Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5761
Design of knowledge transaction protection mechanism in the open innovation community based on blockchain technology
Published 2025-03-01“…This paper proposes an approach that combines blockchain technology and an OIC, as blockchain technology provides a direction for solving trust and security problems in community platform transactions. …”
Get full text
Article -
5762
INFORMATION-ANALYTICAL SYSTEM OF MONITORING OF THE SHADOW OF NON-CASH FLOW: BASIC ELEMENTS, AUTHOR’S SIMULATION ALGORITHM
Published 2019-09-01“…The sequence of actions of users of the developed monitoring system has been revealed, which allows to calculate the minimum value of the shadow cashless cash flow, as well as quantitatively and qualitatively characterize the shadow economy, which is prospective in solving the problems of economic security of Russia.…”
Get full text
Article -
5763
Data processing based on the privacy-preserving vector for wireless sensor networks
Published 2015-09-01“…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
Get full text
Article -
5764
Methodological foundations of political-geographical studies of borders using the example of Hungary
Published 2024-01-01“…Border management involves control of movement, security, and cross-border cooperation, which is critical for regional stability and development. …”
Get full text
Article -
5765
Sharenting – skala i wielowymiarowość zjawiska (nierozważnego) ujawniania przez rodziców informacji o dzieciach w mediach społecznościowych
Published 2018-12-01“…There is a need of educational actions, directed to both parents and society, about the children’s security and safety of their privacy in the Internet. …”
Get full text
Article -
5766
REVIEW ON OPERATION STATE ASSESSMENT AND PROGNOSTICS FOR MECHANICAL EQUIPMENT BASED ON HIDDEN MARKOV MODEL
Published 2017-01-01“…With the continuous improvement requirements of reliability and security for mechanical equipment,accurate extraction of equipment fault development trend of degradation characteristic information and establishment of effective fault prediction model is the key problem to improve reliability of equipment operation. …”
Get full text
Article -
5767
Efficient communication protocol of group negotiation in VANET
Published 2018-01-01“…An efficient communication protocol of group negotiation was proposed.The protocol adopted self-checking authentication in group to avoid the nodes sending certificates to the authentication center which improved the efficiency of identification.At the same time,the group establishment among nodes which through negotiation ensured the communication confidentiality and prevented the phenomenon of single-point failure.Besides,a group key transmission scheme was proposed to reduce the frequency of authentication for legal vehicles and improve the speed of joining in the group.At the end,theoretical analysis and simulation results demonstrate that the proposed protocol not only meets the security requirements of communication in VANET,but also shows much better performance than previous reported schemes on verification delay,transmission overhead and average delay.…”
Get full text
Article -
5768
CAN bus flood attack detection based on communication characteristics
Published 2020-02-01“…CAN has become the most extensive fieldbus for contemporary automotive applications due to its outstanding reliability and flexibility.However,the standard CAN protocol does not provide sufficient security measures and is vulnerable to eavesdropping,replay,flooding,and denial of service attacks.In order to effectively detect whether the CAN bus is attacked,and to filter malicious messages when subjected to flooding attacks.The characteristics of vehicle CAN bus message communication were analyzed,and an intrusion detection method was proposed,which could effectively perform intrusion detection and malicious message filtering.Through experimental verification,the method can detect whether the CAN bus is attacked by 100%,and the accuracy of malicious packet filtering can reach over 99%.…”
Get full text
Article -
5769
Key-exposure resilient integrity auditing scheme with encrypted data deduplication
Published 2019-04-01“…For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.…”
Get full text
Article -
5770
Dual-branch autoencoder network for attacking deep hashing image retrieval models
Published 2023-11-01“…Due to its powerful representation learning capabilities and efficient computing capabilities, deep learning-based hashing (deep hashing) methods are widely used in large-scale image retrieval.However, there are less studies on the security of deep hashing models.A dual-branch autoencoder network (DBAE) to study targeted attacks on such retrieval was proposed.The main goal of DBAE was to generate imperceptible adversarial samples as query images in order to make the images retrieved by the deep hashing model semantically irrelevant to the original image and relevant to the target image.Numerous experiments demonstrate that DBAE can successfully generate adversarial samples with small perturbations to mislead deep hashing models, and italso verifies the transferability of these perturbations under various settings.…”
