Showing 6,561 - 6,580 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 6561

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing by Jue-Sam Chou

    Published 2012-01-01
    “…Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. …”
    Get full text
    Article
  2. 6562

    Challenges and Countermeasures of International Commercial Dispute Resolution in the Digital Age by Zhi Qi

    Published 2024-12-01
    “…To address these challenges, it propose proposed to enhance technical capabilities, strengthen data security, develop online dispute resolution platforms, update procedures and physical rules, lower technical barriers and narrow the digital divide. …”
    Get full text
    Article
  3. 6563

    Research on architecture design and core strategy of intelligent recommendation system for electronic literature resources in colleges and universities by HU Guoqiang

    Published 2024-11-01
    “…On these problems, a university electronic literature resource intelligent recommendation system was designed, which includes a data collection layer, a data mining layer, a recommendation brain layer, an application service layer, an information standardization system, and a security and operation maintenance system. Finally, the core strategies and algorithms of the system were introduced. …”
    Get full text
    Article
  4. 6564

    An indoor positioning system based on distributed LTE network by Yu YANG, Ming CHEN, Daqing LIU

    Published 2018-06-01
    “…Indoor positioning technology has important applications in the business and security fields,but there are still existing problems with low positioning accuracy and high deployment costs.An indoor positioning system based on long term evolution ( LTE ) network was introduced.The system was defined on the Huawei distributed pico base station and was used to measure the reference signal strength (RSRP) or time of arrival (ToA) of mobile terminals to multiple access points.To overcome the uplink power control in LTE network,the absolute RSRP or ToA was converted to differential values.The system relied on widely deployed LTE networks to provide seamless location services to terminal devices in a wireless network connection state.It didn’t rely on third-party software or affect network performance.The experimental results show that the average positioning accuracy of Huawei indoor positioning system using time difference of arrival (TDoA) can reach 3~5 m in indoor scenarios such as shopping malls,showing good application potential.…”
    Get full text
    Article
  5. 6565

    Matrix computation over homomorphic plaintext-ciphertext and its application by Yang LIU, Linhan YANG, Jingwei CHEN, Wenyuan WU, Yong FENG

    Published 2024-02-01
    “…., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
    Get full text
    Article
  6. 6566

    The Neglected Traditional Enset (Ensete ventricosum) Crop Landraces for the Sustainable Livelihood of the Local People in Southern Ethiopia by Newarinesh Feleke, Wondimagegnehu Tekalign

    Published 2022-01-01
    “…Enset (Ensete ventricosum, Musaceae) is a neglected traditional multipurpose crop plant critical for Ethiopian food security. It has drawn a lot of attention in the last few years. …”
    Get full text
    Article
  7. 6567

    New Concept and Practice of Urban Flood Control Design Based on Waterfront Space Design by LI Yuanyuan, HOU Guibing, WANG Yingjie

    Published 2020-01-01
    “…Through systematic summary and problem analysis of domestic and foreign urban flood control design,this paper believes that the urban flood control design should develop from traditional water conservancy engineering design to a new stage of building urban waterfront space that integrates urban planning,ecological environment,garden landscape and other disciplines,and puts forward a new concept of urban flood control design based on urban waterfront space design.Through key measures such as the transformation of the water system in the connected area,the construction of green flexible ecological embankments,and the design of waterfront spaces shared by people and water,the waterfront spaces with urban public service functions can be created,which can effectively reduce the blocking of the ecological corridor between the city and the water system,better achieve the comprehensive effects of water security and aquatic ecology,as well as effectively promote the harmonious coexistence of city &water and the high-quality and sustainable development of the city under the premise of ensuring the safety of flood (tide) control.…”
    Get full text
    Article
  8. 6568

    5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix by Geeta Biban, Renu Chugh, Anju Panwar, Mohammad Sajid

    Published 2024-01-01
    “…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
    Get full text
    Article
  9. 6569
  10. 6570

    Prioritizinghydrological erosion-prone response units in Latyan catchment by Ali ahmad abadi, amir karam, Mohsen PourbashirHir

    Published 2015-12-01
    “…Soil erosion in watersheds, causing problems such as the loss of agricultural land productivity and reduce soil surface layer, endangering the life of reservoirs and water utilities, loss of soil fertility, increasing flood, threatening human food security, etc. The negative effects of soil erosion, watershed management operations to improve care. …”
    Get full text
    Article
  11. 6571

    Trajectory differential privacy protection mechanism based on prediction and sliding window by Ayong YE, Lingyu MENG, Ziwen ZHAO, Yiqing DIAO, Jiaomei ZHANG

    Published 2020-04-01
    “…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
    Get full text
    Article
  12. 6572
  13. 6573

    CEO political orientation and loan contract by Chune Young Chung, Changhwan Choi, Do Thi Thanh Nhan

    Published 2025-01-01
    “…Given the common belief that certain personality traits—such as trustworthiness, reliability, loyalty, thriftiness, and stinginess—are more often linked to conservatives (Republicans) than to liberals (Democrats), we investigate whether companies with conservative chief executive officers (CEOs) secure more advantageous loan terms compared to others. …”
    Get full text
    Article
  14. 6574

    An investigation of the formulation and nutritional composition of modern meat analogue products by Benjamin M. Bohrer

    Published 2019-12-01
    “…Meat analogues, or plant-based products that simulate the properties of traditional meat products, have secured a position in the conversation of protein foods. …”
    Get full text
    Article
  15. 6575
  16. 6576

    THE POLITICS OF APPOINTING POLITICAL AND CARREER DIPLOMATS’ IN NIGERIA: Understanding the Nexus by MAHDI ABUBAKAR ABBA

    Published 2023-12-01
    “…However, it requires legislative (Senate) confirmation and security clearance. The paper recommends that the Nigerian government need to review the application of federal character principle and quota system in the appointment of ambassadors. …”
    Get full text
    Article
  17. 6577

    Analysis of super-long and sparse feature in pseudo-random sequence based on similarity by Chun-jie CAO, Jing-zhang SUN, Zhi-qiang ZHANG, Long-juan WANG, Meng-xing HUANG

    Published 2016-10-01
    “…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
    Get full text
    Article
  18. 6578

    PREDICTION AND DAMAGE ANALYSIS OF THE POSTBUCKLING FOR MULTI-SPAR COMPOSITE BOX by YUAN Fei, CHAI YaNan, ZHANG AYing

    Published 2018-01-01
    “…as multi-spar composite box has been used for many airplanes,in order to assure structure security,it is necessary to study the mechanical properties of multi-spar composite box. …”
    Get full text
    Article
  19. 6579

    Mapeamento da violência motivada por discriminação à identidade de gênero e sexualidade no município de São Paulo: uma metodologia cartográfica na investigação de geografias invisí... by Vinicius Santos Almeida

    Published 2022-01-01
    “…The data were collected at the database of the Secretariat of Public Security of the State of São Paulo. We used Analytical and Transformational Cartography (Cauvin; Escobar; Serradj, 2008) to construct anamorphic cartograms in order to visualize the spatial weight of the recorded violence. …”
    Get full text
    Article
  20. 6580

    REGIONS OF RUSSIA IN THE CORONAVIRUS PANDEMIC by N. Z. Zotikov

    Published 2020-12-01
    “…At  the present stage of development, taking into account the changed economic situation in the world, the issues of  economic security of the regions are of particular importance. …”
    Get full text
    Article