Showing 841 - 860 results of 4,865 for search '"privateering"', query time: 0.05s Refine Results
  1. 841

    Dual-Stage AI Model for Enhanced CT Imaging: Precision Segmentation of Kidney and Tumors by Nalan Karunanayake, Lin Lu, Hao Yang, Pengfei Geng, Oguz Akin, Helena Furberg, Lawrence H. Schwartz, Binsheng Zhao

    Published 2025-01-01
    “…Two CECT datasets were used: a public dataset (KiTS23: 489 scans) and a private institutional dataset (Private: 592 scans). …”
    Get full text
    Article
  2. 842
  3. 843

    Hidden in Plain Sight? Corporate Strategic Litigation in the EU Emissions Trading System by Sofie Fleerackers

    Published 2024-08-01
    “…This Article examines how private economic actors mobilize EU law to pursue broader legal, political, economic, or societal ends. …”
    Get full text
    Article
  4. 844

    Monetary Reform and Central Bank Digital Currencies: The Impact on Retail Banking by Adam Abdullah

    Published 2024-02-01
    “…This research aims to clarify the impact of monetary reform on retail banking, with the introduction of private crypto-currencies (CCs) and retail central bank digital currencies (CBDCs). …”
    Get full text
    Article
  5. 845

    ANALYSIS OF HOUSEHOLD SAVING FACTORS IN BOSNIA AND HERZEGOVINA - APPLICATION OF ARDL METHODOLOGY by Irma Đidelija

    Published 2020-11-01
    “… Most papers in the field of private saving deal with the analysis of private saving as a whole without special consideration of its individual components. …”
    Get full text
    Article
  6. 846

    Redneck Riviera : kitsch et détournement amusé dans l’imaginaire de John Waters by Justin S. Wadlow

    Published 2017-09-01
    “…In so doing, we will try to solve the mystery of whether John Waters has built his house as a private version of his own films, or turned his films into an extension of his own private house?…”
    Get full text
    Article
  7. 847

    Du personnel au politique : construction d’une identité militante dans le journal d’Alice Stone Blackwell (1872-1874) by Claire Sorin

    Published 2008-09-01
    “…How does political commitment influence private writings, and how do private writings shape public voices? …”
    Get full text
    Article
  8. 848

    Linking quality of work-life to turnover intention: The role of organizational citizenship behavior by Robertus M. B. Gunawan, Widodo Widodo

    Published 2021-12-01
    “…Turnover is an enemy of the organization that needs to be avoided by every organization, including private school organizations. Hence, this study aims to examine the effect of quality of work-life (QWL) on teachers' turnover intention, mediated by organizational citizenship behavior (OCB), to overcome turnover intention among private school teachers. …”
    Get full text
    Article
  9. 849

    ANALYSIS OF HOUSEHOLD SAVING FACTORS IN BOSNIA AND HERZEGOVINA - APPLICATION OF ARDL METHODOLOGY by Irma Đidelija

    Published 2020-11-01
    “… Most papers in the field of private saving deal with the analysis of private saving as a whole without special consideration of its individual components. …”
    Get full text
    Article
  10. 850

    Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU

    Published 2023-10-01
    “…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
    Get full text
    Article
  11. 851
  12. 852
  13. 853

    Drug Insurance and Psoriasis Severity: A Retrospective Cohort Study by Laurence Mainville, Hélène Veillette, Paul R. Fortin

    Published 2025-02-01
    “…**Background:** Prescription drug insurance in Canada is constituted of a patchwork of public and private insurance plans. The type of drug insurance may have a negative impact on access to treatment for patients covered by public plans compared with private plans. …”
    Get full text
    Article
  14. 854
  15. 855
  16. 856

    Joint Education Provision: A Relief or Challenge to Quality Education Services in Uganda. “A Study in Buganda Region”. by Sempungu, Godfrey

    Published 2024
    “…In Uganda, providers of education are either private or public. In some cases, the government takes over the management and day-to-day running of some schools whose founder body is private. …”
    Get full text
    Thesis
  17. 857
  18. 858
  19. 859

    Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain by JING Xu, JIANG Yan

    Published 2024-08-01
    “…A publicly verifiable method for MA-CP-ABE attribute private keys was constructed based on bilinear maps and ElGamal encryption, enabling the public verifiability of attribute private keys and their shares in ciphertext conditions. …”
    Get full text
    Article
  20. 860

    IS BUILD-OPERATE-TRANSFER (BOT) SYSTEM AN EFFECTIVE INITIATIVE COMPARED WITH TRADITIONAL PROCUREMENT METHOD IN STUDENT HOUSING PROVISION IN AN EMERGING ECONOMY? by Job Taiwo Gbadegesin, Matthew Oluwole Oyewole

    Published 2014-05-01
    “… BOT is a scheme or private finance initiative (PFI) or alternative procurement method in which a government contractually grants to a private sector entity a concession requiring the entity to obtain financing for design, build and operate a public facility or infrastructure for a fixed period of time, during which the private entity can recover its costs of construction, plus profit, by charging fees or tools for its use and at the end of the concession period, transfer ownership and operation of the facility back to the government. …”
    Get full text
    Article