Showing 6,161 - 6,180 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 6161

    Function argument number identification in stripped binary under PPC and MIPS instruction set by Xiaokang YIN, Liu LIU, Long LIU, Shengli LIU

    Published 2020-08-01
    “…The identification of the number of function argument contributes to the recovery of the function prototype and is the basis for data flow analysis and other security analysis.In order to improve the accuracy of the recognition of the number of function parameters,an algorithm (Findargs) which determines the number of parameters of the function according to the voting mechanism of the function call relationship was proposed.Findargs starts from the function call characteristics of PPC and MIPS instruction set,and uses function call relationship combined with argument pass analysis to identify the number of function arguments,which can help to recover function prototype.In order to evaluate the recognition effect of Findargs,a large binary file was selected and tested it with radare2.The experiments results show that Findargs has higher accuracy,and the accuracy rate for PPC instruction set reaches 90.3%.For MIPS instruction set,the accuracy rate is 86%.…”
    Get full text
    Article
  2. 6162

    Diagnosis of Planetary Gearbox Crack Fault based on Torsional Vibration Signal Windowed RMS Time-domain Synchronous Averaging by Wei Wei, Yunpeng Li, Jingyuan Liang

    Published 2021-12-01
    “…Since planetary gearbox often works in harsh environment,its key components are prone to tooth root crack fault damage and are not easy to be identified,easy to cause security risks. Compared with traditional transverse vibration signal,torsional vibration signal is not affected by the modulation of time-varying transmission path in theory,it has great advantages,so its frequency component is simple and it is easy to extract fault features. …”
    Get full text
    Article
  3. 6163

    Reproductive aging in farm animals: Impacts on fertility and strategies for mitigation: A narrative review by Akhter Rasool, Sachin, Irtiqa Manzoor, Akshata Patil

    Published 2025-01-01
    “…The livestock sector is a vital component of India's agricultural economy, providing essential support to rural communities and ensuring food security. Efficient reproductive performance is critical to sustaining livestock productivity, yet age-related declines in both male and female fertility pose significant challenges. …”
    Get full text
    Article
  4. 6164

    España y el golpe de estado contra De Gaulle by Karima Aït Yahia

    Published 2013-06-01
    “…Former French general Raoul Salan, who had taken refuge in Spain for his opposition to the policy of self-determination in Algeria, managed to escape the surveillance of the Francoist security forces to lead, in April 1961, the «putsch of the Generals». …”
    Get full text
    Article
  5. 6165

    Fourier Rotman Lens Enabled Directional Modulation Transmitter by Yuan Ding, Yunhua Zhang, Vincent Fusco

    Published 2015-01-01
    “…It is shown that Fourier Rotman DM functionality enhances system security performance in terms of narrower decodable low BER region and higher BER values associated with BER sidelobes especially under high signal to noise ratio (SNR) scenarios. …”
    Get full text
    Article
  6. 6166

    Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT by Di Fan, Wenxue Sun, Huiyuan Zhao, Wenshuo Kang, Changzhi Lv

    Published 2022-01-01
    “…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
    Get full text
    Article
  7. 6167

    IMPACT OF THE WHISTLEBLOWING POLICY IN THE FIGHT AGAINST CORRUPTION IN NIGERIA by NIMCHAK NANSAK EMMANUEL, MOSES DANJUMA BOT

    Published 2023-12-01
    “…This work, therefore, recommends, among other things, that the whistle blowers should be given adequate legal and security protection and adequate public awareness be embarked upon to educate the people of the need to expose corrupt individuals. …”
    Get full text
    Article
  8. 6168

    Genes for editing to improve economic traits in aquaculture fish species by Zituo Yang, Guihong Fu, May Lee, Shadame Yeo, Gen Hua Yue

    Published 2025-01-01
    “…Aquaculture, a critical sector for global food security, faces the challenge of meeting growing demand while protecting wild fish populations. …”
    Get full text
    Article
  9. 6169

    Les échos de la presse dans le silence du cabinet. La posture médiatique flaubertienne à la lumière de la correspondance by Nejma Omari

    Published 2021-06-01
    “…While Flaubert’s financial security exempted him from the daily publications that contemporary writers-journalists had to produce, it did not necessarily means disinterest. …”
    Get full text
    Article
  10. 6170

    Making a comprehensive arms control agreement for Europe in times of crisis: Rationale, structure, and outcomes by Stefanović Andrej, Kostić-Šulejić Marina

    Published 2024-01-01
    “…The war in Ukraine reflects the culmination of two international crises - one of the European security architecture and the other of strategic stability. …”
    Get full text
    Article
  11. 6171

    Intelligent power control for covert communication in cognitive Internet of things by Zan LI, Xiaomin LIAO, Jia SHI, Pei XIAO

    Published 2020-03-01
    “…In order to solve the security problem of cognitive Internet of things (IoT),an intelligent power control algorithm of covert communication in cognitive IoT based on generative adversarial network was proposed.Firstly,the covert communication optimization problem in the cognitive IoT was transformed into a dynamic game between the cognitive IoT user and the eavesdropper.Then,the generator imitated the cognitive IoT user,while the discriminator imitated the eavesdropper.The generator and the discriminator were constructed by the three-layer neural network respectively.Through the two-person zero-sum game,the learning optimization process was realized to achieve the Nash equilibrium,and finally the covert power control scheme was obtained.The simulation results show that the proposed algorithm can not only obtain near-optimal covert power control scheme with rapid convergence ability,but also be more practical in the future cognitive IoT.…”
    Get full text
    Article
  12. 6172

