Showing 4,201 - 4,220 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 4201

    Masked and Unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race. by Mabirizi, Vicent, Ampaire, Ray Brooks, Muhoza, Gloria B.

    Published 2023
    “…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
    Get full text
    Article
  2. 4202

    Masked and unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race. by Mabiriz,I, Vicent, Ampaire, Ray Brooks, Muhoza, B. Gloria

    Published 2024
    “…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
    Get full text
    Article
  3. 4203

    Technological requirements and challenges of body area networks by Jinzhao LIN, Tong BAI, Guoquan LI, Yu PANG

    Published 2018-09-01
    “…With the development of ubiquitous networks and huge requirements of tele-medicine,an emerged new technology of body area network (BAN) has attracted extensive attention.BAN system could be used for medical,personal health and entertainment applications by implanting wireless sensors into or around the human body,which realized real-time detection and diagnosis of physical vital signs.However,BAN had more stringent requirements on power consumption,quality of service (QoS),security performance and other specifications.Based on its technological requirements,the research status and development trends of key technologies were discussed deeply,such as information perception of vital signs,wireless transmission,information security and integrated circuit design,and the faced challenges in applications were analyzed.…”
    Get full text
    Article
  4. 4204

    McEliece public key cryptosystem attack algorithm based on enumeration error vector by Jing-mei LIU, Yan-li WANG, Bin LIANG, Lin-sen ZHAO

    Published 2014-05-01
    “…The research on the security of McEliece (M) public key cryptosystem was presented. …”
    Get full text
    Article
  5. 4205

    Lightweight authentication protocol for RFID by Bing CHEN, Jia-qi ZHENG

    Published 2013-08-01
    “…LAP is based on the generalized inverse matrix and only uses CRC checksum, some matrix and simple logic operations to satisfy the principles of balancing security, privacy and cost. The comparisons of security, privacy and performance with other authentication protocols show that LAP is feasible for RFID tags with requirements of low cost and resource-constrained.…”
    Get full text
    Article
  6. 4206

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…We argue that the approach is able to support secure end-to-end communication in wireless sensor networks.…”
    Get full text
    Article
  7. 4207

    An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection by Wei Chen

    Published 2014-01-01
    “…In this paper, under the assumption that security returns are given by experts’ evaluations rather than historical data, we discuss the portfolio adjusting problem which takes transaction costs and diversification degree of portfolio into consideration. …”
    Get full text
    Article
  8. 4208

    Lattice-based verifiable timed signature and application by CHEN Huiyan, WANG Qingnan, WANG Ke, TAN Shuncong, XIN Hongcai

    Published 2024-10-01
    “…As a result, it exhibited exemplary security performance. Moreover, LVTS could be seamlessly integrated into electronic auction protocols (LVTS-EA) to enhance efficiency, security, and fairness in auction proceedings, offering an innovative and pragmatic solution for the electronic auction domain.…”
    Get full text
    Article
  9. 4209

    Development status and trend of space information network and laser communication by Huilin JIANG, Qiang FU, Yiwu ZHAO, Xianzhu LIU

    Published 2019-06-01
    “…An integrated space-earth information network is an important symbol of a strong country in science and technology.According to China’s overall plan,an information network with global coverage,on-demand services,local access and security and credibility will be built by 2030 to serve national defense and social development.Space laser communication is an important means to realize high speed information transmission and security.Firstly,space-earth integration network was introduced from three aspects:concept connotation and system architecture,research status and development trend,overall goal and main difficulties.Then,the concept,characteristics,research status and development trend of space laser communication were summarized in order to provide useful reference for the construction of space-earth integrated information network in China.…”
    Get full text
    Article
  10. 4210

    Research on collaborative resource optimization technology based on convergence of computing, control and communication in Internet of vehicles by Zhilong ZHANG, Tianqi ZHANG, Xuefei LI, Danpu LIU

