Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1301
Exploring climate change resilience of major crops in Somalia: implications for ensuring food security
Published 2024-12-01Subjects: Get full text
Article -
1302
Information acquisition strategy for security gate-ways based on swing door trending algorithm
Published 2018-10-01“…Acquisition the control information of security gateway is an important security awareness method in the space and earth integrated network,but the traditional equal interval time data method acquisition has problems,such as waste of network bandwidth,a large amount of data redundancy,excessive data collection of acquisition node and excessive transmission times.In order to solve these problems,a data acquisition strategy based on improved swing door trending algorithm was proposed,which analyzed and improved swing door trending algorithm to determine the control information of security gateway such as the rangeability of gateway traffic and CPU utilization,and to adjust the data acquisition interval adaptively.The experimental results show that compared with the traditional equal interval time data method acquisition,under the condition of ensuring the data accuracy,the proposed strategy can lower the times of data acquisition and transmission,effectively reduce network overhead and improve data acquisition efficiency.…”
Get full text
Article -
1303
Introducing maximum sustainable yield targets in fisheries could enhance global food security
Published 2025-01-01“…Abstract Aquatic foods are crucial for global food and nutrition security, but overfishing has led to depleted fish stocks, threatening both food security and the environment. …”
Get full text
Article -
1304
Transitional justice mechanisms and processes: international experience for restoring Ukraine’s sovereignty and national security
Published 2023-09-01Subjects: “…security…”
Get full text
Article -
1305
Assessment of the food security level in the regions of the European North of Russia based on benchmarking methodology
Published 2020-12-01Subjects: Get full text
Article -
1306
EN-Bypass: a security assessment method on e-mail user interface notification
Published 2023-06-01Subjects: Get full text
Article -
1307
-
1308
Discussion on Small Probability Correlation Analysis Technique of Security Audit System for Telecom Operator
Published 2013-04-01Subjects: “…security audit…”
Get full text
Article -
1309
Efficient handover authentication and secure key-updating mechanism for B5G networks
Published 2021-12-01Subjects: Get full text
Article -
1310
Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels
Published 2022-01-01“…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. Finally, the theoretical results are consistent with the simulations, proving the correctness of the derivation. …”
Get full text
Article -
1311
HREATS OF ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS WHILE PROVIDING EQUIPMENT IN THE CONDITIONS OF IMPORT SUBSTITUTION
Published 2017-09-01Subjects: Get full text
Article -
1312
APPLICATION OF A METHOD OF LINEAR CONVOLUTION OF CRITERIA BY OPTIMIZATION OF FINANCIAL SECURITY OF ACTIVITY OF THE ORGANIZATION
Published 2017-01-01Subjects: “…optimization of financial security…”
Get full text
Article -
1313
The evolution of the Gulf Coopera-tion Council approaches to security issues after the Arab Spring
Published 2022-01-01Subjects: Get full text
Article -
1314
Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks
Published 2012-01-01“…This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. …”
Get full text
Article -
1315
Three-dimensional spherical model based XML communication protocols security evaluation method
Published 2013-03-01Subjects: Get full text
Article -
1316
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. …”
Get full text
Article -
1317
The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers)
Published 2008-05-01“…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
Get full text
Article -
1318
A secure transmission method based on cooperative jamming for correlated main and wiretap channels
Published 2021-06-01Subjects: “…physical layer security…”
Get full text
Article -
1319
Transformation of the fuel and energy complex to ensure Russia’s energy security in the era of sanctions restrictions
Published 2023-11-01Subjects: Get full text
Article -
1320
Performance analysis and power optimization for FH secure communication under frequency and phase mismatch
Published 2022-09-01“…The artificial noise (AN) shielded frequency hopping (FH) secure communication can counteract electromagnetic interference and wiretapping, but its carrier frequencies change rapidly within a wide bandwidth which will raise the level of carrier frequency offset and phase noise, yielding AN cancellation performance degradation.To tackle this, the signal distortion caused by frequency and phase mismatch (FPM) was mathematically modeled, the AN cancellation performance was evaluated via signal-to-noise ratio, and the system secrecy was scaled via secrecy capacity.On basis of this, the optimal power allocation scheme for AN and confidential signal was designed, and the scheme was expanded according to the FPM level and the propagation channel quality.Numerical simulations verify that FPM can significantly degrade the noise cancellation performance and system secrecy, and to counteract this, the power ratio of AN to confidential signals should decrease with an increasing FPM.…”
Get full text
Article