Suggested Topics within your search.
Suggested Topics within your search.
- Economic aspects 2
- Leadership 2
- Public-private sector cooperation 2
- Trusts and trustees 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Administrative law 1
- Agricultural industries 1
- Agriculture 1
- Business networks 1
- Civil law 1
- Climate Change 1
- Community development 1
- Digital techniques 1
- Digitale Photographie 1
- Domestic relations 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Education, Higher 1
- Ego (Psychology) 1
- Environmental Health 1
- Equity 1
- Evaluation 1
- Families 1
- Fiction 1
- Foreign trade regulation 1
- General 1
- Hastings, Stanley (Fictitious character) 1
- Health insurance 1
- Health insurance claims 1
-
2521
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01“…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
Get full text
Article -
2522
Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
Published 2014-01-01“…Data mining is traditionally adopted to retrieve and analyze knowledge from large amounts of data. Private or confidential data may be sanitized or suppressed before it is shared or published in public. …”
Get full text
Article -
2523
Reasons Behind the Migration of Highly Qualified Employees from Turkiye: The Case of Software Developers and Engineers
Published 2023-12-01“…They express that companies in their destination countries respect their work, private lives, and individuality. To address this issue, Turkish companies can consider measures such as assisting key employees in purchasing houses and cars, as well as supporting their families’ education and healthcare expenses, to ensure long-term loyalty. …”
Get full text
Article -
2524
Attribute generalization mix-zone based on multiple secure computation
Published 2019-04-01“…In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks,based on the conception of attribute generalization and the methods of homomorphic encryption,a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed.The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent,and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end.With the help of fully attribute generalization,this method can solve the problem of users can be tracked by the potential attributes,and at the same time the privacy calculation also does not reveal any information to participants,so this method can prevent the disguised attacker that obtains user’s information in mix-zone.At last,in order to demonstrate the superiority of the proposed method in both of academically and practicality,the security analysis and experimental verification are given,and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method.…”
Get full text
Article -
2525
O impacto da realização da Copa das Confederações da FIFA de 2013 e da Copa do Mundo da FIFA de 2014 na criminalidade em Belo Horizonte
Published 2017-10-01“…This article examines, from a comparative basis the geographical incidence of robberies, thefts and damage to public and private property in Belo Horizonte, taking into account the recent historical evolution of crimes that occur during major events. …”
Get full text
Article -
2526
Mapping Antibiotic-Resistant Neisseria Gonorrhoeae Isolates in Metropolitan Toronto: Issues of Scale, Positional Accuracy and Confidentiality
Published 1997-01-01“…The reporting locations of N gonorrhoeae isolates submitted from hospitals, doctor’s offices, private and provincial laboratories, and sexually transmitted disease (STD) clinics were used as a model. …”
Get full text
Article -
2527
Parameter Evaluation for a Statistical Mechanical Model for Binary Choice with Social Interaction
Published 2019-01-01“…The model has a social and a private incentive part with coefficients measuring the influence individuals have on each other and the external influence on individuals, respectively. …”
Get full text
Article -
2528
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Published 2019-02-01“…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
Get full text
Article -
2529
Crimillegal Orders: Revisiting Organized Crime’s Political Power
Published 2016-05-01“…Taking recourse to the conceptions of political order put forward by Weber, Fukuyama and North, Wallis and Weingast, I explain how regular patterns of social exchange and interaction - involving public and private, and state and non-state actors - that span an assumed divide between the realms of legality (“legitimate upper world”) and criminality (“illegitimate underworld”) influence the character, shape and evolution of political order. …”
Get full text
Article -
2530
Mathematical Modeling of the Propagation of Democratic Support of Extreme Ideologies in Spain: Causes, Effects, and Recommendations for Its Stop
Published 2013-01-01“…By considering the dynamic subpopulations transits built throughout data obtained from public and private prestigious institutions and sociopolitical analysis, a system of difference equations models the electoral population behavior in Spain allowing us to compute the expected electoral support in the time horizon of January 2016. …”
Get full text
Article -
2531
Parenting Styles and the Development of Socio-Emotional Regulation Skills in Preschool Children
Published 2024-10-01“…Two hundred (200) Preschool respondents were randomly selected from ten (10) pre-primary schools; five (5) public and five (5) private schools. Parenting Styles Questionnaire (PSQ) and a self-Constructed Rating Scale for preschool Children's Socio-Emotional Rating Scale (PCSRS) were used to elicit information about the preschool parents' parenting styles and the rate scale for evaluation about their Socio-Emotional Skills displayed in the classroom. …”
Get full text
Article -
2532
Pouvoir et opposition en Algérie : vers une transition prolongée ?
Published 2009-11-01“…The opening initiated by the authorities between 1989 and 1991 resulted in the emergence of a pluralistic and dynamic opposition, able to express itself through sixty “political associations” and dozens of private and public newspapers. In practice, often intense and conflicting political debates were conveyed through demonstrations and rallies, thus providing an assessment of public opinion. …”
Get full text
Article -
2533
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01“…Although blockchain-based anonymous reputation systems have been discussed, permissioned blockchains are susceptible to Sybil attack vulnerabilities, while permissionless private blockchains do not provide full anonymity. …”
Get full text
Article -
2534
Estado y representación política en Brasil
Published 2008-11-01“…The difficulty faced by the political parties in taking root amidst society may have been caused by the strategic role played by the federal government, which generated the supremacy of the Executive branch over the Legislative, which in turn allowed the State’s permeability to private interests. The Brazilian parties are currently viewed as lacking discipline and representativeness. …”
Get full text
Article -
2535
Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
Published 2017-01-01“…In this paper, we propose an efficient private circular query protocol (EPCQP) with high accuracy rate and low computation and communication cost. …”
Get full text
Article -
2536
Integrating Logistics and Information Systems in Urban Waste Management: The Road to a Sustainable Smart City
Published 2025-01-01“…This article also highlights the need for coordinated cooperation between the public and private sectors, as well as the importance of a legislative framework that promotes technological innovation and environmental sustainability. …”
Get full text
Article -
2537
How does the wealth level of nations affect their COVID-19 vaccination plans?
Published 2023-11-01“…In this context, manifold countries are implementing restrictions and bureaucratic rules, such as green pass/vaccine reports, to boost vaccination levels by regulating various public and private life aspects that potentially impact individuals' well-being. …”
Get full text
Article -
2538
Homomorphic encryption location privacy-preserving scheme based on Markov model
Published 2017-01-01“…Meanwhile, the computability and confidentiality of homomorphic encryption ciphertext were used to realize the statistical analysis of cipher-text-oriented data and the secure storage of private data.…”
Get full text
Article -
2539
Human rights to Internet access and its safe use
Published 2022-09-01“…The methodological and theoretical basis of the research are private and general scientific approaches to the study of this topic. …”
Get full text
Article -
2540
Du sol foncier au sol vivant
Published 2022-12-01“…This article is based on our practice of urban planning and landscape projects with public and private sector clients. We start by proposing a new representation of the soil as a tool in landscape architecture: the "land" becomes "living soil". …”
Get full text
Article