Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5781
Cluster-based key management scheme for ad hoc networks
Published 2008-01-01“…A new threshold key distribution scheme basing on self-certified public key and CPK(composite public key) technology was presented for ad hoc networks.Basing on the key distribution scheme and cluster networks structure,an integrated key management scheme was presented.The public key can be certified itself and so the certificate is not need in the scheme.The process of key distribution is simple and the key escrow problem existing in IBE(identity-based en-cryption) scheme is solved.The scheme can be used in different scale networks and can meet the dynamic topology of the ad hoc networks.The experimental results and theoretical analysis show that the overhead of computation and communi-cation is lower.Comparing with PKI and IBE scheme the scheme is more secure and practical.…”
Get full text
Article -
5782
Remarks on the Reasoning: The Morals of a Hungarian Expulsion Decision in Times of Pandemic
Published 2021-05-01“… Several Iranian university students were expelled from Hungary to Iran due to their (allegedly) unlawful behaviour during their quarantine period at the outburst of the Covid-19 pandemic on grounds of being a threat to public policy and public security. The case reveals a worrisome practice in the reasoning of expulsion decisions, irrespective of the pandemic. …”
Get full text
Article -
5783
Service Provider Selection For Project Logistics Operations With Fuzzy Analytic Hierarchy Process
Published 2023-01-01“…The results are that for project logistics management, logistics service providers need to improve vehicle availability, cargo security, on-time delivery, etc. to become more competitive.…”
Get full text
Article -
5784
Optical fiber eavesdropping detection method based on machine learning
Published 2020-11-01“…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
Get full text
Article -
5785
“Un-American Confessions”: Translation as Subversion in Robert Lowell’s Life Studies (1959)
Published 2017-08-01“…The Life Studies imitations, by this account, offer furtive testimony to Lowell’s potentially subversive poetic preoccupation and engagement with cold war cultural anxieties circulating around terms such as containment, conspiracy, domesticity, paranoia, security, secrecy.…”
Get full text
Article -
5786
RBFT: a new Byzantine fault-tolerant consensus mechanism based on Raft cluster
Published 2021-03-01“…The existing consensus mechanisms of consortium blockchain are not scalable enough to provide low latency, high throughput and security while supporting large-scale network.A new consensus mechanism called RBFT was proposed to improve scalability, which was a two-level consensus mechanism with supervised nodes based on the idea of network fragmentation.In RBFT, the nodes were firstly divided into several groups.Each group adopted the improved Raft mechanism to reach consensus and select leader.Then, the leaders of each group formed the network committee, and the network committee adopted PBFT mechanism for consensus.Comparative experiments verify that RBFT can tolerant Byzantine fault while ensuring high consensus efficiency in large-scale network compared with PBFT and Raft.…”
Get full text
Article -
5787
A compressive data gathering method based on El Gamal cryptography
Published 2019-12-01“…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
Get full text
Article -
5788
Asymmetric watermarking based on Contourlet transform and subspace projection
Published 2009-01-01“…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
Get full text
Article -
5789
Status of GPU capabilities within the Shift Monte Carlo radiation transport code*
Published 2025-01-01“…Shift is a general-purpose Monte Carlo (MC) radiation transport code for fission, fusion, and national security applications. Shift has been adapted to efficiently run on GPUs in order to leverage leadership-class supercomputers. …”
Get full text
Article -
5790
Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer
Published 2013-01-01“…This paper presents an unknown input Proportional Multiple-Integral Observer (PIO) for synchronization of chaotic systems based on Takagi-Sugeno (TS) fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. …”
Get full text
Article -
5791
Use of biological control agents for managing fungal pathogens in Solanaceae crops: progress and future perspectives—a review
Published 2025-01-01“…Abstract The growing global population has intensified concerns about food security, making it essential to produce crops sustainably to meet increasing demands without harming the environment. …”
Get full text
Article -
5792
GreyFan:a network attack framework using Wi-Fi covert channel
Published 2019-09-01“…For traditional physical attacks such as side channel attacks and HID attacks in real networks,physical isolation is considered to be a relatively complete security protection against network attacks.In 2018,a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed,that is,in the state that Wi-Fi didn’t connected,the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi,such as file concealed transmission and arbitrary code execution,etc.The corresponding defense technology was also analyzed.…”
Get full text
Article -
5793
Repair of traumatic flank hernia with mesh strip suture: a case report
Published 2022-08-01“…Our findings indicate that when it is difficult to secure a sufficient operative field for mesh anchoring in a traumatic flank hernia, a technique of sutured repair with mesh strips may be considered as a treatment option as it requires less dissection. …”
Get full text
Article -
5794
Green IoT: how wireless sensor networks are paving the way for sustainable smart environments
Published 2023-06-01“…This article clarifies the concept of the IoT, including its features, security concerns, and technology adoption trends.…”
Get full text
Article -
5795
Direct radiocarbon dating and stable isotopes of the neandertal femur from Les Rochers-de-Villeneuve (Lussac-les-Châteaux, Vienne)
Published 2006-06-01“…The direct radiocarbon date makes it the oldest directly dated European Neandertal specimen, even though others have securely associated radiocarbon dates in the same time range. …”
Get full text
Article -
5796
Research on key technology and development of industrial Internet network
Published 2022-07-01“…In recent years, the rapid development of the industrial Internet has become an important approach to promote the digital transformation of the industries.In order to maximize the role of the comprehensive interconnection of people, machines, things and enterprises in the industrial Internet, it is necessary to build a more open, more resilient and more diverse network which integrates automation systems, communication networks, and new-generation information technologies, and also meets the basic requirements of the reliability, stability, and security.The connotation of the industrial Internet network serving manufacturing was discussed.Relevant key technologies, applicable scenarios and main research results were introduced.The research and development trends in this field were summarized and analyzed.Suggestions for further construction and deployment of the industrial Internet networks were proposed.…”
Get full text
Article -
5797
Constructing Core Backbone Grid Based on the Index System of Power Grid Survivability and BBO Algorithm
Published 2014-01-01“…The survivability index of power grid is made up of four indices, namely, the resistibility, recoverability, security, and connectivity. Based on survivability, a method of constructing core backbone grid with the optimal criteria of the minimal total line length and the largest integrated survivability index is put forward. …”
Get full text
Article -
5798
Determinants of Market Liquidity of Shares Traded on the BM&FBOVESPA
Published 2014-01-01“…The greater the difference between the price offered and the demanded on a security (bid-ask spread), the greater its illiquidity. …”
Get full text
Article -
5799
Human personality privacy analysis based on visual features
Published 2016-11-01“…But from perspective of privacy protection, this will affect the privacy security. A novel hu-man personality privacy analysis method based on portrait was proposed. …”
Get full text
Article -
5800
Dandiacal Conversation in Oscar Wilde’s Comedies of Manners: Conventions, Conversions and Reconfigurations of Phallogocentrism
Published 2010-12-01“…Their strong reliance on rhetoric ensures their supremacy in polite conversation, even if their intellectual and cultural edge does a lot to secure their domination. What is more, their mastery of codes and norms enables them to destabilize the semantics of the age, a gesture which can be equated to a reconfiguration of Victorian patriarchy and even a dismissal of Victorian grand narratives.…”
Get full text
Article