Showing 9,301 - 9,320 results of 9,720 for search '"security"', query time: 0.11s Refine Results
  1. 9301

    Position Verification in Connected Vehicles for Cyber Resilience Using Geofencing and Fuzzy Logic by Maria Drolence Mwanje, Omprakash Kaiwartya, Abdallah Naser

    Published 2024-01-01
    “…Position verification is essential in connected and autonomous vehicle technology to enable secure vehicle-to-everything communication. Previous attempts to verify location information have used specific hardware, traffic parameters, and statistical model-based techniques dependent on neighbouring vehicles and roadside infrastructure and whose judgements can be influenced by untrustworthy entities. …”
    Get full text
    Article
  2. 9302

    Long-Gauge Fiber Optic Sensors: Strain Measurement Comparison for Reinforced Concrete Columns by Haoran Lin, Zhaowen Xu, Wan Hong, Zhihong Yang, Yixin Wang, Bing Li

    Published 2025-01-01
    “…Long-gauge fiber optic sensors, securely mounted on the concrete surface near the tensile side, were found to accurately measure both large and small deformations, outperforming LVDTs. …”
    Get full text
    Article
  3. 9303

    BIM-Based Machine Learning Application for Parametric Assessment of Building Energy Performance by Panagiotis Tsikas, Athanasios Chassiakos, Vasileios Papadimitropoulos, Antonios Papamanolis

    Published 2025-01-01
    “…To improve energy efficiency, proper building design should be secured at the early design phase. Digital tools are currently available for performing energy assessment analyses and can efficiently handle complex and technically demanding buildings. …”
    Get full text
    Article
  4. 9304
  5. 9305

    A Hybrid Approach Using Oversampling Technique and Cost-Sensitive Learning for Bankruptcy Prediction by Tuong Le, Minh Thanh Vo, Bay Vo, Mi Young Lee, Sung Wook Baik

    Published 2019-01-01
    “…The diagnosis of bankruptcy companies becomes extremely important for business owners, banks, governments, securities investors, and economic stakeholders to optimize the profitability as well as to minimize risks of investments. …”
    Get full text
    Article
  6. 9306

    Association of moderate beer consumption with the gut microbiota by Zhaoxi Liu, Jinming Shi, Lushan Wang, Jianjun Dong, Junhong Yu, Min Chen

    Published 2024-11-01
    “…Despite any potential advantages of moderating consumption of alcoholic beverages, the lowest alcohol intake is the most secure.…”
    Get full text
    Article
  7. 9307

    Introducing the Canadian Thoracic Society Framework for Guideline Dissemination and Implementation, with Concurrent Evaluation by Samir Gupta, Christopher Licskai, Anne Van Dam, Louis-Philippe Boulet

    Published 2013-01-01
    “…The framework outlines expert methodological support for KT planning, development and evaluation including a practical guide for implementers and a novel ‘Clinical Assembly – KT Action Team’, and in-kind logistical support and assistance in securing peer-reviewed funding.…”
    Get full text
    Article
  8. 9308

    A Finite Element Analysis-Based Modeling and Evaluation Method for Sternum Support Brace by Linhua Lv, Junyi Hu, Wanquan Liu, Jianqing Peng

    Published 2025-01-01
    “…Sternum support braces are commonly used in thoracic surgery to secure the chest after open chest procedures. Despite their widespread use in postoperative recovery, current modeling and performance evaluation methods have significant limitations that hinder the optimization and improvement of sternum support braces. …”
    Get full text
    Article
  9. 9309

    Childhood Injury Prevention: Intervention in the Bedouin City of Rahat by Michal Hemmo-Lotem, Efrat Merrick, Liri Endy-Findling, Aziza Abu Freh, Claudia Jinich-Aronowitz, Liat Korn, Joav Merrick

    Published 2005-01-01
    “…The main goal was to identify hazards and dangerous obstacles in public places in Rahat, then remove or repair the obstacles found, in order to secure a safe public environment for children. “Obstacle” was defined as any barrier that could endanger the safety of a child. …”
    Get full text
    Article
  10. 9310

    Rethinking Gender and Epistemic Injustice: A Comparative Study of Male and Female Breast Cancer Memoirs by Mahua Bhattacharyya, Ajit K Mishra

    Published 2025-01-01
    “…Therefore, reading and writing such memoirs might secure future epistemic justice to all breast cancer patients irrespective of their gender.…”
    Get full text
    Article
  11. 9311

