Suggested Topics within your search.
Suggested Topics within your search.
- English language 21
- Grammar 15
- History 13
- English 11
- Study and teaching 8
- methods 7
- French language 6
- Rhetoric 6
- Usage 6
- Foreign speakers 5
- Law 5
- Nursing 5
- Politics and government 5
- Report writing 5
- Research 5
- College readers 4
- Economic conditions 4
- History and criticism 4
- Management 4
- Mass media 4
- Moral and ethical aspects 4
- Psychological aspects 4
- diagnosis 4
- Digital techniques 3
- Domestic relations 3
- Economic development 3
- Economic policy 3
- Evaluation 3
- Foreign economic relations 3
- Forests and forestry 3
-
76721
ID-based wireless authentication scheme with anonymity
Published 2009-01-01“…Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.…”
Get full text
Article -
76722
Creative action mode of the university teacher, singularities for the distance education
Published 2024-07-01“…Therefore, this process demands from the teacher a creative mode of action that guarantees independent, self-regulated and responsible learning and promotes the integral formation of the personality of the student to acquire knowledge and develop skills to learn, learn to do and learn to be with the use of technologies. …”
Get full text
Article -
76723
Impact of Retention Agents on Functional Properties of Recycled Paper in Sustainable Manufacturing
Published 2025-01-01“…The results obtained indicate that while the retention agent can enhance papermaking efficiency by improving retention, drainage, and sheet formation, it also negatively impacts the tensile strength and surface smoothness of the recycled paper. …”
Get full text
Article -
76724
Nas tramas do neoliberalismo: o impacto do Airbnb no setor hoteleiro e no mercado imobiliário em São Paulo e no Rio de Janeiro, Brasil
Published 2024-12-01“…Introduzido no Brasil em 2012, a plataforma está presente em todos os estados do país, dominando as cidades com grande fluxo de turistas, embora enfrente forte concorrência de outras plataformas menores. …”
Get full text
Article -
76725
The role of religious mentoring in countering extremism and terrorism
Published 2017-12-01“…The paper focuses on the important role that religious mentoring can play against extremism and terrorism, specifically the institution of Marja al-taqlid, and provides an overview of the particular forms of Islamic extremism that have emerged today. …”
Get full text
Article -
76726
Vaping – A Beneficial Alternative to Traditional Cigarettes or an Unexplored Danger?
Published 2025-01-01Get full text
Article -
76727
Tourism and diversity
Published 2017-10-01“…Besides, an ethnically or linguistically varied population can also provide a linguisticaly more skilful labour force, that is more sensitive to the needs of visitors coming from different cultures, and thus create a more comfortable environment for them. …”
Get full text
Article -
76728
Potential use of green algae Caulerpa lentillifera as feed ingredient in the diet of Nile tilapia Oreochromis niloticus
Published 2017-07-01“…The second experiment is growth performance test using a completely randomised design with four diets were formulated at variuos rates of C. lentillifera meal of 0 (control), 10, 20, and 30%. …”
Get full text
Article -
76729
Experts’ recommendations for developing academic staff’s research skills: a case in Vietnam
Published 2022-11-01“…According to the data, the experts proposed three different professional development activities for enhancing their staff’s research productivity, including organizing training events for developing lecturers’ research skills and knowledge, formulating research teams according to their interests, and encouraging them to write and publish their studies throughout rewards and punishments. …”
Get full text
Article -
76730
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01“…Attack surface is an important index to measure security of software system.The general attack surface model is based on the I/O automata model to model the software system, which generally uses a non-redundant architecture and it is difficult to apply to heterogeneous redundant system architectures such as multi variant systems.Manadhatad et al.proposed a method to measure the attack surface in a dissimilar redundancy system.However, the voting granularity and voting method of the system architecture adopted by Manadhatad are different from those of the multi-variant system, which cannot accurately measure the attack surface of the multi variant system.Therefore, based on the traditional attack surface model, combined with the characteristics of heterogeneous redundant architecture of multi variant systems, the traditional attack surface model was extended and the attack surface model of multivariant systems was constructed.The attack surface of the multi variant system was represented in a formal way, and the traditional attack surface model was improved according to the voting mechanism of the multi variant system at the exit point of the system, so that it can explain the phenomenon that the attack surface of the multi variant system shrinks.Through this modeling