Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5841
Blockchain-based access control mechanism for data traceability
Published 2020-12-01“…To improve the transparency and traceability of access control, a blockchain-based access control mechanism for data traceability and provenance was proposed.The proposed access control policy was transferred to the smart contract and deployed on the blockchain, and the access authorization evaluation was realized by executing the smart contract deployed on the blockchain to ensure the decentralization, transparency and traceability of the access control process.The manner of combining off-chain and on-chain was adopted, the object was stored in off-chain data server, and the object index was generated by the object storage address and hash value, and deployed on the object blockchain.The log of object access authorization and access were recorded in the log blockchain, any misbehavior was immutably recorded.The security analysis show that, the proposed mechanism achieve the properties of decentralization, transparency and traceability while ensuring the privacy of data.…”
Get full text
Article -
5842
New collaborative DDoS defense technology based on NFV
Published 2019-04-01“…To solve the problem of selfish behavior for self-security due to limited resources in the process of resisting distributed denial of service (DDoS) attacks by a collaborative network built with network function virtualization (NFV) technology,a new collaborative DDoS defense network model was proposed.a repeat prisoner's dilemma game model was built in the collaborative network,a reward and punishment incentive mechanism was introduced to strengthen the cooperation of the collaborative network,and a dynamic resource allocation mechanism based on social reputation value assessment was adopted.Simulation results show that the new collaborative DDoS attack defense technology outperforms existing solutions in terms of packet loss rate,cooperation,and resource allocation rate,improving the effectiveness of DDoS attack defense.…”
Get full text
Article -
5843
SDN-Enabled Communication Network Framework for Energy Internet
Published 2017-01-01“…Finally, we evaluate and verify the performance of this framework in terms of latency, reliability, and security by both theoretical analysis and real-world experiments.…”
Get full text
Article -
5844
Application Research on Telecommunication Network Cloud Computing and Virtual Desktop
Published 2013-05-01“…Following technological development and combining actual situation of Anhui Province,OMS department of Anhui Unicom conducted thorough research on cloud computing and virtualization technology application,and changes traditional project construction concept,so as to provide an infrastructure for maintenance management information system,realize integration of terminal desktop,and guarantee consistency,flexibility,expansibility,normalization and security of background support system based on a uniform virtualized platform.…”
Get full text
Article -
5845
Study on Helicopter Antitorque Device Based on Cross-Flow Fan Technology
Published 2016-01-01“…In order to improve low-altitude flight security of single-rotor helicopter, an experimental model of a helicopter antitorque device is developed for wind tunnel test. …”
Get full text
Article -
5846
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
5847
Research progress on electromagnetic spectrum multidimensional situation compressed mapping technology
Published 2023-11-01“…In the increasingly complex electromagnetic spectrum environment, accurately obtaining comprehensive spectrum situation is a crucial prerequisite for making precise spectrum decisions.First, the spectrum mapping was introduced and compared with spectrum sensing.Then, an in-depth review of existing spectrum situation generation methods was conducted.Next, multidimensional spectrum situation compressed mapping in the face of challenges such as heterogeneity, large scale missing data, time variability and environmental complexity was proposed.It effectively compensated for the incompleteness of the spectrum mapping framework caused by ignoring the spectrum situation sensing process in traditional spectrum situation generation methods.This could further provide more accurate guidance for enhancing spectrum utilization efficiency, strengthening spectrum security maintenance, and intensifying electromagnetic warfare decision-making.Lastly, the future development trends of spectrum compressed mapping were discussed.…”
Get full text
Article -
5848
Automatic exchange of financial information from the perspective of tax fairness and transparency
Published 2024-11-01“…Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. …”
Get full text
Article -
5849
Research of WLAN authentication in roaming environment with the trend of network integration
Published 2012-09-01“…In the tendency of network convergence,the method of WLAN network client authentication based on telecommunications network will be the main way of WLAN authentication in the future.In order to make WLAN authentication efficiency and security under roaming condition,WLAN authentication requirements were analyzed,the authentication mode,the process and the existing problems were discussed.An application model and design scheme of WLAN network client authentication based on EAP SIM/AKA protocol with the trend of network integration were proposed and verified.Experimental results show that this application model can complete the EAP SIM/AKA protocol identification of a WLAN client in roaming process,reduce the investment of networks,keep the safety grades of the nodes in the visited WLAN with the initial safety grades,and realize the real-time charging.…”
Get full text
Article -
5850
Requirement and challenge of holographic-type communication to the future network
