Showing 8,441 - 8,460 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 8441
  2. 8442

    A Privacy-Preserving Reputation Evaluation System with Compressed Revocable One-Time Ring Signature (CRORS) by Xu Han, Dawei Zhang

    Published 2024-12-01
    “…The ring signature (RS), enabling anonymous group-based signing, has garnered attention for building secure and private reputation systems. However, RS-based systems face significant challenges, including the inability to identify malicious users who repeatedly sign the same message, the lack of mechanisms to reveal identities involved in unlawful activities, and a linear growth in signature size with the number of ring members, which poses storage challenges for certain applications. …”
    Get full text
    Article
  3. 8443

    Deprivation of Land Tenure to Daughters of Mother Earth by Sonene Nyawo

    Published 2023-07-01
    “…Ordinarily, only male household heads are eligible to secure land through the customary process known as “kukhonta” that initiates males into the chiefdom and marks their commitment and allegiance to the chief. …”
    Get full text
    Article
  4. 8444
  5. 8445

    Managing online crisis-communication response in a South African bank by Rachel Barker

    Published 2022-10-01
    “…However, very little research has examined the management of online crisis-communication response messages in the online-security sphere. The knowledge management paradigm constitutes a way in which the acquisition, transfer and assimilation of information can be effectively used to manage and control messages in an online crisiscommunication response situation, in particular through maximising consumers’ motivation and capability to act in response to perceived online-transaction risks. …”
    Get full text
    Article
  6. 8446

    Yorùbá Literary Artists on Youths and Parenthood by Olufadekemi Adagbada, Olatunde Adeleye Adeyemo, Ejitoyosi O. Salami

    Published 2022-01-01
    “…The natural psycho-biological development of youths and young adults, living in a nation going through socio-political economic and security challenges, coupled with their being nurtured in some cases through faulty parenting, have manifested in the typology of Nigerian youths. …”
    Get full text
    Article
  7. 8447

    Improving Super-Resolution in Face Images by Modeling Image Degradation Using Pairs of High-Quality and Low-Quality Images by Ahmad Dolatkhah

    Published 2025-01-01
    “…<p><span style="font-size: 10.0pt; line-height: 125%; font-family: 'Georgia',serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Georgia; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-US; mso-fareast-language: JA; mso-bidi-language: AR-SA;">&nbsp;</span><span style="font-size: 11pt; line-height: 125%; font-family: Calibri, sans-serif;">Improving image quality for identification and authentication in security and surveillance systems is of particular importance, and today, using artificial intelligence, the quality of images can be significantly improved. …”
    Get full text
    Article
  8. 8448

    Problems of proving in criminal proceedings based on violations of war laws and customs by A. V. Shulzhenko

    Published 2022-06-01
    “…It is proposed to establish operational cooperation between investigators and the Security Service of Ukraine, to develop a unified methodology for investigating crimes related to violations of the laws and customs of war. …”
    Get full text
    Article
  9. 8449
  10. 8450

    Impact of human resource characteristics of internal accounting system on post-earnings announcement drift: Evidence from Korea by Haeyoung Ryu, Soo-Joon Chae

    Published 2023-12-01
    “…The findings of the study indicate that as efficiency is secured, stemming from the scale of personnel managing internal accounting control systems and their expertise, market investors’ understanding and trust of accounting information also increase. …”
    Get full text
    Article
  11. 8451

    Supported employment interventions for workplace mental health of persons with mental disabilities in low-to-middle income countries: A scoping review. by Edwin Mavindidze, Clement Nhunzvi, Lana Van Niekerk

    Published 2023-01-01
    “…Deductive thematic analysis was used to synthesize evidence on the supported employment interventions implemented in LMICs, capturing evidence of their outcomes for persons with mental disabilities securing competitive work.<h4>Results</h4>The search yielded 7347 records and after screening by title and abstract, 188 studies were eligible for full article screening. …”
    Get full text
    Article
  12. 8452

    Energy-efficient and reliable dual closed-loop DC control system for intelligent electric vehicle charging infrastructure. by Jun Li, Wan Chen, Xiaoqiong Zhu, Baoguo Zang, Cong Zhang, Hengxiao Hu, Ming Zhang, Wenbao Lei

    Published 2024-01-01
    “…The study contributes to the development of efficient, secure technology for the next generation of wireless networks and power systems, providing a robust empirical basis for the proposed control strategies through MATLAB/Simulink simulations. …”
    Get full text
    Article
  13. 8453

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article
  14. 8454

    An Approach to Predicting Energy Demand Within Automobile Production Using the Temporal Fusion Transformer Model by Andreas Lenk, Marcus Vogt, Christoph Herrmann

    Published 2024-12-01
    “…To continue to ensure a secure, economical, and needs-based energy supply, additional information is needed to efficiently control these systems. …”
    Get full text
    Article
  15. 8455
  16. 8456

    Trends and constraints of utilization of preserved cowpea leaves among households in arid and semi-arid lands in Kenya: a convergent mixed method study by J. O. Owade, G. O. Abong’, M. W. Okoth, A. W. Mwang’ombe

    Published 2021-11-01
    “…Abstract Background As much as local communities have employed traditional techniques of preservation to enhance availability and utilization of cowpea leaves, the efficiency of these techniques in achieving food security need to be established. The current study sought to document trends and constraints of utilization of preserved cowpea leaves in the arid and semi-arid lands (ASALs) in order to overcome of seasonal availability of the vegetable. …”
    Get full text
    Article
  17. 8457

    Social risks of e-learning in a digital society by E. V. Chmykhova

    Published 2020-05-01
    “…The characteristic of risk types has been made in relation to such characteristics of modern society as the complexity of self-organization processes, the open nature and non-linearity of transformation processes.The understanding of various types of risks has been explained, that are associated with the problems of implementing the goals of humanistic educational policy; incomplete integration of methodological tools for e-learning; the break in educational traditions; conflicts between subjects of educational relations; the lack of adaptability of digital technologies to the content of social interaction; the complexity of the nature of distance learning technologies in the modern supercomplex socio-global system; impact on the formalization of learning new types of rationality; objectively inherent in modern society’s global social risks; conflicts of social movements with the interests of the subjects realizing the functions of education; with the indivisibility of the security of complex society in different spheres and levels of social interaction. …”
    Get full text
    Article
  18. 8458
  19. 8459

    Impact of the COVID-19 Crisis on the Regulation to Tourism in the Czech Republic by Lukáš Novotný, Pavlína Pellešová

    Published 2021-05-01
    “…On the basis of the research, the most important aid factors were identified: financial aid, greater support from the State and municipalities, exemption of social security and health insurance payments, promotion of tourism and guide services, support in the form of upgrading skills and retraining. …”
    Get full text
    Article
  20. 8460

    Methodology of building cultural and public framework of arctic cities on the example of Salekhard city by N. V. Danilina, A. E. Korobeinikova, A. R. Khazbulatova

    Published 2023-10-01
    “…It is also obvious that the connectivity of attraction objects in the complex climate of the Arctic cities is a necessary condition for security. The methodology of building a cultural and public framework in the Arctic cities will allow to form a coherent network of public spaces in the city, increase the comfort and safety of the living environment for residents, as well as help to develop tourist routes in the city.…”
    Get full text
    Article