Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6101
Study of key technology for reconfigurable satellite platform supporting network interconnection
Published 2017-10-01“…Reconfigurable satellite platform is a new spacecraft design concept.The application of distributed computing in reconfigurable integrated satellite platform was studied,the standard mechanical interface,electrical interface for the separation or separation between main platform and a variety of payloads to form a new combination and achieve the expansion of platform functions and efficient use was proposed.Including the security control protocol,scalable design,distributed computing and management models and other aspects of a detailed design,the key technologies of reconfigurable integrated satellite platforms supporting network interconnection were studied to meet the existing communications,remote sensing and navigation satellites’ needs.It will be promoted for the spacecraft design to the integrated business and in the orbit reconfiguration direction of continuous development,which will enhance the stability of the orbit operation,survivability and maintainability and provide a reliable technical foundation for the world of integrated network research.…”
Get full text
Article -
6102
Program profilaktyki nadużywania Internetu i mediów elektronicznych: komunikat z badań ewaluacyjnych
Published 2021-09-01“…Wilcoxon test indicates the significant increment in knowledge about communication rules and relationships on the Internet, about the influence of ICT on health and safety and emotional and difficult situation management skills, which were treated as securing factors. Moreover, a significant increment of the monitoring activities among parent was observed. …”
Get full text
Article -
6103
Fair multi-party concurrent signature scheme
Published 2014-03-01“…Multi-party concurrent signatures were first proposed by Tonien et al at ISC2006,but Xie and Tan pointed Tonien et al's scheme doesn't satisfy fairness and they reconstructed multi-party concurrent signature schemes respectively.Through analysis,the multi-party concurrent signature schemes proposed by Xie and Tan don't satisfy fairness either,so a formal security model of fair multi-party concurrent signatures was proposed and a multi-party concurrent signature scheme based on bilinear pairing and multi-party key agreement was also reconstructed.Analysis shows that the new scheme satisfies correctness,unforgeability,ambiguity,concurrency and fairness in the random oracle model assuming the CDH problem is intractable and highly efficient in signature size,computation cost and communication cost compared with other schemes of its kind.…”
Get full text
Article -
6104
CodeBuddy: A Programming Assignment Management System for Short-Form Exercises
Published 2025-01-01“…It provides a Web-based interface, the ability to execute code in a secure environment, support for custom testing logic, near-immediate feedback to students, and support for many programming languages. …”
Get full text
Article -
6105
The Israeli–Palestinian Separation Wall and the Assemblage Theory: The Case of the Weekly Rosary at the Icon of Our Lady of the Wall
Published 2017-06-01“…Although the Wall has been widely described as a technology of occupation on one side and as a device to ensure security on the other, through Latour’s concept of assemblages I unearth its agency in developing a Christian shrine. …”
Get full text
Article -
6106
Some Characteristics of Employees as Risk Factors for Presenteeism
Published 2013-06-01“…The characteristics considered included ambition, financial worries, job security, sick leave and the physical and mental health of employees.…”
Get full text
Article -
6107
Factors Affecting Cloud-Based Accounting Adoption in the Indonesian Banking Sector
Published 2025-01-01“…In contrast, technological and environmental factors must be considered by banks and the Indonesian government, especially clarity regarding data security protection from cloud adoption to provide confidence to users of cloud-based accounting applications.…”
Get full text
Article -
6108
Bilateral Primary Total Knee Arthroplasty and Reconstruction of the Medial Tibial Plateau by an Asymmetric Cone in a Patient with Charcot Arthropathy
Published 2021-01-01“…In advanced Charcot arthropathy of the knee, the use of asymmetric tibial cones appears to be an appropriate solution for secure fixation and stability of the implant.…”
Get full text
Article -
6109
Disappearance of women and girls in Mexico: Contributions of feminisms for understanding macrosocial processes
Published 2020-05-01“…This re-search argues that the increase in disappeared girls is associated with two main factors: an economy of dispossession of human lives for the accumulation of capital, which produces specific forms of violence against women and girls, and a systematic violence against women exercised by agents from state security and legal institutions.…”
Get full text
Article -
6110
SDN control and forwarding method based on identity attribute
Published 2019-11-01“…Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and attribute signature were generated by device attributes and encapsulated in the group header.When the data flow left the network,the data was verified by the forwarding device to ensure the validity of the data flow.At the same time,attribute identification was defined as a match field of flow by the framework,and the network forwarding behavior was defined based on attributeidentification.A fine-grained access control was implemented by the proposed mechanism and attribute-based signature.The proposed mechanism and attribute-based signature implemented a fine-grained access control.Experimental results demonstrate that the method can effectively implement fine-grained forwarding and flow authentication,and the forwarding granularity is higher than that of similar schemes.…”
