Showing 6,061 - 6,080 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 6061

    Matérialiser la frontière autour de l’empereur dans l’Antiquité tardive by Maxime Emion

    Published 2020-12-01
    “…The ever-present bodyguards were also a tangible yet mobile limit around the emperor, ensuring his security and contributing to his majesty. The imperial purple was the ultimate barrier around the ruler’s body and acted as a medium to approach the sacred nature of his power during the ceremony of adoratio. …”
    Get full text
    Article
  2. 6062

    Password Based Circuit Breaker by Asiimwe Johnso

    Published 2023
    “…This project designed to give a high security system and that in switching off the meanly line with entering a password with a help of keypad. …”
    Get full text
    Thesis
  3. 6063

    Pass Word Based Circuit Breaker. by Asiimwe, Johnson

    Published 2023
    “…This project designed to give a high security system and that in switching off the meanly line with entering a password with a help of keypad. …”
    Get full text
    Thesis
  4. 6064

    Les salafistes marocains et la reconfiguration politico-religieuse post-2011 : fluctuation entre (dé)politisation, radicalisation et intégration by Salim Hmimnat

    Published 2020-07-01
    “…In each moment of this evolution, the regime opts for a pragmatic approach which consists in using this religious trend to meet pressing demands and priorities of a political and security nature. Ten years after breaking up with salafist groups, both quietists and jihadists, suspected to be responsible for the 2003 Casablanca attacks, the regime seeks henceforth to reconcile with salafis with the purpose to integrate them, or at least neutralise them, in the ongoing politico-religious reconfiguration process. …”
    Get full text
    Article
  5. 6065

    Anaesthetic management of infant with occipital encephalocele associated with Arnold Chiari III malformation - A Case Report by Vandana Patilbuwa Pakhare, K. Naga Sri Sowmya, Mohammed Mohsin Ali, Reshma Sultana, Doli Suresh Chander

    Published 2025-01-01
    “…The anticipated difficult airway was secured with prior planning and teamwork. Multidisciplinary care and careful planning are essential to safeguard the perioperative outcomes for patients with meningoencephalocele wherein difficult airway, blood loss, autonomic dysfunction, and perioperative hypothermia are major concerns.…”
    Get full text
    Article
  6. 6066

    New Technique: A Novel Femoral Derotation Osteotomy for Malrotation following Intramedullary Nailing by S. Jagernauth, A. J. Tindall, S. Kohli, P. Allen

    Published 2012-01-01
    “…Two further static distal interlocking screws were inserted to secure the intramedullary nail in position. The osteotomy went on to union and her symptoms of pain, walking difficulty, and in-toeing resolved. …”
    Get full text
    Article
  7. 6067

    SDN self-protection system based on Renyi entropy by Pu ZHAO, Wentao ZHAO, Zhangjie FU, Qiang LIU

    Published 2021-06-01
    “…Aiming at the abnormal behaviors in SDN architecture, a self-protection system based on Renyi entropy that implemented a set of detection, diagnosis and defense method of SDN abnormal behaviors was proposed.The system did not need to introduce the third-party measurement equipment, and directly used the flow table information of OpenFlow switches.Firstly, the abnormal network behavior was detected by calculating the characteristic entropy.Then, the information of the OpenFlow flow table was further analyzed to realize the diagnosis of abnormal behavior.Finally, a blacklist mechanism was established.And the system added the hosts with abnormal behavior to the blacklist and blocked the corresponding abnormal traffic.In order to verify the effectiveness of the system, a prototype was developed on the Floodlight controller.The simulation results on Mininet show that the system can effectively detect, diagnose and defend the abnormal behaviors.The system has low deployment cost, which enhances the security of SDN.…”
    Get full text
    Article
  8. 6068

    Reserves and extraction of rare earth metals and elements as a key factor in the renewable energy sector development at the the world economy transformation current stage by R. D. Mingaleeva

    Published 2023-06-01
    “…The use of renewable energy sources, which are experiencing a period of rapid development, is one of the stages of the current energy transition, as the world community tries to ensure a future with zero CO2 emissions and to achieve energy independence and security. At the same time, for output of the wide range of products for the renewable energy sector, as well as for the development of energy depot systems, it is necessary to use rare earth elements and metals in production. …”
    Get full text
    Article
  9. 6069
  10. 6070

    ANALYSIS OF CHANGES IN TRANSPORT PROCESSES IN WARSAW PUBLIC TRANSPORT IN THE FACE OF DISRUPTIONS IN 2019-2022 by Andrzej ŚWIDERSKI, Sebastian SOBCZUK, Anna BORUCKA

    Published 2024-09-01
    “…The study made it possible to identify recommendations aimed at securing the operation of public transport in the event of similar threats in the future. …”
    Get full text
    Article
  11. 6071

    The Military Policy of the Rousseff Government: Reflections on the Conduct of the Armed Forces in the UPP and the MINUSTAH by Suzeley Kalil Mathias, Bruce Scheidl Campos, Leandro Fernandes Sampaio Santos

    Published 2016-05-01
    “…The UPPs are a key attribute of public security of the government carioca in Brazil and by extension the Brazilian state. …”
    Get full text
    Article
  12. 6072

    Hemorrhage of the Ramus Lumbalis of the Iliolumbar Artery as a Cause for Shock in Blunt Trauma Victims on Therapeutic Anticoagulation by Thomas Patrick Sullivan, Eduardo Smith-Singares

