Showing 7,761 - 7,780 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 7761

    Study on the Path of Cultivating and Enhancing National Maritime Awareness Under the Threshold of the Great Power Game by WANG Fuxin, GE Yuxuan

    Published 2024-09-01
    “…In the current context, the game in the maritime domain extends beyond military and security aspects to encompass various fields such as maritime economy, maritime politics, maritime culture, and maritime ecology. …”
    Get full text
    Article
  2. 7762

    The Impact of Oil and Gas Resources In the Arctic on the Development of the Transport System in the Region by V. I. Salygin, I. A. Guliyev, A. O. Khubaeva

    Published 2015-08-01
    “…Given the key role of the energy sector in the economic balance of the country, as well as the problem of exhaustion of hydrocarbon resources, the Arctic is of particular interest from an economic and geopolitical point of view, ensuring the energy security of Russia. Active development of the region leads to the development of transport infrastructure, which is one of the priorities of Russia's energy policy. …”
    Get full text
    Article
  3. 7763

    Analisis Kestabilan Mobil Hemat Energi Adyatma Pada Kondisi Jalan Berbelok by muri febrian

    Published 2022-04-01
    “…This can happen because the level of security of a vehicle is not good, such as the stability of the vehicle when turning. …”
    Get full text
    Article
  4. 7764

    The Concept of Multi-track Diplomacy in Indonesian Coast Guard to Strengthen the International Maritime Relationship by Sean Narahara, Lukman Yudho Prakoso, Rudi Sutanto

    Published 2024-07-01
    “…The results of this research include that Bakamla has a crucial role in law enforcement in Indonesia's maritime areas and also has a major responsibility for the security of the nation and state from the maritime sector. …”
    Get full text
    Article
  5. 7765

    An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud by Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu

    Published 2020-02-01
    “…To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. Security analysis shows that enhanced media ciphertext-policy attribute-based encryption can successfully resist chosen-plaintext attacks under the decisional bilinear Diffie–Hellman assumption. …”
    Get full text
    Article
  6. 7766
  7. 7767

    Application and prospect of blockchain in Metaverse by Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG

    Published 2022-08-01
    “…The metaverse is a new ecology that seamlessly integrates the virtual digital world and the real physical world, and has recently attracted widespread attention from all walks of life.With the maturity of various new IT technologies such as blockchain technology, artificial intelligence technology, VR/AR and sensing technology, mobile communication technology and ubiquitous computing technology, the further development of the Metaverse is possible.At present, research on the Metaverse mainly involves industrial projects, infrastructure, key technologies, privacy and security, etc.Although blockchain technology is covered in these studies, the specific points about the advantages of blockchain applied to the Metaverse are still lacked.Blockchain technology can not only provide an open and free decentralized environment for the Metaverse, but also act as a fair and reasonable digital asset distribution mechanism.The digital identity and digital asset management in the Metaverse empowered by blockchain was studied.The development process and characteristics of the Metaverse were analyzed.And the core technologies and challenges faced by the development of the Metaverse were discussed.Meanwhile, the key technologies of the blockchain were studied, and the feasibility of applying the blockchain to the Metaverse was analyzed from two aspects: the essential characteristics of the blockchain and the advantages of other technology integration.The Metaverse ecosystem architecture was further proposed, and the blockchain-based self-sovereign identity management model, blockchain-NFT workflow and its application in the Metaverse were analyzed in detail.Furthermore, combining the latest research progress of blockchain and the Metaverse, it was pointed out that the application of blockchain to the Metaverse will be from four aspects: infrastructure, communication and computing resource management mechanisms, regulation and privacy protection, and blockchain scalability and interoperability.Then the related challenges ahead and future research directions were presented at last.…”
    Get full text
    Article
  8. 7768

    Oil palm-cattle integration: Farmer perception of Ganoderma infection by Suteky Tatiek, Dwatmadji Dwatmadji, Bustaman Hendri

    Published 2025-01-01
    “…The findings indicated that although farmers perceive several potential benefits from integrating cattle into oil palm plantations, they also confront challenges concerning security, finance, knowledge, feed availability, and disease in the cattle. …”
    Get full text
    Article
  9. 7769

