Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6621
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge
Published 2013-04-01“…Providing source privacy is a critical security service for sensor networks. However, privacy preserving in sensor networks is a challenging task, particularly due to the limited resources of sensor nodes and the threat of node capture attack. …”
Get full text
Article -
6622
Dynamics of variability in agronomic characters of millet cv. ‘Gorlinka’ under the climate conditions of the southern part of the East European Plain
Published 2024-01-01“…The effect of high temperature and drought is expected to lead to undesirable consequences for the economy, a decrease in yields, and a threat to food security. This aspect requires an assessment of the ongoing climate changes and identification of the causes that induce the response of plants to them.Materials and methods. …”
Get full text
Article -
6623
Eight caring technology principles: development and implementation of a framework for responsible health technology innovation
Published 2024-12-01“…The framework enables responsible health technology innovation by focusing on the needs of users and society, data security, equity, participatory governance, and quality control. …”
Get full text
Article -
6624
RAMS Analysis of Train Air Braking System Based on GO-Bayes Method and Big Data Platform
Published 2018-01-01“…The RAMS (reliability, availability, maintainability, and security) of the air braking system is an important indicator to measure the safety performance of the system; it can reduce the life cycle cost (LCC) of the rail transit system. …”
Get full text
Article -
6625
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…The proposed method is simple and speedy in terms of computations, meanwhile it affirms higher security and sensitivity. In contrast to GF, PA-loop are non-isomorphic and have several Cayley table representations. …”
Get full text
Article -
6626
DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK
Published 2020-09-01“…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. …”
Get full text
Article -
6627
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01“…Evaluated using the comprehensive CICIDS2017 dataset and compared with conventional centralized detection methods, FL-DAD achieves superior performance, illustrating the potential of federated learning to enhance intrusion detection systems in large-scale IoT networks by balancing data security with analytical effectiveness.…”
Get full text
Article -
6628
Manipulating energy migration in nanoparticles toward tunable photochromic upconversion
Published 2024-12-01“…These findings offer a deep insight into the understanding of upconversion dynamics and provide a versatile approach to manipulating the energy flux in nanostructures with tunable emission colors, showing great promise in applications of logic operation and information security.…”
Get full text
Article -
6629
Adoption Spells of Improved Potato Varieties by Smallholder Farmers in Eastern Ethiopia: The Duration Approach
Published 2019-06-01“…Potato is mainly tagged as a food security crop in Ethiopia. However, its productivity remains low due to low adoption of improved technologies by smallholder farmers. …”
Get full text
Article -
6630
Dynamic Stochastic Optimization of Emergent Blood Collection and Distribution from Supply Chain Perspective
Published 2021-01-01“…In response to emergencies, it is critical to investigate how to deliver emergency supplies efficiently and securely to disaster-affected areas and people. There is no doubt that blood is deemed one of the vital relief supplies, and ensuring smooth blood delivery may substantially alleviate subsequent impacts caused by the disaster. …”
Get full text
Article -
6631
ECONOMIC ANALYSIS OF SOIL-BASED AND SOILLESS FARMING SYSTEMS: A CASE STUDY FROM DA LAT CITY
Published 2020-12-01“…Nowadays, to secure production in the case of restricted natural resources requires innovative farming approaches to achieve a balance between agriculture and environmental protection. …”
Get full text
Article -
6632
Nanoformulation: An efficient approach to natural insect repellent formulations
Published 2024-08-01“…Currently, there is a remarkable interest in the development of eco-friendly, secure, and effective pesticides using intelligent, responsive, biodegradable, and biocompatible materials. …”
Get full text
Article -
6633
100 essential questions for the future of agriculture
Published 2023-03-01“…We focus on 10 primary themes: transforming agri‐food systems, enhancing resilience of agriculture to climate change, mitigating climate change through agriculture, exploring resources and technologies for breeding, advancing cultivation methods, sustaining healthy agroecosystems, enabling smart and controlled‐environment agriculture for food security, promoting health and nutrition‐driven agriculture, exploring economic opportunities and addressing social challenges, and integrating one health and modern agriculture. …”
Get full text
Article -
6634
Artificial Intelligence in Energy Economics Research: A Bibliometric Review
Published 2025-01-01“…Potential future research directions include energy supply-chain resilience and security, social acceptance and public participation, economic inequality and the technology gap, automated methods for energy policy assessment, the circular economy, and the digital economy. …”
Get full text
Article -
6635
A Novel Memductor-Based Chaotic System and Its Applications in Circuit Design and Experimental Validation
Published 2019-01-01“…Further to these, a memductor-based chaotic circuit is designed, realized, and applied to construct a new memductor-based secure communication circuit by employing the basic electronic components and memristor. …”
Get full text
Article -
6636
Protecting civilians in a data-driven and digitalized battlespace: toward a baseline humanitarian technology infrastructure
Published 2025-01-01“…However, the lack of international consensus on the use of data, the public and private nature of the actors involved in conflict, the transnational aspects of the widened battlefield, and the heightened security risks in the conflict space pose enormous challenges for the protection of civilians agenda. …”
Get full text
Article -
6637
The Role of Organic Extracts and Inorganic Compounds as Alleviators of Drought Stress in Plants
Published 2025-01-01“…Climate changes have exacerbated the progression of drought conditions on a global scalethreating to crop production and heightening concerns over food security. Water scarcity enforces alterations in fundamental morphology, physiology and biochemical traits in crops. …”
Get full text
Article -
6638
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks
Published 2025-01-01“…Utilizing a constant time headway spacing policy with gap adjustments, we derive control gains that secure internal platoon stability. A Lyapunov-based stability approach is employed to mitigate the destabilizing effects of Byzantine attacks, ensuring robust performance even in adverse conditions. …”
Get full text
Article -
6639
Image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform
Published 2017-09-01“…The image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform was proposed.Firstly,the initial plaintext was equally segmented to get left and right sub-blocks.Then the Radon transform was used to obtain the radon projection spectrum image by processing the left and right blocks at 0~180 degrees.And Radon projection spectrum image of left block was permutated by Arnold map,while the Radon projection spectrum image of right block was permutated based on gravity model to get two su-scrambling ciphers,then the entire scrambled image is formed by combining them.To diffuse pixels from multiple directions in space,four direction continuous folding mechanism was designed to change the pixel values by using the diffusion function corresponding to four different directions for realizing image encryption.The experimental results show that this algorithm has higher security and attack resistance with more uniform of pixel distribution in output cipher compared with the current image encryption technology.…”
Get full text
Article -
6640
Risk Assessment Method for Offshore Structure Based on Global Sensitivity Analysis
Published 2012-01-01“…The calculation result sufficiently demonstrates the new risk assessment method’s rationality and security.…”
Get full text
Article