Showing 8,941 - 8,960 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 8941

    The Global Finical Crisis from an Islamic Point Of View by Hewa Majeed Zangana

    Published 2021-04-01
    “…The Sukuk, of the Islamic mortgage-Backed securities (MBS), and Islamic future contract will be discussed in order to prove why using the Islamic Financial system is better to assure that this kind of global crisis doesn’t come to pass again. …”
    Get full text
    Article
  2. 8942

    Highly robust co‐estimation of state of charge and state of health using recursive total least squares and unscented Kalman filter for lithium‐ion battery by Xiaohui Li, Weidong Liu, Bin Liang, Qian Li, Yue Zhao, Jian Hu

    Published 2024-12-01
    “…Abstract State of charge (SOC) and state of health (SOH) constitute pivotal factors in the efficient and secure management of lithium‐ion batteries, particularly within the context of electric vehicles. …”
    Get full text
    Article
  3. 8943

    Preparation of Microfiber Grating for Real-Time Sensing of Escherichia Coli Concentration by Qingyan Qiu, Min Dai, Caidong Luo, Ying Mu, Wei Du, Yu Li, Jun Luo, Rong Li

    Published 2020-01-01
    “…Various diseases are spread by means of contaminated water or food, and the detection of pathogenic bacteria has great significance for securing a proper healthy environment for human beings. …”
    Get full text
    Article
  4. 8944

    Evolutionary Game Analysis of Capital-Constrained Supplier’s and Manufacturer’s Financing Schemes by Suyong Zhang, Panos. M. Pardalos, Xiaodan Jiang

    Published 2021-01-01
    “…Purchase order financing (POF) and buyer direct financing (BDF) are both innovative financing schemes aiming to help financial constrained suppliers secure financing for production. In this paper, we investigate the interaction mechanism between suppliers’ financing strategy selection and manufacturers’ loans offering strategy adoption under two innovative financing schemes. …”
    Get full text
    Article
  5. 8945

    American Studies in Norway: Historic Ideals and Contemporary Challenges by Cassandra Falke

    Published 2024-12-01
    “…  Because of its particular history of institutionalization, American studies in Norway has come to fill a unique role in higher education, one that requires broader recognition to secure the field a stable future. In this article, Falke connects the past of American studies in Norway to its present by focusing on three founding moments. …”
    Get full text
    Article
  6. 8946

    Data sharing scheme for 5G IoT based on blockchain by Kang QIAO, Wei YOU, Lingwei WANG, Hongbo TANG

    Published 2020-08-01
    “…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
    Get full text
    Article
  7. 8947

    Eaux, risques majeurs et patrimoine culturel : des directives européennes aux stratégies territoriales, état des lieux de la mise en œuvre en France by Virginie Serna

    Published 2014-12-01
    “…They forced those involved in heritage management to consider the heritage resources associated with water ; to recognise them and to identify actions in order to heighten awareness and secure their protection. These heritage enquiries in regiontake different forms (inventories, university programs, inter-ministerial working groups ...) and they must be interlinked in order to show that natural and cultural heritage ressources inseparable.…”
    Get full text
    Article
  8. 8948

    Rehabilitation of Nonsyndromic Oligodontia in Deciduous Dentition Using Modified Hollywood Bridge - A Case Report by A K Safoora, Madhu Santhakumar, Kannan Vadakkepurayil

    Published 2024-11-01
    “…In this appliance, molars are banded and acrylic teeth were secured to the stainless steel palatal wire with the help of heat cure acrylic resin. …”
    Get full text
    Article
  9. 8949

    Effects of (Ti, Mo)C precipitation on the microstructure, impact toughness, and sulfide stress corrosion cracking resistance of linepipe steels by Seoyoon Gong, Seungon Lim, Kyu-Tae Kim, Yong-Jae Yu, S.E. Shin

    Published 2025-01-01
    “…(Ti, Mo)C precipitation can help secure the strength, low-temperature toughness, and sulfide stress corrosion cracking (SSCC) resistance required for linepipes. …”
    Get full text
    Article
  10. 8950

    Design of privacy-preserving authentication protocol for service invocation by Linpeng CHAI, Bin ZHANG, Yang LIU, Jiajia SUN

    Published 2018-03-01
    “…Aiming at the requirement of the safe transmission of authentication credentials and the privacy preserving in service orientied multi-domain collaboration environment,a privacy-preserving authentication protocol for service invocation based on the provable secure certificateless aggregate signcryption scheme was proposed.By the path of the service invocation,the authentication information has been signcrypted successively,ensuring that the service providers can dynamically and orderly join in the process of service invocation authentication.The credentials and shared information can be safely transmitted respectively by the aggregate signcryption scheme and Diffie-Hellman algorithm,thus the SOAP message only can be decoded by specified acceptor,which is suitable for controlling the disclosure scope of the privacy information.Simultaneously,the public verifiability of CLASC can ensure that the validity of the aggregate signcryption can be verified by other service providers.The length of the SOAP message is shorter than existed protocols,which improve the transfer efficiency.…”
    Get full text
    Article
  11. 8951

