Showing 601 - 620 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 601
  2. 602
  3. 603
  4. 604

    Precision Security: Integrating Video Surveillance with Surrounding Environment Changes by Wenfeng Wang, Xi Chen, Guiwei Zhang, Jing Qian, Peng Wei, Boqian Wu, Hongwei Zheng

    Published 2018-01-01
    “…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
    Get full text
    Article
  5. 605
  6. 606
  7. 607

    ASSESSMENT OF PSYCHOLOGICAL CHARACTERISTICS OF HUMAN RIGHTS IN THE SECURITY OF ITS WORK by Darya A. Melnikova, German N. Yagovkin

    Published 2015-06-01
    “…The role of motivation for Human Security. The classification of the causes of erroneous actions of man. …”
    Get full text
    Article
  8. 608
  9. 609
  10. 610
  11. 611
  12. 612
  13. 613
  14. 614

    UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li

    Published 2010-01-01
    Subjects: “…network security…”
    Get full text
    Article
  15. 615

    Application of convolutional neural networks in the intelligence security system subsystem by V. S. Demeshko, A. I. Фёдоров

    Published 2020-08-01
    “…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
    Get full text
    Article
  16. 616

    Small Arms and Small Countries: Firearms and the International Security Agenda by Carla Álvarez Velasco

    Published 2016-05-01
    “…This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. …”
    Get full text
    Article
  17. 617

    Container Security Device Chain Network for Safe Railway Transportation by Sungryul Kim, Jeonghyun Kim, Younghwan Yoo

    Published 2014-11-01
    “…This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. …”
    Get full text
    Article
  18. 618
  19. 619
  20. 620

    Embedded software security testing technology for relay protection devices by Wei DING, Jiaxiao MENG, Tao DAI, Huajun CHEN

    Published 2018-04-01
    “…As the first defensive line of power grid security,the right actions of delay protection devices can minimize the influence to the electric power system security caused by system or equipment failures.Based on the research of relay protection device inspection procedures and enterprise standard of electric power industry,the embedded software testing content and technologies of relay protection device were studied,including functional testing,performance testing and fault injection testing.This research contributes to the completeness and correctness of the embedded software testing about relay protection device.…”
    Get full text
    Article