Showing 6,621 - 6,640 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 6621

    An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge by Zhiqiang Ruan, Wei Liang, Decai Sun, Haibo Luo, Fanyong Cheng

    Published 2013-04-01
    “…Providing source privacy is a critical security service for sensor networks. However, privacy preserving in sensor networks is a challenging task, particularly due to the limited resources of sensor nodes and the threat of node capture attack. …”
    Get full text
    Article
  2. 6622

    Dynamics of variability in agronomic characters of millet cv. ‘Gorlinka’ under the climate conditions of the southern part of the East European Plain by T. V. Kulemina

    Published 2024-01-01
    “…The effect of high temperature and drought is expected to lead to undesirable consequences for the economy, a decrease in yields, and a threat to food security. This aspect requires an assessment of the ongoing climate changes and identification of the causes that induce the response of plants to them.Materials and methods. …”
    Get full text
    Article
  3. 6623

    Eight caring technology principles: development and implementation of a framework for responsible health technology innovation by Tania Moerenhout, Hilde Vandenhoudt, Walter Daems, Lara Vigneron, Tinne Vandensande

    Published 2024-12-01
    “…The framework enables responsible health technology innovation by focusing on the needs of users and society, data security, equity, participatory governance, and quality control. …”
    Get full text
    Article
  4. 6624

    RAMS Analysis of Train Air Braking System Based on GO-Bayes Method and Big Data Platform by Guoqiang Cai, Yaofei Wang, Qiong Song, Chen Yang

    Published 2018-01-01
    “…The RAMS (reliability, availability, maintainability, and security) of the air braking system is an important indicator to measure the safety performance of the system; it can reduce the life cycle cost (LCC) of the rail transit system. …”
    Get full text
    Article
  5. 6625

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…The proposed method is simple and speedy in terms of computations, meanwhile it affirms higher security and sensitivity. In contrast to GF, PA-loop are non-isomorphic and have several Cayley table representations. …”
    Get full text
    Article
  6. 6626

    DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK by Trần Đắc Tốt, Phạm Tuấn Khiêm, Phạm Nguyễn Huy Phương

    Published 2020-09-01
    “…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. …”
    Get full text
    Article
  7. 6627

    Federated Learning for Decentralized DDoS Attack Detection in IoT Networks by Yaser Alhasawi, Salem Alghamdi

    Published 2024-01-01
    “…Evaluated using the comprehensive CICIDS2017 dataset and compared with conventional centralized detection methods, FL-DAD achieves superior performance, illustrating the potential of federated learning to enhance intrusion detection systems in large-scale IoT networks by balancing data security with analytical effectiveness.…”
    Get full text
    Article
  8. 6628

    Manipulating energy migration in nanoparticles toward tunable photochromic upconversion by Jinshu Huang, Langping Tu, Haozhang Huang, Haopeng Wei, Qinyuan Zhang, Bo Zhou

    Published 2024-12-01
    “…These findings offer a deep insight into the understanding of upconversion dynamics and provide a versatile approach to manipulating the energy flux in nanostructures with tunable emission colors, showing great promise in applications of logic operation and information security.…”
    Get full text
    Article
  9. 6629

    Adoption Spells of Improved Potato Varieties by Smallholder Farmers in Eastern Ethiopia: The Duration Approach by Sisay Lemessa, Molla Alemayehu, Megersa Daksa, Nigussie Dechassa

    Published 2019-06-01
    “…Potato is mainly tagged as a food security crop in Ethiopia. However, its productivity remains low due to low adoption of improved technologies by smallholder farmers. …”
    Get full text
    Article
  10. 6630

    Dynamic Stochastic Optimization of Emergent Blood Collection and Distribution from Supply Chain Perspective by Xiangyu Jin, Huajun Tang, Yuxin Huang

    Published 2021-01-01
    “…In response to emergencies, it is critical to investigate how to deliver emergency supplies efficiently and securely to disaster-affected areas and people. There is no doubt that blood is deemed one of the vital relief supplies, and ensuring smooth blood delivery may substantially alleviate subsequent impacts caused by the disaster. …”
    Get full text
    Article
  11. 6631

    ECONOMIC ANALYSIS OF SOIL-BASED AND SOILLESS FARMING SYSTEMS: A CASE STUDY FROM DA LAT CITY by Đặng Đức Huy, Phạm Thị Thuyền, Đàm Thị Hải Âu, Trần Thanh Giang, Nguyễn Thị Trà My

    Published 2020-12-01
    “…Nowadays, to secure production in the case of restricted natural resources requires innovative farming approaches to achieve a balance between agriculture and environmental protection. …”
    Get full text
    Article
  12. 6632

    Nanoformulation: An efficient approach to natural insect repellent formulations by Mehrin Najafzadeh Nansa, Farzaneh Jokarshoorijeh, Nasibeh Tavakoli Hasanaklou, Ramin Hosseni, Massomeh Ghorbanloo, leila Mamani

