Showing 6,041 - 6,060 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 6041

    A method for synthetic speech detection using local phase quantization by Jia XU, Zhihua JIAN, Honghui JIN, Man YANG

    Published 2024-02-01
    “…Due to the convenience of speech synthesis, synthesized disguised speech poses a great threat to the security of speaker verification systems.In order to further enhance the ability of detecting the camouflage to the speaker verification system, a method of synthetic speech detection was put forward using the information in spectral domain of the synthetic speech spectrogram.The method employed the local phase quantization (LPQ) algorithm to describe frequency domain information in the speech spectrogram.Firstly, the spectrogram was divided into several sub-blocks, and then the LPQ was performed on each sub-block.After the histogram statistical analysis, the LPQ feature vector was obtained and used as the input feature of the random forest classifier to realize the synthetic speech detection.The experimental results demonstrate that the proposed method further reduces tandem detection cost function (t-DCF) and has better generalization ability.…”
    Get full text
    Article
  2. 6042

    Book review: Residential child care: prospects and challenges Andrew Kendrick, Editor by Irene Stevens

    Published 2007-08-01
    “…Excellent evidence-based discussions on restraint, peer violence and the use of secure accommodation are generally lacking in this area which is often, ironically, one where practitioners and policy makers seek most guidance. …”
    Article
  3. 6043

    Les traités entre le Fuuta-Tooro et Saint-Louis : commerce, taxes et sécurité à l’intersection (1785-1808) by Cheikh Sene

    Published 2024-12-01
    “…Louis in 1809, France concluded only three treaties with the Fuuta-Tooro, aiming to revive trade, ensure the security of its merchants, and resolve issues related to customs and taxes. …”
    Get full text
    Article
  4. 6044

    La fin du maton ? Transformation de la relation carcérale et rationalisation du maintien de l’ordre dans les modules de respect by Valérie Icard

    Published 2019-12-01
    “…While promoting a dynamic security approach, the Respect module grants the prison officers with a new discretionary power of sanction which consolidate their authority. …”
    Get full text
    Article
  5. 6045

    Opening the Trinity: developing the "open theism" debate by D. T. Williams

    Published 2005-12-01
    “…At the same time kenosis was done for the sake of enabling a relationship with God, in which Christians do find ultimate security. …”
    Get full text
    Article
  6. 6046

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “…Place documents in this case in a secure but easily accessed location in your home. …”
    Get full text
    Article
  7. 6047

    Endogenous trusted network architecture for intelligent sharing by Shaoyong GUO, Yuanyuan QI, Meiling DAI, Xuesong QIU, Feng QI, Ping ZHANG

    Published 2020-11-01
    “…To address the needs of intelligent sharing of network resources,blockchain and artificial intelligence were integrated with the network,and an endogenous trusted resource intelligent sharing network architecture was proposed to make network asset sharing have endogenous trust.Based on distributed alliance blockchain,an integration mechanism of on-chain identification and off-chain resource was proposed to achieve credible management of network resources.Security and trusted sharing protocols for network data was designed to synchronize data consensus within the network.Based on smart contract,network resource scheduling and service composition methods were presented to achieve trusted service sharing.Finally,the proposed architecture was applied to decentralized scenarios such as domain name resolution,cross domain authentication,and virtual network operation.The proposed architecture realizes the integration of blockchain and network and supports the endogenous trusted sharing of network assets.…”
    Get full text
    Article
  8. 6048

    Conflicts between People and the Florida Black Bear by Elizabeth F. Pienaar

    Published 2014-10-01
    “…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
    Get full text
    Article
  9. 6049

    Conflicts between People and the Florida Black Bear by Elizabeth F. Pienaar

    Published 2014-10-01
    “…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
    Get full text
    Article
  10. 6050

    Dual verifiable cloud storage scheme based on blockchain by Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher

    Published 2021-12-01
    “…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
    Get full text
    Article
  11. 6051

    Toward an Architecture of Dissensus: Participatory Urbanism in South-East Asia by Camillo Boano, Emily Kelling

