Showing 5,481 - 5,500 results of 9,720 for search '"Securities ', query time: 0.15s Refine Results
  1. 5481

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  2. 5482

    Methodological guidelines to assist women victims of violence. by Laura Magda López Angulo

    Published 2009-11-01
    “…This is a violation of human rights limiting their personal freedom and annulling their main warranties as their right to have security, integrity and even life. In the 90´ it has been identified as a health problem due to its frequency and severity, its magnitude and influence in health recovery. …”
    Get full text
    Article
  3. 5483

    Video tamper detection method based on nonnegative tensor factorization by Xue-li ZHANG, Tian-qiang HUANG, Jing LIN, Wei HUANG

    Published 2017-06-01
    “…The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all,spectral feature of video frame was extracted quickly.The video was described by a three-dimensional tensor which created by the main compression feature.The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation.Finally,the tampering position was determined by using the Chebyshev’s inequality.Experiments show that this method can detect the video inter-frame tampering quickly and robustly.…”
    Get full text
    Article
  4. 5484

    International Cooperation and Indonesia’s Geopolitical Perspective in Indo-Pacific by Hesti Rosdiana

    Published 2025-01-01
    “…In other words, regional development through international cooperation will increase regional stability so as to encourage various economic, political and security activities that not only reduce political friction, but also provide strategic advantages for every actor who has an interest in the Indo-Pacific. …”
    Get full text
    Article
  5. 5485

    Neural Linguistic Steganalysis via Multi-Head Self-Attention by Sai-Mei Jiao, Hai-feng Wang, Kun Zhang, Ya-qi Hu

    Published 2021-01-01
    “…Precise linguistic steganalysis on suspicious carrier is critical for multimedia security. In this paper, we introduced a neural linguistic steganalysis approach based on multi-head self-attention. …”
    Get full text
    Article
  6. 5486

    Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans by Ethan T. Noel, Elizabeth F. Pienaar, Mike Orlando

    Published 2017-06-01
    “…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.­http://edis.ifas.ufl.edu/uw429 …”
    Get full text
    Article
  7. 5487

    Promote Renewable Energies Efficiently and Effectively by Arbeitsgruppe „Energiesysteme der Zukunft“, Justus Haucap, Jürgen Kühling, Munib Amin, Gert Brunekreeft, Dörte Fouquet, Veronika Grimm, Jörg Gundel, Martin Kment, Wolfgang Ketter, Jochen Kreusel, Charlotte Kreuter-Kirchhof, Mario Liebensteiner, Albert Moser, Marion Ott, Christian Rehtanz, Heike Wetzel, Jonathan Meinhof, Marlene Wagner, Miriam Borgmann, Cyril Stephanos

    Published 2022-09-01
    “…Following the tightening of the climate protection measures, the question arises as to whether the current electricity market design and the associated remuneration rules for electricity generation are still suitable for achieving the goals of security of supply and low prices stipulated in the Energy Industry Act, even with an electricity market dominated by renewable energies.…”
    Get full text
    Article
  8. 5488

    Survey on application of attack graph technology by Zi-wei YE, Yuan-bo GUO, Chen-dong WANG, An-kang JU

    Published 2017-11-01
    “…Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.…”
    Get full text
    Article
  9. 5489

    Vehicular social network:a survey by Xiang WANG, Su-peng LENG, Ke ZHANG, Hao LIU

    Published 2015-01-01
    “…Combining techniques of social networks and wireless communications,vehicular social network (VSN) aim to provide a variety of data delivery services based on the social relationship among vehicle users.With the extensive survey and analysis of existing research work on mobile social network (MSN) and vehicle networks,the architecture and applications of vehicular social network (VSN) as well as the relationship between vehicle networks and social network from a technical viewpoint are presented.The key technologies in VSN are summarized,including the problems and solutions in terms of information delivery,bandwidth allocation,distributed caching,security and privacy.Moreover,future research directions and challenges are presented.…”
    Get full text
    Article
  10. 5490

    Sustainability Goals in Economic Policy — Economic Considerations by Achim Wambach, Christine Zulehner

    Published 2022-05-01
    “…This should be prevented by formulating the goals as concretely and legally securely as possible and by building up competence in the authorities entrusted with their implementation.…”
    Get full text
    Article
  11. 5491

    A brand new strategy of quantum relay strategy based on entanglement swapping by Min XU, Min NIE, Guang YANG, Changxing PEI

