Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6241
Millimeter-wave array enabled UAV-to-UAV communication technology
Published 2022-10-01“…As the application scope of unmanned aerial vehicle (UAV) expands and the tasks become more complicated, the demands for large bandwidth, high data rate and antijamming capability in UAV-to-UAV (V2V) communication grow rapidly.With abundant spectrum resource, millimeter-wave (mmWave) array communication has been one of the key technologies to support V2V communications.Focusing on the emerging field of mmWave array V2V communication, the difficulties and challenges in point-to-point communication and unmanned aerial vehicle ad-hoc network were analyzed.The problems and approaches for channel modeling, robust beamforming, secure communication in point-to-point communication and neighbor discovery, routing decisions, resource allocation, distributed deployment in unmanned aerial vehicle ad-hoc network were reviewed.Some valuable research directions were summarized to provide inspiration for future relevant research.…”
Get full text
Article -
6242
Comparative study of anonymous network Tor and I2P
Published 2019-02-01“…Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The anonymous network Tor and I2P have been highly valued by the academic community and the industry,and are also welcomed by users.The key difference between the design concept between the Tor network and the I2P is that I2P attempts to transfer the existing Internet service to the I2P network,and service implementation is provided within the framework,while Thor allows anonymous access to implement and operate external Internet services separately.The anonymous networks Tor and I2P in terms of terminology,project development,anonymous services,key technologies,threat types,etc.were compared,revealing the inherent and essential differences between the two anonymous networks.…”
Get full text
Article -
6243
European Religious Education Policy
Published 2022-06-01“…Moreover, in recent decades, European organisations such as the Council of Europe and the Organisation for Security and Co-operation in Europe have published recommendations, guidelines and reference books concerning religious education in schools. …”
Get full text
Article -
6244
Identity, imaginary and tourism in the tuareg region, in Niger
Published 2012-12-01“…Finally, the authors consider the decline of tourism, as a result of the 2007-2009 rebellion, and the presence in the neighboring Northern Mali of the Salafist brigade Al Qaeda in the Islamic Maghreb (AQIM), which prohibits access to the region to foreigners for security reasons.The brutal halt in the tourist activity came with the decline of the Tuareg subculture that had been forged through their entrepreneurial dedication to tourism.…”
Get full text
Article -
6245
Le nouveau Xinjiang : intégration et recompositions territoriales d’une périphérie chinoise
Published 2009-06-01“…That’s the reason why central government take active measures for an acceleration of the economic development in the region with the aim of promoting regional security, cultural and économic integration. Nowadays, an unprecedent change taken place in Xinjiang with the improvements in transportation infrastructure. …”
Get full text
Article -
6246
Communication,navigation and IoT integration 5G indoor communication network
Published 2019-08-01“…In the 4G era,operators have become data service pipelines,while they will actively seek business transformation in the 5G era.According to research institutes,the indoor positioning and IoT market have broad prospects,and operators are working hard to expand vertical industry applications in related fields.However,the existing indoor communication network has a single function and cannot effectively support indoor positioning and IoT services.A communication,navigation and IoT integration 5G indoor communication network was proposed.By integrating the bluetooth module inside the indoor antenna,it achieved some new functions,such as downlink bluetooth positioning,advertisement information push,path loss detection,uplink IoT collection and uplink bluetooth positioning.The proposed technical solution can be applied to smart medical scenarios,such as smart consultation,equipment management,security management,logistical support and one-click alarm.…”
Get full text
Article -
6247
Colonial and Postcolonial Logistics
Published 2018-11-01“…The analysis of infrastructure development in postcolonial Zambia illustrates the competing strategies through which imperialist powers attempted to secure a new form of control on Africa and elucidates the role of logistics as a decisive tool to shape the African territory.…”
Get full text
Article -
6248
Big Data with Cloud Computing: Discussions and Challenges
Published 2022-03-01“…Various research challenges are defined in terms of distributed database storage, data security, heterogeneity, and data visualization.…”
Get full text
Article -
6249
Low-hit frequency-hopping communication systems for power Internet of things random access
Published 2023-01-01“…The communication network is an essential component of the data acquisition and information transmission in power Internet of things (IoT).To meet the development requirements of multiple power service in the future, the wireless communication technique with flexible-access and high scalability is one of the development directions for power IoT.Due to the features of large-scale access, random access time, high security and reliability for information transmission of power IoT, a frequency-hopping (FH) technique with low-hit rate for random access was proposed.The construction algorithm of such FH pattern was based upon the combination and shift operation of conventional FH sequences.By the theoretical arithmetic and numerical simulation, the properties of the proposed FH pattern and the error-rate of the FH-based power IoT were evaluated.The analysis reveals that the new class of FH sequences and the system can meet the requirements of large-scale access and highly reliable communication for the power IoT, which has good application prospects.…”
Get full text
Article -
6250
Southern Madagascar, polycrisis and project failures: A scoping review.
