Showing 5,181 - 5,200 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 5181

    Transformation of Turkey's Anti-Terrorism Policy under the AKP by V. A. Avatkov, A. I. Sbitneva

    Published 2022-07-01
    “…In the era of new challenges and threats, the most dangerous of which has occurred terrorism, the Republic of Turkey becomes one of the key centers of power in the Middle East and pursues the goal to create a regional security architecture around itself as well as to counter various terrorist organizations. …”
    Get full text
    Article
  2. 5182

    Optimal Topology Management for Software-Defined Networks Minimizing Latency and Using Network Slicing by Andrés Viveros, Pablo Adasme, Ali Dehghan Firoozabadi

    Published 2024-01-01
    “…To the best of our knowledge, this journal paper constitutes a first attempt to incorporate network slicing in SDN allowing flexibility, resource efficiency, security, and effective management of the network facilitating the deployment of customized and adaptive services. …”
    Get full text
    Article
  3. 5183

    A Modified WASPAS Method for the Evaluation of E-Commerce Websites Based on Pythagorean Fuzzy Information by Xiufang Ou, Bingbin Chen

    Published 2025-01-01
    “…They are essential to keep up with the market changes and shifts to provide better compliance with security requirements and to optimize the interface to hold onto user attention. …”
    Get full text
    Article
  4. 5184

    Contrastive meta-learning framework for few-shot cross-lingual text classification by GUO Jianming, ZHAO Yuran, LIU Gongshen

    Published 2024-06-01
    “…Many security risk control issues, such as public opinion analysis in international scenarios, have been identified as text classification problems, which are challenging due to the involvement of multiple languages. …”
    Get full text
    Article
  5. 5185

    Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks by P. Mamatha, S. Balaji, S. Sai Anuraghav

    Published 2025-02-01
    “…Since these technologies are deeply rooted in the individual’s comfort life, protecting the user’s privacy and security against the growing DoS attack has become a major challenge among researchers. …”
    Get full text
    Article
  6. 5186

    Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method by Abhijeet Sahu, Truc Nguyen, Kejun Chen, Xiangyu Zhang, Malik Hassanaly

    Published 2025-01-01
    “…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
    Get full text
    Article
  7. 5187

    Smart home technology to support engagement in everyday activities while ageing: A focus group study with current and future generations of older adults. by William Son Galanza, Jens Offerman, Sofi Fristedt, Susanne Iwarsson, Nebojsa Malesevic, Steven M Schmidt

    Published 2025-01-01
    “…The perceived advantages of SHT include enhancing the sense of security and safety, which can facilitate engagement in everyday activity. …”
    Get full text
    Article
  8. 5188

    Wild Edible Plant Nutritional Contribution and Consumer Perception in Ethiopia by Haile Tesfaye Duguma

    Published 2020-01-01
    “…Even though wild edible plants are important for food security, they are usually overlooked and perceived as food for poor families. …”
    Get full text
    Article
  9. 5189

    Image double fragile watermarking algorithm based on block neighborhood by Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU

    Published 2023-06-01
    “…To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborhood was proposed.The image was divided into non-overlapping blocks of size 4×4 and block truncation coding was used to generate the recovery watermark based on the image block.For each image block, a neighborhood of a proper size was specified and two mapping blocks were randomly selected from the regions within and outside the neighborhood.Then the recovery watermark was embedded into the two mapping blocks simultaneously.The image block neighborhood setting mechanism of the algorithm ensured that the image block maintains a certain distance from its corresponding mapping block.Additionally, the selection mechanism of mapping blocks inside and outside the image block neighborhood ensured a certain distance between the two mapping blocks, thereby guaranteeing the security of the watermark.In the case of continuous region tampering, the relationship between the tampered region and the neighborhood of the image block was analyzed theoretically.The analysis showed that a suitable image block neighborhood can improve the average recovery rate of the tampered area compared with the random mapping embedding algorithm.Besides, the distribution trend of the average recovery rate of the tampered area and the recovery rate of each image block in the tampered area were given by numerical calculation.It was found that the tampered area image block can be recovered 100%, some image blocks in the center of the tampered area can be recovered 100%, and the recovery rate of image blocks in tampered area will be reduced.The experimental results verify the rationality and effectiveness of the theoretical analysis.Moreover, when the neighborhood parameters are large, the proposed algorithm achieves a higher average recovery rate of the tampered region than the random mapping embedding algorithm in the case of continuous region tampering.…”
    Get full text
    Article
  10. 5190

