Showing 3,921 - 3,940 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 3921
  2. 3922

    Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors by Lázaro J. González‐Soler, Marta Gomez‐Barrero, Jascha Kolberg, Leonardo Chang, Airel Pérez‐Suárez, Christoph Busch

    Published 2021-07-01
    “…The experimental results over unknown scenarios taken from LivDet 2011 to LivDet 2017 show that our proposal reduces the top state‐of‐the‐art average classification error rates by up to four times, thereby making it suitable in real applications demanding high security. In addition, the best single configuration achieved the best results in the LivDet 2019 competition, with an overall accuracy of 96.17%.…”
    Get full text
    Article
  3. 3923
  4. 3924
  5. 3925
  6. 3926
  7. 3927

    COMMUNITY POLICING AS A PANACEA FOR MITIGATING ARMED BANDITARY IN CENTRAL NIGERIA by Fidelis Achoba, Peace Oluwatoyin Irefin

    Published 2023-08-01
    “…Findings from this study reveal that the locals should be empowered for enhanced effective and efficient community policing structure as the success of food security can only be guaranteed by security of lives and property. …”
    Get full text
    Article
  8. 3928
  9. 3929
  10. 3930

    Legal bases of material support of militia workers of the Ukrainian SSR in the 20s of the XX century by S. V. Vasyliev

    Published 2021-12-01
    “…The legal acts of the Ukrainian SSR, which established the conditions and amounts of social security and remuneration of militia workers, were studied. …”
    Get full text
    Article
  11. 3931

    Locarno Treaties (1925) in the Context of the Versailles System Transformation as seen from London by E. V. Khakhalkina, V. S. Dzyuba

    Published 2021-04-01
    “…It allows the authors to trace the evolution of approaches by the main British political parties to security issues in Europe. A systematic comparison of views of the Conservative and the Labour party representatives on the Geneva Protocol and the Rhineland Pact shows that by mid-1920s the British political elites advocated for an in-depth transformation of the Versailles order, particularly, through the development of an effective mechanism for maintaining international security. …”
    Get full text
    Article
  12. 3932

    Machine Learning-Integrated Usability Evaluation and Monitoring of Human Activities for Individuals With Special Needs During Hajj and Umrah by Ghadah Naif Alwakid

    Published 2025-01-01
    “…These acts of worship are still very challenging for the mobility, security, and accessibility of people with special needs. …”
    Get full text
    Article
  13. 3933

    Web-Based File Sharing System: A Case Study of Kabale University. by Akandinda, Abraham

    Published 2023
    “…Security, user - friendly and cross platform capability are the main purposes of the new Web-based File Sharing System. …”
    Get full text
    Thesis
  14. 3934

    Wireless VPN network structure and safety protection in the north and south call center of SGCC by Ying ZOU, Yirong WANG, Yanru WANG, Sining WANG

    Published 2016-02-01
    “…The existing access security risks and the cannot-control defects of wireless virtual private network were analyzed,and the solutions for the center were given. …”
    Get full text
    Article
  15. 3935

    Research and application of Internet of things in power transmission and distribution system by Jianming LIU, Ziyan ZHAO, Xiang JI

    Published 2018-03-01
    “…Power industry is the important energy industry which relates to national economy and the people’s livelihood,and it has a significant meaning to ensure safe and stable operation of power transmission and distribution system.Combined with monitor and operation requirement of power transmission and distribution system,application system for monitoring,inspection,security and interactive service of layered power transmission and distribution system was built based on Internet of things technology.Meanwhile,framework and solutions for security system of electricity Internet of things was established,and demonstration project for system verification was established.…”
    Get full text
    Article
  16. 3936

    A detection method of Android system vulnerabilities based on matching by iayuan ZHANGJ

    Published 2016-05-01
    “…Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android users.Android system vulnerabilities were studied,and a rapid detection method of Android system vulnerabilities based on matching was proposed.A script-based vulnerability scanning tool was also designed.Through the evaluation of experiments,the tool is running well.…”
    Get full text
    Article
  17. 3937

    Extended integer tent maps and dynamic hash function by LIU Jian-dong

    Published 2010-01-01
    “…Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance of the middle iteration process of the hash function was enhanced without extending intermediate states.Preliminary security testing indicates that,this hash function has a high degree of security,and it can be realized easily with great rapidity.The algorithm of hash function is an ideal subsititution for traditional hash function.…”
    Get full text
    Article
  18. 3938

    Projet de réaménagement de la réserve non visitable du Laténium (Suisse) by Célestine Donzé

    Published 2014-03-01
    “…In order to restore this space’s function as a secure collections storage area, a reorganization project was launched. …”
    Get full text
    Article
  19. 3939

    On the Front Lines: Helping Military Spouses Thrive in Your Community by Kristen Jowers, Martie Gillen

    Published 2024-01-01
    “…This publication discusses military spouse demographics, military spouse employment, military spouse well-being including food security, financial security, and civilian community belonging, and employment resources and strategies to support military spouses. …”
    Get full text
    Article
  20. 3940

    Predicate-based authenticated key exchange protocol with attribute-hiding by Wen-fen LIU, Jiang-hong WEI, Xue-xian HU

    Published 2012-09-01
    “…To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new protocol could be reduced to GBDH assumption in the modified eCK model.At the same time,for inheriting the security property of attribute-hiding from the inner product encryption scheme,the proposed protocol guarded against disclosure of users’ sensitive information.…”
    Get full text
    Article