Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6501
Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology
Published 2022-01-01“…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
Get full text
Article -
6502
Design Research of ATV Axle Housing based on Blind Number Theory and FEA Method
Published 2015-01-01“…In order to solve the issues of all- terrain vehicle( ATV) axle housing design process appears poor design efficiency and timeliness security,a reliability calculation method of certain type of all- terrain vehicle integral type axle housing based on the finite element method combined with the blind number theory is presented,the all- terrain vehicle axle housing design methods in full of uneven road is obtained by taking the integral type axle housing under the condition of the loaded with uneven road,wheels withstand the maximum tangential force,wheels withstand the maximum lateral force,and the axle housing conditions of stress and deformation as restriction. …”
Get full text
Article -
6503
THE ETHICAL AND LEGAL ASPECTS OF HEALTH POLICY ON ELECTRONIC MEDICAL RECORDS IN INDONESIA
Published 2024-10-01“…The use of electronic medical records raises concerns about potential data leaks, necessitating the establishment of security measures and identification of responsible parties in case of breaches. …”
Get full text
Article -
6504
The Application and Analysis of Emotion Recognition Based on Modern Technology
Published 2025-01-01“…Despite the growing application of emotion recognition technology across various fields, including healthcare, traffic safety, and security, there remain significant challenges related to accuracy, robustness, and privacy. …”
Get full text
Article -
6505
De Pictures from a Life à Letters from a Life : exaltation de la vie de Benjamin Britten
Published 2003-01-01“…This study examines the image that Lotte Jacobi and Cecil Beaton try to give of Britten and Pears, the meanings that Mitchell seems to have invested the portraits with, how he uses them to recall Britten’s life and times, and finally how the portraits work toward an identification of Britten and Schubert, thus enabling Mitchell to secure Britten’s place among the greatest.…”
Get full text
Article -
6506
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
Get full text
Article -
6507
Armenia Towards a "New Economy": Defense Industry
Published 2021-04-01“…As a small country, Armenia needs an economy-army coalesced “intelligent” system that will respond adequately to any, even the slightest threat to the country's security. This approach requires the development of indigenous defense industry. …”
Get full text
Article -
6508
MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE
Published 2023-08-01“…The study recommends that there should be a conscious effort on the part of leaders of the nation to improve the socio-economic development of the country and more funding and training of the agencies/forces responsible for internal security. …”
Get full text
Article -
6509
Knowledge about Diabetes and Glycemic Control among Diabetic Patients in Saudi Arabia
Published 2020-01-01Get full text
Article -
6510
EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH
Published 2015-11-01“… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
Get full text
Article -
6511
Low Power Systolic Array Based Digital Filter for DSP Applications
Published 2015-01-01Get full text
Article -
6512
Key technology of power big data for global real-time analysis
Published 2016-04-01“…For power big data collected during smart grid construction process,based on the demand of power system global and real-time data analysis,ideas of solving power system security and reliability,real-time status monitoring,energy global dynamic balance scheduling and other key issues were explored. …”
Get full text
Article -
6513
The Dynamics of Iran-China “New” Strategic Cooperation
Published 2023-06-01“…Since Iran and China have common interests in political, economic, security, and military cooperation, it is predicted that the strategic and long-standing cooperation between Iran and China will be one of the most significant factors to change the balance of the Middle East and Central Asia both politically and economically. …”
Get full text
Article -
6514
Marketing strategies of economic entities (on the example of persons carrying out activities in the field of customs business)
Published 2022-11-01“…In addition, the results can be useful in the educational process, when teaching such disciplines as Marketing and Economic security of an enterprise participating in foreign economic activity. …”
Get full text
Article -
6515
Novel identity-based fully homomorphic encryption scheme from lattice
Published 2017-05-01“…The previous identity-based homomorphic encryption schemes from lattice was analyzed.That the high complexity in previous schemes was mainly caused by trapdoor generation and preimage sampling was pointed out.A new solution was proposed.A novel identity-based encryption scheme from lattice by combining new trapdoor function and dual-LWE algorithm organically was constructed,and it was transformed to an identity-based fully homomorphic encryption scheme from lattice by employing the idea of eigenvector.Comparative analysis shows that the scheme’s complexity of trapdoor generation has a significant reduction,the complexity of preimage sampling has a nearly three-fold reduction,and the SIVP approximation factor has a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msqrt> <mi>m</mi> </msqrt> </mrow></math></inline-formula> times reduction.The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.…”
Get full text
Article -
6516
Legal characteristics of volunteers engaged in organizing and hosting sports events
Published 2017-04-01“…It has been suggested to amend the sports legislation due to a large number of participants in volunteer movements and persons in contact with them, as well as the need to maintain public safety and security of volunteers, interest of volunteers themselves in legal regulation of movement across the border of another state, guarantees of accommodation and workwear, taking into account their work as volunteers in the future, preserving the legal traditions in regulation of volunteer relations.…”
Get full text
Article -
6517
Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation
Published 2023-11-01“…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
Get full text
Article -
6518
Justice climatique et démocratie environnementale - Les inégalités d’accès au droit des populations vulnérables aux risques littoraux – quelques éléments de comparaison
Published 2019-03-01“…A more thorough reflection will have to be carried out, in order to found climate change adaptation of the territories, on criteria of equity which make it possible to put firstly in security the most vulnerable people. …”
Get full text
Article -
6519
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
6520
Collision analysis of the GMR-2 cipher used in the satellite phone
Published 2018-02-01“…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
Get full text
Article