Showing 9,381 - 9,400 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 9381

    DIAGNOSTIC CRTITERIA OF ORTHODONTIC TREATMENT WITH EXTRACTION OF SOME TEETH by О.М. Makarova

    Published 2019-06-01
    “…Besides, necessity of teeth extraction of some teeth which are written in medical protocol, secures a doctor from law risks. The aim of the investigation was to establish correlative link between parameters of morphometric analysis of control and diagnostic models of jaws by Snagina and roentgenologic parameters of lateral cephalometry by Kim. …”
    Get full text
    Article
  2. 9382

    ENVIRONMENTAL AND SOCIAL INFORMATION DISCLOSURE QUALITY AND FINANCIAL PERFORMANCE OF LISTED MANUFACTURING COMPANIES IN NIGERIA by Saka Tunde Abdulsalam

    Published 2024-10-01
    “…This study concluded that substantive investment in sustainability activities and quality disclosure is a form of undisputed contribution to sustainable development that in turn provide a basis for securing enhanced FP. This study recommends that manager should henceforth, consider potential returns that will come from investment in substantive environmental and social activities and quality disclosure that follow GRI quality reporting principle. …”
    Get full text
    Article
  3. 9383

    Delineating a “non-place” in the UK?10 notes on experimental poetry written by women: Caroline Bergvall and Redell Olsen by Vincent BROQUA

    Published 2008-10-01
    “…Leur poésie du territoire déconstruit, et de l’identité en question se donne à lire dans deux œuvres particulières : celle de Caroline Bergvall, poète dont la langue inassignable bouscule la syntaxe du monde en redéfinissant les frontières entre les langues, et celle de Redell Olsen dans laquelle les territoires fixes, familiers et controversés de « l’identité nationale » sont constamment battus en brèche dans Secure Portable Space, notamment par une hybridation des textes du poète américain Charles Olson.…”
    Get full text
    Article
  4. 9384

    GaitVision: Real-Time Extraction of Gait Parameters Using Residual Attention Network by Mohammad Farukh Hashmi, B. Kiran Kumar Ashish, Prabhu Chaitanya, Avinash Keskar, Sinan Q. Salih, Neeraj Dhanraj Bokde

    Published 2021-01-01
    “…This state-of-the-art work creates a gait-based access authentication that can be used in highly secured premises. This work was specially designed for Defence Department premises authentication. …”
    Get full text
    Article
  5. 9385

    Policy Fragmentation, Women’s Land Rights and Governance in Zimbabwe by Newman Tekwa

    Published 2025-01-01
    “…Context and background The above comes in a context where the Malabo Declaration call for equitable access to land and secure land rights for women is coming to an end in 2025. …”
    Get full text
    Article
  6. 9386

    Pursuing a corporate sustainable identity: Green governance strategy, hybrid vehicle development, knowledge and sustainability performance by Akrum Helfaya, Phuong Bui

    Published 2025-03-01
    “…The study further reveals that despite economic pressures such as rising electricity costs, companies committed to GGS continue to prioritize hybrid vehicle production as a critical strategy to enhance sustainability performance and secure recognition in sustainability awards. However, a significant gap persists: 60 % of surveyed companies fail to address SDG 11 (Sustainable Cities and Communities), while 55 % neglect SDG 13 (Climate Action). …”
    Get full text
    Article
  7. 9387

    ON IMPROVING THE ENERGY SUPPLY OF BATCH DYEING APPARATUSES IN THE LIGHT INDUSTRY ENTERPRISES by V. N. Romaniuk, D. B. Muslina

    Published 2016-02-01
    “…The suggested ways of solving the problem are not exhaustive and offer evolutionary changes that secure economic indicators fitting the dictates of time and the enterprises capabilities. …”
    Get full text
    Article
  8. 9388

    Lifesaving surgical approaches for severe penetrating knife injury to the neck by Anand Shankar Soundararajan, Kesava Phani Krishna

    Published 2025-01-01
    “…As tracheal repair was not possible posterior wall was approximated with 3 − 0 polypropylene and size 7 tracheostomy tube was inserted and secured. The patient was managed post-operatively in the ICU and was discharged in stable condition on the 25th day adviced regular follow-up. …”
    Get full text
    Article
  9. 9389

    A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. by Ye Tao, Wenhua Cui, Shanshan Wang, Yayun Wang

