Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5601
Formation of mechanisms for sustainable development of industrial enterprises on the example of the power industry
Published 2023-07-01“…It also takes measures to ensure energy security and maintains stable flows of finance and capital with stability of investment activity. …”
Get full text
Article -
5602
التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة
Published 2016-10-01“…The study recommended that more research work shouldbe undertaken in the field of cloud storage, and the necessity of activating cloudstorage –taking the full information security precautions- in all institutions.…”
Get full text
Article -
5603
Design and implementation of routing strategy based on terminal trust
Published 2016-04-01“…Experiments show that this protocol can achieve IPv6 routing based on flow label and improve the security and efficiency of information transmission.…”
Get full text
Article -
5604
Lite-CA based key pre-distribution scheme in wireless sensor network
Published 2009-01-01“…Large-scale sensor nodes were usually deployed in potentially adverse or even hostile environment, so the security in these networks was very important.Due to its constraints on node cost, size and power dissipation, sensor’s energy and capabilities on computation, storage and communication were considerably weak compared with general computers.It leaded to many new challenges for designing of key management protocols in WSN.Therefore, a lite-CA based key pre-distribution scheme was suggested.The traits of CA-based authentication framework and identity-based authentication framework were combined by this scheme.Further, the scheme was efficiently implemented based on quadratic residue theory.…”
Get full text
Article -
5605
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01“…The service model of cloud computing creates a serious threat to user data security,the trustworthiness of cloud computing through third parties,must be evaluated then the healthy development of the cloud computing industry can be guaranteed.The research of the National High Technology Research and Development Program of China,“trusted platform for third-party cloud computing online evaluation and analysis technology” were summarized.The trusted evaluation model and architecture were described from the cloud platform,the dynamic evaluation technology,the credible evidence collection and the trusted test mechanism,the credibility of the quantitative evaluation method,and the prototype system integrated by tools ,to evaluate the credibility of cloud platform.…”
Get full text
Article -
5606
EXAMINING THE CAUSAL NEXUS BETWEEN TOURIST ARRIVALS AND TERRORISM IN EMERGING COUNTRIES
Published 2018-12-01“…Results suggest that emergingcountry authorities should increase security precautions to ensure thattourists feel safe and in order to attract more tourists, ceteris paribus.…”
Get full text
Article -
5607
Behavior of Full-Scale Porous GFRP Barrier under Blast Loads
Published 2015-01-01“…This research paper is part of the SAS (Security of Airport Structures) Project funded by the European Programme for Critical Infrastructure Protection, whose objective was to develop and deploy a fiber reinforced polymer (FRP) fencing system intended to protect airport infrastructures against terrorist acts. …”
Get full text
Article -
5608
Design and implementation of an intrusion-tolerant application server middleware
Published 2009-01-01“…An intrusion-tolerance middleware model based on the interceptor was proposed, with a component named intrusion-tolerance framework which logically divided the intrusion-tolerance functions into service providers and service management.The system analyses were designed by adapting intrusion tolerance security model and element technology, the theory of intrusion tolerance mechanism and the strategy of implementation were described, and the intrusion tolerance technology and implementation method was extracted.Finally, an intrusion-tolerance J2EE middleware was realized, built on JBoss-an open source J2EE application server platform, and was implemented through Java class load mechanism with the dynamic load of the intrusion-tolerance class.…”
Get full text
Article -
5609
Research and design of the intelligent energy management and control platform in the airport area based on the IoT technology
Published 2021-06-01“…The construction of the green airport urgently needs an efficient energy security information system in face of the electric energy substitution and clean energy access.A design idea of the intelligent energy management and control platform in the airport area based on the Internet of things (IoT) technology was proposed.The platform included a perception layer, a network layer, a data layer and an application layer.The IoT technology and the fusion technology of the information and energy were adopted to realize the application scenarios for multiple users.Finally, an energy control platform framework was designed by combing the energy information of a civil hub airport to provide basic services for further exploration of the value of the energy.…”
Get full text
Article -
5610
Developing Countries and Blockchain Technology: Uganda’s Perspective
Published 2018“…Fundamentally, these nations need transparency, security, and accountability in their processes, all of which are cornerstones of Blockchain technology. …”
Get full text
Article -
5611
Corrigendum: Correction of Figure. A Key Metabolic Regulator of Bone and Cartilage Health
Published 2024-12-01Get full text
Article -
5612
-
5613
On a Parametric Mulholland-Type Inequality and Applications
Published 2019-01-01Get full text
Article -
5614
-
5615
O grande deslocamento da violência
Published 2024-03-01“…The article is based on original maps produced using data from the Atlas of Violence published by the Institute for Applied Economic Research (Ipea) and the Brazilian Public Security Forum, showing huge spatial differences in the distribution of homicides. …”
Get full text
Article -
5616
Sub-regional efforts to achieve gender equality in land ownership
Published 2025-01-01“…Results: The results obtained from my analysis are: the mechanisms for implementing women’s tenure security; the tools for codifying women’s land tenure; and the monitoring progress for strengthening women’s land rights in Africa. …”
Get full text
Article -
5617
Transformative adaptation: from climate-smart to climate-resilient agriculture
Published 2023-08-01“…Abstract In response to the climate crisis, there has been much focus on climate-smart agriculture (CSA); namely, technologies and practices that enhance adaptation, reduce greenhouse gas emissions, and contribute to food security; the so-called triple win. Success has tended to be measured in terms of the number of farmers adopting CSA with less focus given to the impacts especially on human development. …”
Get full text
Article -
5618
-
5619
Land use transition and its driving mechanisms in China’s human-elephant conflict areas
Published 2025-01-01Get full text
Article -
5620
Effectiveness of pre-employment card policy on employment transition during covid-19: evidence from Indonesian dual labor market
Published 2024-11-01“…The effectiveness of the PEC policy is measured through key indicators such as labor absorption rates, reduction in unemployment, and the likelihood of securing formal employment over informal alternatives. …”
Get full text
Article