Showing 5,781 - 5,800 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 5781

    Cluster-based key management scheme for ad hoc networks by HU Rong-lei1 2, LIU Jian-wei2, ZHANG Qi-shan2

    Published 2008-01-01
    “…A new threshold key distribution scheme basing on self-certified public key and CPK(composite public key) technology was presented for ad hoc networks.Basing on the key distribution scheme and cluster networks structure,an integrated key management scheme was presented.The public key can be certified itself and so the certificate is not need in the scheme.The process of key distribution is simple and the key escrow problem existing in IBE(identity-based en-cryption) scheme is solved.The scheme can be used in different scale networks and can meet the dynamic topology of the ad hoc networks.The experimental results and theoretical analysis show that the overhead of computation and communi-cation is lower.Comparing with PKI and IBE scheme the scheme is more secure and practical.…”
    Get full text
    Article
  2. 5782

    Remarks on the Reasoning: The Morals of a Hungarian Expulsion Decision in Times of Pandemic by Erzsébet Csatlós

    Published 2021-05-01
    “… Several Iranian university students were expelled from Hungary to Iran due to their (allegedly) unlawful behaviour during their quarantine period at the outburst of the Covid-19 pandemic on grounds of being a threat to public policy and public security. The case reveals a worrisome practice in the reasoning of expulsion decisions, irrespective of the pandemic. …”
    Get full text
    Article
  3. 5783

    Service Provider Selection For Project Logistics Operations With Fuzzy Analytic Hierarchy Process by Gökay Çiçekli, Yunus Kaymaz

    Published 2023-01-01
    “…The results are that for project logistics management, logistics service providers need to improve vehicle availability, cargo security, on-time delivery, etc. to become more competitive.…”
    Get full text
    Article
  4. 5784

    Optical fiber eavesdropping detection method based on machine learning by Xiaolian CHEN, Yi QIN, Jie ZHANG, Yajie LI, Haokun SONG, Huibin ZHANG

    Published 2020-11-01
    “…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
    Get full text
    Article
  5. 5785

    “Un-American Confessions”: Translation as Subversion in Robert Lowell’s Life Studies (1959) by Simon Van Schalkwyk

    Published 2017-08-01
    “…The Life Studies imitations, by this account, offer furtive testimony to Lowell’s potentially subversive poetic preoccupation and engagement with cold war cultural anxieties circulating around terms such as containment, conspiracy, domesticity, paranoia, security, secrecy.…”
    Get full text
    Article
  6. 5786

    RBFT: a new Byzantine fault-tolerant consensus mechanism based on Raft cluster by Dongyan HUANG, Lang LI, Bin CHEN, Bo WANG

    Published 2021-03-01
    “…The existing consensus mechanisms of consortium blockchain are not scalable enough to provide low latency, high throughput and security while supporting large-scale network.A new consensus mechanism called RBFT was proposed to improve scalability, which was a two-level consensus mechanism with supervised nodes based on the idea of network fragmentation.In RBFT, the nodes were firstly divided into several groups.Each group adopted the improved Raft mechanism to reach consensus and select leader.Then, the leaders of each group formed the network committee, and the network committee adopted PBFT mechanism for consensus.Comparative experiments verify that RBFT can tolerant Byzantine fault while ensuring high consensus efficiency in large-scale network compared with PBFT and Raft.…”
    Get full text
    Article
  7. 5787

    A compressive data gathering method based on El Gamal cryptography by Xiaohan YU, Keming DONG, Xia LI, Chao CHEN

    Published 2019-12-01
    “…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
    Get full text
    Article
  8. 5788

    Asymmetric watermarking based on Contourlet transform and subspace projection by HE Mi, CHENG Li-zhi

    Published 2009-01-01
    “…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
    Get full text
    Article
  9. 5789

    Status of GPU capabilities within the Shift Monte Carlo radiation transport code* by Biondo Elliott, Davidson Gregory, Evans Thomas, Hamilton Steven, Johnson Seth, Pandya Tara, Royston Katherine, Salcedo-Pérez José

    Published 2025-01-01
    “…Shift is a general-purpose Monte Carlo (MC) radiation transport code for fission, fusion, and national security applications. Shift has been adapted to efficiently run on GPUs in order to leverage leadership-class supercomputers. …”
    Get full text
    Article
  10. 5790

    Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer by T. Youssef, M. Chadli, H. R. Karimi, M. Zelmat

    Published 2013-01-01
    “…This paper presents an unknown input Proportional Multiple-Integral Observer (PIO) for synchronization of chaotic systems based on Takagi-Sugeno (TS) fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. …”
    Get full text
    Article
  11. 5791

    Use of biological control agents for managing fungal pathogens in Solanaceae crops: progress and future perspectives—a review by Sinhle Madlhophe, Udoka Vitus Ogugua, Fikile Nelly Makhubu, Sandiswa Figlan

