Showing 6,481 - 6,500 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 6481

    Design and implementation of a novel general format multimedia digital rights management system by Qin-long HUANG, Zhao-feng MA, Jia MO, Xin-xin NIU, Yi-xian YANG

    Published 2013-10-01
    “…Aiming at the copyright protection of multimedia content,a novel general format multimedia digital rights management model was designed which includes encryption and packaging of content,ke nagement,security engine,license management and distribution,DRM client,DRM management and other functional units.This model uses un-structured encryption method which overcomes the limit ions of encryption method based on the content format to sup-port the general format multimedia.In addition,this model uses the license acquisition number as the only certificate to download license to solve the problem of license reissue and transfer,and supports fine-grained control model.Combined with this model,a multimedia digital rights management system was developed based on fixed and mobile converged services which is used in the field of digital consumer.experimental results and practical application show that this scheme with good practice in the copyright protection multimedia content does not affect the multimedia quality,and have high efficiency and safety.…”
    Get full text
    Article
  2. 6482

    Research and application exploration of threat intelligence system of telecom operators by Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN

    Published 2022-12-01
    “…With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.…”
    Get full text
    Article
  3. 6483
  4. 6484

    RESEARCH ON THE CALCULATION MODEL OF DENT WITHOUT CONCAVE ANGLE ON OIL AND GAS PIPELINE by LI ChengBing, DANG SiHong

    Published 2017-01-01
    “…For further research on the security of the pipelines,it is necessary to establish a calculation model serving actual conditions. …”
    Get full text
    Article
  5. 6485

    A differentially-private mechanism for multi-level data publishing by Wen-jing ZHANG, Hui LI

    Published 2015-12-01
    “…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
    Get full text
    Article
  6. 6486

    The Design Blueprint for a Large-Scale Telehealth Platform by Rattakorn Poonsuph

    Published 2022-01-01
    “…This design blueprint covers the digital healthcare ecosystem, new patient journey design for digital health services, telehealth functionality design, and an outline of the platform infrastructure and security design. Ultimately, telehealth platforms establish a completed digital healthcare service and new ecosystem that provides better care for every patient worldwide.…”
    Get full text
    Article
  7. 6487

    Postfazione. La fragilità della sovranità tra colonialismi ed epistemologie dei sud del mondo by Flavia Cuturi

    Published 2024-06-01
    “…The contribution aims to highlight dynamics and processes that are common to the articles in the monographic dossier, dedicated to food sovereignty, security and sustainability in different island contexts. …”
    Get full text
    Article
  8. 6488

    Time Division Switching Scheme and Performance Analysis of Low Orbit Quantum Satellite Communication by Guang Yang, Min Nie, Fan Jiang

    Published 2014-04-01
    “…Low orbit quantum satellite system is used to realize a worldwide secure communication. To solve the problem of multiple quantum users' access and information transmission in satellite coverage, a multi-beam time division quantum switching scheme was proposed, and a detailed description of the structure and working process of the time division quantum switch were given. …”
    Get full text
    Article
  9. 6489

    Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network by Weiheng Jiang, Wenjiang Feng

    Published 2015-01-01
    “…The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. …”
    Get full text
    Article
  10. 6490

    The impact of mandatory military service on labor outcomes. Evidence from Spain by Julio Cáceres Delpiano

    Published 2025-12-01
    “…For men already in the workforce a year prior, IV estimates reveal significant impacts, particularly for those without mandatory education, notably reducing the likelihood of having a Social Security record. Among those entering the labor market post-lottery, Reduced Form estimates suggest an 8.5 percentage point reduction in employment and a 1.3-year decline in labor market experience. …”
    Get full text
    Article
  11. 6491

    THE RELATIONSHIP BETWEEN ECONOMIC GROWTH AND MIGRATION IN TERMS OF 14 EUROPEAN UNION COUNTRIES AND TURKEY by Hasan Yavuz, Agnieszka Parlinska

    Published 2022-12-01
    “…The literature on migration is often studied in the economic, political and security fields. This study focuses on the relationship of migration with economic growth. …”
    Get full text
    Article
  12. 6492

    Market Mechanisms as a Social Deadlock for Russian Education by A. M. Osipov

    Published 2019-06-01
    “…Basing on foreign and domestic sources, the author proves that the marketization of education is generated by neo-liberal attitude of the financial and economic elites seeking to reduce state budget expenditures in the social sphere and keep up the disintegration of society and to secure their future domination. The state, the bureaucratic apparatus of the education system, educators’ and researchers’ communities do not take up the problem of education marketization and its consequences. …”
    Get full text
    Article
  13. 6493
  14. 6494

    The Politics of Objects: Eliza Cook’s Biographies of Things by Fabienne Moine

    Published 2016-05-01
    “…Finally, Cook’s biographies of things challenge the economic models that value profit, property and individualism as she presents new forms of exchange and enhances the possibility of a counter-model of consumption that secures fairer social and economic patterns.…”
    Get full text
    Article
  15. 6495

    PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN by Gilang Surya Pratama, Agus Munandar

    Published 2025-01-01
    “…Major implementation challenges include data quality, infrastructure limitations, and data security. Development opportunities are identified in blockchain integration, hybrid models, and preprocessing automation. …”
    Get full text
    Article
  16. 6496
  17. 6497
  18. 6498
  19. 6499

    Design of nodes importance assessment method for complex network based on neighborhood information by Xing LI, Jie ZHAN, Baoquan REN, Siqi ZHU

    Published 2024-03-01
    “…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
    Get full text
    Article
  20. 6500

    The Division of Marital Joint Property: Legal Framework and Gender Implications in North Macedonia by Metaj-Stojanova Albana

    Published 2024-12-01
    “…Women, especially those who have forgone paid employment to fulfill domestic roles, face significant challenges in securing an equal share of marital property.…”
    Get full text
    Article