Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7181
Petrochemical Equipment Detection by Improved Yolov5 with Multiscale Deep Feature Fusion and Attention Mechanism
Published 2022-01-01“…Petrochemical equipment detection technology plays important role in petrochemical industry security monitoring systems, equipment working status analysis systems, and other applications. …”
Get full text
Article -
7182
Influence of experimental fires on mesofauna communities (Collembola and Acari) of two types of meadows
Published 2020-12-01Get full text
Article -
7183
Integration Dilemma within the Eurasian Space in the Context of the Ukrainian Crisis
Published 2015-06-01“…In the current situation for Belarus and Kazakhstan as two , along with Russia , the main designers of the Eurasian field, the dilemma of integration takes a fundamentally different meaning and becomes a so-called "Dilemma of integrations", or contradiction between the desire of these countries to secure the most favorable conditions in its relations with Moscow and reluctance to fully bear the burden of the costs and constraints arising in relations with the EU due to the commitments of the EAEC. …”
Get full text
Article -
7184
Deep Learning Algorithms and Multicriteria Decision-Making Used in Big Data: A Systematic Literature Review
Published 2020-01-01Get full text
Article -
7185
Harnessing UV radiation for enhanced agricultural production: benefits on nutrition, quality, and sustainability
Published 2024-12-01“…This review offers essential knowledge and methods for using UV radiation as a safe tool to increase global food security.…”
Get full text
Article -
7186
Tonalität als geschichtliches System. ›Dogmatische Denkform‹ und historischer Nachweis
Published 2016-01-01“…Understanding a system and understanding a historical development call for different strategies of perception and methods of securing scientificity. The tension between these two strategies has a subliminal influence on the nature of Dahlhaus’s Studies on the Origin of Harmonic Tonality since the author succeeds – for the most part subtly – in concealing this tension but ultimately fails to resolve it.…”
Get full text
Article -
7187
Multi-alignment under "Uneven Multipolarity": India’s Relations with Russia in an Evolving World Order
Published 2023-05-01“…It argues that India's perception of the balance of threats has shifted with respect to China, particularly in the Asia-Pacific and Indian Ocean regions, which are crucial to India's national security and future power projection ambitions. In the current context of uneven multipolarity, the capabilities of the US and China exceed those of weaker major powers, such as India, Russia, and Japan, without tipping the system into explicit bipolarity. …”
Get full text
Article -
7188
THE NIGERIA MILITARY AND THE FIGHT AGAINST ISLAMIC STATE`s WEST AFRICA PROVINCE (ISWAP), 2016-2022
Published 2024-09-01“…The findings from the study revealed that there were several offensives by the Nigerian military against ISWAP with the aim of neutralizing their fighters by destroying their camps and hideouts and restoring peace and security in the affected areas, certain strategies exhibit significant shortcomings, necessitating continuous refinement. …”
Get full text
Article -
7189
A Better Model for Socio-economic Governance?
Published 2011-06-01“…Investigation shows a bias towards external and brand-related, rather than internal priorities of job security and the social capital of workplace communities. …”
Get full text
Article -
7190
GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY
Published 2013-08-01“…In article it is shown that the information support of foreign policy and international relations of the stands in one row with such priority issues of world policy as non-proliferation of nuclear weapons, restriction and prohibition of weapons of mass destruction, settlement of regional conflicts and peace-making, strengthening of comprehensive security, the preservation of cultural heritage and promotion of human rights.…”
Get full text
Article -
7191
Normal Deviance: The Dreyfus Affair
Published 2005-12-01“…Enmeshing issues of security and nation, of population and race, the Dreyfus affair forced governments, intellectuals, media, and what we now refer to as the ‘new social movements’ into wide-ranging debates and strategic interventions that forged new relations among them. …”
Get full text
Article -
7192
The potential for justice through tourism
Published 2018-09-01“…This article considers the potential for tourism to contribute to efforts to secure justice. It reviews the evolution of tourism from a respected tool for personal development and social transformation to its now industrialised form under neoliberalism where its value is estimated in terms of employment and income. …”
Get full text
Article -
7193
Synchronization in Finite Time of Fuzzy Neural Networks with Hybrid Delays and Uncertain Nonlinear Perturbations
Published 2022-01-01“…Finally, the validity of our proposed results is confirmed by several examples and simulations. Furthermore, a secure communication problem is presented to further illustrate the fact of the obtained results.…”
Get full text
Article -
7194
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01“…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
Get full text
Article -
7195
Deep learning-based method for mobile social networks with strong sparsity for link prediction
Published 2024-06-01“…Link prediction, the process of uncovering potential relationships between nodes in a network through the use of deep learning techniques, is commonly applied in fields such as network security and information mining. It has been utilized to identify social engineering attacks, fraudulent activities, and privacy breach risks by predicting links between nodes within a network. …”
Get full text
Article -
7196
Research on the design and application of role-resource based access control model
Published 2024-11-01“…Future research can further optimize the R-RBAC model and explore its applications in other domains to achieve more efficient and secure permission management.…”
Get full text
Article -
7197
Method of privacy protection based on multiple edge servers in personalized search
Published 2019-02-01“…In the plaintext environment,users' personalized search results can be obtained through users' interest model and query keywords.However,it may possibly result in the disclosure of sensitive data and privacy,which prevents using sensitive data in cloud search.Therefore,data is generally stored in the form of ciphertext in the cloud server.In the process of cloud search service,users intend to quickly obtain the desired search results from the vast amount of ciphertext.In order to solve the problem,it was proposed that a method of privacy protection based on multiple edge servers in personalized search shall be used.By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server.The cloud server only needs to get the relevance score on the edge server and make a simple processing that can return to the most relevant Top K files by user query,so as to make it particularly suitable for a large number of users in the massive personalized ciphertext search.Security analysis and experimental results show that this method can effectively protect users’ privacy and data confidentiality.In addition,it can guarantee high efficiency in search to provide better personalized search experience.…”
Get full text
Article -
7198
Yield and Profitability of Sweet Potato (Ipomoea batatas (L.) Lam) as a Function of Increasing Levels of Phosphorus and Varieties in Southern Ethiopia
Published 2023-01-01“…Sweet potato is among the most important food security crops in Ethiopia. However, its productivity is constrained by poor soil fertility and a lack of improved varieties. …”
Get full text
Article -
7199
An Innovative Policy For Rural Development? Rethinking Barriers to Rural Communities Earning Their Living from Forests in Indonesia
Published 2014-12-01“…Those coupled by the limited capacityas technical assistance rarely provided by government institutions appear to impede local people to secure better livelihood.…”
Get full text
Article -
7200
Perspectives juridiques sur le passé colonial belge, entre déni et justice
Published 2024-05-01“…Although necessary to ensure a form of legal security and social stability, criminal prescription does however have some exceptions, mainly for heinous crimes. …”
Get full text
Article