Showing 2,201 - 2,220 results of 4,865 for search '"privateering"', query time: 0.07s Refine Results
  1. 2201

    Les fonds souverains : un nouveau mode de régulation du capitalisme financier ? by Bertrand Blancheton, Yves Jégourel

    Published 2009-06-01
    “…Nevertheless, a sharper analysis of strategies conducted by SWFs shows that some of them are opportunistic, comparable to the strategies implemented by private institutional investors.…”
    Get full text
    Article
  2. 2202

    Detection Metbod of Trojan's Control Domain Based on Improved Neural Network Algoritbm by Aijiang Liu, Changhui Huang, Guangjun Hu

    Published 2014-07-01
    “…Secondly, based on the analysis of static and dynamic characters for Trojan domain name, eight indicators were obtained as the input of BP neural network algorithm, including operation time of domain name, the period to visit the domain name, the variation speed of IP address, the country change of IP address, IP address of private address, the same domain name with multiple IP address for different countries, TTL value and search times of domain name. …”
    Get full text
    Article
  3. 2203

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    “…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
    Get full text
    Article
  4. 2204

    Causes Inhibiting Proactive Behavior of University Staff: Focusing on the Impact of Contextual Factors in University Organizations by Yuya HORIKAWA

    Published 2024-11-01
    “…This suggests that university staff are not as encouraged to take proactive behavior by their organizations as employees in private companies, and there are contextual factors that make it difficult for them to take action. …”
    Get full text
    Article
  5. 2205

    Que tout change pour que rien ne change ? Aux origines de la judiciarisation de l’exécution des peines en France (1789-1958) by Marc Renneville

    Published 2015-09-01
    “…Le débat sur les conditions d’application des peines privatives de liberté accompagne l’essor de ce type de peines au XIXe siècle. …”
    Get full text
    Article
  6. 2206

    A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography by Haibao Zhang, Wenbao Jiang, Jin Ding

    Published 2024-12-01
    “…This paper proposes a novel admission control mechanism based on identity-based cryptography, utilizing multi-level anonymous identifiers and decentralized private key generation to enhance user authentication and privacy. …”
    Get full text
    Article
  7. 2207

    THE PERCEPTIONS OF CLERGY ON DOMESTIC VIOLENCE: A PERSPECTIVE FROM THE KWAZULU-NATAL MIDLANDS by S. Mahomva, I.M. Bredenkamp, W.J. Schoeman

    Published 2020-12-01
    “… The issue of domestic violence is not a private matter. It inadvertently affects all members of society, including service professionals who assist victims and perpetrators. …”
    Get full text
    Article
  8. 2208

    Corporate Social Responsibility Disclosure, Debt Financing Costs, and Innovation Capacity by Yang Miao, Xiaoxue Zhou, Xin Dai

    Published 2021-01-01
    “…The challenges of financing have been troubling the development of Chinese enterprises, especially private enterprises. This paper aims to examine the antecedents and consequences of debt financing costs. …”
    Get full text
    Article
  9. 2209

    The Global Finical Crisis from an Islamic Point Of View by Hewa Majeed Zangana

    Published 2021-04-01
    “…Issues that will be discussed in this paper are Riba, Gambling, Uncertainty, Derivatives, Saucerization, Sell of debt, Creation of Money, and the Private “Personal” interests. However, the paper will focus on the Islamic financial system and the financial instruments which are based and designed in compliance with Shariah Rules and Regulations, whether if practicing Islamic banking would cause such a crisis to accrue. …”
    Get full text
    Article
  10. 2210

    Selection and Evaluation of Electronic Resources by Doğan Atılgan, Yusuf Yalçın

    Published 2013-11-01
    “…In this article, after a general introduction about selection and evaluation processes of electronic publications, the subscribed databases by a state and a privately owned university in Turkey and their usage were examined.…”
    Get full text
    Article
  11. 2211

    Research and design in dual network scheme of power corporation based on network isolation and secure data exchange by Jing WANG, Kunlun GAO, Bo ZHANG