    Permanent pacemaker implantation. Access to the apex of the right ventricle using fluoroscopy only at the last moment by Cynthia Torres Acosta

    Published 2021-12-01
    “…Although it is not currently practiced, during the stage that it was applied in the hospital, it provided security to patients and health personnel, so its use should be resumed.…”
    Get full text
    Article
  13. 6173

    Markov game modeling of mimic defense and defense strategy determination by Xingming ZHANG, Zeyu GU, Shuai WEI, Jianliang SHEN

    Published 2018-10-01
    “…Network mimic defense technology enhances the robustness of active defense through the redundancy,dynamic and diversity as well as the decision feedback mechanism.However,little work has been done for its security assessment and existing classic game models are not suitable for its dynamic characteristics and lack of universality.A Markov game model was proposed to analyze the transfer relationship between offensive and defensive status and the measurement method of safety and reliability of mimic defense,and calculated the offensive and defensive game equilibrium through non-linear programming algorithm to determine the best defensive strategy considering performance.Experiments give a comparison with the multi-target hiding technique and shows that the mimic defense has a higher defensive effect.Combining with the specific network case,the specific attack and defense path for the exploit of the system vulnerability is given and the effectiveness of the defense strategy algorithm is verified.…”
    Get full text
    Article
  14. 6174

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. …”
    Get full text
    Article
  15. 6175

    The Correlation Between External and Internal Factors of the Libyan Crisis by E. N. Koposova

    Published 2015-10-01
    “…The importance of this region is determined by its geopolitical position, concentration of large natural resources, as well as the fact that it represents the greatest threat to the international security - the bases of terrorist organizations, the strengthening role of the group "Islamic State", drug trafficking and the proliferation of weapons of mass destruction (WMD). …”
    Get full text
    Article
  16. 6176

    Who calls the shots in Naomi's life? Reading the Naomi-Ruth story within the African religio-cultural context

    Published 2016-12-01
    “…Such a worldview, in which the Sacred Other, the living and the (living) dead formed an integral whole, can also be observed at critical points in Naomi’s life: when Naomi bid farewell to her daughters-in-law (Rt 1:8-9); Naomi’s confession about Yahweh’s faithfulness to both the living and the dead (Rt 2:20); Naomi’s plan to seek security for Ruth through “levirate” marriage (Rt 3:1), and when she acted as a nurse to Mahlon’s son (Rt 4:5, 16). …”
    Get full text
    Article
  17. 6177

    Analysis of the Thermal Characteristics of Surrounding Rock in Deep Underground Space by Liu Chen, Jiangbo Li, Fei Han, Yu Zhang, Lang Liu, Bo Zhang

    Published 2019-01-01
    “…With the development of society, the economy, and national security, the exploitation of deep underground space has become an inevitable trend in human society. …”
    Get full text
    Article
  18. 6178

    Machine Learning Applications based on SVM Classification A Review by Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
    Get full text
    Article
  19. 6179

    Full duplex secret transmission scheme based on user cooperation by Xiao-lei KANG, Xin-sheng JI, Lu XIA, Kai-zhi HUANG

    Published 2017-01-01
    “…Full-duplex artificial noise scheme can achieve a limited improvement while the interference power keeps increasing and the full-duplex gain is null.To solve these two problems,a full-duplex secure transmission scheme based on user cooperation was proposed,in which the full-duplex receiver used partial power to send artificial noise,and transmitted the downlink signal by the remaining power to the user who shared the same frequency.In order to maximize the system secrecy rate,the beam vector of the desired signal and the artificial noise were designed.Besides,the optimal power allocation factor was obtained by one-dimensional search simply.Simulation results show that compared with the RS-ref and HD methods,the proposed method can achieve an approximate linear growth in high power and can obtain the full-duplex gain.…”
    Get full text
    Article
  20. 6180

    Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short by Wei LI, Chun LIU, Dawu GU, Wenqian SUN, Jianning GAO, Mengyang QIN

    Published 2023-04-01
    “…On the random single byte-oriented fault model and the assumption of ciphertext-only attack, a statistical ineffective fault analysis of the Saturnin-Short cipher was proposed.The analysis combined the statistical distribution with the ineffective analysis, and discussed the difference between intermediate states before and after fault injections.A variety of dual distinguishers was designed, such as the probabilistic symmetric Chi-square-maximum likelihood estimate, and harmonic mean-Hamming weight.It only required at least 1 097 ineffective faults to recover the 256 bit secret key with a success rate of at least 99%.The experimental results show that the proposed distinguishers can not only decrease fault injections, but also reduce the attacking time and complexities.Therefore, the Saturnin-Short cipher cannot resist against the statistical ineffective fault analysis.It provides an important reference for the security analysis of other lightweight authenticated ciphers.…”
    Get full text
    Article