Showing 5,861 - 5,880 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 5861
  2. 5862

    Chaotic Puma Optimizer Algorithm for controlling wheeled mobile robots by Mohamed Kmich, Nawal El Ghouate, Ahmed Bencharqui, Hicham Karmouni, Mhamed Sayyouri, S.S. Askar, Mohamed Abouhawwash

    Published 2025-03-01
    “…The control of wheeled mobile robots plays a crucial role in many fields, including automation, logistics, security, and even space exploration. This paper presents a significant improvement in the control of wheeled mobile robots based on an enhanced version of the Puma optimization algorithm by integrating chaotic maps in both optimization phases, exploration and exploitation. …”
    Get full text
    Article
  3. 5863

    Key distribution and recovery algorithm based on Shamir's secret sharing by Hui-gui RONG, Jin-xia MO, Bing-guo CHANG, Guang SUN, Fei LONG

    Published 2015-03-01
    “…Theoretical analysis and simulation show that the improved scheme improves its security under the same conditions of complexity.…”
    Get full text
    Article
  4. 5864

    Homomorphic signature schemes for single-source and multi-source network coding by Huifang YU, Wen LI

    Published 2019-11-01
    “…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
    Get full text
    Article
  5. 5865

    A Survey of Artificial Immune System Based Intrusion Detection by Hua Yang, Tao Li, Xinlei Hu, Feng Wang, Yang Zou

    Published 2014-01-01
    “…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
    Get full text
    Article
  6. 5866

    Reconsidering the “Critical-Corrective” Article of the Single Article Approved in September 2017 on “Iranian Citizenship of Children Born to Iranian Women Married to Non-Iranian M... by Mostafa Daneshpajooh

    Published 2021-01-01
    “…However, the conceptual ambiguities and implementation problems of this single article caused the legislator to repeal the previous single article by approving a new article in 1398.This article is an attempt to illustrate the article’s strengths and weaknesses by reconsidering the “critical-corrective” nature of the new single article, and especially to explain its incompatibility with the forty-first principle of the constitution; it is finally suggested that due to the truth and nature of citizenship and more compatibility with Article 41 of the Constitution, maternal lineage, like paternal lineage, secure the Iranian citizenship to the child.…”
    Get full text
    Article
  7. 5867

    Qu’elle était verte ma vallée by Hervé Nicolle

    Published 2013-06-01
    “…Such a progressive loss of identity of nomadic Kuchi raises an important political question at a time when Afghanistan has to deal with both the uncertainty of the on going political “transition” and a worsening security context.…”
    Get full text
    Article
  8. 5868

    Legal Trust and Social Development: Chosen Aspects of the Relationship by Duszka-Jakimko Hanna Beata

    Published 2024-10-01
    “…Taken together, the fulfilment of these requirements determines the stability of the state of law, the predictability of its application, legality, durability, and, consequently, the ontological security of individuals and social development.…”
    Get full text
    Article
  9. 5869

    Extended access control mechanism for cross-domain data exchange by Rongna XIE, Yunchuan GUO, Fenghua LI, Guozhen SHI, Yaqiong WANG, Kui GENG

    Published 2019-07-01
    “…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
    Get full text
    Article
  10. 5870

    Satellite-Earth Integration Intelligent Resource Management and Control Architecture of Giant Sensing Constellation by Yingte CHAI, Gang WANG, Chao ZHANG, Guangxi ZHU, Wei FU, Zhengqiang GUO

    Published 2022-09-01
    “…The giant sensing constellation will have the capabilities of on-board automatic processing, on-board independent planning, multisensors and multi-mode automatic switching.The traditional control mode of relying solely on the ground system can no longer meet the requirements of the giant sensing constellation.According to the requirements of intelligent and networked control, an integrated intelligent resource management and control architecture was proposed.It was based on the integration of satellite and earth.The work contents of satellite and earth were specifically designed.The interaction mechanism between satellite and earth was designed.The architecture it proposed could be well applied to the independent resource management and controlled of giant sensing constellation.The architecture realized the "networking, autonomy and intelligence" of the giant sensing constellation and it could played an important role in major national security emergency response and other tasks.…”
    Get full text
    Article
  11. 5871

    Cuban economically active population: a new battle? by Olga Lourdes Vila Pérez

    Published 2009-03-01
    “…This category includes persons with appropriate working capacity between 17 years and the retirement age, which is stated in the act No. 24 of Cuban Social Security. Since we support the idea of increasing production and productivity of goods worldwide, and we hold up any initiative to enhance human satisfaction or happiness, it is unprofitable for us not to be able to have millions of persons on condition that they spend their physical and mental capacity in the creation of our wealth. …”
    Get full text
    Article
  12. 5872

    Equity decentralized consensus algorithm based on incentive compatibility by Youliang TIAN, Yansen YUAN, Hongfeng GAO, Yang YANG, Jinbo XIONG