    Published 2025-01-01
    “…Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
    Get full text
    Article
  10. 9390

    Organizing the spatial space of the urban rivers\' margin of tourism development (case study of Poldokhtar city) by jahan tigh mond, Yassin Zeini Vand, Seyyed Moein Moosavi Nadoshan

    Published 2023-03-01
    “…The range of results showed that the most important strategy for creating urban river tourism in Poldokhtar is the attempt to create a social and secure environment with facilities and ease of access and special emphasis on environmental and ecological issues. …”
    Get full text
    Article
  11. 9391

    Soviet Diplomatic Efforts to Prevent Hungary’s Alignment with Germany in World War II (1939– 1941) by V. F. Pryakhin

    Published 2024-01-01
    “…Hungary, as strategized by Budapest, hoped to secure a position among these observers, avoiding direct conflict participation, and to later engage in territorial reconfiguration post-World War II. …”
    Get full text
    Article
  12. 9392

    The Everyday Commoning Practices in Urbanising Localities by Bhuvaneswari Raman, Eric Denis

    Published 2025-01-01
    “…Negotiating Rights to Inhabit Common Lands for Housing in Two Cities of South India This paper presents a framework for understanding the everyday political dynamics of commoning initiated by residents to secure their claims to ‘common land’ in urbanising localities. …”
    Get full text
    Article
  13. 9393

    Environmental literacy, the key to sustainable conservation of wetlands in urban areas by Cain NZVERE, Lovemore CHIRUBVU, Thebeth MASUNDA

    Published 2024-01-01
    “…The study concluded that individuals are more concerned with their primary needs of securing food and shelter, with little or no consideration of the after effects of such on the environment which include individual heath, as well as depreciation of other services and goods found in wetlands. …”
    Get full text
    Article
  14. 9394

    Challenging Our Assumptions: Listening to Refugee and Immigrant Women’s Voices About Career Aspirations by Angela Warner, Dahlia Herring, Lisa E. Baranik, Janice Coles

    Published 2025-01-01
    “…These newcomers face significant barriers to obtaining economic stability. Those who secure a job usually work in low-paying, entry-level positions such as food service, hospitality, or cleaning. …”
    Get full text
    Article
  15. 9395

    Development and Validation of Cloud-based Heart Rate Variability Monitor by Sushma N. Bhat, Ghanshyam D. Jindal, Gajanan D. Nagare

    Published 2024-12-01
    “…Aims: Medical investigations carried out at dispensaries or hospitals impose substantial physiological and psychological stress (white coat effect), disrupting cardiovascular homeostasis, which can be taken care by point-of-care cloud computing system to facilitate secure patient monitoring. Settings and Design: The device employs MAX30102 sensor to collect peripheral pulse signal using photoplethysmography technique. …”
    Get full text
    Article
  16. 9396

    Global FRAND-Licensing by EU National Courts: The Winner Asks Them All? – On Global SEP Disputes and International Jurisdiction by Stefanie Krome

    Published 2023-06-01
    “…Parties are fighting to secure jurisdictions for a judicially determined portfolio FRAND licence by seeking anti-suit-injunctions or anti-anti-suitinjunctions (and so on). …”
    Get full text
    Article
  17. 9397

    Comparative Analysis of Visual Field Characteristics and Perceptual Processing in Peripheral Vision Between Virtual Reality and Real World by Dan Bürger, Marc-Kevin Schley, Hannes Loerwald, Stefan Pastel, Kerstin Witte

    Published 2024-01-01
    “…In various domains, virtual reality (VR) has emerged as a valuable tool for simulating specific scenarios and facilitating training within controlled and secure conditions. As peripheral vision plays a crucial role in numerous contexts, it must be duly considered in VR simulations. …”
    Get full text
    Article
  18. 9398

    RUSSIAN-ARAB COOPERATION BEFORE AND AFTER THE "ARAB SPRING" by M. A. Sapronova

    Published 2014-06-01
    “…Ultimately, the firm position of Russia on the Syrian issue secured her role as an important political player in the Middle East. …”
    Get full text
    Article
  19. 9399

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  20. 9400

    Russia-India cooperation on Post-American Afghanistan by Ivan Safranchuk, Alexandre Knyazev

    Published 2023-05-01
    “…Both countries are interested in a stable and secure Afghanistan, and both may be willing to accept Taliban rule, subject to certain conditions, if it helps achieve that goal. …”
    Get full text
    Article