Showing 5,261 - 5,280 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5261

    ARTIFICIAL INTELLIGENCE AND MORAL RIGHTS by Ruxandra VIȘOIU

    Published 2023-06-01
    “…These matters have greatly impacted the legislative field, along with the fields of technology, security education - and the list stays open. This paper aims to highlight the main key aspects of AI, its current legal framework (or, rather, lack thereof), along with a more in-depth analysis of moral rights in the field of AI.…”
    Get full text
    Article
  2. 5262

    Architecture of service-oriented data analysis system by Baoyou WANG, Cong WU, Jing QIAN, Xiaoying TAO

    Published 2016-01-01
    “…In the era of data technology,the higher requirements of telecom operators,such as business innovation and strong operation supporting,are being placed on data analysis system.Firstly,the requirement and challenge of the rising data analysis and the enhancing data value were expounded.Then,in order to realize open architecture and flexible operation support,the logical framework and technology architecture of the service-oriented data analysis system,as well as the data governance and the data security management were proposed.Finally,the service scenarios and the business value of the platform were introduced by an example.…”
    Get full text
    Article
  3. 5263

    Produção de alimentos, agricultura camponesa e soberania alimentar: o PAA no estado de Goiás by Ângela Maria Martins Peixoto, Adriano Rodrigues de Oliveira

    Published 2020-12-01
    “…During PAA’s first ten years of operation, the institutional markets created fostered the commercialization of food from peasant agriculture in achieving of food and nutritional security. However, the program is now institutionally threatened while food insecurity in the country is increasing.…”
    Get full text
    Article
  4. 5264

    Network latency clustering for detector placement on macroscopical prewarning by HE Hui, HU Ming-zeng, YUN Xiao-chun, ZHANG Hong-li

    Published 2006-01-01
    “…Research on the network-based and distributed intrusion detection was aroused by the burst-outs of large-scale security events.How to place detection instruments was the key to the detections.The problem of detector placement was turned to that of the clustering of topology graph.A novel bidirectional hierarchical clustering algorithm was put forward,which decreased the amount of result clusters by integration of initial marker selection method based on node out-degree.The simulation results demonstrates that our clustering approaches effectively identify clusters and been employed in the measured real network of the backbone.…”
    Get full text
    Article
  5. 5265

    New key management scheme of wireless sensor networks based on key relation table by HUANG Hai-ping1, WANG Ru-chuan1, SUN Li-juan1, CHEN Zhi1

    Published 2006-01-01
    “…Aimed at some security properties on key management for multicast such as forward confidentiality,backward confidentiality,resisting conspiracy-analysis,expansibility and robustness,and furthermore the obvious character of en-ergy-constraint,a new key management scheme based on threshold mechanism & key relation table was proposed,which mapped keys’ value onto the three-dimensional curves and surfaces.Although computing complexity increases within a little scale,the performance optimization of memory complexity as well as communication complexity were proposed.…”
    Get full text
    Article
  6. 5266

    RLWE-based key-policy ABE scheme by Ze-dong SUN, Yue-fei ZHU, Chun-xiang GU, Yong-hui1 ZHENG

    Published 2016-10-01
    “…Based on the attribute-based encryption(ABE) scheme which was proposed by Brakerski and constructed on the LWE problem,a RLWE-based key-policy ABE scheme was presented.Efficiency and key size of this scheme over-takes old ones which are based on the LWE problem.Under the RLWE assumption,this scheme supports attributes of unbounded length and semi-adaptive security.Moreover,a compiler was constructed and could compile ABE scheme that meets its demand into an attribute-based fully homomorphic encryption (ABFHE) scheme.…”
    Get full text
    Article
  7. 5267

    Technology of WLAN in Operation Level Based on Metropolitan Area Network by Bo Gao, Yiming Pan, Guojin Huang