Get full text
Article -
5771
The role of pangenomics in orphan crop improvement
Published 2025-01-01“…Abstract Global food security depends heavily on a few staple crops, while orphan crops, despite being less studied, offer the potential benefits of environmental adaptation and enhanced nutritional traits, especially in a changing climate. …”
Get full text
Article -
5772
Multiuser secret key generation based on received signal
Published 2018-10-01“…The secret key generation method based on channel characteristic provides a new way for communication security.But under the conditions of multiuser and slow fading,because of the slow channel parameter changing rate,using the secret key generation method above can result in a low secret key rate.To solve this problem,a multiuser secret key generation method based on the received signal was proposed.By distributing the random signals to different users using block diagonalization precoding,base station and user can extract the secret key from the received signal.The novel method could significantly increase the secret key rate of multiuser under the quasi-static channel and slow-fading channel,which is verified by simulations.…”
Get full text
Article -
5773
Food Insecurity and Obesity
Published 2017-05-01“…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
Get full text
Article -
5774
Du détroit de Malacca jusqu’à sa périphérie
Published 2009-09-01“…Although the Malacca Strait was previously one of the main piracy prone areas, it is becoming increasingly secure, and presents itself as a good example. Nevertheless, field research tends to cast a shadow over this optimistic view. …”
Get full text
Article -
5775
Blockchain-based ARP defense scheme
Published 2018-09-01“…In order to improve the difficulty of maintaining the static binding method when defending against ARP attacks,a defense method was designed with the features of low cost of defense and easy maintenance by using the idea of a blockchain technology.The blockchain structure had been improved,and the transaction index table structure had been designed to identify attacks and update data in a timely manner to prevent subsequent attacks.The content of the transaction index table was updated after the IP address was changed normally to ensure the correctness of the query.Analysis and experiments show that the blockchain-based defense method has the following merits:high security,guaranteeing the data is not tampered with,low cost of maintenance,and effective prevention against ARP spoofing attacks.…”
Get full text
Article -
5776
THE SIGNIFICANCE AND ROLE OF USING INNOVATIVE TECHNOLOGIES IN MODERN AGRICULTURAL PRODUCTION
Published 2024-11-01“…So, current agrifood production ensures food safety and security by the wider use of various drones, robots, sensors, software packages, IoT, etc., enabling business optimization, sustainability and profitability. …”
Get full text
Article -
5777
Decolonising Bibles? Image, imagination, and imagin(in)g in the postcolonial academy
Published 2023-11-01“…Ensconced in the image of ideologically secure and contented intellectual space, epistemological and hermeneutical approaches which explicitly involve the social location of interpreters and academic discourses are still viewed with concern if not suspicion. …”
Get full text
Article -
5778
Calculation Method of Driving Force of the Plate Quantitative Conveyor Chain Drive System
Published 2015-01-01“…For improving the stability and security when the plate quantitative conveyor start-up and the accelerating operation,the calculation problem of driving force of chain drive system is studied.The maximum static tension of the chain drive system on stable operating conditions is calculated by point by point calculation method.The multi-axis electric drive system conversion method is proposed and the acceleration load is calculated by converted the inertial resistance of linear moving parts and rotating parts to drive shaft.The maximum driving force is sum of maximum static tension and the acceleration load.The results show that,the acceleration load account for the driving force about 35%,the drive power and breaking force calculation is necessary to consider the impact of the acceleration load in addition to the maximum static tension.…”
Get full text
Article -
5779
Estate Planning
Published 2012-03-01“…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
Get full text
Article -
5780
How to Protect Future Generations' Rights in European Governance
Published 2010-10-01“…Given that future generations are right-bearing citizens of tomorrow, legislative systems should secure these rights through appropriate institutions. …”
Get full text
Article