Showing 6,101 - 6,120 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 6101

    Study of key technology for reconfigurable satellite platform supporting network interconnection by Chao WANG, Xiao-dong HAN, Rui WANG, Xi ZHOU, Lin-lu YANG, Ya-ping LIU

    Published 2017-10-01
    “…Reconfigurable satellite platform is a new spacecraft design concept.The application of distributed computing in reconfigurable integrated satellite platform was studied,the standard mechanical interface,electrical interface for the separation or separation between main platform and a variety of payloads to form a new combination and achieve the expansion of platform functions and efficient use was proposed.Including the security control protocol,scalable design,distributed computing and management models and other aspects of a detailed design,the key technologies of reconfigurable integrated satellite platforms supporting network interconnection were studied to meet the existing communications,remote sensing and navigation satellites’ needs.It will be promoted for the spacecraft design to the integrated business and in the orbit reconfiguration direction of continuous development,which will enhance the stability of the orbit operation,survivability and maintainability and provide a reliable technical foundation for the world of integrated network research.…”
    Get full text
    Article
  2. 6102

    Program profilaktyki nadużywania Internetu i mediów elektronicznych: komunikat z badań ewaluacyjnych by Bartłomiej Walczak, Marcin Sochocki

    Published 2021-09-01
    “…Wilcoxon test indicates the significant increment in knowledge about communication rules and relationships on the Internet, about the influence of ICT on health and safety and emotional and difficult situation management skills, which were treated as securing factors. Moreover, a significant increment of the monitoring activities among parent was observed. …”
    Get full text
    Article
  3. 6103

    Fair multi-party concurrent signature scheme by Qing YE, Yun YANG, Shi-hui ZHENG, Li-wei CHANG, Da XIAO, Yi-xian YANG

    Published 2014-03-01
    “…Multi-party concurrent signatures were first proposed by Tonien et al at ISC2006,but Xie and Tan pointed Tonien et al's scheme doesn't satisfy fairness and they reconstructed multi-party concurrent signature schemes respectively.Through analysis,the multi-party concurrent signature schemes proposed by Xie and Tan don't satisfy fairness either,so a formal security model of fair multi-party concurrent signatures was proposed and a multi-party concurrent signature scheme based on bilinear pairing and multi-party key agreement was also reconstructed.Analysis shows that the new scheme satisfies correctness,unforgeability,ambiguity,concurrency and fairness in the random oracle model assuming the CDH problem is intractable and highly efficient in signature size,computation cost and communication cost compared with other schemes of its kind.…”
    Get full text
    Article
  4. 6104

    CodeBuddy: A Programming Assignment Management System for Short-Form Exercises by Stephen R. Piccolo, Emme Tuft, P. J. Tatlow, Zach Eliason, Ashlie Stephenson

    Published 2025-01-01
    “…It provides a Web-based interface, the ability to execute code in a secure environment, support for custom testing logic, near-immediate feedback to students, and support for many programming languages. …”
    Get full text
    Article
  5. 6105

    The Israeli–Palestinian Separation Wall and the Assemblage Theory: The Case of the Weekly Rosary at the Icon of Our Lady of the Wall by Elisa Farinacci

    Published 2017-06-01
    “…Although the Wall has been widely described as a technology of occupation on one side and as a device to ensure security on the other, through Latour’s concept of assemblages I unearth its agency in developing a Christian shrine. …”
    Get full text
    Article
  6. 6106

    Some Characteristics of Employees as Risk Factors for Presenteeism by Petra Mlakar, Janez Stare

    Published 2013-06-01
    “…The characteristics considered included ambition, financial worries, job security, sick leave and the physical and mental health of employees.…”
    Get full text
    Article
  7. 6107

    Factors Affecting Cloud-Based Accounting Adoption in the Indonesian Banking Sector by Ryandika Ramadhan Al Farishi, Tjun Tjun Lauw

    Published 2025-01-01
    “…In contrast, technological and environmental factors must be considered by banks and the Indonesian government, especially clarity regarding data security protection from cloud adoption to provide confidence to users of cloud-based accounting applications.…”
    Get full text
    Article
  8. 6108

    Bilateral Primary Total Knee Arthroplasty and Reconstruction of the Medial Tibial Plateau by an Asymmetric Cone in a Patient with Charcot Arthropathy by Spiros Tsamassiotis, Henning Windhagen, Max Ettinger

    Published 2021-01-01
    “…In advanced Charcot arthropathy of the knee, the use of asymmetric tibial cones appears to be an appropriate solution for secure fixation and stability of the implant.…”
    Get full text
    Article
  9. 6109

    Disappearance of women and girls in Mexico: Contributions of feminisms for understanding macrosocial processes by María de Lourdes Velasco-Domínguez, Salomé Castañeda-Xochitl

    Published 2020-05-01
    “…This re-search argues that the increase in disappeared girls is associated with two main factors: an economy of dispossession of human lives for the accumulation of capital, which produces specific forms of violence against women and girls, and a systematic violence against women exercised by agents from state security and legal institutions.…”
    Get full text
    Article
  10. 6110

    SDN control and forwarding method based on identity attribute by Xianwei ZHU, Chaowen CHANG, Zhiqiang ZHU, Xi QIN

    Published 2019-11-01
    “…Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and attribute signature were generated by device attributes and encapsulated in the group header.When the data flow left the network,the data was verified by the forwarding device to ensure the validity of the data flow.At the same time,attribute identification was defined as a match field of flow by the framework,and the network forwarding behavior was defined based on attributeidentification.A fine-grained access control was implemented by the proposed mechanism and attribute-based signature.The proposed mechanism and attribute-based signature implemented a fine-grained access control.Experimental results demonstrate that the method can effectively implement fine-grained forwarding and flow authentication,and the forwarding granularity is higher than that of similar schemes.…”
    Get full text
    Article
  11. 6111