    Published 2022-12-01
    “…The PoW consensus algorithm has been proved to be incentive incompatible, existing computing centralization under high reward differences and slow convergence of forks in extreme cases.Based on this, an incentive-compatiblebased consensus algorithm SSPoW was proposed.By introducing local solutions to calculate the computing power aggregated on the block chain, the explicit quantification of computing power was used to speed up the convergence of the fork, thus satisfying the consistency of the blockchain.Incentive compatibility was achieved by improving the reward scheme, which reduced the problem of computing centralization caused by high reward differences.Simulation results prove that the proposed algorithm could effectively reduce the reward differences and is more efficient than the traditional PoW consensus algorithm, which has positive implications for improving system security and consensus efficiency.…”
    Get full text
    Article
  13. 5873

    Design and implementation of hardware-based dynamic instruction set randomization framework by San DU, Hui SHU, Fei KANG

    Published 2017-11-01
    “…All the existing ISR methods have some defects including stripping data from code segment is hard to accomplish,static ISR has fixed key and pseudo-random key is not secure.To introduce ISR technology into the se-curity protection of kernel layer and application layer,hardware-based dynamic instruction set randomization framework (HDISR) was designed and implemented,in which program code was encrypted at loading time.Kernel encryption uses kernel key and applications encryption uses a different user key per process.The experimental re-sults show that HDISR can degrade code injection attack to Denial of Service attack with less than 2.57% additional hardware and 0.31s startup delay of each megabyte code encryption.…”
    Get full text
    Article
  14. 5874

    MASALAH SOSIAL DAN KONFLIK MASYARAKAT ADAT PAPUA DENGAN PT FREEPORT INDONESIA by Nita Safitri

    Published 2016-01-01
    “…Not only casualties property but also be a “thorn in the flesh” in the way of national and state, because this conflict into the international spotlight and influence overseas investor for security reason that are not guaranteed. The conflict has taken approximately 40 years old, there must be something wrong in the stage of completion. …”
    Get full text
    Article
  15. 5875

    Trusted solution monitoring system based on ZigBee wireless sensor network by Tian-shu WANG, Gong-xuan ZHANG, Xi-chen YANG

    Published 2017-11-01
    “…In the greenhouse environment,the concentration of nutrient solution was always ignored.At the same time,the core node coordinator of the ZigBee wireless monitoring system was easily compromised.A trusted solution monitoring system based on ZigBee wireless sensor network was designed and implemented.Firstly the hardware structure of sensor,router and coordinator was introduced.Then the processes of external voltage measurement and data cleaning were illustrated.For realizing the trusted boot of the coordinator,trusted u-boot to measure the integrity of some key files was designed.Experimental results show that the solution concentration data could be sent from each node to the monitoring computer and the remote terminal.At the same time,the trusted module of the coordinator can detect the captured coordinator node and warning.Therefore,the designed system has strong function and security.…”
    Get full text
    Article
  16. 5876

    SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS by Phạm Duy Lộc, Phan Thị Thanh Nga

    Published 2016-06-01
    “…Nowadays, there are commercial and free tools to automatically test websites’ security which is considered to be the positive point for pen-tester. …”
    Get full text
    Article
  17. 5877

    A Monitoring Approach Based on Fuzzy Stochastic P-Timed Petri Nets of a Railway Transport Network by Anis M’hala

    Published 2021-01-01
    “…The main goal of the proposed supervision approach is to allow an early detection of traffic disturbance to avoid catastrophic scenarios and preserve stability and security of the studied railway networks. Finally, to demonstrate the effectiveness and accuracy of the approach, an application to the case study of the Tunisian railway network is outlined.…”
    Get full text
    Article
  18. 5878

    The Milk Income Loss Contract Program for Dairy Producers by Albert de Vries

    Published 2005-02-01
    “…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
    Get full text
    Article
  19. 5879

    MORAL-ETHICAL ASPECTS OF THE DIGITAL ECONOMY by A. A. Sychev, E. V. Zaytseva, P. S. Tolkachev

    Published 2020-03-01
    “…It is obvious, that the creation of the Russian information system will be able to increase the efficiency of our national economy (including the objectives of its state regulation) and at the same time raise the level of the country’s security. However, the effective use of the digital economy does not only depend on the level of development of the technical base of the information system. …”
    Get full text
    Article
  20. 5880

    Ruinscapes and Subversion of Temporalities in For the Mercy of Water by Şevket Sarper Dörter

    Published 2023-10-01
    “…For the Mercy of Water is the story of a writer travelling to an unnamed, abandoned countryside, in an imagined Global Southern country, to interview an old woman identified as “Mother” after the murder of the young girls by the water security guards of “the company.” I examine For the Mercy of Water’s representation of exploited, marginal rural space as a ‘ruinscape’ that manifests the palimpsestic overlay between linear time, industrial time, colonialism, and neoliberal globalization. …”
    Get full text
    Article