Showing 5,341 - 5,360 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 5341

    Nanoparticles as catalysts of agricultural revolution: enhancing crop tolerance to abiotic stress: a review by Yahan Cao, Khalid Turk, Nabila Bibi, Abdul Ghafoor, Nazeer Ahmed, Muhammad Azmat, Roshaan Ahmed, Muhammad Imran Ghani, Muhammad Abass Ahanger

    Published 2025-01-01
    “…Ensuring global food security and achieving sustainable agricultural productivity remains one of the foremost challenges of the contemporary era. …”
    Get full text
    Article
  2. 5342

    The Relationship Between Attachment Styles and Difficulty in Emotion Regulation: Investigating the Moderating Role of Reflective Functioning by Fatemeh Arab Alidoosti, Mahmoud Dehghani, Maryam Roshan, Somayeh Robat Milli

    Published 2024-11-01
    “…These participants completed the Reflective Functioning Questionnaires (RFQ), the Attachment Styles questionnaire (Hazen and Shaver, 1987), and the Difficulty in Emotion Regulation Scale (Gratz, 2004).Results: Hierarchical regression analysis indicated that individuals with a stronger secure attachment style exhibit greater confidence, which in turn facilitates easier emotion regulation. …”
    Get full text
    Article
  3. 5343

    Growing old before growing rich: a scoping review on ageing-related policy interventions from the WHO Southeast Asian Region by Nachiket Gudi, Anu Mohan, Teddy Andrews Jaihind Jothikaran, Abhijith A K, Lena Ashok

    Published 2025-01-01
    “…The notable delimitations of the given policy interventions are ambiguity regarding the monitoring of the programmes, lack of benchmark standards for evaluation of progress, inadequate attention to rural poverty and lack of decentralisation.Conclusion WHO SEARO countries can respond better to ageing by reinforcing areas such as caregiver support and allowances, public financing in older care, old age health insurance, public-private partnership in mobile and institutional caring and social security systems including old age and disability pension.…”
    Get full text
    Article
  4. 5344

    Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff by Muhammad Asif, Ishfaq Ali, Muhamad Sheraz Arshed Malik, Muhammad Hasanain Chaudary, Shahzadi Tayyaba, Muhammad Tariq Mahmood

    Published 2019-01-01
    “…In the next step, we classified NFRs into two classes security triad and performance triad, and the cost is assumed constant for each NFR. …”
    Get full text
    Article
  5. 5345

    Insect Abundance and Its Structure Trophic Level on Different Level of Teak-Based Agroforestry Development at Nglanggeran Village, Gunungkidul District, Yogyakarta by Ananto Triyogo, Priyono Suryanto, Siti Muslimah Widyastuti, Aldino Dwi Baresi, Isnaini Fauziah Zughro

    Published 2017-07-01
    “…Protection upon biodiversity has been the center of concern on ecological side, while productivity of the land use has been considered a solution for food security. Insects are between these two major issues, namely conservation and food security.This study was aimed at tracing the structure of insect community based on its role on the trophic level on three different phases of teak-based agroforestry systems (early, middle, and advanced). …”
    Get full text
    Article
  6. 5346

    Characteristics of eye injuries, medical cost and return-to-work status among industrial workers: a retrospective study by Rokiah Omar, Nur Syamilah Anan, Izmel Azim Azri, Chiranjib Majumder, Victor Feizal Knight

    Published 2022-01-01
    “…Objective The aim of this study is to determine the characteristics of eye injuries, medical costs and return-to-work status among industrial workers to provide better vision rehabilitative services.Setting Nationwide data from the Social Security Organisation (SOCSO) of Malaysia.Participants A stratified random sample of workers registered with the SOCSO of Malaysia with documentation of eye injury.Primary and secondary outcome measures Characteristics of eye injuries and medical costs related to eye injury (primary) and return-to-work status (secondary).Results A total of 884 from 8861 case files workplace accidents involving eye injury registered with Social Security Services (SOCSO) were identified. …”
    Get full text
    Article
  7. 5347

    Performance evaluation of hyper-parameter tuning automation in YOLOV8 and YOLO-NAS for corn leaf disease detection by Huzair Saputra, Kahlil Muchtar, Nidya Chitraningrum, Agus Andria, Alifya Febriana

    Published 2025-01-01
    “…Corn cultivation was crucial in Southeast Asia, significantly contributing to regional food security and economies. However, leaf diseases posed a significant threat, causing substantial losses in production and quality. …”
    Get full text
    Article
  8. 5348

    Defense Budget Gaps and Legal Implications of Alternative Financing in Indonesia: A Legal Reform Perspective by Aris Marsudiyanto, Athor Subroto, Bambang Permadi Soemantri Brodjonegoro, A. Hanief Saha Ghafur

    Published 2024-12-01
    “…With global challenges, particularly the escalating wars in the Middle East, Indonesia faces growing security concerns that necessitate a stronger defense program. …”
    Get full text
    Article
  9. 5349

    Economic Policy of the German Empire from 1871 — Lessons for Today? by ZG Überblick

    Published 2021-04-01
    “…They focus on institutional achievements, the first period of globalisation, the effects of investments in public infrastructure such as railway construction and education, as well as social security and its influence on demographic change. This economic-historical analysis not only provides new insights into the German Empire, but also offers lessons for the present day.…”
    Get full text
    Article
  10. 5350

