Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3041
Incertezza e cambiamento climatico nell’era dell’Antropocene
Published 2017-07-01“…Climate change appears as a major driver of identity crisis, affecting changes at local and global level in terms of spaces, security, livelihood and weather. The prevailing narration on climate change describes unfamiliar scenarios struck by exceptional events, that rarely can be connected with personal experiences. …”
Get full text
Article -
3042
Research on WiFi Penetration Testing with Kali Linux
Published 2021-01-01“…The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network.…”
Get full text
Article -
3043
Parental Influences on Children's Self-Regulation of Energy Intake: Insights from Developmental Literature on Emotion Regulation
Published 2012-01-01“…Additionally, sources of variation in parental influences on regulation are examined, including parenting style, child temperament, and child-parent attachment security. Parallels in the nature of parents' role in socializing children's regulation of emotions and energy intake are examined. …”
Get full text
Article -
3044
An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm
Published 2014-01-01“…The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.…”
Get full text
Article -
3045
Methodological guidelines to assist women victims of violence.
Published 2009-11-01“…This is a violation of human rights limiting their personal freedom and annulling their main warranties as their right to have security, integrity and even life. In the 90´ it has been identified as a health problem due to its frequency and severity, its magnitude and influence in health recovery. …”
Get full text
Article -
3046
International Cooperation and Indonesia’s Geopolitical Perspective in Indo-Pacific
Published 2025-01-01“…In other words, regional development through international cooperation will increase regional stability so as to encourage various economic, political and security activities that not only reduce political friction, but also provide strategic advantages for every actor who has an interest in the Indo-Pacific. …”
Get full text
Article -
3047
Neural Linguistic Steganalysis via Multi-Head Self-Attention
Published 2021-01-01“…Precise linguistic steganalysis on suspicious carrier is critical for multimedia security. In this paper, we introduced a neural linguistic steganalysis approach based on multi-head self-attention. …”
Get full text
Article -
3048
Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans
Published 2017-06-01“…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.http://edis.ifas.ufl.edu/uw429 …”
Get full text
Article -
3049
Promote Renewable Energies Efficiently and Effectively
Published 2022-09-01“…Following the tightening of the climate protection measures, the question arises as to whether the current electricity market design and the associated remuneration rules for electricity generation are still suitable for achieving the goals of security of supply and low prices stipulated in the Energy Industry Act, even with an electricity market dominated by renewable energies.…”
Get full text
Article -
3050
Sustainability Goals in Economic Policy — Economic Considerations
Published 2022-05-01“…This should be prevented by formulating the goals as concretely and legally securely as possible and by building up competence in the authorities entrusted with their implementation.…”
Get full text
Article -
3051
From Low Engagement to High Engagement: Explaining Turkey’s Changing Engagement in the Middle East during the JDP Period
Published 2022-06-01“…Why did Turkey shift its Middle East policy from soft power oriented approach to the security oriented one in the early 2010s? While Turkey prioritized diplomatic, commercial and economic relations during the first decade of the 2000s, it has increasingly used military means to influence the Middle East since 2011. …”
Get full text
Article -
3052
Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Published 2011-01-01“…Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. …”
Get full text
Article -
3053
Geopolityczne położenie Armenii oraz jej perspektywy po upadku Górskiego Karabachu
Published 2024-07-01“…The hypothesis of the paper is that in view of the current geopolitical situation, Armenia should deepen its cooperation with Iran, India and the United States at the expense of limiting its relations with the Russian Federation, which does not provide Armenia with security in the region anyway. …”
Get full text
Article -
3054
INTELLIGENT LOW-POWER SMART HOME ARCHITECTURE
Published 2018-09-01“… The Smart Home technology is a house that implements a variety of physical and digital well-integrated technologies, providing a number of functionalities like control of lighting, temperature, multimedia devices, flammable gas leakage, automatic plant irrigation or alarms security using a set of hardware components connected to a development board that can be accessed remotely through an Android application. …”
Get full text
Article -
3055
Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
Published 2022-01-01“…This paper analyzes the typical abnormal behaviors such as hidden and invisible attacks of network protocols and proposes a new method to perceive and mine the abnormal behaviors of protocols so as to evaluate the operational security of protocols. Aiming at the problems of long latency and difficulty to expose the hidden behavior of network protocols, a scheme combining dynamic stain analysis and instruction clustering analysis is proposed. …”
Get full text
Article -
3056
Initial and Continued Airworthiness: Commonalities and Differences Between Civil and Military Aviation
Published 2024-12-01“…A trend exists towards the homogenization of rules in both fields; however, due to national security interests, these are generally agreed upon on a case-by-case basis. …”
Get full text
Article -
3057
Comparative analysis of smart home management systems
Published 2024-06-01“…The detailed analysis includes a comparison of documentation, functionality, configurability, security, architecture and user feedback. In addition, two studies were conducted. …”
Get full text
Article -
3058
Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans
Published 2017-06-01“…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.http://edis.ifas.ufl.edu/uw429 …”
Get full text
Article -
3059
Cattell-Braasch Maneuver: A Gadget to Manipulate Abdominal Aortic Aneurysm in a Patient with a Left-Sided Inferior Vena Cava
Published 2019-01-01“…He underwent open surgery, and we employed the Cattell-Braasch maneuver to approach the abdominal aortic aneurysm from the right side. This enabled securing of the abdominal aortic aneurysm neck without mobilizing or dissecting the inferior vena cava. …”
Get full text
Article -
3060
Cities and environmental emergencies. Green Infrastructures for the urban project
Published 2020-12-01“…The paper analyses the ability of Green Infrastructures to reduce vulnerability to climate impacts through the increase of biodiversity, positive effects of green open spaces on health and security against the threats posed by pathogens and the role of the digital network to support the maintenance of Green Infrastructures performance over time.…”
Get full text
Article