Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6121
Survey on computation offloading in mobile edge computing
Published 2018-11-01“…Computation offloading in mobile edge computing would transfer the resource intensive computational tasks to the edge network.It can not only solve the shortage of mobile user equipment in resource storage,computation performance and energy efficiency,but also deal with the problem of resource occupation,high latency and network load compared to cloud computing.Firstly the architecture of MEC was introduce and a comparative analysis was made according to various deployment schemes.Then the key technologies of computation offloading was studied from three aspects of decision on computation offloading,allocation of computing resource within MEC and system implement of MEC.Based on the analysis of MEC deployment scheme in 5G,two optimization schemes on computation offloading was proposed in 5G MEC.Finally,the current challenges in the mobility management was summarized,interference management and security of computation offloading in MEC.…”
Get full text
Article -
6122
Preparation of Microfiber Grating for Real-Time Sensing of Escherichia Coli Concentration
Published 2020-01-01“…Various diseases are spread by means of contaminated water or food, and the detection of pathogenic bacteria has great significance for securing a proper healthy environment for human beings. …”
Get full text
Article -
6123
Impact of pavement on increasing social interactions in urban spaces of Bojnourd (Case study: Taleghani Street, Shahid Square to Telecommunication Area)
Published 2019-09-01“…According to the results, the most important independent variables in these three categories (physical, cultural and environmental) (security priorities, accessibility, passages, economic functions, urban environment, quality of social environment, social interactions Cultural activities, urban amenities, and recreational and lighting functions have the least impact.…”
Get full text
Article -
6124
The Relationship Between Determinants of Shopping Sites and Customer E-Trust, Purchase Intention, Satisfaction, and Repurchase
Published 2021-11-01“…In this research, questionnaire method was applied on 321 participants and findings shows that image, interface, security, and privacy sub-dimensions of web determinants effect positively and meaningful purchase intention, customer satisfaction, and repurchase of customers. …”
Get full text
Article -
6125
Regulating N Application for Rice Yield and Sustainable Eco-Agro Development in the Upper Reaches of Yellow River Basin, China
Published 2014-01-01“…High N fertilizer and flooding irrigation applied to rice on anthropogenic-alluvial soil often result in N leaching and low recovery of applied fertilizer N from the rice fields in Ningxia irrigation region in the upper reaches of the Yellow River, which threatens ecological environment, food security, and sustainable agricultural development. …”
Get full text
Article -
6126
A Shared Interest Discovery Model for Coauthor Relationship in SNS
Published 2014-04-01“…In order to share one's sensitive data with random people without security and privacy concerns, this paper proposes a shared interest discovery model for coauthor relationship in SNS, named as coauthor topic (coAT) model, to identify the users with similar interests from social networks, and collapsed Gibbs sampling method is utilized for inferring model parameters. …”
Get full text
Article -
6127
Image encryption algorithms based on chaos through dual scrambling of pixel position and bit
Published 2014-03-01“…As the current popular chaos-based image encryption algorithms with the permutation–diffusion structure have security flaws of no immunity to attack.A new image encryption algorithm was proposed based on the analysis of current algorithms,which can well resist the chosen-plaintext and the chosen-ciphertext attacks.The algorithm uses Kent chaotic map to generate key streams,and produces the parameters of the chaotic system and the iteration times according to the characteristics of plaintext pixels and input key.Firstly,the positions of pixels were shuffled totally with the chaotic sequence.Secondly,the 0 and 1 bit positions of image pixels were scrambled by using another chaotic sequence generated by the input key.The experimental results show that the algorithm cannot only resist the chosen plaintext attack and chosen ciphertext attack but also achieve better cryptographic properties,such as key space,statistical analysis.…”
Get full text
Article -
6128
UAV swarms: research, challenges, and future directions
Published 2025-01-01“…Key areas such as coordinated path planning, task assignment, formation control, and security considerations are examined, highlighting how Artificial Intelligence (AI) and Machine Learning (ML) are integrated to improve decision-making and adaptability. …”
Get full text
Article -
6129
Survey of encrypted malicious traffic detection based on deep learning
