Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5121
Survey of research on future network architectures
Published 2014-08-01“…Nowadays, the Internet is facing unprecedented challenges, including scalability, security, management, mobil-ity, content distribution capability, and energy saving, etc., which are difficult to solve through incremental development. …”
Get full text
Article -
5122
Ciphertext policy attribute-based encryption scheme supporting direct revocation
Published 2016-05-01“…In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given,and a con-crete scheme was constructed which was proven its security under the standard model.Compared to the existing related schemes,the size of ciphertext and private/secret key was reduced.In additional,the new scheme achieved fine-grained and immediate attribute revocation which is more suitable for the practical applications.…”
Get full text
Article -
5123
Key technologies and new challenges on body area networks
Published 2018-03-01“…As the rapid development of sensing,low-power integrated circuit and wireless communication techniques,body area network becomes a new technology to monitor human health,which provides a new solution for information medical treatment.The key technologies of body area network was firstly introduced,including energy consumption,data transmission,security and privacy and human health data processing.Finally,a series of new challenges in body area network systems was proposed.…”
Get full text
Article -
5124
Overview of the detection and prevention study of hardware Trojans
Published 2017-04-01“…The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electronic devices.After introducing the concept of hardware Trojans,the characteristics and its forms were briefly analyzed.Then the detection technologies,and the prevention strategies of the hardware Trojans were discussed.At last,the development trend of the hardware Trojans was summarized.…”
Get full text
Article -
5125
Extreme Precipitation and Floods: Monitoring, Modelling, and Forecasting
Published 2017-01-01Get full text
Article -
5126
Biocatalytic conversion of microalgal biomass to biodiesel: optimization of growth conditions and synthesis of CaO bionanocatalyst from Monoraphidium sp. NCIM 5585
Published 2025-02-01“…Abstract Microalgal feedstock is a potential source for biodiesel production that addresses the challenges of fuel security and sustainable agriculture. This study aims to maximize biomass yield and lipid accumulation for freshwater microalga Monoraphidium sp. …”
Get full text
Article -
5127
Forensic Pathology of Society-Oriented Expert Identification Institutions in China: A Retrospective Study by 11-year Data from Academy of Forensic Science
Published 2024-12-01“…Conclusion: The Academy of Forensic Science and other social-service-oriented identification organizations undertake identification work on cases commissioned to them by the local and local people’s public security, people’s procuratorates, and people’s court systems. …”
Get full text
Article -
5128
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01“…CTI continuously provides up-to-date information which enables the design and implementation of better security measures and mitigation strategies. Organisations gather data from different sources either internal or external to the organisation, which are analysed, resulting in CTI. …”
Get full text
Article -
5129
Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments
Published 2025-01-01“…The swift proliferation of IoT devices has brought about a multitude of complex cyberattacks that breach network security and compromise user privacy. To address these threats, this paper proposes a synaptic intelligent convolutional neural network (SICNN) model for intrusion detection in dynamic IoT environments. …”
Get full text
Article -
5130
Temperature variability and its effect on seasonal yield of rice in Bangladesh: a long-term trend assessment
Published 2025-12-01“…To ensure climate-resilient food security, targeted regional policy planning and implementation are imperative.…”
Get full text
Article -
5131
Patterned Lead‐Free Double Perovskite/Polymer Fluorescent Piezoelectric Composite Films for Advanced Anti‐Counterfeiting
Published 2025-01-01“…Traditional optical anti‐counterfeiting encryption techniques, which rely on light sources with varying wavelengths to identify information, are now insufficient to meet contemporary security demands due to their restricted response to a narrow range of wavelengths. …”
Get full text
Article -
5132
Investigating the blockchain technologies influences on the performance of road freight transportation management systems using network analysis technique
Published 2023-09-01“…The transparency technology has influenced time and trust and security by 22.63% and 77.37%, respectively, and smart contracts affected the two above waste categories by 88.81% and 11.19%, respectively. …”
Get full text
Article -
5133
The Subjective Vitality of Female Students: The Role of Attachment Styles and Alienation from Parents with the Mediation of Basic Psychological Needs
Published 2024-11-01“…A positive relationship was found between secure style and basic psychological needs with the Subjective vitality of female students; this relationship between avoidant and ambivalent styles and alienation from parents was negative (P < 0.01). …”
Get full text
Article -
5134
Supporting and hindering environments for participation of adolescents diagnosed with autism spectrum disorder: A scoping review.
Published 2018-01-01“…Two main themes were found: "providing security" indicates how the environment, and specifically the parental, physical, and informational environments, have a securing or intimidating effect. …”
Get full text
Article -
5135
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01“…However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. …”
Get full text
Article -
5136
Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-Based Keystroke Dynamics
Published 2025-01-01“…Due to the reliability and efficiency of keystroke dynamics, enterprises have adopted it widely in multi-factor authentication systems, effectively strengthening user authentication and thereby boosting the security of online and offline services. The existing works that detect imposter users suffer from performance and robustness degradation. …”
Get full text
Article -
5137
Spatial decision-making model for priority development of Indonesia coast guard stations
Published 2025-01-01“…Indonesia Coast Guard (IDNCG) is a paramilitary agency in charge of security and safety patrols in Indonesian maritime waters. …”
Get full text
Article -
5138
Ethnobotanical study of wild edible plants in Metema and Quara districts, Northwestern Ethiopia
Published 2025-02-01“…Abstract Background Wild edible plants (WEPs) are vital to enhance food security and generate income. Despite Ethiopia’s vast area and cultural diversity, there remains a need for further investigation of WEPs. …”
Get full text
Article -
5139
FARMING SYSTEM ADAPTATION TO CLIMATE CHANGE IN ALGERIA: CHALLENGES AND STRATEGIES
Published 2024-11-01“…By building resilience at the farm level and enhancing adaptive capacity, Algeria aims to safeguard its agricultural sector and ensure food security for future generations…”
Get full text
Article -
5140
Application of analytical hierarchical process in assessing the suitability of land for growing grain crops
Published 2024-12-01“…Assessing the suitability of land for growing grain crops is a relevant issue for ensuring sustainable agricultural production and improving food security. The Analytical Hierarchy Process (AHP) is an effective method of multi-criteria evaluation that systematically addresses all parameters. …”
Get full text
Article