Showing 8,461 - 8,480 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 8461

    Module to scaffold the process of filling grant documents in English by Cofiya Swartz, Elvira E. Valeeva

    Published 2020-06-01
    “…This barrier reduces their chance to successfully pass through several stages of the selection process to secure full financial support while competing amongst a large number of applicants. …”
    Get full text
    Article
  2. 8462

    Problems of the activity of canine units of the National Police in the conditions of war by V. S. Seliukov

    Published 2023-12-01
    “…Emphasis is also placed on new promising directions for the use of service dogs in the police and other structures of the security and defense sector. Amendments to the regulatory framework are proposed to regulate the use of K9 units. …”
    Get full text
    Article
  3. 8463

    Aplication of Gene Transfer in Aquaculture by . Alimuddin, G. Yoshizaki, O. Carman, K. Sumantadinata

    Published 2003-05-01
    “… Recently, global food security has become a hot issue by the public in national as well as out of the country. …”
    Get full text
    Article
  4. 8464

    Technical, forensic and organisational aspects of work with Monero cryptocurrency by V. V. Nosov, O. V. Manzhai, V. O. Kovtun

    Published 2023-09-01
    “…It is stated that there are currently no effective ways of such identification without knowledge of the public address and the corresponding keys, especially if users use additional security mechanisms such as connection to the TOR network. …”
    Get full text
    Article
  5. 8465
  6. 8466

    Floor of the Mouth Hemorrhage Following Dental Implant Placement or Guided Bone Regeneration (GBR) in the Atrophic Interforaminal Mandible by Domenico Sfondrini, Stefano Marelli, Rachele Patriarca, Andrea Scribante, Lorenzo Preda, Gabriele Savioli, Giorgio Novelli, Alessandro Bardazzi

    Published 2024-01-01
    “…The patients were hospitalized with nasotracheal intubation to secure the airway. In both patients, the bleeding stopped spontaneously, and after a few days, the oral floor swallowing was reduced, allowing the endotracheal tube to be removed. …”
    Get full text
    Article
  7. 8467
  8. 8468

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  9. 8469

    Paradigmatic Discord in US Arctic Policy by L. A. Matiyak

    Published 2015-04-01
    “…This is confirmed by the emergence of new actors (including traditionally non-Arctic players), the change in agenda of multilateral discussions (traditional topics, such as protection of the fragile Arctic environment, indigenous peoples of the North, have been complemented with the new "challenges" of energy security, global warming, and militarization), and the strengthening of the institutional framework (the Arctic Council has been more and more influential). …”
    Get full text
    Article
  10. 8470

    New hash function based on C-MD structure and chaotic neural network by Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA

    Published 2023-06-01
    “…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
    Get full text
    Article
  11. 8471

    Enjeux sanitaires, socio-économiques et environnementaux liés à la réutilisation des eaux usées dans le maraîchage urbain : cas du bassin versant de l’Abiergué (Yaoundé-Cameroun)... by Guy Romain Kouam Kenmogne, Francis Rosillon, Hernanie Grelle Mpakam, Alexandre Nono

    Published 2010-09-01
    “…Many practices and many risk behaviors contribute to the spread of waterborne diseases.Despite the risk of waterborne diseases, this activity contributes significantly to food security, strengthening the economic potential, development of urban space in short to improve conditions and the framework of life of the categories of actors involved in this activity in particular and population in general.Actions economically viable, socially acceptable and ecologically sustainable are to be implemented by State or NGO in order to reduce the negative aspects and strengthen the positive aspects of this multipurpose activity.…”
    Get full text
    Article
  12. 8472

    Farmers’ markets contribution to the resilience of the food systems by Agathe Lucas, Roberta Moruzzo, Giulia Granai

    Published 2024-12-01
    “…Alternative food movements, such as Farmers’ Markets (FM), claim to contribute to this transition by offering a different approach to food consumption (Bilali in Food energy secur 8: e00154, 2019). FM are spaces where producers and consumers interact directly, trading locally grown and fresh products (Chiffoleau in Agric 6:1–18, 2016; Marsden in Sociologia Ruralis 40:424–438, 2000). …”
    Get full text
    Article
  13. 8473

    Incidence of Post Instrumentation Pain Following Endodontic Treatment Among Patients Attending College of Dentistry-Hawler Medical University. by Intesar Saadallah Toma, Hussein Jamal Hashim, Muhammed Amir Salahadin, Muhammed Dana Razaq

