Showing 6,141 - 6,160 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 6141

    Research on location privacy protection of mobile terminals for maritime monitoring sensor networks by Xin SU, Su JIANG, Yiqing ZHOU

    Published 2021-12-01
    “…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
    Get full text
    Article
  2. 6142

    Historical and Legal Analysis of Economic Sanctions by E. S. Rodionova

    Published 2024-07-01
    “…Subsequently, the evolution of the system of collective security fundamentally changed the role of economic sanctions. …”
    Get full text
    Article
  3. 6143

    Application of public key infrastructure in telecom operators by Congli WANG, Jinhua WANG, Weijia XUE

    Published 2020-11-01
    “…With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.…”
    Get full text
    Article
  4. 6144

    Eaux, risques majeurs et patrimoine culturel : des directives européennes aux stratégies territoriales, état des lieux de la mise en œuvre en France by Virginie Serna

    Published 2014-12-01
    “…They forced those involved in heritage management to consider the heritage resources associated with water ; to recognise them and to identify actions in order to heighten awareness and secure their protection. These heritage enquiries in regiontake different forms (inventories, university programs, inter-ministerial working groups ...) and they must be interlinked in order to show that natural and cultural heritage ressources inseparable.…”
    Get full text
    Article
  5. 6145

    Current and Emerging Protocols for Carbon Measurement in Agricultural Soils by Suraj Melkani, Noel Manirakiza, Shirley M. Baker, Jehangir H. Bhadha

    Published 2023-10-01
    “…These massive C sinks have the potential to reverse soil degradation, mitigate climate change, and enhance food security. It is therefore essential to monitor the C cycle by accurately measuring the amount of soil C in agricultural fields. …”
    Get full text
    Article
  6. 6146

    A Transformer-Based Model for Abnormal Activity Recognition by Amir Mohammad Ahmadi, Kourosh Kiani, Razieh Rastgoo

    Published 2024-04-01
    “…Given the increasing daily volume of videos generated by security cameras in personal and public spaces, monitoring the activities present in videos has become crucial. …”
    Get full text
    Article
  7. 6147

    Rehabilitation of Nonsyndromic Oligodontia in Deciduous Dentition Using Modified Hollywood Bridge - A Case Report by A K Safoora, Madhu Santhakumar, Kannan Vadakkepurayil

    Published 2024-11-01
    “…In this appliance, molars are banded and acrylic teeth were secured to the stainless steel palatal wire with the help of heat cure acrylic resin. …”
    Get full text
    Article
  8. 6148

    Effects of (Ti, Mo)C precipitation on the microstructure, impact toughness, and sulfide stress corrosion cracking resistance of linepipe steels by Seoyoon Gong, Seungon Lim, Kyu-Tae Kim, Yong-Jae Yu, S.E. Shin

    Published 2025-01-01
    “…(Ti, Mo)C precipitation can help secure the strength, low-temperature toughness, and sulfide stress corrosion cracking (SSCC) resistance required for linepipes. …”
    Get full text
    Article
  9. 6149

    Design of privacy-preserving authentication protocol for service invocation by Linpeng CHAI, Bin ZHANG, Yang LIU, Jiajia SUN

    Published 2018-03-01
    “…Aiming at the requirement of the safe transmission of authentication credentials and the privacy preserving in service orientied multi-domain collaboration environment,a privacy-preserving authentication protocol for service invocation based on the provable secure certificateless aggregate signcryption scheme was proposed.By the path of the service invocation,the authentication information has been signcrypted successively,ensuring that the service providers can dynamically and orderly join in the process of service invocation authentication.The credentials and shared information can be safely transmitted respectively by the aggregate signcryption scheme and Diffie-Hellman algorithm,thus the SOAP message only can be decoded by specified acceptor,which is suitable for controlling the disclosure scope of the privacy information.Simultaneously,the public verifiability of CLASC can ensure that the validity of the aggregate signcryption can be verified by other service providers.The length of the SOAP message is shorter than existed protocols,which improve the transfer efficiency.…”
    Get full text
    Article
  10. 6150

    APPLICATION ON PREDICTING FATIGUE LIFE IN AIRCRAFT STRUCTURE BASED ON PHM TECHNOLOGY by SONG Bo, ZHU QingYu, ZENG ZhaoYang

    Published 2017-01-01
    “…PHM( Prediction and Health Management) technology can be used to predict when fatigue failure may occur,thereby achieving self-service security and reducing the use and protection costs. …”
    Get full text
    Article
  11. 6151

    Diviser pour mieux juger : concurrence et convergence des parlements au xve siècle by Élisabeth Schmit

