Showing 4,841 - 4,860 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 4841

    IMPROVING THE DEVELOPMENT OF SMALLHOLDER COCOA PLANTATIONS IN PADANG PARIAMAN DISTRICT by Chandra Refolta

    Published 2024-11-01
    “…Policy recommendations that can be implemented by the Department of Agriculture and Food Security of Padang Pariaman Regency in an effort to increase the development of smallholder cocoa plantations include; 1).  …”
    Get full text
    Article
  2. 4842

    Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing by Sindhe Phani Kumar, R. Anandan

    Published 2022-01-01
    “…Anonymization of data is done at the point of collection in order to safeguard the data. More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
    Get full text
    Article
  3. 4843

    Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers by HUANG Yichuan, SONG Yuhui, JING Zhaoxia

    Published 2025-01-01
    “…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
    Get full text
    Article
  4. 4844

    CONCEPTUALIZING THE LIVEABLE AFRICAN CITY by Taibat Lawanson, Taofiki Salau, Omoayena Yadua

    Published 2013-05-01
    “…Issues investigated include governance, safety and security, culture and global identity, environmental indices and infrastructure. …”
    Get full text
    Article
  5. 4845

    Transboundary Water Resources Conflict Analysis Using Graph Model for Conflict Resolution: A Case Study—Harirud River by Abdulsalam Amini, Hamidreza Jafari, Bahram Malekmohammadi, Touraj Nasrabadi

    Published 2021-01-01
    “…One of the most important environmental issues today is the water crisis and the ensuing security challenges. Of these, transboundary waters pose the most significant security challenges. …”
    Get full text
    Article
  6. 4846

    ECONOMIC CRIME UNDER MARTIAL LAW IN UKRAINE by Maksym Korniienko, Hanna Foros, Serhii Baranov

    Published 2024-12-01
    “…Consequently, the prevailing national security and defence strategy falls short in ensuring the alignment of the Ukrainian security sector with the scientific and practical imperatives. …”
    Get full text
    Article
  7. 4847

    Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024) by Jannat Naseeb

    Published 2025-01-01
    “…Overall, this research offers valuable insights into the efficacy of PSYOP in influencing audiences and contributes to the broader understanding of persuasion theory in the context of modern information warfare and national security. …”
    Get full text
    Article
  8. 4848

    Automated Windows domain penetration method based on reinforcement learning by Lige ZHAN, Letian SHA, Fu XIAO, Jiankuo DONG, Pinchang ZHANG

    Published 2023-08-01
    “…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
    Get full text
    Article
  9. 4849

    Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm by Sherril Sophie Maria Vincent

    Published 2025-02-01
    “…In this study, Federated Learning is utilized to improve the security and privacy through empowering nodes to train the model deprived of distribution complex data. …”
    Get full text
    Article
  10. 4850

    The contribution of Electronic Records Management towards Organisational Performance: A case study of Stanbic Bank-Kabale Branch. by Kembabazi, Betty

    Published 2023
    “…Lastly, the researcher recommended the construction of ERMS facilities, improve ERMS security, encourage corroborations, have government support, and provide maximum training as better solutions for the topic under study.…”
    Get full text
    Thesis
  11. 4851

    The role of wireless sensor networks in the modern landscape: a concise examination by Salwa El-Morsy

    Published 2022-06-01
    “…Wireless sensor networks are fast process of connection in part such as agriculture, healthcare, environmental monitoring, security, and manufacturing and also it thesaurus and measure physical signals and it also have wireless communication. …”
    Get full text
    Article
  12. 4852

    Self-Reported Diabetes in Older Adults: A Comparison of Prevalence and Related Factors in the Mexican Health and Aging Study (2015, 2018, and 2021) by Alvaro García Pérez, Teresa Villanueva Gutiérrez, Laura Bárbara Velázquez-Olmedo

    Published 2024-01-01
    “…Conclusion: An elevated prevalence of diabetes was found in older adults in Mexico, while not having access to social security was associated with a higher possibility of presenting diabetes and living in a rural area was associated with a lower possibility of presenting diabetes. …”
    Get full text
    Article
  13. 4853

    Why most African states may be at war with each other in 2063 by Francis Onditi, Shadrack Mulei Kithiia

    Published 2019-10-01
    “…The Agenda 2063, which was created in 2015, groups its objectives into four broad categories: inclusive growth; integration; governance; security; cultural identity; women and youth; and partnership …”
    Get full text
    Article
  14. 4854

    Identity-based ring signature scheme under standard model by ZHANG Yue-yu, LI Hui, WANG Yu-min

    Published 2008-01-01
    “…An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. …”
    Get full text
    Article
  15. 4855

    Kink of Subclavian Artery Mimicking Stenosis by Hatice S. Kemal, Aziz Gunsel, Murat Kocaoglu, Levent Cerit, Hamza Duygu

    Published 2016-01-01
    “…In this asymptomatic case, we have merged clinical and multiple imaging modalities to secure the diagnosis and treatment plan.…”
    Get full text
    Article
  16. 4856

    Fine-grained access control scheme with user privacy protection in cloud storage systems by Min XIAO, Chun-lei WANG, You-sheng ZHOU

    Published 2014-11-01
    “…Based on the actual demands of cloud storage system,a new multi-authority ABE (MA-ABE) scheme is constructed to support user privacy protection and attribute revocation.For enhancing efficiency and alleviatingowner’s computing load,the complex computing works involved in attribute revocation are delegated to a trusted third party orcloud server.The proposed scheme is provably secure under the DBDH assumption.…”
    Get full text
    Article
  17. 4857

    Research on the Application of Reverse PoE by Zhanhai Zhuang, Jiankang Chen

    Published 2014-02-01
    “…Based on the power supply demands of broadband access network,the equipments,wiring surrounding,multi-users balanced power supply and administration,security/protection about the reverse PoE application were studied and a test was done in laboratory.All those can provide reliable theory and experience for the reverse PoE construction and promote the development of the application of reverse PoE.…”
    Get full text
    Article
  18. 4858

    Two new species in the green lacewing genus Santocellus (Neuroptera, Chrysopidae, Leucochrysini) by Catherine A. Tauber

    Published 2025-02-01
    “…As a result, the genus, which now contains five known species, becomes more securely defined. An updated catalog and an illustrated key to the known Santocellus species are provided.…”
    Get full text
    Article
  19. 4859

    Construction of the content extraction signature scheme based on the thought of the batch scheme by Zixin TANG, Xinyi HUANG

    Published 2018-12-01
    “…The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.…”
    Get full text
    Article
  20. 4860

    Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme by XU Jing-fang1, CUI Guo-hua1, CHENG Qi2, ZHANG Zhi1

    Published 2009-01-01
    “…Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protocol was proposed, which elaborately eliminates the defect of previous protocol and improved the efficiency of existing schemes.…”
    Get full text
    Article