Showing 4,561 - 4,580 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4561

    ON THE QUESTION OF MODERNIZATION AND CREATION OF FORGING AND THERMAL EQUIPMENT OF THE NEW GENERATION by S. S. Tkachenko, V. V. Korobeynikov

    Published 2015-11-01
    “…Three fundamental principles of modern production: Saving resources; Environmental cleanliness; Security. During the reconstruction, re-equipment, modernization and creation of a new thermal equipment, it is necessary to choose units and technologies that provide greater efficiency and higher efficiency equipment, strict compliance with environmental and safety standards.…”
    Get full text
    Article
  2. 4562

    Cost accounting for environmental safety by O. Kovalenko

    Published 2016-04-01
    “…The article describes the main approaches to cost accounting for environmental security, the analysis of methods of cost accounting, proposals for the organization of accounting for the item "Environmental protection measures", systematizing the cost of measures for environmental protection aimed at co-storage and restoration of natural environment, rational use and vosproizvel of natural resources…”
    Get full text
    Article
  3. 4563

    Mobile Internet Trends in 4G Era by Wei Lu, Xiyu Lu

    Published 2014-05-01
    “…An introduction of the mobile internet trends was given on several aspects such as technology, business, industry, social culture and security.…”
    Get full text
    Article
  4. 4564

    Discussion on Artificial Intelligence Safety and Ethical Issues by Chen Xinyu, Hui Tianfang, Li Yanlin, Yang Haoyuan

    Published 2025-01-01
    “…This article explores the development of artificial intelligence technology and its potential safety and ethical challenges in various fields. In terms of security, the risk of adversarial attacks is analyzed in depth, and the robustness of the model is enhanced through adversarial training and data enhancement techniques. …”
    Get full text
    Article
  5. 4565

    Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks by En-tao LUO, Guo-jun WANG, Shu-hong CHEN, Khan-butt PINIAL

    Published 2017-10-01
    “…In order to guarantee the users’ privacy in the process of making friends in the mobile social networks,a new scheme of proxy re-encryption privacy protection in the cross-domain environment was introduced.The scheme employed the cross-domain multi-authority to sharing secret keys,so as to realize the access and shave of the cross-domain users data.And the secret keys of users’ attributes were re-encrypted,based on the technology of the proxy re-encryption and attribute encryption,to achieve the friends matching under the conditions of extending the access policy.Meanwhile,in purpose of enhancing the privacy of users’ data,the technology which contained the separation of users’ privacy ciphertext and secret keys was adopted.Based on that,problems in the existing system such as user data’s inability to be shared cross-cloud,less matching during the process of making friends and users’ inability to make friends when offline had been addressed.Security and experimental analysis show that this scheme can achieve chosen plaintext attack (CPA) security,ensure the privacy of friend discovery,and that is more effective than existing solutions.…”
    Get full text
    Article
  6. 4566

    ASSESSMENT OF THE LEVEL OF SAFETY AND HEALTH AT WORK OF THE 400/220/110/20 kV MINTIA POWER SUBSTATION by Nicolae Daniel FÎȚĂ, Mila Ilieva OBRETENOVA, Adina TĂTAR, Florin MURESAN – GRECU, Gheorghe Eugen SAFTA, Mihai SCHIOPU

    Published 2023-12-01
    “…The development of theory and applications in the field of systems security has provided a scientific basis and useful tools for the work of preventing professional risks. …”
    Get full text
    Article
  7. 4567

    Scan it - get it: A study on the socio-demographic characteristics of consumers using qr codes by Esma Ebru Şentürk

    Published 2024-12-01
    “…It is imperative to develop security measures, conduct awareness studies, and enhance consumers' perceptions of trust in QR codes to facilitate the widespread acceptance of QR codes.…”
    Get full text
    Article
  8. 4568

    The real-time data processing framework for blockchain and edge computing by Zhaolong Gao, Wei Yan

    Published 2025-05-01
    “…However, traditional centralized methods struggle with real-time requirements and data security. This paper introduces VCD-TSNet, a novel real-time IoT data processing framework that combines blockchain and edge computing. …”
    Get full text
    Article
  9. 4569

    Kelekatan dan Kesejahteraan Psikologis Anak dan Remaja: Studi Meta-Analisis by Hepi Wahyuningsih, Resnia Novitasari, Fitri Ayu Kusumaningrum

    Published 2021-01-01
    “…The results show that (1) the correlation effect between secure attachment and positive psychological well-being was significant; (2) the correlation effect of secure attachment with negative psychological well-being indicates a significant value; (3) the correlation effect between avoidance and positive psychological well-being was significant; (4) the correlation effect between avoidance and negative psychological well-being was significant; (5) the correlation effect between anxious and positive psychological well-being was not significant; (6) the correlation effect between anxious and negative psychological well-being was significant; (7) the correlation effect between disorganized with positive psychological well-being was significant; (8) the correlation effect between disorganized and negative psychological well-being was significant. …”
    Get full text
    Article
  10. 4570

    Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration by Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG

    Published 2022-05-01
    “…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
    Get full text
    Article
  11. 4571