    Published 2016-03-01
    “…Quantum protocols based on entanglement are known as information security,reliability,flexibility and a broad prospect in use.Meanwhile,the fidelity of photons is also required.A new quantum relay strategy was proposed.By setting multi-relays between distant correspondents and under the assistance of classical communications,the strategy can execute entanglement swapping and entanglement purification to provide the correspondents with remote entanglement connection of stable fidelity.Performance analysis shows that by reasonable control of relay series,improvement of entanglement swapping and entanglement purification,the time delay and throughput can be significantly improved,necessary entanglement resources can be provided for the global quantum communication.…”
    Get full text
    Article
  12. 5492

    ID-based signature without trusted PKG by ZHOU Liang1, LI Da-peng2, YANG Yi-xian1

    Published 2008-01-01
    “…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
    Get full text
    Article
  13. 5493

    End-to-end multipath transport layer architecture oriented the next generation network by XUE Miao, GAO De-yun, ZHANG Si-dong, ZHANG Hong-ke

    Published 2010-01-01
    “…To solve the problem of inefficient transmission using multiple interfaces of multihome terminal in the tradition network,an end-to-end multipath transport layer architecture—E2EMP oriented the next generation network was presented.Through distributing data adaptively following characters of the end-to-end paths,adopting dual sequence space,implementing smart path management policies,the performance of the multihome terminal using E2EMP has significant improvement.The simulation results show that E2EMP aggregates bandwidth of the multihome terminal interfaces efficiently,and meanwhile promotes the security and reliability of end-to-end multipath transport.…”
    Get full text
    Article
  14. 5494

    From Low Engagement to High Engagement: Explaining Turkey’s Changing Engagement in the Middle East during the JDP Period by İsmail AKDOĞAN, Furkan POLAT

    Published 2022-06-01
    “…Why did Turkey shift its Middle East policy from soft power oriented approach to the security oriented one in the early 2010s? While Turkey prioritized diplomatic, commercial and economic relations during the first decade of the 2000s, it has increasingly used military means to influence the Middle East since 2011. …”
    Get full text
    Article
  15. 5495

    Intent driven Internet of things by Jiaming ZHANG, Chungang YANG, Lei PANG, Jiandong LI

    Published 2019-09-01
    “…Intent driven network (IDN) is an emerging network technology.With its advantages in intent translation,closed-loop verification and automate deployment,it has become another revolutionary network technology after software-defined network (SDN).Aiming at the problem of weak scalability,difficult data management and poor security performance in the current development of the Internet of things,the SDN-based intent driven Internet of things was proposed,and the north-south interface and other key technologies were introduced.Aiming at the consistency problem of multi-intention northbound interface,an intentional-conflict decomposition strategy was proposed,which is proved to be effective by simulation.…”
    Get full text
    Article
  16. 5496

    NON-PROBABILISTIC RELIABILITY ANALYSIS METHOD BASED ON INTERVAL ANALYSIS by MA DongJuan, LIU BoYing, LI LingLing

    Published 2015-01-01
    “…This method described system parameters as interval variables first,measuring the system reliability through the ratio of security domain and the basic interval variables total area. …”
    Get full text
    Article
  17. 5497

    Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems by Benjamin Glas, Oliver Sander, Vitali Stuckert, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. …”
    Get full text
    Article
  18. 5498

    Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario by Hao WANG, Tianhao WU, Konglin ZHU, Lin ZHANG

    Published 2020-10-01
    “…With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and accept the regulation of LS.The basic of the security vehicle communication at intersections is authentication of network node.Based on this,an anonymous vehicle authentication scheme based on blockchain technology was proposed.The scheme employed a hybrid cryptography based on identity and hash message authentication code,and recorded the authentication results in blockchains.According to simulation testing and result analysis,the scheme ensures the anonymity and privacy-preserving,with less communication overhead compared to other methods.…”
    Get full text
    Article
  19. 5499

    Geopolityczne położenie Armenii oraz jej perspektywy po upadku Górskiego Karabachu by Kamil KŁYSZEJKO

    Published 2024-07-01
    “…The hypothesis of the paper is that in view of the current geopolitical situation, Armenia should deepen its cooperation with Iran, India and the United States at the expense of limiting its relations with the Russian Federation, which does not provide Armenia with security in the region anyway. …”
    Get full text
    Article
  20. 5500

    INTELLIGENT LOW-POWER SMART HOME ARCHITECTURE by CORNEL POPESCU, GEORGE CULEA

    Published 2018-09-01
    “… The Smart Home technology is a house that implements a variety of physical and digital well-integrated technologies, providing a number of functionalities like control of lighting, temperature, multimedia devices, flammable gas leakage, automatic plant irrigation or alarms security using a set of hardware components connected to a development board that can be accessed remotely through an Android application. …”
    Get full text
    Article