Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5341
Nanoparticles as catalysts of agricultural revolution: enhancing crop tolerance to abiotic stress: a review
Published 2025-01-01“…Ensuring global food security and achieving sustainable agricultural productivity remains one of the foremost challenges of the contemporary era. …”
Get full text
Article -
5342
The Relationship Between Attachment Styles and Difficulty in Emotion Regulation: Investigating the Moderating Role of Reflective Functioning
Published 2024-11-01“…These participants completed the Reflective Functioning Questionnaires (RFQ), the Attachment Styles questionnaire (Hazen and Shaver, 1987), and the Difficulty in Emotion Regulation Scale (Gratz, 2004).Results: Hierarchical regression analysis indicated that individuals with a stronger secure attachment style exhibit greater confidence, which in turn facilitates easier emotion regulation. …”
Get full text
Article -
5343
Growing old before growing rich: a scoping review on ageing-related policy interventions from the WHO Southeast Asian Region
Published 2025-01-01“…The notable delimitations of the given policy interventions are ambiguity regarding the monitoring of the programmes, lack of benchmark standards for evaluation of progress, inadequate attention to rural poverty and lack of decentralisation.Conclusion WHO SEARO countries can respond better to ageing by reinforcing areas such as caregiver support and allowances, public financing in older care, old age health insurance, public-private partnership in mobile and institutional caring and social security systems including old age and disability pension.…”
Get full text
Article -
5344
Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff
Published 2019-01-01“…In the next step, we classified NFRs into two classes security triad and performance triad, and the cost is assumed constant for each NFR. …”
Get full text
Article -
5345
Insect Abundance and Its Structure Trophic Level on Different Level of Teak-Based Agroforestry Development at Nglanggeran Village, Gunungkidul District, Yogyakarta
Published 2017-07-01“…Protection upon biodiversity has been the center of concern on ecological side, while productivity of the land use has been considered a solution for food security. Insects are between these two major issues, namely conservation and food security.This study was aimed at tracing the structure of insect community based on its role on the trophic level on three different phases of teak-based agroforestry systems (early, middle, and advanced). …”
Get full text
Article -
5346
Characteristics of eye injuries, medical cost and return-to-work status among industrial workers: a retrospective study
Published 2022-01-01“…Objective The aim of this study is to determine the characteristics of eye injuries, medical costs and return-to-work status among industrial workers to provide better vision rehabilitative services.Setting Nationwide data from the Social Security Organisation (SOCSO) of Malaysia.Participants A stratified random sample of workers registered with the SOCSO of Malaysia with documentation of eye injury.Primary and secondary outcome measures Characteristics of eye injuries and medical costs related to eye injury (primary) and return-to-work status (secondary).Results A total of 884 from 8861 case files workplace accidents involving eye injury registered with Social Security Services (SOCSO) were identified. …”
Get full text
Article -
5347
Performance evaluation of hyper-parameter tuning automation in YOLOV8 and YOLO-NAS for corn leaf disease detection
Published 2025-01-01“…Corn cultivation was crucial in Southeast Asia, significantly contributing to regional food security and economies. However, leaf diseases posed a significant threat, causing substantial losses in production and quality. …”
Get full text
Article -
5348
Defense Budget Gaps and Legal Implications of Alternative Financing in Indonesia: A Legal Reform Perspective
Published 2024-12-01“…With global challenges, particularly the escalating wars in the Middle East, Indonesia faces growing security concerns that necessitate a stronger defense program. …”
Get full text
Article -
5349
Economic Policy of the German Empire from 1871 — Lessons for Today?
