Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6061
Matérialiser la frontière autour de l’empereur dans l’Antiquité tardive
Published 2020-12-01“…The ever-present bodyguards were also a tangible yet mobile limit around the emperor, ensuring his security and contributing to his majesty. The imperial purple was the ultimate barrier around the ruler’s body and acted as a medium to approach the sacred nature of his power during the ceremony of adoratio. …”
Get full text
Article -
6062
Password Based Circuit Breaker
Published 2023“…This project designed to give a high security system and that in switching off the meanly line with entering a password with a help of keypad. …”
Get full text
Thesis -
6063
Pass Word Based Circuit Breaker.
Published 2023“…This project designed to give a high security system and that in switching off the meanly line with entering a password with a help of keypad. …”
Get full text
Thesis -
6064
Les salafistes marocains et la reconfiguration politico-religieuse post-2011 : fluctuation entre (dé)politisation, radicalisation et intégration
Published 2020-07-01“…In each moment of this evolution, the regime opts for a pragmatic approach which consists in using this religious trend to meet pressing demands and priorities of a political and security nature. Ten years after breaking up with salafist groups, both quietists and jihadists, suspected to be responsible for the 2003 Casablanca attacks, the regime seeks henceforth to reconcile with salafis with the purpose to integrate them, or at least neutralise them, in the ongoing politico-religious reconfiguration process. …”
Get full text
Article -
6065
Anaesthetic management of infant with occipital encephalocele associated with Arnold Chiari III malformation - A Case Report
Published 2025-01-01“…The anticipated difficult airway was secured with prior planning and teamwork. Multidisciplinary care and careful planning are essential to safeguard the perioperative outcomes for patients with meningoencephalocele wherein difficult airway, blood loss, autonomic dysfunction, and perioperative hypothermia are major concerns.…”
Get full text
Article -
6066
New Technique: A Novel Femoral Derotation Osteotomy for Malrotation following Intramedullary Nailing
Published 2012-01-01“…Two further static distal interlocking screws were inserted to secure the intramedullary nail in position. The osteotomy went on to union and her symptoms of pain, walking difficulty, and in-toeing resolved. …”
Get full text
Article -
6067
SDN self-protection system based on Renyi entropy
Published 2021-06-01“…Aiming at the abnormal behaviors in SDN architecture, a self-protection system based on Renyi entropy that implemented a set of detection, diagnosis and defense method of SDN abnormal behaviors was proposed.The system did not need to introduce the third-party measurement equipment, and directly used the flow table information of OpenFlow switches.Firstly, the abnormal network behavior was detected by calculating the characteristic entropy.Then, the information of the OpenFlow flow table was further analyzed to realize the diagnosis of abnormal behavior.Finally, a blacklist mechanism was established.And the system added the hosts with abnormal behavior to the blacklist and blocked the corresponding abnormal traffic.In order to verify the effectiveness of the system, a prototype was developed on the Floodlight controller.The simulation results on Mininet show that the system can effectively detect, diagnose and defend the abnormal behaviors.The system has low deployment cost, which enhances the security of SDN.…”
Get full text
Article -
6068
Reserves and extraction of rare earth metals and elements as a key factor in the renewable energy sector development at the the world economy transformation current stage
Published 2023-06-01“…The use of renewable energy sources, which are experiencing a period of rapid development, is one of the stages of the current energy transition, as the world community tries to ensure a future with zero CO2 emissions and to achieve energy independence and security. At the same time, for output of the wide range of products for the renewable energy sector, as well as for the development of energy depot systems, it is necessary to use rare earth elements and metals in production. …”
Get full text
Article -
6069
Embracing Generative Artificial Intelligence in Clinical Research and Beyond
Published 2025-03-01“…Success is expected to require establishing rigorous data management and security protocols, fostering integrity and trust among stakeholders, and sharing information about the safety and effectiveness of AI applications. …”
Get full text
Article -
6070
ANALYSIS OF CHANGES IN TRANSPORT PROCESSES IN WARSAW PUBLIC TRANSPORT IN THE FACE OF DISRUPTIONS IN 2019-2022
Published 2024-09-01“…The study made it possible to identify recommendations aimed at securing the operation of public transport in the event of similar threats in the future. …”
Get full text
Article -
6071
The Military Policy of the Rousseff Government: Reflections on the Conduct of the Armed Forces in the UPP and the MINUSTAH
Published 2016-05-01“…The UPPs are a key attribute of public security of the government carioca in Brazil and by extension the Brazilian state. …”
Get full text
Article -
6072
Hemorrhage of the Ramus Lumbalis of the Iliolumbar Artery as a Cause for Shock in Blunt Trauma Victims on Therapeutic Anticoagulation
Published 2021-01-01“…Local expertise and a high level of suspicion were critical in the early intervention, and postprocedural management of the injuries sustained and secured a good result.…”
Get full text
Article -
6073
Review on unmanned aerial vehicle covert communication network
