Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5401
UNIVERSITY RANKING: SOCIOLOGICAL SUPPORT
Published 2016-12-01“…The authors give recommendations for more sociologically consistent provision of ranking criteria, discuss the prospect of creation and status securing of the Russian university ranking system.…”
Get full text
Article -
5402
Research on large-scale identity authentication architecture based on combined symmetric key
Published 2009-01-01“…A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the management of large-scale keys can be simplified to the management of small-scale key seeds.The security of the proposed architecture is analyzed and the experimental results are shown.It is obvious that the abilities of large-scale identity authentication and management are improved while the building cost is reduced evidently with the application of the proposed architecture.It is an applicable solution for real-name authentication network.…”
Get full text
Article -
5403
Research on cross-domain access control technology
Published 2021-02-01“…Based on the latest research at home and abroad, the access control technology in cross-domain data flow were summarized and prospected.Firstly, combined with access control in complex application environments, the development of access control models and data security modelswere summarized.The advantages and disadvantages of access control policy management were analyzed.Secondly, the research on access control policy management from the aspects of data marking, policy matching and policy conflict detection were discussed respectively.Finally, the research status of data marking technology and authorization and extension control technology in unified authorization management were summarized.…”
Get full text
Article -
5404
Conditional privacy-protection remote user authentication mechanism for WBAN
Published 2016-10-01“…A conditional privacy-protection remote user authentication scheme based on a certificateless group signature was proposed,which can accomplish the anonymous mutual authentication between the user and the remote doctors.In addition,when the doctors perceived that users were in case of an emergency,the mechanism enabled the only group manager (GM) to expose the real identity information of users and given users timely assistance.The scheme can provide the anonymity,traceability,mutual authentication,non-reputation and some other security features.The performance analysis results show the scheme is more suitable for WBAN.…”
Get full text
Article -
5405
Fire Safety Policy
Published 2022“…The aim of this policy is, therefore, to provide a robust fire safety framework which will be implemented to secure the safety and wellbeing of everyone within the University Community. …”
Get full text
Other -
5406
Skema Kredibilitas Sertifikat Berbasis Ilearning Gamifikasi Blockchain pada Kampus Merdeka
Published 2023-02-01“…Blockchain technology is the answer to every security problem because of the permanent and peer-to-peer storage in a distributed network and significant security. …”
Get full text
Article -
5407
De la police coloniale française à la police nationale marocaine : décolonisation et héritages policiers (1953-1960)
Published 2023-12-01“…Among the numerous institutional continuities between the French protectorate over the Cherifian Empire (1912-1956) and independent Morocco, the security forces, particularly the police, stand out. …”
Get full text
Article -
5408
First aid guidelines for fragile contexts (conflict, disaster and remote areas): Contextualization & Adaptation
Published 2022-07-01“…In some instances, safety and security of the first aider and the person requiring help should be prioritized over providing care. …”
Get full text
Article -
5409
Identifying weather patterns responsible for renewable energy droughts over India
Published 2025-01-01“…These could help to provide early warnings for challenging security of supply conditions in the future.</p>…”
Get full text
Article -
5410
A review of emerging techniques for pyrethroid residue detection in agricultural commodities
Published 2025-01-01Get full text
Article -
5411
Novel Technique of Pneumatic Posterior Capsulorhexis for Treatment and Prevention of Posterior Capsular Opacification
Published 2019-01-01“…Setting. (1) Ophthalmology department, Faculty of Medicine, Minia University, 61519, El-Minia, Egypt. (2) Security Forces Hospital, Ophthalmology Department, Riyadh, Kingdom of Saudi Arabia. …”
Get full text
Article -
5412
ECONOMIC WELFARE AND SOCIAL WELL-BEING OF THE POPULATION OF UKRAINE IN THE POSTWAR YEARS
Published 2024-06-01“…Ukrainian society needs attention and assistance in a difficult time for the country: raising the subsistence minimum and minimum wage, regulating pricing policy and food security, reducing unemployment and migration, strengthening the areas of education and healthcare reform, etc. …”
Get full text
Article -
5413
Sorghum yield prediction based on remote sensing and machine learning in conflict affected South Sudan
Published 2025-02-01“…This paper demonstrates that despite ongoing conflict, reasonably good end-of-season sorghum yield prediction with relevant food security planning implications could be done with ML, but challenges remain in generalizing these results due to limited crop data and regional variability in South Sudan.…”
Get full text
Article -
5414
Nutritional management and maize variety combination effectively control Striga asiatica in southern Africa
Published 2022-07-01“…Abstract Maize (Zea mays L.) is an important staple food crop in sub-Saharan Africa (SSA) and contributes significantly to food security. Due to Striga, maize yield loss is estimated between 20 and 80% forcing some farmers to abandon their land therefore threatening food security. …”
Get full text
Article -
5415
Advancing UAV Communications: A Comprehensive Survey of Cutting-Edge Machine Learning Techniques
Published 2024-01-01Get full text
Article -
5416
The Potential of Emergency Medical Response to CBRNE Threats in the Context of Military-Civilian Cooperation
Published 2024-12-01“…Conclusions: Based on the results of four-year research and conceptual works completed under the project “Strengthening CBRNE Safety and Security — Coordination and Standardisation”, as part of Norway Grants for 2014–2021, a new medical rescue and healthcare functioning model was developed based on the potential of the latest technical solutions, resources and security management systems. …”
Get full text
Article -
5417
Russia and NATO’s ‘Open Door’ Policy in the Post-Bipolar Period
Published 2024-07-01“…The author concludes that NATO enlargement has had an ambiguous impact on both the European security architecture, and the alliance itself. On the one hand, it gave the United States new opportunities to project power and consolidate its hegemonic status in Europe. …”
Get full text
Article -
5418
-
5419
The 1945 World Order – Process with «Open» Continuation
Published 2020-09-01“…The Yalta-Potsdam system of international relations, established by culmination of World War II, was created to maintain the security and cooperation of states in the post-war world. …”
Get full text
Article -
5420
An efficient convolution neural network method for copy-move video forgery detection
Published 2025-01-01“…Video fraud detection is integral to multimedia security, where our task involves the precise identification of modified segments within video sequences. …”
Get full text
Article