Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5261
ARTIFICIAL INTELLIGENCE AND MORAL RIGHTS
Published 2023-06-01“…These matters have greatly impacted the legislative field, along with the fields of technology, security education - and the list stays open. This paper aims to highlight the main key aspects of AI, its current legal framework (or, rather, lack thereof), along with a more in-depth analysis of moral rights in the field of AI.…”
Get full text
Article -
5262
Architecture of service-oriented data analysis system
Published 2016-01-01“…In the era of data technology,the higher requirements of telecom operators,such as business innovation and strong operation supporting,are being placed on data analysis system.Firstly,the requirement and challenge of the rising data analysis and the enhancing data value were expounded.Then,in order to realize open architecture and flexible operation support,the logical framework and technology architecture of the service-oriented data analysis system,as well as the data governance and the data security management were proposed.Finally,the service scenarios and the business value of the platform were introduced by an example.…”
Get full text
Article -
5263
Produção de alimentos, agricultura camponesa e soberania alimentar: o PAA no estado de Goiás
Published 2020-12-01“…During PAA’s first ten years of operation, the institutional markets created fostered the commercialization of food from peasant agriculture in achieving of food and nutritional security. However, the program is now institutionally threatened while food insecurity in the country is increasing.…”
Get full text
Article -
5264
Network latency clustering for detector placement on macroscopical prewarning
Published 2006-01-01“…Research on the network-based and distributed intrusion detection was aroused by the burst-outs of large-scale security events.How to place detection instruments was the key to the detections.The problem of detector placement was turned to that of the clustering of topology graph.A novel bidirectional hierarchical clustering algorithm was put forward,which decreased the amount of result clusters by integration of initial marker selection method based on node out-degree.The simulation results demonstrates that our clustering approaches effectively identify clusters and been employed in the measured real network of the backbone.…”
Get full text
Article -
5265
New key management scheme of wireless sensor networks based on key relation table
Published 2006-01-01“…Aimed at some security properties on key management for multicast such as forward confidentiality,backward confidentiality,resisting conspiracy-analysis,expansibility and robustness,and furthermore the obvious character of en-ergy-constraint,a new key management scheme based on threshold mechanism & key relation table was proposed,which mapped keys’ value onto the three-dimensional curves and surfaces.Although computing complexity increases within a little scale,the performance optimization of memory complexity as well as communication complexity were proposed.…”
Get full text
Article -
5266
RLWE-based key-policy ABE scheme
Published 2016-10-01“…Based on the attribute-based encryption(ABE) scheme which was proposed by Brakerski and constructed on the LWE problem,a RLWE-based key-policy ABE scheme was presented.Efficiency and key size of this scheme over-takes old ones which are based on the LWE problem.Under the RLWE assumption,this scheme supports attributes of unbounded length and semi-adaptive security.Moreover,a compiler was constructed and could compile ABE scheme that meets its demand into an attribute-based fully homomorphic encryption (ABFHE) scheme.…”
Get full text
Article -
5267
Technology of WLAN in Operation Level Based on Metropolitan Area Network
Published 2015-10-01“…As an extension of the cable broadband network,WLAN is also an important part of the wireless broadband network.In recent years,local governments have put forward the construction of “wireless city”as the fifth city public infrastructure,China Telecom Co.Ltd.also put forward the WLAN construction as the forth basic network.These factors promoted the large-scale construction and development of WLAN.The construction goal and the network architecture of WLAN based on metropolitan area network were analyzed.The networking technologies and the security policy deployment of WLAN were proposed.…”
Get full text
Article -
5268
Research on reliability of pulsed electrothermal propulsion system of nanosatellite
Published 2021-12-01“…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
Get full text
Article -
5269
Application of Power Data Mining Within and Between Grid Fields
Published 2013-11-01“…Combined with the power industry data, the applications of grid facilities construction planning, dynamic security assessment, power load forecasting, power system fault diagnosis and optimal scheduling options with the power system were analyzed, and then the applications in some other industries were also analyzed, supporting the development of the city.…”
Get full text
Article -
5270
Implementation on Evolved Packet Core and Wireless Network End-to-End Tracing
Published 2014-12-01“…In order to solve the above problem, based on 3GPP protocol, the construction of EPC and LTE wireless cooperative tracking processing mechanism was proposed, the optimization scheme was put forward to solve the application problem of different manufacturers scene, and to meet the current network user tracking and optimization analysis of demand, a platform for further user based localization problem and the key security was provided.…”
Get full text
Article -
5271
Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application
Published 2012-01-01“…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
Get full text
Article -
5272
Financing Investments in the Future: Pragmatic Solutions Are Needed
Published 2022-01-01“…However, they need to be quantified in concrete terms as quickly as possible and designed to ensure legal security in order to send reliable signals for the necessary capacity building, particularly in the construction industry and public administration.…”
Get full text
Article -
5273
Optimization of Expression Matching for String Matching
Published 2013-01-01“…As the requirement of network security application increases, more and more redundant patterns appear and the patterns' amount of intrusion detection system(IDS)raises. …”
Get full text
Article -
5274
Multi-objective layered diagnosis model of electric power ICT network based on extenics
Published 2017-02-01“…Electric power ICT network is an important part of power system,which plays a vital role in the security,stability and economic operation of power network.A diagnostic index system of electric power ICT network was established and a multi-objective layered diagnosis model of electric power ICT network system based on extension rating was proposed.This evaluation method could not only evaluate the impact factors of the electric power ICT network,but also diagnose and rate the whole electric power ICT network.…”
Get full text
Article -
5275
Les migrations en transit au Maroc. Attitudes et comportement de la société civile face au phénomène
Published 2009-11-01“…Responsiveness and variability on the part of Moroccan authorities highlight the double dependence of a management process focused on security issues yet influenced by external pressures, including the fragile compromise with the European Union and some member countries. …”
Get full text
Article -
5276
Post-therapeutic support and rehabilitation for breast cancer women in complete remission in a thermal resort: study protocol for the PACThe Real-Life conditions observational tria...
Published 2025-01-01“…Although this allows better care organization and improved security, it is perceived as stressful and restrictive by the “cancer survivor”. …”
Get full text
Article -
5277
-
5278
-
5279
Comparing Deep Learning models for mapping rice cultivation area in Bhutan using high-resolution satellite imagery
Published 2025-01-01“…Crop type and crop extent are critical information that helps policymakers make informed decisions on food security. As the economic growth of Bhutan has increased at an annual rate of 7.5% over the last three decades, there is a need to provide geospatial products that can be leveraged by local experts to support decision-making in the context of economic and population growth effects and impacts on food security. …”
Get full text
Article -
5280
Dynamical Modeling, Analysis, and Control of Information Diffusion over Social Networks
Published 2021-01-01Get full text
Article