method, the change of the attack surface of the multi variant system adopting the multi variant architecture can be explained in the running process.Then, two groups of software systems with multi variant execution architecture were used as analyzing examples.The attack surface of the software systems with the same functions as those without multi variant architecture were compared and analyzed in two situations of being attacked and not being attacked, reflecting the changes of the multi variant system in the attack surface.Combining the attack surface theory and the characteristics of the multi variant execution system, an attack surface modeling method for the multi variant execution system was proposed.At present, the changes of the attack surface of the multi variant execution system can be qualitatively analyzed.In-depth research in the quantitative analysis of the attack surface of the multi variant execution system will be continually conducted.…”
Get full text
Article -
76731
“No data, no problem”? Potential inequities in psychosis among immigrants in the United States
Published 2025-06-01“…However, these investments must center on autonomy and self-determination of immigrants, given the documented harms of coercive care, such as forced treatment of individuals who experience psychosis, which is once again on the rise nationally.…”
Get full text
Article -
76732
Souhaits oubliés : documents de fin de vie des personnes trans vivant avec une démence aux marges des changements juridiques
Published 2021-07-01“…Literature on the topic of trans older adults has documented a few anecdotal cases in which some trans people living with dementia forgot they transitioned and reidentified with their sex assigned at birth (“detransition”). …”
Get full text
Article -
76733
Special criminology measures for preventing unvoluntary leaving a military unit or place of service
Published 2023-10-01“…The spread of the specified type of criminal act forces lawyers to investigate the nature of the commission of the crime provided for in Art. 407 of the Criminal Code of Ukraine (hereinafter referred to as the Criminal Code of Ukraine), criminological characteristics, dynamics, the person-criminal, as well as prevention measures, among which it is possible to single out the special criminological orientation, which can be recognized as narrowly directed and designed to effectively solve the tasks. …”
Get full text
Article -
76734
Anti-ablation and thermal insulation properties of silicone rubber composites based on ceramization-carbonization mechanism
Published 2024-12-01“…This was mainly attributed to the ceramization-carbonization coupling reaction between the anti-ablation fillers and silicone rubber matrix, which led to the formation of a dense ablation layer that covered the surface of carbon fiber cloth. …”
Get full text
Article -
76735
El género en el Estado: entre el discurso civilizatorio y la ciudadanía
Published 2001-07-01“… Abordar las ambiguas percepciones que sobre la perspectiva de género se han formado funcionarios/as estatales problematiza el proceso de colocación de Las demandas de género en el Estado: se trata de una lucha por el poder interpretativo y la legitimidad de esos significados. …”
Get full text
Article -
76736
Exploration of alcohol dehydrogenase EutG from Bacillus tropicus as an eco-friendly approach for the degradation of polycyclic aromatic compounds
Published 2025-01-01“…The aim of this study is to use Bacillus tropicus which is a spore-forming, gram-positive and facultative anaerobic bacteria, containing a gene for PACs degradtion. …”
Get full text
Article -
76737
Identification of Salty Dietary Patterns of the Japanese Macroregion
Published 2021-01-01“…This pattern is thought to have formed over a long period of time because of the influence of environmental factors, such as local climate.…”
Get full text
Article -
76738
Tuber Cinereum Diverticula in a 28-Month-Old with Xq21 Deletion Syndrome
Published 2014-01-01“…Imaging revealed corpus callosum dysgenesis, forniceal hypoplasia, vermian hypoplasia, and hypothalamic dysmorphism characterized by tuber cinereum diverticula. …”
Get full text
Article -
76739
An Autonomous Underwater Vehicle Navigation Technique for Inspection and Data Acquisition in UWSNs
Published 2024-01-01“…The model successfully navigates to the target point in 3D coordinates X Y Z, assuming the launch point as d0 (10 40 40), and reaches the q-goal target point (45 45 0) within 21 seconds, with the addition of uattractive and urepulsive (magnetic beacon attraction force and repulsion force as simulation of underwater current disturbance factor). …”
Get full text
Article -
76740
Pengembangan panduan konseling CBT teknik kognitif dispute serta modeling untuk meningkatkan self-efficacy kesehatan reproduksi siswa
Published 2023-03-01“…The results of this study indicates that (1) produce a CBT counseling guidebook, and (2) test the validity of the Lawshe formula for the contents of the guidebook. The results obtained from the validity test using Lawshe CVR and CVI showed that the per-item value was greater than zero (CVR>0). …”
Get full text
Article