Results 101 to 110 of about 1,730,729 (295)

Comparative Insights and Overlooked Factors of Interphase Chemistry in Alkali Metal‐Ion Batteries

open access: yesAdvanced Energy Materials, EarlyView.
This review presents a comparative analysis of Li‐, Na‐, and K‐ion batteries, focusing on the critical role of electrode–electrolyte interphases. It especially highlights overlooked aspects such as SEI/CEI misconceptions, binder effects, and self‐discharge relevance, emphasizing the limitations of current understanding and offering strategies for ...
Changhee Lee   +3 more
wiley   +1 more source

Executable Security Policies: Specification and Validation of Security Policies

open access: yes, 2022
Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies.
openaire   +1 more source

Enclosing the Global Plant Genetic Commons [PDF]

open access: yes, 1999
Looks at policies related to the development, use, and control of plant genetic resources, with a focus on property rights in relation to changing technology and its impact on food security in developing ...
Robert W. Herdt
core  

Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich   +3 more
wiley   +1 more source

Security Planning in IT Systems [PDF]

open access: yesInformatică economică, 2006
Security planning is a necessity nowadays. Planning involves policies, controls, timetable and a continuing attention. Policies are the foundation of effective information security.
Radu CONSTANTINESCU
doaj  

Security Policies Approached by Value Analysis Concepts [PDF]

open access: yes
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy.
Florin Buhociu   +2 more
core  

Livestock Tango: U.S. and Latin America Dance Together, but Who Will Lead?

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT This study examines the competitiveness between Latin American and U.S. livestock and meat sectors. We employ a computable general equilibrium modeling framework to evaluate two scenarios: coordinated improvements in Latin American productivity, transport efficiency, and market access (Scenario I), and the minimum productivity gains required ...
Taís C. Menezes   +2 more
wiley   +1 more source

Social Security in Developing Countries: Myth or Necessity? Evidence from India [PDF]

open access: yes
This paper discusses the importance of social security policies in developing economies, using empirical evidence from India. The paper discusses the viability of implementing systems of social protection in developing countries and provides an empirical
Patricia Justino
core  

Synergies in Agricultural Biodiversity Conservation: Decomposing the Interaction Between Nature Parks and Agri‐Environment Schemes

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT Understanding how policy instruments with overlapping goals interact is crucial for leveraging their synergies. This study explores the mechanisms for regional nature parks (a form of protected areas that impose no restrictions on agriculture) to enhance the adoption of biodiversity‐conserving agri‐environment schemes (AES) in Switzerland ...
Yanbing Wang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy