Showing 6,241 - 6,260 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6241

    Millimeter-wave array enabled UAV-to-UAV communication technology by Zhenyu XIAO, Ke LIU, Lipeng ZHU

    Published 2022-10-01
    “…As the application scope of unmanned aerial vehicle (UAV) expands and the tasks become more complicated, the demands for large bandwidth, high data rate and antijamming capability in UAV-to-UAV (V2V) communication grow rapidly.With abundant spectrum resource, millimeter-wave (mmWave) array communication has been one of the key technologies to support V2V communications.Focusing on the emerging field of mmWave array V2V communication, the difficulties and challenges in point-to-point communication and unmanned aerial vehicle ad-hoc network were analyzed.The problems and approaches for channel modeling, robust beamforming, secure communication in point-to-point communication and neighbor discovery, routing decisions, resource allocation, distributed deployment in unmanned aerial vehicle ad-hoc network were reviewed.Some valuable research directions were summarized to provide inspiration for future relevant research.…”
    Get full text
    Article
  2. 6242

    Comparative study of anonymous network Tor and I2P by Yun YANG, Lingyan LI, Qingzheng WEI

    Published 2019-02-01
    “…Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The anonymous network Tor and I2P have been highly valued by the academic community and the industry,and are also welcomed by users.The key difference between the design concept between the Tor network and the I2P is that I2P attempts to transfer the existing Internet service to the I2P network,and service implementation is provided within the framework,while Thor allows anonymous access to implement and operate external Internet services separately.The anonymous networks Tor and I2P in terms of terminology,project development,anonymous services,key technologies,threat types,etc.were compared,revealing the inherent and essential differences between the two anonymous networks.…”
    Get full text
    Article
  3. 6243

    European Religious Education Policy by Abdurrahman HENDEK

    Published 2022-06-01
    “…Moreover, in recent decades, European organisations such as the Council of Europe and the Organisation for Security and Co-operation in Europe have published recommendations, guidelines and reference books concerning religious education in schools. …”
    Get full text
    Article
  4. 6244

    Identity, imaginary and tourism in the tuareg region, in Niger by Emmanuel Grégoire, Marko Scholze

    Published 2012-12-01
    “…Finally, the authors consider the decline of tourism, as a result of the 2007-2009 rebellion, and the presence in the neighboring Northern Mali of the Salafist brigade Al Qaeda in the Islamic Maghreb (AQIM), which prohibits access to the region to foreigners for security reasons.The brutal halt in the tourist activity came with the decline of the Tuareg subculture that had been forged through their entrepreneurial dedication to tourism.…”
    Get full text
    Article
  5. 6245

    Le nouveau Xinjiang : intégration et recompositions territoriales d’une périphérie chinoise by Alain Cariou

    Published 2009-06-01
    “…That’s the reason why central government take active measures for an acceleration of the economic development in the region with the aim of promoting regional security, cultural and économic integration. Nowadays, an unprecedent change taken place in Xinjiang with the improvements in transportation infrastructure. …”
    Get full text
    Article
  6. 6246

    Communication,navigation and IoT integration 5G indoor communication network by Xinwang ZHANG, Jia DONG, Sichen ZOU, Dong WANG, Wei DENG, Haiyu DING

    Published 2019-08-01
    “…In the 4G era,operators have become data service pipelines,while they will actively seek business transformation in the 5G era.According to research institutes,the indoor positioning and IoT market have broad prospects,and operators are working hard to expand vertical industry applications in related fields.However,the existing indoor communication network has a single function and cannot effectively support indoor positioning and IoT services.A communication,navigation and IoT integration 5G indoor communication network was proposed.By integrating the bluetooth module inside the indoor antenna,it achieved some new functions,such as downlink bluetooth positioning,advertisement information push,path loss detection,uplink IoT collection and uplink bluetooth positioning.The proposed technical solution can be applied to smart medical scenarios,such as smart consultation,equipment management,security management,logistical support and one-click alarm.…”
    Get full text
    Article
  7. 6247

    Colonial and Postcolonial Logistics by Giulia Scotto

    Published 2018-11-01
    “…The analysis of infrastructure development in postcolonial Zambia illustrates the competing strategies through which imperialist powers attempted to secure a new form of control on Africa and elucidates the role of logistics as a decisive tool to shape the African territory.…”
    Get full text
    Article
  8. 6248

    Big Data with Cloud Computing: Discussions and Challenges by Amanpreet Kaur Sandhu

    Published 2022-03-01
    “…Various research challenges are defined in terms of distributed database storage, data security, heterogeneity, and data visualization.…”
    Get full text
    Article
  9. 6249

    Low-hit frequency-hopping communication systems for power Internet of things random access by Shu DU, Mei MA, Bo ZHAO, Qi ZENG, Xing LIU

    Published 2023-01-01
    “…The communication network is an essential component of the data acquisition and information transmission in power Internet of things (IoT).To meet the development requirements of multiple power service in the future, the wireless communication technique with flexible-access and high scalability is one of the development directions for power IoT.Due to the features of large-scale access, random access time, high security and reliability for information transmission of power IoT, a frequency-hopping (FH) technique with low-hit rate for random access was proposed.The construction algorithm of such FH pattern was based upon the combination and shift operation of conventional FH sequences.By the theoretical arithmetic and numerical simulation, the properties of the proposed FH pattern and the error-rate of the FH-based power IoT were evaluated.The analysis reveals that the new class of FH sequences and the system can meet the requirements of large-scale access and highly reliable communication for the power IoT, which has good application prospects.…”
    Get full text
    Article
  10. 6250

    Southern Madagascar, polycrisis and project failures: A scoping review. by Léo Delpy, Claire Gondard Delcroix, Maxime Galon, Benoît Lallau, Isabelle Droy

