Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2061
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Published 2025-12-01“…SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. Finally, the security of the scheme is verified from the aspects of semantic security, effici this paper designsency, data integrity, etc. …”
Get full text
Article -
2062
المعاییر الدولیة لسیاسات أمن المعلومات: دراسة تحلیلیة لمعاییر المنظمة الدولیة للتوحید القیاسی (آیزو27002 : ISO/IEC 27002) ومدى تطبیقها فی الجامعات العربیة...
Published 2015-04-01“…A checklist of analysis parameters of information security is applied for the best Arab universities websites. …”
Get full text
Article -
2063
Machine Learning-Based Network Detection Research for SDNs
Published 2025-01-01“…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. …”
Get full text
Article -
2064
A Trusted Federated Learning Method Based on Consortium Blockchain
Published 2024-12-01“…However, traditional FL methods face challenges in ensuring trust, security, and efficiency, particularly in heterogeneous environments with varying computational capacities. …”
Get full text
Article -
2065
-
2066
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Published 2015-01-01Get full text
Article -
2067
Enhancing network lifetime in WSNs through coot algorithm-based energy management model
Published 2025-06-01“…This addresses issues such as high energy consumption, communication delays, and security.To ensure energy savings and network reliability, the fitness function evaluates cluster heads and best routes based on constraints.COOT outperforms other Metaheuristics Algorithms like Butterfly Optimization Algorithm, Genetic Algorithm, Tunicate Swarm Gray Wolf Optimization Algorithm, and Bird Swarm Algorithm in simulation with performance measurements and enhancing network functionality and protection.Key methodology points include: • Proposed a multiple constraints clustering and routing technique using COAto solve the most crucial issues that arise in WSNs. • Integrated an advanced fitness function that determines cluster head selection, and the routing path based on residual energy, delay, security, trust, distance, and link quality so that energy load is evenly distributed and credible data flow is maintained across the network and made Innovative and Effective Solution. • Proven Results Demonstrated superior network performance, achieving the lowest delay, highest network lifetime (3571 rounds) and enhanced security (0.8) and trust (0.6) compared to existing algorithms with less energy consumption, making it the most suitable solution for WSN performance improvement.…”
Get full text
Article -
2068
The Role of Cognitive Science and Big Data Technology in the Design of Business Information Management Systems
Published 2022-01-01“…For the application scenario of multitenant distributed data access, a data transparent security management model is proposed. Simulation experiments show that this method can realize data security management when the performance loss is controlled within an acceptable range. …”
Get full text
Article -
2069
Secret sharing-based authentication and key agreement protocol for machine-type communications
Published 2019-04-01“…The comparisons regard security properties and computational and communication costs. …”
Get full text
Article -
2070
DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Published 2014-01-01“…Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. …”
Get full text
Article -
2071
AN EXAMINATION OF THE IMPACT OF NATIONAL DEFENCE STRATEGY ON THE WAR AGAINST INSURGENCY IN NIGERIA. A STUDY OF IGABI LOCAL GOVERNMENT AREA IN KADUNA STATE. 2016– 2023
Published 2024-06-01“… The growing challenges in Nigeria’s National Security hasbecome a major threat to the overall well-being of everyone living in Nigeria, neighbouring countries and her sovereignty in general. …”
Get full text
Article -
2072
DEFENSE COOPERATION IN EUROPE: SUBREGIONAL LEVEL
Published 2016-06-01“…The evolution of subregional cooperation among European nations in security and defense area is the topic of the article. …”
Get full text
Article -
2073
Growing together: unveiling the potential of school-based community gardens to foster well-being, empowerment, and sustainability
Published 2025-01-01“…The research contends that school-based community gardens can wield significant influence in enhancing food security and nutrition, catalyzing community development, and nurturing environmental sustainability. …”
Get full text
Article -
2074
Enhancing Amarath Growth and Yield in Kabale District.
Published 2024“…Amaranth, a highly nutritious and versatile crop, has emerged as a promising solution to food security and malnutrition challenges, particularly in regions like Kabale District in Uganda. …”
Get full text
Thesis -
2075
Spousal Individual Retirement Accounts
Published 2014-11-01“… A spouse who stays at home to take care of children or other dependents is likely to have reduced Social Security benefits and will not have access to a workplace retirement plan. …”
Get full text
Article -
2076
-
2077
-
2078
Measurement of Gallbladder Volume with Ultrasonography in Pregnant Women
Published 2000-01-01Get full text
Article -
2079
SUSTAINABLE GROUNDWATER MANAGEMENT THROUGH GROUNDWATER IRRIGATION ADVISORY APPLICATION (GIAA)
Published 2024-06-01“…Despite these challenges, groundwater remains indispensable for global food security, supporting approximately 60% of irrigated agriculture worldwide. …”
Get full text
Article -
2080
Research on new energy power plant network traffic anomaly detection method based on EMD
Published 2025-01-01“…Abstract Overview As Photovoltaic (PV) systems connect into the grid and depend on digital technology, risks develop from obsolete components, insufficient security measures, and insecure access points. Objectives Improve the safety and dependability of the main data communication network by conducting research on Proactive Coordinated Fault-Tolerant Federation (PCFT) security structure, building an early warning simulation to handle power data interactions network abnormalities, studying algorithms and technologies for abnormal traffic control, and effectively managing abnormal network traffic like DDoS, network scanning, along with surge traffic; Improve the capability of the SLA hierarchical service, enhance the service quality of the core services executed through the backbone network, as well as strengthen the security capability of the access system for the new energy power plant’s communication network by combing and analyzing the traffic of the main network of the current information communication network. …”
Get full text
Article