Showing 5,561 - 5,580 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5561

    The problem of selecting digital development priorities for the region and ways of its solution by S. S. Kabanov

    Published 2021-12-01
    “…The necessity of integration of federal and municipal information systems and development of advanced production technologies related to information and communication technologies necessary to ensure the competitiveness and economic security of enterprises in the Nizhny Novgorod region has been substantiated.…”
    Get full text
    Article
  2. 5562

    Research on SSDF Attack and Defense for Cooperative Spectrum Sensing by Jingyu Feng

    Published 2014-01-01
    “…To further understand the SSDF attack and its current research situation and development trend, the types of SSDF attack were analyzed in the form of three aspects, and several typical security methods were concluded. Meanwhile, the current problems of SSDF attack and research trends in this area were discussed.…”
    Get full text
    Article
  3. 5563

    Évaluer l’impact d’un changement d’échelle sur la durabilité des services d’eau : la méthode ABAFAD by Antoine Brochet , Christophe Wittner

    “…However, due to the sociotechnical characteristics of drinking water utilities, these stakes (renewal of the heritage, securing the water supply, etc.) appear decisive. We are formalizing here a theoretical-empirical method called "ABAFAD" which enables the evaluation of future impacts according to two hypotheses: that of a fragmentation of the administrative organization of water services, and that of a mutualization. …”
    Get full text
    Article
  4. 5564

    Cabool (1842) d’Alexander Burnes : du récit de voyage au plaidoyer politique ? by Nadine André

    Published 2015-02-01
    “…It deals with the need to make the Indian subcontinent’s north-west frontier area secure, to maintain a delicate balance between the frontier’s neighbouring states, to counter the threat represented by Persia and Russia while at the same time considering these issues within the broader context of British-Russian relations. …”
    Get full text
    Article
  5. 5565

    Multifonctionnalité de l’agriculture urbaine à Montréal : étude des discours au sein du programme des jardins communautaires by Fabien Wegmuller, Éric Duchemin

    Published 2010-09-01
    “…Research show that urban agriculture could be a solution to meet modern urban issues, as food security, population health, environmental urban services, social network and popular education. …”
    Get full text
    Article
  6. 5566

    Towards Accurate Node-Based Detection of P2P Botnets by Chunyong Yin

    Published 2014-01-01
    “…Botnets are a serious security threat to the current Internet infrastructure. …”
    Get full text
    Article
  7. 5567

    A Survey of Content-Oriented Future Communication Network by Qian Hu, Muqing Wu, Song Guo

    Published 2012-09-01
    “…The study background of CON following with several key technologies including naming, routing, security and cache are introduced. At last we make a prediction on the research focus of future CON and the development direction.…”
    Get full text
    Article
  8. 5568

    HRR: a data cleaning approach preserving local differential privacy by Qilong Han, Qianqian Chen, Liguo Zhang, Kejia Zhang

    Published 2018-12-01
    “…While simplifying the data pre-processing process, we want to find a balance between data availability and security.…”
    Get full text
    Article
  9. 5569

    Analysis of the Time Series Generated by a New High-Dimensional Discrete Chaotic System by Chuanfu Wang, Chunlei Fan, Kai Feng, Xin Huang, Qun Ding

    Published 2018-01-01
    “…In this study, a digital sequence generator based on a high-dimensional chaotic system is proposed to ensure performance and security. The proposed generator has low resource consumption, and the digital pseudo-random output sequence has a large period. …”
    Get full text
    Article
  10. 5570

    A case report of complete cricotracheal separation: an experience from the east coast of Malaysia by Atikah Rozhan, Adam Mohamad, Khairul Azhar M. Rajet, Mohd Zaki Ahmad, Suhaimi Bin Yusof, Wan Emelda Wan Mohamed, Bathma Devi Susibalan, Nik Mohd Syukra Nik Abd Ghani, Zamzil Amin Bin Asha’ari

    Published 2022-12-01
    “…The most crucial part of managing this injury is to establish a secure airway. Tracheostomy under local anesthesia is the preferred method of airway stabilization, in order to avoid further injuries to the airway caused by endotracheal intubation. …”
    Get full text
    Article
  11. 5571

    Information exchange model of multi control nodes in trustworthy and controllable network by WANG Peng, LUO Jun-zhou, LI Wei, ZHENG Xiao, QU Yan-sheng

