Suggested Topics within your search.
Suggested Topics within your search.
- Management 16
- Business 14
- Entrepreneurship 10
- Business communication 8
- Business enterprises 8
- Business writing 6
- Commercial law 6
- Computer programs 6
- New business enterprises 6
- Industrial management 5
- Information technology 5
- Marketing 5
- Business ethics 4
- Business mathematics 4
- Commercial statistics 4
- Communication in management 4
- English language 4
- Hospitality industry 4
- Law and legislation 4
- Moral and ethical aspects 4
- Purchasing 4
- Statistics 4
- Business English 3
- Business Management 3
- Business logistics 3
- Leadership 3
- Public relations 3
- Statistical methods 3
- Tourism 3
- Accounting 2
-
8881
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article -
8882
The Concept of Greater Europe from Lisbon to Vladivostok: Problems and Perspectives
Published 2015-04-01“…The Ukrainian crisis has become a major strength test in the relations between Russia and the European Union, which resulted in a vast credibility gap, the «war of sanctions», the disruption of business and political ties. Notwithstanding the complexity of the situation, calls for tightening up the connections between the European and Eurasian integration projects are becoming louder. …”
Get full text
Article -
8883
Design of Strengthening in Agile Governance: Efforts to Develop the Tourism Sector Sustainably in Dayun Sub-District, Siak Regency
Published 2025-01-01“…Handling forest and land fire disasters can be combined with ecotourism activities in tourist village areas using the principles of agile governance, which include the development of regional information systems, the development of business-oriented community facilities, increasing community participation in tourism governance, and emphasizing the rapid resolution of problems that arise.…”
Get full text
Article -
8884
-
8885
-
8886
Perancangan Data Warehouse Untuk Menunjang Akreditasi Program Studi
Published 2022-10-01“…In addition, these colleges usually have several applications with various data storage to carry out the college's business processes. As a result, the provision of data for the accreditation process is manually by taking from various sources from various existing applications so that it will take a long time. …”
Get full text
Article -
8887
Cache of cryptographic key based on query popularity
Published 2023-02-01“…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
Get full text
Article -
8888
Additive Manufacturing and Augmented Reality as New Production Technologies in the Aviation Industry
Published 2020-11-01“…Aircraft manufacturers' revenues in services business, including maintenance, repair and overhaul (MRO) are boosting, too. …”
Get full text
Article -
8889
DETERMINANTS OF CORPORATE GOVERNANCE REPORTING AMONG LISTED NON-FINANCIAL FIRMS IN NIGERIA
Published 2024-10-01“… One of the major problems encountered by investors in developing economies is the issue of corporate governance disclosure which could lead to potential business failures as investors might lose confidence in a company. …”
Get full text
Article -
8890
THE IMPACT OF CORPORATE SOCIAL RESPONSIBILITY ON BANK PERFORMANCE IN NIGERIA
Published 2025-01-01“…The study therefore recommended that firms should strategically integrate corporate social responsibility initiatives with their core business objectives to maximize the positive impact on profitability. firms should carefully evaluate the timing and scale of their corporate social responsibility investments. …”
Get full text
Article -
8891
-
8892
-
8893
Distributed Storage Strategy and Visual Analysis for Economic Big Data
Published 2021-01-01Get full text
Article -
8894
Evaluation of effectiveness of resource-saving technologies in machine-building industry
Published 2020-06-01“…With the transition of production and business systems to work in the context of the formation of the sixth technological order, issues of increasing the efficiency of production processes acquire special significance and relevance. …”
Get full text
Article -
8895
-
8896
التمكين الإداري ودوره في الرضا الوظيفي للعاملين: دراسة استطلاعية في الإدارة العامة لمدينة الطب في بغداد...
Published 2023-09-01Get full text
Article -
8897
Design of Arduino Computer Numerical Control Machine.
Published 2023“…Using small machine tools to fabricate small scale parts will provide both flexibility and efficiency in manufacturing approaches and reduce capital cost, and complexity in CNC systems which is beneficial for small business owners.…”
Get full text
Thesis -
8898
The Role of Records Management and Good Governance at Sheema District Local Government Headquarters.
Published 2023“…Findings further indicated that records controls the creation and growth of records, reduces operating costs, improves efficiency and productivity, helps to assimilate new records management technologies and take advantage of their many benefits, safeguards vital information, supports better decision making, preserves the corporate memory, minimizes litigation risks, fosters professionalism in running business and ensures regulatory compliance. From the findings, challenges like lack of awareness on the importance of records management, insufficient funds to support records management activities, inadequate staff and training, outdated archival legislation, appraisal backlogs, lack of sound records management programmes and reluctance to facilitate access to information were identified. …”
Get full text
Thesis -
8899
Budgeting and Performance of Financial Institutions: A Case Study of Lyamujungu SACCO in Kabale Municipality.
Published 2023“…Some respondents showed that budgeting in business organizations is formally associated with the advent of industrial capitalism. …”
Get full text
Thesis -
8900
Challenges to Teaching and Learning of Agriculture in Secondary Schools in Rubanda West Constituency Rubanda District.
Published 2024“…Findings revealed that all schools offered agriculture as a subject, though it attracted fewer students compared to business studies, with which it is paired in the curriculum. …”
Get full text
Thesis