Showing 5,161 - 5,180 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 5161

    Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense by Jiacheng Huang, Long Chen, Xiaoyin Yi, Ning Yu

    Published 2024-12-01
    “…Abstract Deep neural networks have a recognized susceptibility to diverse forms of adversarial attacks in the field of natural language processing and such a security issue poses substantial security risks and erodes trust in artificial intelligence applications among people who use them. …”
    Get full text
    Article
  2. 5162

    ASSESSING THE QUALITY OF MICROSERVICE AND MONOLITHIC-BASED ARCHITECTURES: A SYSTEMATIC LITERATURE REVIEW by Saad Hussein, Mariam Lahami, Mouna Torjmen

    Published 2024-06-01
    “…The outcome of the literature review brings forth the key quality attributes in addition to their sub-characteristics as follows: performance, scalability, coupling, cohesion, deployment, security, development, complexity, maintainability, and availability. …”
    Get full text
    Article
  3. 5163
  4. 5164

    Emergency nurses’ disaster preparedness competencies: A focused mapping review and synthesis by Tshepo L. Motsepe, Shelley Schmollgruber

    Published 2025-01-01
    “…Conclusion: Communication, incident management, safety and security, preparedness and planning are the most identified integral domains within other identified domains. …”
    Get full text
    Article
  5. 5165

    Migration and Residual Trapping of Immiscible Fluids during Cyclic Injection: Pore-Scale Observation and Quantitative Analysis by Haejin Ahn, Seon-Ok Kim, Minhee Lee, Sookyun Wang

    Published 2020-01-01
    “…In GCS operations, residual trapping is the most favorable form of a trapping mechanism because of its storage security and capacity. In this study, the effects of cyclic injection of CO2-water on the immiscible displacement and residual trapping in pore networks were examined. …”
    Get full text
    Article
  6. 5166

    ENVIRONMENTAL SAFETY LAW AS AN ACADEMIC DISCIPLINE. COURSE FORMATION AND CONTENT by RUSIN Sergey Nikolaevich

    Published 2024-12-01
    “…Such a view of environmental safety law develops the understanding of environmental law, the system and structure of Russian law, and allows solving applied problems about the content of training in the field of environmental safety not only for lawyers, but also for specialists whose activities are associated with the impact on the environment and ensuring national security.…”
    Get full text
    Article
  7. 5167

    Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks by Jie YI, Tengfei CAO, Shuai GAO, Jianqiang HUANG

    Published 2022-08-01
    “…With the rapid development of the Internet of Vehicles, service providers can efficiently provide caching services for vehicle users by deploying 5G base station-type RSUs adjacent to vehicles.However, due to the presence of malicious attackers, the controlled base station is turned to be malicious for the purpose of identity forgery attack.When messages are sent in the name of malicious base stations to interfere with the communication link between vehicles and the trusted base stations, it is easy to cause serious driving safety problems.To solve the above problem, an efficient transmission and honeypot defense strategy was proposed, which was based on the offensive and defensive game in the Internet of Vehicles to reduce the risk of identity forgery attacks and improve the security of data transmission.The interaction between trusted base stations and malicious base stations in the Internet of Vehicles scenario was modeled as an attack-defense game model.On this basis, trusted base stations and honeypot base stations were jointly used as defenders to defend against malicious attacks.Then, the trusted base station and the malicious base station, as the two sides of the offensive and defensive game, chose their respective strategies to construct a model of the benefit function of both sides.Combined with the vehicle delay feedback mechanism, the defender and the malicious base station dynamically adjusted their respective strategies.By adjusting the interaction between the honeypot base station and the vehicle, and also the degree of IP randomization, the overall benefit of the defender was effectively improved.Besides, the optimal solution was obtained by using the mixed strategy Nash equilibrium theory.Simulation experimental results show that the proposed strategy can improve the secure transmission performance of the Internet of Vehicles service in the presence of malicious attackers, and the defender’s expected benefit is improved by 48.9% and the data transmission delay is reduced by 57.1% compared to the no-honeypot defense scheme.…”
    Get full text
    Article
  8. 5168

    Criminological Scenarios of Crime Situation’s Transformation in the Context of Armed Conflict on Donbass in the Midterm by O. О. Titarenko

    Published 2019-09-01
    “…The author has expertly substantiated the highest probability of developing a crime situation in the midterm in the following three scenarios: “Stagnation and slight increase” (most realistic), “Control and security” (optimistic), “Turbulent crime” (negative). …”
    Get full text
    Article
  9. 5169

    Overcrowding in prisons: Health and legal implications by Eva Nudd, Maha Aon, Kalliopi Kambanella, Marie Brasholt

    Published 2024-01-01
    “…Beyond the harm caused to persons in prisons, this may negatively impact society at large in terms of security, public health, and economy. Political will is essential in reducing prison overcrowding.…”
    Get full text
    Article
  10. 5170
  11. 5171

    The EU Cooperation with South African Countries: Main Trends and Prospects for Development by Savchenko Maryna V., Apeniuk Anna I., Skladaniuk Darina M.