    Published 2010-01-01
    “…A new model based on two-layer Chord was proposed to realize information exchange between multi control nodes in trustworthy and controllable network.It constructs the two-layer Chord by constructing Chord between control nodes in AS and between ASes respectively.It uses this two-layer Chord to generate a two-layer aggregation tree automatically in exchanging process,which is used to realize basic information communication services.It provides AS administrative isolation for security and availability by guaranteeing path convergence for the same information in AS,and improves efficiency of communication.Meanwhile,it guarantees load balance between control nodes.Experiments verify that IEM has good performance.…”
    Get full text
    Article
  12. 5572

    Abnormal Event Detection via Multikernel Learning for Distributed Camera Networks by Tian Wang, Jie Chen, Paul Honeine, Hichem Snoussi

    Published 2015-09-01
    “…Distributed camera networks play an important role in public security surveillance. Analyzing video sequences from cameras set at different angles will provide enhanced performance for detecting abnormal events. …”
    Get full text
    Article
  13. 5573

    Research on system log anomaly detection based on deep learning by Yidong WANG, Peishun LIU, Gbin WAN

    Published 2019-10-01
    “…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
    Get full text
    Article
  14. 5574

    Modeling of the mimic defense based on heterogeneous redundancy by Junning QIN, Jiajia HAN, Sheng ZHOU, Chunming WU, Shuangxi CHEN, Ruoyan ZHAO, Jiangyu ZHANG

    Published 2020-05-01
    “…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
    Get full text
    Article
  15. 5575

    Proof of work algorithm based on credit model by Zuan WANG, Youliang TIAN, Qiuxian LI, Xinhuan YANG

    Published 2018-08-01
    “…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
    Get full text
    Article
  16. 5576

    Assessment of occupational injury and illness risks for the position of mineral water warehouse forklift operator by Anișoara Habuc, Claudiu Babiş, Elena Anda Botoc, George Mit, Andrei Dimitescu

    Published 2024-11-01
    “…The purpose of assessing the level of risk is to offer the possibility of knowing the real situation at each workplace, from the point of view of work security, in order to take the most suitable preventive measures for the given situation. …”
    Get full text
    Article
  17. 5577

    Paramounts of Intent-based Networking: Overview by Martins Mihaeljans, Andris Skrastins, Jurgis Porins

    Published 2024-12-01
    “…The current IBN model detains its adaptation as network assurance requirements of ensuring network security and scalability, and continuity are unfulfillable via conduct of network analysis and track of intent drift. …”
    Get full text
    Article
  18. 5578

    Reflections on data network technology by Lintao JIANG

    Published 2020-07-01
    “…The history of data network development and standardization was reviewed,and the idea ofsub-generational development concept for future network was put forward.It was pointed out that there were two technical routes in network design:the development technology route with users and business applications as the core,the gradual increase of network capabilities according to the needs of users and applications,and the development technology route with network as the core and the main body of capacity responsibility.Network 5.0 adopts “network as the core design concept”.A detailed description of three important capabilities of network 5.0 was given:endogenous credibility and security,endogenous network resource perception,deployment and control,and endogenous network certainty.…”
    Get full text
    Article
  19. 5579

    « Et voilà qu’arrive l’aventure ! » by Léonore Le Caisne

    Published 2019-12-01
    “…In this excerpt, Daniel Koehl recalls the mutiny at the Saint-Maur prison in 1987, of which he was one of the main leaders. The ultra-secure prison, built twelve years before, was completely destroyed during the mutiny.…”
    Get full text
    Article
  20. 5580

    User interests-based microblog tracing algorithm by Xiao YANG, Xiuzhen CHEN, Jin MA, Haozhe LIANG, Shenghong LI

    Published 2020-12-01
    “…Microblog information tracing refers to finding the source set of microblog topics according to the analysis of crawled microblog texts and it’s of great significance in the aspect of public opinion control and information security.A user interests-based tracing method (ITM) was proposed.The proposed method calculates the influence of the blogger based on the interest of the microblog blogger,and also calculates the influence of the commentators based on the interest of the commentators.The ranking algorithm was used to score the blogs according to publication time,notability and influence,and the source of the blogs was traced according to the blog score rank.Experimental results show that the accuracy of the proposed algorithm improved about 21% compared with the traditional tracing algorithms.…”
    Get full text
    Article