Showing 6,721 - 6,740 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6721

    Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries by Hai LIU, Xing-hua LI, Er-meng WANG, Jian-feng MA

    Published 2016-07-01
    “…In the proposal, the candidate dummies were first generated by the existing dummy-based schemes, and could be filtered through the check of continuous reasonability and single privacy enhancement. Security analysis shows that, in the proposed method, the formed movement paths are indistinguishable in time and space, so that protecting the user's location privacy effectively in continuous queries. …”
    Get full text
    Article
  2. 6722

    A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks by Prathaban Mookiah, Kapil R. Dandekar

    Published 2012-01-01
    “…Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in wireless systems. …”
    Get full text
    Article
  3. 6723

    Chaotic Image Encryption Based on Running-Key Related to Plaintext by Cao Guanghui, Hu Kai, Zhang Yizhi, Zhou Jun, Zhang Xing

    Published 2014-01-01
    “…In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. …”
    Get full text
    Article
  4. 6724

    Bright and stable anti-counterfeiting devices with independent stochastic processes covering multiple length scales by Junfang Zhang, Adam Creamer, Kai Xie, Jiaqing Tang, Luke Salter, Jonathan P. Wojciechowski, Molly M. Stevens

    Published 2025-01-01
    “…With the assistance of a deep-learning model, the resulting PUFs show both near-ideal performance and accessibility for general end users, offering a strategy for next-generation security devices.…”
    Get full text
    Article
  5. 6725

    A hybrid trust model based on communication and social trust for vehicular social networks by Na Fan, Shuai Shen, Chase Q Wu, Junfeng Yao

    Published 2022-05-01
    “…Therefore, human factors should be considered in securing the communication in vehicular social networks. …”
    Get full text
    Article
  6. 6726

    Energy Transition – China-Brazil Partnership to Provide Nature-Based Solutions by Danielle M.T. Denny, Olivia Bulla, J. Renato Peneluppi Jr

    Published 2024-12-01
    “…Intact ecosystems store carbon dioxide, secure food and water supplies and protect against natural disasters. …”
    Get full text
    Article
  7. 6727

    Digital Image Forensic Approach to Counter the JPEG Anti-Forensic Attacks by Amit Kumar, Gurinder Singh, Ankush Kansal, Kulbir Singh

    Published 2021-01-01
    “…It becomes a hot issue about the security and threat to society with increasing growth of social media. …”
    Get full text
    Article
  8. 6728

    THE IMPACT OF DEMOGRAPHIC CHANGES ON THE PENSION SYSTEM FINANCING SUSTAINABILITY IN THE FEDERATION OF BOSNIA AND HERZEGOVINA by Slavo Vukić, Danijel Knežević

    Published 2014-05-01
    “…According to long-term projections of the reformed pension system of the FBiH, the greater stability of initial and average pensions, as well as stable social security of pensioners, will result in a relatively stable share of pension expenditures in GDP, of about 10%. …”
    Get full text
    Article
  9. 6729

    Impact of Built Environment on the Process of Psychological Treatment of Children and Youth by Agata Gawlak, Ewa Banaś

    Published 2024-12-01
    “…At the same time, programmes are being introduced to secure infrastructure and adequate therapeutic space by expanding or creating new, architecturally friendly centres. …”
    Get full text
    Article
  10. 6730

    Mobilités sociales et spatiales d’Africain·es-Américain·es vers la banlieue de « l’entre-deux » dans la deuxième moitié du 20ème siècle : le cas d’Euclid, Ohio by Marion MARCHET

    Published 2022-12-01
    “…It will attempt to demonstrate more precisely the extent to which, before becoming powerful barometers of the state of racial relations in the twenty-first century United States, these suburban spaces carried at first many of the dreams and ambitions of an intermediary segment of the African American population claiming its share of material comfort and security in the post-Civil Rights era.…”
    Get full text
    Article
  11. 6731

