Showing 6,961 - 6,980 results of 9,720 for search '"Securities ', query time: 0.14s Refine Results
  1. 6961

    A privacy-preserving collaborative reputation system for mobile crowdsensing by Bayan Hashr Alamri, Muhammad Mostafa Monowar, Suhair Alshehri

    Published 2018-09-01
    “…We provide a detailed security analysis to prove the effectiveness of privacy-preserving collaborative reputation system against a number of attacks. …”
    Get full text
    Article
  2. 6962

    Nature Capital. An ecological transition and open space transformation phenomena by Renzo Lecardane

    Published 2023-06-01
    “… As indicated by the UN 2030 Agenda and the new European goals for 2030, Ecological Transition is at the basis of the new development model to reduce polluting emissions, prevent and combat land disruption, minimise the impact of productive activities on the environment and improve the quality of life and environmental security for future generations: on the one hand, orienting an ecological transition towards equity and collective well-being means rethinking the system of relations between man and the natural and built environment and, on the other hand, referring to the construction of social and cultural communities starting from environmental issues and land resources. …”
    Get full text
    Article
  3. 6963

    Relationship Between Income Inequality And Economic Growth: A Comparative Analysis Of Developed And Developing Countries by Erdem Bağcı

    Published 2019-04-01
    “…For example, in the provision of basic needs, education, health, social security and entrepreneurship, all member of the society should benefit from public facilities at an adequate level.…”
    Get full text
    Article
  4. 6964

    PROBLEMS OF TRADE AND ECONOMIC RELATIONS OF WEST AFRICAN COUNTRIES WITH THE EUROPEAN UNION, PROSPECTS FOR THEIR DEVELOPMENT by N. B. Sekongo

    Published 2020-05-01
    “…The essence of relationships between West Africa and the European Union based on the papers, both foreign and domestic researchers in the field of security, regional economic development and integration etc. has been disclosed. …”
    Get full text
    Article
  5. 6965

    Design and realization of compressor data abnormality safety monitoring and inducement traceability expert system. by Yuan Wang, Shaolin Hu

    Published 2025-01-01
    “…To promptly monitor abnormal changes in compressor data and trace the causes leading to these data anomalies, this paper proposes a security monitoring and root cause tracing method for compressor data anomalies. …”
    Get full text
    Article
  6. 6966

    Efficient i-DFA construction algorithm based on state grouping by Deng-ke QIAO, Qing WANG, Ting-wen LIU, Yong SUN, Li GUO

    Published 2013-08-01
    “…Regular expression matching plays an important role in many network and security applications.DFA is the preferred representation to perform regular expression matching in high-speed network,because of its high and stable matching efficiency.However,DFA may experience state explosion,and thus consume huge memory space.As a classical solution for the problem of state explosion,i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time.However,prior methods are inefficient in both time and space during the construction of i-DFA.An efficient i-DFA construction algorithm based on the idea of state grouping was proposed.Furthermore,a formal description for the problem of state grouping was given,and it was proved that it was NP-hard to get the best state grouping result.Thus,based on local search strategy,a near-optimal algorithm was introduced to divide states into different groups.Compared with the classical construction method,the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.…”
    Get full text
    Article
  7. 6967
  8. 6968

    Russia’s inventive activity in new technological trends by V. V. Narbut

    Published 2024-06-01
    “…Consideration of the relationship among the indicators can be used to make decisions in the field of intellectual property, which can contribute to the intellectual security of Russia and serve as a basis for technological independence.…”
    Get full text
    Article
  9. 6969

    Gazetecilik Yıllarında Bülent Ecevit ve Anti-Komünizm (1950-1961) by Ferit Salim SANLI

    Published 2021-12-01
    “…Ecevit, who sees communism as a means for the Soviets' ambitions in Turkey and the world, and thinks that this will create a security threat, argued that the Soviets have ambitions on Turkey and that they use communism as an instrumental in this way. …”
    Get full text
    Article
  10. 6970

    A Survey of Farmers’ Perceptions on Maize and Sorghum Storage Duration and Level of Pest Infestations in the Case of Two Selected Districts of Jimma Zone, Ethiopia by Nezif Abamecha

    Published 2021-01-01
    “…While in Ethiopia, like in other east African countries, Maize and sorghum were an important postharvest chain for food security and income sources for small-scale rural farmers. …”
    Get full text
    Article
  11. 6971

    South Africa’s Battle Against COVID-19 Pandemic by Ke Yan Loo, Jodi Woan-Fei Law, Loh Teng Hern Tan, Vengadesh Letchumanan

    Published 2022-02-01
    “…As the country struggles to secure and administer COVID-19 vaccines to its people, the Coronavirus has been rapidly mutating and causing new waves of infections within the nation. …”
    Get full text
    Article
  12. 6972

    Social Mobility in the Balkans: Border Policing Practices Are Potentially Letting Through Mostly the Members of the “Elite Club” by Tibor Bardóczy

    Published 2024-12-01
    “…This is why the book Border Policing and Security Technologies: Mobility and Proliferation of Borders in the Western Balkans is highly relevant and actual, as it attempts to fill this gap. …”
    Get full text
    Article
  13. 6973