    Retracted: The Application of Edge Computing Technology in the Collaborative Optimization of Intelligent Transportation System Based on Information Physical Fusion by Gongxing Yan, Qi Qin

    Published 2020-01-01
    “…Experimental data shows that intelligent transportation systems that integrate edge computing technology with information physics have improved transportation efficiency by about 20% and urban security by about 35%, which has a great effect on building smart cities and safe cities.…”
    Get full text
    Article
  10. 7770

    PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA by Patricia R. Loubeau, Robert Jantzen, Elitsa Alexander

    Published 2014-05-01
    “…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
    Get full text
    Article
  11. 7771

    “A New Ruling Class”. The mayors of Buenos Aires Province during the National Reorganization Process in Argentina by Paula Vera Canelo, Juan Pablo Kryskowski

    Published 2021-09-01
    “…The inquiry led to the following findings: i) this political elite had distinctive features, linked to the wider political and repressive goals of the dictatorship; ii) In a first period a majority of military mayors were appointed in towns considered as a “priority” for repression( densely populated, industrial, seat of important educational institutions or military facilities); iii) the profile of most of these officials was similar to that of other contemporary elites: male, professional, engaged in occupations typical of local public figures and with party affiliations characteristic of “compatible civilian leadership”; iv) the stability of their political careers was favored by traits such as a civilian background, landownership, previous experience in provincial civil service and prior political experience; and v) although the creation of a new ruling class was among the primary goals of the dictatorship, only a few of the Buenos Aires province mayors were able to secure their political survival upon the return of democratic rule.…”
    Get full text
    Article
  12. 7772
  13. 7773

    Cross pattern hiding structured encryption for conjunctive queries by YANG Ziyi, MA Changshe, XIE Nanjiang

    Published 2024-06-01
    “…Structured encryption, a specialized form of searchable encryption, has been recognized for offering improved tradeoffs between performance, security, and expressiveness. It is designed to protect the privacy of cloud storage data and supports a variety of queries on the ciphertext database. …”
    Get full text
    Article
  14. 7774
  15. 7775

    The application of grey statistical method and analytic hierarchy process in the evaluation of community park rehabilitation landscapes by Qingtao Cheng, Qiuping Li

    Published 2025-02-01
    “…The results are as follows: (1) Out of the 30 indicator factors, 13 were not selected through the GST method. (2) The weights of the criteria layer, from highest to lowest, are as follows: physical rehabilitation (D1) with a weight of 0.6370, psychological rehabilitation (D2) with a weight of 0.2583, and spiritual rehabilitation (D3) with a weight of 0.1047. (3) The highest and lowest values in the indicator layer are as follows: D1 (P14: illumination duration 0.2359, P17: hydrological conditions 0.0197); D2 (P21: sense of security 0.1433, P23: human-environment interaction 0.0162); D3 (P34: sense of pleasure 0.0400, P36: aesthetic value 0.0045). …”
    Get full text
    Article
  16. 7776
  17. 7777

    South Africa: A Growing Embrace of Feminist Foreign Policy? by Jo-Ansie van Wyk

    Published 2023-02-01
    “…A more nuanced foreign policy focus on improving the status of women and gender equality emerged partly due to international developments regarding women, peace, and security. Hence, the contribution explores feminist and/or gendered aspects of South Africa’s foreign policy of ubuntu (human-ness and humanity) and diplomatic practice, and the implications thereof. …”
    Get full text
    Article
  18. 7778

    Islamic Tourism in Africa by R. I. Bekkin, A. S. Shnyrkova

    Published 2022-03-01
    “…The main problems for the development of Islamic tourism in Africa have also been identified: underdeveloped tourist and Halal infrastructure, lack of security, and poor promotion of tourist services among potential tourists are among the most significant ones. …”
    Get full text
    Article
  19. 7779

    On a New Sustainable Energy Policy: Exploring a Macro-Meso-Micro Synthesis by Dimos Chatzinikolaou, Charis Michael Vlados

    Published 2025-01-01
    “…Traditional concerns, such as energy security, self-sufficiency, and market liberalization, are increasingly giving way to a focus on rapid, sustainable energy transitions and development at the macrolevel. …”
    Get full text
    Article
  20. 7780