    Published 2024-06-01
    “…Stronger cooperation can contribute to economic growth, development, peace, and security.…”
    Get full text
    Article
  12. 5172
  13. 5173

    A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms by Yexia Yao, Xuemei Xu, Zhaohui Jiang

    Published 2025-01-01
    “…These findings indicate that the SEME-TDHM algorithm successfully encrypts color images, providing strong security and practical utility.…”
    Get full text
    Article
  14. 5174

    U.S. plans to internationalize the containment of the USSR in the Balkans in the first half of the 1950s by A. A. Kalinin

    Published 2020-12-01
    “…In response, in the early 1950s the United States formed a new security model in the Balkans, which based on a differentiated approach: Greece became a member of NATO, while Yugoslavia entered the anti-Soviet Balkan Pact affiliated with NATO. …”
    Get full text
    Article
  15. 5175

    State Budget Execution under Martial Law by Lesia Zaburanna

    Published 2024-12-01
    “…In addition, expenditures on public order, security and the judiciary, as well as social security for the population are also quite large. …”
    Get full text
    Article
  16. 5176

    Sustainable Development of Water Resources Carrying Capacity Based on System Dynamics: A Case Study of Ganzhou City by WANG Xiaojun, YANG Huan, LI Zhenping, YAN Wenfeng, LAN Sijiao, DU Chao

    Published 2022-01-01
    “…As Ganzhou is the birthplace of Ganjiang River,Dongjiang River,and Beijiang River (“Three Rivers”),the security and sustainable development of its water resources are of great significance to the ecological security and sustainable development of both the Yangtze River Economic Belt downstream and the Guangdong-Hongkong-Macao Greater Bay Area.Thus,seeking the optimal sustainable development mode that Ganzhou's water resources can carry and ensuring the safety and sustainable use of those water resources are currently urgent issues to be solved.In this study,we employ the system dynamics method to build a system dynamics model of Ganzhou's water resources carrying capacity by analyzing its influencing factors and the system feedback loop and dividing the carrying capacity system into three sub-systems of social economy,water resources,and water environment.Moreover,four scenarios of normal development,economic priority,environmental priority,and comprehensive and coordinated development are designed to simulate Ganzhou's water resources carrying capacity during 2020—2035 and dynamically evaluate and simulatively predict its sustainable development capacity under each scenario.The results indicate that among the four scenarios,all the normal development and economic priority scenarios that sorely pursue the continuation of the current development status of social economy and the environmental priority scenario that protects water resources at the expense of social economy development fail to guarantee the sustainable development of water resources and social economy.In contrast,under the comprehensive and coordinated development mode,the chemical oxygen demand (COD) emissions will remain at a low level of 132 900 t by 2035 while economic development rises to a relatively high level,with GDP reaching 1 197.13 billion CNY.It follows that this mode not only ensures economic development but also takes into account the ecological environment.Therefore,the comprehensive and coordinated development scenario that comprehensively considers social economy development,environmental protection,and other factors is the optimal sustainable development mode that can be carried by water resources.…”
    Get full text
    Article
  17. 5177
  18. 5178

    Data Augmentation-Based Enhancement for Efficient Network Traffic Classification by Chang-Yui Shin, Yang-Seo Choi, Myung-Sup Kim

    Published 2025-01-01
    “…As encryption becomes the norm for security reasons, the traffic classification problem is not easily solved. …”
    Get full text
    Article
  19. 5179

    Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding by Wenqian XIAO, Gaobo YANG, Dewang WANG, Ming XIA

    Published 2023-08-01
    “…Reversible Data Hiding in Encrypted Images (RDHEI) combines image encryption and reversible data hiding to improve the security and information transmission efficiency for the network transmission of images.In RDHEI, the conventional bit-by-bit encryption destroys the spatial correlation in an original image and has side effects on the preservation of embedding spaces.An approach for RHDEI was proposed, which utilized additive homomorphic encryption and a multi-MSB (Most Significant Bit) embedding strategy to create room within the encryption process.The original image was divided into non-overlapped blocks, and each block was subjected to the same key for additive homomorphic encryption.This helped transfer the pixel correlation within an original block to the encrypted image block as much as possible.To enhance security, the encrypted image was further subjected to an Arnold transformation on a block-by-block basis.The decision of whether data will be embedded in a block and the embedding capacity were determined by the pixel differences within the block and the predicted values.When a block was selected for embedding, a small number of LSBs (Least Significant Bits) were used to store the prediction differences, ensuring reversibility.The redundant multi-MSBs were embedded with secret information by bit replacement.For the possible errors caused by multi-MSBs prediction, an embedding position selection strategy was designed by vacating MSBs in terms of the values of prediction errors, then more MSBs were reserved for those pixels with less prediction errors.During decryption, the secret information can be accurately extracted from the multiple MSBs of the pixels in a block, and the image content can be losslessly recovered using the number of embedded multi-MSBs, predicted values, and prediction differences.Experimental results on the BOWS-2 image dataset demonstrate that the average embedding capacity is improved to 2.58 bit/pixel, surpassing existing methods.…”
    Get full text
    Article
  20. 5180

    Food insecurity among African Americans in the United States: A scoping review. by Elizabeth Dennard, Elizabeth Kristjansson, Nedelina Tchangalova, Sarah Totton, Donna Winham, Annette O'Connor

    Published 2022-01-01
    “…The primary objectives of this review were to identify which risk factors have been investigated for an association with food insecurity, describe how food insecurity is measured across studies that have evaluated this outcome among African Americans, and determine which dimensions of food security (food accessibility, availability, and utilization) are captured by risk factors studied by authors. …”
    Get full text
    Article