    Published 2015-10-01
    “…As an extension of the cable broadband network,WLAN is also an important part of the wireless broadband network.In recent years,local governments have put forward the construction of “wireless city”as the fifth city public infrastructure,China Telecom Co.Ltd.also put forward the WLAN construction as the forth basic network.These factors promoted the large-scale construction and development of WLAN.The construction goal and the network architecture of WLAN based on metropolitan area network were analyzed.The networking technologies and the security policy deployment of WLAN were proposed.…”
    Get full text
    Article
  8. 5268

    Research on reliability of pulsed electrothermal propulsion system of nanosatellite by V. N. Blinov, V. V. Kositsin, A. I. Lukyanchik, P. V. Stepen, P. S. Yachmenev

    Published 2021-12-01
    “…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
    Get full text
    Article
  9. 5269

    Application of Power Data Mining Within and Between Grid Fields by Liang Geng, Yan Wu, Xiannan Meng

    Published 2013-11-01
    “…Combined with the power industry data, the applications of grid facilities construction planning, dynamic security assessment, power load forecasting, power system fault diagnosis and optimal scheduling options with the power system were analyzed, and then the applications in some other industries were also analyzed, supporting the development of the city.…”
    Get full text
    Article
  10. 5270

    Implementation on Evolved Packet Core and Wireless Network End-to-End Tracing by Zhe Wang, Hongdong Xu, Limin Zhao

    Published 2014-12-01
    “…In order to solve the above problem, based on 3GPP protocol, the construction of EPC and LTE wireless cooperative tracking processing mechanism was proposed, the optimization scheme was put forward to solve the application problem of different manufacturers scene, and to meet the current network user tracking and optimization analysis of demand, a platform for further user based localization problem and the key security was provided.…”
    Get full text
    Article
  11. 5271

    Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application by Wen Tan, Feng Ling Jiang, Chuang Xia Huang, Lan Zhou

    Published 2012-01-01
    “…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
    Get full text
    Article
  12. 5272

    Financing Investments in the Future: Pragmatic Solutions Are Needed by Monika Schnitzer, Achim Truger

    Published 2022-01-01
    “…However, they need to be quantified in concrete terms as quickly as possible and designed to ensure legal security in order to send reliable signals for the necessary capacity building, particularly in the construction industry and public administration.…”
    Get full text
    Article
  13. 5273

    Optimization of Expression Matching for String Matching by Tianlong Yang, Hongli Zhang

    Published 2013-01-01
    “…As the requirement of network security application increases, more and more redundant patterns appear and the patterns' amount of intrusion detection system(IDS)raises. …”
    Get full text
    Article
  14. 5274

    Multi-objective layered diagnosis model of electric power ICT network based on extenics by Li LI, Tiantian LUO, Yana ZHANG, Runze WU

    Published 2017-02-01
    “…Electric power ICT network is an important part of power system,which plays a vital role in the security,stability and economic operation of power network.A diagnostic index system of electric power ICT network was established and a multi-objective layered diagnosis model of electric power ICT network system based on extension rating was proposed.This evaluation method could not only evaluate the impact factors of the electric power ICT network,but also diagnose and rate the whole electric power ICT network.…”
    Get full text
    Article
  15. 5275

    Les migrations en transit au Maroc. Attitudes et comportement de la société civile face au phénomène by Laura Feliu Martínez

    Published 2009-11-01
    “…Responsiveness and variability on the part of Moroccan authorities highlight the double dependence of a management process focused on security issues yet influenced by external pressures, including the fragile compromise with the European Union and some member countries. …”
    Get full text
    Article
  16. 5276
  17. 5277
  18. 5278
  19. 5279

    Comparing Deep Learning models for mapping rice cultivation area in Bhutan using high-resolution satellite imagery by Biplov Bhandari, Timothy Mayer

    Published 2025-01-01
    “…Crop type and crop extent are critical information that helps policymakers make informed decisions on food security. As the economic growth of Bhutan has increased at an annual rate of 7.5% over the last three decades, there is a need to provide geospatial products that can be leveraged by local experts to support decision-making in the context of economic and population growth effects and impacts on food security. …”
    Get full text
    Article
  20. 5280