    Published 2023-04-01
    “…Internet of vehicles is highly dynamic and has diverse application types, including both security and non-security applications.How to satisfy differentiated requirements at the same time is one of the major challenges that Internet of vehicles face.Therefore, the convergence of computing, control and communication in Internet of vehicles was investigated, and the necessity of the collaborative management of multi-dimensional resources was outlined to improve both the driving safety and the quality of experience.Specifically, the control and communication convergence mechanism for autonomous driving, the computing and communication resource collaborative management mechanism for infotainment application, and the multi-dimensional resource collaborative management mechanism for differentiated application concurrency were introduced respectively according to the application characteristics.Finally, the technology development trend of this field was discussed based on related challenge analysis.…”
    Get full text
    Article
  11. 4211

    Une doctrine implicite de la déterritorialisation by Frédéric Giraut

    Published 2009-12-01
    “…The implicit doctrine promote control and closed boundaries in the field of security and migrations but selective sovereignty for economic purpose to the profit of the power strongholds which assign peripheries to a function of exploitable and secured spaces.…”
    Get full text
    Article
  12. 4212

    Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage by ZHANG Xiaoxu, CHEN Yuchen, HA Guanxiong, JIA Chunfu

    Published 2024-09-01
    “…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
    Get full text
    Article
  13. 4213

    Définir l’ennemi national. La restauration sécuritaire du président égyptien al-Sisi by Laure Guirguis

    Published 2016-12-01
    “…Muslim-Christian Unity; in the name of security, it steadily reproduces an enemy within.…”
    Get full text
    Article
  14. 4214

    Design and implementation on remote disaster recovery system based on Goldengate by Zhengyu MI

    Published 2018-04-01
    “…As telecom business-critical systems become more and more important,the demand for IT classes has also increased.The IT system should be more reliable,faster and easier to use and to adapt better to changing business needs.On the other hand,the security risks are also increasing.The concept of synchronous replication technology and the realization theory of Goldengate was focused on,the characteristics and advantages of the technology were discussed.Through the analysis of actual cases,the feasibility of using Goldengate data replication technology was verified,the data real-time backup was realized,the core database security was ensured while avoiding the introduction of too many categories software,and the complexity of operation and cost inputs was reduced,also it is conducive to the recovery of disaster recovery system and real-time switching.…”
    Get full text
    Article
  15. 4215

    Open service platform for IoT by Hao RONG, GLingyun JIAN

    Published 2016-02-01
    “…In addition,a usage authorization mechanism was proposed to support security and privacy in the IoT environment, contributing to a scalable,secure and reliable intelligence open service platform for IoT.Finally,a prototype system was designed and concrete system was given to verify the feasibility and superiority of the proposed architecture.…”
    Get full text
    Article
  16. 4216

    Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization by Shu-Ying Wang, Jian-Feng Zhao, Xian-Feng Li, Li-Tao Zhang

    Published 2016-01-01
    “…In view of the digital image transmission security, based on laser chaos synchronization and Arnold cat map, a novel image encryption scheme is proposed. …”
    Get full text
    Article
  17. 4217

    A differential game model of intrusion detection system in cloud computing by Zhi Li, Haitao Xu, Yanzhu Liu

    Published 2017-01-01
    “…The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. …”
    Get full text
    Article
  18. 4218

    Progress of research on privacy protection for data publication and data mining by Jiao WANG, Ke-feng FAN, Yong WANG

    Published 2016-01-01
    “…So it is particularly important to improve the security of data and protect the useful data to avoid being disclosed. …”
    Get full text
    Article
  19. 4219

    «HYBRID WAR» OF NOTIONS by O. Fridman

    Published 2016-10-01
    “…Ofer Fridman holds the degrees of BA (Military History and Security Studies) from Hebrew University, MA (Counter-Terror and Homeland Security) from Interdisciplinary Center Herzliya and PhD (Political Science, supervised by Prof. …”
    Get full text
    Article
  20. 4220

    Efficient ID-based certificateless signature scheme by LIU Jing-wei, SUN Rong, MA Wen-ping

    Published 2008-01-01
    “…Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
    Get full text
    Article