Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6541
A Comprehensive Review: Interaction of Appearance and Behavior, Artificial Skin, and Humanoid Robot
Published 2023-01-01“…Recent research on humanoid robots is designed to appear to be copies of the anthropometric indicators of real people, which may affect the security of other people’s identities. Besides, these robots cause a feeling of horror in the user if their appearance is in the position of the uncanny valley. …”
Get full text
Article -
6542
Organizing Coastal Land Use for Urban Tourism Development (Case Study: Sorkhrood)
Published 2020-06-01“…The results of this research show that from the perspective of half of the officials and government experts, the expansion of tourism industry, on one hand, causes the region's economic prosperity and, on the other hand, reduces regional security and causes pollution of the environment.…”
Get full text
Article -
6543
Node clustered deployment of emergency Internet of things based on UAV with equipment access restriction
Published 2021-09-01“…Lack of ground base station in emergency Internet of things for public security application scenarios, the unmanned aerial vehicle (UAV) as the air-based base station was adopted to solve the problem of node cluster deployment under the condition of limited access of emergency Internet of things ground terminal equipment.A clustering deployment method based on on-demand K-means (ODKM) was proposed.Firstly, base station selection and equipment clustering were carried out according to the equipment access ability of different UAV air-based base stations through two clustering steps.Secondly, by solving a relaxed non convex nonlinear optimization model, the UAV air-based base station deployment based on energy efficiency optimization was realized.The experimental results show that the proposed method can meet the constraints of UAV base station access ability, and has a good performance in balancing the transmission energy consumption of each cluster, and realizes the goal of communication energy saving when the ground terminal equipment needs to access.…”
Get full text
Article -
6544
Genius Logi: Towards the Phenomenology of Gated Community
Published 2022-11-01“…Gated communities have emerged in the world for reasons such as increased fear of crime, security, prestige, desire to be different. In Turkey gated communities have emerged because of neoliberal policies that promotes high-income segment seeking prestige. …”
Get full text
Article -
6545
« You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins
Published 2008-12-01“…From mere domestic secrets to anxieties related to national security, Collins describes a modern world ruled by suspicions, and constructs his characters as paranoid patients.…”
Get full text
Article -
6546
A survey on Wi-Fi signal based identification technology
Published 2021-12-01“…With the constant progress of the information technology, the research on identification is developing towards unawareness and automation, and applied widely in many fields, such as human-computer interaction, smart home and intelligent security.As a non-contact wireless sensing technology, Wi-Fi signal based identification is progressively evolving towards the directions of multi-attribute identification and legality verification.Firstly, the principle of wireless signal-based identification was introduced, and reviews pretreatment processes from the viewpoint of signal processing were reviewed.Then, identification implementation was discussed from two different bases of walking and daily activities.Two major development trends of identification which were multi-attribute identification and legality verification were discussed from function evolution’s views.Finally, the multiple research areas were indicated including hyper-level feature extraction, daily activities’ analysis, identification model construction, and multi-technology fusion as future directions of realizing more robust, diversify and universal identification, which would provide the important support for the research and development of Internet of things perception layer.…”
Get full text
Article -
6547
The effect of using Naive Bayes to detect spam email
Published 2025-01-01“…This high level of accuracy underscores the effectiveness of the Bayesian approach in identifying and filtering out spam, thereby enhancing the overall efficiency and security of email communication.…”
Get full text
Article -
6548
Motivators for using on-demand vehicle sharing services in Brazil
Published 2021-01-01“…The five major regions of Brazil were considered in this research, totaling 2150 interviews, indicating the existence of fourteen motivators for use involving the economic, social, environmental, and technological dimensions, however, only six variables comprise the structuring nucleus of demand and are based on an element of economic order (Reduced Tariff), one of a socioeconomic nature (Expectation of Benefits) and four technological drivers (Technological Availability, Convenience of Time and Boarding in addition to Data Security), which figure as utilitarian indicators, corroborating the results of international studies and contrasting those that signal hedonistic elements as relevant. …”
Get full text
Article -
6549
Polityka socjalna i sytuacja ludzi w podeszłym wieku
Published 2006-12-01“…Some attention is paid to the problem of aging and social duty of securing old people a decent existence. It requires a change of consciousness regarding old people as well as their own consciousness. …”
Get full text
Article -
6550
İnönü Muharebelerinin İç Kamuoyuna Yansımaları
Published 2021-12-01“…In this battle, as a result of the stubborn struggle put forward by the regular army units, the Greek Army had to withdraw, the Circassian Ethem rebellion, which ached Ankara's head with this morale and motivation, was suppressed, the TBMM government strengthened its power and secured its future. The Greeks, who could not get the result they hoped for in the First Battle of İnönü, attempted a major attack for the second time in order to impose the Treaty of Sevres, which they could not have accepted at the London Conference on March 23, 1921, by force of arms, but II. …”
Get full text
Article -
6551
Design and implementation of spam filtering system based on topic model