    Research on strong robustness watermarking algorithm based on dynamic difference expansion by Tianqi WANG, Yingzhou ZHANG, Yunlong DI, Dingwen LI, Linlin ZHU

    Published 2023-10-01
    “…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
    Get full text
    Article
  11. 5191

    GASTROINTESTINAL PARASITES AND ASSOCIATED GUT PATHOLOGY IN CHICKENS SOLD AT LIVE-BIRD MARKETS IN LAGOS STATE, SOUTHWESTERN NIGERIA by Oluwayomi Oluwatoyin Adeyemi, Emmanuel Taiwo Idowu, Bamidele Akinsanya, Isa Danladi Jatau, Temitope Morenikeji Oladipo

    Published 2024-12-01
    “…Efforts to control must be strengthened to secure chicken production, maintain food security, and prevent economic losses. …”
    Get full text
    Article
  12. 5192
  13. 5193
  14. 5194

    The analysis on forest farmers’ intention to participate in construction of the National Reserve Forest Project and its driving factors by Yang Song, Youzhi Wang, Gaocheng Hu

    Published 2025-01-01
    “…Abstract The construction of the National Reserve Forest Project is the fundamental measure to alleviate the contradiction between national wood supply and demand and maintain national ecological security and wood security. This study analyzed the forest farmers’ intention to participate in the project and its driving factors. …”
    Get full text
    Article
  15. 5195

    ASEAN Defence Ministers MeetingPlus: Institutional structure, specific features, and evolution (2010–2022) by K. G. Muratshina

    Published 2024-09-01
    “…In 2010, a specific security-related dialogue format has been introduced into this system, — the ASEAN Defence Ministers Meeting-Plus (ADMM-Plus). …”
    Get full text
    Article
  16. 5196

    A Covert α-Stable Noise-Based Extended Random Communication by Incorporating Multiple Inverse Systems by Areeb Ahmed, Zoran Bosnic

    Published 2025-01-01
    “…The results from Monte Carlo simulations show that deploying the proposed ERCS not only leads to better Bit Error Rate (BER) performance but also provides increased covertness values, which proves the design’s ability to enhance performance and security compared to earlier models. Simulation analysis also suggests that the utilization of multiple inverse systems in the proposed ERCS can enhance the physical-layer security of next-generation communication devices.…”
    Get full text
    Article
  17. 5197

    Systems Evaluation for Operational Risks of International Transport Corridors: A Case Study of China-Pakistan-Iran-Turkey International Transport Corridor by Zhou Xiaoxiang, Huang Chengfeng

    Published 2021-01-01
    “…The Chinese section has the lowest operational risk index. (2) Pakistan has been trapped in severe political risks and security risks in recent years. Turkey suffers from severe security risks due to the Kurdish problem. …”
    Get full text
    Article
  18. 5198

    CHALLENGES TO FREEDOM OF SPEECH AND SAFETY OF JOURNALISM IN UKRAINE by Galyna Piskorska

    Published 2024-12-01
    “…The war and the imposition of martial law aimed at ensuring national security have restricted the operational capabilities and freedom of the media. …”
    Get full text
    Article
  19. 5199

    New image encryption algorithm based on double chaotic system and compressive sensing by Yuguang YANG, Guodong CAO

    Published 2022-10-01
    “…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
    Get full text
    Article
  20. 5200

    The privacy protection of the internet of vehicles resource transaction details based on blockchain. by Jing Chen, Tao Li, Min Huang

    Published 2025-01-01
    “…Compared with the existing methods, the proposed scheme not only greatly enhanced the privacy protection capability, but also ensured the efficiency and security of transaction verification through zero-knowledge proof, avoiding the direct exposure of private keys. …”
    Get full text
    Article