Showing 6,461 - 6,480 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 6461

    Climate Change and Human Health: Time to Recognize the New Threat by Y. J. Anupama

    Published 2025-01-01
    “…There are also many socioeconomic consequences due to CC and extreme weather events which have an impact on food security and mental health. Efforts to combat the health impact of CC involve the measures to control CC primarily. …”
    Get full text
    Article
  2. 6462

    Povoar e enquadrar by Maria Filomena Andrade, João Luís Fontes

    Published 2022-07-01
    “…The Christian conquest of Lisbon, in 1147, initiated a new era in the city which immediately saw diocesan life restored and parish life quickly revived. Efforts to secure the settlement and ecclesiastical accommodation of the urban population went hand-in-hand with the gradual establishment in the city of various religious orders, some drawing upon previous eremitic experiences, others with a marked pastoral bias combining liturgy, preaching, and charitable acts. …”
    Get full text
    Article
  3. 6463

    PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA by BABALOLA SUNDAY EMMANUEL

    Published 2024-06-01
    “…Recommendations proffered include the need for strategic deployment of drones in all security formation in the country, adequate budgetary provision .training of manpower, comprehensive monitoring and adequate assessment and action on information and intelligence received from drones. …”
    Get full text
    Article
  4. 6464

    Digital Technology Adoption in the Agriculture Sector: Challenges and Complexities in Africa by David Mhlanga, Emmanuel Ndhlovu

    Published 2023-01-01
    “…These include resource scarcity, limited expertise and training, a lack of digital infrastructure, data privacy and security concerns, and resistance by farmers. In spite of this, the agricultural sector in Africa has the potential to adopt technology and not only boost farm productivity but also engender sustainable and environmentally friendly farming. …”
    Get full text
    Article
  5. 6465

    Evaluation of Ecological Water Conservancy Benefits for Lakeside Cities Based on Principal Component Analysis by GU Xiaohan, ZHU Shijie, MAO Jinqiao

    Published 2021-01-01
    “…Lakeside cities are important intersection areas of natural land,lakes and urban ecology.Poyang Lake plays an important role in regulating the water level of the Yangtze River,conserving water resources,improving local climate and maintaining water security.In order to objectively and comprehensively measure the ecological water conservancy benefits of the lakeside cities around the Poyang Lake,taking the Gongqingcheng City as a typical case and the statistical analysis as a basis,this paper puts forward the evaluation index system qualitatively and quantitatively from three aspects of economic benefits,social benefits and ecological benefits,and constructs the evaluation model by the principal component analysis method.The results show that the score of ecological water conservancy benefits of the Gongqingcheng City in 2019 is 1.253 8,the ecological quality grade is Class III,the regional economy is well developed,and the ecological and social benefits are remarkable,which are consistent with the current ecological status of the Gongqingcheng City.Therefore,the model is featured with good applicability and rationality.…”
    Get full text
    Article
  6. 6466

    Blockchain empowered 6G by Yueyue DAI, Ke ZHANG, Yan ZHANG

    Published 2020-03-01
    “…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
    Get full text
    Article
  7. 6467

    Fine-grained attribute update and outsourcing computing access control scheme in fog computing by Ruizhong DU, Peiwen YAN, Yan LIU

    Published 2021-03-01
    “…To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.…”
    Get full text
    Article
  8. 6468

    Research progress on moving target defense for SDN by Jinglei TAN, Hongqi ZHANG, Cheng LEI, Xiaohu LIU, Shuo WANG

    Published 2018-07-01
    “…Software-defined network is based on flexible and open standards,which manages network functions and services by the control layer.And it has the unique advantages of control-separation and centralized control.The moving target defense technology is dedicated to build an ever-changing environment to increase the uncertainty of the network system,which requires a flexible and customizable,centralized and controllable network architecture to implement it.Therefore,the combination of moving target defense and software-defined network have become a more valuable research hotspot.Firstly,the basic concepts of software-defined network and moving target defense were introduced,the security threats of software-defined network was summarized,and the realization model of moving target defense for SDN network was described.Secondly,the technical methods for moving target defense were summarized respectively form the data layer,control layer and application layer of the SDN.Finally,summing up the challenges of existing SDN dynamic defense,and looking forward to the development direction of moving target defense technologies for the SDN.…”
    Get full text
    Article
  9. 6469

    LOOK Container Systems for the African Market by Katarzyna BURNAT

    Published 2020-12-01
    “…The light observation-protective container (LOOK) is intended for security and protection of soldiers/officers performing observation missions, defence and control tasks at checkpoints, military bases or other important strategic locations. …”
    Get full text
    Article
  10. 6470

    Reversible digital watermarking-based protocol for data integrity in wireless sensor network by Wenxian JIANG, Zhenxing ZHANG, Jingjing WU

    Published 2018-03-01
    “…For the contradiction between high energy consumption of WSN privacy protection algorithm and constrained resources of sensor network,a recoverable data fusion protocol that ensures data integrity and confidentiality based on reversible digital watermarking and homomorphic encryption technology was proposed.On the one hand,the data from the sensor was embedded by the difference expansion method by using the reversible digital watermarking technique,and original data could be recovered by using a reversible watermark to ensure the integrity check of the fusion data when the fusion data were destroyed.On the other hand,elliptic curve homomorphic encryption encrypted data to prevent sensor data from being perceived during data transmission.Security results show that the proposed protocol performs well against cluster head node compromise as well as tampering from an attack.Performance analysis shows that the protocol has significant advantages over other algorithms in terms of computation,communication overhead and propagation delay.The experimental results show that the protocol has a low resource overhead and improves network performance.…”
    Get full text
    Article
  11. 6471

