security and protection
Recently Published Documents


TOTAL DOCUMENTS

186
(FIVE YEARS 68)

H-INDEX

5
(FIVE YEARS 1)

2022 ◽  
pp. 1-18
Author(s):  
Daniel Ruzza ◽  
Gabriele Bernasconi ◽  
Pietro De Giovanni

This chapter analyses the blockchain implemented by Genuino in the collectibles industry. Since collectibles are subject to high risk of counterfeiting and fake replications, blockchain technology can help substantially to ensure transparency, originality, ownership, and data security and protection. Two methods to use blockchain in the industry seem to be the most widespread today: creating digital native collectibles on blockchain and transposing physical objects into the blockchain by creating digital twins. By using blockchain, new consumer clusters emerge, highlighting the need to modernize both the traditional economies and the current business models.


2021 ◽  
Vol 11 (3) ◽  
pp. 254-269
Author(s):  
Rusi Marinov

The study focuses on the semantic aspects of information, the role of cognitive technologies in the time of information defense, the emergence of new concepts related to information security and protection, cybersecurity, and resilience. It can be argued that information is a complex quantity; measuring information means measuring complexity. Artificial intelligence and problem areas related to this area are also the subject of analysis. We are also looking for an answer to the link between cybernetics and cyber technology and to the popular term “cyber” that has recently become buzzword. Another aspect of the study is various models of data structuring and information protection from the point of view of modern strategies.


Author(s):  
Harsh Kumar Jha ◽  
Durgesh Sahu ◽  
Dr. Mohammed Bakhtawar Ahmed

Blockchain Technology has gotten a great deal of consideration from both industry and the scholarly world due to its decentralized, persistency, namelessness and auditability properties. In this review, utilization of Blockchain innovation in wide applications region and its execution challenges have been finished. A thorough quest for diary/research article identified with Blockchain innovation have been checked on. We have considered five data sets to lead this study specifically Science direct, IEEE Xplore, Web of Science, ACM Digital Library and Inderscience are being utilized. After starting stage end 135 examination articles are considered in last data sets for the overview. Principle focal point of the review is to give an extensive examination on wide utilizations of Blockchain innovation for the scholastic exploration local area. In this paper difficulties in carrying out of Blockchain and its related security and protection issues have been talked about. Interestingly a study of this sort have been done where Blockchain with application and its related security and protection issue have been inspected.


Computers ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 116
Author(s):  
Michail Feidakis ◽  
Christos Chatzigeorgiou ◽  
Christina Karamperi ◽  
Lazaros Giannakos ◽  
Vasileios-Rafail Xefteris ◽  
...  

This paper presents “DESMOS”, a novel ecosystem for the interconnection of smart infrastructures, mobile and wearable devices, and applications, to provide a secure environment for visitors and tourists. The presented solution brings together state-of-the-art IoT technologies, crowdsourcing, localization through BLE, and semantic reasoning, following a privacy and security-by-design approach to ensure data anonymization and protection. Despite the COVID-19 pandemic, the solution was tested, validated, and evaluated via two pilots in almost real settings—involving a fewer density of people than planned—in Trikala, Thessaly, Greece. The results and findings support that the presented solutions can provide successful emergency reporting, crowdsourcing, and localization via BLE. However, these results also prompt for improvements in the user interface expressiveness, the application’s effectiveness and accuracy, as well as evaluation in real, overcrowded conditions. The main contribution of this paper is to report on the progress made and to showcase how all these technological solutions can be integrated and applied in realistic and practical scenarios, for the safety and privacy of visitors and tourists.


2021 ◽  
Vol 12 ◽  
Author(s):  
Nikolay Bonev ◽  
Vanya Matanova

In modern literature, the body image is interpreted as a multidimensional construct, which is considered important for both individual development and quality of life. The body image is central to the self-concept and has important consequences for mental functioning. A negative body image can result in adverse psychosocial consequences for both sexes. For a long time in the professional literature the study of socio-cultural factors on the development of the body image has prevailed. This line of research creates social constructivism, in which the earliest attachment relations are eliminated, and instead the idea is suggested that external sources have a direct influence. The present text proposes an approach to the body image as a development construct, arising and developing in the attachment relations, related to the provision of security and protection. Attachment disturbances, as well as attachment disorganization, are defined as the inability to provide security and protection. Attachment relationships in connection with the development of body image develop through the mechanisms of reflection, sensitive responses to the child’s signals and synchronous relationships. In the first months of human life, the attachment needs are first and foremost the needs of the body, which are satisfied by the responses of the primary caregiver. The topic of body image discusses attachment disorganization, the understanding of attachment trauma, and the “enactment” of the loss on the body’s territory. Trauma always involves loss. Griefs that cannot be mourned and injuries that cannot be represented seem to be central to understanding the body’s problematization.


2021 ◽  
pp. 231-253
Author(s):  
Asik Rahaman Jamader ◽  
Puja Das ◽  
Biswaranjan Acharya ◽  
Yu-Chen Hu

Author(s):  
Mustopa Husein Lubis ◽  
S Sumijan

Crime is all kinds of actions and actions that are economically and psychologically harmful that violate the laws in force in the State of Indonesia as well as social and religious norms. Ordinary criminal acts affect the security of the community and endanger their lives and minds. The research location is the Asahan Police which is an agency that can provide security and protection for the community, especially those in Asahan Regency. The problem that occurs in this location is that there is no prediction system in Asahan Regency, due to the lack of knowledge factor in processing crime rate data. So it is difficult to know how much increase or decrease in criminal cases committed at the Asahan Police. The data used is data on cases of murder, sexual monitoring, tracing, violent theft, weight theft, motorcycle theft, fraud and counterfeiting money for the last 5 years in 2016 as many as 2020. Based on these problems, create a system for the crime rate in the Regency. Asahan to anticipate future crimes. The system that will be made uses forecasting or forecasting. With the Single Moving Average forecasting method. The Single Moving Average method is a forecast for the time in the future. The results of the calculation of criminal acts in 2021 found that there were 3 cases of murder, 2 cases of sexual intercourse in 2021, 252 cases of the 2021 return, 27 cases of violent theft in 2021, and 348 cases of bicycle theft in 2021. motorbikes in 2021 which open 90 cases, in 2021 which opens 85 cases, and money counterfeiting in 2021 which opens 1 case.


2021 ◽  
Author(s):  
Poonam Poonia ◽  
Pawan K. Ajmera

Abstract Biometric systems proven to be one of the most reliable and robust method for human identification. Integration of biometrics among the standard of living provokes the necessity to vogue secure authentication systems. The use of palm-prints for user access and authentication has increased in the last decade. To give the essential security and protection benefits, conventional neural networks (CNNs) has been bestowed during this work. The combined CNN and feature transform structure is employed for mapping palm-prints to random base-n codes. Further, secure hash algorithm (SHA-3) is used to generate secure palm-print templates. The proficiency of the proposed approach has been tested on PolyU, CASIA and IIT-Delhi palm-print datasets. The best recognition performance in terms of Equal Error Rate (EER) of 0.62% and Genuine Acceptance Rate (GAR) of 99.05% was achieved on PolyU database.


Sign in / Sign up

Export Citation Format

Share Document