Published 2017-11-01“…Spam filtering technology plays a key role in many areas including information security,transmission efficiency,and automatic information classification.However,the emergence of spam affects the user's sense of experience,and can cause unnecessary economic and time loss.The deficiency of spam filtering technology was researched,and a method of spam classification based on naive Bayesian was put forward based on multiple keywords.In the subject of mail,the theme model was used by LDA to get the related subject and keyword of the message,and Word2Vec was further used to search keyword synonyms and related words,extending the keyword collection.In the classification of mails,the transcendental probability of the words in the training dataset was obtained by statistical learning.Based on the extended keyword collection and its probability,the joint probability of a subject and a message was deduced by the Bayesian formula as a basis for the spam judgment.At the same time,the spam filtering system based on topic model was simple and easy to apply.By comparing experiments with other typical spam filtering method,it is proved that the method of spam classification based on theme model and the improved method based on Word2Vec can effectively improve the accuracy of spam filtering.…”
Get full text
Article -
6552
Constitution is not identity: On equivalence relations in translation of performance and translation for performance
Published 2025-01-01“… In the race to secure the sub-rights to Amanda Gorman’s ground-breaking performance at the 2021 United States presidential inauguration, a high-profile case emerged in which the translator appointed by Dutch publisher Meulenhoff returned the commission, following criticism of the appointment. …”
Get full text
Article -
6553
A Non-interactive Key Exchange Scheme for Space-IntegratedGround Information Network Based on Blockchain
Published 2021-09-01“…For scenarios such as space-integrated-ground information network where satellite resources are limited and communication delays are large, in response to the requirements of non-interactive key exchange in the satellite communication network, a non-interactive key exchange scheme for space-integrated-ground information network based on blockchain and Diffi e-Hellman key exchange protocol was proposed.The scheme arranged the blockchain in space-integrated-ground information network to form TDYTH blockchain.After the satellite node was registered, its related information was stored in TDYTH blockchain.When the satellite node needed to communicated with the long-distance node such as NCC, the two parties could query the immutable information stored in TDYTH blockchain to generated the shared session key, established consensus, and then completed access authentication and key distribution under non-interactive conditions.The result of simulation demonstrated that the scheme we proposed could meet the requirements of non-interactive key distribution of satellites and other nodes, and could signifi cantly improved security and robustness.…”
Get full text
Article -
6554
Wireless resource allocation for distributed caching system:motivation, challenge and solution
Published 2017-03-01“…Firstly, the challenges and problems for wireless resource allocation in wireless distributed caching system were analyzed.Graph and matching theory based on methodologies were discussed to solve the resource management problems in terms of energy efficiency,spectral efficiency and secure transmission respectively.In addition,the feasibility of mining and using social information to improve the efficiency of wireless resources was discussed and analyzed, which provided a brief outlook on future interdisciplinary research between social science and wireless network.…”
Get full text
Article -
6555
A dual speech encryption algorithm based on improved Henon mapping and hyperchaotic
Published 2021-12-01“…Aiming at the problems of small key space, poor security, low encryption efficiency, and the inability to realize the trade-off between key complexity and encryption efficiency of existing speech chaotic encryption algorithms, a dual speech encryption algorithm based on improved Henon mapping and hyperchaotic was proposed.Firstly, the traditional Henon mapping was improved by extending the control parameter range and taking the nonlinear trigonometric function as the input parameter variable, which made the Henon mapping have larger chaotic space and higher chaotic complexity.Secondly, the improved Henon mapping was used to generate pseudorandom sequence, and the speech data was encrypted single time without repeated scrambling to obtain the first time encryption results of the speech data.Finally, Lorenz hyperchaotic system was adopted to encrypt the speech data after the first time encryption by Arnold secondary scrambling encryption and XOR diffusion encryption to obtaining the final ciphertext speech data.The experimental results show that, compared with the existing methods, the proposed algorithm have larger key space, higher encryption efficiency, and stronger robustness against various cryptographic attacks.…”
Get full text
Article -
6556
Throughput-Optimal Scheduling for Cooperative Communications in Wireless Ad Hoc Networks
Published 2013-09-01Get full text
Article -
6557
Research of Hamming weight-based algebraic side-channel attack on LED
Published 2013-07-01“…Abstract:The security of LED against the algebraic side-channel attack (ASCA)was evaluated, which is a lightweight block cipher proposed in CHES 2011.Firstly, the attack model of ASCA was analyzed, and then the design and algebraic representations of LED were described. …”
Get full text
Article -
6558
A New Approach to Assessing the Accuracy of Forecasting of Emergencies with Environmental Consequences Based on the Theory of Fuzzy Logic
Published 2024-12-01“…Prevention of the occurrence and development of emergencies of a natural and man-made nature is one of the basic fundamental foundations of ensuring the national security of any state. The most important mechanism for preventing emergencies is an effective system of monitoring and forecasting emergencies established at the state level. …”
Get full text
Article -
6559
Sustainable and developmental mechanisms of network organizations: Creating environment and time management by adult volunteer workers
Published 2024-02-01“…On the other hand, to preserve and utilize sustainable heritage railway, there are issues such as the financial burden on local governments and the securing of human resources. Therefore, it is necessary to construct a wide-area network organization that cooperates not only with local governments and residents, but also with volunteers who live other areas. …”
Get full text
Article -
6560
US Foreign Policy on Transitional Justice and Democratization in Tunisia: Pacted Transition or Democracy Reduction?
Published 2024-06-01“…This can indirectly explain the US emphasis on security sector assistance and the relative marginalization of transitional justice objectives mainly in terms of institutional vetting, lustration, and reform. …”
Get full text
Article