    Bladder Neck Contracture after Transurethral Resection of the Prostate for Benign Prostatic Hyperplasia Treated with a Thermo-Expandable Metal Stent (Memokath® 045) by Jan Wen, Bettina Nørby, Palle Jörn Sloth Osther

    Published 2018-01-01
    “…The correct position was monitored with antegrade and retrograde endoscopy, securing the proximal cone expanded above the stricture and the distal cone above the sphincter. …”
    Get full text
    Article
  12. 9312

    Looking at NFT Art Through the Eyes of Virtual Communities: A Netnographic Analysis by Murat Aytas, Ceren Karaviran

    Published 2025-01-01
    “…It is concluded that NFT offers new opportunities to artists and collectors by securing the ownership, authenticity, and trade of artworks in a digital environment.…”
    Get full text
    Article
  13. 9313

    «Partnership for Modernization» as an Instrument of Developing the Legal Base of Customs Cooperation between Russia and the EU by D. A. Turlanov

    Published 2014-02-01
    “…Besides, legal base of Russia-EU customs cooperation does not take into consideration the following measures of modernization of customs regulation in the EU: active use of preliminary information change, electronic methods of fulfilment of customs formalities as well as implementation of modern customs techniques, targeted at simplification and securing of customs formalities. Due to the above-mentioned facts and keeping in mind the high role of mutual trade for well-being of both Russia and EU, improvement of customs cooperation legal base becomes the urgent task. …”
    Get full text
    Article
  14. 9314

    Fatigue crack paths under the influence of changes in stiffness by G. Kullmer, B. Schramm, H. A. Richard

    Published 2016-02-01
    “…Regions with differing stiffness also arise from ribs, grooves or boreholes. Since secure findings on the propagation behaviour of fatigue cracks are essential for the evaluation of the safety of components and structures, the growth of cracks near changes in stiffness has to be considered, too. …”
    Get full text
    Article
  15. 9315

    Platform Tolerant RFID Tag Antenna Design for Safety and Real-Time Tracking of On-site Workers at Riskier Workplaces by Aarti Bansal, Rajesh Khanna, Surbhi Sharma

    Published 2023-01-01
    “…Furthermore, WTMiddleware (Worker Tracking Middleware) using Javascript, CSS, and HTML has been implemented to demonstrate a real-time secured web-based remote access of workers to provide their actual on-site monitoring and tracking of construction equipment carried/operated by the workers for tracking solutions. …”
    Get full text
    Article
  16. 9316

    Hispanic-serving HBCUs: towards an anti-colonial meso-relevant theory of organizational identity in sacred spaces of Black education by Dwuana Bradley, Gina Tillis

    Published 2025-01-01
    “…Findings also emphasize the need for dual federal designation for HB-eHSIs to secure funding and legitimacy.…”
    Get full text
    Article
  17. 9317

    High-Dimensional Quantum Key Distribution by a Spin-Orbit Microlaser by Yichi Zhang, Haoqi Zhao, Tianwei Wu, Zihe Gao, Li Ge, Liang Feng

    Published 2025-02-01
    “…Quantum key distribution offers a promising avenue for establishing secure communication networks. However, its performance is significantly hampered by the conventional two-level information carriers (i.e., qubits) due to their limited information capacity and noise resilience. …”
    Get full text
    Article
  18. 9318

    SMART AGENT-BASED FRAMEWORK FOR MULTIPLE SIMULTANEOUS BILATERAL NEGOTIATIONS TO SUPPORT BUSINESS PROCESSES by Adina-Georgeta CREȚAN

    Published 2024-05-01
    “…The objective of this study is to provide assistance to autonomous microgrids that lack the capacity to secure large contracts independently. Addressing interoperability challenges, the paper advocates negotiation activities as a fundamental solution. …”
    Get full text
    Article
  19. 9319

    Embodied Time: Applied and Incidental Architectural Narratives by Owen Davıes, Laura Hanks

    Published 2022-11-01
    “…Based in Nottingham’s Lace Market, the existing tale of County House, a derelict and crudely adapted Georgian townhouse, was clarified, curated and secured, while the adjacent plots provided opportunities to experiment with applied and incidental narratives told through new buildings.…”
    Get full text
    Article
  20. 9320

    Pokój jako wartość by Mirosław Karwat

    Published 2024-11-01
    “…Then, however, it is not only the utilitarian, pragmatic value of peace as a favourable, secure state of affairs that comes into play, but above all the abstract, universalist idea of peace as a moral value dictated by humanism and humanitarianism. …”
    Get full text
    Article