Showing 8,561 - 8,580 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 8561

    An Enhanced Drone Technology for Detecting the Human Object in the Dense Areas Using a Deep Learning Model by Mohamad Reda A. Refaai, Dhruva R. Rinku, I. Thamarai, null S. Meera, Naresh Kumar Sripada, Simon Yishak

    Published 2022-01-01
    “…Rescue operations and forest monitoring, for example, demand a large security camera, making the drone a perfect tool for executing intricate responsibilities. …”
    Get full text
    Article
  2. 8562

    Ethical aspects of educational activity in the digital environment: future teachers’ views by Ol'ga A. Katushenko

    Published 2023-12-01
    “…The research also presents the principles of work organization in the digital environment: fairness; transparency; honesty; security and privacy. The material presented in this paper is useful for the teaching process in pedagogical universities, as well as for current teaching staff and future teachers for monitoring and managing their work in the digital environment.…”
    Get full text
    Article
  3. 8563

    Institutional role of the prosecutor's office in preventing and combating corruption in the National Anti-Corruption Bureau of Ukraine: delimitation of powers and ways to improve t... by P. Yu. Korniiets

    Published 2021-12-01
    “…The powers of the prosecutor's office to prevent and combat corruption in NABU have been grouped: representative, supervisory, security and law enforcement. In order to ensure the effective functioning of the SAP, in particular on the prevention and combating of corruption in NABU, the author's version of Section 3 of the Regulation on the Specialized Anti-Corruption Prosecutor's Office of the Prosecutor General's Office has been proposed.…”
    Get full text
    Article
  4. 8564

    Enhancing global model accuracy in federated learning with deep neuro-fuzzy clustering cyclic algorithm by Chin-Feng Lai, Ying-Hsun Lai, Ming-Chin Kao, Mu-Yen Chen

    Published 2025-01-01
    “…However, federated learning faces several challenges, including heterogeneous devices, data security, data heterogeneity, communication costs, and training time costs. …”
    Get full text
    Article
  5. 8565

    Internal Fixation of Type I Capitellum Fracture with Headless Screws: A Case Report by Charlie Sanjaya, I Ketut Gede Arta Bujangga

    Published 2021-09-01
    “…In this case, we performed open reduction, secured two headless screws, which allow rigid fixation at the fracture site, provide fracture site compression through variable thread pitch design, and remained not removed later. …”
    Get full text
    Article
  6. 8566

    On the issue of the development of criminological science in Ukraine by T. A. Shevchuk

    Published 2022-12-01
    “…The article discusses the main directions of development of criminological science in conditions of social instability, and the manifestation of a whole range of destabilizing factors that threaten the national security of Ukraine. These are, first of all, Russian armed aggression against Ukraine, violation of the laws and customs of war, separatism, complete non-compliance with international law, international terrorism, extremism, organized transnational crime and other factors of a destabilizing nature. …”
    Get full text
    Article
  7. 8567

    THE PROBLEM OF TERRITORIAL ZONING OF THE RUSSIAN FEDERATION: DOMESTIC AND INTERNATIONAL ASPECTS by V. A. Gorbanyov, B. I. Kochurov

    Published 2018-09-01
    “…It is shown that Ukraine, Kazakhstan and China represent the greatest environmental danger for Russia.Efficient geographical zoning is a necessary condition for improving the regional economy, and ultimately ensuring national security of the country.…”
    Get full text
    Article
  8. 8568

    Cybersecurity of the municipal infrastructure by S. V. Kaliakin, Yu. M. Onishchenko, V. V. Nosov

    Published 2023-03-01
    “…The impact of the latest information technologies (such as the Internet of Things, artificial intelligence, blockchain) on the development of municipal infrastructure, the use of these technologies to protect critical infrastructure from cyberattacks, their advantages and disadvantages compared to classical security technologies have been considered. Particular attention has been paid to the problems of safe automation of modern city management processes such as automation of traffic control systems, environmental monitoring systems, financial systems, power grids, water and gas supply systems, communication systems, and control systems for wastewater treatment plants. …”
    Get full text
    Article
  9. 8569

    Tracing fineware production in the Neo-Assyrian empire: Neutron activation analysis of common and Palace Ware in the upper Tigris River Valley, Turkey. by Britt E Hartenberger, James A Davenport, Timothy Matney

    Published 2025-01-01
    “…In the Iron Age, the Neo-Assyrian empire (c. 900-600 BC) conquered territory across southwest Asia and established regional capitals along its borders to secure its gains. Governors at these centers oversaw resource extraction and craft production for shipment to the imperial heartland in modern-day northern Iraq. …”
    Get full text
    Article
  10. 8570

