Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6941
Lifetime Optimization of an Indoor Surveillance Sensor Network Using Adaptive Energy-Efficient Transmission
Published 2015-02-01“…The energy consumption of transmitting images without transmission security mechanism reduces by 21%. And it saves 11.7% of energy that an image is transmitted with the lowest transmission power. …”
Get full text
Article -
6942
A measurement method of fifth-generation multiple-input multiple-output antenna based on microwave imaging
Published 2020-06-01Get full text
Article -
6943
The role of the Indonesian child protection commission in the Papua province conflict
Published 2024-12-01“…The findings starkly expose a pervasive lack of attention and security afforded to Papuan children by pertinent institutions, consequently exposing them to elevated social risks, such as alcoholism, promiscuity, and substance abuse. …”
Get full text
Article -
6944
A Simplified 3D Model for Tunnel Pile Interaction
Published 2024-12-01“…A detailed parametric survey that will be made to put in evidence influences it of the different parameters geometric and mechanical on the interaction between shallow tunnel and an existing piles and security objectives. And for understand furthermore the problem of interaction mechanism between micropiles and tunnel, principally when piles are positioned in close proximity to tunnels. …”
Get full text
Article -
6945
Using Virtual Reality in the Classroom: Reflections of STEM Teachers on the Use of Teaching and Learning Tools
Published 2020-04-01“…The potential problems of using VR were not asked the teachers; however, teachers mentioned that online safety and security, student access, and technology gaps were the problems they faced. …”
Get full text
Article -
6946
Cortisol in Oral and Maxillofacial Surgery: A Double-Edged Sword
Published 2021-01-01Get full text
Article -
6947
Establishment of Big Data Index System of Water Resources Scheduling in Pearl River Basin
Published 2020-01-01“…Therefore, it is urgent toconstruct a set of big data index system for water resources scheduling in Pearl River Basin.Under the guidance of binary water cycle theory, and based on analytic hierarchy process andinformation resource planning method, this paper determines the six goals, i.e. flood control,power generation, water supply, saltwater resistance, shipping and ecological security in PearlRiver Basin, and fuses the measured data such as hydrometeorology, stage-discharge, water qualityand water ecology during water resources scheduling in the Pearl River Basin under the conditionof the Internet of Things and auxiliary information such as humanity and economy, ecologicalenvironment, flood disaster and Internet, classifies all indexes of the pressure term, state termand response term, and establishes the big data index system of water resources scheduling inPearl River Basin based on “Pressure-State-Response (PSR)”model, which provides a decision basisfor water resources management and scheduling in Pearl River Basin.…”
Get full text
Article -
6948
Agricultura urbana em Portugal: práticas espontaneas e institucionalizadas
Published 2019-12-01“…Urban agriculture came to stand out in the world scenario in the last years of the twentieth century and beginning of the XXI, due to the greater concern of the population with food security and the aggravation of social, economic and environmental problems in the cities. …”
Get full text
Article -
6949
Government Efforts to Protect Habitat for the Florida Panther on Private Lands
Published 2016-10-01“…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
Get full text
Article -
6950
-
6951
Ukrayna Örneğinden Hareketle Nükleer Silahsızlanmanın Olası Sonuçlarına Dair Bir İnceleme
Published 2020-06-01“…By way of conclusion, it is argued in the context of the 2014 crisis that, denuclearization constitutes a potential national security risk for states (Ukraine) that face formidable nuclear-armed rivals (Russia).…”
Get full text
Article -
6952
Access Control for Autborized Video in Information-Centric Networking
Published 2014-09-01“…After the analysis, the access control scheme for authorized videos has a good performance in both security and network resource optimization.…”
Get full text
Article -
6953
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
6954
School of Energy Diplomacy
Published 2014-10-01“…Russia's cooperation with international community in finding ways of addressing global energy security, serves its national interests on international arena. …”
Get full text
Article -
6955
Distributed data storage and transmission for space Internet of things
Published 2018-12-01“…Based on the concepts and related techniques of Internet of things (IoT),tracking the development tendency of the satellite IoT and LEO constellation communication system abroad,and the deployment of the integrated satellite-terrestrial information network in China,the concept of space Internet of things (Space IoT) with its framework and main characteristics was proposed.Space IoT has the different concept compared to the traditional IoT,not just using the relay satellite to implement remote machine-to-machine communication.Space IoT is a ubiquitous IoT system under the integrated satellite-terrestrial information network architecture,and an expansion of the terrestrial IoT in the global three-dimensional world,and a service and application platform of multiple information technologies.With the recently era of big data,the space IoT has to face some data storage and transmission problems,such as excessive system load,data loss,frequent link interruption,high energy consumption,etc.Establishing a space-oriented IoT integrated distributed storage and transmission system was to meet the requirements of security guarantee and cross-domain interconnection with massive information businesses.Development status of related technologies were illustrated.At last,the prospect and thought of the future research of space Internet of things were presented.…”
Get full text
Article -
6956
Desplazados de Haití: movilidad intrarregional sudamericana y las medidas compulsivas en Brasil y Chile
Published 2020-01-01“…In relation to the procedure to be adopted, it is observed that through qualitative research it will be possible to account for the different representations on the subject under study, without neglecting the quantitative method, as it will contribute to the evaluation and categorization of contained data in government information databases, such as data from the Ministry of Justice and Public Security of Brazil, the National Institute of Statistics and the Judiciary of Chile, and the Institute of Public Policies and Human Rights of Mercosur, with the elaboration of a diagnosis of the displacement of Haitians in South American countries, with special emphasis on the migratory realities of Haitians in Brazil and Chile. …”
Get full text
Article -
6957
Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations
Published 2019-11-01“…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
Get full text
Article -
6958
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction
Published 2020-04-01Get full text
Article -
6959
Research on context-aware Android application vulnerability detection
Published 2021-11-01“…The vulnerability detection model of Android application based on learning lacks semantic features.The extracted features contain noise data unrelated to vulnerabilities, which leads to the false positive of vulnerability detection model.A feature extraction method based on code information slice (CIS) was proposed.Compared with the abstract syntax tree (AST) feature method, the proposed method could extract the variable information directly related to vulnerabilities more accurately and avoid containing too much noise data.It contained semantic information of vulnerabilities.Based on CIS and BI-LSTM with attention mechanism, a context-aware Android application vulnerability detection model VulDGArcher was proposed.For the problem that the Android vulnerability data set was not easy to obtain, a data set containing 41 812 code fragments including the implicit Intent security vulnerability and the bypass PendingIntent permission audit vulnerability was built.There were 16 218 code fragments of vulnerability.On this data set, VulDGArcher’s detection accuracy can reach 96%, which is higher than the deep learning vulnerability detection model based on AST features and APP source code features.…”
Get full text
Article -
6960
Mobile Music Distribution: A Multichannel Approach
Published 2011-01-01“…The architecture includes a license-based security mechanism that prevents unauthorized usage of digital music, and makes use of an incentive mechanism to stimulate and reward the music distribution among customers. …”
Get full text
Article