Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5161
Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense
Published 2024-12-01“…Abstract Deep neural networks have a recognized susceptibility to diverse forms of adversarial attacks in the field of natural language processing and such a security issue poses substantial security risks and erodes trust in artificial intelligence applications among people who use them. …”
Get full text
Article -
5162
ASSESSING THE QUALITY OF MICROSERVICE AND MONOLITHIC-BASED ARCHITECTURES: A SYSTEMATIC LITERATURE REVIEW
Published 2024-06-01“…The outcome of the literature review brings forth the key quality attributes in addition to their sub-characteristics as follows: performance, scalability, coupling, cohesion, deployment, security, development, complexity, maintainability, and availability. …”
Get full text
Article -
5163
-
5164
Emergency nurses’ disaster preparedness competencies: A focused mapping review and synthesis
Published 2025-01-01“…Conclusion: Communication, incident management, safety and security, preparedness and planning are the most identified integral domains within other identified domains. …”
Get full text
Article -
5165
Migration and Residual Trapping of Immiscible Fluids during Cyclic Injection: Pore-Scale Observation and Quantitative Analysis
Published 2020-01-01“…In GCS operations, residual trapping is the most favorable form of a trapping mechanism because of its storage security and capacity. In this study, the effects of cyclic injection of CO2-water on the immiscible displacement and residual trapping in pore networks were examined. …”
Get full text
Article -
5166
ENVIRONMENTAL SAFETY LAW AS AN ACADEMIC DISCIPLINE. COURSE FORMATION AND CONTENT
Published 2024-12-01“…Such a view of environmental safety law develops the understanding of environmental law, the system and structure of Russian law, and allows solving applied problems about the content of training in the field of environmental safety not only for lawyers, but also for specialists whose activities are associated with the impact on the environment and ensuring national security.…”
Get full text
Article -
5167
Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks
Published 2022-08-01“…With the rapid development of the Internet of Vehicles, service providers can efficiently provide caching services for vehicle users by deploying 5G base station-type RSUs adjacent to vehicles.However, due to the presence of malicious attackers, the controlled base station is turned to be malicious for the purpose of identity forgery attack.When messages are sent in the name of malicious base stations to interfere with the communication link between vehicles and the trusted base stations, it is easy to cause serious driving safety problems.To solve the above problem, an efficient transmission and honeypot defense strategy was proposed, which was based on the offensive and defensive game in the Internet of Vehicles to reduce the risk of identity forgery attacks and improve the security of data transmission.The interaction between trusted base stations and malicious base stations in the Internet of Vehicles scenario was modeled as an attack-defense game model.On this basis, trusted base stations and honeypot base stations were jointly used as defenders to defend against malicious attacks.Then, the trusted base station and the malicious base station, as the two sides of the offensive and defensive game, chose their respective strategies to construct a model of the benefit function of both sides.Combined with the vehicle delay feedback mechanism, the defender and the malicious base station dynamically adjusted their respective strategies.By adjusting the interaction between the honeypot base station and the vehicle, and also the degree of IP randomization, the overall benefit of the defender was effectively improved.Besides, the optimal solution was obtained by using the mixed strategy Nash equilibrium theory.Simulation experimental results show that the proposed strategy can improve the secure transmission performance of the Internet of Vehicles service in the presence of malicious attackers, and the defender’s expected benefit is improved by 48.9% and the data transmission delay is reduced by 57.1% compared to the no-honeypot defense scheme.…”
Get full text
Article -
5168
Criminological Scenarios of Crime Situation’s Transformation in the Context of Armed Conflict on Donbass in the Midterm
Published 2019-09-01“…The author has expertly substantiated the highest probability of developing a crime situation in the midterm in the following three scenarios: “Stagnation and slight increase” (most realistic), “Control and security” (optimistic), “Turbulent crime” (negative). …”
Get full text
Article -
5169
Overcrowding in prisons: Health and legal implications
Published 2024-01-01“…Beyond the harm caused to persons in prisons, this may negatively impact society at large in terms of security, public health, and economy. Political will is essential in reducing prison overcrowding.…”
Get full text
Article -
5170
Learning Automata Based Incremental Learning Method for Deep Neural Networks
Published 2019-01-01Get full text
Article -
5171
The EU Cooperation with South African Countries: Main Trends and Prospects for Development
Published 2024-06-01“…Stronger cooperation can contribute to economic growth, development, peace, and security.…”
Get full text
Article -
5172
-
5173
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
Published 2025-01-01“…These findings indicate that the SEME-TDHM algorithm successfully encrypts color images, providing strong security and practical utility.…”
Get full text
Article -
5174
U.S. plans to internationalize the containment of the USSR in the Balkans in the first half of the 1950s
