Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8921
A Mathematical Model of Communication with Reputational Concerns
Published 2016-01-01Get full text
Article -
8922
Toward an Architecture of Dissensus: Participatory Urbanism in South-East Asia
Published 2013-06-01“…A critical reflection of the Thai programme Baan Mankong (secure housing) and its regional counterpart Asian Coalition for Community Action (ACCA) – an entity aimed at creating an alternative development process in which people that were previously ignored and marginalized are engaged at the centre of a process of transforming their lives, spaces and position in the city – sheds light on such relationship in order to promote a re-conceptualisation of the role of architecture and design in the process of socially just urban development, participatory urbanism and the struggle for democracy.…”
Get full text
Article -
8923
Multimedia Image Encryption Analysis Based on High-Dimensional Chaos Algorithm
Published 2021-01-01“…Image encryption has become an urgent need for secure multimedia communication. Compared with the traditional encryption system, encryption algorithms based on chaos are easier to implement, which makes them more suitable for large-scale data encryption. …”
Get full text
Article -
8924
Location privacy protection technology based on KHINN
Published 2016-09-01“…Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest neighbor (KHINN)query method based on k-anonymity was proposed.When the method structuring anonymous user group in mobile terminal,secure multiparty summation was used to calculate the anchor point to ensure user privacy;when processing the query results,SpaceTwist method based on k-anonymity was used to improve the query privacy and accuracy.Performance analysis and experimental results show that undering the condition of semi trusted or untrusted users between nodes,the proposed method can solve defects of uneven distribution of discovering points around the anchor point in SpaceTwist method and improve the accuracy of the query.…”
Get full text
Article -
8925
Anaesthetic management of infant with occipital encephalocele associated with Arnold Chiari III malformation - A Case Report
Published 2025-01-01“…The anticipated difficult airway was secured with prior planning and teamwork. Multidisciplinary care and careful planning are essential to safeguard the perioperative outcomes for patients with meningoencephalocele wherein difficult airway, blood loss, autonomic dysfunction, and perioperative hypothermia are major concerns.…”
Get full text
Article -
8926
New Technique: A Novel Femoral Derotation Osteotomy for Malrotation following Intramedullary Nailing
Published 2012-01-01“…Two further static distal interlocking screws were inserted to secure the intramedullary nail in position. The osteotomy went on to union and her symptoms of pain, walking difficulty, and in-toeing resolved. …”
Get full text
Article -
8927
ANALYSIS OF CHANGES IN TRANSPORT PROCESSES IN WARSAW PUBLIC TRANSPORT IN THE FACE OF DISRUPTIONS IN 2019-2022
Published 2024-09-01“…The study made it possible to identify recommendations aimed at securing the operation of public transport in the event of similar threats in the future. …”
Get full text
Article -
8928
Hemorrhage of the Ramus Lumbalis of the Iliolumbar Artery as a Cause for Shock in Blunt Trauma Victims on Therapeutic Anticoagulation
Published 2021-01-01“…Local expertise and a high level of suspicion were critical in the early intervention, and postprocedural management of the injuries sustained and secured a good result.…”
Get full text
Article -
8929
Al-Marsad Right as a Mechanism for Developing and Investing in Urban Waqf Properties in Algerian Legislation
Published 2024-12-01“…Importantly, the investment value remains a debt secured by the Waqf. Unlike direct ownership, the observatory right is not a real property right stemming from Waqf ownership. …”
Get full text
Article -
8930
The Ponte Delle Chianche on the <i>Via Traiana</i> in Buonalbergo (Benevento, Italy): New Data for an Integrated Study
Published 2024-12-01“…The results obtained will be used to implement a comprehensive project for the recovery and securing of the property.…”
Get full text
Article -
8931
Key technologies and research progresses in cognitive SWIPT
Published 2020-10-01“…The combination of cognitive radio (CR) and simultaneous wireless information and power transfer (SWIPT) has become one of the research hotspots in modern high-efficient cognitive radio communications.Firstly,the introduction of SWIPT and cognitive SWIPT were illustrated.Secondly,two types of receiver structures commonly used in SWIPT networks were introduced and the corresponding energy harvesting formulas were given.Thirdly,system model of cognitive SWIPT network and the research progresses of cognitive SWIPT combined with cooperative relaying and MIMO were presented respectively.Future research prospects of the key technologies in cognitive SWIPT network were investigated.Finally,some recent research achievements of the key technologies in cognitive SWIPT were given.Certain referencing values in the theoretical research and future practical applications of high energy-efficient secure cognitive SWIPT communication network were provided.…”