    Published 2021-01-01
    “…Local expertise and a high level of suspicion were critical in the early intervention, and postprocedural management of the injuries sustained and secured a good result.…”
    Get full text
    Article
  13. 6073

    Review on unmanned aerial vehicle covert communication network by Hengzhi BAI, Haichao WANG, Guoxin LI, Yuping GONG

    Published 2023-08-01
    “…Unmanned aerial vehicle (UAV) communication network is an important part of the future integrated space-aerial-ground network, and an effective support to achieve the global three-dimensional coverage of the communication network.The open characteristics of wireless channels make UAV communication vulnerable to malicious attacks by illegal users.Covert communication provides a promising solution for improving the security defense and privacy protection capabilities of UAV communication.However, the overlapping characteristics of the mobility of UAV systems and the requirements of covert communication scenarios bring severe challenges to the collaborative optimization of network resources.The UAV covert communication network was investigated from requirements, challenges, framework and main technologies perspectives.The architecture and model, performance characteristic, as well as potential candidate technologies were analyzed and discussed, in an attempt to outline the overall framework of UAV covert communication, and provide guidance for the subsequent research on UAV covert communication.…”
    Get full text
    Article
  14. 6074

    Scheduling algorithm for stochastic job stream cipher service based on load balancing by Li LI, Guozhen SHI, Kui GENG, Xiuze DONG, Fenghua LI

    Published 2018-06-01
    “…Business stream parallel processing system face the situation of the diversity of cipher service requests,the cross of serial mode and parallel mode,the intercross of different business data flow,and the demand of high speed and high reliability in security field.In order to improve the parallel processing efficiency of multi-cryptographic algorithm,load balancing was used as scheduling objective.Based on hierarchical hardware scheduling method (HHS-ACDID),considering the processing node’s storage capacity and processing speed,a load balancing scheduling algorithm was approved to support non related tasks and related tasks at the same time,which achieves the high speed cipher processing throughput.Simulation results show that the algorithm can complete dynamic scheduling of data stream system and get better load balancing effect.Compared with HHS-ACDID,the efficiency of the algorithm is improved by about 12%.…”
    Get full text
    Article
  15. 6075

    Corneal crossed links: a new alternative in the treatment of ectasia by Maygret Alberro Hernández, Janet González Sotero, Haymy Caridad Casanueva Cabezas, Eduardo Rojas Álvarez

    Published 2009-09-01
    “…Many reviewed articles prove the security and efficacy of this treatment. The confocal microscopy techniques have shown significant swelling and resistance of corneal stroma after this procedure. …”
    Get full text
    Article
  16. 6076

    Information service identity generation and management scheme for service supervision by Xiang LI, Hao WANG, Qiange LIU, Chao WANG, Jian MAO, Jianwei LIU

    Published 2021-10-01
    “…While information services have a significant impact on economic and social development, it also brings a series of security challenges.Realizing fine-grained, continuous, and dynamic supervision of information services has become the top priority of information service management.Traditional static identity authentication and management mechanisms, are difficult to meet the continuous monitoring requirements for information service entities and service quality.An information service identification generation and management scheme for service supervision was proposed.It defined an information service identification format from multiple perspectives such as information service category, service grade, and service quality credibility.It used the analytic hierarchy process to evaluate information services and designed a dynamic management of information service identification.The scheme can meet the needs of issuance and fine-grained dynamic management of information service identification for multi-dimensional business attributes.…”
    Get full text
    Article
  17. 6077

    Al-Marsad Right as a Mechanism for Developing and Investing in Urban Waqf Properties in Algerian Legislation by Djelloul Mehda

    Published 2024-12-01
    “…Importantly, the investment value remains a debt secured by the Waqf. Unlike direct ownership, the observatory right is not a real property right stemming from Waqf ownership. …”
    Get full text
    Article
  18. 6078

    Optimizing safety performance through risk-based modeling in Nigeria’s oil and gas sector by Mgbowaji Zacchaeus, John Ugbebor, Ikechukwu Agbagwa, Ochuko Felix Orikpete

    Published 2023-11-01
    “…The analysis highlighted key risks like inadequate infrastructure, valve and seal failures, security concerns, and oil spill risks, underscoring the need for targeted interventions to promote a safer working environment and reduce accident risks. …”
    Get full text
    Article
  19. 6079

    Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm by Xiaonian WU, Yingxin LI, Yongzhuang WEI, Yaping SUN

    Published 2020-01-01
    “…The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To analyze the security of two algorithms,an automatic search method of impossible differential distinguishers was proposed.Based on the structural characteristics of the GRANALE and MANTRA,the S-box differential characteristics were obtained by analyzing the S-box differential distribution table,and then the idea of intermediate encounter was used to traverse from the difference path obtained from the encryption/decryption direction seperately to select the optimal differential path with probability 0.The analysis results show that there are 144 different 7-round impossible differential distinguishers in the GRANULE,and 52 different 9-round impossible differential distinguishers in the MANTRA.Compared with the existing results,the rounds of the proposed distinguisher is currently the highest.…”
    Get full text
    Article
  20. 6080

    The Ponte Delle Chianche on the <i>Via Traiana</i> in Buonalbergo (Benevento, Italy): New Data for an Integrated Study by Ivan Ferrari

    Published 2024-12-01
    “…The results obtained will be used to implement a comprehensive project for the recovery and securing of the property.…”
    Get full text
    Article