Showing 9,341 - 9,360 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 9341
  2. 9342

    ‘That’s Enough’ - Workplace Violence Against Physicians, Pharmacists, and Nurses in Saudi Arabia: A Systematic Review of Prevalence, Causes, and Consequences by Alhomoud F

    Published 2025-02-01
    “…Causes included staff shortages, overcrowding, long waiting times, miscommunication, unmet patient demands, insufficient penalties, and inadequate security measures. Responses to WPV varied, with some HCPs reporting incidents and others taking no action. …”
    Get full text
    Article
  3. 9343

    LDWLE: self-supervised driven low-light object detection framework by Xiaoyang shen, Haibin Li, Yaqian Li, Wenming Zhang

    Published 2024-12-01
    “…It plays a significant role in surveillance and security, night pedestrian recognition, and autonomous driving, showcasing broad application prospects. …”
    Get full text
    Article
  4. 9344

    Organisational, legal and financial bases for scientific activity in higher education institutions of the Ministry of Internal Affairs of Ukraine: problems and solutions based on m... by S. O. Serbenyuk, L. S. Nadopta

    Published 2023-09-01
    “…The ideas and proposals for the introduction of new organisational and legal frameworks for scientific research in the system of the Ministry of Internal Affairs of Ukraine are an attempt to introduce a practical mechanism for the rational and most productive use of the scientific potential of departmental institutions and establishments to ensure the security of the State, protection of human rights and freedoms, combating crime, maintaining public safety and order, applying positive foreign experience in these areas, as well as the creation of innovative methods and technologies that can compete with similar achievements in the international scientific space.…”
    Get full text
    Article
  5. 9345
  6. 9346
  7. 9347
  8. 9348
  9. 9349

    Analisis Sentimen pada Opini Pengguna Maskapai Penerbangan Menggunakan Hybrid Cuckoo Search by Nanang Fakhrur Rozi, Fandi Arianto, Dian Puspita Hapsari

    Published 2019-05-01
    “…The quality of services provided by an airline, in terms of safety, security, and convenience, is usually known through passenger opinions. …”
    Get full text
    Article
  10. 9350

    The Performance of Irrigation Schemes in Sudan Affected by Climate Variability and the Grand Ethiopian Renaissance Dam by Shamseddin M. Ahmed, Khalid G. Biro Turk, Hassan Ali Dinar

    Published 2025-01-01
    “…Irrigation schemes represent the backbone of Sudan’s food security and economy. The Gezira, Rahad, and El-Gunied irrigation schemes depend mainly on the Blue Nile as their primary water source. …”
    Get full text
    Article
  11. 9351

    The book policy in a democratic society: the case of Estonia by Mare Lott, Aile Möldre

    Published 2024-08-01
    “…The other rationale for prohibiting books was the protection of national security, which led to the prohibition of some political publications. …”
    Get full text
    Article
  12. 9352

    Effectiveness of Fewer Falls, an online group-based self-management fall prevention programme for people with multiple sclerosis: protocol of a randomised controlled trial by Maria Flink, Charlotte Ytterberg, Kristina Gottberg, Marie Kierkegaard, Susanna Tuvemo Johnson, Elizabeth Walker Peterson, Ulrika Meijer, Johanna Bylinder

    Published 2025-01-01
    “…Study-related information about participants will be stored securely at Karolinska Institutet. The results will be presented in peer-reviewed journals, through the patient organisation Neuro Sweden, at conferences, and in social media.Trial registration number ClinicalTrials.gov, NCT05789225.…”
    Get full text
    Article
  13. 9353

    Transforming Triple Cropping System to Four Crops Pattern: An Approach of Enhancing System Productivity through Intensifying Land Use System in Bangladesh by Md. Aminul Islam, Md. Jahedul Islam, M. Akkas Ali, A. S. M. Mahbubur Rahman Khan, Md. Faruque Hossain, Md. Moniruzzaman

    Published 2018-01-01
    “…Changing three crops pattern to four crops can play a potential role for achieving countries food security. With this view to increase crop productivity, production efficiency, land use efficiency, and economic return through intensifying cropping intensity as well as crop diversity by transforming three crops pattern to four crops, the experiment was conducted in High Ganges River Floodplain Soils under the Agro-Ecological Zone (AEZ) 11 at Pali, Durgapur, under the Multilocation Testing Site, Puthia, Rajshahi, for two consecutive years 2014-15 and 2015-16. …”
    Get full text
    Article
  14. 9354
  15. 9355

    Bør krigen i Ukraina påvirke vårt syn på atomvåpen? by Torgeir E. Fjærtoft

    Published 2025-01-01
    “…To cope with the new security agenda, the Norwegian Ministry of Foreign Affairs needs to upgrade analyses of actors and improve interaction skills. …”
    Get full text
    Article
  16. 9356

    Buffalo feed efficiency: optimizing the use of fibrous biomass carbon to enhance production while mitigating rumen methane emission by Metha Wanapat

    Published 2023-11-01
    “… Buffaloes are one of the important ruminants contributing to food security in the form of meat and milk, as well as their by-products such as skin, horns, and manure. …”
    Get full text
    Article
  17. 9357

    Community perspectives regarding brain-computer interfaces: A cross-sectional study of community-dwelling adults in the UK. by Austen El-Osta, Mahmoud Al Ammouri, Shujhat Khan, Sami Altalib, Manisha Karki, Eva Riboli-Sasco, Azeem Majeed

    Published 2025-02-01
    “…Data analysis involved summarizing responses using frequencies and percentages, with chi-squared tests to compare groups. All data were securely stored and pseudo-anonymized to ensure confidentiality.…”
    Get full text
    Article
  18. 9358

    Pengujian Rule-Based pada Dataset Log Server Menggunakan Support Vector Machine Berbasis Linear Discriminat Analysis untuk Deteksi Malicious Activity by Kurnia Adi Cahyanto, Muhammad Anis Al Hilmi, Muhamad Mustamiin

    Published 2022-02-01
    “…From the information in the logs, it can be used for system security purposes, one of which is by performing analysis using data mining of client activities recorded on the server log. …”
    Get full text
    Article
  19. 9359
  20. 9360