Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4361
-
4362
An Improved Harmony Search Algorithm for Proactive Routing Protocol in VANET
Published 2021-01-01Get full text
Article -
4363
Tibetan–Chinese speech-to-speech translation based on discrete units
Published 2025-01-01Get full text
Article -
4364
An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion
Published 2025-01-01“…The AE-FNN model’s high accuracy, robustness, and scalability position it as a valuable tool in securing interconnected IoT ecosystems, making it an important advancement in network security.…”
Get full text
Article -
4365
The End of Akıncı Corps in The Ottoman Empire
Published 2013-12-01“…It has been known that the Akıncıs were in the Ottoman Empire an extention of the corps which provided the border security of the Turkish states. They were named in the Seljuki period as “margraves”. …”
Get full text
Article -
4366
U.S.-UK Voting Cohesion in the United Nations General Assembly: Important Votes (2001–2019)
Published 2022-05-01“…Since most UNGA resolutions are not binding, countries have more room for maneuver compared to voting in the UN Security Council. Washington pays close attention to other countries’ voting behavior in the UNGA, especially when it comes to Israel-related issues. …”
Get full text
Article -
4367
Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game
Published 2025-01-01“…This approach allows us to identify energy-efficient scenarios and improve network security by distorting the attacker’s perception of the target. …”
Get full text
Article -
4368
Aspect category sentiment analysis based on pre-trained BiLSTM and syntax-aware graph attention network
Published 2025-01-01Get full text
Article -
4369
Refugee securitization and the challenges of formal integration: case of Somali refugees in Kenya and Ethiopia
Published 2025-01-01“…Policymakers and the media prominently feature the migration-security connection and depict refugees as threats to internal security, linking their presence to acts of terrorism and crime. …”
Get full text
Article -
4370
A Novel Bond Anchor for Unidirectional FRP Member: Conceptual Design and Experimental Investigation
Published 2021-01-01Get full text
Article -
4371
Model of the malicious traffic classification based on hypergraph neural network
Published 2023-10-01“…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
Get full text
Article -
4372
A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts
Published 2025-01-01“…The lattice-based multi-identity fully homomorphic encryption scheme combines the quantum security of lattice cryptography with the advantage of identity-based encryption. …”
Get full text
Article -
4373
Impact of telemedicine mobile units on health outcomes, healthcare system resilience, and disaster response in flood-affected areas: a case study of Sehat Kahani
Published 2024-06-01“…We identified themes related to resource analysis, accessibility, security, scalability, training, evaluation, collaboration, and sustainability. …”
Get full text
Article -
4374
High speed national secret SM4 optical fiber communication system scheme based on FPGA
Published 2023-12-01“…With the increasing use of optical fiber communication technology in the Industrial Internet of Things, cryptographic algorithms play a crucial role in ensuring the security of data transmission in embedded device environments.The SM4 packet cipher algorithm, developed independently in our country, is widely applied to wireless LAN and Internet of Things data encryption.However, the software-based encryption and decryption processes are relatively slow, which hampers their application in scenarios requiring high real-time performance, especially for embedded devices.To address this issue, a high-performance and secure optical fiber communication system was designed based on the FPGA platform and the SM4 algorithm.The FPGA was used to implement the MAC layer interface for SM4 algorithm encryption and decryption, as well as data transmission.Besides, an optimization scheme for the hardware implementation architecture of the SM4 algorithm was proposed.The critical path was shortened by employing a pipeline method, thereby improving the system clock frequency.Additionally, parallel processing of S-box transformation was accelerated to enable efficient data replacement.To reduce data reading delays, a dual-cache processing method was combined to facilitate easier processing of cache data and significantly reduce packet loss rates.This scheme greatly enhanced system data throughput.Experimental results demonstrate that compared to similar designs, the throughput of the SM4 algorithm encryption and decryption module in this scheme reaches up to 25.6 Gbit/s, with minimal differences in resource consumption.Due to limitations imposed by the 10-gigabit SFP+ optical module, the throughput of the entire optical fiber communication system reaches 9.4 Gbit/s.For 128-bit data, the average encryption speed is 0.47 μs/bit and the average decryption speed is 0.28 μs/bit, which can be applied to a variety of secure communication scenarios in the internet of things.…”
Get full text
Article -
4375
THE IMPACT OF FISCAL POLICY TOOLS ON AGRICULTURAL PRODUCTION: TÜRKIYE AS A MODEL
Published 2024-12-01“…Because of its ability to achieve food security and support the level of economic performance in both developing and developed economies. …”
Get full text
Article -
4376
Economic impact of fetal wastage and common diseases, along with their incidence rates and seasonal variations, at an abattoir in FCT, Nigeria.
Published 2025-01-01“…The notable economic losses from condemned organs also underscore the necessity of implementing pregnancy tests for female animals before slaughter to protect food security and support the nation's economy. These findings highlight the essential role of abattoirs in improving food security, detecting zoonotic diseases, and bolstering public health and economic stability in low-income countries.…”
Get full text
Article -
4377
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01Get full text
Article -
4378
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
Get full text
Article -
4379
Food Insecurity and Coping Strategies in War-Affected Urban Settings of Tigray, Ethiopia
Published 2025-01-01“…This study aimed to examine the effects of prolonged armed conflict on food security among urban households in Tigray, Ethiopia, and to examine their coping mechanisms. …”
Get full text
Article -
4380
Dual medical image watermarking using SRU-enhanced network and EICC chaotic map
Published 2024-12-01“…Accordingly, enhancing the integrity and security of medical images has gained significant prominence as a crucial research trajectory. …”
Get full text
Article