Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5381
Russian-тajik cooperation as a factor of stability in Central Asia (1992– 2022)
Published 2022-12-01“…This position meets the national interests not only of both countries, but also of the Central Asian states, guaranteeing their security and stability.…”
Get full text
Article -
5382
Thoracic Anesthesia and Cross Field Ventilation for Tracheobronchial Injuries: A Challenge for Anesthesiologists
Published 2014-01-01“…Due to the difficult nature of these injuries and the demanding attributes of the involved surgery, the anesthesiologist faces tough challenges while securing the airway, controlling oxygenation, undertaking one-lung ventilation, maintaining anesthesia during tracheal reconstruction, and gaining adequate postoperative pain control. …”
Get full text
Article -
5383
Review on video privacy protection
Published 2013-08-01“…With the rapid development of the Internet and the tremendous proliferation of video applications,video privacy protection has garnered significant attention nowadays.It is a key problem to protect privacy while ensuring normal application.A survey of video privacy protection technologies was presented,and summary,comparison and analysis were mainly in three aspects:privacy extraction,privacy protection and access control.Moreover,some distinctive issues that correlate to privacy protection in video surveillance,such as privacy definition and perceptive security evaluation were also addressed.Finally,challenges and perspectives of video privacy protection technology were discussed.…”
Get full text
Article -
5384
RSA-based image recognizable adversarial attack method
Published 2021-10-01“…Adversarial attack is an important part of deep learning security research.Relying on the RSA signature schemes and RSA encryption schemes in cryptography, an adversarial attack method that adversarial examples can be recognized by a specific classifier is proposed.Through the idea of one pixel attack, the normal image can have the ability to make other classifier misclassify while embedding additional information.It can be used in classifier authorization management, online image anti-counterfeiting, etc.The experiment show that the adversarial examples can be recognized under the specific classifier, and the disturbance noise is difficult to detect by the human eye.…”
Get full text
Article -
5385
Political activity of widows as an example of shaping cliental dependencies in the second half of the seventeenth and eighteenth centuries
Published 2019-12-01“…Widows, protected by privilegesand secured with property ownership, had a solid influence on the formation of cliental ties. …”
Get full text
Article -
5386
Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)
Published 2011-05-01“…I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.…”
Get full text
Article -
5387
IMPROVEMENT OF PROFESSIONAL TRAINING FOR THE MILITARY- INDUSTRIAL COMPLEX
Published 2016-12-01“…Strengthening of the defense capability and the national security of the country in the faceof the contemporary challenges requires the improvement of professional training, retraining, advanced training, additional training of personnel and specialists for the defense industries. …”
Get full text
Article -
5388
Food System Study of Martin County, Florida
Published 2023-04-01“…Farmers often face challenges finding sizable, secure, well-paying markets, and the most consumers do not participate in local food transactions. …”
Get full text
Article -
5389
A solution for intelligent park based on 5G MEC
Published 2022-05-01“…Beside the normal consumers, 5G will be applied in the industry manufacture, chemical industry, and power energy, etc.How to exploit the 5G, multi-access edge computing (MEC) and other technologies to satisfy the digital transformation of enterprise becomes a hot topic.Therefore, the 5G MEC-based intelligent park solution was proposed based on the different scenarios.Secure fixed and mobile connection with high bandwidth, and flexible computation infrastructure for applications was provided.Secondly, according to the various scenarios, the corresponding solution was presented.In addition, the detailed deployment scheme of the project was discussed for the future deployment.…”
Get full text
Article -
5390
Monitoring Heart Disease and Diabetes with Mobile Internet Communications
Published 2012-01-01“…As an extra layer of security in the data transmission, information embedded in the data is used in its verification. …”
Get full text
Article -
5391
Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change
Published 2015-05-01“…Numerical results demonstrate that an appropriate pseudonym change interval should be changed depending on the packet arrival rate, mobility rate, and security level.…”
Get full text
Article -
5392
Le manager-ingénieur face aux tensions entre innovation et organisation
Published 2023-06-01“…The objectives of improving mobility and creativity clash with the organizational imperatives of ensuring safety and security. The manager then deals with the network of actors in place, trying to convince them and facilitate their support. …”
Get full text
Article -
5393
Partial blind signature scheme based on SM9 algorithm
Published 2021-08-01“…Ordinary digital signatures have many deficiencies in effectively protecting users' privacy, and signature repudiation and tracking occur from time to time.In order to solve the above problems, a partial blind signature scheme based on the SM9 algorithm was proposed.Partially means that the signature message contains the user's message and other related information, so it can effectively resist signature repudiation and tracking, and introduce a trusted third party to prevent malicious users from tampering with information.Through experimental results and theoretical analysis, the security and efficiency of the proposed algorithm are proved.…”
Get full text
Article -
5394
A Variable Weight Privacy-Preserving Algorithm for the Mobile Crowd Sensing Network
Published 2017-01-01“…To address this problem, we proposed a variable weight privacy-preserving algorithm of secure multiparty computation. This algorithm is based on privacy-preserving utility and its effectiveness and feasibility are demonstrated through experiment.…”
Get full text
Article -
5395
La ira anticlerical de mayo de 1931. Religión, política y propaganda
Published 2017-07-01“…The involvement of uncontrolled groups in the incidents caused the first clash between members of the Administration regarding the use of public security forces. The de facto adversaries of the Republicans, including the powerful Catholic Church, were forced into taking a political stance. …”
Get full text
Article -
5396
Preventive and remedial measures to reduce illegal immigration in Algerian legislation
Published 2023-05-01“… Illégal immigration is a phenomenon of the most powerful gouvernents and countries in the world wher countries in that are experiencing economic or Security crises have become a source migration towards developed and because countries and what is difficult to combat is the emergence of networks specialized in human smuggling in exchange for large sums of money. …”
Get full text
Article -
5397
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01“…Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.…”
Get full text
Article -
5398
THE IMPLEMENTATION OF THE STATE FAMILY POLICY IN MODERN RUSSIA
Published 2017-01-01“…From the impact of family policy depends on the decision of all without an exception of problems - from security, to solve the problem of population reproduction, to the formation of human capital in ensuring the competitiveness of the economy and, ultimately, problem solving, historical survival. …”
Get full text
Article -
5399
THE EXPERIENTIAL INGREDIENT IN COLLEGE LEARNING (A PHYSICAL EDUCATOR'S PERSPECTIVE)
Published 2012-06-01“…A small collection of anecdotes is used to illustrate a few basic concepts of experiential learning: the danger of incomplete learning resulting in a false sense of security; the importance of the intriguing question and how that intriguing question translates into the teaching of sports and physical education skills; the power of emotions in the learning process; the extension of experiences beyond the particular skills involved; and the need to supplement experiences with reflection, assimilation and model development, where the person with a teaching role needs to be always intentional or goal-oriented.…”
Get full text
Article -
5400
The Horizon Europe AGEMERA Project: Innovative Non-Invasive Geophysical Methodologies for Mineral Exploration
Published 2025-02-01“…Funded by the Horizon Europe programme, it aligns with the European Critical Raw Materials Act to enhance resource security and sustainability. Utilising passive seismic methods, drone-based electromagnetic sensing, and muography, the project maps subsurface characteristics across multiple countries in Europe and Zambia. …”
Get full text
Article