Suggested Topics within your search.
Suggested Topics within your search.
- Grammar, Comparative and general 2
- Health and hygiene 2
- Neonatal Intensive Care 2
- Syntax 2
- Women 2
- Christianity 1
- Content analysis (Communication) 1
- Context (Linguistics) 1
- Criminal investigation 1
- Dermatopathology 1
- Diagnostic Pathology 1
- English language 1
- Fraud investigation 1
- Grammar 1
- Grammar, Generative 1
- Investigations 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Perspective (Linguistics) 1
- Science fiction 1
- Science fiction, American 1
- Science fiction, English 1
- Semantics 1
- Spanish language 1
- Subjectivity (Linguistics) 1
- Theology 1
-
1901
El largo camino de “naciones católicas” a “repúblicas pluriculturales” en América Latina
Published 2005-12-01Get full text
Article -
1902
Matériaux et structure des « brocarts appliqués » dans les anciens Pays-Bas méridionaux
Published 2021-03-01“…This comprehensive study resulted in a published work entitled “Imitation and Illusion, Applied Brocade in the Art of the Low Countries in the Fifteenth and Sixteenth Centuries”. …”
Get full text
Article -
1903
Les investisseurs étrangers à l’assaut des terres agricoles africaines.
Published 2010-12-01“…These investments correspond to very diverse stakes and give rise to rudimentary contract the exact clauses which are often underestimated. This very mediatized phenomenon is extremely debated and arouses virulent criticisms while the scientific analyses on the subject are still very rare. …”
Get full text
Article -
1904
Hybird group key management scheme for wireless sensor networks
Published 2010-01-01“…Since sensor nodes join or leave the wireless sensor networks frequently,it is necessary to build a secure and efficient group key management system.An efficient and secure group key management scheme was proposed.Private-key cryptosystems are used to encrypt multicast messages and rekey the group when new nodes join the group,while the tech-nology of identity-based broadcast encryption is used to distribute the group key and rekey the group when nodes leave the group.The proposed scheme satisfies the desired security properties,such as forward secrecy,backward secrecy and collusion resistant.Compared with existing group key management schemes in wireless sensor networks,the scheme can efficiently reduce key storage and communication overhead of rekeying messages.As storage overhead and rekeying cost of nodes are not dependent of the scale of networks,the proposed scheme is applicable to wireless sensor networks.…”
Get full text
Article -
1905
Attribute-based proxy re-encryption scheme with multiple features
Published 2019-06-01“…A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA).…”
Get full text
Article -
1906
Design method of secure computing protocol for deep neural network
Published 2020-08-01“…Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.…”
Get full text
Article -
1907
Existence of The Land Bank Agency in The Context of Investment Development in Indonesia
Published 2024-12-01“…However, there are pros and cons related to the substance contained in the Job Creation Law, such as seeming to revive the domain verklaring, the alleged bias of the Government regarding the granting of permits to business entities and/or investors, overlapping authority and misinterpretation of the public regarding the main duties and functions of the Land Bank which is considered a new forum for corruption, collusion and nepotism (CCN) because, in the same sector, there is already the Ministry of ATR/BPN which also regulates the land sector in Indonesia, so that clear restrictions are needed between institutions, therefore this systematic review is a bridge for the Government, investors and the public to realize legal certainty.…”
Get full text
Article -
1908
Lightweight and Scalable Intrusion Trace Classification Using Interelement Dependency Models Suitable for Wireless Sensor Network Environment
Published 2013-07-01“…The k -TGST storage mechanism enables us to scale up the classifiers, which cannot be easily achieved by Support-Vector-Machine- (SVM-) based methods that require implausible computing power and resources for accuracy. …”
