Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7161
Exploration of Application of Unmanned Aerial Vehicle Remote Sensing Monitoring Technology in Reservoir Management—Taking a Reservoir in South China as an Example
Published 2023-01-01“…In order to improve the technological level and efficiency of water conservancy project supervision,a drinking water reservoir management department in South China took the lead in building a set of intelligent patrol systems for unmanned aerial vehicles (UAVs).The system included UAVs,UAV automated airports,meteorological monitoring devices,and UAV dispatch and control platforms,and it integrated technologies such as UAV autonomous driving,remote-sensing monitoring,geospatial perception,and artificial intelligence,achieving intelligent flight operations of UAVs in a round-the-clock,fully automatic,and highly frequent manner.It changed traditional routine inspection methods for reservoir security,environment,and land space,greatly improved working efficiency and regulatory effectiveness,and reduced the occurrence of safety incidents around the reservoir,which provided a certain reference value for its application and promotion in the daily management of water conservancy projects.However,the technical issues such as battery life,communication interference,and intelligent perception in the application of UAVs in the industry,as well as the lack of UAV hardware quality and flight standards caused by incomplete industry regulation,collectively limited the orderly development of the industry,and it must be taken seriously by industry-related regulatory authorities.…”
Get full text
Article -
7162
Oxidative Stress as the Main Target in Diabetic Retinopathy Pathophysiology
Published 2019-01-01Get full text
Article -
7163
Research on Multiparty Payment Technology Based on Blockchain and Smart Contract Mechanism
Published 2022-01-01“…The payment channel network is the most promising solution to expand the blockchain for widespread use. Achieving secure instant payment on the payment channel can significantly increase transaction throughput and reduce transaction delays. …”
Get full text
Article -
7164
Using rule association to generate data collection policies
Published 2021-10-01“…Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the validity of the collected data and their correlation, which will consume too much collection resources, resulting in low collection yield.To address this problem, considering the factors (relationship between node attributes, network topology relationship, threat status, node resource and node similarity) that impact collection costs and benefits, a rule association method to generate collection policies was designed.In the method, two types of association rules (inter-node association rules and inter-event association rules) were adopted to generate candidate data collection items and reduced the scope of data collection.Then, a multi-objective program was designed to maximize collection benefits and minimize collection costs.Further, a genetic algorithm was designed to solve this program.Proposed method was compared with existing data collection methods.The experimental results show that the number of the collected data records of proposed method is 1 000~3 000 less than that of others per 12 hours, and the validity of the collected data of proposed method is about 4%~10% higher than others, which proves the effectiveness of the proposed method.…”
Get full text
Article -
7165
The Evolution of Venezuelan Evangelical Involvement in Politics: The Case of the 2024 Presidential Elections
Published 2025-01-01“…After his questionable re-election in 2018, Venezuelan President Nicolás Maduro Moros (NMM) began a campaign to attract the attention of evangelical leaders, apostles, prophets, pastors, and church members to secure their votes for the 2024 campaign. The main reason for this move was the surprising growth of the evangelical population in the country, which reached almost 30% by the end of 2023. …”
Get full text
Article -
7166
Un/Seeing Campus Carry: Experiencing Gun Culture in Texas
Published 2020-12-01“…The focus on lived experiences that explicate the ramifications of the Campus Carry legislation in Texas contributes an important case for broader analysis of U.S. gun politics and senses of security and insecurity within educational establishments.…”
Get full text
Article -
7167
Dynamic Sign Guidance Optimization for Crowd Evacuation considering Flow Equilibrium
Published 2022-01-01Get full text
Article -
7168
Understanding Professional Discretion by Principals in Managing Drugs in Gauteng Province schools in South Africa
Published 2024-12-01“…School principals are responsible for maintaining a safe, secure and orderly school environment. A qualitative research design was employed to collect data from secondary school principals in quintiles 1 to 3 (disadvantaged schools) in the Gauteng Province of South Africa. …”
Get full text
Article -
7169
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01“…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
Get full text
Article -
7170
Feature-Level vs. Score-Level Fusion in the Human Identification System
Published 2021-01-01“…The design of a robust human identification system is in high demand in most modern applications such as internet banking and security, where the multifeature biometric system, also called feature fusion biometric system, is one of the common solutions that increases the system reliability and improves recognition accuracy. …”
Get full text
Article -
7171
Robert Duncan, Kabbalah, and “The Dominion of the Poetic Mind”
Published 2020-12-01“…Situating Duncan as the heir to nineteenth-century occult organizations and the rethinking of hermetic traditions in groups such as the Order of the Golden Dawn, I then proceed to a brief reading of his poem “Roots and Branches,” in order to demonstrate how Duncan’s kabbalistic vision of the “imaginary tree of the living in all its doctrines” awakens “transports of an inner view of things,” and secures the poetic imagination as the supreme vehicle of mystical experience.…”
Get full text
Article -
7172
Leveraging drone technology for enhanced safety and route planning in rock climbing and extreme sports training
Published 2025-01-01“…Furthermore, drones enhance athletes' psychological comfort, leading to increased confidence and security during high-risk activities. Conclusions: Despite the advantages, challenges such as technological dependency and potential drone malfunctions in extreme environments are acknowledged. …”
Get full text
Article -
7173
A novel machine learning model for perimeter intrusion detection using intrusion image dataset.
