Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8461
Module to scaffold the process of filling grant documents in English
Published 2020-06-01“…This barrier reduces their chance to successfully pass through several stages of the selection process to secure full financial support while competing amongst a large number of applicants. …”
Get full text
Article -
8462
Problems of the activity of canine units of the National Police in the conditions of war
Published 2023-12-01“…Emphasis is also placed on new promising directions for the use of service dogs in the police and other structures of the security and defense sector. Amendments to the regulatory framework are proposed to regulate the use of K9 units. …”
Get full text
Article -
8463
Aplication of Gene Transfer in Aquaculture
Published 2003-05-01“… Recently, global food security has become a hot issue by the public in national as well as out of the country. …”
Get full text
Article -
8464
Technical, forensic and organisational aspects of work with Monero cryptocurrency
Published 2023-09-01“…It is stated that there are currently no effective ways of such identification without knowledge of the public address and the corresponding keys, especially if users use additional security mechanisms such as connection to the TOR network. …”
Get full text
Article -
8465
Association between Obesity and Asthma in Preschool Mexican Children
Published 2010-01-01Get full text
Article -
8466
Floor of the Mouth Hemorrhage Following Dental Implant Placement or Guided Bone Regeneration (GBR) in the Atrophic Interforaminal Mandible
Published 2024-01-01“…The patients were hospitalized with nasotracheal intubation to secure the airway. In both patients, the bleeding stopped spontaneously, and after a few days, the oral floor swallowing was reduced, allowing the endotracheal tube to be removed. …”
Get full text
Article -
8467
Determinants of Fast Food Consumption among Iranian High School Students Based on Planned Behavior Theory
Published 2013-01-01Get full text
Article -
8468
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
8469
Paradigmatic Discord in US Arctic Policy
Published 2015-04-01“…This is confirmed by the emergence of new actors (including traditionally non-Arctic players), the change in agenda of multilateral discussions (traditional topics, such as protection of the fragile Arctic environment, indigenous peoples of the North, have been complemented with the new "challenges" of energy security, global warming, and militarization), and the strengthening of the institutional framework (the Arctic Council has been more and more influential). …”
Get full text
Article -
8470
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01“…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
Get full text
Article -
8471
Enjeux sanitaires, socio-économiques et environnementaux liés à la réutilisation des eaux usées dans le maraîchage urbain : cas du bassin versant de l’Abiergué (Yaoundé-Cameroun)...
Published 2010-09-01“…Many practices and many risk behaviors contribute to the spread of waterborne diseases.Despite the risk of waterborne diseases, this activity contributes significantly to food security, strengthening the economic potential, development of urban space in short to improve conditions and the framework of life of the categories of actors involved in this activity in particular and population in general.Actions economically viable, socially acceptable and ecologically sustainable are to be implemented by State or NGO in order to reduce the negative aspects and strengthen the positive aspects of this multipurpose activity.…”
Get full text
Article -
8472
Farmers’ markets contribution to the resilience of the food systems
Published 2024-12-01“…Alternative food movements, such as Farmers’ Markets (FM), claim to contribute to this transition by offering a different approach to food consumption (Bilali in Food energy secur 8: e00154, 2019). FM are spaces where producers and consumers interact directly, trading locally grown and fresh products (Chiffoleau in Agric 6:1–18, 2016; Marsden in Sociologia Ruralis 40:424–438, 2000). …”
Get full text
Article -
8473
Incidence of Post Instrumentation Pain Following Endodontic Treatment Among Patients Attending College of Dentistry-Hawler Medical University.
Published 2024-03-01“… Background and objective: The background of this study revolves around endodontic treatment, which is a therapeutic approach involving the chemical and mechanical disinfection of root canals, followed by the establishment of a secure three-dimensional seal. The primary objective of this research is to investigate and understand the underlying factors that contribute to flare up experienced by patients undergoing endodontic treatment. …”
Get full text
Article -
8474
Philosophical and Cognitive Aspects of Visual Metaphor in Political Discourse
Published 2024-12-01“…Piñera) and above all are monomodal, i.e. contain only a visual code. To secure the research outcomes one more criterion to the cartoons was applied - they were supposed to depict political leaders in the metaphoric mode. …”
Get full text
Article -
8475
Scenario-aware access control model
Published 2024-02-01“…Dynamic access control model is the theoretical basis for constructing a dynamic access control system for big data.However, most existing access control models can only fulfill dynamic access control in a single scenario and are unable to adapt to access control in multiple types of dynamic scenarios.These scenarios include changes in the contextual environment of big data, changes in entity relationships, and changes in the state of objects.To address these issues, an analysis was conducted based on the research of existing access control models and the dynamic factors of big data.Subsequently, scenario-aware access control (SAAC) model was proposed, which was based on dynamic factor conversion and scenario unified modeling.All types of dynamic factors were converted into basic elements such as attributes and relationships.Then, scene information was incorporated to model the various types of constituent elements in a unified manner.A big data dynamic access control model was constructed based on scene information to support multi-type dynamic factors and extended dynamic factors.The working framework of the SAAC model was designed, and the SAAC rule learning algorithm and SAAC rule execution algorithm were proposed corresponding to the workflow of the framework.This enabled the automatic learning of access control rules and dynamic access control decision-making.The security of the proposed model was analyzed and verified by introducing the non-transitive non-interference theory.To validate the effectiveness of the access control policy mining method of the proposed model, experimental comparisons were conducted between the SAAC model and baseline models such as ABAC-L, PBAC-X, DTRM, and FB-CAAC using four datasets.The experimental results demonstrate that the SAAC model and its strategy mining method outperforms the baseline models in terms of metrics such as area under the curve AUC, monotonicity, and steepness of the ROC curve.This verification confirms that the proposed model can support multiple types of dynamic factors and dynamic factor extensions, and that the combined effect of the access control rules obtained from its mining algorithm is relatively high.…”
Get full text
Article -
8476
HSTCN-NuSVC: A Homogeneous Stacked Deep Ensemble Learner for Classifying Human Actions Using Smartphones
Published 2025-02-01“…Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability to retain longer-term dependencies. …”
Get full text
Article -
8477
The Surrogate Safety Appraisal of the Unconventional Elliptical and Turbo Roundabouts
Published 2018-01-01“…Therefore this comparative analysis allows reducing, in the preliminary phase, possible security impacts and also economic ones for the community.…”
Get full text
Article -
8478
An inquary on how to apply the approach of of Residents in Codification of conceptual concepts of the Persistent Iranian Neighbourhood updated with uses the Grounded theory meth...
Published 2019-09-01“…By means of position analysis, the final criteria were fixed. The parameters of security, sense of place, social status, spirituality and modern technology are one of the most important criteria for the survival of residents. …”
Get full text
Article -
8479
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01“…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
Get full text
Article -
8480
Some Basic Aspects of Militia Activities in Ukrainian SSR in 1933
Published 2019-03-01“…The introduction of the passport system positively affected the organization of combating crime and ensuring state security, the registration of receptees was established. …”
Get full text
Article