Showing 8,741 - 8,760 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 8741

    Respite Care for Caregivers of Older Adults by Suzanna Smith

    Published 2012-08-01
    “…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
    Get full text
    Article
  2. 8742

    Adoption of Drone Technology for the Smart Safety Mechanism of Women by Victoria Nozick

    Published 2022-09-01
    “…These DRONES helps them to keep secure and do all the patrol or Police work during nights.…”
    Get full text
    Article
  3. 8743

    The conservation of a 19th century framed miniature portrait painted on ivory by Violeta Machado Prin

    Published 2018-05-01
    “…The object was in poor condition, with all the pieces necessary to hold the object separated and with the attempt of securing these parts with brown and clear adhesive tape. …”
    Get full text
    Article
  4. 8744

    Darknesses over the Bistrica. On some unacceptable interpretations of the history of Prizren and its monuments by Vojvodić Dragan, Pirivatrić Srđan

    Published 2023-01-01
    “…It is shown that those views and opinions have no basis in the sources and are a result of unsound methodology and ignoring securely ascertained facts in a bid to reshape tendentiously the image of the past.…”
    Get full text
    Article
  5. 8745

    Analytical and scientific support mechanism of the US foreign policy process by I. A. Istomin

    Published 2009-12-01
    “…The U.S. intellectual leadership in many spheres is rarely challenged nowadays. However it is secured not only through the ability to formulate a great amount of new ideas, including fundamental innovations, but perhaps even more due to the effective system for integration of intellectual products into practice. …”
    Get full text
    Article
  6. 8746

    Respite Care for Caregivers of Older Adults by Suzanna Smith

    Published 2012-08-01
    “…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
    Get full text
    Article
  7. 8747

    The Subjective Vitality of Female Students: The Role of Attachment Styles and Alienation from Parents with the Mediation of Basic Psychological Needs by parvaneh alaie, Ladan Vaghef, fatemeh Nadimi

    Published 2024-11-01
    “…A positive relationship was found between secure style and basic psychological needs with the Subjective vitality of female students; this relationship between avoidant and ambivalent styles and alienation from parents was negative (P < 0.01). …”
    Get full text
    Article
  8. 8748

    Model for Predicting Hope According to the Attachment Styles and Time Perspective with the Mediation Role of Psychological Resilience in the University Students by Zohre Zohoori Zangeneh, sozan emami pour, Anita Baghdasarians

    Published 2024-12-01
    “…Moreover, secure, avoidant and ambivalent attachment styles, time perspective and psychological resilience have significant direct effect on the students’ hope (p<0.01). …”
    Get full text
    Article
  9. 8749

    Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework by Jin Lei, Weiyun Li, Meng Yue, Zhijun Wu

    Published 2025-01-01
    “…Our contribution lies in the development of a secure and efficient data-sharing solution for flight operations data, which has the potential to revolutionize the aviation industry.…”
    Get full text
    Article
  10. 8750

    Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method by Rikou Miyawaki, Yukiko Yokoi

    Published 2024-10-01
    “…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
    Get full text
    Article
  11. 8751

    Application of Securitization of Leasing Assets by I. V. Linev

    Published 2014-04-01
    “…These securities can be bonds, actions or bills. Thus the asset leased, acts as providing these papers. …”
    Get full text
    Article
  12. 8752

    Du mythe de l’efficience des marchés au krach by David Bourghelle, Pauline Hyme

    Published 2010-12-01
    “…This diagnosis naturally suggests some reforms which aim to secure market liquidity. Among them, a flagship measure considered during the last few months is to standardize asset backed securities so as to encourage increased trading in the secondary market. …”
    Get full text
    Article
  13. 8753

    Games and gamers: the influence of participating players on the process and outcome of regional spatial energy games by Hartmut Dumke, Pia Nabielek

    Published 2025-01-01
    “…Our approach assigns different attributes to individual players which secures that the game is played from various perspectives and by actual stakeholders. …”
    Get full text
    Article
  14. 8754

    Whole of Government: An Effective Strategy for Ensuring Child Support Post-Religious Court Rulings by Istiqomah Sinaga, Asmuni Asmuni, Dhiauddin Tanjung

    Published 2024-10-01
    “…This research aims to evaluate how well the 'Whole of Government Response' strategy works in securing post-divorce child support.…”
    Get full text
    Article
  15. 8755

    Les nations indiennes, source inattendue d’innovation by Marie-Claude Strigler

    Published 2006-01-01
    “…Far from being fossilized societies, prisoners of their colonial past, Indian nations have always innovated in this domain, using their traditions to find new and original solutions to their economic problems, while securing their cultural identity. There is a renewal of Indian cultures whenever a tribe’s traditions and values are the basis of its development.…”
    Get full text
    Article
  16. 8756

    State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks by Xiaoying ZHANG, Hui PENG, Hong CHEN

    Published 2018-10-01
    “…A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.…”
    Get full text
    Article
  17. 8757

    Iterative algorithms with seminorm-induced oblique projections by Yair Censor, Tommy Elfving

    Published 2003-01-01
    “…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
    Get full text
    Article
  18. 8758

    Decentralized searchable encryption scheme based on dynamic accumulator by Yan ZHANG, Jinfan WANG, Zhuyun QI, Rongwei YANG, Yi WANG

    Published 2019-04-01
    “…Since the flourish of the blockchain technology,a series of applications based on blockchain technology are emerging,and the decentralized storage service becomes the killer App in the decentralized markets,such as StorJ,Filecoin.Comparing with the centralized storage,decentralized storage are more secure,cheaper and more scalable.However,client’s privacy cannot be protected in existed decentralized storage apps.The idea of implementing the searchable encryption scheme with decentralized storage was proposed to improve the user’s privacy and utilizing the dynamic accumulator to improve the search efficiency of the searchable encryption scheme.…”
    Get full text
    Article
  19. 8759

    Research on reconfigurable information communication basal network architecture by Ju-long LAN, Dong-nian CHENG, Yu-xiang HU

    Published 2014-01-01
    “…Based on the thinking of network reconfiguration,the reconfigurable information communication basal network architecture was proposed,and then the network atomic capacity theory,polymorphic addressing and routing mechanism,network reconfiguration mechanism and the secure manageability and controllability mechanism were put forward respectively.The architecture would provide a resolution for current and future applications with different quality of services,flexible and expansible function,universal inter-connection,heterogeneous convergence,manageability and controllability,which also supports the compatible evolution with current internet and is feasible to be implemented on a large scale.…”
    Get full text
    Article
  20. 8760

    Fare non-repudiation protocol based on identity-based cryptography by LIU Hong-wei, XIE Wei-xin, YU Jian-ping, ZHANG Peng

    Published 2009-01-01
    “…A signature scheme with the one-off blind public key was proposed based on identity-based cryptography,and thus was applied in a new fare non-repudiation protocol.In this protocol,the sender was anonymity,so avoid that the recipient deliberately rejected the files or delayed reading the files when the files were not good for them,which could assure the equity and non-repudiation of the communication between the sender and the recipient.The signature scheme with the one-off blind public key and non-repudiation protocol is both secure and effective by analysis.…”
    Get full text
    Article