Showing 6,281 - 6,300 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 6281

    Pouvoir et opposition en Algérie : vers une transition prolongée ? by Louisa Dris-Aït Hamadouche, Yahia H. Zoubir

    Published 2009-11-01
    “…Radical Islamism and the eruption of terrorist violence have offered the governing elite an opportunity to renege on the progress that had been made. In the name of security, the opposition’s room for maneuver has been largely reduced. …”
    Get full text
    Article
  2. 6282

    Analysis of Digital Image Watermarking Techniques through Hybrid Methods by Mahbuba Begum, Mohammad Shorif Uddin

    Published 2020-01-01
    “…For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by hybridizing different domains, such as spatial and transform domains. …”
    Get full text
    Article
  3. 6283

    Boredom, Cohesion, and Transformation in Nick Drnaso’s Beverly by David Callahan

    Published 2022-12-01
    “…In turn, the possibility that the repetitive interactions of everyday life in fact provide known and secure structures, compensating for their flat sameness, is revealed to be hollow by most characters’ frustrations, melancholy, and lack of joyful connection with others. …”
    Get full text
    Article
  4. 6284

    Analysis and suggestions on the development of IoT technology by Wenke YU, Yuan CHENG, Fang LI, Qi ZHAO

    Published 2020-12-01
    “…The Internet of things (IoT) has been developing for a decade in China,which has rapidly evolved from the early sensor network technology,radio frequency identification (RFID) technology to the intelligent networking technology based on 5G.The Internet of everything is coming to our life.The application of IoT has also been gradually and comprehensively applied in from the area of financial IC card to the industry,government affairs,transportation,health care,education,and etc.The development of the IoT hot technologies represented by 5G and low-power wide-area network (LPWAN),and the deep integration of blockchain,edge computing and other technologies with the IoT,comprehensively promote the deep application of the IoT in the industry,which brings great development opportunities to all the industry.It was focused on the analysis of the status of 5G,IoT identification,edge computing,LPWAN,security technology,and etc.The development tendency of the IoT was also forecasted,and the corresponding policy suggestion to promote the development of IoT was put forward.…”
    Get full text
    Article
  5. 6285

    Sinn Féin’s Tortuous Road to Power by Agnès Maillot

    Published 2014-12-01
    “…Sinn Féin, once an outcast of Northern Ireland political life, now sits in the power-sharing Executive alongside the Democratic Unionist Party. In order to secure such a position, it had to transform itself, abandoning deep-seated principles such as abstentionism and severe the link between political and military actions. …”
    Get full text
    Article
  6. 6286

    A Lissajous Curve–Based Method for Busbar Protection by M. Sarlak

    Published 2024-01-01
    “…Moreover, the proposed scheme can detect evolving external to internal faults with CT saturation, internal faults during power transformer energization, and internal faults in the presence of white noise. Additionally, it is secure against external faults with current transformer (CT) saturation.…”
    Get full text
    Article
  7. 6287

    Multidimensional Analysis of Linguistic Variation in the Russian Speeches Before War in Ukraine by Bahaa-eddin Hassan

    Published 2024-12-01
    “…This study sets out to explore the genre analysis and text type of Russian speeches at the Munich Security Conferences MSC from 2007 to 2018 using multidimensional analysis. …”
    Get full text
    Article
  8. 6288

    SLA Audit Mechanism of Virtual Machine Memory on Cloud by Panpan Li, Hongli Zhang, Huimin Deng, Zhigang Zhou

    Published 2013-06-01
    “…Then, digital signatures-based Diffie-Hellman key exchange protocol was also proposed to support strategy security exchange and trust alarm. The experimental results indicate that the proposed module can effectively audit VM memory SLA,and also support strong expansibility of cloud tenant customize strategy with low overhead.…”
    Get full text
    Article
  9. 6289

    EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH by Dragan Gabrić

    Published 2015-11-01
    “… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
    Get full text
    Article
  10. 6290

    L’Empire en question : origines et développement d’un débat américain contemporain by Céline Letemplé

    Published 2007-09-01
    “…Even though members of the Bush administration have declared that the United States is not an Empire, the 2002 National Security Strategy has neo-imperialist overtones that have triggered anti-imperialist reactions across the American political spectrum. …”
    Get full text
    Article
  11. 6291

