Showing 5,961 - 5,980 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5961

    Hiszpańskie i niemieckie osiągnięcia w rozwoju energetyki odnawialnej: aspekt prawny by Leszek Karski

    Published 2004-12-01
    “…Those measures are intended to help to attain objectives such as meeting the commitments given on climate change, environmentally sustainable security of supply, and promotion of renewable energy sources. …”
    Get full text
    Article
  2. 5962

    QGA-based network service extension algorithm in NFV by Hang QIU, Hongbo TANG, Wei YOU, Yu ZHAO, Yi BAI

    Published 2022-11-01
    “…To meet the client’s new business requirements or add additional security protection functions, the already hosted network service extension problem in the cloud network based on network function virtualization was researched.The network service extension in the cloud network was modeled as an integer linear programming, considering the impact on initial service, extended graph deployment, resource capacity and virtual network function affinity constraints, and so on.To deal with the computational complexity and dynamism of future large-scale cloud networks, a QGA-based network service extension algorithm was proposed to improve solution efficiency and solution quality through quantum parallel computing.Simulation results prove that the efficient performance of the proposed algorithm in terms of extension successful ratio and average resource costs, and the proposed algorithm has low time complexity.…”
    Get full text
    Article
  3. 5963

    A study on Pufferfish privacy algorithm based on Gaussian mixture models by Weisan Wu

    Published 2025-01-01
    “…This research not only enriches the privacy protection strategies for mixture models but also offers new insights into the secure handling of complex data.…”
    Get full text
    Article
  4. 5964

    The impact of economic sanctions on the country's economy by S. Alikhani, I. P. Khominich

    Published 2021-07-01
    “…Currently, sanctions are considered an important tool of international policy for maintaining security and collective response to violations of international order. …”
    Get full text
    Article
  5. 5965

    Hydrogen Valleys – Energy transition and local development scenarios for medium-sized cities by Alessandra Battisti, Angela Calvano

    Published 2024-06-01
    “…The project of territorial heritage regeneration, reinterpreted by settled communities as a potential energy network, meets the needs of the New Deal by guaranteeing secure and equitable energy. The paper aims to understand how medium-sized cities can contribute to the experimentation of decision-making processes and hydrogen design solutions.   …”
    Get full text
    Article
  6. 5966

    Self-similarity analysis of network threat time series by XUAN Lei, LU Xi-cheng, YU Rui-hou, ZHAO Xue-ming

    Published 2008-01-01
    “…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
    Get full text
    Article
  7. 5967

    Influence of industrial production of Russian regions on foreign trade indicators by S. S. Krasnykh

    Published 2023-03-01
    “…The chosen topic is relevant due to the fact that today’s sanctions policy of various Western countries is restricting exports and imports of many types of products, which can serve as a threat to the economic security of the Russian Federation. The author of the article determines the impact of mining, manufacturing, and the provision of electricity, gas and steam on foreign trade performance by using regression analysis of panel data and the Granger causality test. …”
    Get full text
    Article
  8. 5968

    L’économie politique de l’accès technique au marché : le cas du TAFTA by Benjamin Bürbaumer

    Published 2021-07-01
    “…It shows that technical market access talks constitute an institutionalized field of pre-market competition on which actors, situated at different spatial scales, rival in order to secure competitive advantage. The failure of the negotiations stems above all from each party’s attempt to unidirectionally extend its technical infrastructure to the other side of the Atlantic.…”
    Get full text
    Article
  9. 5969

    Genetic resources in Russia: from collections to bioresource centers by E. K. Khlestkina

    Published 2022-04-01
    “…Collections of bioresources and a set of technologies for their conservation, study and practical use are now the basis of bioeconomy, biosafety, and food security. It is the foundation underpinning production chains, leading from basic research to various technological areas and industries.An analysis of the current state and an assessment of the prospects for the development of bioresource collections in the Russian Federation are presented. …”
    Get full text
    Article
  10. 5970

    Research on service-driven network technologies for space-air-ground-sea integration by FAN Kexin, AN Lirong, ZHANG Qinyu

    Published 2024-06-01
    “…Finally, the future development direction of space-air-ground-sea integration was discussed from the perspectives of intelligence, integration, and security.…”
    Get full text
    Article
  11. 5971

    The race for AI hegemony by Victor Diogho Heuer de Carvalho

    Published 2025-02-01
    “…Without international coordination, the uncontrolled advance of AI could threaten security and social justice. An inclusive debate is essential to ensure the responsible use of this technology. …”
    Get full text
    Article
  12. 5972

