Showing 2,181 - 2,200 results of 4,865 for search '"privateer"', query time: 0.07s Refine Results
  1. 2181

    La bibliothèque de ʿAbd al-Ḥayy Kattānī by Ilyass Amharar

    Published 2021-12-01
    “…He was the leader of a Brotherhood and also involved in politics; his involvement in the attempted impeachment of Muḥammad V precipitated his exile to Nice, where he passed away in 1962, shortly after having had his possessions confiscated, among which was one of the most prestigious private collections in Morocco, if not in the whole of the Arab world: the Maktaba kattāniyya. …”
    Get full text
    Article
  2. 2182

    A Review of the Book How Can Art Change Your Life? by Alireza Taheri, Batool Maazallahi

    Published 2020-08-01
    “…By explaining the problems of the audience in dealing with art, they explain that art as a tool will be able to act as an effective tool against many of the hardships of the contemporary era, both in the private sphere and at the general level.…”
    Get full text
    Article
  3. 2183

    Privacy-preserving image processing in cloud computing by Kui REN

    Published 2016-01-01
    “…In fact, once uploaded to the cloud, the security of us-ers’ private information purely depends on the reliability of the cloud service providers (CSP). …”
    Get full text
    Article
  4. 2184

    Le Congrès culturel de La Havane (1968) : point de bascule de l’engagement français envers la révolution cubaine by Rafael Pedemonte

    Published 2024-12-01
    “…Based on unpublished primary sources (private collections, diplomatic archives, interviews), this article examines a key moment for French commitment to Cuba’s revolutionary project: the Cultural Congress of Havana of January 1968, an international conference that gathered around 500 foreign guests, including nearly 80 French intellectuals. …”
    Get full text
    Article
  5. 2185

    Les unités pastorales du Sahel sénégalais, outils de gestion de l’élevage et des espaces pastoraux by Abdrahmane Wane, Véronique Ancey, Basile Grosdidier

    Published 2013-01-01
    “…Even if the pastoral units as tools of the natural resource management have demonstrated their interest in many cases of the first stage of the project in the pastoral area, it seems that, in the present Senegalese context of the agricultural and land sectoral policy of private monopolizing of resources, the systematic general implementation of the pattern of pastoral units throughout the whole country would be likely to threaten the sustainability of the pastoral mobility.…”
    Get full text
    Article
  6. 2186

    Survey on privacy protection in non-aggregated data sharing by Youhuizi LI, Yuyu YIN, Honghao GAO, Yi JIN, Xinheng WANG

    Published 2021-06-01
    “…Although there is a great value hidden in the massive data, it can also easily expose user privacy.Aiming at efficiently and securely sharing data from multiple parties and avoiding leakage of user private information, the development of related research and technologies on the non-aggregated data sharing field was introduced.Firstly, secure multi-party computing and its technologies were briefly described, including homomorphic encryption, oblivious transfer, secret sharing, etc.Secondly, the federated learning architecture was analyzed from the aspects of source data nodes and transmission optimization.Finally, the existing non-aggregated data sharing frameworks were listed and compared.In addition, the challenges and future potential research directions were summarized, such as complex multi-party scenarios, the balance between optimization and cost, as well as related security risks.…”
    Get full text
    Article
  7. 2187

    Triple receiver public key encryption cryptosystem by Liutao ZHAO, Lin ZHONG, Jidong LIU, Caiqun WANG, Dan WU

    Published 2020-12-01
    “…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
    Get full text
    Article
  8. 2188

    Processus de (re)territorialisation de l’héritage colonial by Romeo Carabelli

    Published 2025-01-01
    “…After questioning the appropriateness of imagining built heritage as a kind of actor able to catalyse the imaginary to interact with the surrounding space and society, the text sets out the two heritagization processes of these towns re-planned at the end of the twentieth century, recovering the archaeological sites with private and public strategies.…”
    Get full text
    Article
  9. 2189

    Teaching for Prosperity? Preparing American Studies Students for the Job Market by Anne Mørk

    Published 2024-12-01
    “…It discusses the evolution of American studies programs at Danish universities, particularly the University of Southern Denmark, in response to criticism regarding the applicability of humanities degrees in the private sector. The essay highlights curricular changes that emphasize practical skills, such as the inclusion of business courses and internships, while maintaining the interdisciplinary foundation of the program. …”
    Get full text
    Article
  10. 2190

    Accidental Insertion of a Broken Needle into the Pterygoid Mandibular Space during Inferior Alveolar Nerve Block: A Case Report by Kazuhiro Terada, Kenji Yamagata, Fumihiko Uchida, Satoshi Fukuzawa, Naomi Ishibashi-Kanno, Hiroki Bukawa

