Suggested Topics within your search.
Suggested Topics within your search.
- Economic aspects 2
- Leadership 2
- Public-private sector cooperation 2
- Trusts and trustees 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Administrative law 1
- Agricultural industries 1
- Agriculture 1
- Business networks 1
- Civil law 1
- Climate Change 1
- Community development 1
- Digital techniques 1
- Digitale Photographie 1
- Domestic relations 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Education, Higher 1
- Ego (Psychology) 1
- Environmental Health 1
- Equity 1
- Evaluation 1
- Families 1
- Fiction 1
- Foreign trade regulation 1
- General 1
- Hastings, Stanley (Fictitious character) 1
- Health insurance 1
- Health insurance claims 1
-
2961
Education in the Arab Countries. from the Depth of Centuries to Our Days
Published 2014-04-01“…Among the ways of getting an education in that period, along with domestic education and private tutorials, there were two-level religious schools and military training. …”
Get full text
Article -
2962
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01“…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
Get full text
Article -
2963
Legal basis for ensuring public security and order at the regional level and the place of administrative and legal norms among them
Published 2022-12-01“…It has been noted that ensuring public security and order is the State's prerogative and involves an inevitable clash of public and private interests. At the same time, the specifics of the region and the variety of relations that arise within it are based on the norms of many branches of law, the key place among which belongs to administrative law. …”
Get full text
Article -
2964
Energy Transitions in Cities: A Comparative Analysis of Policies and Strategies in Hong Kong, London, and Melbourne
Published 2024-12-01“…Recommendations include developing benchmarking strategies, fostering public–private partnerships, and investing in education. …”
Get full text
Article -
2965
Impact of Emergency Remote Teaching on Student Anxiety:
Published 2024-12-01“…Using a mixed-methods approach, this study described students’ perceptions of emergency remote teaching (ERT) at a private Seventh-day Adventist higher education institution in Southern Africa and the relationship between their ERT experience and general anxiety levels. …”
Get full text
Article -
2966
Les énergies renouvelables face à leur territorialisation : une mise en parallèle France-Allemagne par les systèmes d’acteurs
Published 2023-09-01“…The study also showed that a plurality of institutional and noninstitutional actors – private or public actors as well as citizens – took part in the territorialization dynamics at work in renewable energy projects. …”
Get full text
Article -
2967
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01“…Furthermore, the smaller-scale TAD-GP model outperforms larger models across multiple datasets, demonstrating its practical potential in environments with constrained computational resources and requirements for private deployment. This method addresses a critical gap in research on anomaly detection in cybersecurity, specifically using small-scale open-source models.…”
Get full text
Article -
2968
Évolution de l’occupation et de l’utilisation du sol entre 1973 et 2010 dans la zone agropastorale du lac de Guiers (Sénégal)
Published 2016-05-01“…Satellite based mapping techniques have been used and complemented by field verifications, During the period under review, we have witnessed an increase in stretches of water by 14,9 %, aquatic vegetation by 17,5 %, industrial and private agricultural holdings respectively by 207,5 and 5508,8 % and a decrease of shrub-steppe and grassy-steppe of 69,9 and 64,3 %. …”
Get full text
Article -
2969
Mobility Crowdsourcing: Toward Zero-Effort Carpooling on Individual Smartphone
Published 2013-02-01“…In this paper, we present the idea of Mobility Crowdsourcing (MobiCrowd), which leverages private smartphone to collect individual trips for carpooling, without any explicit effort on the part of users. …”
Get full text
Article -
2970
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01“…These channels serve as off-chain pathways connecting users from different business chains, thereby facilitating private and scalable cross-chain transactions. Secondly, a collusion-resistant cross-chain transaction protocol based on game-theoretic incentives was designed, stimulating distrust among colluders to deter cross-chain collusion and uphold transaction security. …”
Get full text
Article -
2971
Teaching of health-related physical activity in medical schools: the Brazilian scenario
Published 2020-03-01“…This proportion was higher in public Medical schools compared to private ones (21.5% vs. 5.4%; p = 0.002). Teaching of health-related physical activity in Brazilian Medicine courses is scarce. …”
Get full text
Article -
2972
Designing a Digital Platform to Enhance Financial Literacy and Sustainability of Tahfiz Institutions
Published 2025-02-01“…Many Tahfiz Institutions in Malaysia, particularly Private Tahfiz Institutions (PTIs), face considerable financial management challenges stemming from limited financial literacy among their administrators and stakeholders. …”
Get full text
Article -
2973
Exploring computational thinking, executive functions, visuospatial skills and experiences with toys in early childhood: Protocol for a controlled trial
Published 2025-06-01“…Participants will be preschool children aged 5 to 6 years from both public and private institutions. The intervention will involve a new educational robotics device called ROVERSA and will consist of eight sessions distributed over four weeks, with the experimental group placed on a waitlist. …”
Get full text
Article -
2974
Liability For Damage Based On The Processing Of Biometric Data Through Video Surveillance Of Residential Buildings Against The Provisions Of The General Data Protection Regulation...
Published 2024-07-01“…The subject of the article is liability for non-property damage arising from the processing of biometric data through video surveillance of residential buildings, for private purposes, contrary to the provisions of the General Data Protection Regulation and the General Data Protection Regulation Implementation Act. …”
Get full text
Article -
2975
‘Buzz-and-Pipeline’ Dynamics in AI Innovation Network: A Case Study of Zhangjiang National Innovation Demonstration Zone, Shanghai
Published 2025-01-01“…The government has played a pivotal role in propelling the accelerated growth of China’s AI industry, particularly through the backing of pioneering AI private enterprises and the calibration of the potential inefficiencies associated with a state-led model with the dynamism of market forces. …”
Get full text
Article -
2976
Networked Control System for the Guidance of a Four-Wheel Steering Agricultural Robotic Platform
Published 2012-01-01“…In a joint project among research institutions and a private company in Brazil a multifunctional robotic platform for information acquisition in PA is being designed. …”
Get full text
Article -
2977
A Choice Behavior Model of Bike-Sharing Based on User Perception, Psychological Expectations, and Loyalty
Published 2022-01-01“…Providing high-quality services is essential to promoting the usage of bike sharing and to reducing traffic congestion by shifting people away from private car use. This research explores the factors that influence users’ selection of bike sharing as a transportation mode by identifying and describing relationships to user perception, psychological expectations, and loyalty. …”
Get full text
Article -
2978
Legislation on the Protection of Personal Data: Uncertainty vs Specification
Published 2023-09-01“…With the help of general scientific approaches — systemic, genetic; methods of analysis and synthesis, induction and deduction, as well as private-scientific one — formal-legal method, the study focuses on the technical and legal tools that are used for normative fixation of the definition of personal data and the requirements imposed on the operator of personal data. …”
Get full text
Article -
2979
Mixed signal modulation recognition method based on temporal depth residual shrinkage network
Published 2024-10-01“…Testing on both public and private datasets demonstrates that the proposed method outperforms five state-of-the-art approaches, achieving an average recognition and classification accuracy of 92.7% under high signal-to-noise ratio conditions. …”
Get full text
Article -
2980
The majlis campaign of Muslims in the Volga-Ural region at the beginning of the Revolution of 1905–1907
Published 2020-02-01“…., meetings of local residents held in private houses, public catering places, hotels, where the discussion of pressing local or social issues took place – in the Volga-Ural region at the beginning of the Revolution of 1905–1907 was analyzed in this paper. …”
Get full text
Article