Published 2024-01-01“…The southern region of Madagascar experiences a series of crises related to agro-climatic, nutritional, security, institutional, and political conditions despite the presence of numerous development aid projects over several decades. …”
Get full text
Article -
6251
Políticas alimentares e as capacidades estatais em capitais metropolitanas brasileiras
Published 2024-06-01“…It is concluded that several factors contributed to the construction and continuity of food policies in the cities studied, especially institutional activism and bureaucratic structuring, in addition to training in food and nutritional security and the incorporation of the principles of efficiency and public innovation, as well as the recognition of food policies by the population local and national and international recognition of food themes.…”
Get full text
Article -
6252
Matter Element Evaluation and Sensitivity Analysis of the Sponge City Construction Performance
Published 2020-01-01“…In order to know the construction effect of the sponge city constructionproject,scientifically and reasonably evaluate the current situation of pilot sponge cityconstruction, this paper constructs an evaluation index system from 4 aspects of waterecology,water environment,water resources and water security, establishes an evaluation model forsponge city construction performance by an entropy weight matter-element analysis method,takes HebiCity as an example for evaluation,and on the basis of the evaluation result, performs asensitivity analysis of the influencing factors of sponge city construction in Hebi City. …”
Get full text
Article -
6253
Les Indiens d’Antananarivo, des citadins comme les autres ?
Published 2024-03-01“…However, precisely because of their dominant social position, Indians are characterised by mobility practices that are constrained by security concerns, and express a strong sense of spatial vulnerability. …”
Get full text
Article -
6254
Adaptive steganography algorithm in digital image based on Arnold transform
Published 2016-06-01“…Previous adaptive steganography algorithms were based on ordinal and full-embedding method.However,these algorithms might cause the concealment of secret information not good enough.Therefore,a random and non-fully embedding method was proposed to improve the concealment.The image system parameters could be obtained,so that the image full capacity was exactly greater than the length of information for non-full embedding.Moreover,these parameters made steganography more flexibility by reducing the modifications of image.Then,secret information embedding sequence was scrambled based on Arnold transform for the purpose that the steganalyst cannot detect out information orderly.Therefore,the secret information can be more concealed,which can improve the security of the algorithms.Experimental results show that the algorithm not only improves the concealment of steganography but also reduces stego distortion,and random non-full embedding operating can be applied to many other similar algorithms.…”
Get full text
Article -
6255
Quels espaces scolaires pour le bien-être relationnel ? Enquête sur le ressenti des collégiens français
Published 2017-02-01“…In other words, what spatial modifications could be thought out in order to guarantee a feeling of security and pupils’ well-being. The results show that spaces which are not under surveillance are seen as risky by secondary school children (n =544). …”
Get full text
Article -
6256
Genome Editing: A Promising Approach for Achieving Abiotic Stress Tolerance in Plants
Published 2022-01-01“…The susceptibility of crop plants towards abiotic stresses is highly threatening to assure global food security as it results in almost 50% annual yield loss. …”
Get full text
Article -
6257
Possible paths towards sustainable tourism development in a high-mountain resort
Published 2009-12-01“…The local approach of "sustainable tourism", indeed, seems for the moment rather to aim - as in many other high mountain ski resorts - towards a more environmental management of the basic urban functions than a real questioning of a tourist model based upon the triptych development of the ski slopes, securizing of the snow resource and touristic real estate programs.…”
Get full text
Article -
6258
Musulmans et non musulmans dans la Salonique ottomane (xviiie siècle).L’affrontement sur les espaces et les lignes de démarcation
Published 2005-09-01“…By using the evidence of the sicilt (the records of the şeriat court), I demonstrate the various legal strategies that were adopted by non-Muslims to secure their own interests in the public space: challenging existing boundaries or resisting any intrusion that might endanger their own position. …”
Get full text
Article -
6259
Using One’s Right of Inspection: Australia, the United Nations, Human Rights and Aboriginal People
Published 2014-11-01“…In the context of Australia’s bid for a seat on the UN Security Council, it seemed appropriate and timely to assess the way the country complies with international standards of human rights. …”
Get full text
Article -
6260
Differential fault attack on FeW
Published 2020-04-01“…In order to evaluate the security of the lightweight block cipher FeW,a differential fault attack method was proposed and discussed using a single byte random fault model.In this method,a single byte random fault was introduced on the right side of the last round of FeW to recover the key based on the statistical characteristics of S-box difference distribution,and the difference information was obtained using the characteristics of the linear diffusion function.The experiment results show that the complete key recovery can be achieved with an average of 47.73 and 79.55 fault injections for FeW-64-80 and FeW-64-128 respectively.If 2<sup>10</sup>exhaustive calculations are added to the key recovery process,the number of average fault injections required can be reduced to 24.90 and 41.50.This attack is effective on FeW.…”
Get full text
Article