Showing 6,521 - 6,540 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 6521

    Revocable and traceable key-policy attribute-based encryption scheme by Fang QI, Yanmei LI, Zhe TANG

    Published 2018-11-01
    “…The existing key-policy attribute-based encryption (KP-ABE) scheme can not balance the problem of attribute revocation and user identity tracking.Hence,a KP-ABE scheme which supported revocable and traceable was proposed.The scheme could revoke the user attributes without updating the system public key and user private key with a less update cost.Meanwhile,it could trace the user identity based on decryption key which could effectively prevent anonymous user key leakage problem.The proposed scheme was based on linear secret sharing scheme (LSSS),which was more efficient than tree-based access structure.Based on the deterministic q-BDHE hypothesis,the proposed scheme gave security proof until standard mode.Finally,compared with the existing KP-ABE scheme,the scheme has a shorter public key length,lower computational overhead and realizes the traceability function of user identity based on the revocable attribute,which has obvious advantages.…”
    Get full text
    Article
  2. 6522

    Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD by Ali Alzahrani

    Published 2022-01-01
    “…In research, a system is being developed to handle veracious types of watermarked attacks, for obtaining extreme security and an adequate level of visibility and robustness. …”
    Get full text
    Article
  3. 6523
  4. 6524

    Research on person re-identification algorithm based on multi-task learning by MI Rongxin, YAO Wenwen, WU Binghao

    Published 2024-06-01
    “…It has become a pivotal technology in intelligent video surveillance systems, playing a crucial role in domains like smart security and smart cities. Traditional re-ID algorithms typically employ either representation learning or metric learning methods. …”
    Get full text
    Article
  5. 6525

    Éclairages foucaldiens sur l’incrimination du déisme et de la libre pensée dans la jeune République américaine by Auréliane Narvaez

    Published 2022-12-01
    “…Undermining deism thus hinged on security and sanitary discourses that associated religious infidelity with anarchy, criminality, and even insanity. …”
    Get full text
    Article
  6. 6526

    « Faire un tri dans le monde des applis » by Esteban Bopp, Johnny Douvinet, Damien Serre

    Published 2018-12-01
    “…Results obtained on 50 applications deployed in France show that most of them do no achieve the objectives of the alert, in the sense defined by civil security, due to a single-hazard approach, a unique sense of communication, and a low participation of the smartphone users. …”
    Get full text
    Article
  7. 6527

    Does tillage system affect agricultural production and farmers’ incomes? Evidence from 234 typical farms in 29 countries by Jiamei Wang, Hui Zhou, Xiangdong Hu

    Published 2025-01-01
    “…Investigating the impact of tillage system on agricultural production and farmer income, particularly in the face of global threats to food security and adverse environmental conditions, holds considerable importance for guiding policy formulation. …”
    Get full text
    Article
  8. 6528

    The state makes migration—and migration makes the state? by Lorenzo Ghione

    Published 2024-12-01
    “…Through a securitised and politicised migration management, the Tunisian regime has secured substantial financial support from Europe while portraying immigrants as domestic threats has legitimised its increasingly autocratic policies. …”
    Get full text
    Article
  9. 6529
  10. 6530

    Deep reinforcement learning-based resource reservation algorithm for emergency Internet-of-things slice by Guolin SUN, Ruijie OU, Guisong LIU

    Published 2020-09-01
    “…Based on the requirements of ultra-low latency services for emergency Internet-of-things (EIoT) applications,a multi-slice network architecture for ultra-low latency emergency IoT was designed,and a general methodology framework based on resource reservation,sharing and isolation for multiple slices was proposed.In the proposed framework,real-time and automatic inter-slice resource demand prediction and allocation were realized based on deep reinforcement learning (DRL),while intra-slice user resource allocation was modeled as a shape-based 2-dimension packing problem and solved with a heuristic numerical algorithm,so that intra-slice resource customization was achieved.Simulation results show that the resource reservation-based method enable EIoT slices to explicitly reserve resources,provide a better security isolation level,and DRL could guarantee accuracy and real-time updates of resource reservations.Compared with four existing algorithms,dueling deep Q-network (DQN) performes better than the benchmarks.…”
    Get full text
    Article
  11. 6531

    Wartime Volatility in Coastal Flanders: The Roosewalle Case by Sander Berghmans

    Published 2024-12-01
    “…To achieve this, the farm also employed multiple strategies to secure sufficient capital. In this way, the Roosewalle farm was able to generate substantial profits during wartime. …”
    Get full text
    Article
  12. 6532

    Research Prospect of Anti-Jamming Strategy for the Satellite Internet by Chen HAN, Aijun LIU, Kang AN