    Published 2024-03-01
    “… Background and objective: The background of this study revolves around endodontic treatment, which is a therapeutic approach involving the chemical and mechanical disinfection of root canals, followed by the establishment of a secure three-dimensional seal. The primary objective of this research is to investigate and understand the underlying factors that contribute to flare up experienced by patients undergoing endodontic treatment. …”
    Get full text
    Article
  14. 8474

    Philosophical and Cognitive Aspects of Visual Metaphor in Political Discourse by Ekaterina L. Kabakhidze

    Published 2024-12-01
    “…Piñera) and above all are monomodal, i.e. contain only a visual code. To secure the research outcomes one more criterion to the cartoons was applied - they were supposed to depict political leaders in the metaphoric mode. …”
    Get full text
    Article
  15. 8475

    Scenario-aware access control model by Dibin SHAN, Xuehui DU, Wenjuan WANG, Na WANG, Aodi LIU

    Published 2024-02-01
    “…Dynamic access control model is the theoretical basis for constructing a dynamic access control system for big data.However, most existing access control models can only fulfill dynamic access control in a single scenario and are unable to adapt to access control in multiple types of dynamic scenarios.These scenarios include changes in the contextual environment of big data, changes in entity relationships, and changes in the state of objects.To address these issues, an analysis was conducted based on the research of existing access control models and the dynamic factors of big data.Subsequently, scenario-aware access control (SAAC) model was proposed, which was based on dynamic factor conversion and scenario unified modeling.All types of dynamic factors were converted into basic elements such as attributes and relationships.Then, scene information was incorporated to model the various types of constituent elements in a unified manner.A big data dynamic access control model was constructed based on scene information to support multi-type dynamic factors and extended dynamic factors.The working framework of the SAAC model was designed, and the SAAC rule learning algorithm and SAAC rule execution algorithm were proposed corresponding to the workflow of the framework.This enabled the automatic learning of access control rules and dynamic access control decision-making.The security of the proposed model was analyzed and verified by introducing the non-transitive non-interference theory.To validate the effectiveness of the access control policy mining method of the proposed model, experimental comparisons were conducted between the SAAC model and baseline models such as ABAC-L, PBAC-X, DTRM, and FB-CAAC using four datasets.The experimental results demonstrate that the SAAC model and its strategy mining method outperforms the baseline models in terms of metrics such as area under the curve AUC, monotonicity, and steepness of the ROC curve.This verification confirms that the proposed model can support multiple types of dynamic factors and dynamic factor extensions, and that the combined effect of the access control rules obtained from its mining algorithm is relatively high.…”
    Get full text
    Article
  16. 8476

    HSTCN-NuSVC: A Homogeneous Stacked Deep Ensemble Learner for Classifying Human Actions Using Smartphones by Sarmela Raja Sekaran, Ying Han Pang, Ooi Shih Yin, Lim Zheng You

    Published 2025-02-01
    “…Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability to retain longer-term dependencies. …”
    Get full text
    Article
  17. 8477

    The Surrogate Safety Appraisal of the Unconventional Elliptical and Turbo Roundabouts by Giovanni Tesoriere, Tiziana Campisi, Antonino Canale, Tedi Zgrablić

    Published 2018-01-01
    “…Therefore this comparative analysis allows reducing, in the preliminary phase, possible security impacts and also economic ones for the community.…”
    Get full text
    Article
  18. 8478

    An inquary on how to apply the approach of of Residents in Codification of conceptual concepts of the Persistent Iranian Neighbourhood updated with uses the Grounded theory meth... by Ensie Goharinasab, Hossein Zabihi, Shirin Toghyani

    Published 2019-09-01
    “…By means of position analysis, the final criteria were fixed. The parameters of security, sense of place, social status, spirituality and modern technology are one of the most important criteria for the survival of residents. …”
    Get full text
    Article
  19. 8479

    Redundancy and conflict detection method for label-based data flow control policy by Rongna XIE, Xiaonan FAN, Suzhe LI, Yuxin HUANG, Guozhen SHI

    Published 2023-10-01
    “…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
    Get full text
    Article
  20. 8480

    Some Basic Aspects of Militia Activities in Ukrainian SSR in 1933 by V. A. Grechenko, V. V. Rossikhin

    Published 2019-03-01
    “…The introduction of the passport system positively affected the organization of combating crime and ensuring state security, the registration of receptees was established. …”
    Get full text
    Article