Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6961
A privacy-preserving collaborative reputation system for mobile crowdsensing
Published 2018-09-01“…We provide a detailed security analysis to prove the effectiveness of privacy-preserving collaborative reputation system against a number of attacks. …”
Get full text
Article -
6962
Nature Capital. An ecological transition and open space transformation phenomena
Published 2023-06-01“… As indicated by the UN 2030 Agenda and the new European goals for 2030, Ecological Transition is at the basis of the new development model to reduce polluting emissions, prevent and combat land disruption, minimise the impact of productive activities on the environment and improve the quality of life and environmental security for future generations: on the one hand, orienting an ecological transition towards equity and collective well-being means rethinking the system of relations between man and the natural and built environment and, on the other hand, referring to the construction of social and cultural communities starting from environmental issues and land resources. …”
Get full text
Article -
6963
Relationship Between Income Inequality And Economic Growth: A Comparative Analysis Of Developed And Developing Countries
Published 2019-04-01“…For example, in the provision of basic needs, education, health, social security and entrepreneurship, all member of the society should benefit from public facilities at an adequate level.…”
Get full text
Article -
6964
PROBLEMS OF TRADE AND ECONOMIC RELATIONS OF WEST AFRICAN COUNTRIES WITH THE EUROPEAN UNION, PROSPECTS FOR THEIR DEVELOPMENT
Published 2020-05-01“…The essence of relationships between West Africa and the European Union based on the papers, both foreign and domestic researchers in the field of security, regional economic development and integration etc. has been disclosed. …”
Get full text
Article -
6965
Design and realization of compressor data abnormality safety monitoring and inducement traceability expert system.
Published 2025-01-01“…To promptly monitor abnormal changes in compressor data and trace the causes leading to these data anomalies, this paper proposes a security monitoring and root cause tracing method for compressor data anomalies. …”
Get full text
Article -
6966
Efficient i-DFA construction algorithm based on state grouping
Published 2013-08-01“…Regular expression matching plays an important role in many network and security applications.DFA is the preferred representation to perform regular expression matching in high-speed network,because of its high and stable matching efficiency.However,DFA may experience state explosion,and thus consume huge memory space.As a classical solution for the problem of state explosion,i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time.However,prior methods are inefficient in both time and space during the construction of i-DFA.An efficient i-DFA construction algorithm based on the idea of state grouping was proposed.Furthermore,a formal description for the problem of state grouping was given,and it was proved that it was NP-hard to get the best state grouping result.Thus,based on local search strategy,a near-optimal algorithm was introduced to divide states into different groups.Compared with the classical construction method,the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.…”
Get full text
Article -
6967
Energy policy of the Republic of Turkey: expansion in the Eastern Mediterranean
Published 2023-05-01Get full text
Article -
6968
Russia’s inventive activity in new technological trends
Published 2024-06-01“…Consideration of the relationship among the indicators can be used to make decisions in the field of intellectual property, which can contribute to the intellectual security of Russia and serve as a basis for technological independence.…”
Get full text
Article -
6969
Gazetecilik Yıllarında Bülent Ecevit ve Anti-Komünizm (1950-1961)
Published 2021-12-01“…Ecevit, who sees communism as a means for the Soviets' ambitions in Turkey and the world, and thinks that this will create a security threat, argued that the Soviets have ambitions on Turkey and that they use communism as an instrumental in this way. …”
Get full text
Article -
6970
A Survey of Farmers’ Perceptions on Maize and Sorghum Storage Duration and Level of Pest Infestations in the Case of Two Selected Districts of Jimma Zone, Ethiopia
Published 2021-01-01“…While in Ethiopia, like in other east African countries, Maize and sorghum were an important postharvest chain for food security and income sources for small-scale rural farmers. …”
Get full text
Article -
6971
South Africa’s Battle Against COVID-19 Pandemic
Published 2022-02-01“…As the country struggles to secure and administer COVID-19 vaccines to its people, the Coronavirus has been rapidly mutating and causing new waves of infections within the nation. …”
Get full text
Article -
6972
Social Mobility in the Balkans: Border Policing Practices Are Potentially Letting Through Mostly the Members of the “Elite Club”
Published 2024-12-01“…This is why the book Border Policing and Security Technologies: Mobility and Proliferation of Borders in the Western Balkans is highly relevant and actual, as it attempts to fill this gap. …”
Get full text
Article -
6973
Research on Access Authentication and Re-Authentication Mechanism of User Devices in Terrestrial Default Scenario in Satellite Internet
