Showing 6,441 - 6,460 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 6441

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…Both methods look different; however, they have similar security goals and they both feature distribution transforming encoders based on statistical schemes. …”
    Get full text
    Article
  2. 6442

    THE PROBLEM OF COMPLIANCE OF ARTIFICIAL INTELLIGENCE WITH SUBSTANTIAL VALUES OF HUMAN by Evgeniya B. Belikova

    Published 2024-06-01
    “…Only one substantial value (security) experiences real threats, but its significance for a person only increases as a result. …”
    Get full text
    Article
  3. 6443

    L’exil chilien en France du coup d’état à l’acceptation de l’exil : entre violences et migrations by Nicolas Prognon

    Published 2011-07-01
    “…The violence of the Pronunciamento and the implementation of the tenets of the national security doctrine, supplemented by an ad hoc legislation, caused an enormous political, then economic migration, quite extraordinary for a Latin American country. …”
    Get full text
    Article
  4. 6444

    Transformer Inrush Current and Internal Fault Discrimination Using Multitypes of Convolutional Neural Network Techniques by Abedalgany Abedallah Athamneh, Ali Mohammad Alqudah

    Published 2024-01-01
    “…To maintain the security of transformer differential protection, it is essential to restrain its response to oversetting differential current caused by the inrush current or other switching conditions. …”
    Get full text
    Article
  5. 6445

    Improving the Complexity of the Lorenz Dynamics by María Pilar Mareca, Borja Bordel

    Published 2017-01-01
    “…The new system is especially designed to improve the complexity of Lorenz dynamics, which, despite being a paradigm to understand the chaotic dissipative flows, is a very simple example and shows great vulnerability when used in secure communications. Here, we demonstrate the vulnerability of the Lorenz system in a general way. …”
    Get full text
    Article
  6. 6446

    Pomodori e pesticidi. (In)giustizia alimentare, sanitaria e ambientale nelle Regioni ultraperiferiche: il caso di Mayotte by Paola Schierano

    Published 2024-06-01
    “…Through this paper we intend to offer a contribution to the debate on food and environmental security and sustainability in the European Outermost regions, so as to illustrate the not-so-apparent linkages between departmentalisation, socio-economic inequalities and food and environmental insecurity. …”
    Get full text
    Article
  7. 6447
  8. 6448

    A Particle Swarm Optimization Algorithm for Deployment of Sensor Nodes in WSN Network by Jie Liang, Lu Wang, Qingchang Ji

    Published 2022-01-01
    “…In order to solve the problems of security hidden dangers in the process of node location due to the characteristics of limited resources, open deployment, and being unattended in wireless sensor networks, this paper proposes a mainstream location algorithm combined with the current WSN node. …”
    Get full text
    Article
  9. 6449

    Class Precarity and Solidarity in Education by Abdul Aziz Hafiz

    Published 2018-12-01
    “…These infrastructures provide important underpinnings of a universal basic security to be delivered through a social and solidarity economy. …”
    Get full text
    Article
  10. 6450

    Elliptic curve ElGamal encryption based location privacy-preserving scheme by Huibin LAI, Li XU, Yali ZENG, Rui ZHU

    Published 2020-06-01
    “…An elliptic curve ElGamal encryption based location privacy-preserving scheme was proposed to address the location privacy problem of secondary users in collaborative spectrum sensing.Firstly,secondary users encrypted the original sensing reports using the ElGamal public key techniques on the elliptic curve and sent them to the trusted property authority.Secondly,the trusted property authority partially decrypted and randomized sensing reports and then sent the randomized sensing reports to the fusion center.Thirdly,the fusion center finally decrypted and got the original sensing reports.Finally,security of the scheme was analyzed.According to the scheme,the encryption method of sensing reports was based on public key cryptography on elliptic curve.And the trusted property authority randomized encrypted sensing reports.Thus the location privacy of secondary users can be protected.Meanwhile,this scheme effectively reduces communication and storage cost,compared with other schemes.In addition,this scheme also has fault tolerant and dynamic mechanism,which increases the practicability and feasibility.…”
    Get full text
    Article
  11. 6451

