Showing 4,601 - 4,620 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 4601

    Design, Simulation, and Experimental Verification of a Destruction Mechanism of Transient Electronic Devices by Yu Xiao, Zhengyuan Zhang, Xiyi Liao, Feiyu Jiang, Yan Wang

    Published 2020-01-01
    “…To quickly destroy electronic devices and ensure information security, a destruction mechanism of transient electronic devices was designed in this paper. …”
    Get full text
    Article
  2. 4602

    Sustainable food management systems in pesantren by Nuryana Zalik, Haryadi Hari, Rahman Arif, Ichsan Yazida, Saifuddin Much Fuad, Aziz Muhammad Thariq, Herdian

    Published 2024-01-01
    “…Pesantren, Islamic boarding schools in Indonesia, play a crucial role in the education and well-being of students, making the implementation of sustainable food systems vital for enhancing food security and nutrition. This study aims to provide a comprehensive bibliometric analysis of sustainable food management systems in pesantren using data from the Scopus database. …”
    Get full text
    Article
  3. 4603

    Financial Inclusion and Women Empowerment in Uganda A Case of Lango Sub Region, Northern Uganda by Eton, Marus, Fabian, Mwosi, Benard, Patrick Ogwel, Charles Edaku, Dennis, Obote

    Published 2018
    “…The study therefore recommended that Government should establish buffers to serve as collateral security for women who intend to secure financial credit. …”
    Get full text
    Article
  4. 4604

    Understanding, anticipating and managing health risks linked to climate migration by François Gemenne

    Published 2025-01-01
    “…Migration can improve the health and security of refugees, but also more broadly the health and security of people in host and home countries.…”
    Get full text
    Article
  5. 4605

    THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION by O. A. Selivanov

    Published 2015-03-01
    “…The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. …”
    Get full text
    Article
  6. 4606

    Privacy-preserving digital rights management scheme in cloud computing by Qin-long HUANG, Zhao-feng MA, Jing-yi FU, Yi-xian YANG, Xin-xin NIU

    Published 2014-02-01
    “…Compared with existing DRM schemes in cloud computing, the proposed scheme which not only protects the data security and user privacy, but also supports fine-grained access control, and supports online and super-distribution application modes, is more applicable in the copyright protection for cloud computing.…”
    Get full text
    Article
  7. 4607
  8. 4608

    Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles by Min Yang, Yong Feng, Xiaodong Fu, Qian Qian

    Published 2019-07-01
    “…The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme.…”
    Get full text
    Article
  9. 4609

    Cache privacy protection strategy in content centric networking by Yi ZHU, Zheng-kun MI, Wen-nai WANG

    Published 2015-12-01
    “…Cache privacy leak was one of the important security threats of CCN,the adversary could obtain the legitimate user’s privacy information through probing cache visiting time.Aiming at this security problem,the privacy and non-privacy contents were dealt separately,then a cache privacy protection strategy based on recent visiting information and evicted copy up (CPPS-RVI&ECP) was proposed.In order to compare with the current typical defense strategy-random first k delay (RFKD),the theoretical analysis of privacy leak probability and network hit probability are further given.The CPPS-RVI&ECP identifies the recent visitor by setting privacy mark in interest packet,decreases the privacy leak probability by selecting replacing position randomly,and promotes the network performance by the mechanism of shifting evicted copy upstream.The numeric analysis results under the prescribed experimental conditions show that,whereas the ideal privacy protection ability of RFKD is obtained at the expense of sacrifice of cache contents delivery capability,the proposed CPPS-RVI&ECP can obtain low privacy leak probability and in the meantime maintain high network hit probability by setting reasonable upstream shifting probability.…”
    Get full text
    Article
  10. 4610

    Using Genetic Algorithms for Navigation Planning in Dynamic Environments by Ferhat Uçan, D. Turgay Altılar

    Published 2012-01-01
    “…The proposed algorithm may respond to the concurrent constraint updates in a shorter time for dynamic environment. The most secure navigation of the air vehicle is planned and executed so that the fuel consumption is minimum.…”
    Get full text
    Article
  11. 4611

    Democracy and Fake News in the Age of Cyberspace by Mariam Mohammed, Adem Bölükbaşı