    Key storage management scheme based on keyed hash tree with state by Xiangyu WANG, Jianfeng MA, Yinbin MIAO, Kai ZHANG, Qiying WU

    Published 2018-05-01
    “…To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system,a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and key derivation tree,and just needs to store the root key and the tree structure,which greatly reduces the key storage costs.In addition,the scheme manages key revocation according to the revocation state value,thereby solving the problem of key revocation and structure update.Strict security analysis shows that the partial data key disclosure does not leak the data confidentiality of remaining data,and the performance analysis using real-world dataset shows that the proposed key storage management scheme is acceptable in ciphertext retrieval system.…”
    Get full text
    Article
  13. 5973

    Data leakage prevention system based on transparent encryption for mobile terminal equipment by Zhen-tao HUANG, Nuan HE, An-min FU, Bo-yu KUANG, Guang-hua ZHANG

    Published 2016-10-01
    “…With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.…”
    Get full text
    Article
  14. 5974

    Container intrusion detection method based on host system call frequency by Yimu JI, Weidong YANG, Kui LI, Shangdong LIU, Qiang LIU, Sisi SHAO, Shuai YOU, Naijiao HUANG

    Published 2021-08-01
    “…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
    Get full text
    Article
  15. 5975

    Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection by Yongkang TANG, Xing HU, Ting SU, Shaoqing LI

    Published 2021-04-01
    “…With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits.At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more attention from the academia.The side-channel analysis method based on electromagnetic radiation is one of the hotspots in hardware security field.The ability evaluation of electromagnetic radiation analysis method to detect hardware Trojan was focused, and the factor that limited their detection performance was explored.The experimental results on FPGA show that the electromagnetic radiation analysis method can effectively detect hardware Trojan whose electromagnetic radiation distribution is significantly different from surrounding circuits, but it cannot be applied to hardware Trojan with complex frequency distribution of electromagnetic radiation.…”
    Get full text
    Article
  16. 5976

    Research on 5G network deployment scheme for intelligent manufacturing by Hong SHEN, Ling CUI, Tiankui ZHANG

    Published 2022-05-01
    “…Building smart factories based on 5G network and other new generation of advanced information technology is an important way for enabling industrial upgrading and realizing intelligent manufacturing.Firstly, the typical application scenario 5G network in intelligent manufacturing was analyzed and then the requirement of 5G network performance indicators was given.Based on these analysis, the specific deployment scheme of 5G network was design, including the high network capacity and large number of connections, high reliability and low delay, 5G slicing, toC/toB isolation and network security.The proposed 5G network deployment scheme provided a useful reference for the construction of smart factory based on 5G network and other advanced information technologies.…”
    Get full text
    Article
  17. 5977

    Mobile platform continuous authentication scheme based on gait characteristics by Li YANG, Zhuoru MA, Chenghui ZHANG, Qingqi PEI

    Published 2019-07-01
    “…The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.…”
    Get full text
    Article
  18. 5978

    Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method by Youliang TIAN, Qin LUO

    Published 2020-09-01
    “…Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low,it was difficult to meet the requirements of efficient verification and security of multi-keyword search results,a multi-keyword search scheme based on the improved Merkle-Tree authentication method was proposed.Firstly,a multi-keyword searchable algorithm was built to achieve efficient and accurate multi-keyword search by the bilinear mapping.Secondly,based on the improved Merkle-Tree authentication method of Bawa,the verification and dynamic update algorithm of the search scheme was constructed to reduce the calculation cost of the classic MHT to prevent the efficient verification and update of illegal operations such as data tampering,deletion,and forgery.Under the decision-type linear hypothesis and CDH hypothesis,the proof scheme meets the indistinguishability and unforgeability of ciphertext.…”
    Get full text
    Article
  19. 5979

    ACCOUNTING TREATMENT AND LEGISLATION OF LEASING ARRANGEMENTS by Selma Novalija, Hamid Mutapčić, Elmira Kovač

    Published 2011-11-01
    “… Companies are not always able to purchase fixed assets required to start, expand or modernize their own operations, and also do not have adequate resources that could offer as security for bank loans. Leasing is the answer to such problems, as it provides the possibility of leasing recipient to obtain the necessary equipment. …”
    Get full text
    Article
  20. 5980

    Politi og arkitekters forebyggingslogikker: Forståelser av kriminalitetsforebyggende arbeid i offentlige rom by Marina Hiller Foshaugen

    Published 2020-06-01
    “…The main aim is to examine approaches to crime prevention in public spaces in regards to safety, security, risk and social control.…”
    Get full text
    Article