Showing 6,601 - 6,620 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6601

    Development of Accounting Through Automation and Artificial Intelligence by Claudiu BRÂNDAȘ, Ioan MINDA

    Published 2025-01-01
    “…Furthermore, the study underscores the critical need for responsible AI usage, emphasizing the importance of transparency, data security, and compliance with regulatory standards. …”
    Get full text
    Article
  2. 6602

    Review of the application of fgOTN in the interconnection of artificial intelligence data centers by SHI Qingna, WANG Jiaxue, LI Shiyu, CAI Mengru, LIU Xiaodong, YIN Shan, HUANG Shanguo

    Published 2025-01-01
    “…The fine grain optical transport network (fgOTN), which serves as a continuation of synchronous digital hierarchy (SDH) technology and an extension of optical transport network (OTN) technology, is applied in the interconnection of artificial intelligence data centers to meet their multiple requirements for flexible scheduling, efficient transmission, strict security isolation, and low latency. Firstly, the basic concepts, technical architecture, and application scenarios of fgOTN were introduced. …”
    Get full text
    Article
  3. 6603

    A Novel Fractional Hausdorff Discrete Grey Model for Forecasting the Renewable Energy Consumption by Yuzhen Chen, Suzhen Li, Shuangbing Guo

    Published 2022-01-01
    “…Renewable energy consumption has a significant impact on energy security so accurate prediction of renewable energy consumption can help the energy department formulate relevant policies and adjust the energy structure. …”
    Get full text
    Article
  4. 6604

    Game theory based forwarding control method for social network by Fangfang SHAN, Hui LI, Hui ZHU

    Published 2018-03-01
    “…With the rapid development of mobile communication and internet technology,the social network has become one of the mainstream social means used in people’s daily social life.To maintain and strengthen relationships with friends,users may share personal behavior and feelings through social networks.Forwarding these contents may result in privacy leakage.To help publishers make proper data forwarding decision,the benefits of both sides of the forwarding operation were analyzed,and a game theory based forwarding control method for social network was proposed which could effectively prevent dishonest data forwarding operation.By analyzing the benefits of both sides of forwarding operation and considering historical information,the probability of dishonest data forwarding operation was calculated and it was compared with the threshold set by publisher to make the forwarding decision.The procedure and framework of the game theory based forwarding control method was introduced.The benefits of both sides were defined and analyzed.The game play scenario was presented.Some results of experiments are shown to support that the method is effective and it can protect the security of content in social network.…”
    Get full text
    Article
  5. 6605
  6. 6606

    Trajectoires de vulnérabilité des territoires ruraux dans les Andes d’Équateur : une analyse comparative by Nasser Rebaï, Julio A. Alvarado Vélez

    Published 2019-01-01
    “…In addition, we observed that in recent years, family farmers have developed agricultural practices that have adverse effects on the environment while, at the same time, their food security was not ensured. Finally, the work done over the past three years provides an opportunity to take stock of the negative effects of the “modernizing” project of the primary sector in Ecuador and, through the comparison of several local situations, to characterize the extension of the trajectory of vulnerability of Andean rural territories.…”
    Get full text
    Article
  7. 6607

    Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps by LIU Jian-dong, FU Xiu-li

    Published 2007-01-01
    “…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
    Get full text
    Article
  8. 6608

    Raconter les Highland Clearances : Fluctuations mémorielles et instrumentalisationde la mémoire by Laurence GOURIEVIDIS

    Published 2011-06-01
    “…In Modern Scottish history, few events have had as much resonance and emotional charge as the Highland Clearances, i.e. the evictions of tenants and the social conflicts in northern Scotland and the Hebrides from the middle of the 18th century until 1886, when legislation put an end to large-scale removals by conferring security of tenure on crofters and considerably restricting landowning power. …”
    Get full text
    Article
  9. 6609

    The Use of Different Image Recognition Techniques in Food Safety: A Study by Rijwan Khan, Santosh Kumar, Niharika Dhingra, Neha Bhati

    Published 2021-01-01
    “…In order to avoid foodborne disease and ensure food security, fast and effective detection of pathogenic microorganisms is crucial for public safety biomonitoring. …”
    Get full text
    Article
  10. 6610

    The Impact of the Depth of Cooperation in Establishing Regional Economic Cooperatives in Szekelyland by Ferenc Ilyés

    Published 2015-10-01
    “…In the society of our age it is of major importance to strengthen the communities’ values, which represent belonging, standing and last but not least financial security. This supposition can be taken as a general statement, but it is essential from the point of view of Szekely people’s picture about future, and has its part in finding ourselves. …”
    Get full text
    Article
  11. 6611

    La Guerra de España en el contexto de la crisis internacional de entreguerras by David Jorge