Published 2023-06-01“…For the current user device access authentication mechanism requires ground participation to bring about large communication delays and poor scalability, a user device access authentication and re-authentication protocol in the ground default scenario in the space-ground integrated network was proposed, and further for the user device authentication process may occur in the power outage reconnection and AV asynchronization and other problems, a user device fast authentication mechanism and AV fast security synchronization mechanism under power failure reconnection scenario were proposed to ensured that users could safely accessed the satellite network and obtain related services.In the proposed scheme, the AV vector generated in the initial access authentication was used to assisted the re-authentication process to completed the authentication between entities without the involvement of the network control center, which guaranteed the communication system resilience.The formal verification tool Scyther showed that the proposed protocol was resistant to common protocol attacks, guaranteed the confidentiality and integrity of the communication process, and had a small signaling, computational, and bandwidth overhead, made it suitable for the satellite internet.…”
Get full text
Article -
6974
Business ecosystem sustainability management
Published 2022-06-01“…The development of research in the field of sustainable development of business ecosystems is related to the consideration of information security issues for agents of the digital economy.…”
Get full text
Article -
6975
Application and risk response of deep synthesis technology
Published 2023-04-01“…Deep synthesis technology is a widely used application in the field of artificial intelligence, particularly in intelligent services, audio and video production, media communication and information services.A basic research was conducted on the principle and implementation of deep synthesis technology.And the application of deep synthesis technology were analyzed, such as robot writing, voice synthesis, intelligent customer service, voice replication, face synthesis, posture manipulation, virtual characters and virtual scenes.Based on the analysis of the characteristics and development trend of the application of deep synthesis, the risks brought by the application of deep synthesis technology were summarized, such as the generation and dissemination of false information, infringement of the legitimate rights and interests of others, utilization by other illegal and criminal activities, and impact on national security.The measures taken by the EU, United States and China to govern the application of deep synthesis technology were studied and the countermeasures were recommended such as building a comprehensive regulatory rule system, strengthening technical supervision, and improving risk prevention awareness across society.Furthermore, the need for intelligence, authenticity, and universality in the application of deep synthesis technology was highlighted.Based on the analysis of the characteristics and development trends of deep synthesis technology, a comprehensive insight into the potential risks and countermeasures associated with its application governance were provided.…”
Get full text
Article -
6976
BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE
Published 2013-05-01“…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
Get full text
Article -
6977
Application of 5G to current differential protection of distribution network
Published 2020-02-01“…Driven by the strategy of grid as a Platform,Hub,and Sharing as well as the construction of Energy Internet and Ubiquitous power Internet of Things declared by Sate Grid Corporation of China,the intelligent distribution network evolves towards Distribution Internet of Things in a gridding and multi-source manner.The traditional distribution network protection and feeder automation barely meets the self-healing requirements of a strong distribution network.The current differential protection is prevailing due to its favorable quick-acting,sensitivity and selectivity.The existing communication solutions baring protection signals includes:fiber channel,230MHz/1.8GHz private wireless network,etc.However,the above methods are usually costly and perhaps with poor stability and low real-time performance.An realistic baring scheme for current differential protection of distribution network over the fifth generation communication system (5G) was proposed,where the of sampling data transmission between differential protection devices was realized based on 5G new radio technology.Thanks to the advantages of low latency,high capacity,security,etc.,5G-based differential protection can dynamically adjust the configuration to accommodate the topology changes,and thus can reduce the transformation and maintenance cost of distribution network.…”
Get full text
Article -
6978
Responsible and safe innovation in education: an iGEM showcase
Published 2025-12-01Get full text
Article -
6979
İngiliz Konsolos James Henry Monahan’ın Raporlarında Bitlis Vilayeti (1896-1898)
Published 2020-06-01“…In our study, the famine in Bitlis province of 1896-1898 and the subsequent migration events, the tax issue, various debt systems applied within the province, the livelihoods of the people, security problems, the issue of Kurdish guards (bekdji) and the socio-economic structure of the province were examined in detail.…”
Get full text
Article -
6980
Disaster Management and Identification of Safe and Hazardous Landslide Zones in Rural Areas of Sarwabad County
Published 2015-03-01“…Moreover, it is found that nearly 46 percent of the rural population and 31 villages of the area are located in safe or low-hazard-level landslides, while the rest of the settlements and rural population are located in the mid and high-hazard-level zones and, as such, are need to be secured in these zones.…”
Get full text
Article