Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6921
Chemical Composition and Nutritional Value of Three Sonchus Species
Published 2022-01-01“…The availabilities of these vegetables together with their high nutritional value are important factors that contribute to ensuring food security for families that have these species in their diet.…”
Get full text
Article -
6922
Government Efforts to Protect Habitat for the Florida Panther on Private Lands
Published 2016-10-01“…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
Get full text
Article -
6923
Study on the evolving role of the People’s Republic of China in resolving the conflict in the Islamic Republic of Afghanistan
Published 2022-01-01“…The People’s Republic of China’s strategy in the region has been defined and attention has been paid to security issues.Beijing’s envisaged steps to promote its projects in the region have been presented.…”
Get full text
Article -
6924
The Actual Problems of Modern Spain
Published 2014-12-01“…Spain increases its role in world politics and obtains a non-permanent UN's Security Council seat for the 2015-2016 term.…”
Get full text
Article -
6925
The Critical Success Factors for Sustainability Financial Technology in Vietnam: A Partial Least Squares Approach
Published 2022-01-01“…The research concluded the presented seven CSFs with the following customer centricity, low profit margin, agility, scalability, security management, innovation, and compliance easy. …”
Get full text
Article -
6926
The Establishment of Ramadan Principality
Published 2013-12-01“…They showed maximum effort during the campaigns by Mamluks onto the Armenians living in Cukurova, and after the collapse of this state, they secure their position in that region as being subject to Mamluks. …”
Get full text
Article -
6927
-
6928
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01“…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
Get full text
Article -
6929
Differential privacy budget optimization based on deep learning in IoT
Published 2022-06-01“…In order to effectively process the massive data brought by the large-scale application of the internet of things (IoT), deep learning is widely used in IoT environment.However, in the training process of deep learning, there are security threats such as reasoning attacks and model reverse attacks, which can lead to the leakage of the original data input to the model.Applying differential privacy to protect the training process parameters of the deep model is an effective way to solve this problem.A differential privacy budget optimization method was proposed based on deep learning in IoT, which adaptively allocates different budgets according to the iterative change of parameters.In order to avoid the excessive noise, a regularization term was introduced to constrain the disturbance term.Preventing the neural network from over fitting also helps to learn the salient features of the model.Experiments show that this method can effectively enhance the generalization ability of the model.As the number of iterations increases, the accuracy of the model trained after adding noise is almost the same as that obtained by training using the original data, which not only achieves privacy protection, but also guarantees the availability, which means balance the privacy and availability.…”
Get full text
Article -
6930
Numerical Study on the Characteristics of Hydrogen Leakage, Diffusion and Ventilation in Ships
Published 2025-01-01Get full text
Article -
6931
Mental health in Germany before, during and after the COVID-19 pandemic.
Published 2025-01-01“…Based on nationally representative panel data (N person-years = 40,020; N persons = 18,704; Panel Labour Market and Social Security; PASS) from 2018 to 2022, we investigate how mental health changed during and after the COVID-19 pandemic. …”
Get full text
Article -
6932
Multi-ray channel modeling for programmable wireless environments in the terahertz band
Published 2019-07-01“…Terahertz communication system based on programmable wireless environment allowed programming customization of electromagnetic wave propagation in the most suitable ways for different wireless devices.It could not only improve serious fading,interference and non-line-of-sight problems,but also significantly enhance the security and privacy of the system.The channel modeling of terahertz wireless communication in programmable wireless environment was focused.Firstly,a multi-ray channel model for terahertz-band programmable wireless environment was established based on ray tracing technology as well as the propagation model of line-of-sight and non-line-of-sight.Then,based on the established propagation model,reflection coefficient,the broadband channel capacity under the water-filling power allocation algorithm and the RMS delayed extension were further studied.The simulation and analysis results show that the programmable wireless environment greatly reduces the influence of path loss and multipath fading in terahertz wireless transmission through active interference in electromagnetic wave transmission,improves the transmission capacity of terahertz communication system,which provides a reference for the later design of terahertz communication system,especially indoor terahertz communication system.…”
Get full text
Article -
6933
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01“…With the technology of secret sharing and encryption, the email address of the whistleblower was hidden, so that the receiving organization could reply without learning the whistleblower’s identity. The security analysis showed that the proposed scheme enabled the anonymity of both data receivers and whistleblowers at the same time. …”
Get full text
Article -
6934
A synchronous compression and encryption method for massive electricity consumption data privacy preserving
Published 2025-01-01“…The demand for fine-grained perception of electricity usage information in the new power system is continuously increasing, making it a challenge to address potential unauthorized data access while ensuring channel security. This paper addresses privacy in power systems requiring efficient source-load interactions by introducing a novel data compression synchronous encryption algorithm within a compressed sensing framework. …”
Get full text
Article -
6935
BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE
Published 2013-05-01“…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
Get full text
Article -
6936
Ensuring the resilience of health systems in the face of the effects of climate change
Published 2025-01-01“…Becoming resilient: heath infrastructures are impacted by the effects of climate change, such as the need to cool premises during heatwaves, disruptions to energy supplies, and securing logistics chains.2. Preparing for the exacerbation of chronic diseases that will lead to an overload of the health system.3. …”
Get full text
Article -
6937
Perfect secrecy cryptosystem with nonuniform distribution of keys
Published 2018-11-01“…More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its applications.How to design a basic cryptosystem by using a group of orthogonal Latin squares was first studied and an example to illustrate how to design nonlinear encryption transformations for a basic cryptosystem was given.Then,how to design the sequence of keys by using random method with nonuniform distribution was discussed,and it was strictly proven in theory that the infinite random “one-time pad” cryptosystem based on the designed basic cryptosystem was of perfect secrecy.Since the obtained result generalizes the existing one for random “one-time pad” cryptosystem to be perfect by using a basic cryptosystem with modulo addition,it may be used as a wider ideal simulated prototype to design stream cipher algorithms.Since the number of basic cryptosystems that can be designed is much more than one of the common basic cryptosystems with modulo addition,the obtained result is effective supplement and perfection to mainstream design method for the current stream cryptosystems.…”
Get full text
Article -
6938
Changing relationships between armaments production and exports and state defense expenditures
Published 2024-10-01“…The key countries analysis showed that the dynamics of indicators in them is determined by different reasons, but the author came to the conclusion that the main factors of changes in the trends of armaments production and exports and defense expenditures are the following: the expansion of illegal circulation of armaments and military equipment in some countries, increased vulnerability of some countries and their direct involvement in military-political conflicts, as well as differentiation of countries’ approaches to national security, which causes different attention to defense capabilities and the defense industry development. …”
Get full text
Article -
6939
A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application
Published 2022-01-01“…Finally, chaos-based encoding/decoding algorithms for secure data transmission are developed by designing a state chain diagram, which indicates the applicability of the new chaotic system.…”
Get full text
Article -
6940
Human Resource Information System with Machine Learning Integration
Published 2022-06-01“…Based on the thorough evaluation of the experts and respondents, it was found that the human resource information system is highly usable, secured, efficient, and provides a fast and easy way to manage employees' records and predict employees over using a supervised machine learning that uses the linear regression method. …”
Get full text
Article