    Published 2020-12-01
    “…For this purpose, we first discussed the social contract theory, which deals with the peaceful and secure coexistence of societies. Then, the relationship between the spread of fake news in cyberspace and the cyber security system that needs to be created against it and the social contract that needs to be rebuilt in today's societies are mentioned. …”
    Get full text
    Article
  12. 4612

    Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE by Yatao YANG, Xinguang HAN, Jierun HUANG, Yang ZHAO

    Published 2019-11-01
    “…In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol,a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed.Through the design of C commitment function,the real identity information of two participants involved was hidden.Based on RLWE difficult problem,under the premise to ensure identity anonymity,this protocol not only completed two-way identity authentication,but also ensured the integrity of the transmitted message,furthermore,the shared session key was negotiated.After been analyzed,in terms of protocol’s execution efficiency,only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme.Compared with Ding’s protocol,the length of public key was reduced by nearly 50%.With regard to security,the protocol could resist forgery,replay,key-copy,and man-in-the-middle attacks.It is proved that the proposed protocol satisfies the provable security under the eCK model.At the same time,the protocol is based on the RLWE problem of lattices,and can resist quantum computing attacks.…”
    Get full text
    Article
  13. 4613

    Prediction and Analysis of Saltwater Intrusion in Pearl River Estuary Based on Machine Learning by DU Boheng, ZHANG Jingwen, KANG Zheng, CHEN Yifan, HUANG Hanliang, LIN Kairong, XIAO Mingzhong

    Published 2025-01-01
    “…To enhance the water supply security of coastal cities, it is necessary to analyze and predict saltwater intrusion. …”
    Get full text
    Article
  14. 4614
  15. 4615

    Integrating artificial intelligence into healthcare systems: opportunities and challenges by Bongs Lainjo

    Published 2024-10-01
    “…To address these concerns, healthcare organizations must promote a culture of accountability, ensuring that healthcare providers remain vigilant about patient data security. Overall, the article underscores the potential of AI to revolutionize healthcare while emphasizing the need to address the ethical, technical, and security challenges it brings.…”
    Get full text
    Article
  16. 4616

    WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY by Dragan Simić, Dragan Živojinović

    Published 2019-11-01
    “…Many critics of Donald Trump argue that Donald Trump’s Grand Strategy is an absence of Grand Strategy or that his foreign and security policy is driven by impulses and tactical approach. …”
    Get full text
    Article
  17. 4617

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  18. 4618

    Federated learning-based user access strategy and energy consumption optimization in cell-free massive MIMO network by Yuanyuan YAO, Yiqiu LIU, Sai HUANG, Chunyu PAN, Xuehua LI, Xin YUAN

    Published 2023-10-01
    “…To solve the problem that how users choose access points in cell-free massive multiple-input multiple-output (CF-mMIMO) network, a prioritized access strategy for poorer users based on channel coefficient ranking was proposed.First, users were evaluated and ranked for their channel quality and stability after channel sensing, and suitable access points were selected in sequence according to the order of the channel state information.Second, considering issues such as users' energy consumption and data security, a federal learning framework was used to enhance user's data privacy and security.Meanwhile, an alternating optimization variables algorithm based on energy consumption optimization was proposed to optimize the multi-dimensional variables, for the purpose of minimizing the total energy consumption of the system.Simulation results show that compared with the traditional user-centric in massive MIMO, the proposed access strategy can improve the average uplink reachable rate of users by 20%, and the uplink rate of users with poor channels can be double improved; in terms of energy consumption optimization, the total energy consumption can be reduced by much more than 50% after optimization.…”
    Get full text
    Article
  19. 4619

    TERRORISM AND POLITICS IN NIGERIA by MUHAMMED GADDAFI YUSUF

    Published 2023-12-01
    “…It concludes by highlighting the imperative for a multidimensional approach to address these complexities and collaboratively work towards a more secure and peaceful Nigeria. …”
    Get full text
    Article
  20. 4620

    Urbanisation et viabilité de l'activité maraîchère : cas d'une ville à statut particulier au Bénin (Parakou) by Guy Nouatin, François-Xavier Bachabi

    Published 2010-09-01
    “…None of them gave a guarantee to the market gardeners for undertaking sustainable investment because they don't have any secured property title. It appears also that, nothing is made to facilitate the development of market production that assures people food security in Parakou.…”
    Get full text
    Article