Showing 7,301 - 7,320 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 7301

    Safety-involved co-optimization of speed trajectory and energy management for fuel cell-battery electric vehicle in car-following scenarios by Longlong Zhu, Fazhan Tao, Zhumu Fu, Mengyang Li, Guoqu Deng

    Published 2024-12-01
    “…Abstract Vehicle connectivity technologies has propelled integrated optimization of vehicle’s motion and power splitting becoming a hotspot in eco-driving control research. However, the security issues and power sources life loss of fuel cell-battery hybrid electric vehicle (FCHEV) are still challenging due to disturbances and power sources degradation. …”
    Get full text
    Article
  2. 7302

    Methodology of building cultural and public framework of arctic cities on the example of Salekhard city by N. V. Danilina, A. E. Korobeinikova, A. R. Khazbulatova

    Published 2023-10-01
    “…It is also obvious that the connectivity of attraction objects in the complex climate of the Arctic cities is a necessary condition for security. The methodology of building a cultural and public framework in the Arctic cities will allow to form a coherent network of public spaces in the city, increase the comfort and safety of the living environment for residents, as well as help to develop tourist routes in the city.…”
    Get full text
    Article
  3. 7303

    Hyperbolic Sine Function Control-Based Finite-Time Bipartite Synchronization of Fractional-Order Spatiotemporal Networks and Its Application in Image Encryption by Lvming Liu, Haijun Jiang, Cheng Hu, Haizheng Yu, Siyu Chen, Yue Ren, Shenglong Chen, Tingting Shi

    Published 2025-01-01
    “…Finally, a formulated image encryption algorithm, which is evaluated through imperative security tests, reveals the effectiveness and superiority of the obtained results.…”
    Get full text
    Article
  4. 7304

    An Infrared Small Moving Target Detection Method in Complex Scenes Based on Dual-Region Search by Huazhao Cao, Yuxin Hu, Ziming Wang, Jianwei Yang, Guangyao Zhou, Wenzhi Wang, Yuhan Liu

    Published 2025-01-01
    “…Infrared (IR) small target detection is a crucial component of infrared imaging systems and is vital for applications in surveillance, security, and early warning systems. However, most existing algorithms for detecting small targets in infrared imagery encounter difficulties in achieving both high accuracy and speed, particularly in complex scenes. …”
    Get full text
    Article
  5. 7305

    Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture by Bekir Eray Katı, Ecir Uğur Küçüksille, Güncel Sarıman

    Published 2025-01-01
    “…The widespread use of the internet, coupled with the increasing production of digital content, has caused significant challenges in information security and manipulation. Deepfake detection has become a critical research topic in both academic and practical domains, as it involves identifying forged elements in artificially generated videos using various deep learning and artificial intelligence techniques. …”
    Get full text
    Article
  6. 7306

    Problems of the activity of canine units of the National Police in the conditions of war by V. S. Seliukov

    Published 2023-12-01
    “…Emphasis is also placed on new promising directions for the use of service dogs in the police and other structures of the security and defense sector. Amendments to the regulatory framework are proposed to regulate the use of K9 units. …”
    Get full text
    Article
  7. 7307

    Histological demonstration of gonad development in the banana shrimp, Fenneropenaeus merguiensis by Jirakanit Chimnual, Jirawat Saetan, Wilaiwan Chotigeat

    Published 2025-01-01
    “…The genetic diversity of the banana shrimp Fenneropenaeus merguiensis is at risk because of over-harvesting, which consequently reduces food security. This endangerment is exacerbated because this species is not commonly cultivated by farmers. …”
    Get full text
    Article
  8. 7308

    Aplication of Gene Transfer in Aquaculture by . Alimuddin, G. Yoshizaki, O. Carman, K. Sumantadinata

    Published 2003-05-01
    “… Recently, global food security has become a hot issue by the public in national as well as out of the country. …”
    Get full text
    Article
  9. 7309

