Showing 9,601 - 9,620 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 9601

    Cost-Effectiveness of the CNIC-Polypill Strategy Compared With Separate Monocomponents in Secondary Prevention of Cardiovascular and Cerebrovascular Disease in Portugal: The MERCUR... by Carlos Aguiar, Francisco Araujo, Gabriel Rubio-Mercade, David Carcedo, Silvia Paz, Jose María Castellano, Valentín Fuster

    Published 2022-11-01
    “…The clinical effectiveness of the CNIC-Polypill strategy initially demonstrated in the NEPTUNO study has been recently corroborated in the SECURE trial. The incremental cost of the CNIC-Polypill strategy emerges slightly above the comparator, but willingness-to-pay estimates and sensitivity analyses indicate that the CNIC-Polypill strategy is consistently cost-effective compared with monocomponents and remains within acceptable affordability margins. …”
    Get full text
    Article
  2. 9602

    MARKETS IN CRYPTO-ASSETS AND CAPITAL MARKET by Cristian GHEORGHE

    Published 2024-05-01
    “…Member States shall notify those competent authorities to EBA (European Banking Authority) and ESMA (European Securities and Markets Authority).…”
    Get full text
    Article
  3. 9603

    Radiologic placement of totally implantable venous access devices: Outcomes and complications from a large oncology cohort by Sonam Tashi, Alfred Bingchao Tan, Jasmine Ming Er Chua, Gek Hsiang Lim, Nanda Venkatanarasimha, Sivanathan Chandramohan

    Published 2025-01-01
    “…Method: Data from January 2019 to January 2022, obtained from a hospital-approved secure database application called the Research Electronic Data Capture registry, were reviewed and analysed retrospectively. …”
    Get full text
    Article
  4. 9604

    Jidoka-DT simulator programmed by hybridize XGboost-LSTM to evaluate helmets quality produced by Rice-Straw-alumina plastic dough to resist shocks and impenetrable by Ahmed M. Abed, Ahmed Fathy, Radwa A. El Behairy, Tamer S Gaafar

    Published 2025-03-01
    “…There is no escape from securing the head with a helmet that can withstand these shocks and is impenetrable. …”
    Get full text
    Article
  5. 9605

    STEP 1: The Scottish Trauma & Orthopaedics Equality Project: demographics and working patterns of a national workforce by Monu Jabbal, Jennifer Cherry, Deborah Eastwood, Chloe E. H. Scott, Phil Walmsley, Emily Baird

    Published 2025-01-01
    “…Methods: A questionnaire devised by a working group was delivered by the Client Analyst and Relationship Development (CARD) group. Utilizing a secure third party ensured anonymity for all respondents. …”
    Get full text
    Article
  6. 9606

    Feasibility and accuracy of CARLO© guided optic canal unroofing by Schicker Martina, Tu Ha Thanh, Luder Yann, Morawska Marta, Röthlisberger Michel

    Published 2024-09-01
    “…The experiment utilized five fresh frozen skulls, securely fixed in a Mayfield clamp to ensure a stable experimental setup. …”
    Get full text
    Article
  7. 9607

    For Carlos Castillo-Chavez by Dean Evasius

    Published 2013-07-01
    “…Your legacy as a researcher and educator is already secure and it continues to grow. The immortality of your impact is assured by the timelessness of your research, and through the many alumni of your programs who are now making important contributions of their own. …”
    Get full text
    Article
  8. 9608

    Forage harvesting using branch pruning compromises sustainable use and conservation of Pterocarpus erinaceus Poir., an endangered species by Bossila Séraphin Hien, Loyapin Bondé, Mohamed Mahamoud Charahabil, Sié Sylvestre Da, Joseph Issaka Boussim, Oumarou Ouédraogo

    Published 2025-02-01
    “…Allometric model developed is a useful tool for optimizing harvesting activities and secure sustainable use of the species. Based on the harvesting pressure observed on the species, the promotion of more conservative harvesting techniques such as cutting of leafy twigs for forage harvesting instead of branch pruning and preserving of heavy pruned trees from harvesting during few years are highly recommended for enabling fast renewal of branches and seed production for species regeneration. …”
    Get full text
    Article
  9. 9609

    Structural equation modeling for social capital empowerment in supporting mangrove rehabilitation by I. Listiana, D. Ariyanto

    Published 2024-10-01
    “…This fosters self-confidence and allows them to voice their aspirations, secure their livelihoods, engage in social endeavors, and face life independently. …”
    Get full text
    Article
  10. 9610

    Silicone Foley's catheter: A useful splint in ear surgeries by Siddharth K. Karanth, Nitin J. Mokal

    Published 2008-02-01
    “…The catheter was looped into a circle around the base of the reconstructed ear and secured in position with a suture. A similar construct was used in cases of external auditory meatus reconstruction or recanalization. …”
    Get full text
    Article
  11. 9611

