Showing 5,801 - 5,820 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5801

    STUDY ON RELIABILITY OF PHOTOELECTRIC PCB UNDER THERMAL CYCLE by CHENG Lei, ZHOU DeJian, WU ZhaoHua

    Published 2017-01-01
    “…The influence of thermal cycle loading on optoelectronic PCB(Printed Circuit Board) reliability was presented.In product conceptual design stage,the three-dimensional finite element model of photoelectric PCB was established.The finite element analysis was carried out under thermal cycle loading which defined by GJB 150.5-86.The influence includes solder joints reliability of optoelectronic PCB,optical coupling efficiency and optical fiber reliability.The following results are obtained.First,the maximum stress of solder joint and optical fiber ribbon is in the security range and the structure is not destroyed.Second,photoelectric coupling efficiency is not changed significantly,which guarantees the stability of the optical transmission.It proves the feasibility of the design scheme and promotes the engineering applications of photoelectric interconnection technology.…”
    Get full text
    Article
  2. 5802

    Energy Conservation, Singular Orbits, and FPGA Implementation of Two New Hamiltonian Chaotic Systems by Enzeng Dong, Guanghan Liu, Zenghui Wang, Zengqiang Chen

    Published 2020-01-01
    “…Since the conservative chaotic system (CCS) has no general attractors, conservative chaotic flows are more suitable for the chaos-based secure communication than the chaotic attractors. …”
    Get full text
    Article
  3. 5803

    Advanced Facial Recognition Systems for Real-Time Embedded Applications by Guerbaoui Mohammed, Misbah Nouhaila, Selmani Abdelouahed, El Faiz Samira, Benhala Bachir, Ed-Dahhak Abdelali, Lachhab Abdeslam

    Published 2025-01-01
    “…Addressing mounting concerns in security and surveillance, this project aims to develop an advanced facial recognition system using a 2D detection approach. …”
    Get full text
    Article
  4. 5804

    Estate Planning by Martie Gillen, Josephine Turner, Vervil Mitchell

    Published 2012-03-01
    “…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
    Get full text
    Article
  5. 5805

    Method for detecting collusion attack node in road condition information sharing based on reputation point by Shichang XUAN, Hao TANG, Wu YANG

    Published 2021-04-01
    “…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
    Get full text
    Article
  6. 5806

    Novel and effective secret sharing scheme by Run-hua SHI, Liu-sheng HUANG, Wei YANG, Hong ZHONG

    Published 2012-01-01
    “…A novel secret sharing scheme was proposed.This scheme consisted of two layer protocols:in the first layer,a larger secret was split into t smaller integers (sub-secrets) based on the Stern-Brocot tree; in the lower layer,t sub-secrets obtained from the first layer were regarded as t initial states in one-dimensional cellular automaton model,and then from the t initial states it could dynamic create all participants’ shares according to the simple fixed rule.This scheme could dynamic add new member,adjust the threshold value and renew the secret and the shares.Besides,there were still other advantages that the costs of the computation were very low and the size of the shares was very small.The results of analysis show that it was secure and very efficient.…”
    Get full text
    Article
  7. 5807

    Internal agricultural policy of the government of A. V. Kolchak by E. A. Koshechkina

    Published 2020-10-01
    “…This circumstance eventually secured the victory of Bolshevism…”
    Get full text
    Article
  8. 5808

    Some key technical issues in the evolution from cloud network to computing network by Chang CAO, Shuai ZHANG, Ying LIU, Xiongyan TANG

    Published 2021-10-01
    “…Firstly, the development trend of cloud-network integration technology in recent years, the new problems and challenges it faces were analyzed.Then, based on the heterogeneous computing power, the sinking of computing power, and the new changes in computing-network linkage in business development, six major computing and network capabilities were proposed.Convergence requirements, combined with multi-cloud connection, differentiated bearer, and hierarchical security, discussed the case of building new capabilities and new business experience around the computing network.The analysis results show that it can be concluded that the computing network and the cloud network are closely related in the technical system, and the integration of the computing network is the inevitable result of the development and evolution of the integration of the cloud and the network, and it is also an inevitable choice for the development of the digital economy.…”
    Get full text
    Article
  9. 5809

    AI-Powered Decision Support Systems for Sustainable Agriculture using AI-Chatbot Solution by Emmanuel Asolo, Ifechukwu Gil-Ozoudeh, Chibundom Ejimuda

    Published 2024-06-01
    “…This study intends to link AI technology with farming, to make our future world more sustainable and food secure. …”
    Get full text
    Article
  10. 5810

