Suggested Topics within your search.
Suggested Topics within your search.
- Economic aspects 2
- Leadership 2
- Public-private sector cooperation 2
- Trusts and trustees 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Administrative law 1
- Agricultural industries 1
- Agriculture 1
- Business networks 1
- Civil law 1
- Climate Change 1
- Community development 1
- Digital techniques 1
- Digitale Photographie 1
- Domestic relations 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Education, Higher 1
- Ego (Psychology) 1
- Environmental Health 1
- Equity 1
- Evaluation 1
- Families 1
- Fiction 1
- Foreign trade regulation 1
- General 1
- Hastings, Stanley (Fictitious character) 1
- Health insurance 1
- Health insurance claims 1
-
3261
Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Published 2014-09-01“…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
Get full text
Article -
3262
Car Purchase Intention Modeling in the Context of COVID-19: An Integrated Analysis of Impact Range and Impact Asymmetry
Published 2022-01-01“…The pre–COVID-19 car purchase intention is primarily determined by shared mobility-related attitudes, while attitudes toward private car use have a greater impact on the post–COVID-19 intention change. …”
Get full text
Article -
3263
Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism
Published 2025-01-01“…A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. …”
Get full text
Article -
3264
Modern features of the cryptocurrency use for terrorist financing, money laundering and other unlawful activities: prospective countermeasures
Published 2023-07-01“…The author identifies the need to complete the process of legislative definition of the status and regulation of cryptocurrency circulation; to improve the national system of countermeasures, to establish coordination of the work of authorised state bodies; to ensure the implementation of international standards; to establish public-private partnership and cooperation between competent entities of Ukraine and foreign countries.…”
Get full text
Article -
3265
COACHING FAMILY-BASED OUTPATIENT TREATMENT METHOD FOR ADOLESCENT ANOREXIA NERVOSA. A CASE REPORT.
Published 2024-11-01“…During the last ten years, the paediatrician (JR) has applied the coaching family-based method (c-FBM) to all adolescent patients with a restrictive eating disorder seeking help, first at the Primary Healthcare Centre of Oulu, and lately at Primary Healthcare Centres of Länsi-Pohja District and at a private clinic in Oulu. The c-FBM is otherwise quite similar to the generally used FBT method, with the most significant difference being the primary care paediatrician taking the main responsibility for the treatment. …”
Get full text
Article -
3266
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
Get full text
Article -
3267
Understanding the Determinants of Suicidal Behaviours Among People in Southwest Nigeria
Published 2023-11-01“…In order to encourage economic growth and development, the article advises the supply of mental health resources, the development of awareness campaigns, the construction of psychological and emotional support groups, overcoming financial obstacles, and collaboration with private organisations. The prevalence of suicidal conduct in Southwest Nigeria would decrease with the use of these approaches. …”
Get full text
Article -
3268
La Seine et les loisirs sportifs : le site rouennais dans l’entre-deux-guerres
Published 2011-11-01“…Indeed, most of the aquatic sports organizations, whether private clubs or community centers, are concentrated on this site, which offers the inhabitants of Rouen privileged access to the water. …”
Get full text
Article -
3269
Investigation of improvements to city areas of importance to the implementation of clean water
Published 2024-06-01“…Further research is recommended to focus on developing more advanced sensor technologies, deeper studies on NSGA-II implementation, strategies to enhance community involvement, policy analyses that support these efforts, and collaborative models involving government, private sector, and communities. Thus, sustained efforts in this research are expected to significantly contribute to improving clean water services in various urban areas.…”
Get full text
Article -
3270
Greening up the City with Native Species: Challenges and Solutions
Published 2025-01-01“…Furthermore, urban green spaces are suited to enhancing biodiversity without negatively impacting food or fiber production. Municipalities and private landowners invest substantially in landscaping and its maintenance. …”
Get full text
Article -
3271
The Mechanism of Activation of Investment Potential in the Post-Conflict Period of Development of the Tourism Industry
Published 2024-08-01“…The group of countries of the world that have introduced public-private partnership (PPP) to generate investment potential in the development of the tourism industry is presented. …”
Get full text
Article -
3272
How does Financial Development and Economic Growth affect Energy Consumption;The Panel VAR Analysis of 5 Turk Countries
Published 2022-01-01“…According to analysis results, the increase in bank deposits, which is one of the financial development indicators, positively affects the energy demand, while the increase in private loans negatively affects the energy demand. …”
Get full text
Article -
3273
Vertical Cost-Information Sharing in a Food Supply Chain with Multiple Unreliable Suppliers and Two Manufacturers
Published 2017-01-01“…Meanwhile, the suppliers face yield uncertainty and the manufacturers face uncertain production costs that are private information. While the suppliers compete on price, the manufacturers compete on quantity. …”
Get full text
Article -
3274
State Participation in Energy Security Provision of the People’s Republic of China
Published 2015-08-01“…The article outlines the contours of energy security of China, the role of major players, including public authorities, government energy corporations, private businesses and the population. Particular attention is given to the Commission of National Development and Reforms, which main function is to form the five years' development plans. …”
Get full text
Article -
3275
Lung Nodule Detection For CT-Guided Biopsy Images Using Deep Learning
Published 2024-06-01“…The methodology encompasses a modern deep-learning approach applied to a private dataset obtained from the Barnard Institute of Radiology at Madras Medical College, Chennai, which has been granted ethical approval. …”
Get full text
Article -
3276
Big Data-Driven Risk Analysis of Environmental Grievances in the Palm Oil Industry for Sustainable Decision-Making
Published 2025-01-01“…This finding points toward the need for the formation of a private consortium among identified key players and local government in the high-risk region as a new strategy to improve management of environmental sustainability issues that predominantly involve deforestation. …”
Get full text
Article -
3277
Awareness and Practice of Deep Margin Elevation among Dental Practitioners in India: A Cross-Sectional Survey
Published 2025-01-01“…Material and Methods: A cross-sectional study was carried out among academicians, private practitioners, and post-graduate students, comprising 266 participants. …”
Get full text
Article -
3278
Organizational Work-life Balance Policies Toward Women and Their Reflection in Employee Commitment and Labor Market Image: A Social Exchange Theory Approach
Published 2024-12-01“…This study is designed to examine whether the existing WLB policies of private commercial banks in Bangladesh are designated enough to influence the female bankers’ level of commitment and their attitude toward job market. …”
Get full text
Article -
3279
Peranan Dinas Pengendalian Penduduk dan Keluarga Berencana dalam Pengendalian Pertumbuhan Penduduk
Published 2018-01-01“…Based on the research conducted, it was found several findings that the Office of Population and Family Planning Control has a role in suppressing population growth which includes coordination with government, community and private institutions in family planning activities, conducting family planning counseling, installing contraceptives and post-installation contraception. …”
Get full text
Article -
3280
Agriculture urbaine et souveraineté alimentaire à Genève (Suisse), machines à consentement ou moteurs d’hybridation du référentiel agricole dominant ?
Published 2017-12-01“…On the other hand, public authorities and private actors increasingly refer to such notions to guide or justify their action. …”
Get full text
Article