Get full text
Article -
6111
Le mythe de l’émergence. Réalités des dynamiques externes et internes des processus d’accumulation brésilien et chinois
Published 2020-06-01“…Finally, the solutions proposed to face the current crisis of emergence, such as the reshaping of social security systems, the reorientation of these economies towards their internal market and a better international integration enabled by the development of renewable energies, are more widely criticized in my latest work.…”
Get full text
Article -
6112
Bringing Home the Bacon: Infusing Evaluation Best Practices into Grant Proposals
Published 2020-01-01“…By adopting these practices, you will enhance the quality of your proposals; you will most likely increase the amount of extramural funding that is secured; and you will elevate the visibility and impact of programs within your organization. …”
Get full text
Article -
6113
REVISITING THEORIES AND BUILDING A NEW RESEARCH AGENDA FOR EXPLAINING RADICALIZATION
Published 2024-12-01“…Over recent decades, radicalization, particularly when it leads to violence, has become a critical focus for national and international security agendas and research fields. This article revisits foundational social, psychological, socio-psychological, and psychiatric theories of radicalization, aiming to provide a comprehensive overview of their development and current relevance. …”
Get full text
Article -
6114
Provable data possession scheme based on public verification and private verification
Published 2019-03-01“…More and more users choose to transfer their applications and data into the cloud.Data security is a key issue for cloud storage systems.To ensure the integrity and validity of the data stored in the cloud,provable data possession (PDP) scheme is particularly important.In order to verify whether the cloud storage service provider had stored the data of the user completely,a scheme on the basis of NRPDP (non-repudiable PDP) was improved and extended,and a data retention scheme based on public authentication and private authentication was proposed.The scheme can verify the trustworthiness of the service provider and the user in the cloud storage at the same time,which satisfies the non-repudiation of the verification.The theory proves the non-repudiation of the proposed scheme.The experiment proves that the efficiency of each stage is better than that of the existing single public verification method or private authentication method.…”
Get full text
Article -
6115
Population Ageing in Ghana: Research Gaps and the Way Forward
Published 2010-01-01“…With increasing urbanization and modernization, it is important to know something about intergenerational transfers from adult children to their elderly parents, and characterize the elderly persons' food security strategies. Training of researchers will be important in terms of strengthening Ghana's capacity to monitor trends, as well as to conduct research and explore new directions in population ageing research.…”
Get full text
Article -
6116
Design of Mobile Gateway for Implementation of Smart Work System
Published 2015-01-01“…For this reason, I have developed a mobile gateway that is based on the communication server construction OPEN API development, management of mobile ID, protocol design, and design of SSL/TLS security tunnel. Also, we developed a smart work platform that you apply this, you are trying to provide information systems environment of mobile company.…”
Get full text
Article -
6117
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview
Published 2024-12-01“…One of the important areas that require online monitoring is medical imaging equipment, whose functional information is transmitted through the Internet of Things. Server security and intrusion prevention, along with anomaly detection, are critical requirements for these networks. …”
Get full text
Article -
6118
Application of 5G in railway smart stations
Published 2021-07-01“…Accelerating the 5G “new infrastructure” strategy has become the inevitable development trend of railway smart stations.Firstly, state-of-the-art of relevant business of railway smart stations in China was analyzed.Afterwards, the application requirements of 5G communication in railway smart stations were outlined, and then 5G communication network architecture of railway smart stations was constructed based on cloud edge collaboration.Finally, the application modes of railway smart stations based on 5G communication and cloud edge collaboration were respectively proposed for passenger travel service, station operating organization, security guarantee and green energy saving.The application of railway smart stations based on 5G communication can promote the transformation and upgrading of stations, enhance the quality of passenger service, improve passenger travel experience, and increase the efficiency of passenger transport operating organization.…”
Get full text
Article -
6119
RADIO FREQUENCY DATA IDENTIFICATION TECHNOLOGY: POTENTIAL FOR USE IN FASHION INDUSTRY SUPPLY CHAINS
Published 2020-09-01“…The technology can be used to increase the transparency and security of supply chains, marketing research and in other areas. …”
Get full text
Article -
6120
Highly robust co‐estimation of state of charge and state of health using recursive total least squares and unscented Kalman filter for lithium‐ion battery
Published 2024-12-01“…Abstract State of charge (SOC) and state of health (SOH) constitute pivotal factors in the efficient and secure management of lithium‐ion batteries, particularly within the context of electric vehicles. …”
Get full text
Article