Showing 6,081 - 6,100 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 6081

    Improving replicator dynamic evolutionary game model for selecting optimal defense strategies by Jianming HUANG, Hengwei ZHANG

    Published 2018-01-01
    “…In terms of the existence of strategy dependency in the same game group,network attack-defense evolutionary game model based on the improved replicator dynamics was constricted by introducing the intensity coefficient,which completed the method of calculating replicator dynamic rate.The improved replicator dynamic equation was adopted to solve the evolutionary equilibrium for the situation that both attack and defense have two optional strategies.The stability of the equilibrium points was analyzed by the local stability analysis method of Jacobian matrix,and the optimal defense strategies were obtained under different conditions.The results show that the strategy dependency between the players in the same group has a certain influence on the evolution of the game,both the incentive and the inhibition.Finally,the accuracy and validity of the model and method are verified by the experimental simulation,which provides a new theoretical support for solving the information security problems in the real.…”
    Get full text
    Article
  2. 6082

    Discussion on a computation-oriented network modality——computing power network modality by Rui LIN, Wenjuan XING, Bo LEI

    Published 2023-10-01
    “…New computing applications present new challenges to communication networks, for example, traditional network cannot meet the demands of flexible deployment, customized services, security and trustworthiness of new services.As a development paradigm that separated network technology and supported environment, polymorphic network provided new solutions to support the differentiated demands of various new applications.A type of computation-oriented network modality namely computing power network modality was discussed, for the computation-oriented business requirements based on the development trend of computing power network.Firstly, the design of computing power network modality was investigated, then the key technologies of computing power network modality were analyzed.Finally, the application scenarios of computing power network were prospected.It is hoped that the discussion can provide a reference for the future research and development on application of computation-oriented polymorphic network.…”
    Get full text
    Article
  3. 6083

    Key technologies and research progresses in cognitive SWIPT by Xiaorong XU, Minghang SUN, Linhui SHEN, Yingbiao YAO, Wei FENG

    Published 2020-10-01
    “…The combination of cognitive radio (CR) and simultaneous wireless information and power transfer (SWIPT) has become one of the research hotspots in modern high-efficient cognitive radio communications.Firstly,the introduction of SWIPT and cognitive SWIPT were illustrated.Secondly,two types of receiver structures commonly used in SWIPT networks were introduced and the corresponding energy harvesting formulas were given.Thirdly,system model of cognitive SWIPT network and the research progresses of cognitive SWIPT combined with cooperative relaying and MIMO were presented respectively.Future research prospects of the key technologies in cognitive SWIPT network were investigated.Finally,some recent research achievements of the key technologies in cognitive SWIPT were given.Certain referencing values in the theoretical research and future practical applications of high energy-efficient secure cognitive SWIPT communication network were provided.…”
    Get full text
    Article
  4. 6084

    High-capacity image steganography algorithm combining image encryption and deep learning by Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG

    Published 2021-09-01
    “…Aiming at the problem that the residual image of cover image and carrier image in the high-capacity image steganography scheme based on deep learning will expose the secret image, a high-capacity image steganography scheme combining image encryption and deep learning was proposed.An image feature extraction method was used, so that the features extracted from the cover image were consistent with the features extracted from the carrier image.Before the image steganography, the sender extracted features from the cover image as a key to encrypt the secret image.After the extractor extracted the encrypted secret image, the features were extracted from the carrier image as a key to decrypt the secret image.The experimental results show that the attacker cannot find the information of the secret image from the residual image, and the frequency of key transmission is lower, and the security of the algorithm is improved.…”
    Get full text
    Article
  5. 6085

    Conceptualizing digital finance as a precursor for financial inclusion and financial service usage in Uganda by Nickson Nagaaba, Rehema Batamuriza, James Basuta, Maryvian Owomugisha

    Published 2025-12-01
    “…Data were collected from 290 lead households from 15 districts of Uganda, benefiting from the Uganda Multi-Sectoral Food Security and Nutritional Project (UMFSNP). Confirmatory factor procedures confirmed the digital finance structure, and individual path coefficients were determined to explain their relationship with financial inclusion and usage of financial services. …”
    Get full text
    Article
  6. 6086

    Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index by Ruizhong DU, Yuqing ZHANG, Mingyue LI

    Published 2022-05-01
    “…To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive query with forward and backward privacy was proposed.A bitmap index was used to construct a bidirectional index structure to simplify the dynamic update process, and the access pattern was hidden through symmetric encryption with homomorphic addition.At the same time, since the addition and deletion operations were completed by modulo addition, the leakage of the update process could be reduced by hiding the update type.Security analysis shows that the BPC-DSSE scheme achieves forward and Type-I<sup>-</sup> backward privacy.The simulation results show that the BPC-DSSE scheme has higher update and retrieval efficiency than other conjunctive query schemes.…”
    Get full text
    Article
  7. 6087

    Hybrid tabu search algorithm for excellent Boolean function by Weiqiong WANG, Haojie XU, Meng CUI, Qiong XIE

    Published 2022-05-01
    “…Boolean function in symmetric cryptographic algorithm must satisfy excellent cryptographic criteria to ensure the security of the algorithm.By combining the advantages of tabu search algorithm and hill climbing algorithm, a new heuristic generation algorithm called hybrid tabu search algorithm for excellent Boolean function was proposed.A large number of Boolean function with high nonlinearity, low autocorrelation, one-resilient, optimal algebraic degree, optimal algebraic immunity, optimal (suboptimal) resistance to fast algebraic attacks could be obtained quickly by applying the proposed algorithm.Simulation results demonstrate that the cryptographic properties of the Boolean function obtained by the proposed algorithm with strong search ability and fast running speed are better than the results of known optimization algorithm.Moreover, the algorithm also provides good Boolean function that cannot be obtained by using construction method.…”
    Get full text
    Article
  8. 6088

    Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection by Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, Salil bharany, Ayman Altameem, Ateeq Ur Rehman, Seada Hussen, Habib Hamam

    Published 2025-02-01
    “…Abstract There are serious security issues with the quick growth of IoT devices, which are increasingly essential to Industry 4.0. …”
    Get full text
    Article
  9. 6089

    Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process by Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov

    Published 2024-01-01
    “…This research contributes several insights into securing machine learning within ACS, ensuring robust FDD in industrial processes.…”
    Get full text
    Article
  10. 6090

    Space-air-ground integrated vehicular network for immersive driving experience by Zhi-sheng NIU, SHEN Sherman, Qin-yu ZHANG, Yu-liang TANG

    Published 2017-09-01
    “…In order to achieve the significant advantages of next generation intelligent transportation systems,realizing the smart control of vehicles,and satisfy the vehicular demands for on-road infotainment services,a novel space-air-ground integrated vehicular network architecture was proposed by making use of the space information in terms of service coverage,time synchronization,vehicle status sensing,etc.The project would investigate three fundamental scientific issues related to the novel network:1) space-air-ground integrated network reconfiguration under dynamic space resources constraints; 2) real-time sensing and efficient integration of multi-dimensional context information; 3) real-time,reliable and secure interaction among context information.The outcomes of this project will provide the foundations both in theory and practice for highly expected smart driving,immersive driving experience,and autonomous self-driving vehicular networks.…”
    Get full text
    Article
  11. 6091

    Bringing Home the Bacon: Infusing Evaluation Best Practices into Grant Proposals by Glenn Israel, Jaclyn D Kropp, David C Diehl, Conner Mullally, Sebastian Galindo

    Published 2020-01-01
    “…By adopting these practices, you will enhance the quality of your proposals; you will most likely increase the amount of extramural funding that is secured; and you will elevate the visibility and impact of programs within your organization. …”
    Get full text
    Article
  12. 6092

    Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN by Xiao-guang NIU, Chuan-bo WEI, Ya-lan YAO

    Published 2016-04-01
    “…The simulation results demonstrate that ADRing is very efficient in balancing energy consumption and transmission latency, and can significantly prolong survival period of the network and ensure security as well as latency to satisfy the packets' requirements.…”
    Get full text
    Article
  13. 6093

