Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2041
Joint waveform and precoding design for coexistence of MIMO radar and MU‐MISO communication
Published 2022-09-01Get full text
Article -
2042
High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties
Published 2020-01-01“…System security is essential for the operation of the island microgrid. …”
Get full text
Article -
2043
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01“…The assessment of the proposed encryption method demonstrates its resilience against cryptographic attacks, affirming its security and precision. The results show an impressive improvement in securing images compared to previous related efforts.…”
Get full text
Article -
2044
Regulatory and policy analysis of employment and health protections in Indonesia’s creative economy
Published 2025-01-01“…Using a normative legal research method, this study analyzes key legal frameworks, including laws related to manpower, social security, and creative economy regulations, to assess the extent to which existing policies address labor and health protection in the digital era. …”
Get full text
Article -
2045
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. …”
Get full text
Article -
2046
A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching
Published 2014-01-01“…We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level.…”
Get full text
Article -
2047
EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM
Published 2024-12-01“…The objective is to provide a dependable, scalable, and energy-efficient solution for WSN security. This will ensure that data remains intact and that rogue nodes cannot disrupt the network. …”
Get full text
Article -
2048
Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment
Published 2014-01-01“…This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. …”
Get full text
Article -
2049
THE MENACE OF BANDITRY AND KIDNAPPING IN NIGERIA: AN ASSESSMENT OF SHEIKH GUMI'S MEDIATORY ROLE IN THE RELEASE OF GREENFIELD UNIVERSITY KIDNAPPED STUDENTS
Published 2025-01-01“… The increase in banditry and kidnapping in Nigeria has created significant security challenges in recent years, particularly with attacks on educational institutions where students are abducted for ransom. …”
Get full text
Article -
2050
Research on HOV Lane Priority Dynamic Control under Connected Vehicle Environment
Published 2020-01-01Get full text
Article -
2051
Energy Price Crisis and War Sanctions — Tomorrow’s Energy Supply
Published 2022-04-01“…What challenges does German policy now face and what measures should it take in order not to jeopardise security of supply, price stability and the “Energiewende”? …”
Get full text
Article -
2052
-
2053
Enhancing satellite-based emergency mapping: Identifying wildfires through geo-social media analysis
Published 2025-01-01Get full text
Article -
2054
PREVALENCE AND CONSEQUENCES OF KIDNAPPING IN SOUTHERN TARABA STATE, NIGERIA
Published 2021-05-01“… Kidnapping is one of the security challenges Nigeria is faced with and Taraba State is not an exception. …”
Get full text
Article -
2055
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
Published 2019-01-01“…The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. …”
Get full text
Article -
2056
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm
Published 2016-08-01Get full text
Article -
2057
Automatic speech recognition predicts contemporaneous earthquake fault displacement
Published 2025-01-01Get full text
Article -
2058
Basic principles of Russian foreign policy under Vladimir Putin
Published 2020-12-01“…The article notes the multi-vector nature of Russia's foreign policy strategy aimed at developing multilateral interstate relations, achieving peace and security in the interstate arena, actively countering modern challenges and threats to interstate security, as well as the formation of a multipolar world. …”
Get full text
Article -
2059
Draft genome sequence of Kei apple, an underutilized African tree crop
Published 2025-01-01“…Our genome assembly provides a valuable resource for unlocking the food security and nutraceutical potential of Kei apple.…”
Get full text
Article -
2060
Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations
Published 2019-01-01“…And hence how to enhance the security of images has become a hot topic in the field of information security. …”
Get full text
Article