    Published 2013-06-01
    “…A critical reflection of the Thai programme Baan Mankong (secure housing) and its regional counterpart Asian Coalition for Community Action (ACCA) – an entity aimed at creating an alternative development process in which people that were previously ignored and marginalized are engaged at the centre of a process of transforming their lives, spaces and position in the city – sheds light on such relationship in order to promote a re-conceptualisation of the role of architecture and design in the process of socially just urban development, participatory urbanism and the struggle for democracy.…”
    Get full text
    Article
  12. 6052

    ‘We are all Àmọ̀tẹ́kùn’: Insecurity, Ethno-regional Hegemony and Resistance in Southwest Nigeria by Babajide Olusoji Ololajulo

    Published 2022-01-01
    “…This article offers an interpretation of Àmọ̀tẹ́kùn, a security outfit established by the governors of Southwest Nigeria to tackle rising cases of insecurity in the region. …”
    Get full text
    Article
  13. 6053
  14. 6054

    Multimedia Image Encryption Analysis Based on High-Dimensional Chaos Algorithm by Xing Zhang

    Published 2021-01-01
    “…Image encryption has become an urgent need for secure multimedia communication. Compared with the traditional encryption system, encryption algorithms based on chaos are easier to implement, which makes them more suitable for large-scale data encryption. …”
    Get full text
    Article
  15. 6055
  16. 6056

    Donald Trump et les services de renseignement : une relation sous tension by Gildas Le Voguer

    Published 2018-09-01
    “…The foreign policy decision-making process has been influenced by the intelligence community since at least 1947 when the passage of the National Security Act led to the creation of the Central Intelligence Agency. …”
    Get full text
    Article
  17. 6057
  18. 6058

    Multi-server conjunctive keyword searchable encryption scheme based on BDH problem by Yanhua LU, Youliang TIAN, Chen LIU

    Published 2020-02-01
    “…Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in certificate management.In the multi-serve environment,a bilinear mapping was used to construct an identity-based encryption scheme that supports conjunctive keyword search.In this scheme,the storage and query of the encrypted data were allocated to different servers,and the retrieval efficiency of the user storage and keyword was improved by cooperation.Re-use the encryption and search ability of the connection keywords by using the identity of multi-server and user.At the same time,combine with the searchable encryption method of conjunctive keyword,a new security model was constructed based on bilinear pairing.And under the bilinear Diffie-Hellman problem,the scheme satisfies the ciphertext indistinguishability under selected message attack.…”
    Get full text
    Article
  19. 6059

    Location privacy protection technology based on KHINN by Lijin ZHUANG, Yuyi OU, Jie LING

    Published 2016-09-01
    “…Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest neighbor (KHINN)query method based on k-anonymity was proposed.When the method structuring anonymous user group in mobile terminal,secure multiparty summation was used to calculate the anchor point to ensure user privacy;when processing the query results,SpaceTwist method based on k-anonymity was used to improve the query privacy and accuracy.Performance analysis and experimental results show that undering the condition of semi trusted or untrusted users between nodes,the proposed method can solve defects of uneven distribution of discovering points around the anchor point in SpaceTwist method and improve the accuracy of the query.…”
    Get full text
    Article
  20. 6060

    New electric power CDN based on the technology of SDN and NFV by Hongkai WANG, Hanyong HAO, Botao YU, Linqing LI

    Published 2016-09-01
    “…With the development of smart grid and the increasing of network application within the electric power information network,electric power CDN plays an important role of network acceleration technology,traffic load balancing and network security.However,facing the rapidly changing of application requirements,electric power CDN was required to response to the application deployment quickly and possess flexible application extensibility.In addition,there are some problems on electric power CDN node expansion,such as complex operations management and low utilization rate of resources.It is necessary to reform the traditional power CDN architecture,SDN and NFV technique can support.The data control can be extracted and transmitted by SDN from the network data,so it is conducive to expand a variety of application in power CDN rapidly.And NFV can expand the CDN node capacity and schedule node resources based on the application.It can effectively reduce the capital ecpenditure,storage and power consumption.…”
    Get full text
    Article