Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6041
A method for synthetic speech detection using local phase quantization
Published 2024-02-01“…Due to the convenience of speech synthesis, synthesized disguised speech poses a great threat to the security of speaker verification systems.In order to further enhance the ability of detecting the camouflage to the speaker verification system, a method of synthetic speech detection was put forward using the information in spectral domain of the synthetic speech spectrogram.The method employed the local phase quantization (LPQ) algorithm to describe frequency domain information in the speech spectrogram.Firstly, the spectrogram was divided into several sub-blocks, and then the LPQ was performed on each sub-block.After the histogram statistical analysis, the LPQ feature vector was obtained and used as the input feature of the random forest classifier to realize the synthetic speech detection.The experimental results demonstrate that the proposed method further reduces tandem detection cost function (t-DCF) and has better generalization ability.…”
Get full text
Article -
6042
Book review: Residential child care: prospects and challenges Andrew Kendrick, Editor
Published 2007-08-01“…Excellent evidence-based discussions on restraint, peer violence and the use of secure accommodation are generally lacking in this area which is often, ironically, one where practitioners and policy makers seek most guidance. …”
Article -
6043
Les traités entre le Fuuta-Tooro et Saint-Louis : commerce, taxes et sécurité à l’intersection (1785-1808)
Published 2024-12-01“…Louis in 1809, France concluded only three treaties with the Fuuta-Tooro, aiming to revive trade, ensure the security of its merchants, and resolve issues related to customs and taxes. …”
Get full text
Article -
6044
La fin du maton ? Transformation de la relation carcérale et rationalisation du maintien de l’ordre dans les modules de respect
Published 2019-12-01“…While promoting a dynamic security approach, the Respect module grants the prison officers with a new discretionary power of sanction which consolidate their authority. …”
Get full text
Article -
6045
Opening the Trinity: developing the "open theism" debate
Published 2005-12-01“…At the same time kenosis was done for the sake of enabling a relationship with God, in which Christians do find ultimate security. …”
Get full text
Article -
6046
Disaster Planning: Important Papers and Documents
Published 2003-06-01“…Place documents in this case in a secure but easily accessed location in your home. …”
Get full text
Article -
6047
Endogenous trusted network architecture for intelligent sharing
Published 2020-11-01“…To address the needs of intelligent sharing of network resources,blockchain and artificial intelligence were integrated with the network,and an endogenous trusted resource intelligent sharing network architecture was proposed to make network asset sharing have endogenous trust.Based on distributed alliance blockchain,an integration mechanism of on-chain identification and off-chain resource was proposed to achieve credible management of network resources.Security and trusted sharing protocols for network data was designed to synchronize data consensus within the network.Based on smart contract,network resource scheduling and service composition methods were presented to achieve trusted service sharing.Finally,the proposed architecture was applied to decentralized scenarios such as domain name resolution,cross domain authentication,and virtual network operation.The proposed architecture realizes the integration of blockchain and network and supports the endogenous trusted sharing of network assets.…”
Get full text
Article -
6048
Conflicts between People and the Florida Black Bear
Published 2014-10-01“…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
Get full text
Article -
6049
Conflicts between People and the Florida Black Bear
Published 2014-10-01“…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
Get full text
Article -
6050
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01“…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
Get full text
Article -
6051
Toward an Architecture of Dissensus: Participatory Urbanism in South-East Asia
Published 2013-06-01“…A critical reflection of the Thai programme Baan Mankong (secure housing) and its regional counterpart Asian Coalition for Community Action (ACCA) – an entity aimed at creating an alternative development process in which people that were previously ignored and marginalized are engaged at the centre of a process of transforming their lives, spaces and position in the city – sheds light on such relationship in order to promote a re-conceptualisation of the role of architecture and design in the process of socially just urban development, participatory urbanism and the struggle for democracy.…”
Get full text
Article -
6052
‘We are all Àmọ̀tẹ́kùn’: Insecurity, Ethno-regional Hegemony and Resistance in Southwest Nigeria
Published 2022-01-01“…This article offers an interpretation of Àmọ̀tẹ́kùn, a security outfit established by the governors of Southwest Nigeria to tackle rising cases of insecurity in the region. …”
Get full text
Article -
6053
-
6054
Multimedia Image Encryption Analysis Based on High-Dimensional Chaos Algorithm
Published 2021-01-01“…Image encryption has become an urgent need for secure multimedia communication. Compared with the traditional encryption system, encryption algorithms based on chaos are easier to implement, which makes them more suitable for large-scale data encryption. …”
Get full text
Article -
6055
-
6056
Donald Trump et les services de renseignement : une relation sous tension
Published 2018-09-01“…The foreign policy decision-making process has been influenced by the intelligence community since at least 1947 when the passage of the National Security Act led to the creation of the Central Intelligence Agency. …”
Get full text
Article -
6057
-
6058
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Published 2020-02-01“…Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in certificate management.In the multi-serve environment,a bilinear mapping was used to construct an identity-based encryption scheme that supports conjunctive keyword search.In this scheme,the storage and query of the encrypted data were allocated to different servers,and the retrieval efficiency of the user storage and keyword was improved by cooperation.Re-use the encryption and search ability of the connection keywords by using the identity of multi-server and user.At the same time,combine with the searchable encryption method of conjunctive keyword,a new security model was constructed based on bilinear pairing.And under the bilinear Diffie-Hellman problem,the scheme satisfies the ciphertext indistinguishability under selected message attack.…”
Get full text
Article -
6059
Location privacy protection technology based on KHINN
Published 2016-09-01“…Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest neighbor (KHINN)query method based on k-anonymity was proposed.When the method structuring anonymous user group in mobile terminal,secure multiparty summation was used to calculate the anchor point to ensure user privacy;when processing the query results,SpaceTwist method based on k-anonymity was used to improve the query privacy and accuracy.Performance analysis and experimental results show that undering the condition of semi trusted or untrusted users between nodes,the proposed method can solve defects of uneven distribution of discovering points around the anchor point in SpaceTwist method and improve the accuracy of the query.…”
Get full text
Article -
6060
New electric power CDN based on the technology of SDN and NFV
Published 2016-09-01“…With the development of smart grid and the increasing of network application within the electric power information network,electric power CDN plays an important role of network acceleration technology,traffic load balancing and network security.However,facing the rapidly changing of application requirements,electric power CDN was required to response to the application deployment quickly and possess flexible application extensibility.In addition,there are some problems on electric power CDN node expansion,such as complex operations management and low utilization rate of resources.It is necessary to reform the traditional power CDN architecture,SDN and NFV technique can support.The data control can be extracted and transmitted by SDN from the network data,so it is conducive to expand a variety of application in power CDN rapidly.And NFV can expand the CDN node capacity and schedule node resources based on the application.It can effectively reduce the capital ecpenditure,storage and power consumption.…”
Get full text
Article