    Published 2022-03-01
    “…As an important infrastructure of the national information system, the satellite internet is of great signifi cance to the national security.Thus, it needs to ensure the validity and reliability of the data transmission in the hostile jamming environment.The threat of smart jamming and the limitation of classical link-layer anti-jamming methods give rise to the new demand of intelligent and networked antijamming solutions.In view of the structural characteristics of the satellite internet and the development trend of modern communication jamming technologies, this paper analyzed the basic architecture of intelligent and networked anti-jamming.Based on the closed-loop strategic of sense-learn-prediction-decision-feedback, intelligent and active anti-jamming decision was made to realized self-confi guration and self-optimization.Based on the cooperative communication between nodes, networked anti-jamming ability was improved by the means of topology control and reconstruction, adjacent resources reallocation, and traffi c load balancing.It provided certain theoretical support for the construction of anti-jamming strategy system to achieved the cross-layer optimization, multi-domain combination, and adaptive intelligence.…”
    Get full text
    Article
  13. 6533

    5G technology enabling unmanned offshore platform by Rujun XIA

    Published 2021-07-01
    “…The exploration, development and production of offshore oil are characterized by “high risk, high investment and high technology”.Many restrictive factors, such as the inferiority of offshore natural environment, the high risk of oil and gas production, and the demand for communication signal stability, equipment operation reliability and timely emergency support, make it more difficult to realize unmanned offshore platform.Based on the analysis of the status quo, development trend and implementation requirements of unmanned offshore platform, a 5G communication scheme for unmanned offshore platform was proposed.5G network is built between the central platform and the wellhead platform, and the transmission rate, distance, delay and other field tests were carried out.The test results show that 5G communication meets the requirements of high reliability and low delay stable transmission, such as security monitoring, remote control, emergency stop and so on.The scheme has accumulated experience and laid a solid foundation for the construction of an unmanned offshore platform.…”
    Get full text
    Article
  14. 6534

    Efficient and scalable architecture for searchable symmetric encryption by Zhi-qiang WU, Ken-li LI, Hui ZHENG

    Published 2017-08-01
    “…The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext inverted index was proposed for improving the performance of para11e1 constructing cryptograph index,simp1ifying the data maintenance process,and increasing the compatibi1ity with the traditiona1 NoSQL system.The method of centra1ized inverted index was adopted to improve the retrieva1 efficiency of distributed retrieva1 system.Then,the proposed scheme was proved to meet the wide1y adopted IND-CKA security standard.Fina11y,Cassandra was combined to eva1uate the severa1 performance parameters,and the experimenta1 resu1ts show proposed architecture has good app1icabi1ity to the distributed and massive encrypted data environment.…”
    Get full text
    Article
  15. 6535

    The enigma of validity: Speculations on the last paragraph of Donner le temps II by Rezende Gabriel

    Published 2024-01-01
    “…Validity, as the mystical foundation of normativity, functions simultaneously as a metaphysical shortcut to secure self-reference in philosophical thought and as the impossibility of any foundational grounding (Grundlegung).…”
    Get full text
    Article
  16. 6536

    Image encryption method based on multiple-order fractional discrete Tchebichef transform and generating sequence by Bin XIAO, Wenming SHI, Weisheng LI, Jianfeng MA

    Published 2018-05-01
    “…Fractional transform based image encryption methods have been widely studied in recent years.However,most of the existing fractional transform based image encryption methods are defined in the complex field.Thus,the encrypted images contain both phase and amplitude information,which is not conducive to transmission and storage.Moreover,some encryption methods that meet the requirements of reality-preserving have problems of relatively single keys,lacking of sensitivity and so on.An image encryption method was proposed based on multiple-order fractional discrete Tchebichef transform and generating sequence.The proposed method used randomly generated row and column vectors and generating sequence generated by Chaotic sequences as keys to encrypt images,which not only satisfied property of reality-preserving transmission but also greatly expanded the key space.The experimental results further demonstrate that the proposed encryption method can resist a variety of attacks,and decrypted images are almost non-distored,which indicate excellent encryption effect,sufficient security and robustness of the method.…”
    Get full text
    Article
  17. 6537

    Clustering perception mining of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-06-01
    “…Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining algorithm was proposed.By extracting the protocol's behavior instruction sequences,and clustering analysis of all the behavior instruction sequences using the instruction clustering algorithm,the stealth attack behavior instruction sequences can be mined quickly and accurately from a large number of unknown protocol programs according to the calculation results of the behavior distance.Combining dynamic taint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platform hidden disc which was developed independently,and 193 stealth attack behaviors were successfully mined,the results of automatic analysis and manual analysis were completely consistent.Experimental results show that,the solution is ideal for perception mining the protocol's stealth attack behavior in terms of efficiency and accuracy.…”
    Get full text
    Article
  18. 6538
  19. 6539

    Enhancing drought tolerance in horticultural plants through plant hormones: a strategic coping mechanism by Shanxia Huang, Songheng Jin

    Published 2025-01-01
    “…The development of effective strategies to mitigate drought stress is essential for sustainable agriculture and food security, especially considering the continuous growth of the world population. …”
    Get full text
    Article
  20. 6540