    Modified Three-Dimensional Multicarrier Optical Prime Codes by Rajesh Yadav, Gurjit Kaur

    Published 2016-01-01
    “…The proposed 3D optical codes are more efficient in terms of cardinality, improved security, and providing quality of services.…”
    Get full text
    Article
  11. 5351

    Improved direct anonymous attestation scheme for mobile computing platforms by Li YANG, Jun-wei ZHANG, Jian-feng MA, Zhi-hong LIU

    Published 2013-06-01
    “…The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote attestation.An improved direct anonymous attestation authentication scheme with the in-volvement of key agreement was proposed to provide the property of mutual authentication.The analysis shows that the proposal can realize direct anonymous attestation with the properties of forgery-resistance and anonymity,and resist reply attacks and platform masquerade attacks; the scheme is effective and suitable for the mobile trusted computing platforms.…”
    Get full text
    Article
  12. 5352

    Research on the development of intelligent computing network for large models by GUO Liang, WANG Shaopeng, QUAN Wei, LI Jie

    Published 2024-06-01
    “…As deep learning models with huge parameters and complex structures, large model training requires fast synchronization of training parameters between multiple cards and servers, which imposes higher requirements on the bandwidth, latency, reliability, scalability and security of datacenter networks. The requirements and related key technologies of intelligent computing networks for large model training were studied, and the standard specifications, academic research, and case practices of intelligent computing networks were analyzed, in order to promote the development of intelligent computing networks.…”
    Get full text
    Article
  13. 5353

    Mesures de compensation écologique : risques ou opportunités pour le foncier agricole en France ? by Claire Etrillard, Michel Pech

    Published 2015-10-01
    “…The second focuses on offering compensation : in this approach the service provider secures land through acquisition or long term contracts. …”
    Get full text
    Article
  14. 5354

    Identity-based group key management scheme for space networks by LUO Chang-yuan, LI Wei, HUO Shi-wei

    Published 2010-01-01
    “…The available group key management schemes are not suitable for space networks.Aiming at the problem,an identity-based space networks group key management scheme was proposed.It constructed a service nodes set using sat-ellite nodes to assist multicast group with calculating and broadcasting common parameters,and resolved the problem of imbalance consumption.The service node providing service for the same group was dynamic and changeable,which could avoid single-point failure.The proposed scheme can achieve security requirements and has less calculating,storing and communicating expense compared with available schemes.…”
    Get full text
    Article
  15. 5355

    Broadcast authentication algorithm for wireless sensor networks by YAO Xuan-xia, ZHENG Xue-feng, ZHOU Xian-wei

    Published 2010-01-01
    “…In order to authenticate the broadcast data in wireless sensor networks efficiently,a broadcast authentication algorithm based on the properties of one-way,quasi-commutative and absorbency in Nyberg’s fasting one-way accumulator was put forward.The MACs computed by hashing the broadcast data with the shared key between the broadcaster and each scheduled receiver were used to be the accumulative items in this algorithm.The detailed analyses in the aspects of the security,anti-captured and costs show that the proposed broadcast authentication algorithm can authenticate the random broadcast data immediately in small area and meet the essential requirements for broadcast authentication in wireless sensor networks.…”
    Get full text
    Article
  16. 5356

    Research and application of DRM technology in IPTV UHD video by Jingxin SHEN

    Published 2018-11-01
    “…The characteristics and differences of different DRM standards such as OMA,Microsoft,Intertrust,and ChinaDRM were compared.The requirements of DRM applications were presented.The key technologies of DRM were analyzed.Based on the high-tech set-top box commonly used in the industry,the architecture of DRM protection in IPTV high-definition video was designed.The hardware trust root of high security set-top box,remote download terminal key,double-encrypted content key and other mechanisms was put forward innovatively.Finally,the business process of decrypting DRM content was formulated and an implementation case was given.…”
    Get full text
    Article
  17. 5357

    Fair and anonymous ID-based multi-receiver signcryption by Liao-jun PANG, Lu GAO, Qing-qi PEI, Yu-min WANG

    Published 2013-08-01
    “…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
    Get full text
    Article
  18. 5358

    Securitización y condicionalidad migratoria en la ayuda oficial al desarrollo de la Unión Europea by Delkáder-Palacios, A.

    Published 2019-11-01
    “…In this way, it contributes to a better understanding of the security-migration-development nexus in the European Union (EU). …”
    Get full text
    Article
  19. 5359

    Survey on model checking based hardware Trojan detection technology by Qizhi ZHANG, Yiqiang ZHAO, Ya GAO, Haocheng MA

    Published 2021-04-01
    “…Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checking can effectively detect the hardware Trojan in the design phase.Firstly, the working principle and process of model checking were described.Secondly, the research progress of hardware Trojan detection technology based on model checking was introduced.Finally, the bottlenecks faced by the current technology were pointed out and the potential research direction was discussed.…”
    Get full text
    Article
  20. 5360

    Image visualization encryption algorithm based on Shamir threshold secret key sharing by Yifu TAN, Zichen LI

    Published 2018-07-01
    “…An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.…”
    Get full text
    Article