Showing 5,901 - 5,920 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 5901

    Trust model based on reputation for peer-to-peer networks by TIAN Chun-qi1, ZOU Shi-hong2, WANG Wen-dong2, CHENG Shi-duan2

    Published 2008-01-01
    “…Subsequent experimental results show that,compared to some trust models,the proposed model is more robust on trust security problems and more ad-vanced in successful transaction rate. …”
    Get full text
    Article
  2. 5902

    Pratique des activités d’orientation-conseil et projet professionnel de l’élève au Cameroun by Rodrigue Mbwassak

    Published 2022-08-01
    “…This research poses the problem of guidance counsellors accompanying students in the co-construction of their professional projects preparing them for a secure professional integration, if we refer to the difficulties of choice of training and socio-professional integration experienced by graduates nowadays. …”
    Get full text
    Article
  3. 5903

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  4. 5904

    The National Agricultural Strike: The Paradoxes of Political Action for Social Change by Monica Arias Fernandez, Manuel Alejandro Preciado Castellanos

    Published 2016-01-01
    “…It was an event that cannot be reduced only to the actors implicated and causes but brought into focus the precarious condition of agricultural production in Colombia: the concentration of land and agricultural production, questions of local security and the model of economic development. This strike is analyzed drawing upon the thought of Gilles Deleuze and Felix Guattari, who develop a number of concepts that serve to analyze the ways in which resistance and social mobilization occupy an inherent space inside the exercise of state power. …”
    Get full text
    Article
  5. 5905

    Analysis of survival-skills among adolescents in Yogyakarta by Enik Nurkholidah, Syamsu Yusuf, Ilfiandra Ilfiandra, Ahman Ahman

    Published 2022-07-01
    “…The conclusion of this study is an affirmation of the findings of the findings as well as answers to the research questions that adolescents in Yogyakarta are generally in the potential of Survival-Safety Skills in the Medium category, meaning that conditions are sufficient to survive safely and obtain a sense of security for adolescents in living a life more prosperous. …”
    Get full text
    Article
  6. 5906

    Technical solution and application of 5G slicing private network based on cloud-network integration by Kai CHEN

    Published 2022-07-01
    “…Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.…”
    Get full text
    Article
  7. 5907

    Research and verification of cement smart factory solution based on 5G MEC by Bo GAO, Ke MA, Jianmin ZHANG, Guirong DENG, Zhenhan ZANG

    Published 2022-12-01
    “…With the continuous advancement of the new industrialization process, how 5G can empower industrial digital transformation and help enterprises achieve industrial upgrading has received more and more attention.According to the cement production process, the demand of the industry was analyzed, a cement smart factory solution based on 5G multi-access edge computing (MEC) was proposed, and typical 5G application scenarios were given.Combined with actual commercial cases, the detailed deployment networking and security protection solutions were introduced, and the significant effect of the solution in helping enterprises to reduce costs and increase efficiency was verified.It provided a reference for the 5G MEC scenario application in the cement building materials industry and even the process industry.…”
    Get full text
    Article
  8. 5908

    Research on quantum key distribution technology in intelligent substation by Xiaopeng YANG, Haitao CHEN, Lichen MEI, Pengzhan WANG

    Published 2018-10-01
    “…In order to improve the security of the communication data of the power system,the feasibility of the application of quantum key distribution technology in the monitoring system of the intelligent substation was analyzed and demonstrated by combining the state of quantum key distribution technology and intelligent substation monitoring system.The technical scheme,intelligent substation monitoring system combined with quantum key distribution was put forward.On the premise of using the existing power communication system framework,the networking idea of intelligent substation monitoring system and quantum key distribution technology was presented,which was“quantum key + power vertical encryption authentication gateway”.And the network scheme was verified and analyzed,which proved the stability and feasibility of the networking scheme in practical application.Therefore,no need to adjust the existing communication network framework,the application scheme can be realized on a large scale.…”
    Get full text
    Article
  9. 5909

    Algorithm of blockchain data provenance based on ABE by Youliang TIAN, Kedi YANG, Zuan WANG, Tao FENG

    Published 2019-11-01
    “…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
    Get full text
    Article
  10. 5910

    Architecture of a new infrastructure for data service in DT era by Gengsheng HUANG, Yuhong HUANG, Manxue GUO, Jianping ZHENG, Xin GE

    Published 2022-07-01
    “…Data technology (DT) era centered on the data technology and data service was coming.To handle the major challenges in the data exchange and transactions, a new infrastructure - data sharing service network (DSSN) was proposed, which provided the data interconnection, exchange, transactions, supervision and other services for regulators, data providers, data applications and technical support providers.The design principles of DSSN system were outlined as compliance, security, fairness, openness and connection service.And the architecture of DSSN system was designed according to the principles.A layered architecture was applied to the data sharing service node with the service control layer and service capability layer.The data node was composed of the data sharing dedicated server and data source, and was connected to DSSN through data gateway.…”
    Get full text
    Article
  11. 5911

    Attribute-based proxy signature scheme for unmanned aerial vehicle networks by Lei HE, Jianfeng MA, Dawei WEI

    Published 2021-11-01
    “…It is necessary to use digital signature scheme to protect integrity and authentication of commands sent by command agencies to unmanned aerial vehicle (UAV) in the UAV networks.Moreover, the signature scheme should ensure UAV can receive signature in time and protect privacy of signers.Therefore, an attribute-based proxy signature scheme for UAV networks was proposed and its security was analyzed.The proposed signature scheme has existential unforgeability under selective-attribute and chosen message attacks, and privacy of signers is protected.Its efficiency was analyzed in terms of computation costs and communication costs, and compared with other related signature schemes.The results indicate the proposed signature scheme has less computation costs when its communication costs are at the same level with other signature schemes.…”
    Get full text
    Article
  12. 5912

