Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3921
-
3922
Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors
Published 2021-07-01“…The experimental results over unknown scenarios taken from LivDet 2011 to LivDet 2017 show that our proposal reduces the top state‐of‐the‐art average classification error rates by up to four times, thereby making it suitable in real applications demanding high security. In addition, the best single configuration achieved the best results in the LivDet 2019 competition, with an overall accuracy of 96.17%.…”
Get full text
Article -
3923
Angus: efficient active learning strategies for provenance based intrusion detection
Published 2025-01-01Get full text
Article -
3924
Experimental Investigation of MgAl-NO2 and MgAl-CO3 LDHs on Durability of Mortar and Concrete
Published 2021-01-01Get full text
Article -
3925
-
3926
Transmission Lines Insulator State Detection Method Based on Deep Learning
Published 2025-01-01Get full text
Article -
3927
COMMUNITY POLICING AS A PANACEA FOR MITIGATING ARMED BANDITARY IN CENTRAL NIGERIA
Published 2023-08-01“…Findings from this study reveal that the locals should be empowered for enhanced effective and efficient community policing structure as the success of food security can only be guaranteed by security of lives and property. …”
Get full text
Article -
3928
Reinforcement Learning Based Stochastic Shortest Path Finding in Wireless Sensor Networks
Published 2019-01-01Get full text
Article -
3929
-
3930
Legal bases of material support of militia workers of the Ukrainian SSR in the 20s of the XX century
Published 2021-12-01“…The legal acts of the Ukrainian SSR, which established the conditions and amounts of social security and remuneration of militia workers, were studied. …”
Get full text
Article -
3931
Locarno Treaties (1925) in the Context of the Versailles System Transformation as seen from London
Published 2021-04-01“…It allows the authors to trace the evolution of approaches by the main British political parties to security issues in Europe. A systematic comparison of views of the Conservative and the Labour party representatives on the Geneva Protocol and the Rhineland Pact shows that by mid-1920s the British political elites advocated for an in-depth transformation of the Versailles order, particularly, through the development of an effective mechanism for maintaining international security. …”
Get full text
Article -
3932
Machine Learning-Integrated Usability Evaluation and Monitoring of Human Activities for Individuals With Special Needs During Hajj and Umrah
Published 2025-01-01“…These acts of worship are still very challenging for the mobility, security, and accessibility of people with special needs. …”
Get full text
Article -
3933
Web-Based File Sharing System: A Case Study of Kabale University.
Published 2023“…Security, user - friendly and cross platform capability are the main purposes of the new Web-based File Sharing System. …”
Get full text
Thesis -
3934
Wireless VPN network structure and safety protection in the north and south call center of SGCC
Published 2016-02-01“…The existing access security risks and the cannot-control defects of wireless virtual private network were analyzed,and the solutions for the center were given. …”
Get full text
Article -
3935
Research and application of Internet of things in power transmission and distribution system
Published 2018-03-01“…Power industry is the important energy industry which relates to national economy and the people’s livelihood,and it has a significant meaning to ensure safe and stable operation of power transmission and distribution system.Combined with monitor and operation requirement of power transmission and distribution system,application system for monitoring,inspection,security and interactive service of layered power transmission and distribution system was built based on Internet of things technology.Meanwhile,framework and solutions for security system of electricity Internet of things was established,and demonstration project for system verification was established.…”
Get full text
Article -
3936
A detection method of Android system vulnerabilities based on matching
Published 2016-05-01“…Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android users.Android system vulnerabilities were studied,and a rapid detection method of Android system vulnerabilities based on matching was proposed.A script-based vulnerability scanning tool was also designed.Through the evaluation of experiments,the tool is running well.…”
Get full text
Article -
3937
Extended integer tent maps and dynamic hash function
Published 2010-01-01“…Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance of the middle iteration process of the hash function was enhanced without extending intermediate states.Preliminary security testing indicates that,this hash function has a high degree of security,and it can be realized easily with great rapidity.The algorithm of hash function is an ideal subsititution for traditional hash function.…”
Get full text
Article -
3938
Projet de réaménagement de la réserve non visitable du Laténium (Suisse)
Published 2014-03-01“…In order to restore this space’s function as a secure collections storage area, a reorganization project was launched. …”
Get full text
Article -
3939
On the Front Lines: Helping Military Spouses Thrive in Your Community
Published 2024-01-01“…This publication discusses military spouse demographics, military spouse employment, military spouse well-being including food security, financial security, and civilian community belonging, and employment resources and strategies to support military spouses. …”
Get full text
Article -
3940
Predicate-based authenticated key exchange protocol with attribute-hiding
Published 2012-09-01“…To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new protocol could be reduced to GBDH assumption in the modified eCK model.At the same time,for inheriting the security property of attribute-hiding from the inner product encryption scheme,the proposed protocol guarded against disclosure of users’ sensitive information.…”
Get full text
Article