    Published 2017-02-01
    “…It is a common concern for power enterprises of how to ensure the safety and stability of power production management and information network for group-oriented power generation enterprises.The dual-network architecture of group-type power generation enterprise was designed based on network isolation and the safe data exchange technology.Based on the protection of network security isolation,the private protocol interaction technology was introduced to meet the growing business development needs of power enterprises.The overall technical route of logical strong isolation was proposed,the design scheme of construction of information internal and external network,the application and deployment,and information exchange in typical application scenarios was put forward.In addition,in order to realize the centralized monitoring and unified protection after isolation,the design scheme of deploying unified monitoring,unified anti-virus,unified terminal management and unified authentication system was put forward.…”
    Get full text
    Article
  12. 2212

    THE INSTITUTION OF LIABILITY FOR ENVIRONMENTALOFFENSES: SYSTEMIC DEFICIENCIES AND JUDICIAL PRACTICE by NIKISHIN Vladislav Vasilievich

    Published 2024-12-01
    “…There is a need for a proper analysis of the correlation between public and private foundations of legal regulation of relations in the area of liability for environmental damage. …”
    Get full text
    Article
  13. 2213

    Vers une prévention intégrée du risque chimique lié à l’exposition cutanée au bitume des travailleurs de la route. Élaboration d’une méthodologie dans le cadre de l’ergotoxicologie... by Nathalie Judon, Florence Hella, Pierrick Pasquereau, Alain Garrigou

    Published 2015-12-01
    “…On the basis of the discussions about the work activity, it was also possible to ascertain the operators’ representations in their private lives. A combined, collective effort to adapt these representations could provide the leverage needed to successfully transform chemical risk prevention practices.…”
    Get full text
    Article
  14. 2214

    From economics to health outcomes: Delving into the significance of reduced insulin prices by M Leuschner, M Strydom, V Steenkamp

    Published 2024-08-01
    “…Despite efforts by the public and private sectors, insulin therapy initiation is delayed, impacting long-term outcomes. …”
    Get full text
    Article
  15. 2215

    Homemade Inflation Risks by Stefan Kooths

    Published 2022-06-01
    “…Governments responded by running huge fiscal deficits (financed via central banks) to support firms and consumers, thereby injecting purchasing power into the private sector on a large scale. With no corresponding production of goods and services, these phantom incomes are by their very nature inflationary. …”
    Get full text
    Article
  16. 2216

    Herbicides Registered for Pine Management in Florida – 2005 Update by Anna Osiecka, Jarek Nowak, Alan Long, Mark Mossler

    Published 2005-07-01
    “…Since an increasing number of private and public owners manage their forestlands for non-commodity purposes, herbicides that are intended mostly for turf and/or landscape maintenance, but also labeled for forestry, have been included as well. …”
    Get full text
    Article
  17. 2217

    Intestinal Obstruction and Ileocolic Fistula due to Intraluminal Migration of a Gossypiboma by Evangelos Margonis, Dionysia Vasdeki, Alexandros Diamantis, Georgios Koukoulis, Grigorios Christodoulidis, Konstantinos Tepetes

    Published 2016-01-01
    “…Six months ago she had undergone a cesarean section in a private clinic. Computed tomography revealed a high-density mass occupying a portion of the intestinal lumen, which was reported as a “calcified parasite.” …”
    Get full text
    Article
  18. 2218

    Topographie, urbanisme et gestion des réseaux d’eau à Autun/Augustodunum (Saône-et-Loire) : une nouvelle image de la capitale de cité by Laetitia Borau

    Published 2015-12-01
    “…This work highlights, for the first time in its context, the town’s water supply system, unknown until now, which consists in wood or lead pipes, the importance of urban amenities, especially private fountains, and the density of the sewer system which takes nearly half of the corpus. …”
    Get full text
    Article
  19. 2219

    Les arts communautaires : des pratiques de résistance artistique interpellées par la souffrance sociale by Ève Lamoureux

    Published 2010-01-01
    “…This type of resistance violates the modern principle linking public space with political action because it contests the strict separation between private and public, it foregrounds particular experiences, and it proposes alternative forms of political deliberation. …”
    Get full text
    Article
  20. 2220

    Scale of Organizational Structure Components (SOCS): Evidence of Validation of a Theoretical Model by Leandro Trigueiro-Fernandes, Joyce Mariella Medeiros Cavalcanti, Marcelo Victor Alves Bila, Miguel Eduardo Moreno Añez

    Published 2022-01-01
    “…The survey was conducted in 26 public and private organizational units. Confirmatory Factor Analysis was employed to assess the SOSC model properties and whether they fit the theory. …”
    Get full text
    Article