Showing 86,401 - 86,420 results of 97,030 for search 'it*', query time: 0.35s Refine Results
  1. 86401

    Preparation, Characterization and Antibacterial Activity of Some Metal ion Complexes by M. M. El-Ajaily, F. A. Abdlseed, S. Ben-Gweirif

    Published 2007-01-01
    “…The electronic absorption spectra of the Schiff base and its complexes show π→π* (phenyl ring), n→π* (HC=N) and the expected geometrical structure for the prepared complexes. …”
    Get full text
    Article
  2. 86402

    FUZZY ALGORITHM TO CONTROL REACTIVE POWER FLOW IN ELECTRIC NETWORK WITH NONLINEAR LOADS by H. B. Guliyev

    Published 2016-08-01
    “…In the reality stochastic character of power consumption of nonlinear load reveals itself in appropriate changes in harmonic components of voltage and their share in total load current. …”
    Get full text
    Article
  3. 86403

    Mas'uliyah Society Brand Resonance: Enhancing Sustainable Marketing Performance of the National Health Insurance Program by Dina Lusianti, Widodo Widodo, Mulyana Mulyana

    Published 2024-09-01
    “…By leveraging the insights from this study, the National Health Insurance program in Indonesia could potentially strengthen its connection with participants, fostering a more sustainable and ethically grounded system that benefits all stakeholders. …”
    Get full text
    Article
  4. 86404
  5. 86405

    The agenda premises of the judicialization of politics: policy attention in Israel’s high court of justice by Maoz Rosenthal, Assaf Meydani

    Published 2025-01-01
    “…This study examines the supposed “activism” of Israel’s High Court of Justice amid recent political crises and legislative efforts to curb its powers. While judicial behavior often balances political activism and constitutional problem-solving, this paper analyzes the Court’s agenda structure to assess its approach. …”
    Get full text
    Article
  6. 86406

    Toward an Architecture of Dissensus: Participatory Urbanism in South-East Asia by Camillo Boano, Emily Kelling

    Published 2013-06-01
    “…A critical reflection of the Thai programme Baan Mankong (secure housing) and its regional counterpart Asian Coalition for Community Action (ACCA) – an entity aimed at creating an alternative development process in which people that were previously ignored and marginalized are engaged at the centre of a process of transforming their lives, spaces and position in the city – sheds light on such relationship in order to promote a re-conceptualisation of the role of architecture and design in the process of socially just urban development, participatory urbanism and the struggle for democracy.…”
    Get full text
    Article
  7. 86407

    Designing and validating an adaptation tool for endometriosis: an exploratory mixed method study protocol by Sanaz Mollazadeh, Nahid Marvi, Talat Khadivzadeh

    Published 2025-01-01
    “…Research findings have highlighted its impact on different aspects of women's lives. …”
    Get full text
    Article
  8. 86408

    L’électronique à l’aide de l’éditeur : miracle ou mirage ? Bilan de quatorze années de travaux au LFA by Pierre Kunstmann

    Published 2012-09-01
    “…Indeed, the wide range of tools the database offers allows its user to address efficiently a great number of texts.…”
    Get full text
    Article
  9. 86409

    „Vy zly a nespravedlivy lvde Bardiowci.“ Mesto Bardejov v boji proti zbojníkom v 15. storočí by Mária Fedorčáková

    Published 2015-10-01
    “…The royal town of Bardejov and its activities directed against brigands and criminal groups operating in the mentioned space are in the focus of interest. …”
    Get full text
    Article
  10. 86410

    Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing by Shang LIU, Yinzhang GUO

    Published 2022-06-01
    “…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
    Get full text
    Article
  11. 86411

    Designing an entrepreneurial model in the banking network with a digital technology approach by Afshin Nobakht, majid nasiri, parviz Saeedi

    Published 2024-12-01
    “…The research method is applicable according to its purpose, quantitative in terms of execution method, and exploratory research in terms of nature. …”
    Get full text
    Article
  12. 86412