Get full text
Article -
1909
An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
Published 2014-11-01“…Our scheme provides confidentiality, security, and resistance to collusion attack. We analyze the correctness, security, and energy consumption of the scheme.…”
Get full text
Article -
1910
Reputation computation based on new metric in P2P network
Published 2008-01-01“…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
Get full text
Article -
1911
Multi-authority attribute-based identification scheme
Published 2021-03-01“…Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance.…”
Get full text
Article -
1912
Phenobarbital as an adjunctive agent for sedation in pediatric intensive care unit patients: A single-center, retrospective study from Colorado
Published 2024-09-01“…Conclusions: The use of phenobarbital as an adjunct sedative was associated with a statistically significant increase in time spent in the goal sedation score range and decrease in ME, BZDE, and concomitant sedative boluses.…”
Get full text
Article -
1913
Lability and the rigidification of word order: evidence from Early Middle English
Published 2023-09-01“…Four of them have long been explored in the literature: object type, object length, clause type and type of verbal cluster (±auxiliary). …”
Get full text
Article -
1914
Hryhorii Skovoroda's Aphoristics: Structural, Semantic and Stylistic Aspects
Published 2024-06-01“…Among the complex constructions, complex subordinate clauses, mostly of minimal structure, prevail. …”
Get full text
Article -
1915
Efficacy of Opioid-Free Anesthesia with Dexmedetomidine in Inhibiting Nociception during Laparoscopic Abdominal Procedures: A Randomized Clinical Trial
Published 2024-12-01“…Materials and Methods: A total of 58 subjects undergoing abdominal laparoscopic surgery were enrolled in the study and were randomly assigned into two groups: the OFA group (n = 29) received a dexmedetomidine bolus of 1 µg/kg, and the OA group (n = 29) received a fentanyl bolus of 2 µg/kg. …”
Get full text
Article -
1916
Continuous glucose monitoring among adults with type 2 diabetes receiving noninsulin or basal insulin therapy in primary care
Published 2024-12-01“…CGM use in a primary care setting compared to usual care significantly improved glycemic control in T2D patients not on bolus insulin, irrespective of treatment with non-insulin or basal insulin. …”
Get full text
Article -
1917
Comparisons of Esophageal Function Tests between Chinese and British Patients with Gastroesophageal Reflux Disease
Published 2015-01-01“…Values for British patients, Chinese patients, and healthy volunteers were as follows: Lower esophageal sphincter pressure (LESP) 16.0±8.6, 16.5±10.0, and 26.4±10.9 mmHg, peristalsis (normal/small break/large break) 24/12/23, 44/10/28, and 57/1/4, total bolus transit time (TBTT) 7.3±1.3, 7.6±1.2, and 6.9±0.9 s, and complete bolus transit rate (CBTR) 66.7±37.8, 61.7±36.4, and 90.3±14.0%, respectively. …”
Get full text
Article -
1918
İKTİSADİ BÜYÜME OLGUSUNA EKONOMETRİK BİR YAKLAŞIM: “BRIMCH” ÜLKELERİ VE TÜRKİYE ÖRNEĞİ
Published 2012-12-01“…Dünya Savaşı’ndan sonra önde gelen iktisatçılar tarafından ilgi odağı olmuş kalkınma ekonomisinin, sanayi devriminden sonra ulusların zenginliğini belirlemede temel ölçüt olmuş büyüme kuramlarından daha kısa bir geçmişi vardır. …”
Get full text
Article -
1919
İKTİSADİ BÜYÜME OLGUSUNA EKONOMETRİK BİR YAKLAŞIM: “BRIMCH” ÜLKELERİ VE TÜRKİYE ÖRNEĞİ
Published 2012-12-01“…Dünya Savaşı’ndan sonra önde gelen iktisatçılar tarafından ilgi odağı olmuş kalkınma ekonomisinin, sanayi devriminden sonra ulusların zenginliğini belirlemede temel ölçüt olmuş büyüme kuramlarından daha kısa bir geçmişi vardır. …”
Get full text
Article -
1920
Magnetohydrodynamic Peristaltic Propulsion of Casson Nanofluids With Slip Effects Over Heterogeneous Rough Channel
Published 2025-01-01“…The results are further explored by analyzing pressure drop, friction force, and bolus shapes created by the sinusoidal motion of the fluid. …”
Get full text
Article