Published 2021-04-01“…They focus on institutional achievements, the first period of globalisation, the effects of investments in public infrastructure such as railway construction and education, as well as social security and its influence on demographic change. This economic-historical analysis not only provides new insights into the German Empire, but also offers lessons for the present day.…”
Get full text
Article -
5350
Modified Three-Dimensional Multicarrier Optical Prime Codes
Published 2016-01-01“…The proposed 3D optical codes are more efficient in terms of cardinality, improved security, and providing quality of services.…”
Get full text
Article -
5351
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01“…The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote attestation.An improved direct anonymous attestation authentication scheme with the in-volvement of key agreement was proposed to provide the property of mutual authentication.The analysis shows that the proposal can realize direct anonymous attestation with the properties of forgery-resistance and anonymity,and resist reply attacks and platform masquerade attacks; the scheme is effective and suitable for the mobile trusted computing platforms.…”
Get full text
Article -
5352
Research on the development of intelligent computing network for large models
Published 2024-06-01“…As deep learning models with huge parameters and complex structures, large model training requires fast synchronization of training parameters between multiple cards and servers, which imposes higher requirements on the bandwidth, latency, reliability, scalability and security of datacenter networks. The requirements and related key technologies of intelligent computing networks for large model training were studied, and the standard specifications, academic research, and case practices of intelligent computing networks were analyzed, in order to promote the development of intelligent computing networks.…”
Get full text
Article -
5353
Mesures de compensation écologique : risques ou opportunités pour le foncier agricole en France ?
Published 2015-10-01“…The second focuses on offering compensation : in this approach the service provider secures land through acquisition or long term contracts. …”
Get full text
Article -
5354
Identity-based group key management scheme for space networks
Published 2010-01-01“…The available group key management schemes are not suitable for space networks.Aiming at the problem,an identity-based space networks group key management scheme was proposed.It constructed a service nodes set using sat-ellite nodes to assist multicast group with calculating and broadcasting common parameters,and resolved the problem of imbalance consumption.The service node providing service for the same group was dynamic and changeable,which could avoid single-point failure.The proposed scheme can achieve security requirements and has less calculating,storing and communicating expense compared with available schemes.…”
Get full text
Article -
5355
Broadcast authentication algorithm for wireless sensor networks
Published 2010-01-01“…In order to authenticate the broadcast data in wireless sensor networks efficiently,a broadcast authentication algorithm based on the properties of one-way,quasi-commutative and absorbency in Nyberg’s fasting one-way accumulator was put forward.The MACs computed by hashing the broadcast data with the shared key between the broadcaster and each scheduled receiver were used to be the accumulative items in this algorithm.The detailed analyses in the aspects of the security,anti-captured and costs show that the proposed broadcast authentication algorithm can authenticate the random broadcast data immediately in small area and meet the essential requirements for broadcast authentication in wireless sensor networks.…”
Get full text
Article -
5356
Research and application of DRM technology in IPTV UHD video
Published 2018-11-01“…The characteristics and differences of different DRM standards such as OMA,Microsoft,Intertrust,and ChinaDRM were compared.The requirements of DRM applications were presented.The key technologies of DRM were analyzed.Based on the high-tech set-top box commonly used in the industry,the architecture of DRM protection in IPTV high-definition video was designed.The hardware trust root of high security set-top box,remote download terminal key,double-encrypted content key and other mechanisms was put forward innovatively.Finally,the business process of decrypting DRM content was formulated and an implementation case was given.…”
Get full text
Article -
5357
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01“…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
Get full text
Article -
5358
Securitización y condicionalidad migratoria en la ayuda oficial al desarrollo de la Unión Europea
Published 2019-11-01“…In this way, it contributes to a better understanding of the security-migration-development nexus in the European Union (EU). …”
Get full text
Article -
5359
Survey on model checking based hardware Trojan detection technology
Published 2021-04-01“…Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checking can effectively detect the hardware Trojan in the design phase.Firstly, the working principle and process of model checking were described.Secondly, the research progress of hardware Trojan detection technology based on model checking was introduced.Finally, the bottlenecks faced by the current technology were pointed out and the potential research direction was discussed.…”
Get full text
Article -
5360
Image visualization encryption algorithm based on Shamir threshold secret key sharing
Published 2018-07-01“…An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.…”
Get full text
Article