    Published 2015-01-01
    “…While it was in Manchuria (1931) where impunity began with an act of aggression by one sovereign state against another of its same condition (both of them members of the League of Nations), it was in Abyssinia (1935-1936) where the system of collective security was broken with the lifting of the sanctions initially imposed to Italy due to its attack and invasion of Ethiopia. …”
    Get full text
    Article
  12. 6612

    Research on flood defense mechanism of SDN control layer:detection and mitigation by Qizhao ZHOU, Junqing YU, Dong LI

    Published 2021-11-01
    “…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
    Get full text
    Article
  13. 6613

    The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare by WRÓBLEWSKI Wojciech, WIŚNIEWSKI Michał

    Published 2024-09-01
    “…Using complementary tools such as process analysis, risk assessment, Petri nets, and Bayesian network in the form of the Critical Infrastructure Security Situational Management methodology, the authors provide a comprehensive solution for modeling how to protect the life and health of the civilian population. …”
    Get full text
    Article
  14. 6614

    Bitcoin, Libra and Central Bank Digital Currencies — Elements of a New Monetary System? by Jonas Groß, Bernhard Herz, Jonathan Schiller

    Published 2020-09-01
    “…Central bank digital currencies could be viewed as a public sector response to these private projects to secure central banks’ predominant role in the monetary system of the future.…”
    Get full text
    Article
  15. 6615

    Research on intrusion detection method of marine meteorological sensor network based on anomalous behaviors by Xin SU, Tian TIAN, Gong Ziyang, Yiqing ZHOU

    Published 2023-07-01
    “…To deal with the abnormal data flow attacks faced by the marine meteorological sensor network (MMSN), analyze the security mechanism, and aim at the complex and huge network structure and the extremely imbalanced data flow in the nodes, the intrusion detection method of marine meteorological sensor network based on anomalous behaviors was studied, and intrusion detection system (IDS) was built.The imbalance of dataset was considered emphatically, and the effective data generation was realized by using depth generation network CVAE-GAN to learn the distribution of minority classes in the dataset.OPTICS-based denoising algorithm was used to remove the noise points in majority classes and clarify the category boundaries.From the data perspective, the imbalance rate of dataset was reduced, the influence of imbalanced dataset on IDS was reduced, and the ability of classifier to identify minority classes of abnormal traffic was improved.The simulation results show that the proposed system can effectively identify all kinds of abnormal traffic, especially minority classes of them, and the imbalanced dataset processing method can significantly improve the detection ability of the classifier.…”
    Get full text
    Article
  16. 6616

    STRUCTURE FINITE ELEMENT ANALYSIS AND LIGHTWEIGHT DESIGN OF MULTILAYER DRUM by WEN MingLiang, WU Xiao, LI Xin, XIONG Gang

    Published 2015-01-01
    “…The drum’s design,reasonable or not,is of great importance to the security of cranes. Multilayer drum is the current mainstream trend of the development of the drum. …”
    Get full text
    Article
  17. 6617

    A feasibility of land consolidation in kigezi region, south western Uganda: a solution to land fragmentation, land shortage, farmer’s productivity and economic development by George Stanley, Kinyata, Nafiu, Lukman Abiodun

    Published 2022
    “…The article compares the benefits of the land under fragmentation and the land under consolidation systems and recommends strategies to transform Kigezi Region’s informal and subsistence farming system to modern, commercial agriculture to achieve food security and increase incomes of the population and economic development of the area.…”
    Get full text
    Article
  18. 6618
  19. 6619

    Radicalization and Counter-Radicalization on the Internet (Roles and Responsibilities of Stakeholders in Countering Cyber Terrorism) by Raharjo Agus, Hapsari Retnaningrum Dwi, Sugeng Esmara, Saefudin Yusuf, Ismail Noorfajri

    Published 2025-01-01
    “…The sophistication of terrorists/terrorist organizations in utilizing the internet requires an equally sophisticated response in combating and countering cyberterrorism, combating them requires simultaneous integration of stakeholders in this field, namely law enforcement, academia, businesses (private security industry), society/community, media and internet users.…”
    Get full text
    Article
  20. 6620

    A Review of Multi-Source Data Fusion and Analysis Algorithms in Smart City Construction: Facilitating Real Estate Management and Urban Optimization by Binglin Liu, Qian Li, Zhihua Zheng, Yanjia Huang, Shuguang Deng, Qiongxiu Huang, Weijiang Liu

    Published 2025-01-01
    “…We found that multi-source data, including sensors, social media, citizen feedback, and GIS data, face challenges such as data quality and privacy security when being fused. Data fusion algorithms are diverse and have their own advantages and disadvantages. …”
    Get full text
    Article