Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2141
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. …”
Get full text
Article -
2142
An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection
Published 2014-01-01“…In this paper, under the assumption that security returns are given by experts’ evaluations rather than historical data, we discuss the portfolio adjusting problem which takes transaction costs and diversification degree of portfolio into consideration. …”
Get full text
Article -
2143
Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments
Published 2020-05-01“…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
Get full text
Article -
2144
MODERN APPROACHES TO THE ORGANIZATION OF FINANCIAL SUPPLY OF THE ARMED FORCES OF THE KYRGYZ REPUBLIC
Published 2021-02-01“…The paper considers military reform as a necessary component of political and socio-economic reforms, one of the determining conditions for their success, an effective factor in ensuring the defense and security of Kyrgyzstan, its active and constructive role in the modern world. …”
Get full text
Article -
2145
Machine learning-based authentication of banknotes: a comprehensive analysis
Published 2024-03-01“…Key features, including texture, color distribution, and security attributes, are extracted to train the model, enabling a thorough analysis of banknote authenticity. …”
Get full text
Article -
2146
Éducation à la défense et enseignement de l’histoire des guerres
Published 2018-06-01“…This paper aims to deal with the relation between values and knowledge in history teaching (especially of wars) and defense and security education. This defense education is questioned through the two traditional (and potentially contradictory) aims of history teaching: building a common culture and teaching critical historical thinking. …”
Get full text
Article -
2147
A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme
Published 2014-01-01“…The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.…”
Get full text
Article -
2148
ALTERNATIVE SETTLEMENT SYSTEM IN THE FUEL AND ENERGY COMPLEX: CLASSIFICATION AND MAIN FEATURES
Published 2016-07-01“…Marks need of increase of economic security and marked out threats to the Russian economy from «petrodollars». …”
Get full text
Article -
2149
An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks
Published 2013-04-01“…While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. …”
Get full text
Article -
2150
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Information security has been the most common word uttered by any man any device or any peripheral for the past two centuries. …”
Get full text
Thesis -
2151
A Novel Influence Maximization Algorithm for a Competitive Environment Based on Social Media Data Analytics
Published 2022-06-01Get full text
Article -
2152
-
2153
Diagnosis of Protected Agriculture in Imbabura—Ecuador, Period 2016–2023
Published 2025-01-01“…Among these, producer organization could be a viable strategy to address food security challenges in the context of climate change.…”
Get full text
Article -
2154
Legal Aspects of Telepathology
Published 2000-01-01“…Data protection and data security are other crucial topics that require attention. …”
Get full text
Article -
2155
-
2156
An Improved Harmony Search Algorithm for Proactive Routing Protocol in VANET
Published 2021-01-01Get full text
Article -
2157
Tibetan–Chinese speech-to-speech translation based on discrete units
Published 2025-01-01Get full text
Article -
2158
The End of Akıncı Corps in The Ottoman Empire
Published 2013-12-01“…It has been known that the Akıncıs were in the Ottoman Empire an extention of the corps which provided the border security of the Turkish states. They were named in the Seljuki period as “margraves”. …”
Get full text
Article -
2159
High-Risk AI Systems—Lie Detection Application
Published 2025-01-01“…Integrating artificial intelligence into border control systems may help to strengthen security and make operations more efficient. For example, the emerging application of artificial intelligence for lie detection when inspecting passengers presents significant opportunities for future implementation. …”
Get full text
Article -
2160
U.S.-UK Voting Cohesion in the United Nations General Assembly: Important Votes (2001–2019)
Published 2022-05-01“…Since most UNGA resolutions are not binding, countries have more room for maneuver compared to voting in the UN Security Council. Washington pays close attention to other countries’ voting behavior in the UNGA, especially when it comes to Israel-related issues. …”
Get full text
Article