Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8061
THE ALBANIAN FACTOR OF DESTABILIZATION OF THE WESTERN BALKANS: SCENARIO APPROACH
Published 2018-07-01“…Substantiation of the probability of the development and implementation of the scenario is given in four key parameters, including political, economic, military and cultural and religious spheres.Among the main actors of the scenario the author singles out the armed forces of Kosovo, Albanian paramilitary formations on the territory of western Macedonia, transnational corporations, private military companies, as well as the United States, Britain, Turkey and the Arab monarchies who support the project politically and financially.The article concludes that there is a need for an objective political assessment of the situation in the region, an analysis of security threats and risks of another round of destabilization of the Western Balkans. …”
Get full text
Article -
8062
Models for the Design and Operation of Digital Educational Environments
Published 2021-01-01“…It includes a marketing subsystem, a set of technical tools, various types of security and an organizational subsystem. The main functions of these subsystems and their various components have been identified.A didactic model of a typical complex of digital educational resources has been developed. …”
Get full text
Article -
8063
NLP neural network copyright protection based on black box watermark
Published 2023-02-01“…With the rapid development of natural language processing techniques, the use of language models in text classification and sentiment analysis has been increasing.However, language models are susceptible to piracy and redistribution by adversaries, posing a serious threat to the intellectual property of model owners.Therefore, researchers have been working on designing protection mechanisms to identify the copyright information of language models.However, existing watermarking of language models for text classification tasks cannot be associated with the owner’s identity, and they are not robust enough and cannot regenerate trigger sets.To solve these problems, a new model, namely black-box watermarking scheme for text classification tasks, was proposed.It was a scheme that can remotely and quickly verify model ownership.The copyright message and the key of the model owner were obtained through the Hash-based Message Authentication Code (HMAC), and the message digest obtained by HMAC can prevent forgery and had high security.A certain amount of text data was randomly selected from each category of the original training set and the digest was combined with the text data to construct the trigger set, then the watermark was embedded on the language model during the training process.To evaluate the performance of the proposed scheme, watermarks were embedded on three common language models on the IMDB’s movie reviews and CNews text classification datasets.The experimental results show that the accuracy of the proposed watermarking verification scheme can reach 100% without affecting the original model.Even under common attacks such as model fine-tuning and pruning, the proposed watermarking scheme shows strong robustness and resistance to forgery attacks.Meanwhile, the embedding of the watermark does not affect the convergence time of the model and has high embedding efficiency.…”
Get full text
Article -
8064
Energy-Efficiency for IoT System With Cache-Enabled Fixed-Wing UAV Relay
Published 2020-01-01Get full text
Article -
8065
Towards a unified regional surveillance system: the Gulf CDC’s first initiatives
Published 2025-01-01“…The initiative will showcase the potential benefits of regional collaboration to improve health outcomes and will ultimately also contribute to global health security efforts.…”
Get full text
Article -
8066
Kazakh Initiatives on Cooperation with European Union
Published 2015-02-01“…The Strategy covered areas of cooperation such as regional integration, economic development, democratization, energy and security. In 2008 under the instructions of the President of Kazakhstan Ministry of Foreign Affairs in cooperation with other ministries developed a state programme "Path to Europe" for 2009 - 2011, which aided the priorities of cooperation between Kazakhstan and the European Union. …”
Get full text
Article -
8067
The Evolution of the NATO-Russia Relations
Published 2020-11-01“…NATO’s eastward enlargement — combined with the firm position of the official Washington and Brussels on the unacceptability of Russia’s membership in the Alliance — meant a complete exclusion of Russia from the decision-making process on the European security. At the same time, for a variety of reasons, in the post-bipolar world the military-political dependence of the Western European subregion on Washington did not decrease, as many hoped, but, on the contrary, has increased, thus excluding for Moscow the very possibility to play on the contradictions between the United States and its European allies. …”
Get full text
Article -
8068
Optimization of position and rating of shunt and series connected FACTS devices for transmission congestion management in deregulated power networks
Published 2024-03-01“…Power system operation and security in liberalized scenarios are maintained by removing branch overloads. …”
Get full text
Article -
8069
