Showing 8,821 - 8,840 results of 9,720 for search '"security"', query time: 0.05s Refine Results
  1. 8821

    Cabool (1842) d’Alexander Burnes : du récit de voyage au plaidoyer politique ? by Nadine André

    Published 2015-02-01
    “…It deals with the need to make the Indian subcontinent’s north-west frontier area secure, to maintain a delicate balance between the frontier’s neighbouring states, to counter the threat represented by Persia and Russia while at the same time considering these issues within the broader context of British-Russian relations. …”
    Get full text
    Article
  2. 8822

    A case report of complete cricotracheal separation: an experience from the east coast of Malaysia by Atikah Rozhan, Adam Mohamad, Khairul Azhar M. Rajet, Mohd Zaki Ahmad, Suhaimi Bin Yusof, Wan Emelda Wan Mohamed, Bathma Devi Susibalan, Nik Mohd Syukra Nik Abd Ghani, Zamzil Amin Bin Asha’ari

    Published 2022-12-01
    “…The most crucial part of managing this injury is to establish a secure airway. Tracheostomy under local anesthesia is the preferred method of airway stabilization, in order to avoid further injuries to the airway caused by endotracheal intubation. …”
    Get full text
    Article
  3. 8823

    Proof of work algorithm based on credit model by Zuan WANG, Youliang TIAN, Qiuxian LI, Xinhuan YANG

    Published 2018-08-01
    “…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
    Get full text
    Article
  4. 8824

    « Et voilà qu’arrive l’aventure ! » by Léonore Le Caisne

    Published 2019-12-01
    “…In this excerpt, Daniel Koehl recalls the mutiny at the Saint-Maur prison in 1987, of which he was one of the main leaders. The ultra-secure prison, built twelve years before, was completely destroyed during the mutiny.…”
    Get full text
    Article
  5. 8825

    Mutual authentication scheme based on the TPM cloud computing platform by Zhen-peng LIU, Feng-long WU, Kai-yu SHANG, Wen-lei CHAI, Xiao WANG

    Published 2012-11-01
    “…A mutual authentication scheme based on the TPM cloud computing platform was proposed to solve the problem of mutual authentication between user and cloud computing server.Trusted computing technology and traditional smart card password method were used in cloud computing service platform.The scheme completed the authentication of both sides in cloud computing,generated the session key according consulting,at the same time,verified the credibility of cloud service platform.Experiment analysis shows that our scheme can resist various kinds of possible attacks,so it is therefore more secure than other schemes.And the computing time meet the requirements of cloud computing environment.…”
    Get full text
    Article
  6. 8826

    A Review of Semantic Sensor Technologies in Internet of Things Architectures by Gergely Marcell Honti, Janos Abonyi

    Published 2019-01-01
    “…Intelligent sensors should be seamlessly, securely, and trustworthy interconnected to enable automated high-level smart applications. …”
    Get full text
    Article
  7. 8827

    Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm by Bin Li, Jingpeng Wang, Hailong Bao, Huiying Zhang

    Published 2014-01-01
    “…Islanding detection is essential for secure and reliable operation of microgrids. Considering the relationship between the power generation and the load in microgrids, frequency may vary with time when islanding occurs. …”
    Get full text
    Article
  8. 8828

    Effectiveness of pre-employment card policy on employment transition during covid-19: evidence from Indonesian dual labor market by Beni Teguh Gunawan, El Bram Apriyanto, Hennigusnia Hennigusnia, Ivan Lilin Suryono, Ardhian Kurniawati

    Published 2024-11-01
    “…The effectiveness of the PEC policy is measured through key indicators such as labor absorption rates, reduction in unemployment, and the likelihood of securing formal employment over informal alternatives. …”
    Get full text
    Article
  9. 8829

    Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act by Melissa M. Kreye, Elizabeth F. Pienaar, Raoul K. Boughton, Lindsey Wiggins

    Published 2016-02-01
    “… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
    Get full text
    Article
  10. 8830

    Human rights in procedural democracies: a contribution to the debate by José Armando Ponte Dias Júnior, Eneida Desiree Salgado