    Design of An Agricultural Extension Schedule Management System by Teguh Soedarto, Firza Prima Aditiawan, Adzanil Rachmadhi Putra

    Published 2023-11-01
    “…With such great potential, the Pasuruan Regency Food and Agriculture Security Service has problems in the availability of human resources in quantity, especially agricultural instructors. …”
    Get full text
    Article
  12. 6732

    Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression by Divya Selvaraj, Padmavathi Ganapathi

    Published 2014-01-01
    “…Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. …”
    Get full text
    Article
  13. 6733

    Compressed Sensing-Based Order Analysis for Blade Tip Timing Signals Measured at Varying Rotational Speed by Suiyu Chen, Yongmin Yang, Haifeng Hu, Fengjiao Guan, Guoji Shen, Faming Yang

    Published 2020-01-01
    “…Monitoring the vibrations of high-speed rotating blades is significant to the security of turbomachineries. Blade tip timing (BTT) is considered as a promising technique for detecting blade vibrations without contact online. …”
    Get full text
    Article
  14. 6734

    A Method of Selecting Automated Driving Service Sections Considering Spatial Influence Factors by Tagyoung Kim, Kyeong-pyo Kang

    Published 2025-01-01
    “…To apply and expand automated driving services, it is most urgent to secure the safety of automated driving technology, and it is necessary to prepare for efficient procedures and methods suitable for automated driving services. …”
    Get full text
    Article
  15. 6735

    Current management of the stability of organizations of the investment and construction complex in crisis situations by A. V. Kozlovsky, N. A. Moiseenko, O. E. Astafyeva

    Published 2021-07-01
    “…Early diagnosis of crisis phenomena in the economy proves that a sufficiently high level of socio-economic development does not yet ensure complete economic security and the ability to withstand the threats posed by the unbalanced structure of the economy. …”
    Get full text
    Article
  16. 6736

    Study of living standards in Sahebgharaniyeh neighborhood of Tehran by Mehran Mohammadi, Naser eghbali, mahmood rezaii

    Published 2022-03-01
    “…But with 95 percent confidence, Sahebgharriyeh neighborhood can be considered as individual and social security indexes, identity and sense of place belonging, facilities and services needed, and the status of the visual landscape and the environmental pollution of the habitat.…”
    Get full text
    Article
  17. 6737

    „Nie wierzę w bajki!”: Henrietta Regina Davidson Avram (1919–2006) by Joanna Gajowiecka-Misztal

    Published 2023-12-01
    “…Droga zawodowa Avram wpisuje się w triadę stworzoną przez Vannevara Busha: wojsko (National Security Agency) – świat akademicki (Biblioteka Kongresu) – firmy prywatne (Datatrol). …”
    Get full text
    Article
  18. 6738

    Impact of Transport Cost and Travel Time on Trade under China-Pakistan Economic Corridor (CPEC) by Khalid Mehmood Alam, Xuemei Li, Saranjam Baig

    Published 2019-01-01
    “…China needs a small, secure, and low-cost path to trade with Europe and the Middle East and China-Pakistan Economic Corridor (CPEC) is a feasible solution to this requirement. …”
    Get full text
    Article
  19. 6739

    Presenting an Optimal Algorithm for Resource Scheduling and Code Partition in Mobile Cloud Computing by Raziyeh Ghasemi, Farzaneh Famoori

    Published 2022-03-01
    “…Through virtualization technology, current cloud data centers are becoming more flexible and secure, and are allocated on demand. A key technology playing an important role in cloud data centers is the resource scheduling program. …”
    Get full text
    Article
  20. 6740

    The first geospatial dataset of irrigated fields (2020–2024) in Vojvodina (Serbia) by Mirjana Radulović, Miljana Marković, Sanja Brdar, Ioannis Athanasiadis, Gordan Mimić

    Published 2025-01-01
    “…Abstract Irrigation is a cornerstone of global food security, enabling sustainable agricultural production and helping to ensure that food is available for people around the world, now and in the future. …”
    Get full text
    Article