Suggested Topics within your search.
Suggested Topics within your search.
- History 9
- Social conditions 6
- Criminal law 4
- Mass media 4
- Philosophy 4
- Politics and government 4
- Economic development 3
- Information technology 3
- Jews 3
- Management 3
- Moneylenders 3
- Moral and ethical aspects 3
- Study and teaching 3
- Advertising 2
- Agriculture 2
- Civilization 2
- Colonial influence 2
- Constitutional law 2
- Democracy 2
- Economic aspects 2
- Economic policy 2
- Geology 2
- History and criticism 2
- Internet in public administration 2
- Law 2
- Manners and customs 2
- Marketing 2
- Natural resources 2
- Poetics 2
- Psychological aspects 2
-
86401
Preparation, Characterization and Antibacterial Activity of Some Metal ion Complexes
Published 2007-01-01“…The electronic absorption spectra of the Schiff base and its complexes show π→π* (phenyl ring), n→π* (HC=N) and the expected geometrical structure for the prepared complexes. …”
Get full text
Article -
86402
FUZZY ALGORITHM TO CONTROL REACTIVE POWER FLOW IN ELECTRIC NETWORK WITH NONLINEAR LOADS
Published 2016-08-01“…In the reality stochastic character of power consumption of nonlinear load reveals itself in appropriate changes in harmonic components of voltage and their share in total load current. …”
Get full text
Article -
86403
Mas'uliyah Society Brand Resonance: Enhancing Sustainable Marketing Performance of the National Health Insurance Program
Published 2024-09-01“…By leveraging the insights from this study, the National Health Insurance program in Indonesia could potentially strengthen its connection with participants, fostering a more sustainable and ethically grounded system that benefits all stakeholders. …”
Get full text
Article -
86404
Theoretical Rotordynamic Coefficients of Labyrinth Gas Seals: a Parametric Study on a Bulk Model
Published 1999-01-01Get full text
Article -
86405
The agenda premises of the judicialization of politics: policy attention in Israel’s high court of justice
Published 2025-01-01“…This study examines the supposed “activism” of Israel’s High Court of Justice amid recent political crises and legislative efforts to curb its powers. While judicial behavior often balances political activism and constitutional problem-solving, this paper analyzes the Court’s agenda structure to assess its approach. …”
Get full text
Article -
86406
Toward an Architecture of Dissensus: Participatory Urbanism in South-East Asia
Published 2013-06-01“…A critical reflection of the Thai programme Baan Mankong (secure housing) and its regional counterpart Asian Coalition for Community Action (ACCA) – an entity aimed at creating an alternative development process in which people that were previously ignored and marginalized are engaged at the centre of a process of transforming their lives, spaces and position in the city – sheds light on such relationship in order to promote a re-conceptualisation of the role of architecture and design in the process of socially just urban development, participatory urbanism and the struggle for democracy.…”
Get full text
Article -
86407
Designing and validating an adaptation tool for endometriosis: an exploratory mixed method study protocol
Published 2025-01-01“…Research findings have highlighted its impact on different aspects of women's lives. …”
Get full text
Article -
86408
L’électronique à l’aide de l’éditeur : miracle ou mirage ? Bilan de quatorze années de travaux au LFA
Published 2012-09-01“…Indeed, the wide range of tools the database offers allows its user to address efficiently a great number of texts.…”
Get full text
Article -
86409
„Vy zly a nespravedlivy lvde Bardiowci.“ Mesto Bardejov v boji proti zbojníkom v 15. storočí
Published 2015-10-01“…The royal town of Bardejov and its activities directed against brigands and criminal groups operating in the mentioned space are in the focus of interest. …”
Get full text
Article -
86410
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
Get full text
Article -
86411
Designing an entrepreneurial model in the banking network with a digital technology approach
Published 2024-12-01“…The research method is applicable according to its purpose, quantitative in terms of execution method, and exploratory research in terms of nature. …”
Get full text
Article -
86412
Londres, les années 1620
Published 2021-11-01“…The author looks at current events in early 17th century England, a period in which news appeared in the first newspapers, known as corantos, but was also the theme of plays about those who wrote and sold the news. Many of the news items were “false” or “forged” (though they were not what we would call fake news). …”
Get full text
Article -
86413
Overcoming the pitfalls in employee performance evaluation: An application of ratings mode of the Analytic Hierarchy Process
Published 2023-01-01“…Once the employees are aware of the criteria and sub-criteria set along with the associated weighting scheme and the evaluation process itself, they will be motivated to perform their tasks and discharge their duties accordingly. …”
Get full text
Article -
86414
Znaczenie „protestantyzacji” dla zmiany modelu kultury serbskiej w wieku XVIII
Published 2023-01-01“…The importance of Protestant schools and the University of Halle, rather poorly studied, reveals a great sense of “protestantisation” in the deep transformation of Serbian culture and that of most of the other Orthodox Slavic nations and the Orthodoxy itself. This is important especially with regard to the Pietistic ideas, combined with those of the Enlightenment, promoted by these centres. …”
Get full text
Article -
86415
Application of Targeted Proteomics in Food Safety Detection
Published 2024-12-01“…Targeted proteomics based on mass spectrometry (MS) plays an increasingly important role in addressing this issue due to its high sensitivity, specificity, and quantitative accuracy. …”
Get full text
Article -
86416
P2P and MPEG FGS Encoding: A Good Recipe for Multipoint Video Transmission on the Internet
Published 2009-01-01“…Although in the past the FGS was not employed due to its encoding complexity, today, thanks to advances in hardware technology, we were able to develop an MPEG-4/FGS encoder on low-cost PCs which turned out to be more feasible and appealing for its flexibility. …”
Get full text
Article -
86417
The Strategic Measures for the Industrial Security of Small and Medium Business
Published 2014-01-01“…The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. …”
Get full text
Article -
86418
Second-Order Sliding Mode Guidance Law considering Second-Order Dynamics of Autopilot
Published 2019-01-01“…Based on the second-order sliding mode control, a second-order sliding mode guidance law with impact angle constraint is proposed. We have proved its finite time convergence characteristics and presented the specific convergence time expression. …”
Get full text
Article -
86419
Advancing CO2++ Modeling in the Martian Dayside Ionosphere: Insights from Natural Lifetime Analysis
Published 2025-01-01“…In this study, we examine the influence of the CO _2 ^++ natural lifetime against spontaneous dissociation on its modeled density. We show that extending the assumed CO _2 ^++ lifetime significantly reduces the discrepancy between the photochemical model predictions and MAVEN observations. …”
Get full text
Article -
86420
Mantle Cell Lymphoma Mimicking Rectal Carcinoma
Published 2014-01-01“…After the (11;14) translocation was identified as its constant finding in 1992, MCL was recognized as a separate subgroup of non-Hodgkin lymphoma (NHL). …”
Get full text
Article