Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3581
Time-and-ID-Based Proxy Reencryption Scheme
Published 2014-01-01“…We prove that our scheme is semantically secure in the standard model.…”
Get full text
Article -
3582
A New Approach to Assessing the Accuracy of Forecasting of Emergencies with Environmental Consequences Based on the Theory of Fuzzy Logic
Published 2024-12-01“…Prevention of the occurrence and development of emergencies of a natural and man-made nature is one of the basic fundamental foundations of ensuring the national security of any state. The most important mechanism for preventing emergencies is an effective system of monitoring and forecasting emergencies established at the state level. …”
Get full text
Article -
3583
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. …”
Get full text
Article -
3584
Energy Efficient Partial Permutation Encryption on Network Coded MANETs
Published 2017-01-01“…Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. …”
Get full text
Article -
3585
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix
Published 2024-01-01“…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
Get full text
Article -
3586
Optimizing Palm Oil Plantation Productivity Using Offline Blockchain and Drone Rover Solutions
Published 2024-12-01“…The offline blockchain securely stores this data, ensuring integrity and traceability. …”
Get full text
Article -
3587
Prioritizinghydrological erosion-prone response units in Latyan catchment
Published 2015-12-01“…Soil erosion in watersheds, causing problems such as the loss of agricultural land productivity and reduce soil surface layer, endangering the life of reservoirs and water utilities, loss of soil fertility, increasing flood, threatening human food security, etc. The negative effects of soil erosion, watershed management operations to improve care. …”
Get full text
Article -
3588
Zvezda Shipyard Project: Global Implications and Its Influence on the Russian Economy
Published 2024-04-01“…This strategy addresses both socio-economic goals and defense and security challenges. Additionally, the paper provides quantitative analyses of the multiplicative effects generated by the Zvezda Shipyard project's realization.…”
Get full text
Article -
3589
Study on the Influence of Tectonic Stress on Stability of Horseshoe-Shaped Tunnels
Published 2021-01-01“…The numerical model of the tunnel is built by FLAC3D, and the influence of the magnitude and direction of structural stress on the horseshoe-shaped tunnel is studied in detail. Finally, the security support of the tunnel is discussed. Results show that the stress concentration phenomenon is easily focused on the left, right, and bottom sides of the tunnel; these places should therefore be the focus of attention of tunnel stability analysis. …”
Get full text
Article -
3590
Optimal Scheduling of Multi-Energy Complementary Systems Based on an Improved Pelican Algorithm
Published 2025-01-01“…In recent years, the global power industry has experienced rapid development, with significant advancements in the source, network, load sectors, and energy storage technologies. The secure, reliable, and economical operation of power systems is a critical challenge. …”
Get full text
Article -
3591
REGIONS OF RUSSIA IN THE CORONAVIRUS PANDEMIC
Published 2020-12-01“…At the present stage of development, taking into account the changed economic situation in the world, the issues of economic security of the regions are of particular importance. …”
Get full text
Article -
3592
Energy Transition in Azerbaijan: Advantages of System Value Analysis and Strategic Role of the Global Climate Actors
Published 2024-12-01“…We argue that Azerbaijan's strategic engagement with the EU is crucial, as it serves as a means for Europe to bolster energy security and assist Azerbaijan in its political drive and strategy for transitioning to green energy. …”
Get full text
Article -
3593
A platform for Bioengineering Tissue Membranes from cell spheroids
Published 2025-04-01“…To overcome this, we developed a method to assemble spheroids into a thin layer by using two mesh scaffolds to spread them evenly, and a solid frame with grid to secure the assembly. This allows the spheroids to fuse into a thin membrane-like tissue, allowing better medium diffusion during cell culture. …”
Get full text
Article -
3594
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01“…Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. …”
Get full text
Article -
3595
Control system for aquatic biological resources in the Northern fisheries basin of Russia
Published 2022-01-01“…It has been determined that the allocation of aquatic biological resources for industrial fishing is managed on the basis of Russian regulatory legal acts, and the implementation of the tasks of developing the fishery sector and ensuring the country’s food security is consistent with the implementation of the Basic State Policy of Russia. …”
Get full text
Article -
3596
The assessment of environment protection cooperation in the South China Sea
Published 2025-01-01“…Located in a strategic position and geopolitics significance, the South China Sea is rich of biodiversity so it has abundance of fish stock to sustain food security among people in the coastal area. Since the increase of urbanization along the coastal area, pollution becomes inevitable. …”
Get full text
Article -
3597
Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption
Published 2021-01-01“…The bit error rate and similarity coefficient of the voice signal are extracted by testing the source voice signal SA1, SA2, and SI943 under different SNR, and the similarity coefficient, uncertainty, and disorder of the observed signal and the source voice signal SA1, SA2, and SI943 verify the effectiveness of the proposed speech signal extraction method and the security of quantum chaos used in speech signal encryption.…”
Get full text
Article -
3598
FEATURES OF DIGITALIZATION OF RELATIONSHIPS IN THE INDUSTRIAL MARKET
Published 2020-03-01“…However, the issues of security, protectability, stability, continuity, integrity and reliability of operations and work with information are of particular importance, which makes high demands on the digital shell of the enterprise.…”
Get full text
Article -
3599
Covid-19 and the Call to Sanitize Human Conscience
Published 2021-09-01“… Amidst the unprecedented health crisis, annihilation of economy and social security, and upsurge in the loss of job opportunities caused by Covid-19, the emergence of a dynamic global spirit of collaboration has reinvigorated the human ability to work together to respond collectively to any peril that threatens the integral well-being of the entire humanity. …”
Get full text
Article -
3600
Continuous User Verification in Cloud Storage Services using Deep Learning
Published 2025-01-01“…The behavior profiling technique has been successfully investigated as an additional intelligent security measure for continuous verification users after the simple login. …”
Get full text
Article