Showing 7,181 - 7,200 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 7181

    Petrochemical Equipment Detection by Improved Yolov5 with Multiscale Deep Feature Fusion and Attention Mechanism by Zhenqiang Wei, Shaohua Dong, Xuchu Wang

    Published 2022-01-01
    “…Petrochemical equipment detection technology plays important role in petrochemical industry security monitoring systems, equipment working status analysis systems, and other applications. …”
    Get full text
    Article
  2. 7182
  3. 7183

    Integration Dilemma within the Eurasian Space in the Context of the Ukrainian Crisis by A. A. Durdyeva

    Published 2015-06-01
    “…In the current situation for Belarus and Kazakhstan as two , along with Russia , the main designers of the Eurasian field, the dilemma of integration takes a fundamentally different meaning and becomes a so-called "Dilemma of integrations", or contradiction between the desire of these countries to secure the most favorable conditions in its relations with Moscow and reluctance to fully bear the burden of the costs and constraints arising in relations with the EU due to the commitments of the EAEC. …”
    Get full text
    Article
  4. 7184
  5. 7185

    Harnessing UV radiation for enhanced agricultural production: benefits on nutrition, quality, and sustainability by Gideon Sadikiel Mmbando

    Published 2024-12-01
    “…This review offers essential knowledge and methods for using UV radiation as a safe tool to increase global food security.…”
    Get full text
    Article
  6. 7186

    Tonalität als geschichtliches System. ›Dogmatische Denkform‹ und historischer Nachweis by Michael Polth

    Published 2016-01-01
    “…Understanding a system and understanding a historical development call for different strategies of perception and methods of securing scientificity. The tension between these two strategies has a subliminal influence on the nature of Dahlhaus’s Studies on the Origin of Harmonic Tonality since the author succeeds – for the most part subtly – in concealing this tension but ultimately fails to resolve it.…”
    Get full text
    Article
  7. 7187

    Multi-alignment under "Uneven Multipolarity": India’s Relations with Russia in an Evolving World Order by Nivedita Kapoor

    Published 2023-05-01
    “…It argues that India's perception of the balance of threats has shifted with respect to China, particularly in the Asia-Pacific and Indian Ocean regions, which are crucial to India's national security and future power projection ambitions. In the current context of uneven multipolarity, the capabilities of the US and China exceed those of weaker major powers, such as India, Russia, and Japan, without tipping the system into explicit bipolarity. …”
    Get full text
    Article
  8. 7188

    THE NIGERIA MILITARY AND THE FIGHT AGAINST ISLAMIC STATE`s WEST AFRICA PROVINCE (ISWAP), 2016-2022 by BABA ALI KELLU, RUTH CALEB LUKA LUKA, MOHAMMED BELLO BABAN’UMMA

    Published 2024-09-01
    “…The findings from the study revealed that there were several offensives by the Nigerian military against ISWAP with the aim of neutralizing their fighters by destroying their camps and hideouts and restoring peace and security in the affected areas, certain strategies exhibit significant shortcomings, necessitating continuous refinement. …”
    Get full text
    Article
  9. 7189

    A Better Model for Socio-economic Governance? by Bryn Jones, Peter Nisbet

    Published 2011-06-01
    “…Investigation shows a bias towards external and brand-related, rather than internal priorities of job security and the social capital of workplace communities. …”
    Get full text
    Article
  10. 7190

    GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY by I. V. Surma

    Published 2013-08-01
    “…In article it is shown that the information support of foreign policy and international relations of the stands in one row with such priority issues of world policy as non-proliferation of nuclear weapons, restriction and prohibition of weapons of mass destruction, settlement of regional conflicts and peace-making, strengthening of comprehensive security, the preservation of cultural heritage and promotion of human rights.…”
    Get full text
    Article
  11. 7191

