Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4601
Design, Simulation, and Experimental Verification of a Destruction Mechanism of Transient Electronic Devices
Published 2020-01-01“…To quickly destroy electronic devices and ensure information security, a destruction mechanism of transient electronic devices was designed in this paper. …”
Get full text
Article -
4602
Sustainable food management systems in pesantren
Published 2024-01-01“…Pesantren, Islamic boarding schools in Indonesia, play a crucial role in the education and well-being of students, making the implementation of sustainable food systems vital for enhancing food security and nutrition. This study aims to provide a comprehensive bibliometric analysis of sustainable food management systems in pesantren using data from the Scopus database. …”
Get full text
Article -
4603
Financial Inclusion and Women Empowerment in Uganda A Case of Lango Sub Region, Northern Uganda
Published 2018“…The study therefore recommended that Government should establish buffers to serve as collateral security for women who intend to secure financial credit. …”
Get full text
Article -
4604
Understanding, anticipating and managing health risks linked to climate migration
Published 2025-01-01“…Migration can improve the health and security of refugees, but also more broadly the health and security of people in host and home countries.…”
Get full text
Article -
4605
THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION
Published 2015-03-01“…The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. …”
Get full text
Article -
4606
Privacy-preserving digital rights management scheme in cloud computing
Published 2014-02-01“…Compared with existing DRM schemes in cloud computing, the proposed scheme which not only protects the data security and user privacy, but also supports fine-grained access control, and supports online and super-distribution application modes, is more applicable in the copyright protection for cloud computing.…”
Get full text
Article -
4607
Hydrothermal Synthesis of Pt-, Fe-, and Zn-doped SnO2 Nanospheres and Carbon Monoxide Sensing Properties
Published 2013-01-01Get full text
Article -
4608
Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles
Published 2019-07-01“…The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme.…”
Get full text
Article -
4609
Cache privacy protection strategy in content centric networking
Published 2015-12-01“…Cache privacy leak was one of the important security threats of CCN,the adversary could obtain the legitimate user’s privacy information through probing cache visiting time.Aiming at this security problem,the privacy and non-privacy contents were dealt separately,then a cache privacy protection strategy based on recent visiting information and evicted copy up (CPPS-RVI&ECP) was proposed.In order to compare with the current typical defense strategy-random first k delay (RFKD),the theoretical analysis of privacy leak probability and network hit probability are further given.The CPPS-RVI&ECP identifies the recent visitor by setting privacy mark in interest packet,decreases the privacy leak probability by selecting replacing position randomly,and promotes the network performance by the mechanism of shifting evicted copy upstream.The numeric analysis results under the prescribed experimental conditions show that,whereas the ideal privacy protection ability of RFKD is obtained at the expense of sacrifice of cache contents delivery capability,the proposed CPPS-RVI&ECP can obtain low privacy leak probability and in the meantime maintain high network hit probability by setting reasonable upstream shifting probability.…”
Get full text
Article -
4610
Using Genetic Algorithms for Navigation Planning in Dynamic Environments
Published 2012-01-01“…The proposed algorithm may respond to the concurrent constraint updates in a shorter time for dynamic environment. The most secure navigation of the air vehicle is planned and executed so that the fuel consumption is minimum.…”
Get full text
Article -
4611
Democracy and Fake News in the Age of Cyberspace
Published 2020-12-01“…For this purpose, we first discussed the social contract theory, which deals with the peaceful and secure coexistence of societies. Then, the relationship between the spread of fake news in cyberspace and the cyber security system that needs to be created against it and the social contract that needs to be rebuilt in today's societies are mentioned. …”
Get full text
Article -
4612
Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
Published 2019-11-01“…In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol,a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed.Through the design of C commitment function,the real identity information of two participants involved was hidden.Based on RLWE difficult problem,under the premise to ensure identity anonymity,this protocol not only completed two-way identity authentication,but also ensured the integrity of the transmitted message,furthermore,the shared session key was negotiated.After been analyzed,in terms of protocol’s execution efficiency,only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme.Compared with Ding’s protocol,the length of public key was reduced by nearly 50%.With regard to security,the protocol could resist forgery,replay,key-copy,and man-in-the-middle attacks.It is proved that the proposed protocol satisfies the provable security under the eCK model.At the same time,the protocol is based on the RLWE problem of lattices,and can resist quantum computing attacks.…”
Get full text
Article -
4613
Prediction and Analysis of Saltwater Intrusion in Pearl River Estuary Based on Machine Learning
Published 2025-01-01“…To enhance the water supply security of coastal cities, it is necessary to analyze and predict saltwater intrusion. …”
Get full text
Article -
4614
An Event Causality Identification Framework Using Ensemble Learning
Published 2025-01-01Get full text
Article -
4615
Integrating artificial intelligence into healthcare systems: opportunities and challenges
Published 2024-10-01“…To address these concerns, healthcare organizations must promote a culture of accountability, ensuring that healthcare providers remain vigilant about patient data security. Overall, the article underscores the potential of AI to revolutionize healthcare while emphasizing the need to address the ethical, technical, and security challenges it brings.…”
Get full text
Article -
4616
WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY
Published 2019-11-01“…Many critics of Donald Trump argue that Donald Trump’s Grand Strategy is an absence of Grand Strategy or that his foreign and security policy is driven by impulses and tactical approach. …”
Get full text
Article -
4617
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
4618
Federated learning-based user access strategy and energy consumption optimization in cell-free massive MIMO network
Published 2023-10-01“…To solve the problem that how users choose access points in cell-free massive multiple-input multiple-output (CF-mMIMO) network, a prioritized access strategy for poorer users based on channel coefficient ranking was proposed.First, users were evaluated and ranked for their channel quality and stability after channel sensing, and suitable access points were selected in sequence according to the order of the channel state information.Second, considering issues such as users' energy consumption and data security, a federal learning framework was used to enhance user's data privacy and security.Meanwhile, an alternating optimization variables algorithm based on energy consumption optimization was proposed to optimize the multi-dimensional variables, for the purpose of minimizing the total energy consumption of the system.Simulation results show that compared with the traditional user-centric in massive MIMO, the proposed access strategy can improve the average uplink reachable rate of users by 20%, and the uplink rate of users with poor channels can be double improved; in terms of energy consumption optimization, the total energy consumption can be reduced by much more than 50% after optimization.…”
Get full text
Article -
4619
TERRORISM AND POLITICS IN NIGERIA
Published 2023-12-01“…It concludes by highlighting the imperative for a multidimensional approach to address these complexities and collaboratively work towards a more secure and peaceful Nigeria. …”
Get full text
Article -
4620
Urbanisation et viabilité de l'activité maraîchère : cas d'une ville à statut particulier au Bénin (Parakou)
Published 2010-09-01“…None of them gave a guarantee to the market gardeners for undertaking sustainable investment because they don't have any secured property title. It appears also that, nothing is made to facilitate the development of market production that assures people food security in Parakou.…”
Get full text
Article