    Published 2022-01-01
    “…Here, we present the case of a 36-year-old woman who underwent dental extraction of the left lower wisdom tooth under local anesthesia at a private office. At that time, a disposable 33G needle was broken and accidentally inserted into the pterygomandibular space during IANB. …”
    Get full text
    Article
  11. 2191

    Democracia alimentar para populações em vulnerabilidade social: o caso de cozinhas solidárias em Manaus, Amazonas by Camila Lago Braga, Cristiane Cavalcante Lima

    Published 2024-06-01
    “…Following the COVID-19 pandemic, there has been a significant increase in collaboration between various public, private and civil organizations. These initiatives include solidarity kitchens, which are based on the principle of the Human Right to Adequate Food. …”
    Get full text
    Article
  12. 2192

    KPDR : An Effective Method of Privacy Protection by Zihao Shen, Wei Zhen, Pengfei Li, Hui Wang, Kun Liu, Peiqian Liu

    Published 2021-01-01
    “…Second, the relationship matrix is generated, and the proximity relationship between the user position and the target information point is obtained by calculation. Then, the private information retrieval model is applied to ensure the privacy of users’ target information points. …”
    Get full text
    Article
  13. 2193

    À qui sont ces martyrs ? by Sepideh Parsapajouh

    Published 2019-09-01
    “…These are sacrosanct public places attracting visits from ordinary citizens. They are also the private property of the martyrs’ families and a national heritage. …”
    Get full text
    Article
  14. 2194

    O envolvimento ativista como parte do “renomear o vivido”: reflexões sobre experiências femininas pelos ativismos populares by Cessimar de Campos Formagio

    Published 2019-01-01
    “…Public dialogues about social issues, made possible by activist meetings, may be a possibility of naming previously sensations that were previously confusing sensations and to strengthen dis-identification in relation to two social regulators present in neoliberal rationality: the discourses/ practices of privatization of public spaces and the family dispositive that centralizes domestic and family care responsibilities for women.…”
    Get full text
    Article
  15. 2195

    Sous les gölet, les forages. Infrastructures d’irrigation et trajectoires des territoires de l’eau dans la région d’Izmir (Turquie) by Selin Le Visage, Marcel Kuper

    Published 2019-12-01
    “…In the second village, private wells have made it possible to develop intensive horticulture, and this individual irrigation continues through the informal water use from the gölet. …”
    Get full text
    Article
  16. 2196

    Implementasi Pengelolaan Pariwisata Berkelanjutan Di Kota Semarang by Siauw Tiffani Setiono, Teuku Afrizal, Eko Supriyono, Rinaldy May Wendra, Annisa Nurfitriani

    Published 2021-01-01
    “…In its implementation, it replicates the Pentahelix model, which involves Government, Private, Community, Academic and mass media components. …”
    Get full text
    Article
  17. 2197

    Adaptive double auction mechanism for cloud resource allocation by Ding DING, Si-wei LUO, Li-hua AI

    Published 2012-09-01
    “…By integrating the auction mechanism in economic field into cloud,an adaptive double auction mechanism(ADAM) was proposed to allocate resources in cloud computing.Compared to traditional double auction mechanisms,ADAM traded cloud resource sellers and cloud resource buyers at their expected price and quantity,guaranteed the profits of all participants.Moreover,ADAM applied different auction rules in different cases to satisfy as more participants as possible.As a new mechanism for cloud resource allocation,ADAM was proved to be strategy-proof,weakly budget-balanced and individual rational even under the conditions that the price and quantity of participants were private information.Simulation results also confirm that ADAM outperforms the traditional one on both cloud user satisfaction degree and cloud resource utilization rate and is also economically efficient,especially as more users are involved in the auction market.…”
    Get full text
    Article
  18. 2198

    La traversée médiatique du simple soldat. À partir de l’œuvre de Bertrand Carrière by Johanne Villeneuve

    Published 2012-03-01
    “…This article deals with the intermediality of the soldier’s experience of war in Normandy, particularly through artistic and non-artistic forms of transmission: from the private gesture of writing embodied in a book, or a Website, to installation art and photography. …”
    Get full text
    Article
  19. 2199

    A cultura em questões by Caleb Faria Alves

    Published 2014-01-01
    “…Then we assess how the public and private sectors are articulated in the production and use of these data, keeping the focus on definitions. …”
    Get full text
    Article
  20. 2200

    Le jardinage amateur comme modèle pour une imagerie de l’espace public contemporain ? by Aurélien Ramos

    Published 2018-12-01
    “…Photographed and compiled by local authorities, these practices fundamentally renew the imagery of contemporary public spaces by introducing aesthetics previously confined to the private domestic garden. Based on the cases of the cities of Angers, Marseilles, Nantes and Paris, this article looks at the development of images of amateur gardening practices in public spaces, disseminated on the websites of these municipalities and on Instagram. …”
    Get full text
    Article