    Normal Deviance: The Dreyfus Affair by Marie-Christine Leps

    Published 2005-12-01
    “…Enmeshing issues of security and nation, of population and race, the Dreyfus affair forced governments, intellectuals, media, and what we now refer to as the ‘new social movements’ into wide-ranging debates and strategic interventions that forged new relations among them. …”
    Get full text
    Article
  12. 7192

    The potential for justice through tourism by Freya Higgins-Desbiolles

    Published 2018-09-01
    “…This article considers the potential for tourism to contribute to efforts to secure justice. It reviews the evolution of tourism from a respected tool for personal development and social transformation to its now industrialised form under neoliberalism where its value is estimated in terms of employment and income. …”
    Get full text
    Article
  13. 7193

    Synchronization in Finite Time of Fuzzy Neural Networks with Hybrid Delays and Uncertain Nonlinear Perturbations by Shuyue Zhao, Kelin Li, Weiyi Hu

    Published 2022-01-01
    “…Finally, the validity of our proposed results is confirmed by several examples and simulations. Furthermore, a secure communication problem is presented to further illustrate the fact of the obtained results.…”
    Get full text
    Article
  14. 7194

    Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI

    Published 2021-10-01
    “…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
    Get full text
    Article
  15. 7195

    Deep learning-based method for mobile social networks with strong sparsity for link prediction by HE Yadi, LIU Linfeng

    Published 2024-06-01
    “…Link prediction, the process of uncovering potential relationships between nodes in a network through the use of deep learning techniques, is commonly applied in fields such as network security and information mining. It has been utilized to identify social engineering attacks, fraudulent activities, and privacy breach risks by predicting links between nodes within a network. …”
    Get full text
    Article
  16. 7196

    Research on the design and application of role-resource based access control model by LAI Tianping, WANG Yongchao, LUO Pan, GAO Zhitong

    Published 2024-11-01
    “…Future research can further optimize the R-RBAC model and explore its applications in other domains to achieve more efficient and secure permission management.…”
    Get full text
    Article
  17. 7197

    Method of privacy protection based on multiple edge servers in personalized search by Qiang ZHANG, Guojun WANG, Shaobo ZHANG

    Published 2019-02-01
    “…In the plaintext environment,users' personalized search results can be obtained through users' interest model and query keywords.However,it may possibly result in the disclosure of sensitive data and privacy,which prevents using sensitive data in cloud search.Therefore,data is generally stored in the form of ciphertext in the cloud server.In the process of cloud search service,users intend to quickly obtain the desired search results from the vast amount of ciphertext.In order to solve the problem,it was proposed that a method of privacy protection based on multiple edge servers in personalized search shall be used.By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server.The cloud server only needs to get the relevance score on the edge server and make a simple processing that can return to the most relevant Top K files by user query,so as to make it particularly suitable for a large number of users in the massive personalized ciphertext search.Security analysis and experimental results show that this method can effectively protect users’ privacy and data confidentiality.In addition,it can guarantee high efficiency in search to provide better personalized search experience.…”
    Get full text
    Article
  18. 7198

    Yield and Profitability of Sweet Potato (Ipomoea batatas (L.) Lam) as a Function of Increasing Levels of Phosphorus and Varieties in Southern Ethiopia by Mesfin Dawit, Abera Habte

    Published 2023-01-01
    “…Sweet potato is among the most important food security crops in Ethiopia. However, its productivity is constrained by poor soil fertility and a lack of improved varieties. …”
    Get full text
    Article
  19. 7199

    An Innovative Policy For Rural Development? Rethinking Barriers to Rural Communities Earning Their Living from Forests in Indonesia by Ahmad Maryudi

    Published 2014-12-01
    “…Those coupled by the limited capacityas technical assistance rarely provided by government institutions appear to impede local people to secure better livelihood.…”
    Get full text
    Article
  20. 7200

    Perspectives juridiques sur le passé colonial belge, entre déni et justice by Marie-Sophie de Clippele

    Published 2024-05-01
    “…Although necessary to ensure a form of legal security and social stability, criminal prescription does however have some exceptions, mainly for heinous crimes. …”
    Get full text
    Article