    How the industrial journalist can promote good relations by Dirk Venter, Bosman Olivier

    Published 2022-11-01
    “…Managements must inform and motivate their employees at all times, drawing them closer to the heart of the company or organisation through messages conveyed by management supporting their job security, remuneration and recognition and increasing their insight and knowledge of the total work environment. …”
    Get full text
    Article
  11. 5811

    Measuring and analyzing node families in the Tor anonymous communication network by Xiao WANG, Bin-xing FANG, Pei-peng LIU, Li2 GUO, Jin-qiao SHI

    Published 2015-02-01
    “…Tor family was focused on design and given a family-level measurement of it.Based on Tor node families (over 3000) discovered from live Tor network data (from Jan.2011 to Dec.2012),a few characteristics of Tor node families were revealed,such as family size,bandwidth,geographical distribution as well as operators providing a few big families.The analysis validated the irreplaceable role played by family design in enhancing Tor’s anonymity.Based on the measurement,security analysis showed the serious availability threat a compromised node family can cause to the Tor network.Besides,It also discussed Tor hidden families and the potential anonymity risk caused by them.…”
    Get full text
    Article
  12. 5812

    La lutte contre la piraterie au large de la Somalie by Vice-amiral Gérard Valin

    Published 2024-03-01
    “…At the end of the day, only a global approach of the Somalian issues will be able to secure the Gulf of Aden, which is a strategic Sea Line Of Communication for the world trade. …”
    Get full text
    Article
  13. 5813

    Malware detection technology analysis and applied research of android platform by Wei-ping WEN, Rui MEI, Ge NING, Liang-liang WANG

    Published 2014-08-01
    “…For the Android platform security problem, a mobile client and server collaborative malware detection pro-posal was proposed, where mobile client application was mainly based on permission detection technology and imple-mented lightweight testing. …”
    Get full text
    Article
  14. 5814

    Carrier-grade NTP clock synchronization scheme of SD-WAN network by Qiangen ZHAO, Yu WANG, Ling TANG, Yongming YAN

    Published 2022-08-01
    “…SD-WAN is developing rapidly, and telecom operators and Internet companies are constantly expanding their layout.As a technology with diverse forms, SD-WAN has not made a clear specification for clock synchronization.The importance of clock synchronization to SD-WAN technology implementation and business running was analyzed.The advantages and disadvantages of the clock synchronization scheme of Internet public NTP service widely used in SD-WAN realizations were sketched.Thus the clock synchronization scheme of self-built NTP service in different scenarios was discussed.Furthermore, a clock synchronization method using management tunnel to transmit encrypted NTP synchronization data was designed, which made SD-WAN platform and devices obtain higher security and stability in time synchronization.…”
    Get full text
    Article
  15. 5815

    Research and implementation of reconfigurable SM4 cryptographic algorithm based on HRCA by Xiao ZHANG, Qinglei ZHOU, Bin LI

    Published 2020-10-01
    “…For the application scenarios that require high throughput and high security at the same time,based on HRCA,a high-performance scalable SM4 implementation scheme was proposed.Firstly,SM4 was formed to different calculation units of different granularity,and a general coarse-grained reconfigurable calculation unit was designed.Then,various mapping strategies were given for the purpose of satisfying different encryption modes,and the algorithm was mapped to the reconstructed computing unit according to different strategies.Finally,the SM4 overall architecture was optimized by dividing the control plane and the data plane.The experimental results show that using the proposed method,the SM4 algorithm has a significant improvement in throughput under lower resource consumption.…”
    Get full text
    Article
  16. 5816

    Asymptotic analysis of American call options by Ghada Alobaidi, Roland Mallier

    Published 2001-01-01
    “…American call options are financial derivatives that give the holder the right but not the obligation to buy an underlying security at a pre-determined price. They differ from European options in that they may be exercised at any time prior to their expiration, rather than only at expiration. …”
    Get full text
    Article
  17. 5817

    Privacy protection key distribution protocol for edge computing by Jian SHEN, Tianqi ZHOU, Chen WANG, Huijie YANG

    Published 2021-02-01
    “…Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented.…”
    Get full text
    Article
  18. 5818
  19. 5819
  20. 5820

    Československá vojenská mise v Kanadě: Činnost a výsledky by Tomáš Jiránek

    Published 2012-01-01
    “… The Czechoslovak military mission in Canada (1941–1943) aimed to secure the enlistment of local Czechs to Czechoslovak units in Great Britain. …”
    Get full text
    Article