Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5681
Digital finance, maize productivity, and welfare of farm households in Burkina Faso
Published 2025-12-01“…Maize productivity is thus important for food security and household welfare but is constrained by financial issues that can be alleviated by digital finance. …”
Get full text
Article -
5682
Development trend and application analysis of blockchain with 5G
Published 2020-03-01“…Through the evolution from the information internet era of large connections and large collaborations to the era of strong trust and strong security,the blockchain has triggered a multi-wave technology wave with its characteristics of openness,transparency and decentralization,becoming the new generation of information technology development trends.Starting from the dimensions of technology,people's livelihood and industry,the infrastructure and evolution trends reveal that the blockchain was the essence of the reorganization and re-innovation of the existing technology.The applications were re-divided into the currency circle and chain ring from a technical perspective.By comparing the blockchain technology with 5G technology,the innovative application scenarios of the decoupling and cross-integration were explored that may be involved in the future of the blockchain.…”
Get full text
Article -
5683
Cost Share Programs for Florida's Agricultural Producers and Landowners
Published 2009-01-01“… SL-264, a 4-page fact sheet by Rao Mylavarapu, Kelly Hines, and Alyssa Dodd, describes several conservation programs included in the 2008 Farm Bill — the Environmental Quality Incentives Program (EQIP), Wetlands Reserve Program (WRP), Grassland Reserve Program (GRP), Wildlife Habitats Incentive Program (WHIP), and the Conservation Security Program (CRP) — which may be of high interest to farmers, ranchers, land owners, agricultural consultants, local decision-makers and extension agents. …”
Get full text
Article -
5684
Talk About Crime Among Young People in Northern Mexico: The Impact of Drug Trafficking in the Neighborhood
Published 2025-01-01“…The main changes pointed out by the young people were the intensification of insecurity, the expansion of drug dealing in the community, mental health problems (especially addictions), the restriction of mobility on the streets, and changes in the relationship with security institutions. They also refer to changes such as the normalization of drug trafficking and the decline of the neighborhood’s image.…”
Get full text
Article -
5685
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01“…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
Get full text
Article -
5686
Existe-t-il un renouveau syndical en Argentine ? Le cas du secteur automobile
Published 2014-01-01“…The data cover the period 2003-2012 and were systematized by the Ministry of Labour, Employment and Social Security (Ministerio de Trabajo, Empleo y Seguridad Social, MTEySS).…”
Get full text
Article -
5687
THE MAIN PROBLEMS OF THE DEVELOPMENT OF INSURANCE SERVICES IN THE AGRICULTURAL SECTOR OF THE REPUBLIC OF TAJIKISTAN AND THE WAYS OF ITS SOLUTION
Published 2017-03-01“…The article dwells on problems of development of insurance services in the Republic of Tajikistan, the insurance market, in particular the development of insurance services in the agricultural sector and its influence on the further development of agriculture and food security in Tajikistan. The author determines that among the most pressing problems which inhibit the insurance, is not well-developed banking system, not profitability and productivity of existing farms and farms, insufficient government subsidies in the agricultural sector, macroeconomic factors, increased differentiation of agricultural producers in terms of income, the bankruptcy of a large part of dehkan (farmer) economy and the lack of necessary infrastructure. …”
Get full text
Article -
5688
Application Prospect of Space-Integrated-Ground Information Network in Railway
Published 2021-03-01“…With the advantages of wide coverage, no geographical restrictions and convenient establishment, the spaceintegrated-ground information network can integrate with the existing railway communication network and expand the railway communication service capacity and service scope.Based on the analysis of the application status of railway communication system in China, the application requirements of the space-integrated-ground information network from the aspects of railway business, technical development and intelligent railway construction were discussed.The overall application framework of the space-integrated-ground information network was put forward, the access mode and application mode of the network and satellite terminals were designed, and the typical application requirements in railway survey and construction, emergency rescue, railway operation and security were analyzed.…”
Get full text
Article -
5689
Tributary
Published 2023-05-01“…Tributary explores covert, 'black-boxed' data centres (remote and highly secure sites) by tracking water and geothermal sources to the infrastructure required to power and house these physical locations of intensive computational processing. …”
Get full text
Article -
5690
Review of information hiding on Chinese text
Published 2019-09-01“…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
Get full text
Article -
5691
Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act
Published 2016-02-01“… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
Get full text
Article -
5692
Identification of critical nodes in supply chain networks
Published 2025-01-01“…The accurate identification of the critical nodes in a SCN is important for securing the supply chain. This study proposes a new method for identifying critical nodes in SCNs based on the topological and functional characteristics of SCNs. …”
Get full text
Article -
5693
VALUES OF MOLDOVANS HIGH SCHOOL STUDENTS FROM ITALY AND THE REPUBLIC OF MOLDOVA: A CROSS-CULTURAL ASPECT
Published 2023-02-01“…Therefore, if for schoolchildren - sons of Moldovan migrants, the priority values are: interesting work and material security, then for their colleagues from the Republic of Moldova, the priority belongs to the spheres of life: family and health. …”
Get full text
Article -
5694
A Laryngoscope with Shape Memory Actuation
Published 2024-09-01“…Endotracheal intubation is a medical procedure to secure a patient’s airways, which can be challenging in emergency situations due to an individual’s anatomy. …”
Get full text
Article -
5695
Individual Agency and the Diversity of Traditional Practice: The Iji Nla Association of Ijede
Published 2021-12-01“…Over time, it increasingly functioned as an institution providing traditional social control mechanisms and security. This article focuses on the origin, structure, and diversity of the Iji Nla Association as a traditional social mechanism and its continued relevance in Ijede. …”
Get full text
Article -
5696
State Failure and The Sunni-Shia Conflict in Sampang Madura
Published 2023-12-01“…It will not only figure out the discourse through political or security perspective, but also tries to view the failure and the weakness of the state from the conflict-transformation and social perspective. …”
Get full text
Article -
5697
An Improvement of the Camshift Human Tracking Algorithm Based on Deep Learning and the Kalman Filter
Published 2023-01-01“…Automated human tracking in real time has been applied in many areas such as security, surveillance, traffic control, and robots. …”
Get full text
Article -
5698
Verifiable special threshold secret sharing scheme based on eigenvalue
Published 2018-08-01“…Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12.…”
Get full text
Article -
5699
Analysis of instructions virtual machine vulnerabilities in anti-virus software
Published 2016-10-01“…Instructions virtual machine technology is one of the core technologies used in today's anti-virus field, the vast majority of anti-virus software scan engines use virtualization technology to analyze file and to revert the behavior of this program whether will be a threat to system security or not. According to this process behavioral characteristics, it is determined whether it is a virus or Trojan. …”
Get full text
Article -
5700
Delay-Range-Dependent H∞ Control for Automatic Mooring Positioning System with Time-Varying Input Delay
Published 2014-01-01“…Aiming at the economy and security of the positioning system in semi-submersible platform, the paper presents a new scheme based on the mooring line switching strategy. …”
Get full text
Article