Showing 6,901 - 6,920 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 6901

    THE «SPECIAL» RELATIONSHIP BETWEEN GERMANY AND CHINA IN THE CONTEXT OF GERMANY’S CHINA POLICY by A. V. Tsvyk

    Published 2016-04-01
    “…In recent years, there have been efforts to extend cooperation to other fields like security and world order. The author comes to the conclusion that both Germany and China increasingly consider a strategic partnership within mutual interest.…”
    Get full text
    Article
  2. 6902

    Subtractive pixel adjacency matrix based features for steganalysis of spatial color images by Tao HAN, Xi CHEN, Yue-fei ZHU

    Published 2016-02-01
    “…Through analyzing the potential security problems of directly extending steganography based on the grayscale spatial image to the color spatial image, novel steganalysis features for detecting the steganographic methods with color spatial images as cover images were proposed. …”
    Get full text
    Article
  3. 6903

    Spectral Expansion Method for Cloud Reliability Analysis by K. Kotteswari, A. Bharathi

    Published 2019-01-01
    “…The efficiency of cloud service providers (CSP) could be improved by considering significant factors such as availability, reliability, usability, security, responsiveness, and elasticity. Assessment of these factors leads to efficiency in designing a scheduler for CSP. …”
    Get full text
    Article
  4. 6904

    Tower d’Alun Hoddinott, ou la tentative de créer un opéra populaire by Jean-Philippe Heberlé

    Published 2004-05-01
    “…In spite of all its musical and dramatic qualities, there have been few performances of Tower and Opera Box has never succeeded in securing any staging of it in London.…”
    Get full text
    Article
  5. 6905

    Differences of type of foods consumed by households in urban and rural West Java, Indonesia by Annisa Nurhidayati Vieta, Riyadi Hadi

    Published 2025-01-01
    “…Dietary diversity is a critical indicator of food and nutrition security, with a minimum consumption of four food groups shown to lower the risk of malnutrition and related health issues. …”
    Get full text
    Article
  6. 6906

    Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks by Hae Young Lee

    Published 2015-07-01
    “…However, to apply this solution to a WSN, the users must carefully select 10 or more security parameters, which are used to determine the occurrences of FEIAs. …”
    Get full text
    Article
  7. 6907

    An active detection of compromised nodes based on en-route trap in wireless sensor network by Jiang-Tao Wang, Zhi-Xiong Liu

    Published 2021-08-01
    “…With the development and wide use of wireless sensor network, security arises as an essential issue since sensors with restrict resources are deployed in wild areas in an unattended manner. …”
    Get full text
    Article
  8. 6908

    Determinants of Modern Agricultural Technology Adoption for Teff Production: The Case of Minjar Shenkora Woreda, North Shewa Zone, Amhara Region, Ethiopia by Abebaw Hailu Fikire, Girma Mulugeta Emeru

    Published 2022-01-01
    “…Since then, the implementation of modern agricultural technologies has remained a promising strategy in Ethiopia for increasing agricultural production, achieving food security, and reducing poverty. The objective of the study is to examine the determinants of modern agricultural technology adoption for teff production in Minjar Shenkora woreda. …”
    Get full text
    Article
  9. 6909

    The role of foreign direct investment by multinational corporations in Africa by Asnake Anteneh Chanie

    Published 2024-02-01
    “…This article focuses on two multinational enterprises from Sweden and China that have been operating in South Sudan and Democratic Republic of Congo, respectively, to determine whether there is a link between their investment and the security crises in both countries. Findings shows that the corporations have been accused by both local and international rights groups of being extractive, involved in human rights violations, and building informal networks with local officials. …”
    Get full text
    Article
  10. 6910

    Shuffled differential privacy protection method for K-Modes clustering data collection and publication by Weijin JIANG, Yilin CHEN, Yuqing HAN, Yuting WU, Wei ZHOU, Haijuan WANG

    Published 2024-01-01
    “…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
    Get full text
    Article
  11. 6911

    Opportunistic routing algorithm based on trust model for ad hoc network by Bo WANG, Xun-xun CHEN

    Published 2013-09-01
    “…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
    Get full text
    Article
  12. 6912

    Distributed trust management scheme based on blockchain in Internet of vehicles by Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG

    Published 2023-05-01
    “…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
    Get full text
    Article
  13. 6913

    Thomas Dallery, Le divorce rentabilité/croissance dans le capitalisme financiarisé. Changements de régimes, équilibres, instabilités et conflits by Thomas Dallery

