Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6441
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…Both methods look different; however, they have similar security goals and they both feature distribution transforming encoders based on statistical schemes. …”
Get full text
Article -
6442
THE PROBLEM OF COMPLIANCE OF ARTIFICIAL INTELLIGENCE WITH SUBSTANTIAL VALUES OF HUMAN
Published 2024-06-01“…Only one substantial value (security) experiences real threats, but its significance for a person only increases as a result. …”
Get full text
Article -
6443
L’exil chilien en France du coup d’état à l’acceptation de l’exil : entre violences et migrations
Published 2011-07-01“…The violence of the Pronunciamento and the implementation of the tenets of the national security doctrine, supplemented by an ad hoc legislation, caused an enormous political, then economic migration, quite extraordinary for a Latin American country. …”
Get full text
Article -
6444
Transformer Inrush Current and Internal Fault Discrimination Using Multitypes of Convolutional Neural Network Techniques
Published 2024-01-01“…To maintain the security of transformer differential protection, it is essential to restrain its response to oversetting differential current caused by the inrush current or other switching conditions. …”
Get full text
Article -
6445
Improving the Complexity of the Lorenz Dynamics
Published 2017-01-01“…The new system is especially designed to improve the complexity of Lorenz dynamics, which, despite being a paradigm to understand the chaotic dissipative flows, is a very simple example and shows great vulnerability when used in secure communications. Here, we demonstrate the vulnerability of the Lorenz system in a general way. …”
Get full text
Article -
6446
Pomodori e pesticidi. (In)giustizia alimentare, sanitaria e ambientale nelle Regioni ultraperiferiche: il caso di Mayotte
Published 2024-06-01“…Through this paper we intend to offer a contribution to the debate on food and environmental security and sustainability in the European Outermost regions, so as to illustrate the not-so-apparent linkages between departmentalisation, socio-economic inequalities and food and environmental insecurity. …”
Get full text
Article -
6447
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01Get full text
Article -
6448
A Particle Swarm Optimization Algorithm for Deployment of Sensor Nodes in WSN Network
Published 2022-01-01“…In order to solve the problems of security hidden dangers in the process of node location due to the characteristics of limited resources, open deployment, and being unattended in wireless sensor networks, this paper proposes a mainstream location algorithm combined with the current WSN node. …”
Get full text
Article -
6449
Class Precarity and Solidarity in Education
Published 2018-12-01“…These infrastructures provide important underpinnings of a universal basic security to be delivered through a social and solidarity economy. …”
Get full text
Article -
6450
Elliptic curve ElGamal encryption based location privacy-preserving scheme
Published 2020-06-01“…An elliptic curve ElGamal encryption based location privacy-preserving scheme was proposed to address the location privacy problem of secondary users in collaborative spectrum sensing.Firstly,secondary users encrypted the original sensing reports using the ElGamal public key techniques on the elliptic curve and sent them to the trusted property authority.Secondly,the trusted property authority partially decrypted and randomized sensing reports and then sent the randomized sensing reports to the fusion center.Thirdly,the fusion center finally decrypted and got the original sensing reports.Finally,security of the scheme was analyzed.According to the scheme,the encryption method of sensing reports was based on public key cryptography on elliptic curve.And the trusted property authority randomized encrypted sensing reports.Thus the location privacy of secondary users can be protected.Meanwhile,this scheme effectively reduces communication and storage cost,compared with other schemes.In addition,this scheme also has fault tolerant and dynamic mechanism,which increases the practicability and feasibility.…”
Get full text
Article -
6451
The Floor is not the Ground
Published 2018-11-01“…Despite the categorical difference between transportation and logistics, narratives of quality, security and standards accompanied by specific spatial patterns, have infiltrated our everyday mobility infrastructures. …”
Get full text
Article -
6452
Developments in Border and Migration Management in the South East European Region
Published 2024-12-01“…This extra pressure led to difficulties in terms of effectively manage the borders and address arising border security issues. The study aims to realize an inventory of the measures, proposals and activities which had an impact on transnational institution building which focuses on migration and border management. …”
Get full text
Article -
6453
Public Value of Using Light Rail Transit Transportation at Palembang
Published 2024-11-01“…Additionally, the LRT meets public expectations by offering a suitable route network, planning fleet capacity effectively, establishing consistent departure times, and ensuring high security across its operations. In conclusion, the Palembang LRT system enhances travel comfort with regular scheduling and adequate facilities, highlighting its potential as a key component of Palembang's sustainable urban transportation infrastructure with continued development.…”
Get full text
Article -
6454
Face Recognition using Deep Learning and TensorFlow framework
Published 2023-12-01“… Detecting human faces and recognizing faces and facial expressions have always been an area of interest for different applications such as games, utilities and even security. With the advancement of machine learning, the techniques of detection and recognition have become more accurate and precise than ever before. …”
Get full text
Article -
6455
-
6456
Intentional Islanding of Active Distribution Networks by GenSets: An Analysis of Technical Constraints and Opportunities
Published 2023-01-01“…The willingness to improve the security and reliability of power supply to end-users, often pushed by prescriptions of national regulatory authorities, is bringing considerable challenges for distribution system operators. …”
Get full text
Article -
6457
Analysis of Laboratory Videos of Science Teacher Candidates with Many-Facet Rasch Measurement Model
Published 2019-07-01“…The simplest articles which science teacher candidates were subjected are “introducing yourself”, “using proper costume”, “appropriate time” and the articles for which the science teacher candidates are constrained mostly “sound-supporting effect”, “writing effect”, “warning for security precautions”.Jury numbered 3 or coded as J3 is “the most lenient” and scorer numbered 2 is “the severest” when juries are sequenced from the most lenient. …”
Get full text
Article -
6458
Analisis faktor produksi terhadap kepuasan petani dalam mendorong ketahanan pangan di Sulawesi Selatan
Published 2024-07-01“…The aim of this study is to determine whether farmers' satisfaction with the use of production factors contributes to the success of the Food Security System (SKP) and to identify which production factors most significantly influence farmers' satisfaction in supporting SKP. …”
Get full text
Article -
6459
Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
Published 2022-01-01“…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
Get full text
Article -
6460
La propagande arabe anglaise vers le Maghreb pendant la Seconde Guerre mondiale (1939-1943)
Published 2006-09-01“…During the North Africa campaign (Torch), the Royal Air Force dropped leaflets in Arabic, trying to explain their war aims and to secure the support of the population. This article examines the developing of British Arabic propaganda and seeks to measure its degree of success or failure in the face of other subversive propaganda particularly from Germany and Italy and especially its impacts on the North African populations from 1939 till May 1943.…”
Get full text
Article