Showing 5,881 - 5,900 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5881

    Full-dimensional definable network capabilities by Congshan FAN, Xu ZHOU, Yifang QIN, Taixin LI

    Published 2021-10-01
    “…To solve the problems of single form of existing network capabilities, poor dynamics, low efficiency, and difficulty in adapting to the needs of specialized and personalized services in complex scenarios in the future, a full-dimensional definable network capability model was proposed.Based on the design concept of “network centric”, each layer of the network is opened up to realize the definition of full-dimensional network capabilities such as communication subjects, network functions, network resources, and security, and supports dynamic loading and evolutionary development.Through self-mapping of service requirements and self-organization of network capabilities, it can flexibly adapt to service development needs, and actively output diversified network endogenous capabilities to terminal services in a variety of interface forms, which will naturally adapt to the complex and uncertain evolution of future services.…”
    Get full text
    Article
  2. 5882

    Evaluation of the fulfillment grade and clinical management of the treatment with immunotherapy in allergic patients. by Marisela L. Pérez Pacaréu, Andrea Ortega Cabrera, Ania Sabina Díaz, Rafael Zamora Puerta

    Published 2006-08-01
    “…Authorized personnel checked out the level of fulfilment of the security rules, clinical betterment was evaluated with a daily control of symptoms correlated with clinical history of allergy, and satisfaction was evaluated through a questionaire.…”
    Get full text
    Article
  3. 5883

    Improved SpaceTwist privacy protection method based on anchor optimization algorithm by Zhen-peng LIU, Xuan ZHAO, Ya-wei DONG, Bin ZHANG

    Published 2017-10-01
    “…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
    Get full text
    Article
  4. 5884

    Market Structure and Competition During Economic Transformation by David Benček, Hannah Rosenbaum, John P. Weche

    Published 2022-11-01
    “…The re-nationalization of production processes contributes to greater security of supply, but sometimes at the price of higher production costs. …”
    Get full text
    Article
  5. 5885

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  6. 5886

    Power services scheduling algorithm based on quantum communication by Zhuozhi YU, Yefeng ZHANG, Bingyang HAN, Wenwei CHEN, Dong WANG

    Published 2019-11-01
    “…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
    Get full text
    Article
  7. 5887

    Mormonisme et migration : la religion comme “amortisseur” des processus migratoires transatlantiques by Eliott Mourier

    Published 2010-11-01
    “…First, because those religious movements have historically taken, and will indeed take advantage of those migratory flows in order to maintain their vitality, and then, because it is clear that those transnational religions can provide their members with a “ security net ” that will cushion the shocks recurrent all along the different steps of the migratory process.…”
    Get full text
    Article
  8. 5888

    IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM by Đoàn Minh Khuê, Lê Hoài Bắc

    Published 2018-07-01
    “…Nowadays, the problem of data security in the process of data mining receives more attention. …”
    Get full text
    Article
  9. 5889

    Pupils’ approach to teachers’ role as motivating factor in foreign language classes by Virginija Jurate Pukeviciute, Migle Antaneliene

    Published 2017-02-01
    “…Moreover, it turned out that the schoolchildren feel less secure talking of interaction with teachers: they usually turn to the teachers only for subject matters; they do not always feel free in the classroom. …”
    Get full text
    Article
  10. 5890

    Privacy-preserving scheme for logistics systems based on 2D code and information hiding by Wen-bo YAN, Yuan-zhi YAO, Wei-ming ZHANG, Neng-hai YU

    Published 2017-11-01
    “…With regard to the user privacy leakage problem in existing logistics systems,a privacy-preserving scheme for logistics systems based on 2D code and information hiding was proposed.The information hiding tech-nique was used in the proposed scheme to embed the user privacy information into the 2D code on the logistics waybill to achieve access control.To secure the user privacy information,a JPEG image stenographic algorithm for 2D code was designed.Experimental results demonstrate that this algorithm can guarantee the high undetectable performance and the stego 2D code can be correctly decoded.Using the proposed scheme,the institution or the per-son that has the access right can obtain the important privacy information so that the express can be delivered cor-rectly and the user privacy can be preserved.…”
    Get full text
    Article
  11. 5891

    Az európai kormányzás új lehetősége - az Európai Területi Együttműködés jogi keretei az új európai kohéziós politikában (New Opportunity of the European Governance – The Legal Fram... by Zsuzsanna Fejes