Get full text
Article -
8932
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Published 2024-01-01“…This research contributes several insights into securing machine learning within ACS, ensuring robust FDD in industrial processes.…”
Get full text
Article -
8933
Space-air-ground integrated vehicular network for immersive driving experience
Published 2017-09-01“…In order to achieve the significant advantages of next generation intelligent transportation systems,realizing the smart control of vehicles,and satisfy the vehicular demands for on-road infotainment services,a novel space-air-ground integrated vehicular network architecture was proposed by making use of the space information in terms of service coverage,time synchronization,vehicle status sensing,etc.The project would investigate three fundamental scientific issues related to the novel network:1) space-air-ground integrated network reconfiguration under dynamic space resources constraints; 2) real-time sensing and efficient integration of multi-dimensional context information; 3) real-time,reliable and secure interaction among context information.The outcomes of this project will provide the foundations both in theory and practice for highly expected smart driving,immersive driving experience,and autonomous self-driving vehicular networks.…”
Get full text
Article -
8934
Bringing Home the Bacon: Infusing Evaluation Best Practices into Grant Proposals
Published 2020-01-01“…By adopting these practices, you will enhance the quality of your proposals; you will most likely increase the amount of extramural funding that is secured; and you will elevate the visibility and impact of programs within your organization. …”
Get full text
Article -
8935
Application of Interval Arithmetic in the Evaluation of Transfer Capabilities by Considering the Sources of Uncertainty
Published 2009-01-01“…From the results, it is observed that the solutions obtained through the proposed method provide much wider information in terms of closed interval form which is more useful in ensuring secured operation of the interconnected system in the presence of uncertainties in load and line parameters.…”
Get full text
Article -
8936
Privacy protection mechanism of on-demand disclosure on blockchain
Published 2020-06-01“…Privacy protection has become the key problem that blockchain technology must solve from theory to practice.There is a privacy protection requirement of on-demand disclosure in practical applications.Inspired by multicast secure communication mechanism,a privacy protection mechanism of on-demand disclosure on blockchain was proposed.This mechanism improves the RSA based anonymous multi receiver encryption scheme to realize the disclosure of the private data on the blockchain only to the permitted informed,the anonymity protection of the informed and the traceability of the privacy disclosure.The Quorum blockchain privacy protection mechanism is adopted to realize the safe and efficient distribution of the key between the owner of the private information and the informed.Finally,it is proved that PPM-ODB mechanism can guarantee the privacy of privacy data and its superiority in time and storage cost,and it is suggested that the number of informed people should be less than 100 to obtain a good user experience.…”
Get full text
Article -
8937
Program profilaktyki nadużywania Internetu i mediów elektronicznych: komunikat z badań ewaluacyjnych
Published 2021-09-01“…Wilcoxon test indicates the significant increment in knowledge about communication rules and relationships on the Internet, about the influence of ICT on health and safety and emotional and difficult situation management skills, which were treated as securing factors. Moreover, a significant increment of the monitoring activities among parent was observed. …”
Get full text
Article -
8938
CodeBuddy: A Programming Assignment Management System for Short-Form Exercises
Published 2025-01-01“…It provides a Web-based interface, the ability to execute code in a secure environment, support for custom testing logic, near-immediate feedback to students, and support for many programming languages. …”
Get full text
Article -
8939
Bilateral Primary Total Knee Arthroplasty and Reconstruction of the Medial Tibial Plateau by an Asymmetric Cone in a Patient with Charcot Arthropathy
Published 2021-01-01“…In advanced Charcot arthropathy of the knee, the use of asymmetric tibial cones appears to be an appropriate solution for secure fixation and stability of the implant.…”
Get full text
Article -
8940
Bringing Home the Bacon: Infusing Evaluation Best Practices into Grant Proposals
Published 2020-01-01“…By adopting these practices, you will enhance the quality of your proposals; you will most likely increase the amount of extramural funding that is secured; and you will elevate the visibility and impact of programs within your organization. …”
Get full text
Article