Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5881
Full-dimensional definable network capabilities
Published 2021-10-01“…To solve the problems of single form of existing network capabilities, poor dynamics, low efficiency, and difficulty in adapting to the needs of specialized and personalized services in complex scenarios in the future, a full-dimensional definable network capability model was proposed.Based on the design concept of “network centric”, each layer of the network is opened up to realize the definition of full-dimensional network capabilities such as communication subjects, network functions, network resources, and security, and supports dynamic loading and evolutionary development.Through self-mapping of service requirements and self-organization of network capabilities, it can flexibly adapt to service development needs, and actively output diversified network endogenous capabilities to terminal services in a variety of interface forms, which will naturally adapt to the complex and uncertain evolution of future services.…”
Get full text
Article -
5882
Evaluation of the fulfillment grade and clinical management of the treatment with immunotherapy in allergic patients.
Published 2006-08-01“…Authorized personnel checked out the level of fulfilment of the security rules, clinical betterment was evaluated with a daily control of symptoms correlated with clinical history of allergy, and satisfaction was evaluated through a questionaire.…”
Get full text
Article -
5883
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01“…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
Get full text
Article -
5884
Market Structure and Competition During Economic Transformation
Published 2022-11-01“…The re-nationalization of production processes contributes to greater security of supply, but sometimes at the price of higher production costs. …”
Get full text
Article -
5885
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
5886
Power services scheduling algorithm based on quantum communication
Published 2019-11-01“…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
Get full text
Article -
5887
Mormonisme et migration : la religion comme “amortisseur” des processus migratoires transatlantiques
Published 2010-11-01“…First, because those religious movements have historically taken, and will indeed take advantage of those migratory flows in order to maintain their vitality, and then, because it is clear that those transnational religions can provide their members with a “ security net ” that will cushion the shocks recurrent all along the different steps of the migratory process.…”
Get full text
Article -
5888
IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM
Published 2018-07-01“…Nowadays, the problem of data security in the process of data mining receives more attention. …”
Get full text
Article -
5889
Pupils’ approach to teachers’ role as motivating factor in foreign language classes
Published 2017-02-01“…Moreover, it turned out that the schoolchildren feel less secure talking of interaction with teachers: they usually turn to the teachers only for subject matters; they do not always feel free in the classroom. …”
Get full text
Article -
5890
Privacy-preserving scheme for logistics systems based on 2D code and information hiding
Published 2017-11-01“…With regard to the user privacy leakage problem in existing logistics systems,a privacy-preserving scheme for logistics systems based on 2D code and information hiding was proposed.The information hiding tech-nique was used in the proposed scheme to embed the user privacy information into the 2D code on the logistics waybill to achieve access control.To secure the user privacy information,a JPEG image stenographic algorithm for 2D code was designed.Experimental results demonstrate that this algorithm can guarantee the high undetectable performance and the stego 2D code can be correctly decoded.Using the proposed scheme,the institution or the per-son that has the access right can obtain the important privacy information so that the express can be delivered cor-rectly and the user privacy can be preserved.…”
Get full text
Article -
5891
Az európai kormányzás új lehetősége - az Európai Területi Együttműködés jogi keretei az új európai kohéziós politikában (New Opportunity of the European Governance – The Legal Fram...
Published 2014-09-01“…The study summarizes the advantages of EGTC, how to response a new alternative to increase the efficiency, legitimacy and transparency of the activities of territorial cooperation, and at the same time secures legal certainty. The revised EGTC Regulation (1302/2013/EU) contains the most important pieces of legislation related to the cohesion policy and most of the programmes funded by the EU in the period 2014-2020.…”
Get full text
Article -
5892
Mental health in the hadith spotlight: enlightenment for a healthy soul
Published 2024-09-01“…The research results show that mental health in the hadith includes principles such as feelings of security, independence, responsibility, and physical and spiritual balance. …”
Get full text
Article -
5893
Internet design concepts and network 5.0 technologies
Published 2021-10-01“…The internet has been developed for more than 50 years, but its design concept has never changed.The business network is completely OTT, IP network is still “best effort”, which restricts the development of the internet.In order to continuously meet the needs of social development, the internet design idea needs to be changed, and the feasible direction is to be from “application-centered” to the “network-centered”.Network 5.0 is the fifth generation of data network, compared with the fourth generation of data network (IP network), it retains all the advantages of IP network, filling the absence of IP network in network performance and ability, with qualitative progress in performance and ability.The key technical issues on scalability, endogenous credible security, certainty and more aspects of network 5.0 were specifically discussed.…”
Get full text
Article -
5894
The Milk Income Loss Contract Program for Dairy Producers
Published 2005-02-01“…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
Get full text
Article -
5895
The creation of Poland's development assistance system - continued
Published 2024-12-01“…Conclusions The rationale is based on existing comparative advantages and is linked to the overarching goals of Poland's foreign policy - creating security and increasing prosperity, in particular by improving the quality of human capital in Ukraine affecting the labour market in Poland in terms of migration. …”
Get full text
Article -
5896
Blockchain-based service publishing scheme with recommendation for cold start users
Published 2021-01-01“…In order to solve the problem that the existing publishing systems were vulnerable to tampering, and it was difficult to recommend service information to “cold start” users, a blockchain-based service publishing scheme that supported cold-start user recommendations was proposed.The latent feature mapping model of a single auxiliary domain was extended to two auxiliary domains to make more accurate recommendations for cold start users in the target domain.In addition, the microservice architecture and block technology were combined to ensure system scalability, reliability and security.The experimental results of three real data sets extracted from Amazon transaction data show that the proposed recommendation model is better than most other recommendation methods, and the service release information can be safely stored in the blockchain to ensure that it is not changed.…”
Get full text
Article -
5897
Les différents traités environnementaux sont-ils appropriés pour les populations des pays en développement (Afrique) ?
Published 2010-03-01“…Another reason is the lack of secured alternative source incomes for family livelihood. …”
Get full text
Article -
5898
Related-key impossible boomerang cryptanalysis on TWINE
Published 2019-09-01“…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
Get full text
Article -
5899
Technologies,standards and applications of LTE-V2X for vehicular networks
Published 2018-04-01“…V2X (vehicle to everything) communication is the critical technology to provide environment sensing,information exchange and cooperative control capabilities in vehicular networks.LTE-V2X,as one of the major V2X communication standards initiated and mainly driven by Datang Telecom,can enable low latency,high reliability,high data rate and security in communications,as well as scale economies by sharing the existing LTE network and terminal chipsets.LTE-V2X communication technology was introduced,and compared with IEEE 802.11p standards.Then,the progress of LTE-V2X standardization,industrial research and development and trials and field testing works were provided.Finally,the development strategy of LTE-V2X and technical evolution towards 5G was discussed.…”
Get full text
Article -
5900
Extended Perturbed Mixed Variational-Like Inequalities for Fuzzy Mappings
Published 2021-01-01“…In the end, some new and previously known existence results and algorithms are also studied. Results secured in this paper can be regarded as purification and development of previously familiar results.…”
Get full text
Article