Published 2020-12-01“…In response, in the early 1950s the United States formed a new security model in the Balkans, which based on a differentiated approach: Greece became a member of NATO, while Yugoslavia entered the anti-Soviet Balkan Pact affiliated with NATO. …”
Get full text
Article -
5175
State Budget Execution under Martial Law
Published 2024-12-01“…In addition, expenditures on public order, security and the judiciary, as well as social security for the population are also quite large. …”
Get full text
Article -
5176
Sustainable Development of Water Resources Carrying Capacity Based on System Dynamics: A Case Study of Ganzhou City
Published 2022-01-01“…As Ganzhou is the birthplace of Ganjiang River,Dongjiang River,and Beijiang River (“Three Rivers”),the security and sustainable development of its water resources are of great significance to the ecological security and sustainable development of both the Yangtze River Economic Belt downstream and the Guangdong-Hongkong-Macao Greater Bay Area.Thus,seeking the optimal sustainable development mode that Ganzhou's water resources can carry and ensuring the safety and sustainable use of those water resources are currently urgent issues to be solved.In this study,we employ the system dynamics method to build a system dynamics model of Ganzhou's water resources carrying capacity by analyzing its influencing factors and the system feedback loop and dividing the carrying capacity system into three sub-systems of social economy,water resources,and water environment.Moreover,four scenarios of normal development,economic priority,environmental priority,and comprehensive and coordinated development are designed to simulate Ganzhou's water resources carrying capacity during 2020—2035 and dynamically evaluate and simulatively predict its sustainable development capacity under each scenario.The results indicate that among the four scenarios,all the normal development and economic priority scenarios that sorely pursue the continuation of the current development status of social economy and the environmental priority scenario that protects water resources at the expense of social economy development fail to guarantee the sustainable development of water resources and social economy.In contrast,under the comprehensive and coordinated development mode,the chemical oxygen demand (COD) emissions will remain at a low level of 132 900 t by 2035 while economic development rises to a relatively high level,with GDP reaching 1 197.13 billion CNY.It follows that this mode not only ensures economic development but also takes into account the ecological environment.Therefore,the comprehensive and coordinated development scenario that comprehensively considers social economy development,environmental protection,and other factors is the optimal sustainable development mode that can be carried by water resources.…”
Get full text
Article -
5177
-
5178
Data Augmentation-Based Enhancement for Efficient Network Traffic Classification
Published 2025-01-01“…As encryption becomes the norm for security reasons, the traffic classification problem is not easily solved. …”
Get full text
Article -
5179
Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding
Published 2023-08-01“…Reversible Data Hiding in Encrypted Images (RDHEI) combines image encryption and reversible data hiding to improve the security and information transmission efficiency for the network transmission of images.In RDHEI, the conventional bit-by-bit encryption destroys the spatial correlation in an original image and has side effects on the preservation of embedding spaces.An approach for RHDEI was proposed, which utilized additive homomorphic encryption and a multi-MSB (Most Significant Bit) embedding strategy to create room within the encryption process.The original image was divided into non-overlapped blocks, and each block was subjected to the same key for additive homomorphic encryption.This helped transfer the pixel correlation within an original block to the encrypted image block as much as possible.To enhance security, the encrypted image was further subjected to an Arnold transformation on a block-by-block basis.The decision of whether data will be embedded in a block and the embedding capacity were determined by the pixel differences within the block and the predicted values.When a block was selected for embedding, a small number of LSBs (Least Significant Bits) were used to store the prediction differences, ensuring reversibility.The redundant multi-MSBs were embedded with secret information by bit replacement.For the possible errors caused by multi-MSBs prediction, an embedding position selection strategy was designed by vacating MSBs in terms of the values of prediction errors, then more MSBs were reserved for those pixels with less prediction errors.During decryption, the secret information can be accurately extracted from the multiple MSBs of the pixels in a block, and the image content can be losslessly recovered using the number of embedded multi-MSBs, predicted values, and prediction differences.Experimental results on the BOWS-2 image dataset demonstrate that the average embedding capacity is improved to 2.58 bit/pixel, surpassing existing methods.…”
Get full text
Article -
5180
Food insecurity among African Americans in the United States: A scoping review.
Published 2022-01-01“…The primary objectives of this review were to identify which risk factors have been investigated for an association with food insecurity, describe how food insecurity is measured across studies that have evaluated this outcome among African Americans, and determine which dimensions of food security (food accessibility, availability, and utilization) are captured by risk factors studied by authors. …”
Get full text
Article