Published 2020-12-01“…With the acceleration of 5G global commercial deployment process,various emerging immersive network applications represented by holographic communication have put forward significant requirements and tests on the structure and capability of the existing network architecture.The wide application of holographic communication services in many fields was introduced,and the current situation was analyzed that 5G network can not meet the rapid development needs of holographic immersion applications.The performance requirements of holographic communication applications in bandwidth,delay,computing power,synchronization,quality of service,reliability,security and other aspects of the future network performance were analyzed.The application scenarios and key technologies of holographic communication were summarized.Through the investigation and analysis of the possible evolution routes of the future network,the direction of the future network evolution and development was pointed out.…”
Get full text
Article -
5851
Survey of industrial Internet traffic analysis technology
Published 2024-08-01“…Depending on the nature of the task, traffic analysis technology was classified into two types of applications, such as service quality enhancement and security capability development, allowing to thoroughly explore the application scenarios of traffic analysis technology in the industrial Internet. …”
Get full text
Article -
5852
BRICS Policy Agenda, Partnership and Cooperation
Published 2024-08-01“… In 2024, the BRICS diplomacy under the chairship of Russia is focused on partnership and cooperation in three key tracks - politics and security, the economy and finance, and cultural and humanitarian ties. …”
Get full text
Article -
5853
Routing planning and handoff based on LSTM traffic prediction
Published 2022-08-01“…With the continuous development and evolution of network technology in recent years, the user’s demand for network resources is becoming larger and larger, and the content is becoming more and more complex.The traditional network architecture is difficult to meet the current flexible network needs.The revolutionary technology of SDN endows the network with programm ability and evolvability, and realizes more flexible management of network resources.In order to improve the utilization of network resources, a traffic prediction agent based on LSTM model was proposed, which provides a theoretical basis for routing planning.By predicting the network traffic in advance, we can take defensive measures before the traffic surge to ensure the security and stability of the network.The function of route planning and lossless path switching based on traffic prediction was realized.…”
Get full text
Article -
5854
A Mislocated Intrauterine Device Migrating to the Urinary Bladder: An Uncommon Complication Leading to Stone Formation
Published 2020-01-01“…We report a case of an IUD migrating from its normal position in the uterine cavity into the urinary bladder causing chronic low urinary tract symptoms in a 43-year-old female patient. The device was securely removed without complications using grasping forceps under cystoscopy, and no parietal defect was detected. …”
Get full text
Article -
5855
Cooperation in border areas among some Southeast Asian mainland countries: a case study of the Cambodia-Laos-Vietnam Development Triangle
Published 2025-12-01“…Border cooperation in mainland Southeast Asia has received attention from the countries of Myanmar, Thailand, Cambodia, Laos and Vietnam to both strengthen cooperation to promote the economy and improve people’s lives in the region border, ensuring national security and preventing crime. Typical of the border cooperation mechanism of mainland Southeast Asia is the Cambodia-Laos-Vietnam Development Triangle (CLVDT) which established in 1999.…”
Get full text
Article -
5856
Perspectives de gouvernance environnementale durable dans la région de Lwiro (Sud Kivu, République Démocratique du Congo)
Published 2013-09-01“…This study aims to create an integrated community-based conservation approach with a look on poverty alleviation and food security. The chapter describes also the environmental perceptions of rural population in plagued with the "modern" civilization. …”
Get full text
Article -
5857
A digital audio data protection method using parametric action of generalised triangle group on GF(28)
Published 2025-01-01“…Also, based on the resulting parametric equations, the authors have presented an audio encryption approach in this study. The extremely secure S-Box, which is then utilised to encrypt audio signals, is built using parametric equations. …”
Get full text
Article -
5858
Backdoor detection in embedded system firmware without file system
Published 2013-08-01“…Any embedded system firmware without file system will integrate its system code and user application code into a single file.This setting has brought some additional difficulties to analyze them.Aimed at this kind of firmware,the problem of library function identification was analyzed,and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed.Based on this analysis,the backdoor detection problem of some typical types including unauthorized listener,unintended function,hidden function,outward connection request etc.were discussed,and several backdoors (one is critical level) in a real world firmware were found.The result shows this method of identifying library function can be useful for security analysis to this type of firmware.…”
Get full text
Article -
5859
Research on MEC traffic offloading scheme in 5G smart campus business scenarios
Published 2022-01-01“…MEC (multi-access edge computing) is one of the key technologies of 5G.Through the integration of communication and computing technologies, service localization and close deployment can be realized.At present, 5G smart campus has spawned many new application scenarios.The key step to construct the 5G smart campus is how to offload user data to the MEC platform to realize the deep integration of technology and business.Firstly, the overall architecture of 5G smart campus was introduced.Then, three traffic offloading technologies and their advantages and disadvantages were expounded.Finally, the scheme selection of traffic offloading in campus resource visits, access to electronic resources, smart education and campus security monitoring was discussed.It is expected to provide theoretical support for the upcoming construction of 5G smart campus.…”
Get full text
Article -
5860
Floridians’ Perceptions of GMOs: GMOs and Florida Citrus
Published 2014-10-01“… Worldwide and in Florida, food-related issues such as food safety, food security, and use of new food technologies continue to be top concerns. …”
Get full text
Article