Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5221
Whole of Government: An Effective Strategy for Ensuring Child Support Post-Religious Court Rulings
Published 2024-10-01“…This research aims to evaluate how well the 'Whole of Government Response' strategy works in securing post-divorce child support.…”
Get full text
Article -
5222
A global open-source dataset of monthly irrigated and rainfed cropped areas (MIRCA-OS) for the 21st century
Published 2025-02-01“…Abstract Crop production is among the most extensive human activities on the planet – with critical importance for global food security, land use, environmental burden, and climate. …”
Get full text
Article -
5223
Some Issues of Normative and Legal Regulation of Weapons in Ukraine
Published 2021-07-01“…The publication defines the directions for improving the draft laws under consideration in terms of: definitions of the terms of «sporting weapon», «thermal imaging sight», «signal weapon», «night vision sight», «training-split weapon - neutralized weapon», «right to carrying weapon», «right to own weapon»; introduction of the terms of «law enforcement agency», «intelligence agency», «law enforcement agency of special purpose», «state agency of special purpose with law enforcement functions» into the conceptual apparatus of the law, since some authors use them to define the regime of special circulation of civil firearms; establishment of restrictions on the number of civilian firearms and ammunition for them, which can be acquired by an individual; creating legislative prerequisites for the approval of a by-law, which will clearly provide the procedure for transferring seized weapons to the National Police for further storage; securing the obligation of security personnel to provide emergency medical care to persons to whom they use weapons; introduction of norms that will establish the obligation of applicants for the acquisition, possession and use of weapons to take the appropriate courses within first aid; preservation of the wording of the Articles 190-195 of the Code of Ukraine on Administrative Offenses until the relevant law on the legal regime of sidearm is adopted.…”
Get full text
Article -
5224
A Hybrid Human Dynamics Model on Analyzing Hotspots in Social Networks
Published 2012-01-01Get full text
Article -
5225
USERS’ SATISFACTION WITH INTERCITY BUS TERMINAL QUALITY IN LAGOS STATE, NIGERIA
Published 2024-06-01“…Top-rated challenges affecting terminal operations are security concerns, sanitation facility deficiencies and insufficient passenger amenities. …”
Get full text
Article -
5226
The Impact of Stone Quarrying on Socio Economic Status of Households in Nyakyibigi Ntungamo Municipality.
Published 2023“…The study findings on strategies to curtail the problems faced by people resulting from stone quarrying in Nyakyibigi Ntungamo municipality were; provision of tax holidays to investors, strengthening of security in quarrying areas, importing equipment's to use in quarrying process and rehabilitation of roads. …”
Get full text
Thesis -
5227
An Examination of Records Retention and Disposition Policy at Kabale University.
Published 2024“…The majority of the respondents showed that there is inadequate knowledge about the retention and disposition policy at Kabale University. Lack of security and privacy was also reflected by respondents who showed that the retrieved records may lack security and privacy since they are displayed for review and discussion hence affecting their privacy. …”
Get full text
Thesis -
5228
Agribusiness strategy and rural development: A case study of Ihunga Sub County, Ntungamo District
Published 2022“…The key study findings were: lack of provision of food security strategy, poor policy articulation and lack of supply of agricultural inputs to farmers. …”
Get full text
Article -
5229
-
5230
Les nations indiennes, source inattendue d’innovation
Published 2006-01-01“…Far from being fossilized societies, prisoners of their colonial past, Indian nations have always innovated in this domain, using their traditions to find new and original solutions to their economic problems, while securing their cultural identity. There is a renewal of Indian cultures whenever a tribe’s traditions and values are the basis of its development.…”
Get full text
Article -
5231
State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks
Published 2018-10-01“…A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.…”
Get full text
Article -
5232
Research on intrusion detection of industrial control system
Published 2017-02-01“…Industrial control system was an important part of national critical infrastructure,once it was suffered from the cyber attack,it would cause property damage,casualties and other serious disasters.For providing theoretical supports to industrial security researchers,the features of attacks in an industrial control system and the difficulties of detection to these attacks were introduced.Then,a survey of intrusion detection technologies used by the industrial control systems was given.Also,the performance and characteristic were compared for the different types of detection technologies.Fi-nally,an industrial intrusion detection research was generated.…”
Get full text
Article -
5233
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
Published 2012-08-01“…In order to provide anonymous authentication for ad hoc network,democratic group signatures with centerless secret sharing scheme and proposed a threshold traceability anonymous authentication scheme without trusted center for ad hoc network were combined.The scheme was centerless and self-organized,which was well suited to the characters of ad hoc network and had solved the problem that those schemes of traditional network were not suited to the ad hoc network.The prover of the scheme was anonymous,traceable,and complete,which well satisfied the security of anonymous authentication.…”
Get full text
Article -
5234
Boardroom electronic voting scheme based on DC-net
Published 2012-09-01“…A novel electronic voting scheme was proposed which was quite suitable for small scale election setting.An outstanding characteristic of the design was its guarantee of unconditionally perfect ballot secrecy.It satisfied self-tallying,fairness and verifiability.Disruption of the result of an election equals to breaking the discrete logarithm problem.The scheme is built on top of the DC-net (dining cryptographers network) anonymous broadcast protocol.It needs no trusted authority to guarantee its security,but assumes a complete network of private channels between voters.…”
Get full text
Article -
5235
Unknown attack detection model based on network behavior analysis
Published 2016-06-01“…As for the intranet security threats of the increasing number of unknown attacks,an unknown attack detection model based on network behavior analysis was proposed.With the help of the information resources within the intranet,firstly,the information resources of the intranet were collected,then the risk factors of abnormal behav-ior of the internet information node were analyzed,finally,the information node and the information resources ac-quisition path as the key element were used to construct the detection model of the directed graph.By verifying,the model can achieve the desired detection results.…”
Get full text
Article -
5236
Construction of network ecological civilization based on the anti-terrorism of colleges and universities
Published 2017-06-01“…Firstly,the basic connotation,significance and potential crisis of the network ecological civilization were introduced.Secondly,the basic situation of the current network terrorism and the challenge to the human civilization and security were analyzed,and the information dissemination was the foundation and that the key point of building the network ecological civilization was put forward.Finally,from the construction of the network discourse system,the construction of the network culture system,the construction of the network ethics system,the planning suggestions were put forward to explore and perfect the construction of the anti-terrorism path of the university network in our country.…”
Get full text
Article -
5237
Executive dynamic scheduling algorithm based on high-order heterogeneity
Published 2022-03-01“…At present, most isomer scheduling models in DHR systems only considered second-order isomerism and lack dynamics.In order to solve these problems, a dynamic scheduling algorithm was proposed, which combined heterogeneity and dynamics by determining a scheduling scheme with maximum scheduling value.The value was obtained by combining high-order heterogeneity and historical information.The experimental results show that the proposed algorithm has better defense capabilities than other scheduling algorithms, and its strategy can achieve a balance of dynamics and security.…”
Get full text
Article -
5238
Research on the Architecture of a Basic Reconfigurable Information Communication Network
Published 2013-01-01“…The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. …”
Get full text
Article -
5239
Iterative algorithms with seminorm-induced oblique projections
Published 2003-01-01“…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
Get full text
Article -
5240
Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber
Published 2025-01-01“…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
Get full text
Article