Showing 5,761 - 5,780 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 5761

    Design of knowledge transaction protection mechanism in the open innovation community based on blockchain technology by Dongshan Yang, Ling Zhao, Feng Leng, Zujun Shi

    Published 2025-03-01
    “…This paper proposes an approach that combines blockchain technology and an OIC, as blockchain technology provides a direction for solving trust and security problems in community platform transactions. …”
    Get full text
    Article
  2. 5762

    INFORMATION-ANALYTICAL SYSTEM OF MONITORING OF THE SHADOW OF NON-CASH FLOW: BASIC ELEMENTS, AUTHOR’S SIMULATION ALGORITHM by E. Baturina

    Published 2019-09-01
    “…The sequence of actions of users of the developed monitoring system has been revealed, which allows to calculate the minimum value of the shadow cashless cash flow, as well as quantitatively and qualitatively characterize the shadow economy, which is prospective in solving the problems of economic security of Russia.…”
    Get full text
    Article
  3. 5763

    Data processing based on the privacy-preserving vector for wireless sensor networks by Wei-ni ZENG, Ya-ping LIN, Ye-qing YI, Shi-ming HE, Peng CHEN

    Published 2015-09-01
    “…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
    Get full text
    Article
  4. 5764

    Methodological foundations of political-geographical studies of borders using the example of Hungary by Mađar Ede

    Published 2024-01-01
    “…Border management involves control of movement, security, and cross-border cooperation, which is critical for regional stability and development. …”
    Get full text
    Article
  5. 5765

    Sharenting – skala i wielowymiarowość zjawiska (nierozważnego) ujawniania przez rodziców informacji o dzieciach w mediach społecznościowych by Bożena Chrostowska

    Published 2018-12-01
    “…There is a need of educational actions, directed to both parents and society, about the children’s security and safety of their privacy in the Internet. …”
    Get full text
    Article
  6. 5766

    REVIEW ON OPERATION STATE ASSESSMENT AND PROGNOSTICS FOR MECHANICAL EQUIPMENT BASED ON HIDDEN MARKOV MODEL by JI Yun, WANG Heng, ZHU LongBiao, HUANG Xi

    Published 2017-01-01
    “…With the continuous improvement requirements of reliability and security for mechanical equipment,accurate extraction of equipment fault development trend of degradation characteristic information and establishment of effective fault prediction model is the key problem to improve reliability of equipment operation. …”
    Get full text
    Article
  7. 5767

    Efficient communication protocol of group negotiation in VANET by Mu HAN, Lei HUA, Liangmin WANG, Haobin JIANG, Shidian MA

    Published 2018-01-01
    “…An efficient communication protocol of group negotiation was proposed.The protocol adopted self-checking authentication in group to avoid the nodes sending certificates to the authentication center which improved the efficiency of identification.At the same time,the group establishment among nodes which through negotiation ensured the communication confidentiality and prevented the phenomenon of single-point failure.Besides,a group key transmission scheme was proposed to reduce the frequency of authentication for legal vehicles and improve the speed of joining in the group.At the end,theoretical analysis and simulation results demonstrate that the proposed protocol not only meets the security requirements of communication in VANET,but also shows much better performance than previous reported schemes on verification delay,transmission overhead and average delay.…”
    Get full text
    Article
  8. 5768

    CAN bus flood attack detection based on communication characteristics by Yimu JI, Zhipeng JIAO, Shangdong LIU, Fei WU, Jing SUN, Na WANG, Zhiyu CHEN, Qiang BI, Penghao TIAN

    Published 2020-02-01
    “…CAN has become the most extensive fieldbus for contemporary automotive applications due to its outstanding reliability and flexibility.However,the standard CAN protocol does not provide sufficient security measures and is vulnerable to eavesdropping,replay,flooding,and denial of service attacks.In order to effectively detect whether the CAN bus is attacked,and to filter malicious messages when subjected to flooding attacks.The characteristics of vehicle CAN bus message communication were analyzed,and an intrusion detection method was proposed,which could effectively perform intrusion detection and malicious message filtering.Through experimental verification,the method can detect whether the CAN bus is attacked by 100%,and the accuracy of malicious packet filtering can reach over 99%.…”
    Get full text
    Article
  9. 5769

    Key-exposure resilient integrity auditing scheme with encrypted data deduplication by Xiangsong ZHANG, Chen LI, Zhenhua LIU

    Published 2019-04-01
    “…For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.…”
    Get full text
    Article
  10. 5770

    Dual-branch autoencoder network for attacking deep hashing image retrieval models by Sizheng FU, Chunjie CAO, Zhiyuan LIU, Fangjian TAO, Jingzhang SUN

