Showing 6,501 - 6,520 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 6501

    Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology by Yutang Liu, Qin Zhang

    Published 2022-01-01
    “…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
    Get full text
    Article
  2. 6502

    Design Research of ATV Axle Housing based on Blind Number Theory and FEA Method by Zhou Junchao, Tian Jianping, Guo Cuixia, Liao Yinghua, Zhang Shengkai, Zhu Junjun

    Published 2015-01-01
    “…In order to solve the issues of all- terrain vehicle( ATV) axle housing design process appears poor design efficiency and timeliness security,a reliability calculation method of certain type of all- terrain vehicle integral type axle housing based on the finite element method combined with the blind number theory is presented,the all- terrain vehicle axle housing design methods in full of uneven road is obtained by taking the integral type axle housing under the condition of the loaded with uneven road,wheels withstand the maximum tangential force,wheels withstand the maximum lateral force,and the axle housing conditions of stress and deformation as restriction. …”
    Get full text
    Article
  3. 6503

    THE ETHICAL AND LEGAL ASPECTS OF HEALTH POLICY ON ELECTRONIC MEDICAL RECORDS IN INDONESIA by Ta Larasati, Ahmad Irzal Fardiansyah, Dwi Saketi, Azelia Nusa Dewiarti

    Published 2024-10-01
    “…The use of electronic medical records raises concerns about potential data leaks, necessitating the establishment of security measures and identification of responsible parties in case of breaches. …”
    Get full text
    Article
  4. 6504

    The Application and Analysis of Emotion Recognition Based on Modern Technology by Bi Lanxin

    Published 2025-01-01
    “…Despite the growing application of emotion recognition technology across various fields, including healthcare, traffic safety, and security, there remain significant challenges related to accuracy, robustness, and privacy. …”
    Get full text
    Article
  5. 6505

    De Pictures from a Life à Letters from a Life : exaltation de la vie de Benjamin Britten by Gilles Couderc

    Published 2003-01-01
    “…This study examines the image that Lotte Jacobi and Cecil Beaton try to give of Britten and Pears, the meanings that Mitchell seems to have invested the portraits with, how he uses them to recall Britten’s life and times, and finally how the portraits work toward an identification of Britten and Schubert, thus enabling Mitchell to secure Britten’s place among the greatest.…”
    Get full text
    Article
  6. 6506

    A Method of Intrusion Detection Based on WOA-XGBoost Algorithm by Yan Song, Haowei Li, Panfeng Xu, Dan Liu

    Published 2022-01-01
    “…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
    Get full text
    Article
  7. 6507

    Armenia Towards a "New Economy": Defense Industry by A. B. Harutyunyan

    Published 2021-04-01
    “…As a small country, Armenia needs an economy-army coalesced “intelligent” system that will respond adequately to any, even the slightest threat to the country's security. This approach requires the development of indigenous defense industry. …”
    Get full text
    Article
  8. 6508

    MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE by Stella Ughulu Eghoikhunu, Ihaza Kayode

    Published 2023-08-01
    “…The study recommends that there should be a conscious effort on the part of leaders of the nation to improve the socio-economic development of the country and more funding and training of the agencies/forces responsible for internal security. …”
    Get full text
    Article
  9. 6509
  10. 6510

    EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH by Dragan Gabrić

    Published 2015-11-01
    “… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
    Get full text
    Article
  11. 6511
  12. 6512

    Key technology of power big data for global real-time analysis by Guoliang ZHOU, Linjie LV, Guilan WANG

    Published 2016-04-01
    “…For power big data collected during smart grid construction process,based on the demand of power system global and real-time data analysis,ideas of solving power system security and reliability,real-time status monitoring,energy global dynamic balance scheduling and other key issues were explored. …”
    Get full text
    Article
  13. 6513

    The Dynamics of Iran-China “New” Strategic Cooperation by Emrah Yıldırımçakar

    Published 2023-06-01
    “…Since Iran and China have common interests in political, economic, security, and military cooperation, it is predicted that the strategic and long-standing cooperation between Iran and China will be one of the most significant factors to change the balance of the Middle East and Central Asia both politically and economically. …”
    Get full text
    Article
  14. 6514

    Marketing strategies of economic entities (on the example of persons carrying out activities in the field of customs business) by S. V. Kurikhin

    Published 2022-11-01
    “…In addition, the results can be useful in the educational process, when teaching such disciplines as Marketing and Economic security of an enterprise participating in foreign economic activity. …”
    Get full text
    Article
  15. 6515

    Novel identity-based fully homomorphic encryption scheme from lattice by Yong-li TANG, Ming-xing HU, Kun LIU, Qing YE, Xi-xi YAN

    Published 2017-05-01
    “…The previous identity-based homomorphic encryption schemes from lattice was analyzed.That the high complexity in previous schemes was mainly caused by trapdoor generation and preimage sampling was pointed out.A new solution was proposed.A novel identity-based encryption scheme from lattice by combining new trapdoor function and dual-LWE algorithm organically was constructed,and it was transformed to an identity-based fully homomorphic encryption scheme from lattice by employing the idea of eigenvector.Comparative analysis shows that the scheme’s complexity of trapdoor generation has a significant reduction,the complexity of preimage sampling has a nearly three-fold reduction,and the SIVP approximation factor has a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msqrt> <mi>m</mi> </msqrt> </mrow></math></inline-formula> times reduction.The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.…”
    Get full text
    Article
  16. 6516

    Legal characteristics of volunteers engaged in organizing and hosting sports events by M.N. Maleina

    Published 2017-04-01
    “…It has been suggested to amend the sports legislation due to a large number of participants in volunteer movements and persons in contact with them, as well as the need to maintain public safety and security of volunteers, interest of volunteers themselves in legal regulation of movement across the border of another state, guarantees of accommodation and workwear, taking into account their work as volunteers in the future, preserving the legal traditions in regulation of volunteer relations.…”
    Get full text
    Article
  17. 6517

    Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation by Shiguo WANG, Shujuan TIAN, Qingyong DENG

    Published 2023-11-01
    “…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
    Get full text
    Article
  18. 6518

    Justice climatique et démocratie environnementale - Les inégalités d’accès au droit des populations vulnérables aux risques littoraux – quelques éléments de comparaison by Marie-Laure Lambert, Aurélie Arnaud, Cécilia Claeys

    Published 2019-03-01
    “…A more thorough reflection will have to be carried out, in order to found climate change adaptation of the territories, on criteria of equity which make it possible to put firstly in security the most vulnerable people. …”
    Get full text
    Article
  19. 6519

    Business process mining based insider threat detection system by Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA

    Published 2016-10-01
    “…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
    Get full text
    Article
  20. 6520

    Collision analysis of the GMR-2 cipher used in the satellite phone by Ruilin LI, Jiao HU, Chaojing TANG

    Published 2018-02-01
    “…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
    Get full text
    Article