Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2701
Geopolityczne położenie Armenii oraz jej perspektywy po upadku Górskiego Karabachu
Published 2024-07-01“…The hypothesis of the paper is that in view of the current geopolitical situation, Armenia should deepen its cooperation with Iran, India and the United States at the expense of limiting its relations with the Russian Federation, which does not provide Armenia with security in the region anyway. …”
Get full text
Article -
2702
Budget Policy of the New Federal Government
Published 2022-01-01“…The red lines of the new coalition partners — adherence to the debt brake, reform of basic security, no tax increases, green investments — were often seen as “squaring the circle”. …”
Get full text
Article -
2703
Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems
Published 2015-11-01“…In this paper, we propose a robust distributed reprogramming protocol of WSNs for healthcare systems, in which the security requirements are proved to be secure based on the elliptic curve discrete logarithm problem, such as existential unforgeability of signature for code image, authenticity of code image, freshness, and node compromised tolerance.…”
Get full text
Article -
2704
Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
Published 2022-01-01“…This paper analyzes the typical abnormal behaviors such as hidden and invisible attacks of network protocols and proposes a new method to perceive and mine the abnormal behaviors of protocols so as to evaluate the operational security of protocols. Aiming at the problems of long latency and difficulty to expose the hidden behavior of network protocols, a scheme combining dynamic stain analysis and instruction clustering analysis is proposed. …”
Get full text
Article -
2705
ECOLOGICALLY ORIENTED MATHEMATICAL MODELS OF RISK MANAGEMENT AND SAFETY
Published 2016-09-01“…Recommendations on the implementation and development of eco-friendly models in the interests of rational nature management, resource saving, human security and natural-anthropogenic complexes are formulated.…”
Get full text
Article -
2706
Digitalization of national economy
Published 2019-09-01“…The gradual transition to a digital model of development will increase the competitiveness of Russian products on international markets and it will also contribute to the improvement of national security. Analysis of the implementation of information and communication technologies in the national economy shows significant lag behind the leaders. …”
Get full text
Article -
2707
Measures against the financing of “lone wolves” and small terrorist cells in Europe
Published 2025-01-01“…The paper focuses on the emergence of new risks and threats to the European security system, such as the activity of “lone wolves” and small terrorist cells. …”
Get full text
Article -
2708
Sub-regional efforts to achieve gender equality in land ownership
Published 2025-01-01“…Results: The results obtained from my analysis are: the mechanisms for implementing women’s tenure security; the tools for codifying women’s land tenure; and the monitoring progress for strengthening women’s land rights in Africa. …”
Get full text
Article -
2709
Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions
Published 2024-01-01“…Among the most recurrent themes are IoT and blockchain integration in supply chain management and blockchain in healthcare data management and security, indicating the significant potential of this convergence to transform supply chains and secure healthcare data. …”
Get full text
Article -
2710
Identification of maize kernel varieties based on interpretable ensemble algorithms
Published 2025-02-01“…The findings have significant practical value in agricultural production, improving quality management efficiency and contributing to food security assurance.…”
Get full text
Article -
2711
Transformative adaptation: from climate-smart to climate-resilient agriculture
Published 2023-08-01“…Abstract In response to the climate crisis, there has been much focus on climate-smart agriculture (CSA); namely, technologies and practices that enhance adaptation, reduce greenhouse gas emissions, and contribute to food security; the so-called triple win. Success has tended to be measured in terms of the number of farmers adopting CSA with less focus given to the impacts especially on human development. …”
Get full text
Article -
2712
-
2713
Land use transition and its driving mechanisms in China’s human-elephant conflict areas
Published 2025-01-01Get full text
Article -
2714
Violent behaviour during sports event or public gathering: Disscutable questions in doctrine and court practice
Published 2024-01-01“…In the third part of the paper, the author analyzes the position of the article of the Criminal Code in which violent behavior during sports events or other public gatherings is criminalized, and which obligates the courts to impose the security measure of prohibition from attending certain sports events on the perpetrators of this act at sports events. …”
Get full text
Article -
2715
USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT
Published 2024-12-01“…Moreover, federated learning systems present a promising solution for ensuring privacy and security when dealing with sensitive financial data. …”
Get full text
Article -
2716
A Framework for Privacy-Preserving in IoV Using Federated Learning With Differential Privacy
Published 2025-01-01“…Vehicles in the VANET are highly connected to each other and this thing can cause security, safety, and privacy risks for the asset itself and driver also. …”
Get full text
Article -
2717
-
2718
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…This dependency on internet connectivity increases bandwidth consumption and fails to meet the required security criteria, contrary to ZYBO-Z7 board hardware programming. …”
Get full text
Article -
2719
USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT
Published 2023-12-01“…Moreover, federated learning systems present a promising solution for ensuring privacy and security when dealing with sensitive financial data. …”
Get full text
Article -
2720
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01“…Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence.…”
Get full text
Article