Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6561
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. …”
Get full text
Article -
6562
Challenges and Countermeasures of International Commercial Dispute Resolution in the Digital Age
Published 2024-12-01“…To address these challenges, it propose proposed to enhance technical capabilities, strengthen data security, develop online dispute resolution platforms, update procedures and physical rules, lower technical barriers and narrow the digital divide. …”
Get full text
Article -
6563
Research on architecture design and core strategy of intelligent recommendation system for electronic literature resources in colleges and universities
Published 2024-11-01“…On these problems, a university electronic literature resource intelligent recommendation system was designed, which includes a data collection layer, a data mining layer, a recommendation brain layer, an application service layer, an information standardization system, and a security and operation maintenance system. Finally, the core strategies and algorithms of the system were introduced. …”
Get full text
Article -
6564
An indoor positioning system based on distributed LTE network
Published 2018-06-01“…Indoor positioning technology has important applications in the business and security fields,but there are still existing problems with low positioning accuracy and high deployment costs.An indoor positioning system based on long term evolution ( LTE ) network was introduced.The system was defined on the Huawei distributed pico base station and was used to measure the reference signal strength (RSRP) or time of arrival (ToA) of mobile terminals to multiple access points.To overcome the uplink power control in LTE network,the absolute RSRP or ToA was converted to differential values.The system relied on widely deployed LTE networks to provide seamless location services to terminal devices in a wireless network connection state.It didn’t rely on third-party software or affect network performance.The experimental results show that the average positioning accuracy of Huawei indoor positioning system using time difference of arrival (TDoA) can reach 3~5 m in indoor scenarios such as shopping malls,showing good application potential.…”
Get full text
Article -
6565
Matrix computation over homomorphic plaintext-ciphertext and its application
Published 2024-02-01“…., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
Get full text
Article -
6566
The Neglected Traditional Enset (Ensete ventricosum) Crop Landraces for the Sustainable Livelihood of the Local People in Southern Ethiopia
Published 2022-01-01“…Enset (Ensete ventricosum, Musaceae) is a neglected traditional multipurpose crop plant critical for Ethiopian food security. It has drawn a lot of attention in the last few years. …”
Get full text
Article -
6567
New Concept and Practice of Urban Flood Control Design Based on Waterfront Space Design
Published 2020-01-01“…Through systematic summary and problem analysis of domestic and foreign urban flood control design,this paper believes that the urban flood control design should develop from traditional water conservancy engineering design to a new stage of building urban waterfront space that integrates urban planning,ecological environment,garden landscape and other disciplines,and puts forward a new concept of urban flood control design based on urban waterfront space design.Through key measures such as the transformation of the water system in the connected area,the construction of green flexible ecological embankments,and the design of waterfront spaces shared by people and water,the waterfront spaces with urban public service functions can be created,which can effectively reduce the blocking of the ecological corridor between the city and the water system,better achieve the comprehensive effects of water security and aquatic ecology,as well as effectively promote the harmonious coexistence of city &water and the high-quality and sustainable development of the city under the premise of ensuring the safety of flood (tide) control.…”
Get full text
Article -
6568
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix
Published 2024-01-01“…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
Get full text
Article -
6569
A Group Mining Method for Big Data on Distributed Vehicle Trajectories in WAN
Published 2015-08-01Get full text
Article -
6570
Prioritizinghydrological erosion-prone response units in Latyan catchment
Published 2015-12-01“…Soil erosion in watersheds, causing problems such as the loss of agricultural land productivity and reduce soil surface layer, endangering the life of reservoirs and water utilities, loss of soil fertility, increasing flood, threatening human food security, etc. The negative effects of soil erosion, watershed management operations to improve care. …”
Get full text
Article -
6571
Trajectory differential privacy protection mechanism based on prediction and sliding window
Published 2020-04-01“…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
Get full text
Article -
6572
Nearly Quadratic n-Derivations on Non-Archimedean Banach Algebras
Published 2012-01-01Get full text
Article -
6573
CEO political orientation and loan contract
Published 2025-01-01“…Given the common belief that certain personality traits—such as trustworthiness, reliability, loyalty, thriftiness, and stinginess—are more often linked to conservatives (Republicans) than to liberals (Democrats), we investigate whether companies with conservative chief executive officers (CEOs) secure more advantageous loan terms compared to others. …”
Get full text
Article -
6574
An investigation of the formulation and nutritional composition of modern meat analogue products
Published 2019-12-01“…Meat analogues, or plant-based products that simulate the properties of traditional meat products, have secured a position in the conversation of protein foods. …”
Get full text
Article -
6575
Advancement of Nanofibrous Mats and Common Useful Drug Delivery Applications
Published 2022-01-01Get full text
Article -
6576
THE POLITICS OF APPOINTING POLITICAL AND CARREER DIPLOMATS’ IN NIGERIA: Understanding the Nexus
Published 2023-12-01“…However, it requires legislative (Senate) confirmation and security clearance. The paper recommends that the Nigerian government need to review the application of federal character principle and quota system in the appointment of ambassadors. …”
Get full text
Article -
6577
Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
Published 2016-10-01“…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
Get full text
Article -
6578
PREDICTION AND DAMAGE ANALYSIS OF THE POSTBUCKLING FOR MULTI-SPAR COMPOSITE BOX
Published 2018-01-01“…as multi-spar composite box has been used for many airplanes,in order to assure structure security,it is necessary to study the mechanical properties of multi-spar composite box. …”
Get full text
Article -
6579
Mapeamento da violência motivada por discriminação à identidade de gênero e sexualidade no município de São Paulo: uma metodologia cartográfica na investigação de geografias invisí...
Published 2022-01-01“…The data were collected at the database of the Secretariat of Public Security of the State of São Paulo. We used Analytical and Transformational Cartography (Cauvin; Escobar; Serradj, 2008) to construct anamorphic cartograms in order to visualize the spatial weight of the recorded violence. …”
Get full text
Article -
6580
REGIONS OF RUSSIA IN THE CORONAVIRUS PANDEMIC
Published 2020-12-01“…At the present stage of development, taking into account the changed economic situation in the world, the issues of economic security of the regions are of particular importance. …”
Get full text
Article