-
61
بررسی تأثیرات خشکسالی بر کیفیت منابع آب سطحی پُل دختر
Published 2025-01-01Subjects: Get full text
Article -
62
Spatiotemporal evolution and driving force analysis of drought characteristics in the Yellow River Basin
Published 2025-01-01Subjects: Get full text
Article -
63
Salmonella pathogenicity Island 1 undergoes decay in serovars adapted to swine and poultry
Published 2025-01-01Subjects: Get full text
Article -
64
Evaluation of Drought Using Meteorological Drought Indices, a Case Study: Alanya (Türkiye)
Published 2024-01-01Subjects: “…standardized precipitation index (spi)…”
Get full text
Article -
65
بررسی پایداری سطح آب زیرزمینی در دشت اسلامآباد غرب (استان کرمانشاه) و ارزیابی وضعیت آینده با مدلهای گردش عمومی جو...
Published 2025-01-01Subjects: “…شاخص gri؛ شاخص spi؛ دشت اسلامآباد غرب؛ سطح آب زیرزمینی؛ مدلهای گردش عمومی جو…”
Get full text
Article -
66
Foul heart huntsman : book two in the foul lady fortune duet /
Published 2023Subjects: “…Spies Fiction. 14246…”
View in OPAC
Book -
67
A Versatile Method to Create Antibody/Split‐Enzyme Complexes and Its Application to a Rapid, Homogeneous, and Universal Electrochemical Immunosensing System
Published 2025-01-01“…SpyTag‐fused single‐chain variable fragments (scFvs) are employed, which leads to the simple preparation of antibody‐split enzyme complexes (split AECs). …”
Get full text
Article -
68
SOME DATABASE MANAGEMENT TOOLS FOR DATA MODELING AND REVERSE ENGINEERING
Published 2023-05-01“…The implementation was done in PostgresSQL 15, and for the database schema we used Altova's DatabaseSPY utility. …”
Get full text
Article -
69
Film music and construction of tourist imaginaries in Hollywood blockbusters
Published 2023-07-01“…The various films of the two successful spy franchises, James Bond and Mission: Impossible, are distinguished not only by their lead actors (heroes and antagonists), but also by their geographical settings. …”
Get full text
Article -
70
Victorian and Edwardian Virtual Reality: from Stoker to Forster
Published 2018-06-01“…Dracula engages with transmission in a dual way, turning Mina’s mind into a radio-system which the Count may switch on and off, whereas Van Helsing may reverse the signal and spy on the vampire; technology embodying modernity, from the phonograph to the typewriter or telegraph, may vanquish the Count’s archaic powers of transmission. …”
Get full text
Article -
71
Lightweight integrity verification scheme for cloud based group data
Published 2016-10-01“…In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.…”
Get full text
Article -
72
Cold War in Space: Reconnaissance Satellites and US-Soviet Security Competition
Published 2023-07-01“…This in turn allowed for a more peaceful coexistence between these two ideologically opposed superpowers. Spy satellites allowed for a better assessment of the other side’s military strength, created a system of early warning for nuclear attacks, and offered a non-invasive way of verifying arms control treaties. …”
Get full text
Article -
73
Reputation computation based on new metric in P2P network
Published 2008-01-01“…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
Get full text
Article -
74
Wild Wild West : une série au carrefour des affirmations dans les États-Unis du milieu des années 1960
Published 2020-02-01“…While it cleverly brings together the aesthetics of the western and spy fiction, its success also has to do with the historical and social relevance of the themes it addresses. …”
Get full text
Article -
75
Cache timing attack on SMS4
Published 2010-01-01“…Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.…”
Get full text
Article -
76
“I shall not concern the Union in this Discourse” : Prétérition et engagement dans l’écriture pro-unioniste de Daniel Defoe, voyageur en Écosse
Published 2016-12-01“…Defoe’s position as a secret spy for the government cannot but give a particular color to his literary output, and despite his strong commitment to the cause of the Union, he had to use a “cautious rhetoric” and to play a sort of hide-and-seek game with his readers. …”
Get full text
Article -
77
RBD-displaying OMV nanovaccine boosts immunity against SARS-CoV-2
Published 2025-02-01“…Results In this study, we utilized the SpyTag (ST)/SpyCatcher (SC) bioconjugation system to couple OMV and SARS-CoV-2 RBD in vitro. …”
Get full text
Article -
78
From Villainess to Gilead’s Nemesis: The (Un)easy Rehabilitation of Aunt Lydia
Published 2025-01-01“…Taking The Testaments as a point of departure, the article rereads the original tale, which, astonishingly, discloses a number of equivocal passages that in fact might provide credibility to Atwood’s audacious refashioning of Aunt Lydia as a Mayday spy. The article offers a reevaluation of Aunt Lydia’s villainy in The Handmaid’s Tale through the lens of her undercover identity, revealed in The Testaments. …”
Get full text
Article -
79
L’Affaire Charles Lainé (1818), ou comment la police fabriquait un faux-monnayeur
Published 2011-12-01“…This item of news would have remained unknown if a magistrate had not spontaneously denounced the scandalous behaviour of a police spy who had encouraged Lainé to commit the crime. …”
Get full text
Article -
80
Analysis of geometric structure of woven fabrics surface.
Published 2022-09-01“…Surface topography measurements were performed using the MicroSpy® Profile profilometer by FRT the art of metrology™. …”
Get full text
Article