Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5741
Entre el indigenismo y las compañías bananeras internacionales:El origen de las reservas indígenas en Costa Rica, 1907-1956
Published 2019-01-01“…Nonetheless, in 1956 its government began securing indigenous land rights by erecting reserves. …”
Get full text
Article -
5742
Decision-Making under Pillars Two and Three
Published 2009-12-01“…The second pillar is connected with Common Foreign and Security Policy, while the third pillar contributes with Justice and Home Affairs. …”
Get full text
Article -
5743
Chinese wall model based on dynamic alliance
Published 2009-01-01“…The conflict of interest relation defined in BN Chinese wall model was usually utilized to divide the resources into different access regions.Unfortunately,the Chinese wall model gave much constraint on write permission that the access regions need to be predetermined and divided statically.A modified version of Chinese wall model was proposed to solve this problem.Through establishing dynamic alliance to extend the conflict of interest relation,the objects of different conflict classes could be dynamically divided into different access regions.Finally,a theory was verified that the modified version of Chinese wall model could achieve the same security goal as BN Chinese wall model.The analysis shows that the model can be applied in covert flows confinement in virtual machine system.…”
Get full text
Article -
5744
Cloud-edge-device fusion architecture oriented to spectrum cognition and decision in low altitude intelligence network
Published 2023-11-01“…A new architecture for the typical application scenario of low altitude intelligence network spectrum cognition and decision was introduced.Firstly, the challenges of spectrum security management and efficient sharing in low altitude intelligence network were analyzed, and the key scientific problems that need to be solved were summarized.Secondly, to support the spectrum management and sharing of low altitude intelligence network through deep integration of cloud, edge, and device, the cloud-edge-device fusion architecture for low altitude intelligence network spectrum cognition and decision was proposed.Then, the key technologies such as fast and accurate spectrum recognition and agile adaptive decision making based on cloud-edge-device fusion were discussed.Finally, the future research direction of the architecture was introduced.…”
Get full text
Article -
5745
Steganography based on parameters’ disturbance of spatial image transform
Published 2017-10-01“…In the research of state-of-the-art steganography algorithms,most of image sources were natural images in laboratory environment.However,with the rapid development of image process tools and applications,images after image processing were widely used in real world.How to use image process to improve steganography has not been systematically studied.Taking spatial image transform for consideration,a parameters’ disturbance model was presented,which could hide the noise taken by steganography in the pixel fluctuation due to the disturbance.Meanwhile,it would introduce cover source mismatch for a steganalyzer.The experimental results show that,compared with using traditional image database,it can significantly enhance the security of steganography algorithms and accommodative to the real world situation.…”
Get full text
Article -
5746
THE EVOLVING DYNAMICS OF NATIONAL SOVEREIGNTY AND POLITICS IN THE ERA OF GLOBALIZATION IN NIGERIA
Published 2022-05-01“…The paper analyzes the challenges and opportunities that globalization poses for Nigeria's sovereignty, democracy, security, and regional integration. It also explores the strategies and policies that the Nigerian government and civil society have adopted to cope with the effects of globalization and to enhance their participation in the global arena. …”
Get full text
Article -
5747
International cooperation in the sphere of peaceful uses of nuclear energy as a resolution of energy supply and nuclear proliferation problems
Published 2009-12-01“…The goal of such an analysis is to figure out which one has a greater potential for international security and future development of the nuclear energy sector.…”
Get full text
Article -
5748
Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network
Published 2016-07-01“…The theoretical analysis shows that this scheme is secure and effective, and thus it is especially suit-able for large-scale wireless mobile networks.…”
Get full text
Article -
5749
Application-aware IPv6 networking
Published 2020-08-01“…,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
Get full text
Article -
5750
Algorithm of reducing the balanced H-Boolean function correlation-measure and research on correlative issue
Published 2010-01-01“…Took the derivative and e-derivative of Boolean function as a tool,analyzed the inner structure of balanced H-Boolean functions,clearly obtained the conclusion that the second-order correlation-immune balanced H-Boolean function is not existent,solved the problem that whether there was a second-order correlation-immune balanced H-Boolean function which has not yet proper result.From the rationality of logic and theory,defined the necessity of discussing the generalized correlation-immune of balanced H-Boolean function for the security of cryptosystem.And through the analysis of generalized correlation-immunity and correlation-measure of balanced H-Boolean function,de-rived the algorithms which reduced the balanced H-Boolean function correlation-measure,and while increased the order of correlation-measure.…”
Get full text
Article -
5751
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Published 2015-01-01“…In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
Get full text
Article -
5752
Steganalysis of LSB matching based on regional correlation
Published 2010-01-01“…LSB matching improves the security of hidden message through changing the pixel’s LSB randomly, which breaks the rules of pairs of values of LSB replacement. …”
Get full text
Article -
5753
Combating Cybercrime and Cyberterrorism in Indonesia
Published 2023-02-01“…Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures. …”
Get full text
Article -
5754
Digital twin enhanced agile design of ship pipeline systems [version 2; peer review: 1 approved, 3 approved with reservations]
Published 2025-01-01“…The shipbuilding industry plays a pivotal role in national strategic security and economic development, and one critical challenge is the pipeline layout design problem. …”
Get full text
Article -
5755
Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms
Published 2015-01-01“…Watermarking plays an important role in protecting, sharing, and securing medical data. In this work, a robust nonblind medical image watermarking scheme is proposed. …”
Get full text
Article -
5756
Financial aspects of Public-Private Partnership
Published 2008-03-01“…The growth of public requests is evident in the case of Croatia, but also present in every European country, with the government’s lack of ability to secure sufficient financial income. The look for additional sources of financing, in order to build public infrastructure, is directed therefore more and more to the private financing capital and to public-private partnerships. …”
Get full text
Article -
5757
Conceptual basis for creating the electronic service "Evaluation of the efficiency of the class teacher"
Published 2023-08-01“…The principles of design, security requirements, as well as the possibilities and prospects for using the electronic service in the system of general and additional professional education are disclosed.…”
Get full text
Article -
5758
Ecological Flow Scheduling Solutions of Beijiang River
Published 2023-01-01“…Beijiang River is one of the four major river systems in the Pearl River Basin.The discharge of its control section Shijiao can represent the ecological flow of the Beijiang River.Additionally,it can also cooperate with the water regulation of Xijiang River during the saltwater intrusion in the Pearl River Delta and control the water volume of the Sixianjiao Section entering the delta,which is significant for the water security of Guangdong-Hong Kong-Macao Greater Bay Area.This paper first analyzes the current ecological flow of the control section of the Beijiang River.Then,the paper builds the reservoir group scheduling model according to the existing problems.Finally,it researches the ecological flow scheduling in the basin to propose an ecological flow scheduling scheme for the Beijiang River.…”
Get full text
Article -
5759
Influencing Factors Analysis on Land-Lost Farmers’ Happiness Based on the Rough DEMATEL Method
Published 2020-01-01“…The government can improve the social environment policies, such as land acquisition, social security, and employment to influence other factors and improve the level of happiness of land-losing farmers. …”
Get full text
Article -
5760
Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period
Published 2019-01-01“…Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.…”
Get full text
Article