Showing 6,861 - 6,880 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6861

    Enhance the Probability of Detection of Cooperative Spectrum Sensing in Cognitive Radio Networks Using Blockchain Technology by D. Balakumar, Nandakumar Sendrayan

    Published 2023-01-01
    “…The sharp rise in mobile data traffic causes congestion in the licensed band for the transmission of signals. Handling this security issue in real time, on top of spectrum sharing, is a challenge in such networks. …”
    Get full text
    Article
  2. 6862

    Study on Estimation of the Gripping Force of Surgical Instruments Based on the Dynamic Model by Liu Fen, Liu Jiahao, Yun Jintian, Sang Hongqiang

    Published 2024-04-01
    “…The simulation results show that the gripping force estimation model of the surgical instrument based on the dynamic model is consistent with the actual situation, which provides a theoretical basis for the subsequent research on the gripping force security of the surgical instrument.…”
    Get full text
    Article
  3. 6863

    Le sol : enquête sur les mécanismes de (non) émergence d’un problème public environnemental by Juliette Fournil, Juliette Kon Kam King , Céline Granjou, Lauric Cécillon

    Published 2018-09-01
    “…Drawing on an in-depth qualitative investigation in France, including documentary exploitation and interviews, we identified two distinct logics of environmental requalification of soil, respectively in terms of endangered biodiversity and threatened soils in need of conserving, and in terms of soil functions and soil ecosystem services in need of conserving and securing. We finally discuss how those logics tend to unsettle agricultural logics and power relations or to comply with them.…”
    Get full text
    Article
  4. 6864

    Application of machine learning tools and immersive technologies in management by A. V. Sosnilo

    Published 2022-04-01
    “…It has been concluded that most of the technologies described in the study are able to significantly improve the organisation’s efficiency, identify hidden relationships, more productively manage employees in the field of hiring, selection, personnel training, motivation and development of talents, improving corporate culture, to ensure the organisation’s security, etc. It has been also noted that the application of individual technologies can be used for pressure on employees, invasion of privacy, administrative pressure due to a political position, personal medical information, etc. and requires a balanced policy with the involvement of all interested parties.…”
    Get full text
    Article
  5. 6865

    Al di qua e al di là del muro: movimenti sociali in Israele e Palestina by Sabina Leoncini

    Published 2016-05-01
    “… In 2007, I conducted research in the area of Bethlehem(OPT) to understand the changes caused by the construction of the security barrier on the daily life of this community. …”
    Get full text
    Article
  6. 6866

    Demand and consumption patterns of banana in Tanzania by William George

    Published 2025-02-01
    “…It offers policy recommendations to strengthen the banana value chain and improve food security in Tanzania.…”
    Get full text
    Article
  7. 6867

    Trends and Perspectives of mHealth in Obesity Control by Sang-Dol Kim

    Published 2024-12-01
    “…Perspectives highlight potential for equity, empowerment through self-management, privacy and security concerns, evidence-based practice, and interdisciplinary approaches. …”
    Get full text
    Article
  8. 6868
  9. 6869
  10. 6870
  11. 6871

    The Important Step for European Integration: “Council of Europe” and the Matter of Turkey’s Membership to Council by Ali Servet Öncü

    Published 2013-12-01
    “…This organization which stipulates cooperation in such areas human rights, social affairs, education, culture, sports, youth, public health, environmental, architectural heritage, urban planning, local and regional authorities, and law as well as defence and security was founded on 5 May 1949 by ten European states. …”
    Get full text
    Article
  12. 6872

    Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties by Youheng DONG, Geng ZHAO, Yingjie MA

    Published 2022-01-01
    “…To solve the weak chaos in the spatiotemporal chaotic system based on coupled map lattices under some control parameters and the un-uniformity of sequences generated by the coupled map lattices, a two-dimensional pseudo-random coupled map lattices (2D-PRCML) system was proposed.Firstly, the two-dimensional partitioned elementary cellular automata (2D-PECA) was designed to establish pseudo-random coupling.Secondly, iterative results of 2D-PECA were utilized to perturb the 2D-PRCML system.The chaotic behaviors of the proposed system, such as the bifurcation diagram, Kolmogorov-Sinai entropy, were investigated.Moreover, the uniformity of sequences generated by the 2D-PRCML system was discussed, and the correlation coefficients between any two sequences generated by different lattices were acquired.The analyses and tests indicate that the 2D-PRCML system exhibits stronger chaotic behavior.Furthermore, the sequence generated by the proposed system possesses better uniformity, randomness, and unpredictability.The outstanding properties of the 2D-PRCML system prove that it is more suitable for applying in cryptography and chaotic secure communication.…”
    Get full text
    Article
  13. 6873

    Testing the significance of pricing factors of oil and gas companies. by Antonio Garcia-Amate, Laura Molero-González, Miguel Angel Sánchez-Granero, Juan Evangelista Trinidad-Segovia, Andres García-Medina

