141 Hits in 8.6 sec

An AI-Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems

Mohammed Amin Almaiah, Fahima Hajjej, Aitizaz Ali, Muhammad Fermi Pasha, Omar Almomani
2022 Sensors  
To address the authentication and data privacy issues in smart healthcare, in this paper we propose a lightweight hybrid deep learning protocol to achieve security and privacy.  ...  Efficient authentication and secure data transmission are the influential impediments of these networks that need to be addressed to maintain credence among clients, healthcare specialists, pharmacologists  ...  Multi-agent Systems for Distributed Data Mining Techniques: An Overview. In Big Data Intelligence for Smart Applications; Springer: Cham, Switzerland, 2022; pp. 7–92.  ... 
doi:10.3390/s22041448 pmid:35214350 pmcid:PMC8875865 fatcat:hvhiuo4o4zfepkhgqn2ghes2p4


2002 AIDS and Infectious Diseases  
National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology.  ...  discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. .  ...  Plant programmable Trojan agents designed to corrupt data and processing in accounting and transfer hardware and software.  ... 
doi:10.1142/9789812776945_0021 fatcat:e63bnhpdjfa5vghjlybcmfmjqq

Islamic Republic of Afghanistan: Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism

International Monetary Fund
2011 IMF Staff Country Reports  
and professions should be subjected to the provisions of the AML and CFT laws;  Encourage the development and use of modern and secure technologies, such as the electronic salary payment delivery system  ...  For instance, the government is currently disbursing the salaries of four thousand employees including police officers electronically and there are plans to expand the technology to enable wider use of  ...   No requirement on update of CDD data and information.  ... 
doi:10.5089/9781463923938.002 fatcat:662xzj5pv5aafilfvv53ta3axm

Colombia: Financial Sector Assessment Program-Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism

International Monetary Fund. Legal Dept.
2018 IMF Staff Country Reports  
The UIAF provides a couple of recent cases related to corruption and gold dealers where the analysis techniques of big data and data mining were used.  ...  have been rated as high risk, including with respect to illicit mining, extortion, and kidnapping.  ...  to regulatory, prudential and AML/CFT information. • Competent authorities do not have a legal framework specifically allowing them to exchange information indirectly with non-counterparts.  ... 
doi:10.5089/9781484384411.002 fatcat:jmeay6fxofchphq2vuppzedisq

'We don't want you to think criminal thoughts' [article]

Julie Laursen
2016 The PhD Series of the Faculty of Social Sciences  
illicit activities.  ...  I have consequently examined the following: the messages that the programme instructors send and the messages that the participants receive; the normative implications of the programmes; the values that  ...  Artiklen er forankret i etnografiske data fra feltarbejde i et åbent og to lukkede faengsler, hvor jeg har foretaget deltagerobservation og interviews med såvel deltagere som instruktører i programmet.  ... 
doi:10.5278/ fatcat:w7x6z2xklnhm5paiufxoewziw4

UN peacekeeping in Namibia

Besenyő János, Molnár Erik
2018 Figshare  
And today, it is considered to be a safe, stabile state where there are no gunfights or political persecution any more, so the country is rarely presented in the CNN news.  ...  The United Nations Transition Assistance Group operation in Namibia in 1989 was a turning point in the shift from traditional peacekeeping procedure to a new generation of multidisciplinary process.  ...  Acknowledgements The research work partly summarised in this paper was carried out in the Faculty of Mechanical Engineering and Informatics at the University of Miskolc, Hungary, as part of the TÁMOP-4.2.2  ... 
doi:10.6084/m9.figshare.7022216.v1 fatcat:hvjlnc6yvjf2zhmiu6mzi35h54

Cannabis sales and immigrant youth gangs in Denmark – An exploratory study of market structure and youth gang evolution

Kim Moeller
2017 Journal of Scandinavian Studies in Criminology and Crime Prevention  
The second concept is security and in particular security governance.  ...  Contemporary understandings of security often highlight the importance of the distinction between objective and subjective security (G.  ...  They are left to interpret and evaluate the different messages themselves.  ... 
doi:10.1080/14043858.2017.1305038 fatcat:5c27lf4s6bhzdfgd4erhaudp6a

Islamic State of Afghanistan: Rebuilding a Macroeconomic Framework for Reconstruction and Growth

International Monetary Fund
2003 IMF Staff Country Reports  
To assist the IMF in evaluating the publication policy, reader comments are invited and may be sent by e-mail to  ...  The policy of publication of staff reports and other documents allows for the deletion of market-sensitive information.  ...  and was not monitored by electronic surveillance or access technology.  ... 
doi:10.5089/9781451800159.002 fatcat:ugaku7uu5bgpvpbo5fabacerqi