    Published 2011-06-01
    “…The macroeconomic realisation of profits being determined by capitalists’ spendings, the slowdown of accumulation cannot come (theoretically) with a profitability recovery, others things being equal.After having recalled, in a first chapter, that financialisation is only the last avatar of a long trend for capitalism to escape from real economy, we show, in a second chapter, that financialisation leads, for the individual firm, to a reorientation towards shareholders’ profitability claims at the expense of managers and capital accumulation, financial (indebtedness) and real (capacity utilisation) security, and also of workers (real wage).After having faced, in a third chapter, two methodological, embarrassing questions for kaleckian models of growth and distribution (not very plausible and unstable for the most plausible ones), we use, in a fourth chapter, a second macroeconomic approach (stock-flow consistent model) where conflict impacts distribution (conflict inflation) and accumulation (growth/profit trade-off). …”
    Get full text
    Article
  14. 6914
  15. 6915

    L’environnement juridique de la lutte contre la pollution par les plastiques en Asie du Sud-Est (ASEAN) by Jacques Dupouey

    Published 2024-12-01
    “…External aid is the key to securing funding, which is sorely lacking in most of these developing countries. …”
    Get full text
    Article
  16. 6916

    Research of power preprocessing optimization-based template attack on LED by Xiao-juan WANG, Shi-ze GUO, Xin-jie ZHAO, Mei SONG, Fan ZHANG

    Published 2014-03-01
    “…The security of LED,a lightweight block cipher proposed in CHES 2011,was evaluated by the template attack (TA).Several improvements of TA from the perspective of the preprocessing optimization was proposed.Firstly,the noise offset was calculated by using the phase-only correlation factor in the frequency view of the power trace to eliminate the data interference in the template building phase.Secondly,a novel character extracting method was proposed based on calculating the cross-cluster offset of different clusters classified by the plaintexts to cut the different leakage points from the power traces automatically.Thirdly,a dynamic effective power points choosing strategy was proposed by utilizing the mean value and the noises of the of power traces to evaluate the differences between different templates and improve the utilization of side channel information.Experiment results demonstrate that the proposed techniques of data alignment and automatically data cutting enlarge the differences of templates and reduce the number of the required power trace in both the template building and attacking phase.The proposed effective power points choosing strategy reduces the data complexity of the attack and only two power traces are required to launch the attack with the success rate of 100%.…”
    Get full text
    Article
  17. 6917

    Phytotoxicity of Natural Molecules Derived from Cereal Crops as a Means to Increase Yield Productivity by Hiwa M. Ahmed, Ehsan Amiri-Ardekani, Sayed Ebadi

    Published 2022-01-01
    “…Plants with allelopathy activities derived from secondary metabolites could be an alternative strategy and have an expected function in sustainable weed biocontrol and boost global agricultural production and food security. Thus, protecting biodiversity, ensuring food safety, improving food, and nutrient quality, as well as crop production, are urgently needed as population and consumption are increasing. …”
    Get full text
    Article
  18. 6918

    Société du risque, environnement et potentialisation des menaces : un défi pour les sciences sociales by Lionel Charles, Bernard Kalaora

    Published 2019-12-01
    “…The lack of reflexivity, of innovation and explorative capacity, the emergency and emotion tyranny result in the amplification of threats and fears and the activation of security and identity discourses which, instead of mobilizing energies, paralyse them, amplifying the sideration. …”
    Get full text
    Article
  19. 6919

    The Potential of Lignocellulosic Biomass Hydrolysates for Microbial Oil Production Using Yeasts and Microalgae by Lesetja Moraba Legodi, Kgabo L. Maureen Moganedi

    Published 2024-01-01
    “…The use of food-based biomass and arable land for bio-oil and biofuel production could compromise global food security. Therefore, renewable and environmentally friendly oils for biofuels from oleaginous microorganisms such as yeasts and microalgae (heterotrophic and mixotrophic) are gaining interest within the scientific community. …”
    Get full text
    Article
  20. 6920

    Utilization of the Convolutional Neural Network Method for Detecting Banana Leaf Disease by Nita Helmawati, Ema Utami

    Published 2024-12-01
    “…Banana leaf diseases such as Sigatoka, Cordana, and Pestalotiopsis pose a significant threat to banana productivity, with implications for food security and the global economy. Early detection of this disease is an important step to reduce its spread and maintain crop yield stability. …”
    Get full text
    Article