Showing 3,581 - 3,600 results of 5,943 for search '"securities"', query time: 0.10s Refine Results
  1. 3581

    Time-and-ID-Based Proxy Reencryption Scheme by Kambombo Mtonga, Anand Paul, Seungmin Rho

    Published 2014-01-01
    “…We prove that our scheme is semantically secure in the standard model.…”
    Get full text
    Article
  2. 3582

    A New Approach to Assessing the Accuracy of Forecasting of Emergencies with Environmental Consequences Based on the Theory of Fuzzy Logic by Eduard Tshovrebov, Vladimir Moshkov, Irina Oltyan and Filyuz Niyazgulov

    Published 2024-12-01
    “…Prevention of the occurrence and development of emergencies of a natural and man-made nature is one of the basic fundamental foundations of ensuring the national security of any state. The most important mechanism for preventing emergencies is an effective system of monitoring and forecasting emergencies established at the state level. …”
    Get full text
    Article
  3. 3583

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing by Jue-Sam Chou

    Published 2012-01-01
    “…Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. …”
    Get full text
    Article
  4. 3584

    Energy Efficient Partial Permutation Encryption on Network Coded MANETs by Ali Khan, Qifu Tyler Sun, Zahid Mahmood, Ata Ullah Ghafoor

    Published 2017-01-01
    “…Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. …”
    Get full text
    Article
  5. 3585

    5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix by Geeta Biban, Renu Chugh, Anju Panwar, Mohammad Sajid

    Published 2024-01-01
    “…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
    Get full text
    Article
  6. 3586
  7. 3587

    Prioritizinghydrological erosion-prone response units in Latyan catchment by Ali ahmad abadi, amir karam, Mohsen PourbashirHir

    Published 2015-12-01
    “…Soil erosion in watersheds, causing problems such as the loss of agricultural land productivity and reduce soil surface layer, endangering the life of reservoirs and water utilities, loss of soil fertility, increasing flood, threatening human food security, etc. The negative effects of soil erosion, watershed management operations to improve care. …”
    Get full text
    Article
  8. 3588

    Zvezda Shipyard Project: Global Implications and Its Influence on the Russian Economy by I. I. Sechin

    Published 2024-04-01
    “…This strategy addresses both socio-economic goals and defense and security challenges. Additionally, the paper provides quantitative analyses of the multiplicative effects generated by the Zvezda Shipyard project's realization.…”
    Get full text
    Article
  9. 3589

    Study on the Influence of Tectonic Stress on Stability of Horseshoe-Shaped Tunnels by Xin Lv, Shuzhi Wang, Yu Qiu, Xiangxin Liu

    Published 2021-01-01
    “…The numerical model of the tunnel is built by FLAC3D, and the influence of the magnitude and direction of structural stress on the horseshoe-shaped tunnel is studied in detail. Finally, the security support of the tunnel is discussed. Results show that the stress concentration phenomenon is easily focused on the left, right, and bottom sides of the tunnel; these places should therefore be the focus of attention of tunnel stability analysis. …”
    Get full text
    Article
  10. 3590

    Optimal Scheduling of Multi-Energy Complementary Systems Based on an Improved Pelican Algorithm by Hongbo Zou, Jiehao Chen, Fushuan Wen, Yuhong Luo, Jinlong Yang, Changhua Yang

    Published 2025-01-01
    “…In recent years, the global power industry has experienced rapid development, with significant advancements in the source, network, load sectors, and energy storage technologies. The secure, reliable, and economical operation of power systems is a critical challenge. …”
    Get full text
    Article
  11. 3591

    REGIONS OF RUSSIA IN THE CORONAVIRUS PANDEMIC by N. Z. Zotikov

    Published 2020-12-01
    “…At  the present stage of development, taking into account the changed economic situation in the world, the issues of  economic security of the regions are of particular importance. …”
    Get full text
    Article
  12. 3592

    Energy Transition in Azerbaijan: Advantages of System Value Analysis and Strategic Role of the Global Climate Actors by Atiye Beyhan Akay, Sanem Özer, Senem Atvur

    Published 2024-12-01
    “…We argue that Azerbaijan's strategic engagement with the EU is crucial, as it serves as a means for Europe to bolster energy security and assist Azerbaijan in its political drive and strategy for transitioning to green energy. …”
    Get full text
    Article
  13. 3593

    A platform for Bioengineering Tissue Membranes from cell spheroids by Quang Bach Le, Hariharan Ezhilarasu, Weng Wan Chan, Alok Tanala Patra, Priya Murugan, Shashaank Abhinav Venkatesh, Yean Kai Tay, Shin Ru Lim, Ahmad Amirul Abdul Rahim, Jia Sheng Zach Lee, Xuezhi Bi, Deepak Choudhury

    Published 2025-04-01
    “…To overcome this, we developed a method to assemble spheroids into a thin layer by using two mesh scaffolds to spread them evenly, and a solid frame with grid to secure the assembly. This allows the spheroids to fuse into a thin membrane-like tissue, allowing better medium diffusion during cell culture. …”
    Get full text
    Article
  14. 3594

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. …”
    Get full text
    Article
  15. 3595

    Control system for aquatic biological resources in the Northern fisheries basin of Russia by S. S. Vopilovskii

    Published 2022-01-01
    “…It has been determined that the allocation of aquatic biological resources for industrial fishing is managed on the basis of Russian regulatory legal acts, and the implementation of the tasks of developing the fishery sector and ensuring the country’s food security is consistent with the implementation of the Basic State Policy of Russia. …”
    Get full text
    Article
  16. 3596

    The assessment of environment protection cooperation in the South China Sea by Satyawan Ignatius Agung

    Published 2025-01-01
    “…Located in a strategic position and geopolitics significance, the South China Sea is rich of biodiversity so it has abundance of fish stock to sustain food security among people in the coastal area. Since the increase of urbanization along the coastal area, pollution becomes inevitable. …”
    Get full text
    Article
  17. 3597

    Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption by Chao Li, Mengna Shi, Yanqi Zhou, Erfu Wang

    Published 2021-01-01
    “…The bit error rate and similarity coefficient of the voice signal are extracted by testing the source voice signal SA1, SA2, and SI943 under different SNR, and the similarity coefficient, uncertainty, and disorder of the observed signal and the source voice signal SA1, SA2, and SI943 verify the effectiveness of the proposed speech signal extraction method and the security of quantum chaos used in speech signal encryption.…”
    Get full text
    Article
  18. 3598

    FEATURES OF DIGITALIZATION OF RELATIONSHIPS IN THE INDUSTRIAL MARKET by A. V Zheregelya

    Published 2020-03-01
    “…However, the issues of security, protectability, stability, continuity, integrity and reliability of operations and work with information are of particular importance, which makes high demands on the digital shell of the enterprise.…”
    Get full text
    Article
  19. 3599

    Covid-19 and the Call to Sanitize Human Conscience by Prem Xalxo SJ

    Published 2021-09-01
    “… Amidst the unprecedented health crisis, annihilation of economy and social security, and upsurge in the loss of job opportunities caused by Covid-19, the emergence of a dynamic global spirit of collaboration has reinvigorated the human ability to work together to respond collectively to any peril that threatens the integral well-being of the entire humanity. …”
    Get full text
    Article
  20. 3600

    Continuous User Verification in Cloud Storage Services using Deep Learning by burhan albayati

    Published 2025-01-01
    “…The behavior profiling technique has been successfully investigated as an additional intelligent security measure for continuous verification users after the simple login. …”
    Get full text
    Article