Prospects for the creation of national and supranational cryptocurrencies in the BRICS countries
Published 2019-06-01“…Cryptocurrency is not recognized as a legal means of payment; in the BRICS countries there are no own, national cryptocurrencies, and only projects of future cryptocurrencies are developed, taking into account the features of the set goalsof economic development and management of cryptocurrency activities; the countries of the Association do not abandon the use of blockchain technology in the field of economy and Finance, as it ensures the openness and security of data storage, the creation of centralized exchanges, the exchange of goods and services; the BRICS countries should be interested in a gradual shift away from dollar dependence. …”
Get full text
Article -
8070
THE FORMATION OF THE ENVIRONMENTAL AGENDA OF THE UNITED NATIONS GENERAL ASSEMBLY (1946-2016)
Published 2018-11-01“…Also, we identified the issues underlying the formation of the environmental agenda of the General Assembly, namely international security issues related to nuclear weapons and economic development. …”
Get full text
Article -
8071
A Multilevel Analysis of Farmers’ Adoption of Water-saving Irrigation Technology: Evidence From the North China Plain
Published 2025-01-01“…Agricultural water scarcity poses a significant threat to food security and sustainable development. Farmers’ adoption of agricultural water-saving irrigation technologies (WSIT) is essential for addressing this challenge. …”
Get full text
Article -
8072
A Machine Learning-Based Platform for Monitoring and Prediction of Hazardous Gases in Rural and Remote Areas
Published 2025-01-01“…In these areas, access to security and health services is scarce, and real-time monitoring of citizens and the conditions in which they live is very difficult. …”
Get full text
Article -
8073
Socialisation scenes in the health behaviour of teacher students at different levels of teacher training
Published 2025-01-01“…The students participating in our study hailed from the underprivileged Northern Great Plain region, which contributes to an increased search for security. The research indicates that family emerged as a significant example of values, and the objective is to foster positive health behaviours in both areas equally.…”
Get full text
Article -
8074
Service Quality Analysis of BPR XYZ
Published 2025-01-01“…The results show that 12 attributes exceed customer expectations, including strategic location, availability of queue numbers, appropriate operating hours, clear and easy-to-understand information, assistance from officers when customers face issues, trustworthiness, the bank’s ability to ensure customer data security, confidentiality of customer data, non-discrimination, and understanding of customer needs. …”
Get full text
Article -
8075
Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi.
Published 2025-01-01“…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. Participants expressed a range of opinions, some strongly held, and did not reach complete consensus with respect to any of the practices. …”
Get full text
Article -
8076
IoT-based home control system using NodeMCU and Firebase
Published 2024-11-01“…In addition, a PIR motion sensor was integrated into the system to enhance the home's security by detecting intrusion. The system's hardware functionality is based on a written Arduino code, which establishes Wi-Fi connectivity to a predefined network, communicates with the Firebase database, handles appliance control and manages sensor data. …”
Get full text
Article -
8077
PERGULATAN MAHASISWI BERCADAR DI PERGURUAN TINGGI KEAGAMAAN ISLAM NEGERI DI JAWA TIMUR
Published 2022-04-01“…Hasil penelitian ini adalah motivasi mahasiswi memakai cadar karena kebutuhan akan rasa aman (need for self-security) dari laki-laki dan kebutuhan untuk dihargai atau dihormati (need for self-esteem). …”
Get full text
Article -
8078
The Role of Urban Spaces in Improving the Life Quality (A Case Study of Malayer)
Published 2020-09-01“…In this regard, the purpose of this study was to investigate the role of Malayer urban spaces in improving the citizen’s life quality including variables such as the quality of facilities in the city, social environmental, economic quality and environmental quality, , security and relaxation, and so on. The method used in this study was a combination of analytical and case-oriented methods. …”
Get full text
Article -
8079
The Debate on the Aesthetics of Business Brand Innovation Among the Millennial Generation for the Issuance of Halal Certification
Published 2024-12-01“…From the same side, the obligation of halal certification is carried out as a form of state effort in providing security for its citizens in consuming food. Between the two understandings, literacy is needed for the millennial generation where certification and labeling of halal products based on protection, fair value, definite legal value, responsibility and openness, effective and efficient, and competent have implications for public comfort in consuming food for food that is proven to be halal. …”
Get full text
Article -
8080
North American Integration after 20 Years
Published 2015-04-01“…So, in 2000, there was put forward the concept of creating the North American community as an economic and security community by 2010, and in 2005 proposed the idea of a common currency called the Amero. …”
Get full text
Article