Published 2020-06-01“…With the increasing awareness of network security,encrypted communication dominates and encrypted traffic grows rapidly.Traffic encryption,while protecting privacy,also masks illegal attempts and changes the form of threats.As one of the most important branch of machine learning,deep learning performs well in traffic classification.For several years,research on deep-learning based intrusion detection has been deepened and achieved good results.The steps of encrypted malicious traffic detection were introduced to be a general detection framework model named “six-step method”.Then,discussion and induction of data processing and detection algorithms were carried out combined with this model.Both advantages and disadvantages of various algorithm models were given as well.Finally,future research directions were pointed out with a view to providing assistance for further research.…”
Get full text
Article -
6130
Evolutionary Game Analysis of Capital-Constrained Supplier’s and Manufacturer’s Financing Schemes
Published 2021-01-01“…Purchase order financing (POF) and buyer direct financing (BDF) are both innovative financing schemes aiming to help financial constrained suppliers secure financing for production. In this paper, we investigate the interaction mechanism between suppliers’ financing strategy selection and manufacturers’ loans offering strategy adoption under two innovative financing schemes. …”
Get full text
Article -
6131
American Studies in Norway: Historic Ideals and Contemporary Challenges
Published 2024-12-01“… Because of its particular history of institutionalization, American studies in Norway has come to fill a unique role in higher education, one that requires broader recognition to secure the field a stable future. In this article, Falke connects the past of American studies in Norway to its present by focusing on three founding moments. …”
Get full text
Article -
6132
Risk access control model for Hadoop
Published 2016-01-01“…Combining with access token and risk supervision, the risk access control mechanism for big data privacy protection was real-ized, which could be applied to enhance the security of Hadoop Kerberos protocol. Finally, the experiment result shows that the model can constrain the authorized users’ access behavior effectively.…”
Get full text
Article -
6133
Unpacking the Socio-Political Background of the Evolution of Boko Haram in Northern Nigeria: A Social Movement Theory Approach
Published 2019-07-01“…Drawing from the social movement theory, it harnesses data,collected mostly from semi-structured interviews on some Salafi leaders, security personnel, politicians, and ordinary civilians who worked in the area. …”
Get full text
Article -
6134
Metaverse: Technological evolution and social impact
Published 2024-01-01“…Through the evolution of virtual worlds and technological advancements, the Metaverse is becoming increasingly prevalent, offering richer socialization experiences and economic opportunities while simultaneously raising concerns about privacy, security, and media addiction. National policies and the attitudes of international organizations also play a crucial role in shaping the future of the Metaverse, with different countries having different strategies and priorities. …”
Get full text
Article -
6135
Data sharing scheme for 5G IoT based on blockchain
Published 2020-08-01“…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
Get full text
Article -
6136
Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud
Published 2017-06-01“…Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However,when the mobile robots access the remote devices via sensor-cloud platform,because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels,which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore,the utility function of game players were formalized,the adaptive trust update process was analyzed,and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.…”
Get full text
Article -
6137
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01“…To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing operation in traditional CP-ABE was replaced with the relatively lightweight scalar multiplication,thus the overall computation overhead was reduced.And OBDD was used as the access structure of CP-ABE,which can not only represent any Boolean expression about attributes,but also support both positive and negative attributes.The length of the key was independent of the number of attributes and the length of the ciphertext was only related to the number of valid paths in the access policy.The security and performance analysis show that the scheme can resist chosen plaintext attack under the decisional Diffie-Hellman (DDH) assumption,and the computation efficiency can meet the practical application requirements of Internet of things.…”
Get full text
Article -
6138
Policy conflict detection in software defined network by using deep learning
Published 2017-11-01“…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
Get full text
Article -
6139
THE DIMENSIONS OF ELECTRONIC (E)-BANKING SERVICE QUALITY ON CUSTOMER SATISFACTION: EVIDENCE FROM NIGERIA
Published 2025-01-01“…The results of this study revealed that ease to use, reliability and security have a positive significant impact on customer satisfaction. …”
Get full text
Article -
6140
Investigating the Factors Affecting Foreign Direct Investment in Selected Muslim Countries: A Panel Data Approach
Published 2021-02-01“…On the other hand, the variables of degree of openness of the economy and economic security have a positive and significant effect on attracting foreign direct investment in the studied countries while inflation rate, economic growth and human capital solely have no significant effect on foreign direct investment in these countries.…”
Get full text
Article