Published 2023-08-01“…Unmanned aerial vehicle (UAV) communication network is an important part of the future integrated space-aerial-ground network, and an effective support to achieve the global three-dimensional coverage of the communication network.The open characteristics of wireless channels make UAV communication vulnerable to malicious attacks by illegal users.Covert communication provides a promising solution for improving the security defense and privacy protection capabilities of UAV communication.However, the overlapping characteristics of the mobility of UAV systems and the requirements of covert communication scenarios bring severe challenges to the collaborative optimization of network resources.The UAV covert communication network was investigated from requirements, challenges, framework and main technologies perspectives.The architecture and model, performance characteristic, as well as potential candidate technologies were analyzed and discussed, in an attempt to outline the overall framework of UAV covert communication, and provide guidance for the subsequent research on UAV covert communication.…”
Get full text
Article -
6074
Scheduling algorithm for stochastic job stream cipher service based on load balancing
Published 2018-06-01“…Business stream parallel processing system face the situation of the diversity of cipher service requests,the cross of serial mode and parallel mode,the intercross of different business data flow,and the demand of high speed and high reliability in security field.In order to improve the parallel processing efficiency of multi-cryptographic algorithm,load balancing was used as scheduling objective.Based on hierarchical hardware scheduling method (HHS-ACDID),considering the processing node’s storage capacity and processing speed,a load balancing scheduling algorithm was approved to support non related tasks and related tasks at the same time,which achieves the high speed cipher processing throughput.Simulation results show that the algorithm can complete dynamic scheduling of data stream system and get better load balancing effect.Compared with HHS-ACDID,the efficiency of the algorithm is improved by about 12%.…”
Get full text
Article -
6075
Corneal crossed links: a new alternative in the treatment of ectasia
Published 2009-09-01“…Many reviewed articles prove the security and efficacy of this treatment. The confocal microscopy techniques have shown significant swelling and resistance of corneal stroma after this procedure. …”
Get full text
Article -
6076
Information service identity generation and management scheme for service supervision
Published 2021-10-01“…While information services have a significant impact on economic and social development, it also brings a series of security challenges.Realizing fine-grained, continuous, and dynamic supervision of information services has become the top priority of information service management.Traditional static identity authentication and management mechanisms, are difficult to meet the continuous monitoring requirements for information service entities and service quality.An information service identification generation and management scheme for service supervision was proposed.It defined an information service identification format from multiple perspectives such as information service category, service grade, and service quality credibility.It used the analytic hierarchy process to evaluate information services and designed a dynamic management of information service identification.The scheme can meet the needs of issuance and fine-grained dynamic management of information service identification for multi-dimensional business attributes.…”
Get full text
Article -
6077
Al-Marsad Right as a Mechanism for Developing and Investing in Urban Waqf Properties in Algerian Legislation
Published 2024-12-01“…Importantly, the investment value remains a debt secured by the Waqf. Unlike direct ownership, the observatory right is not a real property right stemming from Waqf ownership. …”
Get full text
Article -
6078
Optimizing safety performance through risk-based modeling in Nigeria’s oil and gas sector
Published 2023-11-01“…The analysis highlighted key risks like inadequate infrastructure, valve and seal failures, security concerns, and oil spill risks, underscoring the need for targeted interventions to promote a safer working environment and reduce accident risks. …”
Get full text
Article -
6079
Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm
Published 2020-01-01“…The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To analyze the security of two algorithms,an automatic search method of impossible differential distinguishers was proposed.Based on the structural characteristics of the GRANALE and MANTRA,the S-box differential characteristics were obtained by analyzing the S-box differential distribution table,and then the idea of intermediate encounter was used to traverse from the difference path obtained from the encryption/decryption direction seperately to select the optimal differential path with probability 0.The analysis results show that there are 144 different 7-round impossible differential distinguishers in the GRANULE,and 52 different 9-round impossible differential distinguishers in the MANTRA.Compared with the existing results,the rounds of the proposed distinguisher is currently the highest.…”
Get full text
Article -
6080
The Ponte Delle Chianche on the <i>Via Traiana</i> in Buonalbergo (Benevento, Italy): New Data for an Integrated Study
Published 2024-12-01“…The results obtained will be used to implement a comprehensive project for the recovery and securing of the property.…”
Get full text
Article