    Published 2024-01-01
    “…Far from ending this trend, O&G companies continue to be the main fore-runners in providing secure, versatile and widespread energy to the entire world. …”
    Get full text
    Article
  14. 6874

    Research on cross-domain trustable blockchain based decentralized DNS architecture by Kai LEI, Fangxing SHU, Lei HUANG, Qichao ZHANG

    Published 2020-04-01
    “…The domain name system (DNS) is an important internet infrastructure.However,current DNS utilizes centralized hierarchical structure with severe dependence on root server,which causes defects such as the risk of single-point failure and the abuse of central rights.Designing new decentralized DNS mainly focuses on transforming the domain name system from a single trust domain which relies on the center to multiple trust domains with the top-level domain name as the root parallel to each other,but also faces cross-domain credible challenges.To design a cross-domain trusted architecture,the concept of separating control and analysis was adopted,and a dual-blockchain DNS architecture was proposed.At data layer,a novel cross-domain verification was designed based on a one-way accumulator verification scheme,with the time complexity of the verification process O(N) reducing to O(1) nearly.The CDBFT algorithm was proposed by combining the DPoS mechanism and the BFT algorithm,whose average throughput reaches 736 TPS.The theoretical derivation and experimental results have demonstrated the advantages of this new DNS architecture on security,performance,and scalability.…”
    Get full text
    Article
  15. 6875

    Opportunity to change the future or “institutional trap” by E. V. Rozhkov

    Published 2022-09-01
    “…Such a rapid integration of digital technologies may indicate, on the one hand, the desire to develop the economy and society, and on the other hand, the need to control each person, while speaking about the security of the state and its values.…”
    Get full text
    Article
  16. 6876

    Narration filmique des mondes agricoles : de la bipartition des mondes agricoles à leur mise en réflexion visuelle by Béatrice Maurines 

    Published 2021-05-01
    “…On the one hand, some documentaries condemn a world of agro-industry linked to international firms and ultraliberal and « scalable » capitalism and in particular for their implications in problems of food security, public health and misuse of the soil resource. …”
    Get full text
    Article
  17. 6877

    Assisting Laboratory Management Based on Network Big Data Mining Technology by Yonghua Xu

    Published 2022-01-01
    “…In today’s big data context, the composition of virtual networks is becoming increasingly complex, so it is neither easy nor difficult to strengthen the control of network security issues. This paper studies the important content of network big data mining-assisted laboratory management. …”
    Get full text
    Article
  18. 6878

    Nove lincidence matrix differential power analysis for resisting ghost peak by Zijing JIANG, Qun DING

    Published 2023-04-01
    “…At present, differential power analysis (DPA) is one of the most important threats to the security of block ciphers in chips.When the collected power trace is insufficient, DPA is vulnerable to ghost peak caused by the difference mean value generated by the wrong key.Based on DPA, a incidence matrix differential power analysis (IMDPA) was proposed which could effectively resist ghost peak.The prediction difference mean matrix was constructed to avoid the influence of the non leaking interval on the key guessing of the leaking interval by using the weak correlation of the guessing key in the non leaking interval.The proposed IMDPA was tested in different leak intervals of AES-128 algorithm.The results show that compared with traditional DPA, IMDPA requires less (up to 85%) power trace to guess the correct key.At the same time, the key guessing efficiency of AES-128 under the implementation of protective measures by IMDPA still has obvious advantages.In order to further verify the universality of IMDPA in block ciphers, experimental verification is conducted on SM4 algorithm.Compared with traditional DPA, IMDPA requires less (up to 87.5%) power traces to guess the correct key.…”
    Get full text
    Article
  19. 6879

    Improved grey wolf optimization algorithm based service function chain mapping algorithm by Yue ZHANG, Junnan ZHANG, Xiaochun WU, Chen HONG, Jingjing ZHOU

    Published 2022-11-01
    “…With the rise of new Internet applications such as the industrial Internet, the Internet of vehicles, and the metaverse, the network’s requirements for low latency, reliability, security, and certainty are facing severe challenges.In the process of virtual network deployment, when using network function virtualization technology, there were problems such as low service function chain mapping efficiency and high deployment resource overhead.The node activation cost and instantiation cost was jointly considered, an integer linear programming model with the optimization goal of minimizing the average deployment network cost was established, and an improved grey wolf optimization service function chain mapping (IMGWO-SFCM) algorithm was proposed.Three strategies: mapping scheme search based on acyclic KSP algorithm, mapping scheme coding and improvement based on reverse learning and nonlinear convergence were added to the standard grey wolf optimization algorithm to form this algorithm.The global search and local search capabilities were well balanced and the service function chain mapping scheme was quickly determined by IMGWO-SFCM.Compared with the comparison algorithm, IMGWO-SFCM reduces the average deployment network cost by 11.86% while ensuring a higher service function chain request acceptance rate.…”
    Get full text
    Article
  20. 6880