Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8701
Fine-grained access control scheme with user privacy protection in cloud storage systems
Published 2014-11-01“…Based on the actual demands of cloud storage system,a new multi-authority ABE (MA-ABE) scheme is constructed to support user privacy protection and attribute revocation.For enhancing efficiency and alleviatingowner’s computing load,the complex computing works involved in attribute revocation are delegated to a trusted third party orcloud server.The proposed scheme is provably secure under the DBDH assumption.…”
Get full text
Article -
8702
Two new species in the green lacewing genus Santocellus (Neuroptera, Chrysopidae, Leucochrysini)
Published 2025-02-01“…As a result, the genus, which now contains five known species, becomes more securely defined. An updated catalog and an illustrated key to the known Santocellus species are provided.…”
Get full text
Article -
8703
Best Practices for Grant Development: Starting With the Idea
Published 2024-06-01“…However, aside from a few workshops provided by the university, new faculty may feel like they have few resources to help them sharpen their practices at applying for and securing grant funding. This publication is meant to support Extension professionals, especially at the county level, in building good grant development habits. …”
Get full text
Article -
8704
Case report: Transmuscular migration of a solid encircling silicone band through all four rectus muscles
Published 2025-01-01“…An encircling silicone band (#240) was placed anterior to the equator, and 5-0 polyester sutures (Ethicon, Inc.) were used to secure the band at all four quadrants. Six months later, the encircling band and suture knots were visible under the bulb conjunctiva, close to the limbus in all four quadrants. …”
Get full text
Article -
8705
Synthesis of Phthalimide Imine Derivatives as a Potential Anticancer Agent
Published 2020-01-01“…The outstanding evidence of phthalimide pharmacophore in securing enhanced biological activities had encouraged further research and development into phthalimide-based derivatives as potential new drugs. …”
Get full text
Article -
8706
RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT
Published 2025-01-01“…Experimental results demonstrate that RWA-BFT outperforms HB-BFT and PBFT algorithms, making it a scalable and secure blockchain solution for decentralized IoT applications.…”
Get full text
Article -
8707
Socially Responsible Investment Sukuk: A Systematic Review of the Scientific Literature
Published 2023-04-01“…One of the recent developments in the Islamic securities market is the issuance of Socially Responsible Investment Sukuk (SRI), which focuses on environmental, social and governance (ESG) issues. …”
Get full text
Article -
8708
THE METHODOLOGY FOR THE BUILDING OF THE SUSTAINABILITY MVZ-INDEX BASED ON THE COMMODITIES WITH DUAL PROPERTIES
Published 2016-11-01“…The authors offer a practical approach to a fundamentally new construction of a regional monetary system, based on the methodology of calculation of the new currency unit, secured by the commodities with dual properties.…”
Get full text
Article -
8709
Modeling the Dependence of Losses of a Financial Portfolio Using Nested Archimedean Copulas
Published 2021-01-01“…This paper proposes an approach of modeling the dependence of losses on securities, and the potential loss of the portfolio is divided into sectors each including two subsectors. …”
Get full text
Article -
8710
Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen
Published 2016-11-01“…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
Get full text
Article -
8711
PERFORMANCES OF INSURANCE MARKET IN MONTENEGRO IN CONDITIONS OF FINANCIAL CRISIS
Published 2011-05-01“…Since the financial markets both in Montenegro and in the region are not sufficiently developed, the insurance companies were not able to invest funds in sophisticated securities and financial derivatives, while the Law on Insurance, on the other hand, limited the companies to invest available monetary assets in risky securities, such as stocks. …”
Get full text
Article -
8712
Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen
Published 2016-11-01“…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
Get full text
Article -
8713
Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism
Published 2025-01-01“…A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. …”
Get full text
Article -
8714
The nexus between the financial development and CO2 emissions: fresh evidence through time–frequency analyses
Published 2025-01-01“…Rest of the world: sector discrepancy transactions, rest of the world: debt securities and loans, gross domestic product, and the square of the gross domestic product, are control variables in the estimated models. …”
Get full text
Article -
8715
Experimental demonstration of 8190-km long-haul semiconductor-laser chaos synchronization induced by digital optical communication signal
Published 2025-01-01“…Abstract Common-signal-induced synchronization of semiconductor lasers have promising applications in physical-layer secure transmission with high speed and compatibility with the current fiber communication. …”
Get full text
Article -
8716
A Hybrid Approach for Color Face Recognition Based on Image Quality Using Multiple Color Spaces
Published 2024-12-01“…The proposed method showcases the potential for more reliable and secure recognition systems.…”
Get full text
Article -
8717
Explaining the chronopolitical pattern of relations between Iran and Iraq
Published 2025-06-01“…For instance, Iraq is actively engaged in the "FAW Corridor" initiative, whereas Iran seeks to expand economic cooperation and secure a place in the burgeoning alliances of the East. …”
Get full text
Article -
8718
Analisis Hubungan Literasi Keuangan Investor, Pengetahuan Investor, Risk Tolerance Investor Dan Regret Aversion Bias Investor Dengan Keputusan Investasi
Published 2024-07-01“…The data source was obtained from primary data by distributing a 5 Likert scale questionnaire to respondents via Google Form to BNI Securities and Mandiri Securities. Based on the research sample criteria, 129 research samples were obtained. …”
Get full text
Article -
8719
Promoting Healthy Lifestyle Strategies among Couples for Sustainable Family Survival in Oyo State, Nigeria
Published 2024-12-01“…Healthy lifestyle can be encouraged through mindfulness, with secure communities and local mental support resources playing a key role. …”
Get full text
Article -
8720
Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia
Published 2009-06-01“…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
Get full text
Article