Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6901
THE «SPECIAL» RELATIONSHIP BETWEEN GERMANY AND CHINA IN THE CONTEXT OF GERMANY’S CHINA POLICY
Published 2016-04-01“…In recent years, there have been efforts to extend cooperation to other fields like security and world order. The author comes to the conclusion that both Germany and China increasingly consider a strategic partnership within mutual interest.…”
Get full text
Article -
6902
Subtractive pixel adjacency matrix based features for steganalysis of spatial color images
Published 2016-02-01“…Through analyzing the potential security problems of directly extending steganography based on the grayscale spatial image to the color spatial image, novel steganalysis features for detecting the steganographic methods with color spatial images as cover images were proposed. …”
Get full text
Article -
6903
Spectral Expansion Method for Cloud Reliability Analysis
Published 2019-01-01“…The efficiency of cloud service providers (CSP) could be improved by considering significant factors such as availability, reliability, usability, security, responsiveness, and elasticity. Assessment of these factors leads to efficiency in designing a scheduler for CSP. …”
Get full text
Article -
6904
Tower d’Alun Hoddinott, ou la tentative de créer un opéra populaire
Published 2004-05-01“…In spite of all its musical and dramatic qualities, there have been few performances of Tower and Opera Box has never succeeded in securing any staging of it in London.…”
Get full text
Article -
6905
Differences of type of foods consumed by households in urban and rural West Java, Indonesia
Published 2025-01-01“…Dietary diversity is a critical indicator of food and nutrition security, with a minimum consumption of four food groups shown to lower the risk of malnutrition and related health issues. …”
Get full text
Article -
6906
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks
Published 2015-07-01“…However, to apply this solution to a WSN, the users must carefully select 10 or more security parameters, which are used to determine the occurrences of FEIAs. …”
Get full text
Article -
6907
An active detection of compromised nodes based on en-route trap in wireless sensor network
Published 2021-08-01“…With the development and wide use of wireless sensor network, security arises as an essential issue since sensors with restrict resources are deployed in wild areas in an unattended manner. …”
Get full text
Article -
6908
Determinants of Modern Agricultural Technology Adoption for Teff Production: The Case of Minjar Shenkora Woreda, North Shewa Zone, Amhara Region, Ethiopia
Published 2022-01-01“…Since then, the implementation of modern agricultural technologies has remained a promising strategy in Ethiopia for increasing agricultural production, achieving food security, and reducing poverty. The objective of the study is to examine the determinants of modern agricultural technology adoption for teff production in Minjar Shenkora woreda. …”
Get full text
Article -
6909
The role of foreign direct investment by multinational corporations in Africa
Published 2024-02-01“…This article focuses on two multinational enterprises from Sweden and China that have been operating in South Sudan and Democratic Republic of Congo, respectively, to determine whether there is a link between their investment and the security crises in both countries. Findings shows that the corporations have been accused by both local and international rights groups of being extractive, involved in human rights violations, and building informal networks with local officials. …”
Get full text
Article -
6910
Shuffled differential privacy protection method for K-Modes clustering data collection and publication
Published 2024-01-01“…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
Get full text
Article -
6911
Opportunistic routing algorithm based on trust model for ad hoc network
Published 2013-09-01“…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
Get full text
Article -
6912
Distributed trust management scheme based on blockchain in Internet of vehicles
Published 2023-05-01“…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
Get full text
Article -
6913
Thomas Dallery, Le divorce rentabilité/croissance dans le capitalisme financiarisé. Changements de régimes, équilibres, instabilités et conflits
Published 2011-06-01“…The macroeconomic realisation of profits being determined by capitalists’ spendings, the slowdown of accumulation cannot come (theoretically) with a profitability recovery, others things being equal.After having recalled, in a first chapter, that financialisation is only the last avatar of a long trend for capitalism to escape from real economy, we show, in a second chapter, that financialisation leads, for the individual firm, to a reorientation towards shareholders’ profitability claims at the expense of managers and capital accumulation, financial (indebtedness) and real (capacity utilisation) security, and also of workers (real wage).After having faced, in a third chapter, two methodological, embarrassing questions for kaleckian models of growth and distribution (not very plausible and unstable for the most plausible ones), we use, in a fourth chapter, a second macroeconomic approach (stock-flow consistent model) where conflict impacts distribution (conflict inflation) and accumulation (growth/profit trade-off). …”
Get full text
Article -
6914
-
6915
L’environnement juridique de la lutte contre la pollution par les plastiques en Asie du Sud-Est (ASEAN)
Published 2024-12-01“…External aid is the key to securing funding, which is sorely lacking in most of these developing countries. …”
Get full text
Article -
6916
Research of power preprocessing optimization-based template attack on LED
Published 2014-03-01“…The security of LED,a lightweight block cipher proposed in CHES 2011,was evaluated by the template attack (TA).Several improvements of TA from the perspective of the preprocessing optimization was proposed.Firstly,the noise offset was calculated by using the phase-only correlation factor in the frequency view of the power trace to eliminate the data interference in the template building phase.Secondly,a novel character extracting method was proposed based on calculating the cross-cluster offset of different clusters classified by the plaintexts to cut the different leakage points from the power traces automatically.Thirdly,a dynamic effective power points choosing strategy was proposed by utilizing the mean value and the noises of the of power traces to evaluate the differences between different templates and improve the utilization of side channel information.Experiment results demonstrate that the proposed techniques of data alignment and automatically data cutting enlarge the differences of templates and reduce the number of the required power trace in both the template building and attacking phase.The proposed effective power points choosing strategy reduces the data complexity of the attack and only two power traces are required to launch the attack with the success rate of 100%.…”
Get full text
Article -
6917
Phytotoxicity of Natural Molecules Derived from Cereal Crops as a Means to Increase Yield Productivity
Published 2022-01-01“…Plants with allelopathy activities derived from secondary metabolites could be an alternative strategy and have an expected function in sustainable weed biocontrol and boost global agricultural production and food security. Thus, protecting biodiversity, ensuring food safety, improving food, and nutrient quality, as well as crop production, are urgently needed as population and consumption are increasing. …”
Get full text
Article -
6918
Société du risque, environnement et potentialisation des menaces : un défi pour les sciences sociales
Published 2019-12-01“…The lack of reflexivity, of innovation and explorative capacity, the emergency and emotion tyranny result in the amplification of threats and fears and the activation of security and identity discourses which, instead of mobilizing energies, paralyse them, amplifying the sideration. …”
Get full text
Article -
6919
The Potential of Lignocellulosic Biomass Hydrolysates for Microbial Oil Production Using Yeasts and Microalgae
Published 2024-01-01“…The use of food-based biomass and arable land for bio-oil and biofuel production could compromise global food security. Therefore, renewable and environmentally friendly oils for biofuels from oleaginous microorganisms such as yeasts and microalgae (heterotrophic and mixotrophic) are gaining interest within the scientific community. …”
Get full text
Article -
6920
Utilization of the Convolutional Neural Network Method for Detecting Banana Leaf Disease
Published 2024-12-01“…Banana leaf diseases such as Sigatoka, Cordana, and Pestalotiopsis pose a significant threat to banana productivity, with implications for food security and the global economy. Early detection of this disease is an important step to reduce its spread and maintain crop yield stability. …”
Get full text
Article