Showing 4,781 - 4,800 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4781

    Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method by Udaya Suriya Raj Kumar Dhamodharan, Rajamani Vayanaperumal

    Published 2015-01-01
    “…Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. …”
    Get full text
    Article
  2. 4782

    Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya) by Morad Kaviani Rad, Hadi Aazami, Majid Rasouli, Ahmad Bakhshi

    Published 2018-03-01
    “…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of  fundamentalist terrorist groups has attracted a large part of the world's security literature.  …”
    Get full text
    Article
  3. 4783

    Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment by Byunggil Lee, Namje Park

    Published 2014-01-01
    “…And the vessel traffic information requires high security since it is highly protected by the countries. …”
    Get full text
    Article
  4. 4784

    ORGANIZATIONAL AND LEGAL ASPECTS OF THE REGULATION OF LABOR RELATIONS OF AN EDUCATIONAL ORGANIZATION AND AN ADVISER TO THE DIRECTOR OF EDUCATION by Elena V. Bezvikonnaya, Andrey A. Savkin

    Published 2024-07-01
    “…Law enforcement practice demonstrates problems in the field of concluding an employment contract and its essential conditions, securing a list of labor functions, securing a position in the staffing table, calculating wages, etc. …”
    Get full text
    Article
  5. 4785

    South Africa after 30 years of democracy: Land claims and transitional justice in the spotlight by Pulane Adelaide Molomo, Bekithemba Dube

    Published 2024-12-01
    “…Transitional justice is a universal strategy employed worldwide to secure peace and avoid warfare when an authoritarian regime is succeeded by democratic rule. …”
    Get full text
    Article
  6. 4786

    Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things by Jianrong Wang, Pan Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang

    Published 2022-11-01
    “…Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.…”
    Get full text
    Article
  7. 4787

    Quantum Private Comparison Protocol with Cluster States by Min Hou, Yue Wu

    Published 2025-01-01
    “…In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their private information. …”
    Get full text
    Article
  8. 4788

    A one health approach to plant health by Vivian Hoffmann, Birthe Paul, Titilayo Falade, Arshnee Moodley, Navin Ramankutty, Janice Olawoye, Rousseau Djouaka, Elikana Lekei, Nicoline de Haan, Peter Ballantyne, Jeff Waage

    Published 2022-09-01
    “…In this opinion piece, based on a webinar of the same name, we argue that a One Health perspective can help optimize net benefits from plant protection, realizing food security and nutrition gains while minimizing unintentional negative impacts of plant health practices on people, animals and ecosystems. …”
    Get full text
    Article
  9. 4789
  10. 4790

    Dynamic Simulation Analysis of the Start-up Process of Take-up Device of the Belt Conveyor by Li Dongmei, Zhao Shiming

    Published 2017-01-01
    “…The dynamic characteristic of the belt conveyor in the start-up operating condition is analyzed,the dynamic simulation analysis of the take-up device of the belt conveyor started by the styles of the combined cycloid,Nordell and equal acceleration and the optimization simulation analysis of the pulling force are carried out,the oversize and the undersize of local stress in the belt is prevented,so that the security and reliability of the belt conveyor can be ensured.…”
    Get full text
    Article
  11. 4791

    Making Simple Repairs: Holes in the Wall by Mary N. Harrison

    Published 2019-05-01
    “… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
    Get full text
    Article
  12. 4792

    Research on naming and addressing technology of the Internet of things by Lingyun JIANG, Yanru MU, Hongbo ZHU

    Published 2018-09-01
    “…With the rapid development of Internet of things,traditional naming and addressing schemes such as IP and URI are facing many challenges,including mobility,security and scalability,etc.In such context,the research progress of naming and addressing technology based on traditional network architecture and future network architecture was described.Then the development trend and core problems in this field were discussed.It was expected to be helpful for the domestic research in the related field.…”
    Get full text
    Article
  13. 4793

    Asymmetric Information and Quantization in Financial Economics by Raymond J. Hawkins, B. Roy Frieden

    Published 2012-01-01
    “…We illustrate the utility of this approach by deriving arbitrage-free derivative-security dynamics.…”
    Get full text
    Article
  14. 4794

    Profiles of the Hard to Employ and the Implications for Job Success by Elizabeth B. Bolton

    Published 2003-03-01
    “… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
    Get full text
    Article
  15. 4795

    Countermeasures to promote the systematic construction of the military IoT by Shibin LAN, Wenxiang XIA

    Published 2018-06-01
    “…The military Internet of things (MIoT) is an important part of the military network information system.Based on this,the significance of MIoT systematic construction were described firstly.Then the main contents of construction of MIoT was provided,such as sensing network system,public architecture service system,standard specification system,security system and demonstration project.Finally,the countermeasures of promoting the systematic construction of MIoT were discussed.…”
    Get full text
    Article
  16. 4796

    Employer Sponsored Retirement Savings Plans by Rachel Dorman, Lisa M. Leslie, Michael S. Gutter, Martie Gillen, Josephine Turner

    Published 2012-05-01
    “…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
    Get full text
    Article
  17. 4797

    Employer Sponsored Retirement Savings Plans by Rachel Dorman, Lisa M. Leslie, Michael S. Gutter, Martie Gillen, Josephine Turner

    Published 2012-05-01
    “…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
    Get full text
    Article
  18. 4798

    Making Simple Repairs: Holes in the Wall by Mary N. Harrison

    Published 2019-05-01
    “… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
    Get full text
    Article
  19. 4799

    Profiles of the Hard to Employ and the Implications for Job Success by Elizabeth B. Bolton

    Published 2003-03-01
    “… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
    Get full text
    Article
  20. 4800

    Adversarial attack and defense on graph neural networks: a survey by Jinyin CHEN, Dunjie ZHANG, Guohan HUANG, Xiang LIN, Liang BAO

    Published 2021-06-01
    “…For the numerous existing adversarial attack and defense methods on GNN, the main adversarial attack and defense algorithms of GNN were reviewed comprehensively, as well as robustness analysis techniques.Besides, the commonly used benchmark datasets and evaluation metrics in the security research of GNN were introduced.In conclusion, some insights on the future research direction of adversarial attacks and the trend of development were put forward.…”
    Get full text
    Article