Showing 2,961 - 2,980 results of 4,865 for search '"privateering"', query time: 0.09s Refine Results
  1. 2961

    Education in the Arab Countries. from the Depth of Centuries to Our Days by E. V. Koukhareva

    Published 2014-04-01
    “…Among the ways of getting an education in that period, along with domestic education and private tutorials, there were two-level religious schools and military training. …”
    Get full text
    Article
  2. 2962

    Load-to-store: exploit the time leakage of store buffer transient window by Ming TANG, Yifan HU

    Published 2023-04-01
    “…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
    Get full text
    Article
  3. 2963

    Legal basis for ensuring public security and order at the regional level and the place of administrative and legal norms among them by R. V. Herasymchuk

    Published 2022-12-01
    “…It has been noted that ensuring public security and order is the State's prerogative and involves an inevitable clash of public and private interests. At the same time, the specifics of the region and the variety of relations that arise within it are based on the norms of many branches of law, the key place among which belongs to administrative law. …”
    Get full text
    Article
  4. 2964

    Energy Transitions in Cities: A Comparative Analysis of Policies and Strategies in Hong Kong, London, and Melbourne by Philip Wong, Joseph Lai

    Published 2024-12-01
    “…Recommendations include developing benchmarking strategies, fostering public–private partnerships, and investing in education. …”
    Get full text
    Article
  5. 2965

    Impact of Emergency Remote Teaching on Student Anxiety: by Conrad S. Zygmont, Charlene R. Reinecke, Daniel R. du Plooy

    Published 2024-12-01
    “…Using a mixed-methods approach, this study described students’ perceptions of emergency remote teaching (ERT) at a private Seventh-day Adventist higher education institution in Southern Africa and the relationship between their ERT experience and general anxiety levels. …”
    Get full text
    Article
  6. 2966

    Les énergies renouvelables face à leur territorialisation : une mise en parallèle France-Allemagne par les systèmes d’acteurs by Philippe Hamman, Marie Mangold, Céline Monicolle, Patricia Schneider

    Published 2023-09-01
    “…The study also showed that a plurality of institutional and noninstitutional actors – private or public actors as well as citizens – took part in the territorialization dynamics at work in renewable energy projects. …”
    Get full text
    Article
  7. 2967

    Efficient anomaly detection in tabular cybersecurity data using large language models by Xiaoyong Zhao, Xingxin Leng, Lei Wang, Ningning Wang, Yanqiong Liu

    Published 2025-01-01
    “…Furthermore, the smaller-scale TAD-GP model outperforms larger models across multiple datasets, demonstrating its practical potential in environments with constrained computational resources and requirements for private deployment. This method addresses a critical gap in research on anomaly detection in cybersecurity, specifically using small-scale open-source models.…”
    Get full text
    Article
  8. 2968

    Évolution de l’occupation et de l’utilisation du sol entre 1973 et 2010 dans la zone agropastorale du lac de Guiers (Sénégal) by Véronique M. Faye, Cheikh Mbow, Abou Thiam

    Published 2016-05-01
    “…Satellite based mapping techniques have been used and complemented by field verifications, During the period under review, we have witnessed an increase in stretches of water by 14,9 %, aquatic vegetation by 17,5 %, industrial and private agricultural holdings respectively by 207,5 and 5508,8 % and a decrease of shrub-steppe and grassy-steppe of 69,9 and 64,3 %. …”
    Get full text
    Article
  9. 2969

    Mobility Crowdsourcing: Toward Zero-Effort Carpooling on Individual Smartphone by Nianbo Liu, Yong Feng, Feng Wang, Bang Liu, Jinchuan Tang

    Published 2013-02-01
    “…In this paper, we present the idea of Mobility Crowdsourcing (MobiCrowd), which leverages private smartphone to collect individual trips for carpooling, without any explicit effort on the part of users. …”
    Get full text
    Article
  10. 2970

    Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus by JIA Xuedan, WANG Liangmin, HUANG Longxia

    Published 2024-11-01
    “…These channels serve as off-chain pathways connecting users from different business chains, thereby facilitating private and scalable cross-chain transactions. Secondly, a collusion-resistant cross-chain transaction protocol based on game-theoretic incentives was designed, stimulating distrust among colluders to deter cross-chain collusion and uphold transaction security. …”
    Get full text
    Article
  11. 2971

    Teaching of health-related physical activity in medical schools: the Brazilian scenario by Adriana Akemi Dourado, Pedro Rodrigues Curi Hallal, Marlos Rodrigues Domingues, Fernando Vinholes Siqueira

