Showing 6,941 - 6,960 results of 9,720 for search '"Securities ', query time: 0.16s Refine Results
  1. 6941

    Lifetime Optimization of an Indoor Surveillance Sensor Network Using Adaptive Energy-Efficient Transmission by Guifang Qiao, Guangming Song, Ying Zhang, Jun Zhang, Jin Peng

    Published 2015-02-01
    “…The energy consumption of transmitting images without transmission security mechanism reduces by 21%. And it saves 11.7% of energy that an image is transmitted with the lowest transmission power. …”
    Get full text
    Article
  2. 6942
  3. 6943

    The role of the Indonesian child protection commission in the Papua province conflict by Yuspani Asemki, Titin Purwaningsih

    Published 2024-12-01
    “…The findings starkly expose a pervasive lack of attention and security afforded to Papuan children by pertinent institutions, consequently exposing them to elevated social risks, such as alcoholism, promiscuity, and substance abuse. …”
    Get full text
    Article
  4. 6944

    A Simplified 3D Model for Tunnel Pile Interaction by Nawel Bousbia

    Published 2024-12-01
    “…A detailed parametric survey that will be made to put in evidence influences it of the different parameters geometric and mechanical on the interaction between shallow tunnel and an existing piles and security objectives. And for understand furthermore the problem of interaction mechanism between micropiles and tunnel, principally when piles are positioned in close proximity to tunnels. …”
    Get full text
    Article
  5. 6945

    Using Virtual Reality in the Classroom: Reflections of STEM Teachers on the Use of Teaching and Learning Tools by Bekir Yildirim, Emine Sahin-Topalcengiz, Gokhan Arikan, Serkan Timur

    Published 2020-04-01
    “…The potential problems of using VR were not asked the teachers; however, teachers mentioned that online safety and security, student access, and technology gaps were the problems they faced. …”
    Get full text
    Article
  6. 6946
  7. 6947

    Establishment of Big Data Index System of Water Resources Scheduling in Pearl River Basin by JIANG Liangyong, LI Jiqing, CHEN Siyu

    Published 2020-01-01
    “…Therefore, it is urgent toconstruct a set of big data index system for water resources scheduling in Pearl River Basin.Under the guidance of binary water cycle theory, and based on analytic hierarchy process andinformation resource planning method, this paper determines the six goals, i.e. flood control,power generation, water supply, saltwater resistance, shipping and ecological security in PearlRiver Basin, and fuses the measured data such as hydrometeorology, stage-discharge, water qualityand water ecology during water resources scheduling in the Pearl River Basin under the conditionof the Internet of Things and auxiliary information such as humanity and economy, ecologicalenvironment, flood disaster and Internet, classifies all indexes of the pressure term, state termand response term, and establishes the big data index system of water resources scheduling inPearl River Basin based on “Pressure-State-Response (PSR)”model, which provides a decision basisfor water resources management and scheduling in Pearl River Basin.…”
    Get full text
    Article
  8. 6948

    Agricultura urbana em Portugal: práticas espontaneas e institucionalizadas by Rosangela Medeiros Hespanhol

    Published 2019-12-01
    “…Urban agriculture came to stand out in the world scenario in the last years of the twentieth century and beginning of the XXI, due to the greater concern of the population with food security and the aggravation of social, economic and environmental problems in the cities. …”
    Get full text
    Article
  9. 6949

    Government Efforts to Protect Habitat for the Florida Panther on Private Lands by Elizabeth F. Pienaar, Melissa M. Kreye

    Published 2016-10-01
    “…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
    Get full text
    Article
  10. 6950
  11. 6951

    Ukrayna Örneğinden Hareketle Nükleer Silahsızlanmanın Olası Sonuçlarına Dair Bir İnceleme by Eray ALIM

    Published 2020-06-01
    “…By way of conclusion, it is argued in the context of the 2014 crisis that, denuclearization constitutes a potential national security risk for states (Ukraine) that face formidable nuclear-armed rivals (Russia).…”
    Get full text
    Article
  12. 6952

    Access Control for Autborized Video in Information-Centric Networking by Zifei Zhou, Xiaobin Tan, Yukun Niu, CZou Cliff

