Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8941
The Global Finical Crisis from an Islamic Point Of View
Published 2021-04-01“…The Sukuk, of the Islamic mortgage-Backed securities (MBS), and Islamic future contract will be discussed in order to prove why using the Islamic Financial system is better to assure that this kind of global crisis doesn’t come to pass again. …”
Get full text
Article -
8942
Highly robust co‐estimation of state of charge and state of health using recursive total least squares and unscented Kalman filter for lithium‐ion battery
Published 2024-12-01“…Abstract State of charge (SOC) and state of health (SOH) constitute pivotal factors in the efficient and secure management of lithium‐ion batteries, particularly within the context of electric vehicles. …”
Get full text
Article -
8943
Preparation of Microfiber Grating for Real-Time Sensing of Escherichia Coli Concentration
Published 2020-01-01“…Various diseases are spread by means of contaminated water or food, and the detection of pathogenic bacteria has great significance for securing a proper healthy environment for human beings. …”
Get full text
Article -
8944
Evolutionary Game Analysis of Capital-Constrained Supplier’s and Manufacturer’s Financing Schemes
Published 2021-01-01“…Purchase order financing (POF) and buyer direct financing (BDF) are both innovative financing schemes aiming to help financial constrained suppliers secure financing for production. In this paper, we investigate the interaction mechanism between suppliers’ financing strategy selection and manufacturers’ loans offering strategy adoption under two innovative financing schemes. …”
Get full text
Article -
8945
American Studies in Norway: Historic Ideals and Contemporary Challenges
Published 2024-12-01“… Because of its particular history of institutionalization, American studies in Norway has come to fill a unique role in higher education, one that requires broader recognition to secure the field a stable future. In this article, Falke connects the past of American studies in Norway to its present by focusing on three founding moments. …”
Get full text
Article -
8946
Data sharing scheme for 5G IoT based on blockchain
Published 2020-08-01“…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
Get full text
Article -
8947
Eaux, risques majeurs et patrimoine culturel : des directives européennes aux stratégies territoriales, état des lieux de la mise en œuvre en France
Published 2014-12-01“…They forced those involved in heritage management to consider the heritage resources associated with water ; to recognise them and to identify actions in order to heighten awareness and secure their protection. These heritage enquiries in regiontake different forms (inventories, university programs, inter-ministerial working groups ...) and they must be interlinked in order to show that natural and cultural heritage ressources inseparable.…”
Get full text
Article -
8948
Rehabilitation of Nonsyndromic Oligodontia in Deciduous Dentition Using Modified Hollywood Bridge - A Case Report
Published 2024-11-01“…In this appliance, molars are banded and acrylic teeth were secured to the stainless steel palatal wire with the help of heat cure acrylic resin. …”
Get full text
Article -
8949
Effects of (Ti, Mo)C precipitation on the microstructure, impact toughness, and sulfide stress corrosion cracking resistance of linepipe steels
Published 2025-01-01“…(Ti, Mo)C precipitation can help secure the strength, low-temperature toughness, and sulfide stress corrosion cracking (SSCC) resistance required for linepipes. …”
Get full text
Article -
8950
Design of privacy-preserving authentication protocol for service invocation
Published 2018-03-01“…Aiming at the requirement of the safe transmission of authentication credentials and the privacy preserving in service orientied multi-domain collaboration environment,a privacy-preserving authentication protocol for service invocation based on the provable secure certificateless aggregate signcryption scheme was proposed.By the path of the service invocation,the authentication information has been signcrypted successively,ensuring that the service providers can dynamically and orderly join in the process of service invocation authentication.The credentials and shared information can be safely transmitted respectively by the aggregate signcryption scheme and Diffie-Hellman algorithm,thus the SOAP message only can be decoded by specified acceptor,which is suitable for controlling the disclosure scope of the privacy information.Simultaneously,the public verifiability of CLASC can ensure that the validity of the aggregate signcryption can be verified by other service providers.The length of the SOAP message is shorter than existed protocols,which improve the transfer efficiency.…”
Get full text
Article -
8951
Diviser pour mieux juger : concurrence et convergence des parlements au xve siècle
Published 2022-01-01“…It intended to intensify judicial activity, to secure the loyalty of the cities and to govern closely the conquered territories. …”
Get full text
Article -
8952
Evaluating GPT models for clinical note de-identification
Published 2025-01-01“…Abstract The rapid digitalization of healthcare has created a pressing need for solutions that manage clinical data securely while ensuring patient privacy. This study evaluates the capabilities of GPT-3.5 and GPT-4 models in de-identifying clinical notes and generating synthetic data, using API access and zero-shot prompt engineering to optimize computational efficiency. …”
Get full text
Article -
8953
Full duplex secret transmission scheme based on user cooperation
Published 2017-01-01“…Full-duplex artificial noise scheme can achieve a limited improvement while the interference power keeps increasing and the full-duplex gain is null.To solve these two problems,a full-duplex secure transmission scheme based on user cooperation was proposed,in which the full-duplex receiver used partial power to send artificial noise,and transmitted the downlink signal by the remaining power to the user who shared the same frequency.In order to maximize the system secrecy rate,the beam vector of the desired signal and the artificial noise were designed.Besides,the optimal power allocation factor was obtained by one-dimensional search simply.Simulation results show that compared with the RS-ref and HD methods,the proposed method can achieve an approximate linear growth in high power and can obtain the full-duplex gain.…”
Get full text
Article -
8954
DIGITAL TOOLS FOR MATCHING QUALIFICATIONS TO THE LEVELS OF THE NATIONAL QUALIFICATIONS FRAMEWORK
Published 2024-04-01“…For the most general case of four NQF descriptors, Microsoft Excel macro is developed to secure achieving any level of accuracy. Corresponding API is developed by PHP programming language. …”
Get full text
Article -
8955
Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children
Published 2024-11-01“…Our results suggest that rapid-access devices may be the most preferable firearm storage devices for distribution by secure storage programs, and costs are likely minimal given parental/caregiver willingness to pay.…”
Get full text
Article -
8956
De la controverse à la conversion : Venise et la défense de la rhétorique dans The Ephemerides of Phialo de Stephen Gosson
Published 2008-03-01“…Ultimately, if Gosson failed to secure Sir Philip Sidney’s patronage—despite dedicating The Ephemerides to Sidney—he contributed to including and furthering the image of Venice within the field of prose fiction while denouncing the very evils of fiction itself.…”
Get full text
Article -
8957
La “familizzazione” dell’impresa: alcune riflessioni sul familismo imprenditoriale in Brianza nella crisi economica attuale
Published 2017-03-01“…The leader of a small family firm may decide to include or to exclude some kin members from the process of intergenerational succession in order to secure corporate earnings and good performance in the upcoming future. …”
Get full text
Article -
8958
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article -
8959
No Easy Way In
Published 2025-01-01“…This, in turn, further erodes solidarity amongst squatters, prompting Keith to turn to new methods of securing accommodation. Keywords: squatting, community, neoliberalism, solidarity, criminalisation, housing …”
Get full text
Article -
8960
Hmotné (ne)zajištění evangelických kazatelů v první a druhé generaci
Published 2020-12-01“…The situation of the second-generation preachers is not known so well, however, usually a stable and secure position is attributed to them. Looking closer at both the generations, it is evident that in neither of them the financial state of preachers was definite and their material provision did not depend so much on the amount of service but on the broader economic and social aspects. …”
Get full text
Article