Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7541
-
7542
Neural Networks Application for the Data of PID Controller for Acrobot
Published 2022-01-01“…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
Get full text
Article -
7543
The concept and significance of forensic characteristics of the unlawful seizure of enterprise, institution or organisation property
Published 2023-12-01“…This criminal offence causes economic losses to both business entities and the state as a whole, reduces the level of economic security and, as a result, the level of investment, discredits the work of government agencies, undermines the authority of the state at the international level, etc. …”
Get full text
Article -
7544
A small object detection model in aerial images based on CPDD-YOLOv8
Published 2025-01-01Get full text
Article -
7545
Mediterranean refugee traffic: main routes and problems of control
Published 2024-11-01“…The authors also cited forecasts from the European Union Agency for the Security of its External Borders for 2023–2024, which say that the pandemic and the economic crisis have affected migration flows, which will grow in the near future. …”
Get full text
Article -
7546
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. …”
Get full text
Article -
7547
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
Get full text
Article -
7548
The Azerbaijani Factor in the Clash of the Iranian and Turkish ‘Crescents’: A ‘Geopolitical New Moon’ in the South Caucasus
Published 2024-12-01“…The term ‘geopolitical new moon’ refers to the new geopolitical realities that emerged after the Second Karabakh War in the South Caucasus and have an impact on the regional security architecture, including the policies of Iran and Türkiye in this region. …”
Get full text
Article -
7549
A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS
Published 2025-01-01“…System quality has been identified as a critical factor in the selection of an open-source ERP system, with particular emphasis on aspects such as security and reliability. These sub-criteria are considered the most influential in determining the suitability of a system. …”
Get full text
Article -
7550
-
7551
Major heavy metals and human gut microbiota composition: a systematic review with nutritional approach
Published 2025-01-01Get full text
Article -
7552
Determinants of food insecurity among Syrian refugee women and their coping strategies
Published 2024-11-01“…Results It was found that 28% of the women who participated in the study had food security, 35% had mild, 24% had moderate, and 13% had severe food insecurity. …”
Get full text
Article -
7553
Blasting Vibration Generated by Breaking-Blasting Large Barriers with EBBLB
Published 2016-01-01“…The study can predict ground vibration generated by EBBLB and assess its damaging effects of blasting vibration for security and protection.…”
Get full text
Article -
7554
Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software
Published 2020-05-01“…The test results show that the OpenPGP method works well for the security of the email sending/receiving system on a multi-mail server. …”
Get full text
Article -
7555
Universality of human rights: general theoretical characteristics
Published 2024-03-01“…In essence, human rights cover a wide range of aspects, such as the right to life, liberty and security of the person, freedom of thought and expression, the right to education, work and an adequate standard of living. …”
Get full text
Article -
7556
A novel numerical solution of nonlinear stochastic model for the propagation of malicious codes in Wireless Sensor Networks using a high order spectral collocation technique
Published 2025-01-01“…Abstract The open nature of Wireless Sensor Networks (WSNs) renders them an easy target to malicious code propagation, posing a significant and persistent threat to their security. Various mathematical models have been studied in recent literature for understanding the dynamics and control of the propagation of malicious codes in WSNs. …”
Get full text
Article -
7557
Effectiveness of Solution-oriented Group Counseling on Improving Job Burnout and Resilience of Working Women Referring to Counseling Centers in Bushehr City
Published 2023-12-01“…Furthermore, the experimental group demonstrated improvements in various aspects of resilience, such as competence, personal strength, trust in personal instincts, tolerance of negative emotions, positive acceptance of emotions, safe relationships, and control of security, compared to the control group. Conclusions: . …”
Get full text
Article -
7558
Prompt injection attacks on vision language models in oncology
Published 2025-02-01“…However, here, we demonstrate that current VLMs applied to medical tasks exhibit a fundamental security flaw: they can be compromised by prompt injection attacks. …”
Get full text
Article -
7559
-
7560
Sustainability analysis of urban neighborhoods with emphasis on spatial and social justice Case Study: Maragheh City
Published 2022-06-01“…Five key indicators (trust, partnership, engagement, membership and security) have been used to assess social capital. …”
Get full text
Article