Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4841
IMPROVING THE DEVELOPMENT OF SMALLHOLDER COCOA PLANTATIONS IN PADANG PARIAMAN DISTRICT
Published 2024-11-01“…Policy recommendations that can be implemented by the Department of Agriculture and Food Security of Padang Pariaman Regency in an effort to increase the development of smallholder cocoa plantations include; 1). …”
Get full text
Article -
4842
Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing
Published 2022-01-01“…Anonymization of data is done at the point of collection in order to safeguard the data. More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
Get full text
Article -
4843
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01“…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
Get full text
Article -
4844
CONCEPTUALIZING THE LIVEABLE AFRICAN CITY
Published 2013-05-01“…Issues investigated include governance, safety and security, culture and global identity, environmental indices and infrastructure. …”
Get full text
Article -
4845
Transboundary Water Resources Conflict Analysis Using Graph Model for Conflict Resolution: A Case Study—Harirud River
Published 2021-01-01“…One of the most important environmental issues today is the water crisis and the ensuing security challenges. Of these, transboundary waters pose the most significant security challenges. …”
Get full text
Article -
4846
ECONOMIC CRIME UNDER MARTIAL LAW IN UKRAINE
Published 2024-12-01“…Consequently, the prevailing national security and defence strategy falls short in ensuring the alignment of the Ukrainian security sector with the scientific and practical imperatives. …”
Get full text
Article -
4847
Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024)
Published 2025-01-01“…Overall, this research offers valuable insights into the efficacy of PSYOP in influencing audiences and contributes to the broader understanding of persuasion theory in the context of modern information warfare and national security. …”
Get full text
Article -
4848
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01“…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
Get full text
Article -
4849
Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm
Published 2025-02-01“…In this study, Federated Learning is utilized to improve the security and privacy through empowering nodes to train the model deprived of distribution complex data. …”
Get full text
Article -
4850
The contribution of Electronic Records Management towards Organisational Performance: A case study of Stanbic Bank-Kabale Branch.
Published 2023“…Lastly, the researcher recommended the construction of ERMS facilities, improve ERMS security, encourage corroborations, have government support, and provide maximum training as better solutions for the topic under study.…”
Get full text
Thesis -
4851
The role of wireless sensor networks in the modern landscape: a concise examination
Published 2022-06-01“…Wireless sensor networks are fast process of connection in part such as agriculture, healthcare, environmental monitoring, security, and manufacturing and also it thesaurus and measure physical signals and it also have wireless communication. …”
Get full text
Article -
4852
Self-Reported Diabetes in Older Adults: A Comparison of Prevalence and Related Factors in the Mexican Health and Aging Study (2015, 2018, and 2021)
Published 2024-01-01“…Conclusion: An elevated prevalence of diabetes was found in older adults in Mexico, while not having access to social security was associated with a higher possibility of presenting diabetes and living in a rural area was associated with a lower possibility of presenting diabetes. …”
Get full text
Article -
4853
Why most African states may be at war with each other in 2063
Published 2019-10-01“…The Agenda 2063, which was created in 2015, groups its objectives into four broad categories: inclusive growth; integration; governance; security; cultural identity; women and youth; and partnership …”
Get full text
Article -
4854
Identity-based ring signature scheme under standard model
Published 2008-01-01“…An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. …”
Get full text
Article -
4855
Kink of Subclavian Artery Mimicking Stenosis
Published 2016-01-01“…In this asymptomatic case, we have merged clinical and multiple imaging modalities to secure the diagnosis and treatment plan.…”
Get full text
Article -
4856
Fine-grained access control scheme with user privacy protection in cloud storage systems
Published 2014-11-01“…Based on the actual demands of cloud storage system,a new multi-authority ABE (MA-ABE) scheme is constructed to support user privacy protection and attribute revocation.For enhancing efficiency and alleviatingowner’s computing load,the complex computing works involved in attribute revocation are delegated to a trusted third party orcloud server.The proposed scheme is provably secure under the DBDH assumption.…”
Get full text
Article -
4857
Research on the Application of Reverse PoE
Published 2014-02-01“…Based on the power supply demands of broadband access network,the equipments,wiring surrounding,multi-users balanced power supply and administration,security/protection about the reverse PoE application were studied and a test was done in laboratory.All those can provide reliable theory and experience for the reverse PoE construction and promote the development of the application of reverse PoE.…”
Get full text
Article -
4858
Two new species in the green lacewing genus Santocellus (Neuroptera, Chrysopidae, Leucochrysini)
Published 2025-02-01“…As a result, the genus, which now contains five known species, becomes more securely defined. An updated catalog and an illustrated key to the known Santocellus species are provided.…”
Get full text
Article -
4859
Construction of the content extraction signature scheme based on the thought of the batch scheme
Published 2018-12-01“…The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.…”
Get full text
Article -
4860
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
Published 2009-01-01“…Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protocol was proposed, which elaborately eliminates the defect of previous protocol and improved the efficiency of existing schemes.…”
Get full text
Article