Showing 6,921 - 6,940 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6921

    Chemical Composition and Nutritional Value of Three Sonchus Species by Galdino Xavier de Paula Filho, Tibério Fontenele Barreira, Helena Maria Pinheiro-Sant’Ana

    Published 2022-01-01
    “…The availabilities of these vegetables together with their high nutritional value are important factors that contribute to ensuring food security for families that have these species in their diet.…”
    Get full text
    Article
  2. 6922

    Government Efforts to Protect Habitat for the Florida Panther on Private Lands by Elizabeth F. Pienaar, Melissa M. Kreye

    Published 2016-10-01
    “…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
    Get full text
    Article
  3. 6923

    Study on the evolving role of the People’s Republic of China in resolving the conflict in the Islamic Republic of Afghanistan by F. F. Sharipov, М. A. Dyakonova

    Published 2022-01-01
    “…The People’s Republic of China’s strategy in the region has been defined and attention has been paid to security issues.Beijing’s envisaged steps to promote its projects in the region have been presented.…”
    Get full text
    Article
  4. 6924

    The Actual Problems of Modern Spain by N. E. Anikeeva

    Published 2014-12-01
    “…Spain increases its role in world politics and obtains a non-permanent UN's Security Council seat for the 2015-2016 term.…”
    Get full text
    Article
  5. 6925

    The Critical Success Factors for Sustainability Financial Technology in Vietnam: A Partial Least Squares Approach by Van Phuoc Nguyen

    Published 2022-01-01
    “…The research concluded the presented seven CSFs with the following customer centricity, low profit margin, agility, scalability, security management, innovation, and compliance easy. …”
    Get full text
    Article
  6. 6926

    The Establishment of Ramadan Principality by Fatma Akkuş Yiğit

    Published 2013-12-01
    “…They showed maximum effort during the campaigns by Mamluks onto the Armenians living in Cukurova, and after the collapse of this state, they secure their position in that region as being subject to Mamluks. …”
    Get full text
    Article
  7. 6927
  8. 6928

    Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU

    Published 2021-11-01
    “…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
    Get full text
    Article
  9. 6929

    Differential privacy budget optimization based on deep learning in IoT by Dan LUO, Ruzhi XU, Zhitao GUAN

    Published 2022-06-01
    “…In order to effectively process the massive data brought by the large-scale application of the internet of things (IoT), deep learning is widely used in IoT environment.However, in the training process of deep learning, there are security threats such as reasoning attacks and model reverse attacks, which can lead to the leakage of the original data input to the model.Applying differential privacy to protect the training process parameters of the deep model is an effective way to solve this problem.A differential privacy budget optimization method was proposed based on deep learning in IoT, which adaptively allocates different budgets according to the iterative change of parameters.In order to avoid the excessive noise, a regularization term was introduced to constrain the disturbance term.Preventing the neural network from over fitting also helps to learn the salient features of the model.Experiments show that this method can effectively enhance the generalization ability of the model.As the number of iterations increases, the accuracy of the model trained after adding noise is almost the same as that obtained by training using the original data, which not only achieves privacy protection, but also guarantees the availability, which means balance the privacy and availability.…”
    Get full text
    Article
  10. 6930
  11. 6931

    Mental health in Germany before, during and after the COVID-19 pandemic. by Alexander Patzina, Matthias Collischon, Rasmus Hoffmann, Maksym Obrizan

    Published 2025-01-01
    “…Based on nationally representative panel data (N person-years = 40,020; N persons = 18,704; Panel Labour Market and Social Security; PASS) from 2018 to 2022, we investigate how mental health changed during and after the COVID-19 pandemic. …”
    Get full text
    Article
  12. 6932

    Multi-ray channel modeling for programmable wireless environments in the terahertz band by Wenyu LUO, Hechao LIU