    School Leadership and Management in the Age of Artificial Intelligence (AI): Recent Developments and Future Prospects by Turgut Karakose, Tijen Tülübaş

    Published 2024-01-01
    “…These technologies have also proven their capacity to help school leaders manage various technical tasks ranging from the management of food/transportation services, supply of instructional materials, human resource management, security, and student information processing. AI also enables learning analytics, or educational data mining, which allows for taking preventive actions and providing customized education by obtaining comprehensive data from students’ educational activities across a period. …”
    Article
  11. 8571
  12. 8572

    Who is Responsible for Instability in the Democratic Republic of Congo? by G. M. Sidorova

    Published 2014-12-01
    “…Due to governmental weakness, economic backwardness, chronical lack of finance resources, interethnic conflicts, all-round and widely spread corruption of the authorities, the Congolese government at the moment is not able to overcome scores of problems including the problem of security. Assistanceprovided to the DRC by itspartnerssuch as, first of all, the former metropolitan country Belgium, as well as the USA, Great Britain, the Europe Union and China works only in favourof these country-donors. …”
    Get full text
    Article
  13. 8573
  14. 8574

    An Optimized Hyperparameter Tuning for Improved Hate Speech Detection with Multilayer Perceptron by Muhamad Ridwan, Ema Utami

    Published 2024-08-01
    “…This improvement enables more reliable and efficient automated moderation, which is crucial for the integrity and security of digital communication platforms such as Twitter.…”
    Get full text
    Article
  15. 8575

    THE PROBLEMS OF BRINGING RUSSIAN TRADE POLICY IN LINE WITH WTO REQUIREMENTS by M. A. Petrova

    Published 2013-10-01
    “…The article analyzes the role of trade policy in ensuring the competitiveness of the automotive industry – one of the most sensitive to the changes of economic conditions and important for providing national economic security – and finding a balance between the need to regulate the internal market and the implementation of the commitments under WTO. …”
    Get full text
    Article
  16. 8576

    Relationship of Maternal Hemoglobin and the Intergenic Period with Birth Weight by Carlos Alberto Llerena Gómez, Evelyn Carolina Betancourt Rubio, Karen Aracelly Tobar Almendariz

    Published 2024-01-01
    “…<br /><strong>Method:</strong> a descriptive and cross-sectional study was carried out on pregnant women treated at a hospital of the Ecuadorian Social Security Institute during the first semester of 2023. …”
    Get full text
    Article
  17. 8577

    ‘Health Camp’ model: a unique approach for child vaccination in non-state armed actor controlled, inaccessible geographies in Somalia by Mohamed Hussein Kahow, Salad Ahmed Halane, Asma Ali, Rashed Shah

    Published 2024-12-01
    “…The project underscores the critical role of local community-based organizations and clan elders in reaching inaccessible populations through humanitarian negotiation amidst security challenges. The project has achieved significant milestones aligned with national health strategic plans, including progress towards universal health coverage and improved immunization access in Somalia’s most challenging regions.…”
    Get full text
    Article
  18. 8578

    Application of Sustainable Education Innovation in the Integrated Teaching of Theory and Practice Adopted in the Auto Chassis Course by Tzu-Chia Chen, Jiuqi Yu, Amir-Mohammad Golmohammadi

    Published 2022-01-01
    “…After surveying and collecting the security incidents, which occurred in the integrated teaching of theory and practice adopted in the automobile chassis course, the presented reality that teachers were reluctant to accept the integrated teaching of theory and practice, and the deficiencies sensed in the school-enterprise engagement; the researcher firstly obtained the risk priority number (RPN) of each deficiency above via fuzzy failure mode and effect analysis (FFMEA) and accordingly expounded how TRIZ was applied under this circumstance. …”
    Get full text
    Article
  19. 8579
  20. 8580

    Modifications of the maximum expiratory flow in bronchial asthma treatment using Intal and Ketotifeno. by Belkis M. Vicente Sánchez, Nallelys Villanueva Bravo, Luis M. Padrón Velásquez, Marylin Aroche Quintana

    Published 2003-12-01
    “…<strong><br />Results</strong>: They in our patient prevailed the ages of 15- 24 years and of 25- 34 years and the feminine sex, the Salbutamol was the more utilized in the previous treatments, initially the greater number of asthmatic they were classified like moderates and upon concluding the 12mo month the 72.9% they of the total of the pattern behaved like light; they with both treatments improved the courages of FEM, although the group of patient that you received treatment with Intal you showed an improvement in statements security much more rapid. <strong><br />Conclusions:</strong> That patient that they utilized Intal had a more rapid elevation of the FEM.…”
    Get full text
    Article