Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5861
Peri-Implant Soft Tissue in Contact with Zirconium/Titanium Abutments from Histological and Biological Perspectives: A Concise Review
Published 2025-01-01“…The attachment between the implant surface and peri-implant mucosa should establish a secure seal to prevent bacterial infiltration and subsequent tissue inflammation. …”
Get full text
Article -
5862
Chaotic Puma Optimizer Algorithm for controlling wheeled mobile robots
Published 2025-03-01“…The control of wheeled mobile robots plays a crucial role in many fields, including automation, logistics, security, and even space exploration. This paper presents a significant improvement in the control of wheeled mobile robots based on an enhanced version of the Puma optimization algorithm by integrating chaotic maps in both optimization phases, exploration and exploitation. …”
Get full text
Article -
5863
Key distribution and recovery algorithm based on Shamir's secret sharing
Published 2015-03-01“…Theoretical analysis and simulation show that the improved scheme improves its security under the same conditions of complexity.…”
Get full text
Article -
5864
Homomorphic signature schemes for single-source and multi-source network coding
Published 2019-11-01“…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
Get full text
Article -
5865
A Survey of Artificial Immune System Based Intrusion Detection
Published 2014-01-01“…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
Get full text
Article -
5866
Reconsidering the “Critical-Corrective” Article of the Single Article Approved in September 2017 on “Iranian Citizenship of Children Born to Iranian Women Married to Non-Iranian M...
Published 2021-01-01“…However, the conceptual ambiguities and implementation problems of this single article caused the legislator to repeal the previous single article by approving a new article in 1398.This article is an attempt to illustrate the article’s strengths and weaknesses by reconsidering the “critical-corrective” nature of the new single article, and especially to explain its incompatibility with the forty-first principle of the constitution; it is finally suggested that due to the truth and nature of citizenship and more compatibility with Article 41 of the Constitution, maternal lineage, like paternal lineage, secure the Iranian citizenship to the child.…”
Get full text
Article -
5867
Qu’elle était verte ma vallée
Published 2013-06-01“…Such a progressive loss of identity of nomadic Kuchi raises an important political question at a time when Afghanistan has to deal with both the uncertainty of the on going political “transition” and a worsening security context.…”
Get full text
Article -
5868
Legal Trust and Social Development: Chosen Aspects of the Relationship
Published 2024-10-01“…Taken together, the fulfilment of these requirements determines the stability of the state of law, the predictability of its application, legality, durability, and, consequently, the ontological security of individuals and social development.…”
Get full text
Article -
5869
Extended access control mechanism for cross-domain data exchange
Published 2019-07-01“…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
Get full text
Article -
5870
Satellite-Earth Integration Intelligent Resource Management and Control Architecture of Giant Sensing Constellation
Published 2022-09-01“…The giant sensing constellation will have the capabilities of on-board automatic processing, on-board independent planning, multisensors and multi-mode automatic switching.The traditional control mode of relying solely on the ground system can no longer meet the requirements of the giant sensing constellation.According to the requirements of intelligent and networked control, an integrated intelligent resource management and control architecture was proposed.It was based on the integration of satellite and earth.The work contents of satellite and earth were specifically designed.The interaction mechanism between satellite and earth was designed.The architecture it proposed could be well applied to the independent resource management and controlled of giant sensing constellation.The architecture realized the "networking, autonomy and intelligence" of the giant sensing constellation and it could played an important role in major national security emergency response and other tasks.…”
Get full text
Article -
5871
Cuban economically active population: a new battle?
