Showing 5,601 - 5,620 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 5601

    Formation of mechanisms for sustainable development of industrial enterprises on the example of the power industry by V. V. Lebedev

    Published 2023-07-01
    “…It also takes measures to ensure energy security and maintains stable flows of finance and capital with stability of investment activity. …”
    Get full text
    Article
  2. 5602

    التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة by د. ممدوح علی محمود

    Published 2016-10-01
    “…The study recommended that more research work shouldbe undertaken in the field of cloud storage, and the necessity of activating cloudstorage –taking the full information security precautions- in all institutions.…”
    Get full text
    Article
  3. 5603

    Design and implementation of routing strategy based on terminal trust by Ansheng YIN, Shunyi ZHANG

    Published 2016-04-01
    “…Experiments show that this protocol can achieve IPv6 routing based on flow label and improve the security and efficiency of information transmission.…”
    Get full text
    Article
  4. 5604

    Lite-CA based key pre-distribution scheme in wireless sensor network by PAN Yun1, WANG Li-cheng2, CAO Zhen-fu3, LI Jian2

    Published 2009-01-01
    “…Large-scale sensor nodes were usually deployed in potentially adverse or even hostile environment, so the security in these networks was very important.Due to its constraints on node cost, size and power dissipation, sensor’s energy and capabilities on computation, storage and communication were considerably weak compared with general computers.It leaded to many new challenges for designing of key management protocols in WSN.Therefore, a lite-CA based key pre-distribution scheme was suggested.The traits of CA-based authentication framework and identity-based authentication framework were combined by this scheme.Further, the scheme was efficiently implemented based on quadratic residue theory.…”
    Get full text
    Article
  5. 5605

    Trusted platform for third-party cloud computing online evaluation and analysis technology by Bo ZHAO, Xiang LI, Fei YAN, Liqiang ZHANG, Huanguo ZHANG

    Published 2019-10-01
    “…The service model of cloud computing creates a serious threat to user data security,the trustworthiness of cloud computing through third parties,must be evaluated then the healthy development of the cloud computing industry can be guaranteed.The research of the National High Technology Research and Development Program of China,“trusted platform for third-party cloud computing online evaluation and analysis technology” were summarized.The trusted evaluation model and architecture were described from the cloud platform,the dynamic evaluation technology,the credible evidence collection and the trusted test mechanism,the credibility of the quantitative evaluation method,and the prototype system integrated by tools ,to evaluate the credibility of cloud platform.…”
    Get full text
    Article
  6. 5606

    EXAMINING THE CAUSAL NEXUS BETWEEN TOURIST ARRIVALS AND TERRORISM IN EMERGING COUNTRIES by Sinem Eyüboğlu, Kemal Eyuboglu

    Published 2018-12-01
    “…Results suggest that emergingcountry authorities should increase security precautions to ensure thattourists feel safe and in order to attract more tourists, ceteris paribus.…”
    Get full text
    Article
  7. 5607

    Behavior of Full-Scale Porous GFRP Barrier under Blast Loads by D. Asprone, A. Prota, G. Manfredi, A. Nanni

    Published 2015-01-01
    “…This research paper is part of the SAS (Security of Airport Structures) Project funded by the European Programme for Critical Infrastructure Protection, whose objective was to develop and deploy a fiber reinforced polymer (FRP) fencing system intended to protect airport infrastructures against terrorist acts. …”
    Get full text
    Article
  8. 5608

    Design and implementation of an intrusion-tolerant application server middleware by GUO Yuan-bo, LIU Wei, YUAN Shun, ZHOU Rui-peng

    Published 2009-01-01
    “…An intrusion-tolerance middleware model based on the interceptor was proposed, with a component named intrusion-tolerance framework which logically divided the intrusion-tolerance functions into service providers and service management.The system analyses were designed by adapting intrusion tolerance security model and element technology, the theory of intrusion tolerance mechanism and the strategy of implementation were described, and the intrusion tolerance technology and implementation method was extracted.Finally, an intrusion-tolerance J2EE middleware was realized, built on JBoss-an open source J2EE application server platform, and was implemented through Java class load mechanism with the dynamic load of the intrusion-tolerance class.…”
    Get full text
    Article
  9. 5609

    Research and design of the intelligent energy management and control platform in the airport area based on the IoT technology by Yuan HUANG, Gang WU, Junyong LIU, Chenxi YANG, Mengpin GAO

    Published 2021-06-01
    “…The construction of the green airport urgently needs an efficient energy security information system in face of the electric energy substitution and clean energy access.A design idea of the intelligent energy management and control platform in the airport area based on the Internet of things (IoT) technology was proposed.The platform included a perception layer, a network layer, a data layer and an application layer.The IoT technology and the fusion technology of the information and energy were adopted to realize the application scenarios for multiple users.Finally, an energy control platform framework was designed by combing the energy information of a civil hub airport to provide basic services for further exploration of the value of the energy.…”
    Get full text
    Article
  10. 5610

    Developing Countries and Blockchain Technology: Uganda’s Perspective by Ivan, Niyonzima, Ruth Wario, Emmanuel Ahishakiye

    Published 2018
    “…Fundamentally, these nations need transparency, security, and accountability in their processes, all of which are cornerstones of Blockchain technology. …”
    Get full text
    Article
  11. 5611
  12. 5612
  13. 5613
  14. 5614
  15. 5615

    O grande deslocamento da violência by Confins

    Published 2024-03-01
    “…The article is based on original maps produced using data from the Atlas of Violence published by the Institute for Applied Economic Research (Ipea) and the Brazilian Public Security Forum, showing huge spatial differences in the distribution of homicides. …”
    Get full text
    Article
  16. 5616

    Sub-regional efforts to achieve gender equality in land ownership by Marcel Loyd MINKA

    Published 2025-01-01
    “…Results: The results obtained from my analysis are: the mechanisms for implementing women’s tenure security; the tools for codifying women’s land tenure; and the monitoring progress for strengthening women’s land rights in Africa. …”
    Get full text
    Article
  17. 5617

    Transformative adaptation: from climate-smart to climate-resilient agriculture by Jon Hellin, Eleanor Fisher, Marcus Taylor, Suhas Bhasme, Ana María Loboguerrero

    Published 2023-08-01
    “…Abstract In response to the climate crisis, there has been much focus on climate-smart agriculture (CSA); namely, technologies and practices that enhance adaptation, reduce greenhouse gas emissions, and contribute to food security; the so-called triple win. Success has tended to be measured in terms of the number of farmers adopting CSA with less focus given to the impacts especially on human development. …”
    Get full text
    Article
  18. 5618
  19. 5619
  20. 5620

    Effectiveness of pre-employment card policy on employment transition during covid-19: evidence from Indonesian dual labor market by Beni Teguh Gunawan, El Bram Apriyanto, Hennigusnia Hennigusnia, Ivan Lilin Suryono, Ardhian Kurniawati

    Published 2024-11-01
    “…The effectiveness of the PEC policy is measured through key indicators such as labor absorption rates, reduction in unemployment, and the likelihood of securing formal employment over informal alternatives. …”
    Get full text
    Article