The Sustainable Value of Open Government Data

Thorhildur Jetzek, Copenhagen Business School, Michel Avital, Niels Bjorn-Andersen, Copenhagen Business School, Copenhagen Business School
2019 Journal of the AIS  
For providing general support, access to data and enlightening conversations, we would like to extend our gratitude to the Basic Data Team at the Danish Agency for Digitization, the data-veterans at KMD  ...  Acknowledgments We would like to thank the editors of this special issue and the anonymous reviewers for their insightful comments and constructive feedback.  ...  The plan is to tackle: illicit financial flows, the hidden company ownership that makes such flows possible, land grabs, and the secrecy by which big oil, gas and mining corporations are doing business  ... 
doi:10.17705/1jais.00549 fatcat:esefzxg2hva7vbtmvkuokfm3bq

EPPO: A Challenging, Balance-Striking Exercise in the National and EU Judicial Environment

Dimitrios Zimianitis
2021 eucrim – The European Criminal Law Associations Forum  
respect for private life and the protection of personal data in electronic communications" (e-Privacy Regulation).  ...  The main shortcomings of the framework are: Poorly defined concept of risk and insufficiently detailed norms; Lack of important features, e.g., appropriate data-mining techniques and appropriate methods  ...  Sole responsibility lies with the author of the contribution. The publisher and the Commission are not responsible for any use that may be made of the information contained therein.  ... 
doi:10.30709/eucrim-2021-012 fatcat:7thk5dsr4be73onhkubqd3cj4e

The 12th International Conference on Instrumental Analysis—Modern Trends and Applications (20–23 September 2021, Virtual Event)

Manassis Mitrakas, Maria Ochsenkühn-Petropoulou
2021 Applied Sciences  
of Athens, during 20–23 September 2021 as a virtual event, providing the opportunity for high-level analytical scientists from all around the world to promote their relevant research [...]  ...  The 12th International Conference on "Instrumental Methods of Analysis" (accessed on 8 November 2021)), was organized by the Aristotle University of Thessaloniki and National Technical University  ...  Acknowledgments: The research leading to these results has received funding from Hellenic Foundation for Research and Innovation under NutrID project, "Novel technologies of isolation and micro-nano encapsulation  ... 
doi:10.3390/app112411767 fatcat:i2wzlzgn7zd5neyob4paktpe6i

D2.1 5G Security: Current Status and Future Trends

Grant Millar, Anastasios Kafchitsas, Orestis Mavrooulos, Anastasios Kourtis, George Xilouris, Maria Christopoulou, Stavros Kolometsos, Edgardo Montes De Oca, Huu Nghia Nguyen, Antonio Pastor, Sonia Fernandez, Diego Lopez (+18 others)
2020 Zenodo  
domain of 5G security, the relevant 5G projects, and open source initiatives; and a description of future trends and technologies in 5G networks, their limitations, and gaps related to the security of  ...  This deliverable aims to provide a basis for the identification of use cases and the development of 5G security enablers in INSPIRE-5Gplus.  ...  To this end, the platform shall be able to support the exchange of request and response messages involving multiple actors.  ... 
doi:10.5281/zenodo.4569519 fatcat:7aersbhzyrccrn563shazvj4dq

Global Health: Refugees and Caring for the Forgotten [chapter]

2018 Introduction to International Political Economy  
remain a technologically inno vative country. 20 Many Japanese electronics companies also outsource electronics production to contractors in China.  ...  , Production and Transfer of Anti-Personnel Mines and on their Destruction-known more commonly as the Mine Ban Treaty.  ...  For example, digitization enables government database mining, biometric identi�cation, and better electronic eavesdropping. 20 Currency printing innovations help governments stave off counterfeit paper  ... 
doi:10.4324/9781315463452-27 fatcat:7qlzfc5jafbapnh7blw7wujszq

Turning the Tide on HIV: 23rdAnnual Canadian Conference on HIV/AIDS Research

2014 Canadian Journal of Infectious Diseases and Medical Microbiology  
to appropriate electronic technologies.  ...  In addition to providing clean works, the Messagers also act as harm reduction promotion agents.  ...  The Northern Uganda cohort (Cango Lyec Project) allowed us to assess the prevalence and risk factors for depression and PTSD among people in the aftermath of war.  ... 
doi:10.1155/2014/148567 fatcat:vsfzrkkh7fd6hezjlreppkb7fm

Afro-Regions: The dynamics of cross-border micro-regionalism in Africa

K. Meagher
2010 African Affairs  
and fighting.  ...  ' houses, one shop belonging to the mine, and so forth.  ... 
doi:10.1093/afraf/adq069 fatcat:b6cbz3vuzbf2bmm6bxdvagkcpi
« Previous Showing results 1 — 15 out of 141 results