Showing 5,681 - 5,700 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5681

    Digital finance, maize productivity, and welfare of farm households in Burkina Faso by Salimata Traore, Richard K. Moussa

    Published 2025-12-01
    “…Maize productivity is thus important for food security and household welfare but is constrained by financial issues that can be alleviated by digital finance. …”
    Get full text
    Article
  2. 5682

    Development trend and application analysis of blockchain with 5G by Dandan XU, Yunyong ZHANG, Daolin ZHANG, Di ZHANG, Xiao WANG, Yixin CAI

    Published 2020-03-01
    “…Through the evolution from the information internet era of large connections and large collaborations to the era of strong trust and strong security,the blockchain has triggered a multi-wave technology wave with its characteristics of openness,transparency and decentralization,becoming the new generation of information technology development trends.Starting from the dimensions of technology,people's livelihood and industry,the infrastructure and evolution trends reveal that the blockchain was the essence of the reorganization and re-innovation of the existing technology.The applications were re-divided into the currency circle and chain ring from a technical perspective.By comparing the blockchain technology with 5G technology,the innovative application scenarios of the decoupling and cross-integration were explored that may be involved in the future of the blockchain.…”
    Get full text
    Article
  3. 5683

    Cost Share Programs for Florida's Agricultural Producers and Landowners by Rao Mylavarapu, Kelly Hines, Alyssa Dodd

    Published 2009-01-01
    “… SL-264, a 4-page fact sheet by Rao Mylavarapu, Kelly Hines, and Alyssa Dodd, describes several conservation programs included in the 2008 Farm Bill — the Environmental Quality Incentives Program (EQIP), Wetlands Reserve Program (WRP), Grassland Reserve Program (GRP), Wildlife Habitats Incentive Program (WHIP), and the Conservation Security Program (CRP) — which may be of high interest to farmers, ranchers, land owners, agricultural consultants, local decision-makers and extension agents. …”
    Get full text
    Article
  4. 5684

    Talk About Crime Among Young People in Northern Mexico: The Impact of Drug Trafficking in the Neighborhood by Ariagor Manuel Almanza Avendaño, Martha Romero-Mendoza, Anel Hortensia Gómez San Luis

    Published 2025-01-01
    “…The main changes pointed out by the young people were the intensification of insecurity, the expansion of drug dealing in the community, mental health problems (especially addictions), the restriction of mobility on the streets, and changes in the relationship with security institutions. They also refer to changes such as the normalization of drug trafficking and the decline of the neighborhood’s image.…”
    Get full text
    Article
  5. 5685

    Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem by Fanyu KONG, Yong QIAO, Pengtao LIU, Xiaodong LIU, Dashui ZHOU

    Published 2019-02-01
    “…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
    Get full text
    Article
  6. 5686

    Existe-t-il un renouveau syndical en Argentine ? Le cas du secteur automobile by Cecilia Senén González, Julieta Haidar

    Published 2014-01-01
    “…The data cover the period 2003-2012 and were systematized by the Ministry of Labour, Employment and Social Security (Ministerio de Trabajo, Empleo y Seguridad Social, MTEySS).…”
    Get full text
    Article
  7. 5687

    THE MAIN PROBLEMS OF THE DEVELOPMENT OF INSURANCE SERVICES IN THE AGRICULTURAL SECTOR OF THE REPUBLIC OF TAJIKISTAN AND THE WAYS OF ITS SOLUTION by G. Jabarov

    Published 2017-03-01
    “…The article dwells on problems of development of insurance services in the Republic of Tajikistan, the insurance market, in particular the development of insurance services in the agricultural sector and its influence on the further development of agriculture and food security in Tajikistan. The author determines that among the most pressing problems which inhibit the insurance, is not well-developed banking system, not profitability and productivity of existing farms and farms, insufficient government subsidies in the agricultural sector, macroeconomic factors, increased differentiation of agricultural producers in terms of income, the bankruptcy of a large part of dehkan (farmer) economy and the lack of necessary infrastructure. …”
    Get full text
    Article
  8. 5688

    Application Prospect of Space-Integrated-Ground Information Network in Railway by Kaifeng WANG, Xiangbao KAI, Ming LI, Yuan GAO, Yun LIU, Jinchuan CHAI

    Published 2021-03-01
    “…With the advantages of wide coverage, no geographical restrictions and convenient establishment, the spaceintegrated-ground information network can integrate with the existing railway communication network and expand the railway communication service capacity and service scope.Based on the analysis of the application status of railway communication system in China, the application requirements of the space-integrated-ground information network from the aspects of railway business, technical development and intelligent railway construction were discussed.The overall application framework of the space-integrated-ground information network was put forward, the access mode and application mode of the network and satellite terminals were designed, and the typical application requirements in railway survey and construction, emergency rescue, railway operation and security were analyzed.…”
    Get full text
    Article
  9. 5689