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. …”
    Get full text
    Article
  12. 6292

    Design on the full-dimensional reconfiguration polymorphic network switching chip architecture by Yu LI, Zhaozhao LI, Ping LYU, Qinrang LIU

    Published 2023-06-01
    “…At present, IP network has the problems of rigid structure, poor scalability and poor security.To solve these problems, the concept of polymorphic network has been proposed by researchers and gradually become a research hotspot.The programmable network switching chip is the basis of polymorphic network implementation.Therefore, a full-dimensional reconfigurable polymorphic network switching chip architecture was proposed.Based on eFPGA in the chip, the port-level and bit-level fine-grained reconfigurable polymorphic network was realized.Based on self-designed process element (PE), the coarse-grained reconfigurable network switching engine was realized.Thereby the full-dimensional reconfigurable polymorphic network switching chip was realized and laid the foundation for the data layer of polymorphic network.To improve the network switching performance, an improved bit vector algorithm was proposed, which could realize fast flow table lookup with a smaller resource consumption.The proposed algorithm has showed its practicability in the research.…”
    Get full text
    Article
  13. 6293

    Les chemins de fer atmosphériques. Première partie by Paul Smith

    Published 2009-05-01
    “…During the 1840s, as the French national railway network, centred on Paris, gradually took form, steam locomotion, for reasons of economy and security, still inspired much hesitation and criticism. …”
    Get full text
    Article
  14. 6294
  15. 6295

    IRCICA Library UHF RFID Solutions by Abdullah Topaloğlu

    Published 2011-03-01
    “…IRCICA library has formed the UHF RFID system to find various materials in a reliable and expedient way, to do its counting in a consistent and rapid manner, as well as labeling and controlling various items, controlling and documenting the check-ins and check-outs from the library and setting up a secure and effective circulation of materials within the library. …”
    Get full text
    Article
  16. 6296

    Le droit du travail et les migrants ruraux : instituer un nouveau salariat en Chine by Muriel Périsse

    Published 2014-06-01
    “…Labour law appears as a solution whose goal is to ensure the viability of this new working class with socially inclusive policies and then institutionalises its economic security. Furthermore, in a context characterised by the socialist legacy and the lack of democracy, we have to question the relations with the law and the State. …”
    Get full text
    Article
  17. 6297

    Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation by Jianwei LIU, Dawei LI, Ying GAO, Yu SUN, Hua GUO

    Published 2021-08-01
    “…In the long-term practice of cybersecurity talent cultivation, the teaching team of School of Cyber Science and Technology of Beihang University, aiming at the knowledge goal, ability goal and quality goal of talent cultivation of cybersecurity discipline and related majors, puts forward the innovative teaching idea of “fine teaching, strong practice, excellent assessment, abundant resources” according to the knowledge characteristics, thinking characteristics and psychological characteristics of students.The teaching team integrates political teaching,research teaching, inspiration teaching, seminar teaching and example teaching methods, puts forward the PRIDE teaching mode,which has been widely applied in the teaching of core professional courses such as “Information Network Security” and “Modern Cryptography”, and has got remarkable teaching achievement.Through the practice of PRIDE teaching mode, a high-level teaching team with high political quality and strong teaching ability has been also built.…”
    Get full text
    Article
  18. 6298

    Disaster Tips for People with Disabilities by Carolyn S. Wilken

    Published 2005-08-01
    “…Departments of Homeland Security and the Federal Emergency Management Agency for people with disabilities. …”
    Get full text
    Article
  19. 6299

    Trajectories of Vulnerability of Rural Territories in the Ecuadorian Andes: a Comparative Analysis by Nasser Rebaï, Julio A. Alvarado Vélez

    Published 2019-01-01
    “…In addition, we observed that in recent years, family farmers have developed agricultural practices that have adverse effects on the environment while, at the same time, their food security was not ensured. Finally, the work done over the past three years provides an opportunity to take stock of the negative effects of the “modernizing” project of the primary sector in Ecuador and, through the comparison of several local situations, to characterize the extension of the trajectory of vulnerability of Andean rural territories.…”
    Get full text
    Article
  20. 6300