Showing 3,921 - 3,940 results of 4,865 for search '"privateering"', query time: 0.08s Refine Results
  1. 3921

    The roles of women in contemporary terrorism: Perpetrators, victims or something else? by Đorić Marija

    Published 2024-01-01
    “…Namely, since ancient Greece, politics was explicitly seen as a public job and a "male activity", while women were reserved for the oikos, as a private sphere. Hence, terrorism as a political phenomenon is mostly seen as a "male phenomenon." …”
    Get full text
    Article
  2. 3922
  3. 3923

    Comparative efficacy and safety of intra-articular analgesics after knee arthroscopy: a Bayesian network meta-analysis protocol by Yilun Wang, Hongyi He, Yuchen He, Dong-Xing Xie, Xiaoxiao Li

    Published 2020-09-01
    “…The Bayesian network meta-analysis will be conducted using WinBUGS V.1.4.3.Ethics and dissemination Since no private or confidential patient data will be contained in the reporting, approval from an ethics committee is not required. …”
    Get full text
    Article
  4. 3924
  5. 3925

    STEM Applications in Turkish Science High Schools by Mustafa Hilmi Colakoglu

    Published 2016-07-01
    “…Today, there are 238 Science High Schools serving as public schools and the same amount of schools serving as private schools. In the U. S., the training of 100K STEM teachers started in 2012. …”
    Get full text
    Article
  6. 3926

    A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts by Ziwei Wang, Ruwei Huang, Xiyi Wei

    Published 2025-01-01
    “…Compared to existing methods, WZ-MIBFHE reduces the lattice dimension to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi><mrow><mo form="prefix">log</mo><mi>q</mi></mrow><mo>+</mo><mrow><msub><mo form="prefix">log</mo><mi>b</mi></msub><mi>q</mi></mrow></mrow></semantics></math></inline-formula>, improves public and private key sizes, and significantly lowers ciphertext expansion rates by removing the need for fresh ciphertexts. …”
    Get full text
    Article
  7. 3927

    A COMPARATIVE STUDY OF HEADWAY-BASED AND TRANSPORT SYSTEM-BASED ASSIGNMENTS OF PUBLIC TRANSPORT IN VISUM: THE CITY OF KRYVYI RIH CASE by Volodymyr SISTUK

    Published 2024-09-01
    “…The model of the network comprises 13 transport systems, 7 transport modes, 27598 links, 10097 nodes, 83270 turns, 238 zones, 1748 connections for private transport, 3013 connections for public transport, 534 stops, 1165 stop areas, 1190 stop points, 130 lines and 218 line routes. …”
    Get full text
    Article
  8. 3928

    Awareness and Treatment Decisions on Tooth Wear among Jordanian Dentists and Prosthodontists: A Cross-Sectional Survey Study by Samiha Sartawi, Nesreen A. Salim, Duaa Taim

    Published 2020-01-01
    “…A questionnaire was disseminated to a random sample of 200 general dentists and 100 prosthodontists working in the Ministry of Health, academia, private practices, and military services. Chi square and independent t-tests were performed for statistical analysis. …”
    Get full text
    Article
  9. 3929

    DEVELOPMENTAL PROGRAMMES AND POLICIES: A LOGIC MODEL APPROACH by Obuks Augustine EJOHWOMU, Morakinyo Kehinde ONIFADE, Babatunde ADEOYE

    Published 2016-12-01
    “…The strategies for a modest growth in the manufacturing sector are hastening the development of the infrastructure master plan and public private partnership with successful primary sector players. …”
    Get full text
    Article
  10. 3930
  11. 3931
  12. 3932

    استخدام الباحثین بالجامعات السعودیة لمواقع التواصل الاجتماعى العلمیة : دراسة استکشافیة لموقعى بوابة البحث Researchgate وأکادیمیا Academia... by د. ابراهیم حسن أبو الخیر

    Published 2017-01-01
    “…It also aims at knowing the extent of the scholars use of these two networks in promoting themselves, and the disseminating their scientific productions on the Internet.Thirty-three Saudi university were studied, twenty-five of them are governmental, and eight of them are private. King Saud University, King Abdulaziz University, King Fahd University of Petroleum and Minerals in Dhahran, and King Abdullah University of Science and Technology, are the highest most effective participating universities in both Academia and ResearchGate. …”
    Get full text
    Article
  13. 3933
  14. 3934

    STRATEGI PENGEMBANGAN PARIWISATA DI SEPANJANG SUNGAI KAPUAS KOTA PONTIANAK by RISKA APRILIA AYUNINGTYAS, SRI HIDAYATI DJOEFFAN

    Published 2021-10-01
    “…Analysis of supply and demand analysis is a matrix of strategic data to internal factors (IFAS) and external factors (EFAS) program as well as some recommendations for the development of Tourism for the City of Pontianak, the government participate in activities as their main duty to participate in the promotion of destinations, development of basic infrastructure in tourist objects are not managed by the private sector as a simple dock, toilets, mosque and construction of the entertainment / arts performances place. …”
    Get full text
    Article
  15. 3935

    Prevalence of Three-Rooted Deciduous Mandibular Molars in the Children of Northwestern Iran by Maryam Khosrozadeh, Maryam Mostafavi, Mohammad Hassan Hamrah, Elham Niknejad

    Published 2021-01-01
    “…In this descriptive cross-sectional study, periapical radiographs of patients attending private oral and maxillofacial radiology offices in the northwestern region of Iran from 2017 to 2019 were retrospectively reviewed. …”
    Get full text
    Article
  16. 3936
  17. 3937

    On the Conditions for the Introducing Distance Learning in Russian Universities by A. V. Borovskikh

    Published 2023-12-01
    “…The results obtained fix a logical necessity that does not depend on private opinions or specific features of the situation.…”
    Get full text
    Article
  18. 3938

    An Analysis of Habitual Mode Use in the Years of Rising Oil Prices by Chansung Kim, Woo-Yung Kim, Jiyoung Park

    Published 2019-01-01
    “…Once cities are built without sufficient public transportation networks and people have become accustomed to using private cars, then it will be more difficult to change their transportation modes, requiring much more social efforts and costs.…”
    Get full text
    Article
  19. 3939
  20. 3940

    Application of Classical and Genomic Cryptography on Textual Dataset by İbrahim Türkoğlu, Alev Kaya

    Published 2024-12-01
    “…Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. …”
    Get full text
    Article