    Published 2020-03-01
    “…This proportion was higher in public Medical schools compared to private ones (21.5% vs. 5.4%; p = 0.002). Teaching of health-related physical activity in Brazilian Medicine courses is scarce. …”
    Get full text
    Article
  12. 2972

    Designing a Digital Platform to Enhance Financial Literacy and Sustainability of Tahfiz Institutions by Muhammad Imran Mohd Irsham, Nooraslinda Abdul Aris, Mira Susanti Amirrudin

    Published 2025-02-01
    “…Many Tahfiz Institutions in Malaysia, particularly Private Tahfiz Institutions (PTIs), face considerable financial management challenges stemming from limited financial literacy among their administrators and stakeholders. …”
    Get full text
    Article
  13. 2973

    Exploring computational thinking, executive functions, visuospatial skills and experiences with toys in early childhood: Protocol for a controlled trial by Carolina Robledo-Castro, Camilo Vieira Mejía, Jennifer Chiu

    Published 2025-06-01
    “…Participants will be preschool children aged 5 to 6 years from both public and private institutions. The intervention will involve a new educational robotics device called ROVERSA and will consist of eight sessions distributed over four weeks, with the experimental group placed on a waitlist. …”
    Get full text
    Article
  14. 2974

    Liability For Damage Based On The Processing Of Biometric Data Through Video Surveillance Of Residential Buildings Against The Provisions Of The General Data Protection Regulation... by Davorin Pichler

    Published 2024-07-01
    “…The subject of the article is liability for non-property damage arising from the processing of biometric data through video surveillance of residential buildings, for private purposes, contrary to the provisions of the General Data Protection Regulation and the General Data Protection Regulation Implementation Act. …”
    Get full text
    Article
  15. 2975

    ‘Buzz-and-Pipeline’ Dynamics in AI Innovation Network: A Case Study of Zhangjiang National Innovation Demonstration Zone, Shanghai by Yuanyuan Wan, Gang Zeng, Jiawei Wang, Lin Zou

    Published 2025-01-01
    “…The government has played a pivotal role in propelling the accelerated growth of China’s AI industry, particularly through the backing of pioneering AI private enterprises and the calibration of the potential inefficiencies associated with a state-led model with the dynamism of market forces. …”
    Get full text
    Article
  16. 2976

    Networked Control System for the Guidance of a Four-Wheel Steering Agricultural Robotic Platform by Eduardo Paciência Godoy, Giovana Tangerino Tangerino, Rubens André Tabile, Ricardo Yassushi Inamasu, Arthur José Vieira Porto

    Published 2012-01-01
    “…In a joint project among research institutions and a private company in Brazil a multifunctional robotic platform for information acquisition in PA is being designed. …”
    Get full text
    Article
  17. 2977

    A Choice Behavior Model of Bike-Sharing Based on User Perception, Psychological Expectations, and Loyalty by Xingjian Xue, Zixu Wang, Xuejiao Liu, Zhou Zhou, Rui Song

    Published 2022-01-01
    “…Providing high-quality services is essential to promoting the usage of bike sharing and to reducing traffic congestion by shifting people away from private car use. This research explores the factors that influence users’ selection of bike sharing as a transportation mode by identifying and describing relationships to user perception, psychological expectations, and loyalty. …”
    Get full text
    Article
  18. 2978

    Legislation on the Protection of Personal Data: Uncertainty vs Specification by I. V. Mikheeva, Ph. G. Nakhman

    Published 2023-09-01
    “…With the help of general scientific approaches — systemic, genetic; methods of analysis and synthesis, induction and deduction, as well as private-scientific one — formal-legal method, the study focuses on the technical and legal tools that are used for normative fixation of the definition of personal data and the requirements imposed on the operator of personal data. …”
    Get full text
    Article
  19. 2979

    Mixed signal modulation recognition method based on temporal depth residual shrinkage network by LIU Jinghua, WEI Xianglin, FAN Jianhua, HU Yongyang, WANG Xiaobo, YU Bing

    Published 2024-10-01
    “…Testing on both public and private datasets demonstrates that the proposed method outperforms five state-of-the-art approaches, achieving an average recognition and classification accuracy of 92.7% under high signal-to-noise ratio conditions. …”
    Get full text
    Article
  20. 2980

    The majlis campaign of Muslims in the Volga-Ural region at the beginning of the Revolution of 1905–1907 by I.K. Zagidullin

    Published 2020-02-01
    “…., meetings of local residents held in private houses, public catering places, hotels, where the discussion of pressing local or social issues took place – in the Volga-Ural region at the beginning of the Revolution of 1905–1907 was analyzed in this paper. …”
    Get full text
    Article