    Londres, les années 1620 by Michael Palmer

    Published 2021-11-01
    “…The author looks at current events in early 17th century England, a period in which news appeared in the first newspapers, known as corantos, but was also the theme of plays about those who wrote and sold the news. Many of the news items were “false” or “forged” (though they were not what we would call fake news). …”
    Get full text
    Article
  13. 86413

    Overcoming the pitfalls in employee performance evaluation: An application of ratings mode of the Analytic Hierarchy Process by Rafikul Islam, Nagendran Periaiah

    Published 2023-01-01
    “…Once the employees are aware of the criteria and sub-criteria set along with the associated weighting scheme and the evaluation process itself, they will be motivated to perform their tasks and discharge their duties accordingly. …”
    Get full text
    Article
  14. 86414

    Znaczenie „protestantyzacji” dla zmiany modelu kultury serbskiej w wieku XVIII by Dorota Gil

    Published 2023-01-01
    “…The importance of Protestant schools and the University of Halle, rather poorly studied, reveals a great sense of “protestantisation” in the deep transformation of Serbian culture and that of most of the other Orthodox Slavic nations and the Orthodoxy itself. This is important especially with regard to the Pietistic ideas, combined with those of the Enlightenment, promoted by these centres. …”
    Get full text
    Article
  15. 86415

    Application of Targeted Proteomics in Food Safety Detection by CHEN Mengqi, PENG Miaoxi, LIU Jingwen, HUANG Chengdong, WU Zuqing, LING Li, YUAN Muyun, CHEN Wenrui, HU Songqing

    Published 2024-12-01
    “…Targeted proteomics based on mass spectrometry (MS) plays an increasingly important role in addressing this issue due to its high sensitivity, specificity, and quantitative accuracy. …”
    Get full text
    Article
  16. 86416

    P2P and MPEG FGS Encoding: A Good Recipe for Multipoint Video Transmission on the Internet by Alfio Lombardo, Diego Reforgiato, Giovanni Schembra

    Published 2009-01-01
    “…Although in the past the FGS was not employed due to its encoding complexity, today, thanks to advances in hardware technology, we were able to develop an MPEG-4/FGS encoder on low-cost PCs which turned out to be more feasible and appealing for its flexibility. …”
    Get full text
    Article
  17. 86417

    The Strategic Measures for the Industrial Security of Small and Medium Business by Chang-Moo Lee

    Published 2014-01-01
    “…The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. …”
    Get full text
    Article
  18. 86418

    Second-Order Sliding Mode Guidance Law considering Second-Order Dynamics of Autopilot by Kuanqiao Zhang, Suochang Yang

    Published 2019-01-01
    “…Based on the second-order sliding mode control, a second-order sliding mode guidance law with impact angle constraint is proposed. We have proved its finite time convergence characteristics and presented the specific convergence time expression. …”
    Get full text
    Article
  19. 86419

    Advancing CO2++ Modeling in the Martian Dayside Ionosphere: Insights from Natural Lifetime Analysis by Long Cheng, Erik Vigren, Moa Persson, Hao Gu, Jun Cui

    Published 2025-01-01
    “…In this study, we examine the influence of the CO _2 ^++ natural lifetime against spontaneous dissociation on its modeled density. We show that extending the assumed CO _2 ^++ lifetime significantly reduces the discrepancy between the photochemical model predictions and MAVEN observations. …”
    Get full text
    Article
  20. 86420

    Mantle Cell Lymphoma Mimicking Rectal Carcinoma by Engin Kelkitli, Hilmi Atay, Levent Yıldız, Ahmet Bektaş, Mehmet Turgut

    Published 2014-01-01
    “…After the (11;14) translocation was identified as its constant finding in 1992, MCL was recognized as a separate subgroup of non-Hodgkin lymphoma (NHL). …”
    Get full text
    Article