Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6081
Improving replicator dynamic evolutionary game model for selecting optimal defense strategies
Published 2018-01-01“…In terms of the existence of strategy dependency in the same game group,network attack-defense evolutionary game model based on the improved replicator dynamics was constricted by introducing the intensity coefficient,which completed the method of calculating replicator dynamic rate.The improved replicator dynamic equation was adopted to solve the evolutionary equilibrium for the situation that both attack and defense have two optional strategies.The stability of the equilibrium points was analyzed by the local stability analysis method of Jacobian matrix,and the optimal defense strategies were obtained under different conditions.The results show that the strategy dependency between the players in the same group has a certain influence on the evolution of the game,both the incentive and the inhibition.Finally,the accuracy and validity of the model and method are verified by the experimental simulation,which provides a new theoretical support for solving the information security problems in the real.…”
Get full text
Article -
6082
Discussion on a computation-oriented network modality——computing power network modality
Published 2023-10-01“…New computing applications present new challenges to communication networks, for example, traditional network cannot meet the demands of flexible deployment, customized services, security and trustworthiness of new services.As a development paradigm that separated network technology and supported environment, polymorphic network provided new solutions to support the differentiated demands of various new applications.A type of computation-oriented network modality namely computing power network modality was discussed, for the computation-oriented business requirements based on the development trend of computing power network.Firstly, the design of computing power network modality was investigated, then the key technologies of computing power network modality were analyzed.Finally, the application scenarios of computing power network were prospected.It is hoped that the discussion can provide a reference for the future research and development on application of computation-oriented polymorphic network.…”
Get full text
Article -
6083
Key technologies and research progresses in cognitive SWIPT
Published 2020-10-01“…The combination of cognitive radio (CR) and simultaneous wireless information and power transfer (SWIPT) has become one of the research hotspots in modern high-efficient cognitive radio communications.Firstly,the introduction of SWIPT and cognitive SWIPT were illustrated.Secondly,two types of receiver structures commonly used in SWIPT networks were introduced and the corresponding energy harvesting formulas were given.Thirdly,system model of cognitive SWIPT network and the research progresses of cognitive SWIPT combined with cooperative relaying and MIMO were presented respectively.Future research prospects of the key technologies in cognitive SWIPT network were investigated.Finally,some recent research achievements of the key technologies in cognitive SWIPT were given.Certain referencing values in the theoretical research and future practical applications of high energy-efficient secure cognitive SWIPT communication network were provided.…”
Get full text
Article -
6084
High-capacity image steganography algorithm combining image encryption and deep learning
Published 2021-09-01“…Aiming at the problem that the residual image of cover image and carrier image in the high-capacity image steganography scheme based on deep learning will expose the secret image, a high-capacity image steganography scheme combining image encryption and deep learning was proposed.An image feature extraction method was used, so that the features extracted from the cover image were consistent with the features extracted from the carrier image.Before the image steganography, the sender extracted features from the cover image as a key to encrypt the secret image.After the extractor extracted the encrypted secret image, the features were extracted from the carrier image as a key to decrypt the secret image.The experimental results show that the attacker cannot find the information of the secret image from the residual image, and the frequency of key transmission is lower, and the security of the algorithm is improved.…”
Get full text
Article -
6085
Conceptualizing digital finance as a precursor for financial inclusion and financial service usage in Uganda
Published 2025-12-01“…Data were collected from 290 lead households from 15 districts of Uganda, benefiting from the Uganda Multi-Sectoral Food Security and Nutritional Project (UMFSNP). Confirmatory factor procedures confirmed the digital finance structure, and individual path coefficients were determined to explain their relationship with financial inclusion and usage of financial services. …”
Get full text
Article -
6086
Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index
Published 2022-05-01“…To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive query with forward and backward privacy was proposed.A bitmap index was used to construct a bidirectional index structure to simplify the dynamic update process, and the access pattern was hidden through symmetric encryption with homomorphic addition.At the same time, since the addition and deletion operations were completed by modulo addition, the leakage of the update process could be reduced by hiding the update type.Security analysis shows that the BPC-DSSE scheme achieves forward and Type-I<sup>-</sup> backward privacy.The simulation results show that the BPC-DSSE scheme has higher update and retrieval efficiency than other conjunctive query schemes.…”
Get full text
Article -
6087
Hybrid tabu search algorithm for excellent Boolean function
Published 2022-05-01“…Boolean function in symmetric cryptographic algorithm must satisfy excellent cryptographic criteria to ensure the security of the algorithm.By combining the advantages of tabu search algorithm and hill climbing algorithm, a new heuristic generation algorithm called hybrid tabu search algorithm for excellent Boolean function was proposed.A large number of Boolean function with high nonlinearity, low autocorrelation, one-resilient, optimal algebraic degree, optimal algebraic immunity, optimal (suboptimal) resistance to fast algebraic attacks could be obtained quickly by applying the proposed algorithm.Simulation results demonstrate that the cryptographic properties of the Boolean function obtained by the proposed algorithm with strong search ability and fast running speed are better than the results of known optimization algorithm.Moreover, the algorithm also provides good Boolean function that cannot be obtained by using construction method.…”