    La emigración académica España-Ecuador durante el período de recesión económica: España-Ecuador durante el período de recesión económica: España-Ecuador durante el ¿una geoes... by PÉREZ-GAÑÁN, Rocío, MORENO, Gorka

    Published 2018-05-01
    “…This change of direction is not a coincidence; it is in response to a geographic strategy which is articulated around two fundamental axes: securing teaching and research experience, which, in today’s Spain, is difficult to find yet key to enter or continue in Academia, and enjoying a quality of life which is not possible in Spain. …”
    Get full text
    Article
  13. 5913

    Overview of Internet of vehicles for 5G by Liang-min WANG, Xiao-long LIU, Chun-xiao LI, Jing YANG, Wei-dong YANG

    Published 2016-06-01
    “…The functions and characteristics of current IOV(Internet of vehicles) Internet of vehicles were analyzed.Moreover,combined with 5G communication technology,the architecture of IOV for 5G was proposed to imple-ment access and integration of multi-network.Different from the IEEE 802.11p based architecture of VANET,de-vice-to-device (D2D) technology was introduced to achieve flexible terminals communication of IOV.In comparing with VANET based on IEEE 802.11p in terms of key technology parameters,the IOV for 5G possesses the better characteristics in terms of low latency and efficient spectrum utilization,and also need to face new interference management and security challenges.At the end,the application and development trends of IOV for 5G in the busi-ness and the specific environment were prospected.…”
    Get full text
    Article
  14. 5914

    Driver identification in advanced transportation systems using osprey and salp swarm optimized random forest model by Akshat Gaurav, Brij B. Gupta, Razaz Waheeb Attar, Ahmed Alhomoud, Varsha Arya, Kwok Tai Chui

    Published 2025-01-01
    “…Abstract Enhancement of security, personalization, and safety in advanced transportation systems depends on driver identification. …”
    Get full text
    Article
  15. 5915

    Loosing no time to deploy digital economy and digital transformation to spur ICT innovation——The latest ICT development trend showcased in the science and technology award of CIC i... by China InstituteofCommunications(CIC)

    Published 2021-01-01
    “…ICT Innovation, industrial development and the new information infrastructure construction, represented by 5G, artificial intelligence, and integrated space-air-ground networks will play an important role in the implementation of the national strategy of building a powerful communications network and comprehensively building a modern socialist country.Based on the current technological development in the ICT field, the China Institute of Communications summarized and sorted out the key directions of technological innovation in this field, including a new generation of mobile communications, network enabling, quantum communications, satellite internet, smart network operation and maintenance, cyberspace security, and the internet of things and the internet of vehicles, network cost reduction and efficiency enhancement, and basic technologies, etc., providing references for all walks of life to understand the technological development in the ICT field.…”
    Get full text
    Article
  16. 5916

    Infrastructures critiques, vulnérabilisation du territoire et résilience : assainissement et inondations majeures en Île-de-France by Annabelle Moatty, Magali Reghezza-Zitt

    Published 2018-12-01
    “…First, we address the links between security and critical infrastructures. Then, we present the case of sanitation in Île-de-France. …”
    Get full text
    Article
  17. 5917

    Multi-authority attribute-based encryption scheme with policy dynamic updating by Xi-xi YAN, Yuan LIU, Zi-chen LI, Yong-li TANG

    Published 2017-10-01
    “…Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.…”
    Get full text
    Article
  18. 5918

    Address overloading-based packet forwarding verification in SDN by Ping WU, Chaowen CHANG, Zhibin ZUO, Yingying MA

    Published 2022-03-01
    “…Aiming at the problem that the most existing forwarding verification mechanisms in software-defined network (SDN) verified packets hop-by-hop by incorporating new secure communication protocols, which incurred significant computation and communication overhead, an address overloading-based forwarding verification mechanism was proposed.The flow runtime was divided into consecutive random intervals by the ingress switch via overloading address fields of packet, basing on overloading address, packets were forwarded by each subsequent switch, and the controller sampled the packets forwarded by ingress and egress switch in the interval to detect abnormal behavior on the path.Finally, the proposed mechanism and simulation network was implemented and evaluated.Experiments show that the mechanism achieves efficient forwarding and effective anomaly detection with less than 8% of additional forwarding delays.…”
    Get full text
    Article
  19. 5919

    Implementing Youth Mental Health First Aid Training in Cooperative Extension Programs by Anne M. Iaccopucci, Monica M. Lobenstein, Kendra M. Lewis, Kea Norrell-Aitch

    Published 2024-12-01
    “…Experienced program leaders suggest partnering with a supportive organization, securing long-term funding, and establishing dedicated staff for program delivery.…”
    Get full text
    Article
  20. 5920

    Receivables from employment through judicial practice by Mitrović Igor

    Published 2020-01-01
    “…The paper deals with the issue of legal regulation of judicial protection of labor rights and the application of substantive law in proceedings of this kind before the courts in the Republic of Serbia. Given that legal security is one of the essential attributes of the rule of law in the legal order of a state, proper application of substantive law by acting courts of general and special jurisdiction is of crucial importance in this regard. …”
    Get full text
    Article