    Registered Nurses' Experience of Person‐Centred Care Through Digital Aids in Primary Care Setting During the COVID‐19 Pandemic by Annika Kjällman Alm, Ove Hellzen, Malin Rising‐Holmström

    Published 2025-01-01
    “…Registered nurses within primary care settings had to adjust to new meeting forums with patients and in collaborations with other organisations to transfer patients from hospital to home care in a safe and secure manner using digital aids. Design Interviews with 17 registered nurses within primary care settings were conducted. …”
    Get full text
    Article
  12. 9612

    Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online by Ferzha Putra Utama, Gusman Wijaya, Ruvita Faurina, Arie Vatresia

    Published 2023-10-01
    “…This study proposes applying several cryptographic methods to secure and ensure the authenticity of online exam data using AES 256 CBC, Base 64, and SHA 256 algorithms. …”
    Get full text
    Article
  13. 9613

    A novel approach to multi-objective portfolio selection: modeling emerging financial markets using satisfaction functions and fuzzy values by Milad Saleki, Mohamad Saber Falah Nejad, Davood Shishebori, Mohammad Aref Dehghani Tafti

    Published 2024-11-01
    “…Purpose: Generally, selecting an investment portfolio with appropriate returns that is also secure and auditable has been one of the issues raised in recent decades. …”
    Get full text
    Article
  14. 9614

    The quality of education of the Russian political elite by N. N. Meshcheryakova, O. V. Kryshtanovskaya

    Published 2023-12-01
    “…The authors rely on two semantic concepts: “elite education” (based on the principles of selectivity and academic excellence) and “elitist” (aimed at preparing the establishment, forming social ties and securing status). The goal is to answer a series of interrelated questions. …”
    Get full text
    Article
  15. 9615

    In silico methods for immunogenicity risk assessment and human homology screening for therapeutic antibodies by Aimee E. Mattei, Andres H. Gutierrez, Soorya Seshadri, Jacob Tivin, Matt Ardito, Amy S. Rosenberg, William D. Martin, Anne S. De Groot

    Published 2024-12-01
    “…To facilitate larger scale analyses and accelerate preclinical immunogenicity risk assessment, our group developed an integrated web-based platform called ISPRI, (Immunogenicity Screening and Protein Re-engineering Interface) that provides hands-on access through a secure web-based interface for scientists working in large and mid-sized biotech companies in the US, Europe, and Japan. …”
    Get full text
    Article
  16. 9616

    Principles to award learning achievements for lifelong learning in health using micro-credentials: an international Delphi study by Sharon Mitchell, John Hart, Muntaha Gharaibeh, Graham T. McMahon, Anthea Rhoda, Siobhan Fitzpatrick, Tana Wuliji, Janusz Janczukowicz

    Published 2025-02-01
    “…There was also consensus that the characteristics of a valid digital award or micro-credential should be portable, standardised, secure, interoperable, stackable and verifiable. Conclusions The growing body of literature on micro-credentialing highlights its potential as a method to recognise learning achievements. …”
    Get full text
    Article
  17. 9617

    African agri-entrepreneurship in the face of the COVID-19 pandemic by Mariam A. T. J. Kadzamira, Adewale Ogunmodede, Solomon Duah, Dannie Romney, Victor Attuquaye Clottey, Frances Williams

    Published 2023-06-01
    “…Any such support package should include support for agri-SMEs to develop sustainable marketing strategies and help them secure flexible financing that considers payment deferrals and debt moratorium during bona fide market shocks such as the COVID-19 pandemic.…”
    Get full text
    Article
  18. 9618

    Improving the Teaching of Persian Verse Literature for non-Persian Speakers: A Comprehensive Evaluation of Educational Materials by Amirreza Vakilifard, Fatemeh Janatirad, Zoya Rezaei Mahalati

    Published 2024-12-01
    “…Furthermore, the domains of listening, speaking, reading, and writing skills also secure a prominent position in the hierarchy of desirability. …”
    Get full text
    Article
  19. 9619

    Criminological analysis of the state and particularities of determination of the illegal possession of vehicles in Ukraine under conditions of armed aggression by Yu. B. Danylchenko

    Published 2023-06-01
    “…The mass displacement of citizens from the northern, eastern and southern regions of Ukraine to the western region has created a shortage of secure, properly equipped parking spaces, making it easier for criminals to gain access to vehicles.…”
    Get full text
    Article
  20. 9620

    Healthcare Futures: Opportunities, Challenges and Risks in a Blockchain-Driven Environment by Robert Goldberg, Peter J. Pitts, Jennifer Hinkel

    Published 2024-12-01
    “…By leveraging smart contracts, which automate transactions and ensure trust through pre-defined algorithms, the platform offers a seamless and secure environment for managing complex healthcare data and financial instruments. …”
    Get full text
    Article