    Published 2024-01-01
    “…The southern region of Madagascar experiences a series of crises related to agro-climatic, nutritional, security, institutional, and political conditions despite the presence of numerous development aid projects over several decades. …”
    Get full text
    Article
  11. 6251

    Políticas alimentares e as capacidades estatais em capitais metropolitanas brasileiras by Silvia Aparecida Zimmermann, Catia Grisa, Adriana Aranha

    Published 2024-06-01
    “…It is concluded that several factors contributed to the construction and continuity of food policies in the cities studied, especially institutional activism and bureaucratic structuring, in addition to training in food and nutritional security and the incorporation of the principles of efficiency and public innovation, as well as the recognition of food policies by the population local and national and international recognition of food themes.…”
    Get full text
    Article
  12. 6252

    Matter Element Evaluation and Sensitivity Analysis of the Sponge City Construction Performance by LIU Li, ZHONG Shanshan

    Published 2020-01-01
    “…In order to know the construction effect of the sponge city constructionproject,scientifically and reasonably evaluate the current situation of pilot sponge cityconstruction, this paper constructs an evaluation index system from 4 aspects of waterecology,water environment,water resources and water security, establishes an evaluation model forsponge city construction performance by an entropy weight matter-element analysis method,takes HebiCity as an example for evaluation,and on the basis of the evaluation result, performs asensitivity analysis of the influencing factors of sponge city construction in Hebi City. …”
    Get full text
    Article
  13. 6253

    Les Indiens d’Antananarivo, des citadins comme les autres ? by Catherine Fournet-Guérin

    Published 2024-03-01
    “…However, precisely because of their dominant social position, Indians are characterised by mobility practices that are constrained by security concerns, and express a strong sense of spatial vulnerability. …”
    Get full text
    Article
  14. 6254

    Adaptive steganography algorithm in digital image based on Arnold transform by Qi LI, Xin LIAO, Guo-qing QU, Guo-yong CHEN, Jiao DU

    Published 2016-06-01
    “…Previous adaptive steganography algorithms were based on ordinal and full-embedding method.However,these algorithms might cause the concealment of secret information not good enough.Therefore,a random and non-fully embedding method was proposed to improve the concealment.The image system parameters could be obtained,so that the image full capacity was exactly greater than the length of information for non-full embedding.Moreover,these parameters made steganography more flexibility by reducing the modifications of image.Then,secret information embedding sequence was scrambled based on Arnold transform for the purpose that the steganalyst cannot detect out information orderly.Therefore,the secret information can be more concealed,which can improve the security of the algorithms.Experimental results show that the algorithm not only improves the concealment of steganography but also reduces stego distortion,and random non-full embedding operating can be applied to many other similar algorithms.…”
    Get full text
    Article
  15. 6255

    Quels espaces scolaires pour le bien-être relationnel ? Enquête sur le ressenti des collégiens français by Thibaut Hébert, Éric Dugas

    Published 2017-02-01
    “…In other words, what spatial modifications could be thought out in order to guarantee a feeling of security and pupils’ well-being. The results show that spaces which are not under surveillance are seen as risky by secondary school children (n =544). …”
    Get full text
    Article
  16. 6256

    Genome Editing: A Promising Approach for Achieving Abiotic Stress Tolerance in Plants by Navdeep Kaur, Shubham Sharma, Mirza Hasanuzzaman, Pratap Kumar Pati

    Published 2022-01-01
    “…The susceptibility of crop plants towards abiotic stresses is highly threatening to assure global food security as it results in almost 50% annual yield loss. …”
    Get full text
    Article
  17. 6257

    Possible paths towards sustainable tourism development in a high-mountain resort by Laurent Arcuset

    Published 2009-12-01
    “…The local approach of "sustainable tourism", indeed, seems for the moment rather to aim - as in many other high mountain ski resorts - towards a more environmental management of the basic urban functions than a real questioning of a tourist model based upon the triptych development of the ski slopes, securizing of the snow resource and touristic real estate programs.…”
    Get full text
    Article
  18. 6258

    Musulmans et non musulmans dans la Salonique ottomane (xviiie siècle).L’affrontement sur les espaces et les lignes de démarcation by Eyal Ginio

    Published 2005-09-01
    “…By using the evidence of the sicilt (the records of the şeriat court), I demonstrate the various legal strategies that were adopted by non-Muslims to secure their own interests in the public space: challenging existing boundaries or resisting any intrusion that might endanger their own position. …”
    Get full text
    Article
  19. 6259

    Using One’s Right of Inspection: Australia, the United Nations, Human Rights and Aboriginal People by Ludivine Royer

    Published 2014-11-01
    “…In the context of Australia’s bid for a seat on the UN Security Council, it seemed appropriate and timely to assess the way the country complies with international standards of human rights. …”
    Get full text
    Article
  20. 6260

    Differential fault attack on FeW by Min XIE, Jiaqi LI, Feng TIAN

    Published 2020-04-01
    “…In order to evaluate the security of the lightweight block cipher FeW,a differential fault attack method was proposed and discussed using a single byte random fault model.In this method,a single byte random fault was introduced on the right side of the last round of FeW to recover the key based on the statistical characteristics of S-box difference distribution,and the difference information was obtained using the characteristics of the linear diffusion function.The experiment results show that the complete key recovery can be achieved with an average of 47.73 and 79.55 fault injections for FeW-64-80 and FeW-64-128 respectively.If 2<sup>10</sup>exhaustive calculations are added to the key recovery process,the number of average fault injections required can be reduced to 24.90 and 41.50.This attack is effective on FeW.…”
    Get full text
    Article