Published 2024-01-01“…This research contributes to societal security by improving location perimeter protection, and future researchers can utilize the developed model for human activity recognition from image datasets.…”
Get full text
Article -
7174
Ensete ventricosum: A Multipurpose Crop against Hunger in Ethiopia
Published 2020-01-01“…Moreover, enset shows high genetic diversity within a population which in turn renders resilience and food security against the ever-changing environmental factors and land use dynamics. …”
Get full text
Article -
7175
Education as Performative Contradiction: Limits (And Possibilities) of Subjectification in the Anthropocene
Published 2025-01-01“…As observed by Gough (2021), a general belief shared among both policy makers and academics is a consensus that education needs to be perceived less as an instrument for securing sociocultural reproduction and transmission of existing knowledge and more as a catalyst for social and cultural change. …”
Get full text
Article -
7176
5G network stereo coverage scheme in subway scenario
Published 2023-09-01“…As an urban artery and popular means of transportation, the subway is the most sustainable way of transportation.With the increase in operating mileage and passenger volume of subway and other rail transit, it faces greater challenges in operation, maintenance, security, scheduling, and other aspects.There is an urgent need for information technology to improve the level of subway operation services.While the foundation of subway informatization is effective indoor network coverage.At present, there are coverage requirements of multiple scenario such as outdoor wide area, indoor enclosed static scenes, and indoor enclosed high-speed sports scenes.For different coverage scenarios, if the same network method is chosen for coverage, there may be problems of high cost and poor coverage effect.Therefore, for the coverage of the subway network, it is necessary to flexibly combine macro station, micro station, room separation, leakage cable and other methods, combined with resource block (RB) guarantee, automatic handover, automatic login and other guarantee technologies, to meet the requirements of the network’s indicators such as insensitive switching, high data rate, low latency, high capacity, and large-scale connection under the optimal cost conditions, to ensure the normal operation of toB and toC business in subway scenarios.The 5G network stereo coverage scheme was studied in subway scenario, providing important reference for the coverage of other subway specialized networks.…”
Get full text
Article -
7177
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…Although these technologies are widely used in daily life and bring many conveniences, they also come with many security risks. If forged images generated using CG technology are maliciously used and widely spread on the Internet and social media, they may harm the rights of individuals and enterprises. …”
Get full text
Article -
7178
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01“…Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.…”
Get full text
Article -
7179
MSK Ultrasound - An IJSPT Perspective
Published 2023-02-01“…MSK ultrasound effectively streamlines the process by enabling practitioners to securely and accurately image and assess structures all in one simple step. …”
Get full text
Article -
7180
Chinese Intellectuals’ Perspectives on Russia's Invasion of Ukraine
Published 2023-01-01“…While many accuse the Russian leadership and in particular Russian President Vladimir Putin for the war, some others criticize Western countries and principally the US for NATO’s eastward expansion and for disregarding Russia’s security concerns. Chinese intellectuals with diverse academic and political backgrounds have also contributed to these discussions and offered their assessments about the war in Ukraine as well as what kind of a policy China should follow. …”
Get full text
Article