Get full text
Article -
6088
Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Published 2025-02-01“…Abstract There are serious security issues with the quick growth of IoT devices, which are increasingly essential to Industry 4.0. …”
Get full text
Article -
6089
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Published 2024-01-01“…This research contributes several insights into securing machine learning within ACS, ensuring robust FDD in industrial processes.…”
Get full text
Article -
6090
Space-air-ground integrated vehicular network for immersive driving experience
Published 2017-09-01“…In order to achieve the significant advantages of next generation intelligent transportation systems,realizing the smart control of vehicles,and satisfy the vehicular demands for on-road infotainment services,a novel space-air-ground integrated vehicular network architecture was proposed by making use of the space information in terms of service coverage,time synchronization,vehicle status sensing,etc.The project would investigate three fundamental scientific issues related to the novel network:1) space-air-ground integrated network reconfiguration under dynamic space resources constraints; 2) real-time sensing and efficient integration of multi-dimensional context information; 3) real-time,reliable and secure interaction among context information.The outcomes of this project will provide the foundations both in theory and practice for highly expected smart driving,immersive driving experience,and autonomous self-driving vehicular networks.…”
Get full text
Article -
6091
Bringing Home the Bacon: Infusing Evaluation Best Practices into Grant Proposals
Published 2020-01-01“…By adopting these practices, you will enhance the quality of your proposals; you will most likely increase the amount of extramural funding that is secured; and you will elevate the visibility and impact of programs within your organization. …”
Get full text
Article -
6092
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01“…The simulation results demonstrate that ADRing is very efficient in balancing energy consumption and transmission latency, and can significantly prolong survival period of the network and ensure security as well as latency to satisfy the packets' requirements.…”
Get full text
Article -
6093
Territory, Jus ad Bellum: The Status of the Golan Heights in Light of the 2024 ICJ Advisory Opinion
Published 2024-12-01“…The article references relevant UN Security Council Resolutions and treaty interpretation rules, emphasizing a strict application of international law, which Israel has overlooked. …”
Get full text
Article -
6094
Política de regularização fundiária em Rondônia: limitações do programa terra legal e expectativas socioterritoriais
Published 2016-12-01“…Terra Legal Amazonia its a Program that seeks to solve the problem of legal security of federal lands, regulating Brazilian state areas measuring up to 15 fiscal modules occupied by squatters in the nine states of the Legal Amazon. …”
Get full text
Article -
6095
Energy efficient multi-hop routing protocol for smart vehicle monitoring using intelligent sensor networks
Published 2021-12-01“…Therefore, these wireless sensor networks can be installed on a vehicle not only for monitoring perseverance but also for corroborating security with the support of a Global Positioning System expedient. …”
Get full text
Article -
6096
An efficient method to generate elliptic curves
Published 2001-01-01“…This condition can be relaxed to include primes of the form 2ip+1 (i is a small integer) without compromising security. Hence, the number of elliptic curves suitable for use by public key cryptosystems is increased greatly. …”
Get full text
Article -
6097
Modernization of tax control in the context of digitalization of the economy
Published 2020-10-01“…It has been concluded about the need to develop legislation in the field of digitalization of the economy, state regulation of the use of big data technology, ensuring reliable database security and protection ofprivacy, as well as the creation of software for identifying transactions.…”
Get full text
Article -
6098
Application of Interval Arithmetic in the Evaluation of Transfer Capabilities by Considering the Sources of Uncertainty
Published 2009-01-01“…From the results, it is observed that the solutions obtained through the proposed method provide much wider information in terms of closed interval form which is more useful in ensuring secured operation of the interconnected system in the presence of uncertainties in load and line parameters.…”
Get full text
Article -
6099
Privacy protection mechanism of on-demand disclosure on blockchain
Published 2020-06-01“…Privacy protection has become the key problem that blockchain technology must solve from theory to practice.There is a privacy protection requirement of on-demand disclosure in practical applications.Inspired by multicast secure communication mechanism,a privacy protection mechanism of on-demand disclosure on blockchain was proposed.This mechanism improves the RSA based anonymous multi receiver encryption scheme to realize the disclosure of the private data on the blockchain only to the permitted informed,the anonymity protection of the informed and the traceability of the privacy disclosure.The Quorum blockchain privacy protection mechanism is adopted to realize the safe and efficient distribution of the key between the owner of the private information and the informed.Finally,it is proved that PPM-ODB mechanism can guarantee the privacy of privacy data and its superiority in time and storage cost,and it is suggested that the number of informed people should be less than 100 to obtain a good user experience.…”
Get full text
Article -
6100
THE HISTORICAL DEVELOPMENT AND CURRENT TRENDS OF POLITICAL SCIENCE AS A FIELD OF STUDY IN NIGERIA
Published 2023-08-01“…It investigates the current challenges and opportunities for political science in Nigeria in the 21st century, such as democratization, development, security, corruption, ethnicity, and globalization. …”
Get full text
Article