    A Comparative Study of Convolutional Neural Network and Transformer Architectures for Drone Detection in Thermal Images by Gian Gutierrez, Juan P. Llerena, Luis Usero, Miguel A. Patricio

    Published 2024-12-01
    “…The widespread growth of drone technology is generating new security paradigms, especially with regard to the unauthorized activities of UAVs in restricted or sensitive areas, as well as illegal and illicit activities or attacks. …”
    Get full text
    Article
  10. 7310

    Enhancing Agricultural Efficiency and Land Resource Management through Information Systems by Zauresh Imanbayeva, Galym Mussirov, Ainash Nurgaliyeva, Tukhtabek Rakhimov, Gulistan Akhmetova, Danira Kaldybayeva, Alexander Petrov

    Published 2024-06-01
    “… Many issues related to the use of land resources have been considered in the context of the possible application of modern information systems to improve the efficiency of agricultural management and ensure food security. The article aims at facilitating the introduction of information systems into the management of land resources in the Republic of Kazakhstan and improving the efficiency of managing its agricultural territories. …”
    Get full text
    Article
  11. 7311

    Technical, forensic and organisational aspects of work with Monero cryptocurrency by V. V. Nosov, O. V. Manzhai, V. O. Kovtun

    Published 2023-09-01
    “…It is stated that there are currently no effective ways of such identification without knowledge of the public address and the corresponding keys, especially if users use additional security mechanisms such as connection to the TOR network. …”
    Get full text
    Article
  12. 7312
  13. 7313

    A Framework for Resilient Community Microgrids: Review of Operational Strategies and Performance Metrics by Joy Dalmacio Billanes, Bo Nørregaard Jørgensen, Zheng Ma

    Published 2025-01-01
    “…By addressing the lack of an integrated approach in the existing literature, this study contributes to advancing resilient energy systems, supporting the energy transition, and promoting energy security. Future research should validate the proposed framework through empirical studies and explore scalable, cost-effective solutions to enable widespread adoption.…”
    Get full text
    Article
  14. 7314

    Skillful seasonal predictions of continental East-Asian summer rainfall by integrating its spatio-temporal evolution by Jieru Ma, Hong-Li Ren, Ming Cai, Yi Deng, Chenguang Zhou, Jian Li, Huizheng Che, Lin Wang

    Published 2025-01-01
    “…Abstract Skillful seasonal climate prediction is critical for food and water security over the world’s heavily populated regions, such as in continental East Asia. …”
    Get full text
    Article
  15. 7315
  16. 7316

    Exploring the transition to agroforestry for smallholder farmers: a feasibility study for the Ashanti region of Ghana by Youp Dumas, Jolien Ubacht, Ellen van Andel, Lily Akorfa Keledorme

    Published 2025-01-01
    “…We recommend improving land tenure security and establishing conflict resolution mechanisms by polycentric coordination in which all stakeholders are involved for this essential institutional redesign process. …”
    Get full text
    Article
  17. 7317

    Factors Influencing Precision Agriculture Technology Adoption Among Small-Scale Farmers in Kentucky and Their Implications for Policy and Practice by Shreesha Pandeya, Buddhi R. Gyawali, Suraj Upadhaya

    Published 2025-01-01
    “…The increasing pressure on food security and environmental sustainability has emphasized the importance of effective farm resource usage. …”
    Get full text
    Article
  18. 7318

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  19. 7319

    Paradigmatic Discord in US Arctic Policy by L. A. Matiyak

    Published 2015-04-01
    “…This is confirmed by the emergence of new actors (including traditionally non-Arctic players), the change in agenda of multilateral discussions (traditional topics, such as protection of the fragile Arctic environment, indigenous peoples of the North, have been complemented with the new "challenges" of energy security, global warming, and militarization), and the strengthening of the institutional framework (the Arctic Council has been more and more influential). …”
    Get full text
    Article
  20. 7320

    New hash function based on C-MD structure and chaotic neural network by Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA

    Published 2023-06-01
    “…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
    Get full text
    Article