Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5201
Acceptability of donor funding for clinical trials in the UK: a qualitative empirical ethics study using focus groups to elicit the views of research patient public involvement gro...
Published 2022-06-01“…Existing governance processes will do some of this work, but additional REC guidance, particularly in relation to donors securing a place on the trial, may be necessary to help RECs navigate ethical concerns consistently.…”
Get full text
Article -
5202
An Agent-Based Auction Protocol on Mobile Devices
Published 2014-01-01“…This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. …”
Get full text
Article -
5203
Kelekatan dan Kesejahteraan Psikologis Anak dan Remaja: Studi Meta-Analisis
Published 2021-01-01“…The results show that (1) the correlation effect between secure attachment and positive psychological well-being was significant; (2) the correlation effect of secure attachment with negative psychological well-being indicates a significant value; (3) the correlation effect between avoidance and positive psychological well-being was significant; (4) the correlation effect between avoidance and negative psychological well-being was significant; (5) the correlation effect between anxious and positive psychological well-being was not significant; (6) the correlation effect between anxious and negative psychological well-being was significant; (7) the correlation effect between disorganized with positive psychological well-being was significant; (8) the correlation effect between disorganized and negative psychological well-being was significant. …”
Get full text
Article -
5204
Ureteric Injury due to the Use of LigaSure
Published 2013-01-01“…The use of LigaSure has made securing haemostasis and tissue dissection relatively easy especially in laparoscopic surgery; however, if not used with care it can cause damage to the surrounding structures through lateral spread of energy. …”
Get full text
Article -
5205
An Optimal Routing Framework for an Integrated Urban Power–Gas–Traffic Network
Published 2024-01-01“…The developed non-probabilistic framework provides decision-makers with various secure options to avoid worst-case scenarios and promote social and environmental benefits. …”
Get full text
Article -
5206
Chaotic Motions in the Real Fuzzy Electronic Circuits
Published 2013-01-01“…In the research field of secure communications, the original source should be blended with other complex signals. …”
Get full text
Article -
5207
Quantification of nipple size and shape among an ethnically diverse sample of US women
Published 2023-09-01“…Viable data were secured from 78% of the scans undertaken, yielding 538 datasets from 329 participants. …”
Get full text
Article -
5208
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
Published 2013-01-01“…We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. …”
Get full text
Article -
5209
Calculation of the quantity of oxygen required for maintenance of the predetermined temperature of steel during its boiling period in a steel-melting arc furnace
Published 2000-08-01“…The article provides а mathematical model of steel smelting in a steel-melting arc furnace with provision for calculation of necessary quantity of oxygen for maintenance of preset temperature of steel when arcs are switched off It shows that oxygen supply during the arcs disconnection period secures energy consumption reduction.…”
Get full text
Article -
5210
Simulation of bond prices
Published 2005-12-01“…The proposed methods are illustrated by the Lithuanian Government securities. The results show that a squared binomial (two-factor) bond market model approximates the bond prices more precisely than analogous quadronomial (one-factor) model. …”
Get full text
Article -
5211
Resource Mobilization Policy Guidelines
Published 2022“…It is intended to enhance capacity of University stakeholders in securing resources for Kabale University’s mandate as documented in the Statutory Instrument No. 36 of July 2015, establishment of Kabale University…”
Get full text
Other -
5212
Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles
Published 2019-07-01“…The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme.…”
Get full text
Article -
5213
Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture
Published 2024-01-01“…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
Get full text
Article -
5214
Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes
Published 2025-01-01“…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
Get full text
Article -
5215
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01“…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
Get full text
Article -
5216
Asymptotic hyperfunctions, tempered hyperfunctions, and asymptotic expansions
Published 2005-01-01Get full text
Article -
5217
U.S. strategy in Central Asia
Published 2013-04-01“…In this connection, the author notes that successive governments of the USA, the American political and expert community, business circles traditionally in the last twenty years pay particular attention to this region, bringing to secure the U.S. presence in the region the concept of "Big Central Asia".…”
Get full text
Article -
5218
What determines investment in the Nippon Individual Savings Account? an investigation of Japan's tax-exempt investment account.
Published 2025-01-01“…Taking advantage of the launch of the revamped NISA, we analyzed data collected in late 2022 of 95,632 active investors in a leading securities company to explore their preferences in the previous NISA. …”
Get full text
Article -
5219
Oil and Iran Regions Rural Economic Structure Alteration
Published 2018-03-01“…The oil has gradually obtained a predominant place in national economy since 1950 and nowadays, is the main important resource securing country financial needs. Two questions are the base of this research regarding contradiction of oil rent and traditional economic sectors including agriculture and livestock rearing which always have been intensified. …”
Get full text
Article -
5220
An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application
Published 2013-11-01“…We have successfully included the establishment of secure channels, the detection of replay attacks, mutual cluster authentication, prevention of vehicle identity fabrication, and secure distribution of provisional session key.…”
Get full text
Article