Showing 1,021 - 1,040 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1021

    Reduction algorithm based on supervised discriminant projection for network security data by Fangfang GUO, Hongwu LYU, Weilin REN, Ruini WANG

    Published 2021-06-01
    “…In response to the problem that for dimensionality reduction, traditional manifold learning algorithm did not consider the raw data category information, and the degree of clustering was generally at a low level, a manifold learning dimensionality reduction algorithm with supervised discriminant projection (SDP) was proposed to improve the dimensionality reduction effects of network security data.On the basis of the nearest neighbor matrix, the label information of the raw data category was exploited to construct a supervised discriminant matrix in order to translate unsupervised popular learning into supervised learning.The target was to find a low dimensional projective space with both maximum global divergence matrix and minimum local divergence matrix, ensuring that the same kind of data was concentrated and heterogeneous data was scattered after dimensionality reduction projection.The experimental results show that the SDP algorithm, compared with the traditional dimensionality reduction algorithms, can effectively remove redundant data with low time complexity.Meanwhile the data after dimensionality reduction is more concentrated, and the heterogeneous samples are more dispersed, suitable for the actual network security data analysis model.…”
    Get full text
    Article
  2. 1022
  3. 1023
  4. 1024

    VOLUNTEER MOVEMENT IN UKRAINE AS AN ELEMENT OF THE NATIONAL SECURITY SYSTEM: MODERNITY AND PROSPECTS by Євгеній СЛЮСАР

    Published 2024-12-01
    Subjects: “…volunteer movement, national security of Ukraine, humanitarian aid, Armed Forces of Ukraine, social activism, national stability…”
    Get full text
    Article
  5. 1025
  6. 1026
  7. 1027
  8. 1028
  9. 1029

    Joint beamforming optimization algorithm for secure cognitive radio based on STARS by Chenchi WEN, Jiakuo ZUO, Nan BAO, Pengfei ZHAO

    Published 2024-03-01
    “…Secure cognitive radio (SCR) system based on reconfigurable intelligent surface (RIS) assumes that secondary user (SU) and primary user (PU) locate on the same side of the base station (BS), which can only cover part of the communication area and limits the deployment flexibility and effectiveness of the RIS.In order to solve the above problem, a new SCR system based on simultaneously transmitting and reflecting surface (STARS) was proposed.In the system, STARS could achieve full coverage of communication area, improve the received signal strength of the SU with the transmission beamforming vector and reduce the interference of the SU to the PU with the reflection beamforming vector, which provided new optimization degree of freedom (DoF) for the design of the SCR system.Considering secrecy rate constraint of the SU, interference power constraint (IPC) of the PU and transmission/reflection parameters constraint of the STARS, BS active beamforming vector and STARS transmission/reflection beamforming vectors were jointly optimized to minimize the BS’s transmit power from the perspective of reducing the total power consumption of the system.The minimization problem is a variable coupling non-convex problem, which is difficult to tackle directly.An alternating optimization (AO) algorithm based on difference-of-convex relaxation (DCR) method and sequential rank-one constraint relaxation (SROCR) method was proposed to jointly design the BS active beamforming vector and STARS transmission/reflection beamforming vectors.Simulation results show that the proposed algorithm has good convergence performance and effectively reduces the interference of SU on PU.Compared with the traditional RIS, random phase, maximum-ratio transmission (MRT) and equal energy splitting (Equal ES) schemes, the BS transmitting power is reduced by 8.3%, 15.4%, 5.9% and 5.3%, respectively.…”
    Get full text
    Article
  10. 1030

    Joint resource configuration method for secure fog computing Internet of things by Shibo ZHANG, Hongyuan GAO, Yumeng SU, Jianhua CHENG, Lishuai ZHAO

    Published 2023-07-01
    “…The current fog computing Internet of things (IoT) systems are prone to eavesdropping attacks in the process of physical communication transmission, and the existing research on fog computing has not effectively solved this problem.In order to realize the physical layer security (PLS) communication of the fog computing IoT to against the malicious eavesdropping of multiple eavesdroppers, a physical-layer secure fog computing Internet of things (PSFC-IoT) system was proposed.The secrecy rate of the proposed system in the secure communication scenario was analyzed, a joint resource management method based on the quantum bean optimization algorithm (QBOA) was proposed to solve the resource allocation problem of the network.The convergence performance of the proposed method was analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on system secrecy performance.In addition, the simulation results show that the proposed method can achieve the best secrecy performance for various communication scenarios.…”
    Get full text
    Article
  11. 1031
  12. 1032

    Risk assessment and prevention in airport security assurance by integrating LSTM algorithm. by Yao Hu, Liguang Qiao, Feng Gu

    Published 2025-01-01
    “…It monitored the airport security situation in real-time based on the results and quickly notified airport security personnel to handle it. …”
    Get full text
    Article
  13. 1033
  14. 1034
  15. 1035

    The role of digital health in pandemic preparedness and response: securing global health? by Chisom Ogochukwu Ezenwaji, Esther Ugo Alum, Okechukwu Paul-Chima Ugwu

    Published 2024-12-01
    “…Background Digital health technologies, such as mobile applications, wearable devices, and electronic health record systems, have significantly enhanced global health security by enabling timely data collection and analysis, identifying infectious disease trends, and reducing infection risk through remote services. …”
    Get full text
    Article
  16. 1036
  17. 1037
  18. 1038
  19. 1039
  20. 1040

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article