Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3441
Device-Free Localization Techniques: A Review
Published 2023-12-01“…By shedding light on these critical aspects, it offers valuable insights into the current state of DFL technology and its potential in diverse domains, ranging from smart environments to security systems. …”
Get full text
Article -
3442
G/M/N Queuing Model-Based Research on the Parking Spaces for Primary and Secondary School
Published 2020-01-01Get full text
Article -
3443
Weighted Sum Secrecy Rate Optimization for Cooperative Double-IRS-Assisted Multiuser Network
Published 2024-01-01“…In this paper, we present a double-intelligent reflecting surfaces (IRS)-assisted multiuser secure system where the inter-IRS channel is considered. …”
Get full text
Article -
3444
SECHA: A Smart Energy-Efficient and Cost-Effective Home Automation System for Developing Countries
Published 2023-01-01“…They simplify our lives, reduce workloads, improve home safety and security, and pave the way for newer developments. …”
Get full text
Article -
3445
-
3446
Sizing and Simulation of PV-Wind Hybrid Power System
Published 2013-01-01“…The output of the program will display the performance of the system during the year, the total cost of the system, and the best size for the PV-generator, wind generator, and battery capacity. Security lightning application is selected, whereas system performance data and environmental operating conditions are measured and stored. …”
Get full text
Article -
3447
Date Attachable Offline Electronic Cash Scheme
Published 2014-01-01“…Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.…”
Get full text
Article -
3448
Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS
Published 2023-01-01“…Protecting sensitive data from data integrity attacks (DIA) is essential for ensuring system security and reliability. A tragic event will occur if the attack goes unreported. …”
Get full text
Article -
3449
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. …”
Get full text
Article -
3450
Socialisation of student youth in social networks
Published 2024-06-01“…It was noted that the protection of privacy and the development of critical thinking are important for ensuring the security and information competence of social network users. …”
Get full text
Article -
3451
-
3452
National Defense as fiscal policy during the Mauricio Macri administration (2015-2019)
Published 2020-09-01“…The article establishes that, although the security-oriented discourse was apparently predominant, in the end, a fiscal adjustment rationale prevailed over all the other proposals. …”
Get full text
Article -
3453
Support Vector Machine for Behavior-Based Driver Identification System
Published 2010-01-01“…Since human driving behaviors belong to a dynamic biometrical feature which is complex and difficult to imitate compared with static features such as passwords and fingerprints, we find that this novel idea of utilizing human dynamic features for enhanced security application is more effective. In this paper, we first describe our experimental platform for collecting and modeling human driving behaviors. …”
Get full text
Article -
3454
Weibo Rumor Recognition Based on Communication and Stacking Ensemble Learning
Published 2020-01-01Get full text
Article -
3455
Human-Terrestrial Wildlife Conflict in Ethiopia: A Systematic Review
Published 2022-01-01“…About 178 keywords’ analysis revealed a focus on “coexistence,” “mitigation,” and “food security.” The literature focused mainly on larger mammals, led by Ethiopian authors, and excluded the social dimensions of HWC. …”
Get full text
Article -
3456
Risk-based approach in external migration public management
Published 2024-03-01“…External migration state management should be aimed at solving the socio-economic development problems in Russia and ensuring national security and at the same time should minimize potential risks of social and cultural nature. …”
Get full text
Article -
3457
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01“…Due to enormous development in communication devices, globally internet-connected network largely used in all human activities. The security of information has been becoming a major concern for all users and clients, whom depend on network system. …”
Get full text
Article -
3458
TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs
Published 2015-07-01“…In view of these defects, we propose a novel solution to address the selfish and security issues in social DTNs. Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
Get full text
Article -
3459
The war inside your mind: unprotected brain battlefields and neuro-vulnerability
Published 2024-02-01“…Experts in neuromedicine, technology, societal security, and strategy must grasp that a variety of technologies that arguably enhance brain function, influence or augment intelligence, link brains with computers, and enablenon invasice access to the brain-are highly attractive. …”
Get full text
Article -
3460
Modeling the Grain Import Trade: A Cointegration Analysis of China’s Panel Data
Published 2021-01-01“…Therefore, China should pay close attention to the impact of international factors on the fluctuation of its own food prices and enhance its ability to rationally utilize the international food market and international agricultural resources to ensure domestic food security.…”
Get full text
Article