Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8521
-
8522
MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME
Published 2017-05-01“…Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. …”
Get full text
Article -
8523
Rehabilomics Strategies Enabled by Cloud-Based Rehabilitation: Scoping Review
Published 2025-01-01“…In particular, a comprehensive analysis was conducted on 28 studies, including 16 (57%) focused on personalized rehabilitation and 12 (43%) on data security and privacy. The distribution of articles among the 28 studies based on specific keywords included 3 (11%) on the cloud, 4 (14%) on platforms, 4 (14%) on hospitals and rehabilitation centers, 5 (18%) on telehealth, 5 (18%) on home and community, and 7 (25%) on disease and disability. …”
Get full text
Article -
8524
Counteraction to Political Terrorism in the Russian empire on the Example of Ukrainian provinces in Late ХІХ – Early ХХ Century
Published 2021-07-01“…Among them were: the palace guard, the police department, the palace agency, security departments of the Ministry of Internal Affairs, the corps of gendarmes. …”
Get full text
Article -
8525
-
8526
Hydroclimatic Variability, Characterization, and Long Term Spacio-Temporal Trend Analysis of the Ghba River Subbasin, Ethiopia
Published 2022-01-01“…Despite its importance for improved and sustainable water allocation for water supply-demand and food security, varying patterns of streamflow and their association with climate change are not well understood in the basin. …”
Get full text
Article -
8527
-
8528
Service Quality (Servqual) Toward Rawa Bebek’s Rusunawa Residents in Dki Jakarta
Published 2023-08-01“…Fiscal Responsibility, and 8). Security. While Methods used are Descriptive methods with a qualitative approach. …”
Get full text
Article -
8529
Food insecurity confrontation by pastoralist and agrarian communities in South Omo Zone, Ethiopia: a facility-based qualitative study
Published 2025-01-01“…Tailored intervention is highly demanding to implement policies to stabilise food supply chains and mitigate food shortages in both agrarian and pastoralist areas, invest in modern agricultural technologies to boost productivity, encourage the adoption of climate-smart agricultural practices to help farmers adapt to changing weather patterns, optimise the productive use of available farmland, promote income-generating activities, and diversify livelihoods to alleviate income constraints and improve food security.…”
Get full text
Article -
8530
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
8531
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…【Objective】Direct Sequence Spread Spectrum (DSSS) has been widely used in military and civilian communications due to its strong resistance to various common interferences, high security, and ease of implementation. It has been widely used in Code Division Multiple Access (CDMA) system. …”
Get full text
Article -
8532
Suture passer combined with two-hole laparoscopic peritoneal dialysis catheterization in patients undergoing peritoneal dialysis
Published 2024-12-01“…No statistically significant differences were observed between the two groups in terms of sex, age, primary disease, hospitalization time, hospitalization costs, preoperative and postoperative examination indicators, peritonitis, and omental wrapping.Conclusions Suture passer combined with two-hole laparoscopic PDC placement, characterized by simplicity and facilitating secure catheter fixation, was deemed safe and effective for patients undergoing PD. …”
Get full text
Article -
8533
Features of law enforcement practice in the collection and evaluation of evidence to protect the social rights of police officers
Published 2022-03-01“…The peculiarities of the sources of evidence in the construction of the legal position of protection of social rights of police officers, including the receipt of additional surcharges to the financial security during quarantine, are formulated. Proposals on the use of documents, as well as high-quality motivation of the actual circumstances of the performance of police duties in quarantine, related to the livelihood of the population, the provision of services and law enforcement are analyzed and provided. …”
Get full text
Article -
8534
Kidney stone characteristics in diabetics versus nondiabetics at a tertiary care center in Saudi Arabia
Published 2025-01-01“…Institutional review board approval was secured for this research. Data collection occurred from December 1, 2022, to March 1, 2023, and the analysis was performed using SPSS software. …”
Get full text
Article -
8535
CHIEF OBAFEMI AWOLOWO’S POLITICAL PHILOSOPHY AND WELFARIST APPROACH TO STATECRAFT IN NIGERIA’S FIRST AND SECOND REPUBLIC
Published 2024-07-01“…He made sure that effective governance includes the following: transparency, accountability, social justice, fairness, and equity, and selflessness, critical observation of the rule of law, purposeful leadership, effective institutions, and legitimacy of political economic and administrative authority, security and order. Awolowo believed the intellectual capacity of people is crucial. …”
Get full text
Article -
8536
Physical and chemical processes driven by natural iron minerals in aquatic environments
Published 2025-01-01Get full text
Article -
8537
«Basically, I am here to help you»
Published 2021-09-01“…We argue that this intervention clearly demonstrates certain dilemmas and conflicts inherent in the Norwegian Government’s recent policies on counter-extremism, where the concept of «concern» [bekymring] encompasses control and care, and includes agendas related to security and welfare, respectively. Applying a Foucauldian conceptual framework, we analyse the conversation of concern as a technique of pastoral power in which conflicting agendas interact in problematic ways, and the exercising of state power and control is neutralised through a notion of a general common good; «concern».…”
Get full text
Article -
8538
Combating economic crime in Ukraine in 1946–1949
Published 2023-12-01“…The most common crimes were the following: 1) maliciously delaying the repair of agricultural machinery, allegedly due to the lack of spare parts and specialists; 2) theft of grain during its transportation and sowing by persons responsible for this (weighers, field crew leaders, guards); 3) theft of seeds and fuel by security guards; 4) theft and embezzlement of seeds by officials of collective and state farms and subsidiary farms; 5) theft of seed by reducing the seeding rate and theft of fuel due to lack of control over its consumption; 6) theft of seeds by employees of storage facilities with their subsequent resale at markets at speculative prices; 7) creation of surplus seeds by weighing, moistening, writing off for drying, and increasing waste during sorting. …”
Get full text
Article -
8539
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
Get full text
Article -
8540
Legal regime of business partnership property (considering international experience)
Published 2023-06-01“…It has been established that property rights are not the only means of securing the assets of business entities. They may also be owned by the latter on the basis of other rights (e.g., obligatory rights). …”
Get full text
Article