Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7301
Safety-involved co-optimization of speed trajectory and energy management for fuel cell-battery electric vehicle in car-following scenarios
Published 2024-12-01“…Abstract Vehicle connectivity technologies has propelled integrated optimization of vehicle’s motion and power splitting becoming a hotspot in eco-driving control research. However, the security issues and power sources life loss of fuel cell-battery hybrid electric vehicle (FCHEV) are still challenging due to disturbances and power sources degradation. …”
Get full text
Article -
7302
Methodology of building cultural and public framework of arctic cities on the example of Salekhard city
Published 2023-10-01“…It is also obvious that the connectivity of attraction objects in the complex climate of the Arctic cities is a necessary condition for security. The methodology of building a cultural and public framework in the Arctic cities will allow to form a coherent network of public spaces in the city, increase the comfort and safety of the living environment for residents, as well as help to develop tourist routes in the city.…”
Get full text
Article -
7303
Hyperbolic Sine Function Control-Based Finite-Time Bipartite Synchronization of Fractional-Order Spatiotemporal Networks and Its Application in Image Encryption
Published 2025-01-01“…Finally, a formulated image encryption algorithm, which is evaluated through imperative security tests, reveals the effectiveness and superiority of the obtained results.…”
Get full text
Article -
7304
An Infrared Small Moving Target Detection Method in Complex Scenes Based on Dual-Region Search
Published 2025-01-01“…Infrared (IR) small target detection is a crucial component of infrared imaging systems and is vital for applications in surveillance, security, and early warning systems. However, most existing algorithms for detecting small targets in infrared imagery encounter difficulties in achieving both high accuracy and speed, particularly in complex scenes. …”
Get full text
Article -
7305
Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture
Published 2025-01-01“…The widespread use of the internet, coupled with the increasing production of digital content, has caused significant challenges in information security and manipulation. Deepfake detection has become a critical research topic in both academic and practical domains, as it involves identifying forged elements in artificially generated videos using various deep learning and artificial intelligence techniques. …”
Get full text
Article -
7306
Problems of the activity of canine units of the National Police in the conditions of war
Published 2023-12-01“…Emphasis is also placed on new promising directions for the use of service dogs in the police and other structures of the security and defense sector. Amendments to the regulatory framework are proposed to regulate the use of K9 units. …”
Get full text
Article -
7307
Histological demonstration of gonad development in the banana shrimp, Fenneropenaeus merguiensis
Published 2025-01-01“…The genetic diversity of the banana shrimp Fenneropenaeus merguiensis is at risk because of over-harvesting, which consequently reduces food security. This endangerment is exacerbated because this species is not commonly cultivated by farmers. …”
Get full text
Article -
7308
Aplication of Gene Transfer in Aquaculture
Published 2003-05-01“… Recently, global food security has become a hot issue by the public in national as well as out of the country. …”
Get full text
Article -
7309
A Comparative Study of Convolutional Neural Network and Transformer Architectures for Drone Detection in Thermal Images
Published 2024-12-01“…The widespread growth of drone technology is generating new security paradigms, especially with regard to the unauthorized activities of UAVs in restricted or sensitive areas, as well as illegal and illicit activities or attacks. …”
Get full text
Article -
7310
Enhancing Agricultural Efficiency and Land Resource Management through Information Systems
Published 2024-06-01“… Many issues related to the use of land resources have been considered in the context of the possible application of modern information systems to improve the efficiency of agricultural management and ensure food security. The article aims at facilitating the introduction of information systems into the management of land resources in the Republic of Kazakhstan and improving the efficiency of managing its agricultural territories. …”
Get full text
Article -
7311
Technical, forensic and organisational aspects of work with Monero cryptocurrency
Published 2023-09-01“…It is stated that there are currently no effective ways of such identification without knowledge of the public address and the corresponding keys, especially if users use additional security mechanisms such as connection to the TOR network. …”
Get full text
Article -
7312
Association between Obesity and Asthma in Preschool Mexican Children
Published 2010-01-01Get full text
Article -
7313
A Framework for Resilient Community Microgrids: Review of Operational Strategies and Performance Metrics
Published 2025-01-01“…By addressing the lack of an integrated approach in the existing literature, this study contributes to advancing resilient energy systems, supporting the energy transition, and promoting energy security. Future research should validate the proposed framework through empirical studies and explore scalable, cost-effective solutions to enable widespread adoption.…”
Get full text
Article -
7314
Skillful seasonal predictions of continental East-Asian summer rainfall by integrating its spatio-temporal evolution
Published 2025-01-01“…Abstract Skillful seasonal climate prediction is critical for food and water security over the world’s heavily populated regions, such as in continental East Asia. …”
Get full text
Article -
7315
Determinants of Fast Food Consumption among Iranian High School Students Based on Planned Behavior Theory
Published 2013-01-01Get full text
Article -
7316
Exploring the transition to agroforestry for smallholder farmers: a feasibility study for the Ashanti region of Ghana
Published 2025-01-01“…We recommend improving land tenure security and establishing conflict resolution mechanisms by polycentric coordination in which all stakeholders are involved for this essential institutional redesign process. …”
Get full text
Article -
7317
Factors Influencing Precision Agriculture Technology Adoption Among Small-Scale Farmers in Kentucky and Their Implications for Policy and Practice
Published 2025-01-01“…The increasing pressure on food security and environmental sustainability has emphasized the importance of effective farm resource usage. …”
Get full text
Article -
7318
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
7319
Paradigmatic Discord in US Arctic Policy
Published 2015-04-01“…This is confirmed by the emergence of new actors (including traditionally non-Arctic players), the change in agenda of multilateral discussions (traditional topics, such as protection of the fragile Arctic environment, indigenous peoples of the North, have been complemented with the new "challenges" of energy security, global warming, and militarization), and the strengthening of the institutional framework (the Arctic Council has been more and more influential). …”
Get full text
Article -
7320
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01“…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
Get full text
Article