Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6721
Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries
Published 2016-07-01“…In the proposal, the candidate dummies were first generated by the existing dummy-based schemes, and could be filtered through the check of continuous reasonability and single privacy enhancement. Security analysis shows that, in the proposed method, the formed movement paths are indistinguishable in time and space, so that protecting the user's location privacy effectively in continuous queries. …”
Get full text
Article -
6722
A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks
Published 2012-01-01“…Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in wireless systems. …”
Get full text
Article -
6723
Chaotic Image Encryption Based on Running-Key Related to Plaintext
Published 2014-01-01“…In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. …”
Get full text
Article -
6724
Bright and stable anti-counterfeiting devices with independent stochastic processes covering multiple length scales
Published 2025-01-01“…With the assistance of a deep-learning model, the resulting PUFs show both near-ideal performance and accessibility for general end users, offering a strategy for next-generation security devices.…”
Get full text
Article -
6725
A hybrid trust model based on communication and social trust for vehicular social networks
Published 2022-05-01“…Therefore, human factors should be considered in securing the communication in vehicular social networks. …”
Get full text
Article -
6726
Energy Transition – China-Brazil Partnership to Provide Nature-Based Solutions
Published 2024-12-01“…Intact ecosystems store carbon dioxide, secure food and water supplies and protect against natural disasters. …”
Get full text
Article -
6727
Digital Image Forensic Approach to Counter the JPEG Anti-Forensic Attacks
Published 2021-01-01“…It becomes a hot issue about the security and threat to society with increasing growth of social media. …”
Get full text
Article -
6728
THE IMPACT OF DEMOGRAPHIC CHANGES ON THE PENSION SYSTEM FINANCING SUSTAINABILITY IN THE FEDERATION OF BOSNIA AND HERZEGOVINA
Published 2014-05-01“…According to long-term projections of the reformed pension system of the FBiH, the greater stability of initial and average pensions, as well as stable social security of pensioners, will result in a relatively stable share of pension expenditures in GDP, of about 10%. …”
Get full text
Article -
6729
Impact of Built Environment on the Process of Psychological Treatment of Children and Youth
Published 2024-12-01“…At the same time, programmes are being introduced to secure infrastructure and adequate therapeutic space by expanding or creating new, architecturally friendly centres. …”
Get full text
Article -
6730
Mobilités sociales et spatiales d’Africain·es-Américain·es vers la banlieue de « l’entre-deux » dans la deuxième moitié du 20ème siècle : le cas d’Euclid, Ohio
Published 2022-12-01“…It will attempt to demonstrate more precisely the extent to which, before becoming powerful barometers of the state of racial relations in the twenty-first century United States, these suburban spaces carried at first many of the dreams and ambitions of an intermediary segment of the African American population claiming its share of material comfort and security in the post-Civil Rights era.…”
Get full text
Article -
6731
Design of An Agricultural Extension Schedule Management System
Published 2023-11-01“…With such great potential, the Pasuruan Regency Food and Agriculture Security Service has problems in the availability of human resources in quantity, especially agricultural instructors. …”
Get full text
Article -
6732
Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression
Published 2014-01-01“…Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. …”
Get full text
Article -
6733
Compressed Sensing-Based Order Analysis for Blade Tip Timing Signals Measured at Varying Rotational Speed
Published 2020-01-01“…Monitoring the vibrations of high-speed rotating blades is significant to the security of turbomachineries. Blade tip timing (BTT) is considered as a promising technique for detecting blade vibrations without contact online. …”
Get full text
Article -
6734
A Method of Selecting Automated Driving Service Sections Considering Spatial Influence Factors
Published 2025-01-01“…To apply and expand automated driving services, it is most urgent to secure the safety of automated driving technology, and it is necessary to prepare for efficient procedures and methods suitable for automated driving services. …”
Get full text
Article -
6735
Current management of the stability of organizations of the investment and construction complex in crisis situations
Published 2021-07-01“…Early diagnosis of crisis phenomena in the economy proves that a sufficiently high level of socio-economic development does not yet ensure complete economic security and the ability to withstand the threats posed by the unbalanced structure of the economy. …”
Get full text
Article -
6736
Study of living standards in Sahebgharaniyeh neighborhood of Tehran
Published 2022-03-01“…But with 95 percent confidence, Sahebgharriyeh neighborhood can be considered as individual and social security indexes, identity and sense of place belonging, facilities and services needed, and the status of the visual landscape and the environmental pollution of the habitat.…”
Get full text
Article -
6737
„Nie wierzę w bajki!”: Henrietta Regina Davidson Avram (1919–2006)
Published 2023-12-01“…Droga zawodowa Avram wpisuje się w triadę stworzoną przez Vannevara Busha: wojsko (National Security Agency) – świat akademicki (Biblioteka Kongresu) – firmy prywatne (Datatrol). …”
Get full text
Article -
6738
Impact of Transport Cost and Travel Time on Trade under China-Pakistan Economic Corridor (CPEC)
Published 2019-01-01“…China needs a small, secure, and low-cost path to trade with Europe and the Middle East and China-Pakistan Economic Corridor (CPEC) is a feasible solution to this requirement. …”
Get full text
Article -
6739
Presenting an Optimal Algorithm for Resource Scheduling and Code Partition in Mobile Cloud Computing
Published 2022-03-01“…Through virtualization technology, current cloud data centers are becoming more flexible and secure, and are allocated on demand. A key technology playing an important role in cloud data centers is the resource scheduling program. …”
Get full text
Article -
6740
The first geospatial dataset of irrigated fields (2020–2024) in Vojvodina (Serbia)
Published 2025-01-01“…Abstract Irrigation is a cornerstone of global food security, enabling sustainable agricultural production and helping to ensure that food is available for people around the world, now and in the future. …”
Get full text
Article