293 results found (page 4 of 20)
https://www.academia.edu/128427133/Permissioned_Blockchain_Network_for_Proactive_Access_Co…

…ency clinicians access to sensitive health data, guaranteeing the integrity and security of the data, and generating trust without the need for a trusted third party. Methods To enable proactivity, we apply Long Short Term Memory (LSTM) Neural Networks (NNs) that utilize patient’…

https://www.academia.edu/84665669/Endocrine_disrupting_compounds_in_streams_in_Israel_and_…

… Arbah. Additional waste environmental management affected by the political and security streams flow into the stream along its length from stone cutting instability, and decades of very modest cooperation in water factories and runoff from nearby agricultural areas (Asaf et al., …

https://www.academia.edu/827502/Beyond_Exceptionalism_New_Security_Conceptions_in_Contempo…

Beyond Exceptionalism? New Security Conceptions in Contemporary Switzerland (Contemporary Security Policy) Beyond Exceptionalism? New Security Conceptions in Contemporary Switzerland JONAS HAGMANN The collapse of the traditional Swiss threat image – war between NATO and the Warsa…

https://www.academia.edu/130111058/In_the_factory_of_migratory_risk_Latin_American_women_i…

…m their illegalization as a “migratory risk” by the border police. According to security researchers (Bigo et al., 2011), in airports, the network-border aims, on the one hand, to accelerate the movement of travellers with legitimate means of mobility (Torpey, 2000), the desirabl…

https://www.academia.edu/1269095/Radicalisation_and_media_connectivity_and_terrorism_in_th…

…ct in the post-­9/11 age, in which there f 17 appears to be emerging threats to security and stability in the shape of indi- 18 viduals and groups holding or espousing radical views about religion, ideology, 19 20 21 oo often represented in the media as oppositional to Western va…

https://www.academia.edu/108022047/Performance_and_Power_Efficient_Massive_Parallel_Comput…

…ity, Saudi Arabia. His research inter- Sep. 2005. ests include cloud computing, security in cloud [59] D. Ren and R. Suda, ‘‘Power efficient large matrices multiplication by load computing, storage in cloud computing, parallel scheduling on multi-core and GPU platform with CUDA,’…

https://www.academia.edu/112316883/Topluluk_Destekli_Bal%C4%B1k%C3%A7%C4%B1l%C4%B1k_%C4%B0…

…nsustainably, small-scale fishers' contribution to food production, food security and employment plays an important role as they provide about 40% of global fish catches and employ approximately 90% of individuals working in the capture fisheries sector (FAO, 2015; FAO 2022). SSFs o…

https://your.omahachamber.org/member-news

…l Foundation Golf Outing Jazzi Vogelpohl 4/15/2026 What’s Next in Banking Tech, Security & Operations (Free Event) Future Ops 2026 Secur-Serv 4/13/2026 Before the Next Disruption: A Financial Safety Net Guide for Omaha Small Businesses A financial safety net is a system of reserv…