Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5821
-
5822
Innovation et système des brevets aux États-Unis : un modèle en question(s)
Published 2006-01-01“…In an effort to promote economic growth by stimulating innovation, the Founding Fathers engraved the concept of patent in the Constitution of the United States by granting Congress the power “to promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.” …”
Get full text
Article -
5823
-
5824
“Colombia, the only risk is wanting to stay”
Published 2012-03-01“…The link between risk or danger and Colombia is well established in the transnational imaginary and it is difficult to separate the two in the current ideological climate of international security. This imaginary of risk is so persistent that state-organised promotion of tourism is forced to take it into account in order to refute it. …”
Get full text
Article -
5825
-
5826
Spatiotemporal analysis of rainfall and temperature variability and trends for a mixed crop-livestock production system: its implications for developing adaptation strategies
Published 2024-10-01“…This connection is crucial for developing targeted adaptation strategies and policies, thereby offering actionable insights for enhancing agricultural practices and food security in the region. The originality of this work lies in its comprehensive analysis and practical relevance, making it a valuable contribution to both climate science and regional agricultural planning.…”
Get full text
Article -
5827
Service function chain construct algorithm based on reliability
Published 2019-01-01“…With the continuous expansion of network size and content quantity,network operators often face the problem of data transmission interruption,thus how to improve the reliability of data transmission has become a research hotspot.Started with the huge advantages of NFV environment over traditional TCP/IP architecture based on the background that every network node has the capability of security service,a reliability algorithm for constructing functional service chains was proposed.First,the network topology was introduced and abstracted it into a digraph for a better analyzation.Then,several quantitative indices were used to define the upper and lower bounds of failure probability and resolved the model through a heuristic algorithm.The experimental results show that the proposed algorithm increases the reliability of service chain selection and spends less time.…”
Get full text
Article -
5828
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01“…Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. …”
Get full text
Article -
5829
Possibilities for qualitative evaluation of the protection area of protective clothing
Published 2022-09-01“… Protective clothing, worn for example by police, ambulance and private security services, has the task of protecting against weapon attacks and is becoming increasingly important. …”
Get full text
Article -
5830
Floridians’ Perceptions of GMOs: GMOs and Florida Citrus
Published 2014-10-01“… Worldwide and in Florida, food-related issues such as food safety, food security, and use of new food technologies continue to be top concerns. …”
Get full text
Article -
5831
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01“…The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the original multivariate public key cryptosystem to hide its weakness such as linearization equation.However,it is found that if there are many linearization equations satisfied by the original MPKC,there would be many quadratization equations (QE) satisfied by the improved scheme.Given a public key,after finding all QE,a valid cipheretext can be substituted into the QE to derive a set of quadratic equations on the plaintext variable.This exactly reduce the degree of the system wanted to solve.Then the corresponding plaintext can be recovered for a given valid ciphertext combining with Groebner basis method.…”
Get full text
Article -
5832
Agriculture urbaine : un outil multidimensionnel pour le développement des quartiers
Published 2010-09-01“…These experiments have different objectives, including food security, socialization and education. Although these have changed over time, they have also differed depending on geographic location (neighbourhood). …”
Get full text
Article -
5833
Optical wireless communication and internet of things
Published 2022-09-01“…Optical wireless communication (OWC) entitles many advantageous properties such as unlicensed spectrum, high electromagnetic compatibility, compared with its radio frequency wireless counterpart, which enables it to be a potential important driving factor for the diverse developments of future internet of things (IoT).Starting from the optical sources and optical devices, some basic principles and limitations of OWC were introduced.Then, some key technologies, including channel modeling, signal modulation, array communication and high-precision positioning were discussed.Based on those and according to the requirements on peak data rate, sensing precision, energy transfer and security and confidentiality of the next generation IoT, the role of OWC as a technological enabler for next generation IoT was analyzed.Finally, related conclusions were given.…”
Get full text
Article -
5834
Safety Match Design Method and Experimental Study of the Chain Drive in Transfer Case
Published 2016-01-01“…Accordingly,the design method of security matching is proposed,a test method of chain drive is introduced and the test result is analyzed,and the transfer case matching selection design example is listed. …”
Get full text
Article -
5835
Low-power internet of underwater things: vision and key technologies
Published 2022-06-01“…With the explosion of underwater sensing devices and the pursuit of energy conservation, the concept of low-power internet of underwater things has been put forward.Inspired by RF-based backscatter networks, the low-power internet of underwater things architecture uses underwater acoustic backscatter technology to realize the low-power and low-cost communication of underwater sensor nodes, which has a wide application prospect in underwater fields such as the long-term underwater detection.Firstly, the principle and architecture of low-power internet of underwater things was introduced.Then, the key technologies faced by the architecture were proposed and analyzed, such as perception, communication, networking, resource allocation, security and so on.Finally, the future research directions of low-power internet of underwater things were discussed.…”
Get full text
Article -
5836
One-way hash function with chaotic dynamic parameters
Published 2008-01-01“…A novel keyed one-way hash function based on chaotic dynamic parameters was presented which combines the advantage of both chaotic system and conventional one-way hash function.In the proposed approach the fixed parameters of conventional hash function is replaced by chaotic dynamic parameters.Compared with the existing chaotic hash func-tions,the new method takes conventional hash function as essential part of iteration instead of using the message blocks directly in chaotic iteration,thus improves the security of hash function and avoids bringing down system performance at the same time.Theoretical and experimental results show that the proposed method has high performance,strong one way property,large key space,sensitivity to initial conditions and chaotic system’s parameters.…”
Get full text
Article -
5837
Logiques paysannes, production agricole et lutte contre les ravageurs des cultures à Salcedo dans les Andes équatoriennes : stratégies individuelles ou collectives ?
Published 2016-12-01“…Based on fieldwork conducted in the province of Cotopaxi, this paper points out the determinants of the lack of collective action against crop pests as it opens a discussion on the need of a greater collaboration between environmental and social sciences in order to consider the most effective strategies to strengthen the farmers coordination in the fight against crop pests and to increase their food security.…”
Get full text
Article -
5838
Qualification problems of war-related criminal offences documented on the de-occupied territories of Ukraine
Published 2022-09-01“…Based on the analysis and synthesis of the experience of investigators from the National Police, the Security Service of Ukraine, as well as prosecutors on the de-occupied territories of Ukraine, four basic problematic subject areas with the corresponding typical situations of the law on criminal liability application have been identified: criminal legal qualification of artillery shelling, mining, causing death to a person, and other actions of physically detained representatives of the aggressor state. …”
Get full text
Article -
5839
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
Published 2018-10-01“…Aiming at the problem that the biometric feature-based fuzzy vault is vulnerable to correlation attack and the loss of key and biometric template,and the authentication performance of fuzzy vault based on single biometric feature is unreliable,a novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features was proposed.This scheme carried out irreversible transformation of fingerprint features and face features,and based on the Diffie-Hellman algorithm,the transformed fingerprints and face features were fused into a template at the feature level.Finally,the fusion template was used to construct the fuzzy vault.By updating the random matrix,the vault could be revoked,which could effectively resist the correlation attacks and achieve reliable authentication.Experimental results show that the proposed scheme improves the reliability of the system and the security of multiple biometric templates.…”
Get full text
Article -
5840
Fibrodysplasia Ossificans Progressiva and Pregnancy: A Case Series and Review of the Literature
Published 2022-01-01“…These cases posed unique anesthetic and obstetric technical challenges, particularly when securing the airway and performing cesarean delivery. …”
Get full text
Article