    Published 2022-01-01
    “…It intended to intensify judicial activity, to secure the loyalty of the cities and to govern closely the conquered territories. …”
    Get full text
    Article
  12. 6152

    Evaluating GPT models for clinical note de-identification by Bayan Altalla’, Sameera Abdalla, Ahmad Altamimi, Layla Bitar, Amal Al Omari, Ramiz Kardan, Iyad Sultan

    Published 2025-01-01
    “…Abstract The rapid digitalization of healthcare has created a pressing need for solutions that manage clinical data securely while ensuring patient privacy. This study evaluates the capabilities of GPT-3.5 and GPT-4 models in de-identifying clinical notes and generating synthetic data, using API access and zero-shot prompt engineering to optimize computational efficiency. …”
    Get full text
    Article
  13. 6153

    Bloom filter-based lightweight private matching scheme by Sheng WAN, Yuan-yuan HE, Feng-hua LI, Ben NIU, Hui LI, Xin-yu WANG

    Published 2015-12-01
    “…With rapid developments of mobile devices and online social networks,users of proximity-based mobile social networks (PMSN) could easily discover and make new social interactions with others,but they enjoyed this kind of conveniences at the cost of user privacy and system overhead,etc.To address this problem,a third party free and lightweight scheme to privately match the similarity with potential friends in vicinity was proposed.Unlike most existing work,proposed scheme considered both the number of common attributes and the corresponding priorities on each of them individually.The Bloom filter-based common-attributes estimation and the lightweight confusion binary vector scalar product protocol reduce the system overhead significantly,and can resist against brute force attack and unlimited input attack.The correctness,security and performance of overhead of proposed scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
    Get full text
    Article
  14. 6154

    Privacy-preserving convolutional neural network inference scheme based on homomorphic ciphertext transformation by LI Ruiqi, YI Qin, HUANG Yixuan, JIA Chunfu

    Published 2024-10-01
    “…Theoretical analysis and experimental results show that the proposed scheme can ensure data security, and has higher inference accuracy and lower calculation and communication overhead.…”
    Get full text
    Article
  15. 6155

    Device-Free Localization Techniques: A Review by Abd Al-Rahman Tariq Rasheed, Aseel Hameed AL-Nakkash, Osama Abbas Al Tameemi, Debashri Roy

    Published 2023-12-01
    “…By shedding light on these critical aspects, it offers valuable insights into the current state of DFL technology and its potential in diverse domains, ranging from smart environments to security systems. …”
    Get full text
    Article
  16. 6156

    One-way hash function construction based on Chen-type hyper-chaotic system and key-stream by REN Hai-peng, ZHUANG Yuan

    Published 2009-01-01
    “…Theoretical analysis and experimental results indicate that the proposed algorithm can satisfy the required security performance, such as data compression function, irreversibility, initial value sensitivity forgery resistance and collision resistance. …”
    Get full text
    Article
  17. 6157

    La prensa anarquista española en Francia durante la reunificación de la CNT (1960-1965) y su repercusión en las relaciones bilaterales Francia-España by Miguel Morán Pallarés

    Published 2025-01-01
    “…Based on the critical study of the Spanish libertarian publications of the exile and the documentation from international archives, this article aims to show the evolution of the Spanish anarchist press in the French exile between 1960 and 1965, the prohibitions and obstacles to which had to face in terms of its dissemination, as well as the importance that factors related to the respective French and Spanish government interests in matters of security had in its existence, and its impact as a relevant issue in the evolution of bilateral diplomatic relations between both countries.…”
    Get full text
    Article
  18. 6158

    A Real-Time Optical Tracking and Measurement Processing System for Flying Targets by Pengyu Guo, Shaowen Ding, Hongliang Zhang, Xiaohu Zhang

    Published 2014-01-01
    “…The system can be used in the field of aerospace tests like target analysis including dynamic parameter, transient states, and optical physics characteristics, with security control.…”
    Get full text
    Article
  19. 6159

    Few-shot cybersecurity event detection method by data augmentation with prompting question answering by TANG Mengmeng, GUO Yuanbo, ZHANG Han, BAI Qingchun, CHEN Qingli, ZHANG Bowen

    Published 2024-08-01
    “…The result showes that the proposed method’s substantial superiority in low-resource network security event detection tasks compared to other baseline methods.…”
    Get full text
    Article
  20. 6160

    Climate change, freshwater ecosystems and inland fisheries: implications for the developing nations by Biju Kumar A

    Published 2020-07-01
    “…Further, they are among the key components in achieving the United Nations Sustainable Development Goals (UN SDGs) set for the year 2030, including poverty reduction, food security, clean water and sanitation, conservation of biodiversity, and climate action. …”
    Get full text
    Article