    Published 2014-09-01
    “…After the analysis, the access control scheme for authorized videos has a good performance in both security and network resource optimization.…”
    Get full text
    Article
  13. 6953

    Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations by ANGPan Y, UIXiao-lin G, AOJing Y, INJian-cai L, IANFeng T, HANGXue-jun Z

    Published 2015-01-01
    “…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
    Get full text
    Article
  14. 6954

    School of Energy Diplomacy by V. I. Saligin

    Published 2014-10-01
    “…Russia's cooperation with international community in finding ways of addressing global energy security, serves its national interests on international arena. …”
    Get full text
    Article
  15. 6955

    Distributed data storage and transmission for space Internet of things by Qinyu ZHANG, Shushi GU, Ye WANG, Jiayin XUE

    Published 2018-12-01
    “…Based on the concepts and related techniques of Internet of things (IoT),tracking the development tendency of the satellite IoT and LEO constellation communication system abroad,and the deployment of the integrated satellite-terrestrial information network in China,the concept of space Internet of things (Space IoT) with its framework and main characteristics was proposed.Space IoT has the different concept compared to the traditional IoT,not just using the relay satellite to implement remote machine-to-machine communication.Space IoT is a ubiquitous IoT system under the integrated satellite-terrestrial information network architecture,and an expansion of the terrestrial IoT in the global three-dimensional world,and a service and application platform of multiple information technologies.With the recently era of big data,the space IoT has to face some data storage and transmission problems,such as excessive system load,data loss,frequent link interruption,high energy consumption,etc.Establishing a space-oriented IoT integrated distributed storage and transmission system was to meet the requirements of security guarantee and cross-domain interconnection with massive information businesses.Development status of related technologies were illustrated.At last,the prospect and thought of the future research of space Internet of things were presented.…”
    Get full text
    Article
  16. 6956

    Desplazados de Haití: movilidad intrarregional sudamericana y las medidas compulsivas en Brasil y Chile by Joseane Mariéle Schuck Pinto, Rodrigo Ríos Álvarez

    Published 2020-01-01
    “…In relation to the procedure to be adopted, it is observed that through qualitative research it will be possible to account for the different representations on the subject under study, without neglecting the quantitative method, as it will contribute to the evaluation and categorization of contained data in government information databases, such as data from the Ministry of Justice and Public Security of Brazil, the National Institute of Statistics and the Judiciary of Chile, and the Institute of Public Policies and Human Rights of Mercosur, with the elaboration of a diagnosis of the displacement of Haitians in South American countries, with special emphasis on the migratory realities of Haitians in Brazil and Chile. …”
    Get full text
    Article
  17. 6957

    Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations by Erwin Alexander Leal Piedrahita

    Published 2019-11-01
    “…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
    Get full text
    Article
  18. 6958
  19. 6959

    Research on context-aware Android application vulnerability detection by Jiawei QIN, Hua ZHANG, Hanbing YAN, Nengqiang HE, Tengfei TU

    Published 2021-11-01
    “…The vulnerability detection model of Android application based on learning lacks semantic features.The extracted features contain noise data unrelated to vulnerabilities, which leads to the false positive of vulnerability detection model.A feature extraction method based on code information slice (CIS) was proposed.Compared with the abstract syntax tree (AST) feature method, the proposed method could extract the variable information directly related to vulnerabilities more accurately and avoid containing too much noise data.It contained semantic information of vulnerabilities.Based on CIS and BI-LSTM with attention mechanism, a context-aware Android application vulnerability detection model VulDGArcher was proposed.For the problem that the Android vulnerability data set was not easy to obtain, a data set containing 41 812 code fragments including the implicit Intent security vulnerability and the bypass PendingIntent permission audit vulnerability was built.There were 16 218 code fragments of vulnerability.On this data set, VulDGArcher’s detection accuracy can reach 96%, which is higher than the deep learning vulnerability detection model based on AST features and APP source code features.…”
    Get full text
    Article
  20. 6960

    Mobile Music Distribution: A Multichannel Approach by Marco Furini

    Published 2011-01-01
    “…The architecture includes a license-based security mechanism that prevents unauthorized usage of digital music, and makes use of an incentive mechanism to stimulate and reward the music distribution among customers. …”
    Get full text
    Article