Published 2009-03-01“…This category includes persons with appropriate working capacity between 17 years and the retirement age, which is stated in the act No. 24 of Cuban Social Security. Since we support the idea of increasing production and productivity of goods worldwide, and we hold up any initiative to enhance human satisfaction or happiness, it is unprofitable for us not to be able to have millions of persons on condition that they spend their physical and mental capacity in the creation of our wealth. …”
Get full text
Article -
5872
Equity decentralized consensus algorithm based on incentive compatibility
Published 2022-12-01“…The PoW consensus algorithm has been proved to be incentive incompatible, existing computing centralization under high reward differences and slow convergence of forks in extreme cases.Based on this, an incentive-compatiblebased consensus algorithm SSPoW was proposed.By introducing local solutions to calculate the computing power aggregated on the block chain, the explicit quantification of computing power was used to speed up the convergence of the fork, thus satisfying the consistency of the blockchain.Incentive compatibility was achieved by improving the reward scheme, which reduced the problem of computing centralization caused by high reward differences.Simulation results prove that the proposed algorithm could effectively reduce the reward differences and is more efficient than the traditional PoW consensus algorithm, which has positive implications for improving system security and consensus efficiency.…”
Get full text
Article -
5873
Design and implementation of hardware-based dynamic instruction set randomization framework
Published 2017-11-01“…All the existing ISR methods have some defects including stripping data from code segment is hard to accomplish,static ISR has fixed key and pseudo-random key is not secure.To introduce ISR technology into the se-curity protection of kernel layer and application layer,hardware-based dynamic instruction set randomization framework (HDISR) was designed and implemented,in which program code was encrypted at loading time.Kernel encryption uses kernel key and applications encryption uses a different user key per process.The experimental re-sults show that HDISR can degrade code injection attack to Denial of Service attack with less than 2.57% additional hardware and 0.31s startup delay of each megabyte code encryption.…”
Get full text
Article -
5874
MASALAH SOSIAL DAN KONFLIK MASYARAKAT ADAT PAPUA DENGAN PT FREEPORT INDONESIA
Published 2016-01-01“…Not only casualties property but also be a “thorn in the flesh” in the way of national and state, because this conflict into the international spotlight and influence overseas investor for security reason that are not guaranteed. The conflict has taken approximately 40 years old, there must be something wrong in the stage of completion. …”
Get full text
Article -
5875
Trusted solution monitoring system based on ZigBee wireless sensor network
Published 2017-11-01“…In the greenhouse environment,the concentration of nutrient solution was always ignored.At the same time,the core node coordinator of the ZigBee wireless monitoring system was easily compromised.A trusted solution monitoring system based on ZigBee wireless sensor network was designed and implemented.Firstly the hardware structure of sensor,router and coordinator was introduced.Then the processes of external voltage measurement and data cleaning were illustrated.For realizing the trusted boot of the coordinator,trusted u-boot to measure the integrity of some key files was designed.Experimental results show that the solution concentration data could be sent from each node to the monitoring computer and the remote terminal.At the same time,the trusted module of the coordinator can detect the captured coordinator node and warning.Therefore,the designed system has strong function and security.…”
Get full text
Article -
5876
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
Published 2016-06-01“…Nowadays, there are commercial and free tools to automatically test websites’ security which is considered to be the positive point for pen-tester. …”
Get full text
Article -
5877
A Monitoring Approach Based on Fuzzy Stochastic P-Timed Petri Nets of a Railway Transport Network
Published 2021-01-01“…The main goal of the proposed supervision approach is to allow an early detection of traffic disturbance to avoid catastrophic scenarios and preserve stability and security of the studied railway networks. Finally, to demonstrate the effectiveness and accuracy of the approach, an application to the case study of the Tunisian railway network is outlined.…”
Get full text
Article -
5878
The Milk Income Loss Contract Program for Dairy Producers
Published 2005-02-01“…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
Get full text
Article -
5879
MORAL-ETHICAL ASPECTS OF THE DIGITAL ECONOMY
Published 2020-03-01“…It is obvious, that the creation of the Russian information system will be able to increase the efficiency of our national economy (including the objectives of its state regulation) and at the same time raise the level of the country’s security. However, the effective use of the digital economy does not only depend on the level of development of the technical base of the information system. …”
Get full text
Article -
5880
Ruinscapes and Subversion of Temporalities in For the Mercy of Water
Published 2023-10-01“…For the Mercy of Water is the story of a writer travelling to an unnamed, abandoned countryside, in an imagined Global Southern country, to interview an old woman identified as “Mother” after the murder of the young girls by the water security guards of “the company.” I examine For the Mercy of Water’s representation of exploited, marginal rural space as a ‘ruinscape’ that manifests the palimpsestic overlay between linear time, industrial time, colonialism, and neoliberal globalization. …”
Get full text
Article