Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8821
Cabool (1842) d’Alexander Burnes : du récit de voyage au plaidoyer politique ?
Published 2015-02-01“…It deals with the need to make the Indian subcontinent’s north-west frontier area secure, to maintain a delicate balance between the frontier’s neighbouring states, to counter the threat represented by Persia and Russia while at the same time considering these issues within the broader context of British-Russian relations. …”
Get full text
Article -
8822
A case report of complete cricotracheal separation: an experience from the east coast of Malaysia
Published 2022-12-01“…The most crucial part of managing this injury is to establish a secure airway. Tracheostomy under local anesthesia is the preferred method of airway stabilization, in order to avoid further injuries to the airway caused by endotracheal intubation. …”
Get full text
Article -
8823
Proof of work algorithm based on credit model
Published 2018-08-01“…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
Get full text
Article -
8824
« Et voilà qu’arrive l’aventure ! »
Published 2019-12-01“…In this excerpt, Daniel Koehl recalls the mutiny at the Saint-Maur prison in 1987, of which he was one of the main leaders. The ultra-secure prison, built twelve years before, was completely destroyed during the mutiny.…”
Get full text
Article -
8825
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01“…A mutual authentication scheme based on the TPM cloud computing platform was proposed to solve the problem of mutual authentication between user and cloud computing server.Trusted computing technology and traditional smart card password method were used in cloud computing service platform.The scheme completed the authentication of both sides in cloud computing,generated the session key according consulting,at the same time,verified the credibility of cloud service platform.Experiment analysis shows that our scheme can resist various kinds of possible attacks,so it is therefore more secure than other schemes.And the computing time meet the requirements of cloud computing environment.…”
Get full text
Article -
8826
A Review of Semantic Sensor Technologies in Internet of Things Architectures
Published 2019-01-01“…Intelligent sensors should be seamlessly, securely, and trustworthy interconnected to enable automated high-level smart applications. …”
Get full text
Article -
8827
Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm
Published 2014-01-01“…Islanding detection is essential for secure and reliable operation of microgrids. Considering the relationship between the power generation and the load in microgrids, frequency may vary with time when islanding occurs. …”
Get full text
Article -
8828
Effectiveness of pre-employment card policy on employment transition during covid-19: evidence from Indonesian dual labor market
Published 2024-11-01“…The effectiveness of the PEC policy is measured through key indicators such as labor absorption rates, reduction in unemployment, and the likelihood of securing formal employment over informal alternatives. …”
Get full text
Article -
8829
Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act
Published 2016-02-01“… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
Get full text
Article -
8830
Human rights in procedural democracies: a contribution to the debate
Published 2021-12-01“…Liberal democracy – descriptive, procedural and to some extent minimalist, primarily concerned with formally securing classic individual freedoms – now faces an acute crisis, with its historic achievements threatened by populist and undemocratic ideas. …”
Get full text
Article -
8831
The Art of Storytelling in Science: A Personal Journey
Published 2025-02-01“…Drawing from my experiences across Brazil, the United States of America, India, and South Africa, I explore how crafting compelling narratives enhances scientific communication, increasing the likelihood of publishing, securing funding, and building collaborations. Reflecting on formative “hot seat” sessions at the National Institutes of Health, in the United States, I emphasize the importance of structuring ideas clearly, regardless of language fluency. …”
Get full text
Article -
8832
Survey of research on multimodal semantic communication
Published 2023-05-01“…With the cross-integration of artificial intelligence and communications, technologies for processing multimodal data such as text, image, audio, and video are booming, the shared dimension of modal semantics is deeply excavated, and the characteristics of multimodal semantic information such as high abstraction, intelligence and simplicity are being fully utilized, which brings new ideas and means to semantic communications.First, the fundamental theories and classifications of semantic communication were introduced, and the research status of single-modal semantic communication was reviewed for text, image, audio, and video respectively.Then, the research status of multimodal semantic communication was reviewed, and multimodal data fusion technology and secure semantic communication were introduced.Finally, the challenges faced by multimodal semantic communication were summarized.…”
Get full text
Article -
8833
How to Design a Study and Write a Grant in Radiology?
Published 2025-01-01“…Thus, it is essential for academic radiologists pursuing research in radiology to be able to write successful grants and secure funds. In this review article, we discuss the strategies to design a study and write successful grants.…”
Get full text
Article -
8834
Multi-authority attribute-based encryption with efficient revocation
Published 2017-03-01“…Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups,and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition,the proposed scheme supports large universe and any monotone access structures,which makes it more flexible for practical applications.…”
Get full text
Article -
8835
Market Efficiency and Organizational Corruption: Study on the Impact on Shareholder Value
Published 2015-01-01“…We selected 28 events for analysis and we observed negative and positive variations of the securities in relation to the market, in the days before the disclosure, as in most o f the 20 days after publication. …”
Get full text
Article -
8836
Tributary
Published 2023-05-01“…Tributary explores covert, 'black-boxed' data centres (remote and highly secure sites) by tracking water and geothermal sources to the infrastructure required to power and house these physical locations of intensive computational processing. …”
Get full text
Article -
8837
Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act
Published 2016-02-01“… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
Get full text
Article -
8838
Identification of critical nodes in supply chain networks
Published 2025-01-01“…The accurate identification of the critical nodes in a SCN is important for securing the supply chain. This study proposes a new method for identifying critical nodes in SCNs based on the topological and functional characteristics of SCNs. …”
Get full text
Article -
8839
A Laryngoscope with Shape Memory Actuation
Published 2024-09-01“…Endotracheal intubation is a medical procedure to secure a patient’s airways, which can be challenging in emergency situations due to an individual’s anatomy. …”
Get full text
Article -
8840
Verifiable special threshold secret sharing scheme based on eigenvalue
Published 2018-08-01“…Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12.…”
Get full text
Article