Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6281
Pouvoir et opposition en Algérie : vers une transition prolongée ?
Published 2009-11-01“…Radical Islamism and the eruption of terrorist violence have offered the governing elite an opportunity to renege on the progress that had been made. In the name of security, the opposition’s room for maneuver has been largely reduced. …”
Get full text
Article -
6282
Analysis of Digital Image Watermarking Techniques through Hybrid Methods
Published 2020-01-01“…For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by hybridizing different domains, such as spatial and transform domains. …”
Get full text
Article -
6283
Boredom, Cohesion, and Transformation in Nick Drnaso’s Beverly
Published 2022-12-01“…In turn, the possibility that the repetitive interactions of everyday life in fact provide known and secure structures, compensating for their flat sameness, is revealed to be hollow by most characters’ frustrations, melancholy, and lack of joyful connection with others. …”
Get full text
Article -
6284
Analysis and suggestions on the development of IoT technology
Published 2020-12-01“…The Internet of things (IoT) has been developing for a decade in China,which has rapidly evolved from the early sensor network technology,radio frequency identification (RFID) technology to the intelligent networking technology based on 5G.The Internet of everything is coming to our life.The application of IoT has also been gradually and comprehensively applied in from the area of financial IC card to the industry,government affairs,transportation,health care,education,and etc.The development of the IoT hot technologies represented by 5G and low-power wide-area network (LPWAN),and the deep integration of blockchain,edge computing and other technologies with the IoT,comprehensively promote the deep application of the IoT in the industry,which brings great development opportunities to all the industry.It was focused on the analysis of the status of 5G,IoT identification,edge computing,LPWAN,security technology,and etc.The development tendency of the IoT was also forecasted,and the corresponding policy suggestion to promote the development of IoT was put forward.…”
Get full text
Article -
6285
Sinn Féin’s Tortuous Road to Power
Published 2014-12-01“…Sinn Féin, once an outcast of Northern Ireland political life, now sits in the power-sharing Executive alongside the Democratic Unionist Party. In order to secure such a position, it had to transform itself, abandoning deep-seated principles such as abstentionism and severe the link between political and military actions. …”
Get full text
Article -
6286
A Lissajous Curve–Based Method for Busbar Protection
Published 2024-01-01“…Moreover, the proposed scheme can detect evolving external to internal faults with CT saturation, internal faults during power transformer energization, and internal faults in the presence of white noise. Additionally, it is secure against external faults with current transformer (CT) saturation.…”
Get full text
Article -
6287
Multidimensional Analysis of Linguistic Variation in the Russian Speeches Before War in Ukraine
Published 2024-12-01“…This study sets out to explore the genre analysis and text type of Russian speeches at the Munich Security Conferences MSC from 2007 to 2018 using multidimensional analysis. …”
Get full text
Article -
6288
SLA Audit Mechanism of Virtual Machine Memory on Cloud
Published 2013-06-01“…Then, digital signatures-based Diffie-Hellman key exchange protocol was also proposed to support strategy security exchange and trust alarm. The experimental results indicate that the proposed module can effectively audit VM memory SLA,and also support strong expansibility of cloud tenant customize strategy with low overhead.…”
Get full text
Article -
6289
EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH
Published 2015-11-01“… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
Get full text
Article -
6290
L’Empire en question : origines et développement d’un débat américain contemporain
Published 2007-09-01“…Even though members of the Bush administration have declared that the United States is not an Empire, the 2002 National Security Strategy has neo-imperialist overtones that have triggered anti-imperialist reactions across the American political spectrum. …”
Get full text
Article -
6291
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
Published 2022-01-01“…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. …”
Get full text
Article -
6292
Design on the full-dimensional reconfiguration polymorphic network switching chip architecture
Published 2023-06-01“…At present, IP network has the problems of rigid structure, poor scalability and poor security.To solve these problems, the concept of polymorphic network has been proposed by researchers and gradually become a research hotspot.The programmable network switching chip is the basis of polymorphic network implementation.Therefore, a full-dimensional reconfigurable polymorphic network switching chip architecture was proposed.Based on eFPGA in the chip, the port-level and bit-level fine-grained reconfigurable polymorphic network was realized.Based on self-designed process element (PE), the coarse-grained reconfigurable network switching engine was realized.Thereby the full-dimensional reconfigurable polymorphic network switching chip was realized and laid the foundation for the data layer of polymorphic network.To improve the network switching performance, an improved bit vector algorithm was proposed, which could realize fast flow table lookup with a smaller resource consumption.The proposed algorithm has showed its practicability in the research.…”
Get full text
Article -
6293
Les chemins de fer atmosphériques. Première partie
Published 2009-05-01“…During the 1840s, as the French national railway network, centred on Paris, gradually took form, steam locomotion, for reasons of economy and security, still inspired much hesitation and criticism. …”
Get full text
Article -
6294
Guide of maxillofacial trauma intervention for diagnosis and treatment of facial burns
Published 2010-07-01Get full text
Article -
6295
IRCICA Library UHF RFID Solutions
Published 2011-03-01“…IRCICA library has formed the UHF RFID system to find various materials in a reliable and expedient way, to do its counting in a consistent and rapid manner, as well as labeling and controlling various items, controlling and documenting the check-ins and check-outs from the library and setting up a secure and effective circulation of materials within the library. …”
Get full text
Article -
6296
Le droit du travail et les migrants ruraux : instituer un nouveau salariat en Chine
Published 2014-06-01“…Labour law appears as a solution whose goal is to ensure the viability of this new working class with socially inclusive policies and then institutionalises its economic security. Furthermore, in a context characterised by the socialist legacy and the lack of democracy, we have to question the relations with the law and the State. …”
Get full text
Article -
6297
Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation
Published 2021-08-01“…In the long-term practice of cybersecurity talent cultivation, the teaching team of School of Cyber Science and Technology of Beihang University, aiming at the knowledge goal, ability goal and quality goal of talent cultivation of cybersecurity discipline and related majors, puts forward the innovative teaching idea of “fine teaching, strong practice, excellent assessment, abundant resources” according to the knowledge characteristics, thinking characteristics and psychological characteristics of students.The teaching team integrates political teaching,research teaching, inspiration teaching, seminar teaching and example teaching methods, puts forward the PRIDE teaching mode,which has been widely applied in the teaching of core professional courses such as “Information Network Security” and “Modern Cryptography”, and has got remarkable teaching achievement.Through the practice of PRIDE teaching mode, a high-level teaching team with high political quality and strong teaching ability has been also built.…”
Get full text
Article -
6298
Disaster Tips for People with Disabilities
Published 2005-08-01“…Departments of Homeland Security and the Federal Emergency Management Agency for people with disabilities. …”
Get full text
Article -
6299
Trajectories of Vulnerability of Rural Territories in the Ecuadorian Andes: a Comparative Analysis
Published 2019-01-01“…In addition, we observed that in recent years, family farmers have developed agricultural practices that have adverse effects on the environment while, at the same time, their food security was not ensured. Finally, the work done over the past three years provides an opportunity to take stock of the negative effects of the “modernizing” project of the primary sector in Ecuador and, through the comparison of several local situations, to characterize the extension of the trajectory of vulnerability of Andean rural territories.…”
Get full text
Article -
6300