    Published 2014-09-01
    “…The study summarizes the advantages of EGTC, how to response a new alternative to increase the efficiency, legitimacy and transparency of the activities of territorial cooperation, and at the same time secures legal certainty. The revised EGTC Regulation (1302/2013/EU) contains the most important pieces of legislation related to the cohesion policy and most of the programmes funded by the EU in the period 2014-2020.…”
    Get full text
    Article
  12. 5892

    Mental health in the hadith spotlight: enlightenment for a healthy soul by Yuliharti Yuliharti, Agustiar Agustiar, M. Ridwan Hasbi, Syafi'ah Syafi'ah, Usman Usman, M. Fahli Zatrahadi

    Published 2024-09-01
    “…The research results show that mental health in the hadith includes principles such as feelings of security, independence, responsibility, and physical and spiritual balance. …”
    Get full text
    Article
  13. 5893

    Internet design concepts and network 5.0 technologies by Lintao JIANG, Xiuying NIE, Jie ZHANG

    Published 2021-10-01
    “…The internet has been developed for more than 50 years, but its design concept has never changed.The business network is completely OTT, IP network is still “best effort”, which restricts the development of the internet.In order to continuously meet the needs of social development, the internet design idea needs to be changed, and the feasible direction is to be from “application-centered” to the “network-centered”.Network 5.0 is the fifth generation of data network, compared with the fourth generation of data network (IP network), it retains all the advantages of IP network, filling the absence of IP network in network performance and ability, with qualitative progress in performance and ability.The key technical issues on scalability, endogenous credible security, certainty and more aspects of network 5.0 were specifically discussed.…”
    Get full text
    Article
  14. 5894

    The Milk Income Loss Contract Program for Dairy Producers by Albert de Vries

    Published 2005-02-01
    “…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
    Get full text
    Article
  15. 5895

    The creation of Poland's development assistance system - continued by Bartosz Sobotka

    Published 2024-12-01
    “…Conclusions The rationale is based on existing comparative advantages and is linked to the overarching goals of Poland's foreign policy - creating security and increasing prosperity, in particular by improving the quality of human capital in Ukraine affecting the labour market in Poland in terms of migration. …”
    Get full text
    Article
  16. 5896

    Blockchain-based service publishing scheme with recommendation for cold start users by Xuewen DONG, Haozhe LIU, Hui QIAO, Jiawei ZHENG

    Published 2021-01-01
    “…In order to solve the problem that the existing publishing systems were vulnerable to tampering, and it was difficult to recommend service information to “cold start” users, a blockchain-based service publishing scheme that supported cold-start user recommendations was proposed.The latent feature mapping model of a single auxiliary domain was extended to two auxiliary domains to make more accurate recommendations for cold start users in the target domain.In addition, the microservice architecture and block technology were combined to ensure system scalability, reliability and security.The experimental results of three real data sets extracted from Amazon transaction data show that the proposed recommendation model is better than most other recommendation methods, and the service release information can be safely stored in the blockchain to ensure that it is not changed.…”
    Get full text
    Article
  17. 5897
  18. 5898

    Related-key impossible boomerang cryptanalysis on TWINE by Min XIE, Feng TIAN, Jiaqi LI

    Published 2019-09-01
    “…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
    Get full text
    Article
  19. 5899

    Technologies,standards and applications of LTE-V2X for vehicular networks by Shanzhi CHEN, Jinling HU, Yan SHI, Li ZHAO

    Published 2018-04-01
    “…V2X (vehicle to everything) communication is the critical technology to provide environment sensing,information exchange and cooperative control capabilities in vehicular networks.LTE-V2X,as one of the major V2X communication standards initiated and mainly driven by Datang Telecom,can enable low latency,high reliability,high data rate and security in communications,as well as scale economies by sharing the existing LTE network and terminal chipsets.LTE-V2X communication technology was introduced,and compared with IEEE 802.11p standards.Then,the progress of LTE-V2X standardization,industrial research and development and trials and field testing works were provided.Finally,the development strategy of LTE-V2X and technical evolution towards 5G was discussed.…”
    Get full text
    Article
  20. 5900

    Extended Perturbed Mixed Variational-Like Inequalities for Fuzzy Mappings by Muhammad Bilal Khan, Muhammad Aslam Noor, Khalida Inayat Noor, Ahmad Termimi Ab Ghani, Lazim Abdullah

    Published 2021-01-01
    “…In the end, some new and previously known existence results and algorithms are also studied. Results secured in this paper can be regarded as purification and development of previously familiar results.…”
    Get full text
    Article