    Dataset of digital literacy of university students in Indonesia by Ermida Simanjuntak, Happy Cahaya Mulya, Agustina Engry, Ilham Nur Alfian

    Published 2025-02-01
    “…Data were measured using a digital literacy scale consisting of six subscales: technological skill, personal security skill, critical skill, device security skill, informational skill, and communication skill. …”
    Get full text
    Article
  12. 4572

    Effective deterrence: When is deterrence the "right" strategy for achieving national interests? by Kopanja Mihajlo

    Published 2023-01-01
    “…The research goal of this paper is to determine the circumstances in which the strategy of deterrence is the "right thingˮ for the security of the state. In the pursuit of realizing their own interests - from minimum survival to maximum hegemony, states (in theory) have a wide range of possible ideal-type strategies. …”
    Get full text
    Article
  13. 4573

    Research on VPN service for government and enterprise customers in SDN-based vCPE networks by Fengchao FU, Peng WANG, Yuanbao XIE

    Published 2017-03-01
    “…In addition, fused schemes were proposed to combine the advantages in security, transmission rate and QoS, so that government and enterprise customers can select flexible VPN products according to their own needs in bandwidth, security, delay and others.…”
    Get full text
    Article
  14. 4574

    Statistical Comparison of piracy and armed robbery with emphasis on the South China Sea - Malacca Strait and the Persian Gulf - Strait of Hormuz by Mohammad Ali Zohourian

    Published 2019-12-01
    “…This research allowed us: 1) to make a distinction between the security in two aforementioned areas; 2) to represent the source of the information for researchers.…”
    Get full text
    Article
  15. 4575

    Redactable blockchain supporting trapdoor revocation and limited number of redactions by Yue CHEN, Zenghang HAO, Jianghong WEI, Xuexian HU, Dongmei YANG

    Published 2023-07-01
    “…Aiming at the problem that although the existing redactable blockchain schemes that support trapdoor revocation could revoke the redaction permissions of trapdoor holders, but they were unable to limit the number of redactions using trapdoors, indicating an issue where the management of editing permissions was not adequately refined, a revocable chameleon hash with limited number of redactions was proposed, based on which a new redactable blockchain scheme was proposed.Specifically, the proposed scheme included a master trapdoor, a subordinate trapdoor, and the generated witness.The subordinate trapdoor was deployed for data modification, while the master trapdoor was employed to revoke the subordinate trapdoor, thus accomplishing the objective of revoking editing permissions.Meanwhile, the witness was developed to strictly limit the number of edits via the subordinate trapdoor to one time.The proposed scheme is proved to be secure under the standard complexity assumptions.Theoretical analysis and simulation experiments indicate that the proposed scheme has advantages in terms of security guarantee, when compared with the existing schemes supporting trapdoor revocation.At the same time it introduces little additional computation overhead, and thus has certain practicality.…”
    Get full text
    Article
  16. 4576

    Ureteric Injury due to the Use of LigaSure by Muazzam Tahir, William Gilkison

    Published 2013-01-01
    “…The use of LigaSure has made securing haemostasis and tissue dissection relatively easy especially in laparoscopic surgery; however, if not used with care it can cause damage to the surrounding structures through lateral spread of energy. …”
    Get full text
    Article
  17. 4577

    An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method by Zhen Li, Changgen Peng, Weijie Tan, Liangrong Li

    Published 2021-01-01
    “…Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.…”
    Get full text
    Article
  18. 4578

    An Optimal Routing Framework for an Integrated Urban Power–Gas–Traffic Network by Mohammad Jadidbonab, Hussein Abdeltawab, Yasser Abdel-Rady I. Mohamed

    Published 2024-01-01
    “…The developed non-probabilistic framework provides decision-makers with various secure options to avoid worst-case scenarios and promote social and environmental benefits. …”
    Get full text
    Article
  19. 4579

    Approach of location privacy protection based on order preserving encryption of the grid by Nan SHEN, Chun-fu JIA, Shuang LIANG, Rui-qi LI, Zhe-li LIU

    Published 2017-07-01
    “…The centralized structure of the trusted third party is a major privacy protection structure on location based services.However,if the central third party server can not be trusted or compromised,users have the risk of leakage of privacy location.Aiming at the above problems,location privacy protection approach based on a user-defined grid to hide location was proposed.The system first automatically converted the query area into a user-defined grid,and then the approach utilized order preserving encryption,which made the user’s real-time position in the hidden state could still be compared.Because the information in the process of the approach was in a state of encryption,the server could not know the user’s location information,thus improved privacy protection of the user location.The central third party server only need to do simple comparison work,so its processing time overhead would effectively decrease.Security analysis certificate the security of the proposed approach and simulation experimental show the proposed approach can reduce the time cost of the central third party server.…”
    Get full text
    Article
  20. 4580

    ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data by Xiangyi Meng, Yuefeng Du, Cong Wang

    Published 2025-01-01
    “…However, this shift introduces critical security and privacy risks, as sensitive patient information is stored on untrusted third-party servers. …”
    Get full text
    Article