    The Floor is not the Ground by George Papam Papamattheakis

    Published 2018-11-01
    “…Despite the categorical difference between transportation and logistics, narratives of quality, security and standards accompanied by specific spatial patterns, have infiltrated our everyday mobility infrastructures. …”
    Get full text
    Article
  12. 6452

    Developments in Border and Migration Management in the South East European Region by POLGÁR István

    Published 2024-12-01
    “…This extra pressure led to difficulties in terms of effectively manage the borders and address arising border security issues. The study aims to realize an inventory of the measures, proposals and activities which had an impact on transnational institution building which focuses on migration and border management. …”
    Get full text
    Article
  13. 6453

    Public Value of Using Light Rail Transit Transportation at Palembang by Rattu Nadra Syakila, Sri Suwitri, Tri Yuniningsih

    Published 2024-11-01
    “…Additionally, the LRT meets public expectations by offering a suitable route network, planning fleet capacity effectively, establishing consistent departure times, and ensuring high security across its operations. In conclusion, the Palembang LRT system enhances travel comfort with regular scheduling and adequate facilities, highlighting its potential as a key component of Palembang's sustainable urban transportation infrastructure with continued development.…”
    Get full text
    Article
  14. 6454

    Face Recognition using Deep Learning and TensorFlow framework by Makrem Beldi

    Published 2023-12-01
    “… Detecting human faces and recognizing faces and facial expressions have always been an area of interest for different applications such as games, utilities and even security. With the advancement of machine learning, the techniques of detection and recognition have become more accurate and precise than ever before. …”
    Get full text
    Article
  15. 6455
  16. 6456

    Intentional Islanding of Active Distribution Networks by GenSets: An Analysis of Technical Constraints and Opportunities by Edoardo Daccò, Davide Falabretti, Andrea Vicario

    Published 2023-01-01
    “…The willingness to improve the security and reliability of power supply to end-users, often pushed by prescriptions of national regulatory authorities, is bringing considerable challenges for distribution system operators. …”
    Get full text
    Article
  17. 6457

    Analysis of Laboratory Videos of Science Teacher Candidates with Many-Facet Rasch Measurement Model by Ahmet Volkan Yuzuak, Sinan Erten, Yilmaz Kara

    Published 2019-07-01
    “…The simplest articles which science teacher candidates were subjected are “introducing yourself”, “using proper costume”, “appropriate time” and the articles for which the science teacher candidates are constrained mostly “sound-supporting effect”, “writing effect”, “warning for security precautions”.Jury numbered 3 or coded as J3 is “the most lenient” and scorer numbered 2 is “the severest” when juries are sequenced from the most lenient. …”
    Get full text
    Article
  18. 6458

    Analisis faktor produksi terhadap kepuasan petani dalam mendorong ketahanan pangan di Sulawesi Selatan by Andi Arifuddin Iskandar

    Published 2024-07-01
    “…The aim of this study is to determine whether farmers' satisfaction with the use of production factors contributes to the success of the Food Security System (SKP) and to identify which production factors most significantly influence farmers' satisfaction in supporting SKP. …”
    Get full text
    Article
  19. 6459

    Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm by Qingyang Zhang

    Published 2022-01-01
    “…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
    Get full text
    Article
  20. 6460

    La propagande arabe anglaise vers le Maghreb pendant la Seconde Guerre mondiale (1939-1943) by Fayçal Cherif

    Published 2006-09-01
    “…During the North Africa campaign (Torch), the Royal Air Force dropped leaflets in Arabic, trying to explain their war aims and to secure the support of the population. This article examines the developing of British Arabic propaganda and seeks to measure its degree of success or failure in the face of other subversive propaganda particularly from Germany and Italy and especially its impacts on the North African populations from 1939 till May 1943.…”
    Get full text
    Article