Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8861
How to Protect Future Generations' Rights in European Governance
Published 2010-10-01“…Given that future generations are right-bearing citizens of tomorrow, legislative systems should secure these rights through appropriate institutions. …”
Get full text
Article -
8862
Cluster-based key management scheme for ad hoc networks
Published 2008-01-01“…A new threshold key distribution scheme basing on self-certified public key and CPK(composite public key) technology was presented for ad hoc networks.Basing on the key distribution scheme and cluster networks structure,an integrated key management scheme was presented.The public key can be certified itself and so the certificate is not need in the scheme.The process of key distribution is simple and the key escrow problem existing in IBE(identity-based en-cryption) scheme is solved.The scheme can be used in different scale networks and can meet the dynamic topology of the ad hoc networks.The experimental results and theoretical analysis show that the overhead of computation and communi-cation is lower.Comparing with PKI and IBE scheme the scheme is more secure and practical.…”
Get full text
Article -
8863
Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer
Published 2013-01-01“…This paper presents an unknown input Proportional Multiple-Integral Observer (PIO) for synchronization of chaotic systems based on Takagi-Sugeno (TS) fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. …”
Get full text
Article -
8864
Repair of traumatic flank hernia with mesh strip suture: a case report
Published 2022-08-01“…Our findings indicate that when it is difficult to secure a sufficient operative field for mesh anchoring in a traumatic flank hernia, a technique of sutured repair with mesh strips may be considered as a treatment option as it requires less dissection. …”
Get full text
Article -
8865
Direct radiocarbon dating and stable isotopes of the neandertal femur from Les Rochers-de-Villeneuve (Lussac-les-Châteaux, Vienne)
Published 2006-06-01“…The direct radiocarbon date makes it the oldest directly dated European Neandertal specimen, even though others have securely associated radiocarbon dates in the same time range. …”
Get full text
Article -
8866
Dandiacal Conversation in Oscar Wilde’s Comedies of Manners: Conventions, Conversions and Reconfigurations of Phallogocentrism
Published 2010-12-01“…Their strong reliance on rhetoric ensures their supremacy in polite conversation, even if their intellectual and cultural edge does a lot to secure their domination. What is more, their mastery of codes and norms enables them to destabilize the semantics of the age, a gesture which can be equated to a reconfiguration of Victorian patriarchy and even a dismissal of Victorian grand narratives.…”
Get full text
Article -
8867
Energy Conservation, Singular Orbits, and FPGA Implementation of Two New Hamiltonian Chaotic Systems
Published 2020-01-01“…Since the conservative chaotic system (CCS) has no general attractors, conservative chaotic flows are more suitable for the chaos-based secure communication than the chaotic attractors. …”
Get full text
Article -
8868
Novel and effective secret sharing scheme
Published 2012-01-01“…A novel secret sharing scheme was proposed.This scheme consisted of two layer protocols:in the first layer,a larger secret was split into t smaller integers (sub-secrets) based on the Stern-Brocot tree; in the lower layer,t sub-secrets obtained from the first layer were regarded as t initial states in one-dimensional cellular automaton model,and then from the t initial states it could dynamic create all participants’ shares according to the simple fixed rule.This scheme could dynamic add new member,adjust the threshold value and renew the secret and the shares.Besides,there were still other advantages that the costs of the computation were very low and the size of the shares was very small.The results of analysis show that it was secure and very efficient.…”
Get full text
Article -
8869
Internal agricultural policy of the government of A. V. Kolchak
Published 2020-10-01“…This circumstance eventually secured the victory of Bolshevism…”
Get full text
Article -
8870
AI-Powered Decision Support Systems for Sustainable Agriculture using AI-Chatbot Solution
Published 2024-06-01“…This study intends to link AI technology with farming, to make our future world more sustainable and food secure. …”
Get full text
Article -
8871
La lutte contre la piraterie au large de la Somalie
Published 2024-03-01“…At the end of the day, only a global approach of the Somalian issues will be able to secure the Gulf of Aden, which is a strategic Sea Line Of Communication for the world trade. …”
Get full text
Article -
8872
Československá vojenská mise v Kanadě: Činnost a výsledky
Published 2012-01-01“… The Czechoslovak military mission in Canada (1941–1943) aimed to secure the enlistment of local Czechs to Czechoslovak units in Great Britain. …”
Get full text
Article -
8873
Innovation et système des brevets aux États-Unis : un modèle en question(s)
Published 2006-01-01“…In an effort to promote economic growth by stimulating innovation, the Founding Fathers engraved the concept of patent in the Constitution of the United States by granting Congress the power “to promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.” …”
Get full text
Article -
8874
PRECONDITIONS OF LAND RELATIONS DEVELOPMENT: ECONOMIC, LEGAL AND INSTITUTIONAL
Published 2018-12-01“…The article also proposes mortgage refinancing mechanism through the issue of mortgage land securities. …”
Get full text
Article -
8875
Small Arms and Light Weapons Proliferation and Gun Violence in West Africa Sub-Region
Published 2022-11-01“…The government of the countries in the West African sub region should collaborate to beef securities in their borders. …”
Get full text
Article -
8876
Fibrodysplasia Ossificans Progressiva and Pregnancy: A Case Series and Review of the Literature
Published 2022-01-01“…These cases posed unique anesthetic and obstetric technical challenges, particularly when securing the airway and performing cesarean delivery. …”
Get full text
Article -
8877
A Mislocated Intrauterine Device Migrating to the Urinary Bladder: An Uncommon Complication Leading to Stone Formation
Published 2020-01-01“…We report a case of an IUD migrating from its normal position in the uterine cavity into the urinary bladder causing chronic low urinary tract symptoms in a 43-year-old female patient. The device was securely removed without complications using grasping forceps under cystoscopy, and no parietal defect was detected. …”
Get full text
Article -
8878
A digital audio data protection method using parametric action of generalised triangle group on GF(28)
Published 2025-01-01“…Also, based on the resulting parametric equations, the authors have presented an audio encryption approach in this study. The extremely secure S-Box, which is then utilised to encrypt audio signals, is built using parametric equations. …”
Get full text
Article -
8879
Peri-Implant Soft Tissue in Contact with Zirconium/Titanium Abutments from Histological and Biological Perspectives: A Concise Review
Published 2025-01-01“…The attachment between the implant surface and peri-implant mucosa should establish a secure seal to prevent bacterial infiltration and subsequent tissue inflammation. …”
Get full text
Article -
8880
Homomorphic signature schemes for single-source and multi-source network coding
Published 2019-11-01“…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
Get full text
Article