Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5981
(t, n) threshold secret sharing scheme without SDC
Published 2006-01-01“…By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with share distribution center(SDC) and a threshold scheme without SDC.Under distrib-uted situation,there is no such a center can be completely trusted by all members of the group,a threshold scheme with-out SDC appears more attractive.In the scheme without SDC all of the members generate the group public key and pri-vate keys.When new numbers join the group secret sharing should be updated by period.An example of the scheme us-ing the small number was given.The security of the scheme was analyzed in the final.…”
Get full text
Article -
5982
Scheme of 5G message system co-construction and sharing
Published 2021-06-01“…With the joint release of “5G message white paper” on April 8, 2020, China’s three major telecom operators have reached a consensus that they will comprehensively upgrade the short message service in the 5G era and create a new business form of 5G message.On the basis of emphasizing the construction of 5G message system, the difficulty of 5G message system carrying the message services of three operators was analyzed under different co construction scope from the technical perspectives of network architecture, interface interoperability and security risk, and finally recommends the construction scheme of co-construction of MaaP, so as to meet the 5G message services development demands of three operators with less implementation cost.…”
Get full text
Article -
5983
Amnion Epithelial Cells as a Candidate Therapy for Acute and Chronic Lung Injury
Published 2012-01-01“…It is amazing to suggest that the placenta may offer renewed life after birth as well as securing new life before.…”
Get full text
Article -
5984
Method for the hystopathological analysis of the cervix specimen, obtained through radio surgery
Published 2006-08-01“…It has been evaluated and vouched as satisfactory for its usefulness, easy application, low expense, security, and diagnostic and forecasting confidence.…”
Get full text
Article -
5985
On access to trusted virtual group under cloud computing
Published 2013-08-01“…Based on the first layer, a hierarchical key management was presented for different subgroups so as to realize the access control between different departments of a company. Then the security and complexity were analyzed. Finally, through the example and simulation experiment, the access control model based on two-layer key management scheme was verified.…”
Get full text
Article -
5986
Research on the full-dimensional defined polymorphic smart network
Published 2019-08-01“…For current Internet is confronted with some defects such as rigid structure,single IP bearing,and disability in suppressing unknown threats,the functions,performance,efficiency and security of the Internet were promoted from the perspective of network structure,the “structure definition” was introduced through all levels of the Internet,and a network architecture of multi-modal presentation of network functions was provided in all levels:full-dimensional defined polymorphic smart network (PINet),which supported full-dimensional definition and multi-modal presentation of addressing and routing,switching mode,interconnection mode,network element,transmission protocol,service properties and so on.Then the vision and goal,architecture and model,as well as the key technologies of PINet were discussed.The proposed architecture can provide a possible solution to the development of new network technologies.…”
Get full text
Article -
5987
Legal Protection for Female workers in Indonesia (Study on the Rights of Female Workers in Tolitoli)
Published 2025-01-01“…The lack of guarantees for female workers' rights remains a significant issue in Tolitoli Regency, encompassing concerns such as equal pay, decent work, maternity leave, childbirth and breastfeeding rights, social security, and protection against discrimination. This study, using a socio-legal approach with both qualitative and quantitative methods, finds that labor laws protecting female workers have not been fully implemented. …”
Get full text
Article -
5988
Attention-enhanced optimized deep ensemble network for effective facial emotion recognition
Published 2025-04-01“…Facial emotion recognition (FER) is rapidly advancing, with significant applications in healthcare, human-computer interactions, and biometric security, driven by recent advances in artificial intelligence (AI), computer vision, and deep learning. …”
Get full text
Article -
5989
Potential Impacts of Future Climate Changes on Crop Productivity of Cereals and Legumes in Tamil Nadu, India: A Mid-Century Time Slice Approach
Published 2023-01-01“…The adverse effects of climate change on cereal and legume crop productivity entail the potential adaptation options to ensure food security.…”
Get full text
Article -
5990
The COVID-19 pandemic and self-reported food insecurity among women in Burkina Faso: evidence from the performance monitoring for action (PMA) COVID-19 survey data
Published 2025-02-01“…Burkina Faso, a country with pre-existing vulnerabilities in food security, experienced considerable challenges during this period. …”
Get full text
Article -
5991
-
5992
-
5993
-
5994
Factors influencing minimum acceptable diet (MAD) intake among children aged 6–23 months in remote mid-Himalayan region of Sudurpaschim, Nepal
Published 2025-01-01“…The results indicate an urgent need to increase maternal knowledge of complementary feeding, address socioeconomic disparities, and promote household food security to improve complementary feeding practices.…”
Get full text
Article -
5995
A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions
Published 2024-06-01“…Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. …”
Get full text
Article -
5996
-
5997
-
5998
Evaluation of Nutritional and Antinutritional Properties of African Yam Bean (Sphenostylis stenocarpa (Hochst ex. A. Rich.) Harms.) Seeds
Published 2020-01-01“…It is suggested to have the potential to significantly boost food security in sub-Saharan Africa due to its considerable nutritional qualities but still yet underutilized. …”
Get full text
Article -
5999
Interrogating green social prescribing in South Wales; A multi-stakeholder qualitative exploration.
Published 2025-01-01“…<h4>Conclusions</h4>To ensure the continued provision of social prescribing schemes which are highly valued by service users, voluntary and third sector organisations require funding security and stability. The delivery of green, nature-based, schemes require maintenance of trusting, long-term relationships with local service co-ordinators and referrers, secure equitable funding models and agreement over conceptual basis of social prescribing itself, particularly in relation to 'where' social prescribing is located within health and social care models. …”
Get full text
Article -
6000
AI augmented edge and fog computing for Internet of Health Things (IoHT)
Published 2025-01-01“…It has been noted how the use of modern technologies, such as narrow band-IoT (NB-IoT) for wider coverage and Blockchain technology for security, is transforming IoHT. The last part of the review focuses on the future challenges posed by advanced technologies and services. …”
Get full text
Article