    Research on Access Authentication and Re-Authentication Mechanism of User Devices in Terrestrial Default Scenario in Satellite Internet by Qiuyu BU, Jin CAO, Lifu CHENG, Ruhui MA, Hui LI

    Published 2023-06-01
    “…For the current user device access authentication mechanism requires ground participation to bring about large communication delays and poor scalability, a user device access authentication and re-authentication protocol in the ground default scenario in the space-ground integrated network was proposed, and further for the user device authentication process may occur in the power outage reconnection and AV asynchronization and other problems, a user device fast authentication mechanism and AV fast security synchronization mechanism under power failure reconnection scenario were proposed to ensured that users could safely accessed the satellite network and obtain related services.In the proposed scheme, the AV vector generated in the initial access authentication was used to assisted the re-authentication process to completed the authentication between entities without the involvement of the network control center, which guaranteed the communication system resilience.The formal verification tool Scyther showed that the proposed protocol was resistant to common protocol attacks, guaranteed the confidentiality and integrity of the communication process, and had a small signaling, computational, and bandwidth overhead, made it suitable for the satellite internet.…”
    Get full text
    Article
  14. 6974

    Business ecosystem sustainability management by Yu. N. Kafiyatullina, E. E. Panfilova

    Published 2022-06-01
    “…The development of research in the field of sustainable development of business ecosystems is related to the consideration of information security issues for agents of the digital economy.…”
    Get full text
    Article
  15. 6975

    Application and risk response of deep synthesis technology by Jingwen LI, Yawen LI

    Published 2023-04-01
    “…Deep synthesis technology is a widely used application in the field of artificial intelligence, particularly in intelligent services, audio and video production, media communication and information services.A basic research was conducted on the principle and implementation of deep synthesis technology.And the application of deep synthesis technology were analyzed, such as robot writing, voice synthesis, intelligent customer service, voice replication, face synthesis, posture manipulation, virtual characters and virtual scenes.Based on the analysis of the characteristics and development trend of the application of deep synthesis, the risks brought by the application of deep synthesis technology were summarized, such as the generation and dissemination of false information, infringement of the legitimate rights and interests of others, utilization by other illegal and criminal activities, and impact on national security.The measures taken by the EU, United States and China to govern the application of deep synthesis technology were studied and the countermeasures were recommended such as building a comprehensive regulatory rule system, strengthening technical supervision, and improving risk prevention awareness across society.Furthermore, the need for intelligence, authenticity, and universality in the application of deep synthesis technology was highlighted.Based on the analysis of the characteristics and development trends of deep synthesis technology, a comprehensive insight into the potential risks and countermeasures associated with its application governance were provided.…”
    Get full text
    Article
  16. 6976

    BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE by Hariz Muratović

    Published 2013-05-01
    “…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
    Get full text
    Article
  17. 6977

    Application of 5G to current differential protection of distribution network by Yuxiang LV, Yang YANG, Yawen DONG, Yucheng WANG

    Published 2020-02-01
    “…Driven by the strategy of grid as a Platform,Hub,and Sharing as well as the construction of Energy Internet and Ubiquitous power Internet of Things declared by Sate Grid Corporation of China,the intelligent distribution network evolves towards Distribution Internet of Things in a gridding and multi-source manner.The traditional distribution network protection and feeder automation barely meets the self-healing requirements of a strong distribution network.The current differential protection is prevailing due to its favorable quick-acting,sensitivity and selectivity.The existing communication solutions baring protection signals includes:fiber channel,230MHz/1.8GHz private wireless network,etc.However,the above methods are usually costly and perhaps with poor stability and low real-time performance.An realistic baring scheme for current differential protection of distribution network over the fifth generation communication system (5G) was proposed,where the of sampling data transmission between differential protection devices was realized based on 5G new radio technology.Thanks to the advantages of low latency,high capacity,security,etc.,5G-based differential protection can dynamically adjust the configuration to accommodate the topology changes,and thus can reduce the transformation and maintenance cost of distribution network.…”
    Get full text
    Article
  18. 6978
  19. 6979

    İngiliz Konsolos James Henry Monahan’ın Raporlarında Bitlis Vilayeti (1896-1898) by Emel DEMİR GÖRÜR

    Published 2020-06-01
    “…In our study, the famine in Bitlis province of 1896-1898 and the subsequent migration events, the tax issue, various debt systems applied within the province, the livelihoods of the people, security problems, the issue of Kurdish guards (bekdji) and the socio-economic structure of the province were examined in detail.…”
    Get full text
    Article
  20. 6980

    Disaster Management and Identification of Safe and Hazardous Landslide Zones in Rural Areas of Sarwabad County by vahid riahi

    Published 2015-03-01
    “…Moreover, it is found that nearly 46 percent of the rural population and 31 villages of the area are located in safe or low-hazard-level landslides, while the rest of the settlements and rural population are located in the mid and high-hazard-level zones and, as such, are need to be secured in these zones.…”
    Get full text
    Article