    Diviser pour mieux juger : concurrence et convergence des parlements au xve siècle by Élisabeth Schmit

    Published 2022-01-01
    “…It intended to intensify judicial activity, to secure the loyalty of the cities and to govern closely the conquered territories. …”
    Get full text
    Article
  12. 8952

    Evaluating GPT models for clinical note de-identification by Bayan Altalla’, Sameera Abdalla, Ahmad Altamimi, Layla Bitar, Amal Al Omari, Ramiz Kardan, Iyad Sultan

    Published 2025-01-01
    “…Abstract The rapid digitalization of healthcare has created a pressing need for solutions that manage clinical data securely while ensuring patient privacy. This study evaluates the capabilities of GPT-3.5 and GPT-4 models in de-identifying clinical notes and generating synthetic data, using API access and zero-shot prompt engineering to optimize computational efficiency. …”
    Get full text
    Article
  13. 8953

    Full duplex secret transmission scheme based on user cooperation by Xiao-lei KANG, Xin-sheng JI, Lu XIA, Kai-zhi HUANG

    Published 2017-01-01
    “…Full-duplex artificial noise scheme can achieve a limited improvement while the interference power keeps increasing and the full-duplex gain is null.To solve these two problems,a full-duplex secure transmission scheme based on user cooperation was proposed,in which the full-duplex receiver used partial power to send artificial noise,and transmitted the downlink signal by the remaining power to the user who shared the same frequency.In order to maximize the system secrecy rate,the beam vector of the desired signal and the artificial noise were designed.Besides,the optimal power allocation factor was obtained by one-dimensional search simply.Simulation results show that compared with the RS-ref and HD methods,the proposed method can achieve an approximate linear growth in high power and can obtain the full-duplex gain.…”
    Get full text
    Article
  14. 8954

    DIGITAL TOOLS FOR MATCHING QUALIFICATIONS TO THE LEVELS OF THE NATIONAL QUALIFICATIONS FRAMEWORK by Volodymyr Kovtunets, Sergiy Londar, Serhii Melnyk, Oles Kovtunets

    Published 2024-04-01
    “…For the most general case of four NQF descriptors, Microsoft Excel macro is developed to secure achieving any level of accuracy. Corresponding API is developed by PHP programming language. …”
    Get full text
    Article
  15. 8955

    Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children by Meredith B. Haag, Catlin H. Dennis, Steven McGaughey, Tess A. Gilbert, Susan DeFrancesco, Adrienne R. Gallardo, Benjamin D. Hoffman, Kathleen F. Carlson

    Published 2024-11-01
    “…Our results suggest that rapid-access devices may be the most preferable firearm storage devices for distribution by secure storage programs, and costs are likely minimal given parental/caregiver willingness to pay.…”
    Get full text
    Article
  16. 8956

    De la controverse à la conversion : Venise et la défense de la rhétorique dans The Ephemerides of Phialo de Stephen Gosson by Anne Geoffroy-Piscou

    Published 2008-03-01
    “…Ultimately, if Gosson failed to secure Sir Philip Sidney’s patronage—despite dedicating The Ephemerides to Sidney—he contributed to including and furthering the image of Venice within the field of prose fiction while denouncing the very evils of fiction itself.…”
    Get full text
    Article
  17. 8957

    La “familizzazione” dell’impresa: alcune riflessioni sul familismo imprenditoriale in Brianza nella crisi economica attuale by Simone Ghezzi

    Published 2017-03-01
    “…The leader of a small family firm may decide to include or to exclude some kin members from the process of intergenerational succession in order to secure corporate earnings and good performance in the upcoming future. …”
    Get full text
    Article
  18. 8958

    Aggregated privacy-preserving auditing for cloud data integrity by Kai HE, Chuan-he HUANG, Xiao-mao WANG, Jing WANG, Jiao-li SHI

    Published 2015-10-01
    “…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
    Get full text
    Article
  19. 8959

    No Easy Way In by Kalev Aasmäe

    Published 2025-01-01
    “…This, in turn, further erodes solidarity amongst squatters, prompting Keith to turn to new methods of securing accommodation. Keywords: squatting, community, neoliberalism, solidarity, criminalisation, housing …”
    Get full text
    Article
  20. 8960

    Hmotné (ne)zajištění evangelických kazatelů v první a druhé generaci by Gabriela Krejčová Zavadilová

    Published 2020-12-01
    “…The situation of the second-generation preachers is not known so well, however, usually a stable and secure position is attributed to them. Looking closer at both the generations, it is evident that in neither of them the financial state of preachers was definite and their material provision did not depend so much on the amount of service but on the broader economic and social aspects. …”
    Get full text
    Article