    Published 2019-07-01
    “…Terahertz communication system based on programmable wireless environment allowed programming customization of electromagnetic wave propagation in the most suitable ways for different wireless devices.It could not only improve serious fading,interference and non-line-of-sight problems,but also significantly enhance the security and privacy of the system.The channel modeling of terahertz wireless communication in programmable wireless environment was focused.Firstly,a multi-ray channel model for terahertz-band programmable wireless environment was established based on ray tracing technology as well as the propagation model of line-of-sight and non-line-of-sight.Then,based on the established propagation model,reflection coefficient,the broadband channel capacity under the water-filling power allocation algorithm and the RMS delayed extension were further studied.The simulation and analysis results show that the programmable wireless environment greatly reduces the influence of path loss and multipath fading in terahertz wireless transmission through active interference in electromagnetic wave transmission,improves the transmission capacity of terahertz communication system,which provides a reference for the later design of terahertz communication system,especially indoor terahertz communication system.…”
    Get full text
    Article
  13. 6933

    Anonymous whistleblowers reply scheme based on secret sharing by HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing

    Published 2024-12-01
    “…With the technology of secret sharing and encryption, the email address of the whistleblower was hidden, so that the receiving organization could reply without learning the whistleblower’s identity. The security analysis showed that the proposed scheme enabled the anonymity of both data receivers and whistleblowers at the same time. …”
    Get full text
    Article
  14. 6934

    A synchronous compression and encryption method for massive electricity consumption data privacy preserving by Ruifeng Zhao, Jiangang Lu, Zhiwen Yu, Kaiwen Zeng

    Published 2025-01-01
    “…The demand for fine-grained perception of electricity usage information in the new power system is continuously increasing, making it a challenge to address potential unauthorized data access while ensuring channel security. This paper addresses privacy in power systems requiring efficient source-load interactions by introducing a novel data compression synchronous encryption algorithm within a compressed sensing framework. …”
    Get full text
    Article
  15. 6935

    BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE by Hariz Muratović

    Published 2013-05-01
    “…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
    Get full text
    Article
  16. 6936

    Ensuring the resilience of health systems in the face of the effects of climate change by Sandrine Bouttier-Stref

    Published 2025-01-01
    “…Becoming resilient: heath infrastructures are impacted by the effects of climate change, such as the need to cool premises during heatwaves, disruptions to energy supplies, and securing logistics chains.2. Preparing for the exacerbation of chronic diseases that will lead to an overload of the health system.3. …”
    Get full text
    Article
  17. 6937

    Perfect secrecy cryptosystem with nonuniform distribution of keys by Chuanjun TIAN

    Published 2018-11-01
    “…More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its applications.How to design a basic cryptosystem by using a group of orthogonal Latin squares was first studied and an example to illustrate how to design nonlinear encryption transformations for a basic cryptosystem was given.Then,how to design the sequence of keys by using random method with nonuniform distribution was discussed,and it was strictly proven in theory that the infinite random “one-time pad” cryptosystem based on the designed basic cryptosystem was of perfect secrecy.Since the obtained result generalizes the existing one for random “one-time pad” cryptosystem to be perfect by using a basic cryptosystem with modulo addition,it may be used as a wider ideal simulated prototype to design stream cipher algorithms.Since the number of basic cryptosystems that can be designed is much more than one of the common basic cryptosystems with modulo addition,the obtained result is effective supplement and perfection to mainstream design method for the current stream cryptosystems.…”
    Get full text
    Article
  18. 6938

    Changing relationships between armaments production and exports and state defense expenditures by D. A. Repnikov

    Published 2024-10-01
    “…The key countries analysis showed that the dynamics of indicators in them is determined by different reasons, but the author came to the conclusion that the main factors of changes in the trends of armaments production and exports and defense expenditures are the following: the expansion of illegal circulation of armaments and military equipment in some countries, increased vulnerability of some countries and their direct involvement in military-political conflicts, as well as differentiation of countries’ approaches to national security, which causes different attention to defense capabilities and the defense industry development. …”
    Get full text
    Article
  19. 6939

    A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application by Maryam Zolfaghari-Nejad, Mostafa Charmi, Hossein Hassanpoor

    Published 2022-01-01
    “…Finally, chaos-based encoding/decoding algorithms for secure data transmission are developed by designing a state chain diagram, which indicates the applicability of the new chaotic system.…”
    Get full text
    Article
  20. 6940

    Human Resource Information System with Machine Learning Integration by Jake R. Pomperada

    Published 2022-06-01
    “…Based on the thorough evaluation of the experts and respondents, it was found that the human resource information system is highly usable, secured, efficient, and provides a fast and easy way to manage employees' records and predict employees over using a supervised machine learning that uses the linear regression method.  …”
    Get full text
    Article