Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6021
United States Biofuel Policies: Overview and Discussion
Published 2016-04-01“… Governments at different levels in the United States have introduced various programs to promote alternative and renewable energies, reduce greenhouse gas emissions, and improve energy security. Some of these policy initiatives include mandates and tax credits to encourage the production of biofuels. …”
Get full text
Article -
6022
Disaster Tips for People with Disabilities
Published 2005-08-01“…Departments of Homeland Security and the Federal Emergency Management Agency for people with disabilities. …”
Get full text
Article -
6023
La méthode de l’évaluation des risques sanitaires en France : représentations, évolutions et lectures plurielles
Published 2013-04-01“…It not only refers to how the methodology is used but also to the changing patterns of sanitary security impacting both understanding and practice. …”
Get full text
Article -
6024
L’acceptabilité sociale au bout de la transgression
Published 2021-04-01“…Callon's presentation of a sociology of translation and the role that its methods could play in building a participatory project that makes social acceptability not a means to politically secure a project, but an end, that of the rationalization of the social that it mobilizes.…”
Get full text
Article -
6025
United States Biofuel Policies: Overview and Discussion
Published 2016-04-01“… Governments at different levels in the United States have introduced various programs to promote alternative and renewable energies, reduce greenhouse gas emissions, and improve energy security. Some of these policy initiatives include mandates and tax credits to encourage the production of biofuels. …”
Get full text
Article -
6026
Analysis and modeling of Internet backbone traffic with 5G/B5G
Published 2019-08-01“…The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.…”
Get full text
Article -
6027
Dynamics of multiple sustainable agricultural intensification practices adoption: Application of the intertemporal multivariate probit model.
Published 2025-01-01“…These findings have significant implications for food security policy in sub-Saharan Africa.…”
Get full text
Article -
6028
Improved Workload Distribution Scheme in Hybrid Cloud Setting
Published 2015-01-01“…An efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting was explored. …”
Get full text
Article -
6029
The Second and Fourth Moments of Discrete Gaussian Distributions over Lattices
Published 2024-01-01Get full text
Article -
6030
I Like Living Here. Social Stratas Attachment to the Hungarian Big Cities
Published 2016-08-01“…For the purposes of the current paper, the author used a population survey database of TÁMOP-4.2.2.A-11/1/KONV-2012-0069 project entitled „Social conflicts – social well-being and security, competitiveness and social development”. …”
Get full text
Article -
6031
Les terres australes françaises, terrain d’expérimentation de la solidarité écologique
Published 2022-12-01“…Human-Wildlife coexistence, crystalizing trade-offs between socio-economic viability, food security of human populations and species conservation, has become a major societal and environmental challenge. …”
Get full text
Article -
6032
Prévention des risques professionnels et formation : éléments de réflexion à partir de la didactique professionnelle et de l’ergonomie
Published 2016-06-01“…So the objective is to identify “professional knowledge of reference” to design trainings that embed “regulated safety” and “managed safety”, which are required to produce safety culture and security. This approach of training design, based on activity analysis both in ergonomics and professional didactics, allows to turn back on the technical/regulatory and behaviourist point of view which still dominates the domain of training in occupational risk prevention.…”
Get full text
Article -
6033
Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks
Published 2014-03-01“…The protocol complexity, security, and interoperability are examined in detail. …”
Get full text
Article -
6034
Certificateless strong designated verifier multi-signature
Published 2016-06-01“…,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless strong designated verifier multi-signature scheme from bilinear pairings was constructed and it was proved that the scheme is existentially unforgeable under the computational bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.Moreover,the scheme meets the properties of both strong designated verifier signatures and multi-signatures.The scheme achieves high efficiency since the length of designated verifier multi-signature generated by the scheme is only 160 bits and the computational cost of bilinear pairings necessary for verification algorithm is constant,i.e.…”
Get full text
Article -
6035
Symmetric Blind Decryption with Perfect Secrecy
Published 2017-01-01“…For noiseless channels, information-theoretically secure oblivious transfer is impossible. However, in this paper, we show that this is not the case for blind decryption. …”
Get full text
Article -
6036
Nanotechnology Role Development for COVID-19 Pandemic Management
Published 2022-01-01Get full text
Article -
6037
Reshaping the Riparian: Human Mobility and Fixed Infrastructure
Published 2015-03-01“…Levees offered a false sense of security, and failures of this protection system have contributed to population losses after major hurricanes in 1965 and 2005. …”
Get full text
Article -
6038
Editorial: Host-diet-microbiome interactions in obesity prevention and treatment
Published 2025-01-01Get full text
Article -
6039
Disaster Planning: Important Papers and Documents
Published 2003-06-01“…Place documents in this case in a secure but easily accessed location in your home. …”
Get full text
Article -
6040
Analysis and prospects of the development of the industrial Internet in the petrochemical industry
Published 2021-09-01“…In recent years, many countries have vigorously developed the transformation and upgrading of the manufacturing industry.China has promulgated a number of policies to encourage the development of the industrial Internet in various industries and regions, and it has begun to take shape.Based on the current development needs of the petrochemical industry, and the overall transformation and upgrading challenges, the problems faced by the upstream, midstream and downstream were analyzed, including upstream reliance on imports, inadequate midstream refining and chemical core technology and system capabilities, and downstream product structure layout.Several suggestions based on the development of the industrial Internet were put forward, including underlying data analysis, core technology integration, industry ecological environment, and security protection system.Finally, the prospects and research directions for the future development of the industrial Internet in the petrochemical industry were put forward.…”
Get full text
Article