    Published 2025-01-01
    “…Abstract The growing global population has intensified concerns about food security, making it essential to produce crops sustainably to meet increasing demands without harming the environment. …”
    Get full text
    Article
  12. 5792

    GreyFan:a network attack framework using Wi-Fi covert channel by Dongjie MA, Chengqiang JIN, ·uan CHEN, Tieming CHEN

    Published 2019-09-01
    “…For traditional physical attacks such as side channel attacks and HID attacks in real networks,physical isolation is considered to be a relatively complete security protection against network attacks.In 2018,a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed,that is,in the state that Wi-Fi didn’t connected,the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi,such as file concealed transmission and arbitrary code execution,etc.The corresponding defense technology was also analyzed.…”
    Get full text
    Article
  13. 5793

    Repair of traumatic flank hernia with mesh strip suture: a case report by Shin Ae Lee, Ye Rim Chang

    Published 2022-08-01
    “…Our findings indicate that when it is difficult to secure a sufficient operative field for mesh anchoring in a traumatic flank hernia, a technique of sutured repair with mesh strips may be considered as a treatment option as it requires less dissection. …”
    Get full text
    Article
  14. 5794

    Green IoT: how wireless sensor networks are paving the way for sustainable smart environments by Haifa Alqahtani

    Published 2023-06-01
    “…This article clarifies the concept of the IoT, including its features, security concerns, and technology adoption trends.…”
    Get full text
    Article
  15. 5795

    Direct radiocarbon dating and stable isotopes of the neandertal femur from Les Rochers-de-Villeneuve (Lussac-les-Châteaux, Vienne) by Cédric Beauval, François Lacrampe-Cuyaubère, Bruno Maureille, Erik Trinkaus

    Published 2006-06-01
    “…The direct radiocarbon date makes it the oldest directly dated European Neandertal specimen, even though others have securely associated radiocarbon dates in the same time range. …”
    Get full text
    Article
  16. 5796

    Research on key technology and development of industrial Internet network by Feng WANG, Qingmin YU, Ying HUANG, Shihui Duan

    Published 2022-07-01
    “…In recent years, the rapid development of the industrial Internet has become an important approach to promote the digital transformation of the industries.In order to maximize the role of the comprehensive interconnection of people, machines, things and enterprises in the industrial Internet, it is necessary to build a more open, more resilient and more diverse network which integrates automation systems, communication networks, and new-generation information technologies, and also meets the basic requirements of the reliability, stability, and security.The connotation of the industrial Internet network serving manufacturing was discussed.Relevant key technologies, applicable scenarios and main research results were introduced.The research and development trends in this field were summarized and analyzed.Suggestions for further construction and deployment of the industrial Internet networks were proposed.…”
    Get full text
    Article
  17. 5797

    Constructing Core Backbone Grid Based on the Index System of Power Grid Survivability and BBO Algorithm by Feifei Dong, Dichen Liu, Jun Wu, Fei Tang, Chunli Song, Haolei Wang, Lina Ke, Bingcheng Cen, Wentao Sun, Zhenshan Zhu

    Published 2014-01-01
    “…The survivability index of power grid is made up of four indices, namely, the resistibility, recoverability, security, and connectivity. Based on survivability, a method of constructing core backbone grid with the optimal criteria of the minimal total line length and the largest integrated survivability index is put forward. …”
    Get full text
    Article
  18. 5798

    Determinants of Market Liquidity of Shares Traded on the BM&FBOVESPA by Laíse Ferraz Correia, Hudson Fernandes Amaral

    Published 2014-01-01
    “…The greater the difference between the price offered and the demanded on a security (bid-ask spread), the greater its illiquidity. …”
    Get full text
    Article
  19. 5799

    Human personality privacy analysis based on visual features by Jie NIE, Lei HUANG, Zhen LI, Jian ZHANG, Yan YAN, Zhi-qiang WEI

    Published 2016-11-01
    “…But from perspective of privacy protection, this will affect the privacy security. A novel hu-man personality privacy analysis method based on portrait was proposed. …”
    Get full text
    Article
  20. 5800

    Dandiacal Conversation in Oscar Wilde’s Comedies of Manners: Conventions, Conversions and Reconfigurations of Phallogocentrism by Gilbert Pham-Thanh

    Published 2010-12-01
    “…Their strong reliance on rhetoric ensures their supremacy in polite conversation, even if their intellectual and cultural edge does a lot to secure their domination. What is more, their mastery of codes and norms enables them to destabilize the semantics of the age, a gesture which can be equated to a reconfiguration of Victorian patriarchy and even a dismissal of Victorian grand narratives.…”
    Get full text
    Article