    Published 2021-12-01
    “…Liberal democracy – descriptive, procedural and to some extent minimalist, primarily concerned with formally securing classic individual freedoms – now faces an acute crisis, with its historic achievements threatened by populist and undemocratic ideas. …”
    Get full text
    Article
  11. 8831

    The Art of Storytelling in Science: A Personal Journey by Bruno Bezerril Andrade

    Published 2025-02-01
    “…Drawing from my experiences across Brazil, the United States of America, India, and South Africa, I explore how crafting compelling narratives enhances scientific communication, increasing the likelihood of publishing, securing funding, and building collaborations. Reflecting on formative “hot seat” sessions at the National Institutes of Health, in the United States, I emphasize the importance of structuring ideas clearly, regardless of language fluency. …”
    Get full text
    Article
  12. 8832

    Survey of research on multimodal semantic communication by Zhijin QIN, Tantan ZHAO, Fan LI, Xiaoming TAO

    Published 2023-05-01
    “…With the cross-integration of artificial intelligence and communications, technologies for processing multimodal data such as text, image, audio, and video are booming, the shared dimension of modal semantics is deeply excavated, and the characteristics of multimodal semantic information such as high abstraction, intelligence and simplicity are being fully utilized, which brings new ideas and means to semantic communications.First, the fundamental theories and classifications of semantic communication were introduced, and the research status of single-modal semantic communication was reviewed for text, image, audio, and video respectively.Then, the research status of multimodal semantic communication was reviewed, and multimodal data fusion technology and secure semantic communication were introduced.Finally, the challenges faced by multimodal semantic communication were summarized.…”
    Get full text
    Article
  13. 8833

    How to Design a Study and Write a Grant in Radiology? by Pankaj Gupta, Manphool Singhal

    Published 2025-01-01
    “…Thus, it is essential for academic radiologists pursuing research in radiology to be able to write successful grants and secure funds. In this review article, we discuss the strategies to design a study and write successful grants.…”
    Get full text
    Article
  14. 8834

    Multi-authority attribute-based encryption with efficient revocation by Kai ZHANG, Jian-feng MA, Hui LI, Jun-wei ZHANG, Tao ZHANG

    Published 2017-03-01
    “…Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups,and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition,the proposed scheme supports large universe and any monotone access structures,which makes it more flexible for practical applications.…”
    Get full text
    Article
  15. 8835

    Market Efficiency and Organizational Corruption: Study on the Impact on Shareholder Value by Renata Crosara Miari, José Marcos Carvalho de Mesquita, Daniel Jardim Pardini

    Published 2015-01-01
    “…We selected 28 events for analysis and we observed negative and positive variations of the securities in relation to the market, in the days before the disclosure, as in most o f the 20 days after publication. …”
    Get full text
    Article
  16. 8836

    Tributary by James Davoll, Paul Dolan, Pete Howson

    Published 2023-05-01
    “…Tributary explores covert, 'black-boxed' data centres (remote and highly secure sites) by tracking water and geothermal sources to the infrastructure required to power and house these physical locations of intensive computational processing. …”
    Get full text
    Article
  17. 8837

    Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act by Melissa M. Kreye, Elizabeth F. Pienaar, Raoul K. Boughton, Lindsey Wiggins

    Published 2016-02-01
    “… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
    Get full text
    Article
  18. 8838

    Identification of critical nodes in supply chain networks by Zhen Hua, Yongxiang Xia, Yucheng Chen, Weigang Sun

    Published 2025-01-01
    “…The accurate identification of the critical nodes in a SCN is important for securing the supply chain. This study proposes a new method for identifying critical nodes in SCNs based on the topological and functional characteristics of SCNs. …”
    Get full text
    Article
  19. 8839

    A Laryngoscope with Shape Memory Actuation by Fischer Nikola, Ho Patty, Marzi Christian, Schuler Patrick, Mathis-Ullrich Franziska

    Published 2024-09-01
    “…Endotracheal intubation is a medical procedure to secure a patient’s airways, which can be challenging in emergency situations due to an individual’s anatomy. …”
    Get full text
    Article
  20. 8840

    Verifiable special threshold secret sharing scheme based on eigenvalue by Yanshuo ZHANG, Wenjing LI, Lei CHEN, Wei BI, Tao YANG

    Published 2018-08-01
    “…Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12.…”
    Get full text
    Article