    Published 2024-08-01
    “…Currently, there is a remarkable interest in the development of eco-friendly, secure, and effective pesticides using intelligent, responsive, biodegradable, and biocompatible materials. …”
    Get full text
    Article
  13. 6633

    100 essential questions for the future of agriculture by Yuming Hu, Taolan Zhao, Yafang Guo, Meng Wang, Kerstin Brachhold, Chengcai Chu, Andrew Hanson, Sachin Kumar, Rongcheng Lin, Wenjin Long, Ming Luo, Jian Feng Ma, Yansong Miao, Shaoping Nie, Yu Sheng, Weiming Shi, James Whelan, Qingyu Wu, Ziping Wu, Wei Xie, Yinong Yang, Chao Zhao, Lei Lei, Yong‐Guan Zhu, Qifa Zhang

    Published 2023-03-01
    “…We focus on 10 primary themes: transforming agri‐food systems, enhancing resilience of agriculture to climate change, mitigating climate change through agriculture, exploring resources and technologies for breeding, advancing cultivation methods, sustaining healthy agroecosystems, enabling smart and controlled‐environment agriculture for food security, promoting health and nutrition‐driven agriculture, exploring economic opportunities and addressing social challenges, and integrating one health and modern agriculture. …”
    Get full text
    Article
  14. 6634

    Artificial Intelligence in Energy Economics Research: A Bibliometric Review by Zhilun Jiao, Chenrui Zhang, Wenwen Li

    Published 2025-01-01
    “…Potential future research directions include energy supply-chain resilience and security, social acceptance and public participation, economic inequality and the technology gap, automated methods for energy policy assessment, the circular economy, and the digital economy. …”
    Get full text
    Article
  15. 6635

    A Novel Memductor-Based Chaotic System and Its Applications in Circuit Design and Experimental Validation by Li Xiong, Yanjun Lu, Yongfang Zhang, Xinguo Zhang

    Published 2019-01-01
    “…Further to these, a memductor-based chaotic circuit is designed, realized, and applied to construct a new memductor-based secure communication circuit by employing the basic electronic components and memristor. …”
    Get full text
    Article
  16. 6636

    Protecting civilians in a data-driven and digitalized battlespace: toward a baseline humanitarian technology infrastructure by Ann Fitz-Gerald, Jenna Hennebry

    Published 2025-01-01
    “…However, the lack of international consensus on the use of data, the public and private nature of the actors involved in conflict, the transnational aspects of the widened battlefield, and the heightened security risks in the conflict space pose enormous challenges for the protection of civilians agenda. …”
    Get full text
    Article
  17. 6637

    The Role of Organic Extracts and Inorganic Compounds as Alleviators of Drought Stress in Plants by Pedro Garcia-Caparros, Michele Ciriello, Youssef Rouphael, Maria Giordano

    Published 2025-01-01
    “…Climate changes have exacerbated the progression of drought conditions on a global scalethreating to crop production and heightening concerns over food security. Water scarcity enforces alterations in fundamental morphology, physiology and biochemical traits in crops. …”
    Get full text
    Article
  18. 6638

    Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks by Ammar Alsinai, José Roberto Castilho Piqueira, Waqar Ul Hassan, Azmat Ullah Khan Niazi, Farida Safder

    Published 2025-01-01
    “…Utilizing a constant time headway spacing policy with gap adjustments, we derive control gains that secure internal platoon stability. A Lyapunov-based stability approach is employed to mitigate the destabilizing effects of Byzantine attacks, ensuring robust performance even in adverse conditions. …”
    Get full text
    Article
  19. 6639

    Image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform by Li SUN, Zhengqian HUANG, Zhenmao XIANG

    Published 2017-09-01
    “…The image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform was proposed.Firstly,the initial plaintext was equally segmented to get left and right sub-blocks.Then the Radon transform was used to obtain the radon projection spectrum image by processing the left and right blocks at 0~180 degrees.And Radon projection spectrum image of left block was permutated by Arnold map,while the Radon projection spectrum image of right block was permutated based on gravity model to get two su-scrambling ciphers,then the entire scrambled image is formed by combining them.To diffuse pixels from multiple directions in space,four direction continuous folding mechanism was designed to change the pixel values by using the diffusion function corresponding to four different directions for realizing image encryption.The experimental results show that this algorithm has higher security and attack resistance with more uniform of pixel distribution in output cipher compared with the current image encryption technology.…”
    Get full text
    Article
  20. 6640

    Risk Assessment Method for Offshore Structure Based on Global Sensitivity Analysis by Zou Tao, Li Huajun, Liu Defu

    Published 2012-01-01
    “…The calculation result sufficiently demonstrates the new risk assessment method’s rationality and security.…”
    Get full text
    Article