Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5661
Survey of research on multimodal semantic communication
Published 2023-05-01“…With the cross-integration of artificial intelligence and communications, technologies for processing multimodal data such as text, image, audio, and video are booming, the shared dimension of modal semantics is deeply excavated, and the characteristics of multimodal semantic information such as high abstraction, intelligence and simplicity are being fully utilized, which brings new ideas and means to semantic communications.First, the fundamental theories and classifications of semantic communication were introduced, and the research status of single-modal semantic communication was reviewed for text, image, audio, and video respectively.Then, the research status of multimodal semantic communication was reviewed, and multimodal data fusion technology and secure semantic communication were introduced.Finally, the challenges faced by multimodal semantic communication were summarized.…”
Get full text
Article -
5662
Intelligent machine-type communication and network for 6G system
Published 2020-03-01“…With the rapid development of smart city,smart manufacturing and other industries,machine-type communication has gained much attention of academia and industry.The extent of function integration and intelligence of machine-type communication network has become increasingly high,which imposes more stringent requirements on network delay,reliability,number of connected devices,peak rate,security and scalability.Based on analyzing the change of performance requirements,key technology and corresponding network architecture of machine-type communication network in 4G,5G to future 6G system,the intelligent sensing-communication-computation integrated network architecture was proposed for 6G machine-type communication network.…”
Get full text
Article -
5663
Location privacy preserving scheme against attack from friends in SNS
Published 2016-10-01“…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
Get full text
Article -
5664
Review on cross-chain technology research of blockchains
Published 2022-12-01“…With the in-depth development and continuous innovation of blockchain technology, blockchain networks suitable for different application scenarios and design requirements have emerged as the times require, the mutual independence of blockchains inevitably forms the value island effect of the blockchain.Cross-chain technology is an important technical means to realize industrial collaboration and value circulation between different blockchains and improve their interoperability and scalability.Firstly, the basic concept of cross-chain was introduced.And then, the technical difficulties of cross-chain, the technical characteristics of the main mechanism of cross-chain, and the security of cross-chain were analyzed in detail.Finally, the challenges faced by the current cross-chain technology were introduced, and the future development of cross-chain technology was prospected.…”
Get full text
Article -
5665
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01“…In order to solve the problem of message authentication under the conditions of the ship ad-hoc network (SANET),a signature scheme that does not depend on trusted certificate authorities and tamper-proof devices (TPD) was proposed by using the threshold proxy signature scheme and the properties of bilinear pairings.The proposed scheme used the dual-proxy key and the threshold signature mechanism to enable the ship nodes calculate the message signature in polynomial time.Moreover,the security of the scheme was also proved under the random oracle model.The performance analysis results show that the proposed scheme can meet the requirement of strong proxy signature under the premise of guaranteeing correctness,and has lower computational cost and communication cost.…”
Get full text
Article -
5666
Power Consumption Based Android Malware Detection
Published 2016-01-01“…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
Get full text
Article -
5667
Les effets de la précarité du travail sur la santé : le droit du travail peut-il s’en saisir ?
Published 2009-05-01“…In addition to this suffering, this phenomenon has a cost not only for the victims, but also for social security and the company. As well, labour law must be able to take the labour market reconfiguration into account in order to improve working conditions. …”
Get full text
Article -
5668
Housing for the elderly and digital technologies. Perspectives, processes and future scenarios
Published 2020-12-01“…Starting from the study of ‘smart homes’ prototype models, the contribution proposes a critical reflection on processes, products and services that could be implemented in future housing for the elderly, facilitating new forms of well-being, security and social inclusion. Compared to ongoing experimental researches, new possible dynamics of innovation in processes and products are delineated, hypothesizing the application of smart systems to real living environments for the elderly.…”
Get full text
Article -
5669
Projevy odporu proti nastupující kolektivizaci na Novobydžovsku
Published 2012-01-01“…The author also puts forward a detailed analysis of the State Security (StB) provocation action, for which the setting up of informers among anti-communist leaning members of the population became a primary task. …”
Get full text
Article -
5670
LoRaWAN technologies for enabling new generation Internet of things
Published 2021-06-01“…., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
Get full text
Article -
5671
How to Design a Study and Write a Grant in Radiology?
Published 2025-01-01“…Thus, it is essential for academic radiologists pursuing research in radiology to be able to write successful grants and secure funds. In this review article, we discuss the strategies to design a study and write successful grants.…”
Get full text
Article -
5672
Multi-authority attribute-based encryption with efficient revocation
Published 2017-03-01“…Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups,and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition,the proposed scheme supports large universe and any monotone access structures,which makes it more flexible for practical applications.…”
Get full text
Article -
5673
Origins of COVID-19: A Comprehensive Analysis of Zoonotic Drift Patterns and Gain-of-Function Research
Published 2024-12-01“…The pandemic’s global socio-political implications highlight the urgency for international cooperation and transparency to mitigate future health and security challenges.…”
Get full text
Article -
5674
Research progress of mimic multi-execution scheduling algorithm
Published 2021-05-01“…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
Get full text
Article -
5675
A novel perturbation attack on SVM by greedy algorithm
Published 2019-01-01“…With the increasing concern of machine learning security issues, an adversarial sample generation method for SVM was proposed. …”
Get full text
Article -
5676
Defense of hidden backdoor technology for Web
Published 2020-05-01“…Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.…”
Get full text
Article -
5677
Method of ciphertext retrieval in mobile edge computing based on block segmentation
Published 2020-07-01“…Aiming at the efficiency of cloud computing ciphertext retrieval scheme,a method of ciphertext retrieval in mobile edge computing based on block segmentations was proposed.Firstly,the edge server was introduced to calculate the document similarity score,thereby the computational cost of cloud server was reduced and the processing efficiency of cloud server was improved.Secondly,most keywords that are not related to the query were filtered out by a method of block segmentations based on the MRSE scheme,thereby the efficiency of calculating the document similarity score was improved.Theoretical analysis and experimental results show that the solution is safe under the known background threat model.Compared with the existing scheme,the proposed scheme has the same security and higher retrieval efficiency.…”
Get full text
Article -
5678
Survey on public key encryption with equality test
Published 2018-11-01“…As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly) different public keys contain the same message without decrypting the ciphertexts.Definitions,security models and six types of authorization modes of PKEET are introduced and summarized.Besides,the relationship between PKEET and public key encryption with keyword search (PKES) is discussed.Several typical public-key,identity-based and attribute-based encryption with equality test schemes proposed recently are analyzed and compared.Furthermore,some application scenarios and research directions are discussed.…”
Get full text
Article -
5679
Coronavirus Crisis and Housing Policy Challenges
Published 2020-07-01“…However, it has become apparent that further temporary regulations are needed within the scope of social security of housing. In the course of the recession, pronounced price declines on the housing markets are to be expected due to the great relevance of demandside developments. …”
Get full text
Article -
5680
Self-Protection Technology for Application-Aware Network Management System
Published 2015-05-01“…At present,increasing devoid of fast and effective monitoring means has taken place,especially on construction of application aware-oriented security system for network management,which could find and deal with problems of NMSS platform before repercussions from user application-aware,thus to improve capabilities of self-protection management and support. …”
Get full text
Article