Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8741
Respite Care for Caregivers of Older Adults
Published 2012-08-01“…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
Get full text
Article -
8742
Adoption of Drone Technology for the Smart Safety Mechanism of Women
Published 2022-09-01“…These DRONES helps them to keep secure and do all the patrol or Police work during nights.…”
Get full text
Article -
8743
The conservation of a 19th century framed miniature portrait painted on ivory
Published 2018-05-01“…The object was in poor condition, with all the pieces necessary to hold the object separated and with the attempt of securing these parts with brown and clear adhesive tape. …”
Get full text
Article -
8744
Darknesses over the Bistrica. On some unacceptable interpretations of the history of Prizren and its monuments
Published 2023-01-01“…It is shown that those views and opinions have no basis in the sources and are a result of unsound methodology and ignoring securely ascertained facts in a bid to reshape tendentiously the image of the past.…”
Get full text
Article -
8745
Analytical and scientific support mechanism of the US foreign policy process
Published 2009-12-01“…The U.S. intellectual leadership in many spheres is rarely challenged nowadays. However it is secured not only through the ability to formulate a great amount of new ideas, including fundamental innovations, but perhaps even more due to the effective system for integration of intellectual products into practice. …”
Get full text
Article -
8746
Respite Care for Caregivers of Older Adults
Published 2012-08-01“…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
Get full text
Article -
8747
The Subjective Vitality of Female Students: The Role of Attachment Styles and Alienation from Parents with the Mediation of Basic Psychological Needs
Published 2024-11-01“…A positive relationship was found between secure style and basic psychological needs with the Subjective vitality of female students; this relationship between avoidant and ambivalent styles and alienation from parents was negative (P < 0.01). …”
Get full text
Article -
8748
Model for Predicting Hope According to the Attachment Styles and Time Perspective with the Mediation Role of Psychological Resilience in the University Students
Published 2024-12-01“…Moreover, secure, avoidant and ambivalent attachment styles, time perspective and psychological resilience have significant direct effect on the students’ hope (p<0.01). …”
Get full text
Article -
8749
Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework
Published 2025-01-01“…Our contribution lies in the development of a secure and efficient data-sharing solution for flight operations data, which has the potential to revolutionize the aviation industry.…”
Get full text
Article -
8750
Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method
Published 2024-10-01“…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
Get full text
Article -
8751
Application of Securitization of Leasing Assets
Published 2014-04-01“…These securities can be bonds, actions or bills. Thus the asset leased, acts as providing these papers. …”
Get full text
Article -
8752
Du mythe de l’efficience des marchés au krach
Published 2010-12-01“…This diagnosis naturally suggests some reforms which aim to secure market liquidity. Among them, a flagship measure considered during the last few months is to standardize asset backed securities so as to encourage increased trading in the secondary market. …”
Get full text
Article -
8753
Games and gamers: the influence of participating players on the process and outcome of regional spatial energy games
Published 2025-01-01“…Our approach assigns different attributes to individual players which secures that the game is played from various perspectives and by actual stakeholders. …”
Get full text
Article -
8754
Whole of Government: An Effective Strategy for Ensuring Child Support Post-Religious Court Rulings
Published 2024-10-01“…This research aims to evaluate how well the 'Whole of Government Response' strategy works in securing post-divorce child support.…”
Get full text
Article -
8755
Les nations indiennes, source inattendue d’innovation
Published 2006-01-01“…Far from being fossilized societies, prisoners of their colonial past, Indian nations have always innovated in this domain, using their traditions to find new and original solutions to their economic problems, while securing their cultural identity. There is a renewal of Indian cultures whenever a tribe’s traditions and values are the basis of its development.…”
Get full text
Article -
8756
State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks
Published 2018-10-01“…A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.…”
Get full text
Article -
8757
Iterative algorithms with seminorm-induced oblique projections
Published 2003-01-01“…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
Get full text
Article -
8758
Decentralized searchable encryption scheme based on dynamic accumulator
Published 2019-04-01“…Since the flourish of the blockchain technology,a series of applications based on blockchain technology are emerging,and the decentralized storage service becomes the killer App in the decentralized markets,such as StorJ,Filecoin.Comparing with the centralized storage,decentralized storage are more secure,cheaper and more scalable.However,client’s privacy cannot be protected in existed decentralized storage apps.The idea of implementing the searchable encryption scheme with decentralized storage was proposed to improve the user’s privacy and utilizing the dynamic accumulator to improve the search efficiency of the searchable encryption scheme.…”
Get full text
Article -
8759
Research on reconfigurable information communication basal network architecture
Published 2014-01-01“…Based on the thinking of network reconfiguration,the reconfigurable information communication basal network architecture was proposed,and then the network atomic capacity theory,polymorphic addressing and routing mechanism,network reconfiguration mechanism and the secure manageability and controllability mechanism were put forward respectively.The architecture would provide a resolution for current and future applications with different quality of services,flexible and expansible function,universal inter-connection,heterogeneous convergence,manageability and controllability,which also supports the compatible evolution with current internet and is feasible to be implemented on a large scale.…”
Get full text
Article -
8760
Fare non-repudiation protocol based on identity-based cryptography
Published 2009-01-01“…A signature scheme with the one-off blind public key was proposed based on identity-based cryptography,and thus was applied in a new fare non-repudiation protocol.In this protocol,the sender was anonymity,so avoid that the recipient deliberately rejected the files or delayed reading the files when the files were not good for them,which could assure the equity and non-repudiation of the communication between the sender and the recipient.The signature scheme with the one-off blind public key and non-repudiation protocol is both secure and effective by analysis.…”
Get full text
Article