    Published 2023-11-01
    “…Due to its powerful representation learning capabilities and efficient computing capabilities, deep learning-based hashing (deep hashing) methods are widely used in large-scale image retrieval.However, there are less studies on the security of deep hashing models.A dual-branch autoencoder network (DBAE) to study targeted attacks on such retrieval was proposed.The main goal of DBAE was to generate imperceptible adversarial samples as query images in order to make the images retrieved by the deep hashing model semantically irrelevant to the original image and relevant to the target image.Numerous experiments demonstrate that DBAE can successfully generate adversarial samples with small perturbations to mislead deep hashing models, and italso verifies the transferability of these perturbations under various settings.…”
    Get full text
    Article
  11. 5771

    The role of pangenomics in orphan crop improvement by Haifei Hu, Junliang Zhao, William J. W. Thomas, Jacqueline Batley, David Edwards

    Published 2025-01-01
    “…Abstract Global food security depends heavily on a few staple crops, while orphan crops, despite being less studied, offer the potential benefits of environmental adaptation and enhanced nutritional traits, especially in a changing climate. …”
    Get full text
    Article
  12. 5772

    Multiuser secret key generation based on received signal by Aolin CAI, Liang JIN, Zhou ZHONG, Yangming LOU

    Published 2018-10-01
    “…The secret key generation method based on channel characteristic provides a new way for communication security.But under the conditions of multiuser and slow fading,because of the slow channel parameter changing rate,using the secret key generation method above can result in a low secret key rate.To solve this problem,a multiuser secret key generation method based on the received signal was proposed.By distributing the random signals to different users using block diagonalization precoding,base station and user can extract the secret key from the received signal.The novel method could significantly increase the secret key rate of multiuser under the quasi-static channel and slow-fading channel,which is verified by simulations.…”
    Get full text
    Article
  13. 5773

    Food Insecurity and Obesity by Rachel Savelle, LaToya J. O'Neal

    Published 2017-05-01
    “…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
    Get full text
    Article
  14. 5774

    Du détroit de Malacca jusqu’à sa périphérie by Eric Frécon

    Published 2009-09-01
    “…Although the Malacca Strait was previously one of the main piracy prone areas, it is becoming increasingly secure, and presents itself as a good example. Nevertheless, field research tends to cast a shadow over this optimistic view. …”
    Get full text
    Article
  15. 5775

    Blockchain-based ARP defense scheme by Fanming LIU, Wei SHI

    Published 2018-09-01
    “…In order to improve the difficulty of maintaining the static binding method when defending against ARP attacks,a defense method was designed with the features of low cost of defense and easy maintenance by using the idea of a blockchain technology.The blockchain structure had been improved,and the transaction index table structure had been designed to identify attacks and update data in a timely manner to prevent subsequent attacks.The content of the transaction index table was updated after the IP address was changed normally to ensure the correctness of the query.Analysis and experiments show that the blockchain-based defense method has the following merits:high security,guaranteeing the data is not tampered with,low cost of maintenance,and effective prevention against ARP spoofing attacks.…”
    Get full text
    Article
  16. 5776

    THE SIGNIFICANCE AND ROLE OF USING INNOVATIVE TECHNOLOGIES IN MODERN AGRICULTURAL PRODUCTION by Mladen Petrović, Irina Marina, Marko Jeločnik

    Published 2024-11-01
    “…So, current agrifood production ensures food safety and security by the wider use of various drones, robots, sensors, software packages, IoT, etc., enabling business optimization, sustainability and profitability. …”
    Get full text
    Article
  17. 5777

    Decolonising Bibles? Image, imagination, and imagin(in)g in the postcolonial academy by J. Punt

    Published 2023-11-01
    “…Ensconced in the image of ideologically secure and contented intellectual space, epistemological and hermeneutical approaches which explicitly involve the social location of interpreters and academic discourses are still viewed with concern if not suspicion. …”
    Get full text
    Article
  18. 5778

    Calculation Method of Driving Force of the Plate Quantitative Conveyor Chain Drive System by Xi Qiming, Shang Shibo, Liu Jingxiong, Yuan Hua

    Published 2015-01-01
    “…For improving the stability and security when the plate quantitative conveyor start-up and the accelerating operation,the calculation problem of driving force of chain drive system is studied.The maximum static tension of the chain drive system on stable operating conditions is calculated by point by point calculation method.The multi-axis electric drive system conversion method is proposed and the acceleration load is calculated by converted the inertial resistance of linear moving parts and rotating parts to drive shaft.The maximum driving force is sum of maximum static tension and the acceleration load.The results show that,the acceleration load account for the driving force about 35%,the drive power and breaking force calculation is necessary to consider the impact of the acceleration load in addition to the maximum static tension.…”
    Get full text
    Article
  19. 5779

    Estate Planning by Martie Gillen, Josephine Turner, Vervil Mitchell

    Published 2012-03-01
    “…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
    Get full text
    Article
  20. 5780

    How to Protect Future Generations' Rights in European Governance by Maja Göpel, Malte Arhelger

    Published 2010-10-01
    “…Given that future generations are right-bearing citizens of tomorrow, legislative systems should secure these rights through appropriate institutions. …”
    Get full text
    Article