdulrahman S., Al-Mutairi Salman Faleh, Thabet Mohammed A., Almiman Bandar Fahad

    Published 2025-01-01
    “…This data facilitate the contributing to the exploration of a more secure alternative to fungicides. Further, it will facilitate the development of regulatory approaches aimed at alleviating the detrimental consequences of fungal infections.…”
    Get full text
    Article
  10. 9170

    Trade policy uncertainty and corporate financialization: strategic implications for non-financial firms in China by Mingyao Wang, Normaziah Mohd Nor, Norhuda Abdul Rahim, Faisal Khan, Ziyu Zhou

    Published 2025-12-01
    “…This analysis emphasizes the significance of legislators in ensuring policy stability and fostering a secure business environment. Furthermore, the robustness of these results was sustained when alternative key variables and methodologies were applied.…”
    Get full text
    Article
  11. 9171

    Accounting Conservatism as a Protective Mechanism by Rodgers Maiyo, Josephat Cheboi, Patrick Limo

    Published 2025-01-01
    “… Purpose- This study investigates the moderating role of accounting conservatism in the relationship between corporate financial decisions (financial leverage, investment rate, and dividend payout policy) and the likelihood of financial distress among firms listed on the Kenyan Securities Exchange. Design/Methodology- The study analyzed a sample of 45 firms over 14 years from 2008 to 2021, resulting in 630 firm-year observations. …”
    Get full text
    Article
  12. 9172

    Advances and Challenges in Islet Transplantation: Islet Procurement Rates and Lessons Learned from Suboptimal Islet Transplantation by Annette Plesner, C. Bruce Verchere

    Published 2011-01-01
    “…Once the islets are engrafted, both prompt revascularization and protection from beta-cell death and graft rejection are key to secure long-term survival and function. To facilitate the engraftment of more robust islets suitable for combating the challenging isolation period and proinflammatory transplantation milieu, numerous approaches have been employed to prevent beta-cell dysfunction and death including immune modulation, prevention of apoptosis and hypoxia, as well as stimulation of growth factors, angiogenesis, and reinnervation. …”
    Get full text
    Article
  13. 9173

    Reusable and robust fuzzy extractor for CRS-dependent sources by Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen

    Published 2025-01-01
    “…Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. …”
    Get full text
    Article
  14. 9174

    Drivers influencing the adoption of cryptocurrency: a social network analysis approach by K. Kajol, Srijanani Devarakonda, Ranjit Singh, H. Kent Baker

    Published 2025-02-01
    “…It has the potential to be faster, cheaper, and more secure than existing payment networks, making it a game-changer in the global economy. …”
    Get full text
    Article
  15. 9175

    Young people involved in criminal justice are associated with housing instability by Bushra Abd Al-Lattif, Alaa Shawkat Ibraheem, Shaker Jameel Sachet, Alla Hotsalyuk

    Published 2025-01-01
    “…The association between the involvement of young individuals in the criminal justice system and their absence of secure housing is evident, emphasizing the need for a comprehensive approach to address this problem effectively. …”
    Get full text
    Article
  16. 9176

    Public attitude and media governance of biometric information dissemination in the era of digital intelligence by Wenyi Zhang, Hengtian Zhang, Zhouyang Deng

    Published 2025-01-01
    “…While PT and perceived availability (PA) significantly enhance the adoption of biometric technologies, TP exhibited an unexpected positive influence, suggesting that cautious users may still embrace biometrics if perceived as secure and trustworthy. These results emphasize the urgency of refining legal and regulatory frameworks, improving risk mitigation strategies, and enhancing user confidence to foster the responsible adoption and utilization of biometric technologies. …”
    Get full text
    Article
  17. 9177

    Examining Doctrinal Strategies to Counter the Promotion of Western Lifestyles through Ayatollah Khamenei's Quranic Perspective by Hossein Rezaei

    Published 2024-12-01
    “…This article explores monotheistic strategies within the Supreme Leader’s thought to pave the way for a new Islamic civilization and secure both worldly and eternal well-being. The research findings categorize these strategies into various dimensions, focusing on reforming monotheistic perspectives and attitudes in individual and societal contexts. …”
    Get full text
    Article
  18. 9178

    A Static State Estimation Scheme in Microgrid Utilizing μPMU Measurements by Kunal Kumar, Prince Kumar, Susmita Kar, Aashish Kumar Bohre, Samuel Amde Gebereselassie

    Published 2023-01-01
    “…The operation of power systems needs uninterrupted and precise wide-area real-time monitoring for secure and automated control of power networks, therefore, there is a requirement of robust state estimation (SE) by the smart control centre. …”
    Get full text
    Article
  19. 9179

    IMPROVING THE BUSINESS TRAJECTORY AMONG SMALL AND MEDIUM SIZE CONSTRUCTION FIRMS IN SOUTH AFRICA by L WENTZEL, John SMALLWOOD, Fidelise EMUZE

    Published 2016-12-01
    “…It is notable that the initial findings suggest that construction SMEs often encounter difficulty in securing projects, fail to realise core organisational objectives and goals, and are unable to gain cost advantages over their immediate rivals, which affects their business performance. …”
    Get full text
    Article
  20. 9180