    Territory, Jus ad Bellum: The Status of the Golan Heights in Light of the 2024 ICJ Advisory Opinion by علی مسعودیان, سحر خوشدل

    Published 2024-12-01
    “…The article references relevant UN Security Council Resolutions and treaty interpretation rules, emphasizing a strict application of international law, which Israel has overlooked. …”
    Get full text
    Article
  14. 6094

    Política de regularização fundiária em Rondônia: limitações do programa terra legal e expectativas socioterritoriais by Alyson Fernando Alves Ribeiro, Ricardo Gilson da Costa Silva, Josefa de Lisboa Santos

    Published 2016-12-01
    “…Terra Legal Amazonia its a Program that seeks to solve the problem of legal security of federal lands, regulating Brazilian state areas measuring up to 15 fiscal modules occupied by squatters in the nine states of the Legal Amazon. …”
    Get full text
    Article
  15. 6095

    Energy efficient multi-hop routing protocol for smart vehicle monitoring using intelligent sensor networks by Yuvaraja Teekaraman, Hariprasath Manoharan, Ramya Kuppusamy, Shabana Urooj, Fadwa Alrowais

    Published 2021-12-01
    “…Therefore, these wireless sensor networks can be installed on a vehicle not only for monitoring perseverance but also for corroborating security with the support of a Global Positioning System expedient. …”
    Get full text
    Article
  16. 6096

    An efficient method to generate elliptic curves by ZHOU Chang-ying1, Kwok-Yan-Lam1, ZHOU Zheng-ou2

    Published 2001-01-01
    “…This condition can be relaxed to include primes of the form 2ip+1 (i is a small integer) without compromising security. Hence, the number of elliptic curves suitable for use by public key cryptosystems is increased greatly. …”
    Get full text
    Article
  17. 6097

    Modernization of tax control in the context of digitalization of the economy by E. A. Kirova, A. V. Kozhebatkina

    Published 2020-10-01
    “…It has been concluded about the need to develop legislation in the field of digitalization of the economy, state regulation of the use of big data technology, ensuring reliable database security and protection ofprivacy, as well as the creation of software for identifying transactions.…”
    Get full text
    Article
  18. 6098

    Application of Interval Arithmetic in the Evaluation of Transfer Capabilities by Considering the Sources of Uncertainty by Prabha Umapathy, C. Venkataseshaiah, M. Senthil Arumugam

    Published 2009-01-01
    “…From the results, it is observed that the solutions obtained through the proposed method provide much wider information in terms of closed interval form which is more useful in ensuring secured operation of the interconnected system in the presence of uncertainties in load and line parameters.…”
    Get full text
    Article
  19. 6099

    Privacy protection mechanism of on-demand disclosure on blockchain by Shaozhuo LI, Na WANG, Xuehui DU

    Published 2020-06-01
    “…Privacy protection has become the key problem that blockchain technology must solve from theory to practice.There is a privacy protection requirement of on-demand disclosure in practical applications.Inspired by multicast secure communication mechanism,a privacy protection mechanism of on-demand disclosure on blockchain was proposed.This mechanism improves the RSA based anonymous multi receiver encryption scheme to realize the disclosure of the private data on the blockchain only to the permitted informed,the anonymity protection of the informed and the traceability of the privacy disclosure.The Quorum blockchain privacy protection mechanism is adopted to realize the safe and efficient distribution of the key between the owner of the private information and the informed.Finally,it is proved that PPM-ODB mechanism can guarantee the privacy of privacy data and its superiority in time and storage cost,and it is suggested that the number of informed people should be less than 100 to obtain a good user experience.…”
    Get full text
    Article
  20. 6100

    THE HISTORICAL DEVELOPMENT AND CURRENT TRENDS OF POLITICAL SCIENCE AS A FIELD OF STUDY IN NIGERIA by Toye Manuwa

    Published 2023-08-01
    “…It investigates the current challenges and opportunities for political science in Nigeria in the 21st century, such as democratization, development, security, corruption, ethnicity, and globalization. …”
    Get full text
    Article