Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5481
Data hiding method based on color table expansion technique
Published 2009-01-01“…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
Get full text
Article -
5482
Methodological guidelines to assist women victims of violence.
Published 2009-11-01“…This is a violation of human rights limiting their personal freedom and annulling their main warranties as their right to have security, integrity and even life. In the 90´ it has been identified as a health problem due to its frequency and severity, its magnitude and influence in health recovery. …”
Get full text
Article -
5483
Video tamper detection method based on nonnegative tensor factorization
Published 2017-06-01“…The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all,spectral feature of video frame was extracted quickly.The video was described by a three-dimensional tensor which created by the main compression feature.The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation.Finally,the tampering position was determined by using the Chebyshev’s inequality.Experiments show that this method can detect the video inter-frame tampering quickly and robustly.…”
Get full text
Article -
5484
International Cooperation and Indonesia’s Geopolitical Perspective in Indo-Pacific
Published 2025-01-01“…In other words, regional development through international cooperation will increase regional stability so as to encourage various economic, political and security activities that not only reduce political friction, but also provide strategic advantages for every actor who has an interest in the Indo-Pacific. …”
Get full text
Article -
5485
Neural Linguistic Steganalysis via Multi-Head Self-Attention
Published 2021-01-01“…Precise linguistic steganalysis on suspicious carrier is critical for multimedia security. In this paper, we introduced a neural linguistic steganalysis approach based on multi-head self-attention. …”
Get full text
Article -
5486
Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans
Published 2017-06-01“…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.http://edis.ifas.ufl.edu/uw429 …”
Get full text
Article -
5487
Promote Renewable Energies Efficiently and Effectively
Published 2022-09-01“…Following the tightening of the climate protection measures, the question arises as to whether the current electricity market design and the associated remuneration rules for electricity generation are still suitable for achieving the goals of security of supply and low prices stipulated in the Energy Industry Act, even with an electricity market dominated by renewable energies.…”
Get full text
Article -
5488
Survey on application of attack graph technology
Published 2017-11-01“…Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.…”
Get full text
Article -
5489
Vehicular social network:a survey
Published 2015-01-01“…Combining techniques of social networks and wireless communications,vehicular social network (VSN) aim to provide a variety of data delivery services based on the social relationship among vehicle users.With the extensive survey and analysis of existing research work on mobile social network (MSN) and vehicle networks,the architecture and applications of vehicular social network (VSN) as well as the relationship between vehicle networks and social network from a technical viewpoint are presented.The key technologies in VSN are summarized,including the problems and solutions in terms of information delivery,bandwidth allocation,distributed caching,security and privacy.Moreover,future research directions and challenges are presented.…”
Get full text
Article -
5490
Sustainability Goals in Economic Policy — Economic Considerations
Published 2022-05-01“…This should be prevented by formulating the goals as concretely and legally securely as possible and by building up competence in the authorities entrusted with their implementation.…”
Get full text
Article -
5491
A brand new strategy of quantum relay strategy based on entanglement swapping
Published 2016-03-01“…Quantum protocols based on entanglement are known as information security,reliability,flexibility and a broad prospect in use.Meanwhile,the fidelity of photons is also required.A new quantum relay strategy was proposed.By setting multi-relays between distant correspondents and under the assistance of classical communications,the strategy can execute entanglement swapping and entanglement purification to provide the correspondents with remote entanglement connection of stable fidelity.Performance analysis shows that by reasonable control of relay series,improvement of entanglement swapping and entanglement purification,the time delay and throughput can be significantly improved,necessary entanglement resources can be provided for the global quantum communication.…”
Get full text
Article -
5492
ID-based signature without trusted PKG
Published 2008-01-01“…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
Get full text
Article -
5493
End-to-end multipath transport layer architecture oriented the next generation network
Published 2010-01-01“…To solve the problem of inefficient transmission using multiple interfaces of multihome terminal in the tradition network,an end-to-end multipath transport layer architecture—E2EMP oriented the next generation network was presented.Through distributing data adaptively following characters of the end-to-end paths,adopting dual sequence space,implementing smart path management policies,the performance of the multihome terminal using E2EMP has significant improvement.The simulation results show that E2EMP aggregates bandwidth of the multihome terminal interfaces efficiently,and meanwhile promotes the security and reliability of end-to-end multipath transport.…”
Get full text
Article -
5494
From Low Engagement to High Engagement: Explaining Turkey’s Changing Engagement in the Middle East during the JDP Period
Published 2022-06-01“…Why did Turkey shift its Middle East policy from soft power oriented approach to the security oriented one in the early 2010s? While Turkey prioritized diplomatic, commercial and economic relations during the first decade of the 2000s, it has increasingly used military means to influence the Middle East since 2011. …”
Get full text
Article -
5495
Intent driven Internet of things
Published 2019-09-01“…Intent driven network (IDN) is an emerging network technology.With its advantages in intent translation,closed-loop verification and automate deployment,it has become another revolutionary network technology after software-defined network (SDN).Aiming at the problem of weak scalability,difficult data management and poor security performance in the current development of the Internet of things,the SDN-based intent driven Internet of things was proposed,and the north-south interface and other key technologies were introduced.Aiming at the consistency problem of multi-intention northbound interface,an intentional-conflict decomposition strategy was proposed,which is proved to be effective by simulation.…”
Get full text
Article -
5496
NON-PROBABILISTIC RELIABILITY ANALYSIS METHOD BASED ON INTERVAL ANALYSIS
Published 2015-01-01“…This method described system parameters as interval variables first,measuring the system reliability through the ratio of security domain and the basic interval variables total area. …”
Get full text
Article -
5497
Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Published 2011-01-01“…Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. …”
Get full text
Article -
5498
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01“…With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and accept the regulation of LS.The basic of the security vehicle communication at intersections is authentication of network node.Based on this,an anonymous vehicle authentication scheme based on blockchain technology was proposed.The scheme employed a hybrid cryptography based on identity and hash message authentication code,and recorded the authentication results in blockchains.According to simulation testing and result analysis,the scheme ensures the anonymity and privacy-preserving,with less communication overhead compared to other methods.…”
Get full text
Article -
5499
Geopolityczne położenie Armenii oraz jej perspektywy po upadku Górskiego Karabachu
Published 2024-07-01“…The hypothesis of the paper is that in view of the current geopolitical situation, Armenia should deepen its cooperation with Iran, India and the United States at the expense of limiting its relations with the Russian Federation, which does not provide Armenia with security in the region anyway. …”
Get full text
Article -
5500
INTELLIGENT LOW-POWER SMART HOME ARCHITECTURE
Published 2018-09-01“… The Smart Home technology is a house that implements a variety of physical and digital well-integrated technologies, providing a number of functionalities like control of lighting, temperature, multimedia devices, flammable gas leakage, automatic plant irrigation or alarms security using a set of hardware components connected to a development board that can be accessed remotely through an Android application. …”
Get full text
Article