    Le mythe de l’émergence. Réalités des dynamiques externes et internes des processus d’accumulation brésilien et chinois by Mylène Gaulard

    Published 2020-06-01
    “…Finally, the solutions proposed to face the current crisis of emergence, such as the reshaping of social security systems, the reorientation of these economies towards their internal market and a better international integration enabled by the development of renewable energies, are more widely criticized in my latest work.…”
    Get full text
    Article
  12. 6112

    Bringing Home the Bacon: Infusing Evaluation Best Practices into Grant Proposals by Glenn Israel, Jaclyn D Kropp, David C Diehl, Conner Mullally, Sebastian Galindo

    Published 2020-01-01
    “…By adopting these practices, you will enhance the quality of your proposals; you will most likely increase the amount of extramural funding that is secured; and you will elevate the visibility and impact of programs within your organization. …”
    Get full text
    Article
  13. 6113

    REVISITING THEORIES AND BUILDING A NEW RESEARCH AGENDA FOR EXPLAINING RADICALIZATION by Ioana CHIȚĂ

    Published 2024-12-01
    “…Over recent decades, radicalization, particularly when it leads to violence, has become a critical focus for national and international security agendas and research fields. This article revisits foundational social, psychological, socio-psychological, and psychiatric theories of radicalization, aiming to provide a comprehensive overview of their development and current relevance. …”
    Get full text
    Article
  14. 6114

    Provable data possession scheme based on public verification and private verification by Junfeng TIAN, Mengjia CHAI, Liuling QI

    Published 2019-03-01
    “…More and more users choose to transfer their applications and data into the cloud.Data security is a key issue for cloud storage systems.To ensure the integrity and validity of the data stored in the cloud,provable data possession (PDP) scheme is particularly important.In order to verify whether the cloud storage service provider had stored the data of the user completely,a scheme on the basis of NRPDP (non-repudiable PDP) was improved and extended,and a data retention scheme based on public authentication and private authentication was proposed.The scheme can verify the trustworthiness of the service provider and the user in the cloud storage at the same time,which satisfies the non-repudiation of the verification.The theory proves the non-repudiation of the proposed scheme.The experiment proves that the efficiency of each stage is better than that of the existing single public verification method or private authentication method.…”
    Get full text
    Article
  15. 6115

    Population Ageing in Ghana: Research Gaps and the Way Forward by Chuks J. Mba

    Published 2010-01-01
    “…With increasing urbanization and modernization, it is important to know something about intergenerational transfers from adult children to their elderly parents, and characterize the elderly persons' food security strategies. Training of researchers will be important in terms of strengthening Ghana's capacity to monitor trends, as well as to conduct research and explore new directions in population ageing research.…”
    Get full text
    Article
  16. 6116

    Design of Mobile Gateway for Implementation of Smart Work System by Sang-Young Oh, Bong-Hyun Kim

    Published 2015-01-01
    “…For this reason, I have developed a mobile gateway that is based on the communication server construction OPEN API development, management of mobile ID, protocol design, and design of SSL/TLS security tunnel. Also, we developed a smart work platform that you apply this, you are trying to provide information systems environment of mobile company.…”
    Get full text
    Article
  17. 6117

    Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview by Peyman Vafadoost Sabzevar, Hamidreza Rokhsati, Alireza Chamansara, Ahmad Hajipour

    Published 2024-12-01
    “…One of the important areas that require online monitoring is medical imaging equipment, whose functional information is transmitted through the Internet of Things. Server security and intrusion prevention, along with anomaly detection, are critical requirements for these networks. …”
    Get full text
    Article
  18. 6118

    Application of 5G in railway smart stations by Ruifeng CHEN, Jun LI, Chunjie XU, Qingbo CHENG, Xiaojun LV

    Published 2021-07-01
    “…Accelerating the 5G “new infrastructure” strategy has become the inevitable development trend of railway smart stations.Firstly, state-of-the-art of relevant business of railway smart stations in China was analyzed.Afterwards, the application requirements of 5G communication in railway smart stations were outlined, and then 5G communication network architecture of railway smart stations was constructed based on cloud edge collaboration.Finally, the application modes of railway smart stations based on 5G communication and cloud edge collaboration were respectively proposed for passenger travel service, station operating organization, security guarantee and green energy saving.The application of railway smart stations based on 5G communication can promote the transformation and upgrading of stations, enhance the quality of passenger service, improve passenger travel experience, and increase the efficiency of passenger transport operating organization.…”
    Get full text
    Article
  19. 6119

    RADIO FREQUENCY DATA IDENTIFICATION TECHNOLOGY: POTENTIAL FOR USE IN FASHION INDUSTRY SUPPLY CHAINS by N. Yu. Barkova, O. A. Borodina

    Published 2020-09-01
    “…The technology can be used to increase the transparency and security of supply chains, marketing research and in other areas. …”
    Get full text
    Article
  20. 6120

    Highly robust co‐estimation of state of charge and state of health using recursive total least squares and unscented Kalman filter for lithium‐ion battery by Xiaohui Li, Weidong Liu, Bin Liang, Qian Li, Yue Zhao, Jian Hu

    Published 2024-12-01
    “…Abstract State of charge (SOC) and state of health (SOH) constitute pivotal factors in the efficient and secure management of lithium‐ion batteries, particularly within the context of electric vehicles. …”
    Get full text
    Article