Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6301
Towards 5G:heterogeneous cellular network architecture design based on intelligent SDN paradigm
Published 2016-06-01“…To enrich the SDN(software defined networking)with intelligence and learning capability,an intelligent SDN paradigm was proposed for the first time.Combining it with the traditional cellular networks,5G-oriented heterogeneous cellular network architecture based on the intelligent SDN was set up,which made the integrated management of radio access networks and core networks possible.Based on the management and coordination of intelligent SDN,the decoupling of control and data,decoupling of uplink and downlink,and dynamic resource utilization in radio access networks to improve the spectrum efficiency and energy efficiency were put forward;content caching and network security strategies were deployed in the core networks to enhance the network scalability and data throughput.Globally,the resource utilization in radio access networks and core networks was optimized to achieve the network function virtualization and customized service provision,which contributed to the in-depth combination between the heterogeneous cellular networks and intelligent SDN.…”
Get full text
Article -
6302
The Pentagon Papers as History
Published 2022-06-01“…In the past, for the sake of national security, limitations had sometimes been imposed on newspapers and magazines condemning the war that was being fought – most notoriously, in the twentieth century, during the First World War. …”
Get full text
Article -
6303
Strengthening Türkiye’s drought management: insights from international practices (Netherlands, UK and USA)
Published 2025-01-01“…By drawing on the experiences of top-performing nations in drought management, this paper provides insights for creating a strong and sustainable water management for Türkiye, effectively tackling the challenges posed by climate change and ensuring the long-term security of water resources.…”
Get full text
Article -
6304
Quality schemes and pastoralism in France
Published 2015-02-01“…Strengthening and securing economic activity in rural areas figure among the objectives of French policy on the quality and origin of agricultural products. …”
Get full text
Article -
6305
Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks
Published 2022-03-01“…Large-scale deployment of mobile wireless sensor networks has been widely used in some dangerous and hostile urban security surveillance scenarios. As a new network architecture, software-defined networks was introduced into wireless sensor networks to form a new software-defined wireless sensor networks to solve the problem of balanced large-scale deployment of sensor networks and simplify the complexity of network management. …”
Get full text
Article -
6306
Political Elites as an Object of Coercive Influence in Contemporary World Politics
Published 2015-10-01“…The assumption then is that the main object of the security and the securitization in world politics is to be political elite. …”
Get full text
Article -
6307
Research and Implementation of SVDU Simulator Based on Emulation Technology
Published 2021-01-01“…With the development of multiple engineering application requirements, such as configuration verification and operator training, this stimulator has been applied in several virtual security level DCS projects.…”
Get full text
Article -
6308
Advances in auxin synthesis, transport, and signaling in rice: implications for stress resilience and crop improvement
Published 2025-01-01“…By synthesizing these findings, we provide a comprehensive overview of how auxin research informs strategies for developing rice varieties with enhanced adaptability and optimized growth, contributing to food security and sustainable agriculture.…”
Get full text
Article -
6309
AIoT: a taxonomy, review and future directions
Published 2021-08-01“…AIoT (artificial intelligence of things) is an integrated product of artificial intelligence (AI) and internet of things (IoT).Currently, it has been widely used in smart cities, smart homes, smart manufacturing, and driverless.However, the research of AIoT is still in its infancy, facing with many problems and challenges.In order to clarify the concept and provide possible solutions, a comprehensive survey was carried out on AIoT.Firstly, a clear definition of AIoT was provided, along with the brief introduction on its background and application scenarios.And then a novel cloud-edge-end hybrid AIoT architecture for intelligent information processing was constructed.Based on the research framework of AIoT, the research status and solutions were discussed, including AI integrated IoT data acquisition, complex event processing and coordination, cloud-edge-end integration, AI-enhanced IoT security and privacy, and AI-based applications, etc.Finally, it identified the open challenges and offers future research directions.…”
Get full text
Article -
6310
A COMPUTATIONAL SYSTEM FOR EVALUATING HUMAN PERCEPTION IN VIDEO STEGANOGRAPHY
Published 2024-12-01“…The system serves as a tool for advancing the development of more secure and reliable video steganographic techniques. …”
Get full text
Article -
6311
ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS
Published 2020-06-01“…The accessibility ofinformation is connected with the level of security of engaging in business activities. Makingchanges in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be onesolution for the problem of insufficient information. …”
Get full text
Article -
6312
RESEARCH OF WHEELED TRACTOR ROLL STABILITY BASED ON VIRTUAL PROTOTYPING TECHNOLOGY
Published 2017-01-01“…The roll stability directly affectsthe wheeled tractor security. Virtual prototyping technology was used to study wheeled tractor roll stability. …”
Get full text
Article -
6313
The Beneficial Role of Polysaccharide Hydrocolloids in Meat Products: A Review
Published 2025-01-01“…Then, the beneficial roles of polysaccharide hydrocolloids in meat products are comprehensively summarized and highlighted, including retarding lipid and protein oxidation, enhancing nutritional properties, improving texture and color quality, providing antibacterial activity, monitoring freshness, acting as a cryoprotectant, improving printability, and ensuring security. Finally, the challenges and opportunities of polysaccharide hydrocolloids in meat products are also introduced.…”
Get full text
Article -
6314
Fortifying Biosafety in Nigeria: Insights and Transformative Practices from the SNL-NIBSA Bio-risk Management Course
Published 2024-12-01“…Overall, SNL-NiBSA collaboration elevates biosafety, promotes responsible research, and enhances global health security. …”
Get full text
Article -
6315
Comparison Between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-03-01“…This idea has boosted the success rate of different experiments in the fields of health, Finance, Security, etc. where simple factors like temperature, motion, smoke, pressure etc. are used to muster the required data. …”
Get full text
Article -
6316
On Key Evolution over Wireless Channels
Published 2015-07-01“…In this paper, we focus on the problem of developing key agreement schemes for secure communication across wireless channels and propose a key evolution scheme to alleviate the assumption. …”
Get full text
Article -
6317
Stability of password authentication in infocommunication networks
Published 2020-09-01“…It is shown that for social networks with a large number of users, widely used assessment of the security of password systems based on the calculation of the determination probability is not sufficient. …”
Get full text
Article -
6318
Challenges and opportunities with ChatGPT in oral oncology: The journey ahead
Published 2024-06-01“…However, challenges such as ethical considerations regarding patient privacy, data security, and biases in AI algorithms require careful attention. …”
Get full text
Article -
6319
Critical Analysis of Human Rights Challenges with Freedom of Information in E-government
Published 2021-01-01“…There is a conflict with the principle of human and national security and a conflict with the principle of the right to be forgotten in the face of human rights norms.In this regard, the authors of this article, through the analytical-descriptive method, achieved the important point that freedom of information is an absolute and unlimited right and should not be opposed to human rights norms like other human rights.…”
Get full text
Article -
6320
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article