    Artificial intelligence-based video monitoring of movement disorders in the elderly: a review on current and future landscapes by Kye Won Park, Maryam S Mirian, Martin J McKeown

    Published 2024-03-01
    “…This progression must incorporate data security, ethical considerations and adherence to regulatory standards.…”
    Get full text
    Article
  12. 6472

    Role of electric transport in urban transportation system by T. N. Sakulyeva, V. V. Sotnikova

    Published 2022-07-01
    “…Urban transport should solve the following tasks: equal access to the population to vehicles, the possibility of planning the time of traveling inside the city, ensuring environmental safety from the use of vehicles, creating the conditions for the availability of transport services at their cost, security and comfort, as well as ensure transport services for the business subjects at minimal economic costs. …”
    Get full text
    Article
  13. 6473

    Research and prospect of 5G edge computing sharing by Lingbin MENG, Juan LI, Nan XUE, Yong ZOU

    Published 2020-06-01
    “…The three application scenarios of 5G make forward higher requirements for network delay,bandwidth,connection and security,which drive 5G to sink the core capabilities of network,computing,storage and application to the edge of the network.The 5G base station which is closer to the terminal/user and has complete resources such as base station power,operation and maintenance will be the best choice for 5G edge computing deployment.Based on the multi-point 5G base station site resource and the architecture of edge computing deployment,the feasibility of multi-operator 5G edge computing shared deployment was studied,three feasible co-building and sharing schemes,such as base station infrastructure sharing,IaaS facility sharing and PaaS platform sharing were proposed.By coordinating the development needs of 5G edge computing and realizing the co-construction and sharing of edge computing,the construction cost and operation cost of edge computing can be greatly reduced,and the rapid scale development of edge computing can be realized,to build an intensive and efficient,economic and applicable,intelligent green,safe and reliable edge computing system.…”
    Get full text
    Article
  14. 6474

    Sampling method for IDS in high bandwidth network by NING Zhuo1, GONG Jian1, GU Wen-jie1

    Published 2009-01-01
    “…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
    Get full text
    Article
  15. 6475

    A strategy of development based on innovation by Pierre-Olaf Schut

    Published 2013-01-01
    “…Today, the company is an eminent international PMI (small and medium-sized industry) in the industry of sports items, carrying a range of products such as frontal lamps, climbing harnesses and mechanical machines securing rope ascents. It used to be a simple family business offering traditionally-made articles for speleology. …”
    Get full text
    Article
  16. 6476

    BIBLICAL PERSPECTIVE OF THE RUSSIAN INVASION OF UKRAINE IN 2022 by Lawrence Olabode Ekundayo

    Published 2022-12-01
    “…As a result of these findings, the paper recommended that there must be an immediate demilitarization of Ukraine, NATO's equipment installations on the borders of Russia should be relocated; there must be a restoration of the natural status of Ukraine for the sake of peace, the continuous eastward expansion of NATO must be stopped; and Russian legitimate security interest must be unconditionally taken into consideration by the Western countries to avoid third world war …”
    Get full text
    Article
  17. 6477

    Cloud-Based Service for Fingerprint Image Matching by Ethar Abdul Wahhab Hachim

    Published 2024-09-01
    “… Fingerprint matching is one of the most important services that related to the issue of identifying individuals, as it can be used to verify the validity of contracts, documents or in other security fields such as criminal investigations. Fingerprints are also one of the most common and accurate forms, as they are easy to obtain, it also has a unique features and cannot be identical to any individuals. …”
    Get full text
    Article
  18. 6478

    Construction and typical cases analysis of edge cloud platform for telecom operators by Huazhang LV, Dan CHEN, Youxiang WANG

    Published 2019-03-01
    “…Edge cloud technology is the product of ICT integration and also the key technology to support operators in 5G network transformation.Relying on the advantages of abundant communication cloud resources,operators can build edge cloud resource pools on the side of network edges for end users to ensure low delay and high bandwidth business requirements,so as to meet the future business development of high-definition video,VR/AR,industrial internet and internet of vehicles.The overall thinking of operators to build edge cloud platform were focused on,including hardware selection,lightweight virtualization layer,PaaS platform construction and business management scheduling strategy.In the end,several types of services enabled by edge cloud of operators were analyzed and explained,including security monitoring scenarios,CDN sinking,slice customization and service acceleration.In the future,operators will provide edge cloud to end solutions,establish a new industry ecology for 5G,and promote the development of the entire edge cloud industry chain.…”
    Get full text
    Article
  19. 6479

    Efficient keyword spotting system for information retrieval by LUO Jun, OU Zhi-jian

    Published 2006-01-01
    “…A new two-stage keyword spotting system was proposed based on syllable graph for audio information retrieval task,which could efficiently spot the interesting words in mass speech data,thus serve for the national security.It comprised two stages – preprocessing and searching.In the preprocessing stage,the audio data was recognized into syllable graph which included high accuracy syllable candidates,and unsupervised MLLR(maximum likelihood linear regression) adaptation was carried out iteratively to further improve the accuracy of the syllable graph.In the searching stage,to answer the frequent queries from users,searching for matched keywords was only scanned in the graph for likely syllable strings.A forward-backward algorithm based on syllable N-grammar was used to calculate confidence measures for further filtering of the searching result.Experimental results show the system achieved good performances in both recall rate and accuracy rate,and in the searching stage only 0.01 times of real time is needed,which can meet the demand for fast retrieval.…”
    Get full text
    Article
  20. 6480