    Tributary by James Davoll, Paul Dolan, Pete Howson

    Published 2023-05-01
    “…Tributary explores covert, 'black-boxed' data centres (remote and highly secure sites) by tracking water and geothermal sources to the infrastructure required to power and house these physical locations of intensive computational processing. …”
    Get full text
    Article
  10. 5690

    Review of information hiding on Chinese text by Guohua WU, Lichun GONG, Lifeng YUAN, Ye YAO

    Published 2019-09-01
    “…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
    Get full text
    Article
  11. 5691

    Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act by Melissa M. Kreye, Elizabeth F. Pienaar, Raoul K. Boughton, Lindsey Wiggins

    Published 2016-02-01
    “… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
    Get full text
    Article
  12. 5692

    Identification of critical nodes in supply chain networks by Zhen Hua, Yongxiang Xia, Yucheng Chen, Weigang Sun

    Published 2025-01-01
    “…The accurate identification of the critical nodes in a SCN is important for securing the supply chain. This study proposes a new method for identifying critical nodes in SCNs based on the topological and functional characteristics of SCNs. …”
    Get full text
    Article
  13. 5693

    VALUES OF MOLDOVANS HIGH SCHOOL STUDENTS FROM ITALY AND THE REPUBLIC OF MOLDOVA: A CROSS-CULTURAL ASPECT by CAUNENCO Irina, ROȘCA Tatiana

    Published 2023-02-01
    “…Therefore, if for schoolchildren - sons of Moldovan migrants, the priority values are: interesting work and material security, then for their colleagues from the Republic of Moldova, the priority belongs to the spheres of life: family and health. …”
    Get full text
    Article
  14. 5694

    A Laryngoscope with Shape Memory Actuation by Fischer Nikola, Ho Patty, Marzi Christian, Schuler Patrick, Mathis-Ullrich Franziska

    Published 2024-09-01
    “…Endotracheal intubation is a medical procedure to secure a patient’s airways, which can be challenging in emergency situations due to an individual’s anatomy. …”
    Get full text
    Article
  15. 5695

    Individual Agency and the Diversity of Traditional Practice: The Iji Nla Association of Ijede by Charles K. Omotayo

    Published 2021-12-01
    “…Over time, it increasingly functioned as an institution providing traditional social control mechanisms and security. This article focuses on the origin, structure, and diversity of the Iji Nla Association as a traditional social mechanism and its continued relevance in Ijede. …”
    Get full text
    Article
  16. 5696

    State Failure and The Sunni-Shia Conflict in Sampang Madura by Akhmad Siddiq, Lely Shofa Imama, Muhammad Febriansyah, Muhamad Ali Hisyam

    Published 2023-12-01
    “…It will not only figure out the discourse through political or security perspective, but also tries to view the failure and the weakness of the state from the conflict-transformation and social perspective. …”
    Get full text
    Article
  17. 5697

    An Improvement of the Camshift Human Tracking Algorithm Based on Deep Learning and the Kalman Filter by Van-Truong Nguyen, Duc-Tuan Chu, Dinh-Hieu Phan, Ngoc-Tien Tran

    Published 2023-01-01
    “…Automated human tracking in real time has been applied in many areas such as security, surveillance, traffic control, and robots. …”
    Get full text
    Article
  18. 5698

    Verifiable special threshold secret sharing scheme based on eigenvalue by Yanshuo ZHANG, Wenjing LI, Lei CHEN, Wei BI, Tao YANG

    Published 2018-08-01
    “…Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12.…”
    Get full text
    Article
  19. 5699

    Analysis of instructions virtual machine vulnerabilities in anti-virus software by Yijun WANG

    Published 2016-10-01
    “…Instructions virtual machine technology is one of the core technologies used in today's anti-virus field, the vast majority of anti-virus software scan engines use virtualization technology to analyze file and to revert the behavior of this program whether will be a threat to system security or not. According to this process behavioral characteristics, it is determined whether it is a virus or Trojan. …”
    Get full text
    Article
  20. 5700

    Delay-Range-Dependent H∞ Control for Automatic Mooring Positioning System with Time-Varying Input Delay by Xiaoyu Su, Hongzhang Jin, Wei Shen, Yunbiao Gu

    Published 2014-01-01
    “…Aiming at the economy and security of the positioning system in semi-submersible platform, the paper presents a new scheme based on the mooring line switching strategy. …”
    Get full text
    Article