Showing 5,981 - 6,000 results of 9,720 for search '"Securities ', query time: 0.17s Refine Results
  1. 5981

    (t, n) threshold secret sharing scheme without SDC by ZHOU Fu-cai, LIN Long, WANG Jin-ying, XU Jian

    Published 2006-01-01
    “…By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with share distribution center(SDC) and a threshold scheme without SDC.Under distrib-uted situation,there is no such a center can be completely trusted by all members of the group,a threshold scheme with-out SDC appears more attractive.In the scheme without SDC all of the members generate the group public key and pri-vate keys.When new numbers join the group secret sharing should be updated by period.An example of the scheme us-ing the small number was given.The security of the scheme was analyzed in the final.…”
    Get full text
    Article
  2. 5982

    Scheme of 5G message system co-construction and sharing by Xiaodan NIU, Chen XU, Jingxia CHEN, Xiangfei JIAO

    Published 2021-06-01
    “…With the joint release of “5G message white paper” on April 8, 2020, China’s three major telecom operators have reached a consensus that they will comprehensively upgrade the short message service in the 5G era and create a new business form of 5G message.On the basis of emphasizing the construction of 5G message system, the difficulty of 5G message system carrying the message services of three operators was analyzed under different co construction scope from the technical perspectives of network architecture, interface interoperability and security risk, and finally recommends the construction scheme of co-construction of MaaP, so as to meet the 5G message services development demands of three operators with less implementation cost.…”
    Get full text
    Article
  3. 5983

    Amnion Epithelial Cells as a Candidate Therapy for Acute and Chronic Lung Injury by Ryan J. Hodges, Rebecca Lim, Graham Jenkin, Euan M. Wallace

    Published 2012-01-01
    “…It is amazing to suggest that the placenta may offer renewed life after birth as well as securing new life before.…”
    Get full text
    Article
  4. 5984

    Method for the hystopathological analysis of the cervix specimen, obtained through radio surgery by Alfredo B. Quiñones Ceballos, Martha María Chávez Valdivia, Caridad Socorro Castro, Ileana Franco Zunda

    Published 2006-08-01
    “…It has been evaluated and vouched as satisfactory for its usefulness, easy application, low expense, security, and diagnostic and forecasting confidence.…”
    Get full text
    Article
  5. 5985

    On access to trusted virtual group under cloud computing by Peng LIANG, Chang-xiang SHEN, Zhen-hu NING

    Published 2013-08-01
    “…Based on the first layer, a hierarchical key management was presented for different subgroups so as to realize the access control between different departments of a company. Then the security and complexity were analyzed. Finally, through the example and simulation experiment, the access control model based on two-layer key management scheme was verified.…”
    Get full text
    Article
  6. 5986

    Research on the full-dimensional defined polymorphic smart network by Yuxiang HU, Peng YI, Penghao SUN, Jiangxing WU

    Published 2019-08-01
    “…For current Internet is confronted with some defects such as rigid structure,single IP bearing,and disability in suppressing unknown threats,the functions,performance,efficiency and security of the Internet were promoted from the perspective of network structure,the “structure definition” was introduced through all levels of the Internet,and a network architecture of multi-modal presentation of network functions was provided in all levels:full-dimensional defined polymorphic smart network (PINet),which supported full-dimensional definition and multi-modal presentation of addressing and routing,switching mode,interconnection mode,network element,transmission protocol,service properties and so on.Then the vision and goal,architecture and model,as well as the key technologies of PINet were discussed.The proposed architecture can provide a possible solution to the development of new network technologies.…”
    Get full text
    Article
  7. 5987

    Legal Protection for Female workers in Indonesia (Study on the Rights of Female Workers in Tolitoli) by Mulyadi Mulyadi, Sutarman Yodo, Sulbana Sulbana

    Published 2025-01-01
    “…The lack of guarantees for female workers' rights remains a significant issue in Tolitoli Regency, encompassing concerns such as equal pay, decent work, maternity leave, childbirth and breastfeeding rights, social security, and protection against discrimination. This study, using a socio-legal approach with both qualitative and quantitative methods, finds that labor laws protecting female workers have not been fully implemented. …”
    Get full text
    Article
  8. 5988

    Attention-enhanced optimized deep ensemble network for effective facial emotion recognition by Taimoor Khan, Muhammad Yasir, Chang Choi

    Published 2025-04-01
    “…Facial emotion recognition (FER) is rapidly advancing, with significant applications in healthcare, human-computer interactions, and biometric security, driven by recent advances in artificial intelligence (AI), computer vision, and deep learning. …”
    Get full text
    Article
  9. 5989
  10. 5990

    The COVID-19 pandemic and self-reported food insecurity among women in Burkina Faso: evidence from the performance monitoring for action (PMA) COVID-19 survey data by Ortis Yankey, Marcellinus Essah, Prince M. Amegbor

    Published 2025-02-01
    “…Burkina Faso, a country with pre-existing vulnerabilities in food security, experienced considerable challenges during this period. …”
    Get full text
    Article
  11. 5991
  12. 5992
  13. 5993
  14. 5994

    Factors influencing minimum acceptable diet (MAD) intake among children aged 6–23 months in remote mid-Himalayan region of Sudurpaschim, Nepal by Basant Kumar Dhami, Dhirendra Nath, Rajendra Lamichhane

    Published 2025-01-01
    “…The results indicate an urgent need to increase maternal knowledge of complementary feeding, address socioeconomic disparities, and promote household food security to improve complementary feeding practices.…”
    Get full text
    Article
  15. 5995

    A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions by Oumayma Jouini, Kaouthar Sethom, Abdallah Namoun, Nasser Aljohani, Meshari Huwaytim Alanazi, Mohammad N. Alanazi

    Published 2024-06-01
    “…Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. …”
    Get full text
    Article
  16. 5996
  17. 5997
  18. 5998

    Evaluation of Nutritional and Antinutritional Properties of African Yam Bean (Sphenostylis stenocarpa (Hochst ex. A. Rich.) Harms.) Seeds by Taofeek T. Adegboyega, Michael T. Abberton, AbdelAziz H. AbdelGadir, Mahamadi Dianda, Busie Maziya-Dixon, Olaniyi A. Oyatomi, Sam Ofodile, Olubukola O. Babalola

    Published 2020-01-01
    “…It is suggested to have the potential to significantly boost food security in sub-Saharan Africa due to its considerable nutritional qualities but still yet underutilized. …”
    Get full text
    Article
  19. 5999

    Interrogating green social prescribing in South Wales; A multi-stakeholder qualitative exploration. by Menna Brown, Katharine Sarah Aylett

    Published 2025-01-01
    “…<h4>Conclusions</h4>To ensure the continued provision of social prescribing schemes which are highly valued by service users, voluntary and third sector organisations require funding security and stability. The delivery of green, nature-based, schemes require maintenance of trusting, long-term relationships with local service co-ordinators and referrers, secure equitable funding models and agreement over conceptual basis of social prescribing itself, particularly in relation to 'where' social prescribing is located within health and social care models. …”
    Get full text
    Article
  20. 6000

    AI augmented edge and fog computing for Internet of Health Things (IoHT) by Deepika Rajagopal, Pradeep Kumar Thimma Subramanian

    Published 2025-01-01
    “…It has been noted how the use of modern technologies, such as narrow band-IoT (NB-IoT) for wider coverage and Blockchain technology for security, is transforming IoHT. The last part of the review focuses on the future challenges posed by advanced technologies and services. …”
    Get full text
    Article