scholarly journals Piracy: The Pre-existing Security Problem at Antiquity

2021 ◽  
Vol - (10) ◽  
pp. 17-30
Author(s):  
Murat ARSLAN
Keyword(s):  
Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


2021 ◽  
Vol 13 (2) ◽  
pp. 741
Author(s):  
Wirat Krasachat ◽  
Suthathip Yaisawarng

To overcome the challenging food safety and security problem, in 2003, the Thai government initiated ‘Good Agricultural Practices’ (GAP) technology. This paper used a sample of 107 small chili farms from the Chiyaphoom province for the 2012 crop year, and data envelopment analysis (DEA) meta-frontier directional distance function technique to answer two questions: (1) Are GAP-adopting farms, on average, more efficient than conventional farms? (2) Does access to GAP technology affect farmers’ decisions to adopt GAP technology? We also developed an ‘indirect’ approach to reduce the potential sample selection bias for small samples. For the dry-season subsample, GAP farms were more technically efficient when compared with non-GAP farms. These dry-season non-GAP farms may not adopt the GAP method because they have limited access to GAP technology. For the rainy-season subsample, on average, GAP farms were more efficient than non-GAP farms at the 5% level. Access to the GAP technology is not a possible reason for non-GAP rainy season farms to not adopt the GAP technology. To enable sustainable development, government agencies and nongovernmental organizations (NGOs) must develop and implement appropriate educational and training workshops to promote and assist GAP technology adoption for chili farms in Thailand.


2013 ◽  
Vol 846-847 ◽  
pp. 1628-1631
Author(s):  
Song Jie Gong ◽  
Lin Di Jin

With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.


2014 ◽  
Vol 707 ◽  
pp. 458-461 ◽  
Author(s):  
Dong Ming Zhao ◽  
Kai Feng Zhu

Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2021 ◽  
Vol 58 (3) ◽  
pp. 302-323
Author(s):  
Jyri J. Jäntti ◽  
Benjamin Klasche

The European Union (EU)–Turkey deal consolidated a shift in the EU’s migration policy. The deal is the culmination of the dominance of the security frame and depicts the continuous externalization of the EU’s responsibility of asylum protection and burden sharing. The strengthening of the security frame has weakened the humanitarian norms that previously dictated EU’s behaviour. This has led to the EU losing some of its comparative advantages in negotiations. Simultaneously, the instrumentalization of the value of asylum, paired with an increased number of asylum seekers, has given negotiation leverage to the neighbouring countries turned service providers. These changes in perception and norms have created a power shift, at the disadvantage of the EU, creating a more leveled playing field for negotiations between the parties. This article tracks the historical shifts in the global refugee regime to explain how today’s situation was created. Hereby, the existence of two competing cognitive frames—humanitarian and security—is assumed, tracked and analysed. While looking at the EU–Turkey deal, the article shows that the EU has started treating refugees as a security problem rather than a humanitarian issue, breaking the normative fabric of the refugee regime in the process. The article also displays how Turkey was able to capitalise on this new reality and engage with negotiations of other neighbouring countries of EU that point towards a change of dynamics in the global refugee regime.


2021 ◽  
Vol 2019 (1) ◽  
pp. 81-92
Author(s):  
Nils Zurawski

Zusammenfassung: War die Welt früher wirklich sicherer, gab es weniger Gewalt, und war die Jugend friedlicher? Die entsprechende Krisenfeststellung mit Blick auf die Gegenwart erfordert eine Entgegnung. Der Aufsatz diskutiert die Konsequenzen aus solchen Bildern und Wahrnehmungen, in denen Jugend als ein Sicherheitsproblem konstruiert wird. Eine solche Rahmung hat Folgen, die sowohl im Umgang mit Jugendlichen als auch in der Kommunikation zwischen gesellschaftlichen Gruppen problematische Auswirkungen haben kann. Es werden die Begriffe Sicherheit und Gewalt als solche kritisch diskutiert und ihre Verwendung im Hinblick auf eine Jugend untersucht, von der, so wird behauptet, eine Gefahr für die gesellschaftliche Sicherheit ausgehen soll.Abstract: Has the world really been safer in the past? Was there less violence and youth more peaceful? Such a crisis oriented diagnosis of the present demands an objection. The article discusses the consequences of such images and perceptions, in which youth is constructed as a security problem. This kind of framing has further implications for both, regarding relations towards young people, as well as concerning the communication between social groups in general. The article critically discusses the concepts of security and violence respectively and takes a look at how these are used to deal with a youth which is said to threaten society’s security.


Sign in / Sign up

Export Citation Format

Share Document