Showing 8,881 - 8,900 results of 10,490 for search '"business"', query time: 0.15s Refine Results
  1. 8881

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article
  2. 8882

    The Concept of Greater Europe from Lisbon to Vladivostok: Problems and Perspectives by E. Yu. Il’In

    Published 2015-04-01
    “…The Ukrainian crisis has become a major strength test in the relations between Russia and the European Union, which resulted in a vast credibility gap, the «war of sanctions», the disruption of business and political ties. Notwithstanding the complexity of the situation, calls for tightening up the connections between the European and Eurasian integration projects are becoming louder. …”
    Get full text
    Article
  3. 8883

    Design of Strengthening in Agile Governance: Efforts to Develop the Tourism Sector Sustainably in Dayun Sub-District, Siak Regency by Asrida Wan, Rafi Muhammad, Pane Rico Purnawandi, Wazni Wazni, Yusri Ali, Wicaksono Baskoro, Rahmat Al Fauzi

    Published 2025-01-01
    “…Handling forest and land fire disasters can be combined with ecotourism activities in tourist village areas using the principles of agile governance, which include the development of regional information systems, the development of business-oriented community facilities, increasing community participation in tourism governance, and emphasizing the rapid resolution of problems that arise.…”
    Get full text
    Article
  4. 8884
  5. 8885
  6. 8886

    Perancangan Data Warehouse Untuk Menunjang Akreditasi Program Studi by Rokhmatul Insani, Ully Asfari, Rio Armando, I G AG Kom Agnam Melyantara

    Published 2022-10-01
    “…In addition, these colleges usually have several applications with various data storage to carry out the college's business processes. As a result, the provision of data for the accreditation process is manually by taking from various sources from various existing applications so that it will take a long time. …”
    Get full text
    Article
  7. 8887

    Cache of cryptographic key based on query popularity by Wei JIN, Fenghua LI, Ziyan ZHOU, Xiyang SUN, Yunchuan GUO

    Published 2023-02-01
    “…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
    Get full text
    Article
  8. 8888

    Additive Manufacturing and Augmented Reality as New Production Technologies in the Aviation Industry by M. G. Yevtodyeva

    Published 2020-11-01
    “…Aircraft manufacturers' revenues in services business, including maintenance, repair and overhaul (MRO) are boosting, too. …”
    Get full text
    Article
  9. 8889

    DETERMINANTS OF CORPORATE GOVERNANCE REPORTING AMONG LISTED NON-FINANCIAL FIRMS IN NIGERIA by Bolaji Ibrahim Abiola, Abiodun Lukuman Olaiya, Kamar Adeyemi, Abdelfattah Bolarinwa Jimoh

    Published 2024-10-01
    “… One of the major problems encountered by investors in developing economies is the issue of corporate governance disclosure which could lead to potential business failures as investors might lose confidence in a company. …”
    Get full text
    Article
  10. 8890

    THE IMPACT OF CORPORATE SOCIAL RESPONSIBILITY ON BANK PERFORMANCE IN NIGERIA by Ibrahim Yinka Agbeyinka

    Published 2025-01-01
    “…The study therefore recommended that firms should strategically integrate corporate social responsibility initiatives with their core business objectives to maximize the positive impact on profitability. firms should carefully evaluate the timing and scale of their corporate social responsibility investments. …”
    Get full text
    Article
  11. 8891
  12. 8892
  13. 8893
  14. 8894

    Evaluation of effectiveness of resource-saving technologies in machine-building industry by S. S. Kudryavtseva, M. V. Shinkevich

    Published 2020-06-01
    “…With the transition of production and business systems to work in the context of the formation of the sixth technological order, issues of increasing the efficiency of production processes acquire special significance and relevance. …”
    Get full text
    Article
  15. 8895
  16. 8896
  17. 8897

    Design of Arduino Computer Numerical Control Machine. by Mujurizi Frank

    Published 2023
    “…Using small machine tools to fabricate small scale parts will provide both flexibility and efficiency in manufacturing approaches and reduce capital cost, and complexity in CNC systems which is beneficial for small business owners.…”
    Get full text
    Thesis
  18. 8898

    The Role of Records Management and Good Governance at Sheema District Local Government Headquarters. by Asasiira, Priscah

    Published 2023
    “…Findings further indicated that records controls the creation and growth of records, reduces operating costs, improves efficiency and productivity, helps to assimilate new records management technologies and take advantage of their many benefits, safeguards vital information, supports better decision making, preserves the corporate memory, minimizes litigation risks, fosters professionalism in running business and ensures regulatory compliance. From the findings, challenges like lack of awareness on the importance of records management, insufficient funds to support records management activities, inadequate staff and training, outdated archival legislation, appraisal backlogs, lack of sound records management programmes and reluctance to facilitate access to information were identified. …”
    Get full text
    Thesis
  19. 8899

    Budgeting and Performance of Financial Institutions: A Case Study of Lyamujungu SACCO in Kabale Municipality. by Arinaitwe, Yosam

    Published 2023
    “…Some respondents showed that budgeting in business organizations is formally associated with the advent of industrial capitalism. …”
    Get full text
    Thesis
  20. 8900

    Challenges to Teaching and Learning of Agriculture in Secondary Schools in Rubanda West Constituency Rubanda District. by Ariyo, Vincent

    Published 2024
    “…Findings revealed that all schools offered agriculture as a subject, though it attracted fewer students compared to business studies, with which it is paired in the curriculum. …”
    Get full text
    Thesis