Showing 1,801 - 1,820 results of 2,564 for search 'mononym~', query time: 2.04s Refine Results
  1. 1801

    Effectiveness of midwife/nurse-led non-invasive uterine massage in preventing postpartum haemorrhage: a quantitative systematic review protocol by Puangpaka Kongvattananon, Boonsurb Sosome, Sopen Chunuan, Treechada Punsomreung, Panida Varachanonth, Patraporn Bhatarasakoon

    Published 2025-02-01
    “…Studies will be pooled in a statistical meta-analysis using JBI System for the Unified Management, Assessment and Review of Information or other software where possible.Ethics and dissemination This systematic review does not require formal ethical approval because all data will be analysed anonymously. The results will provide an overall review and evidence of midwife/nurse-led non-invasive uterine massage intervention in preventing PPH. …”
    Get full text
    Article
  2. 1802

    A deep learning‐based framework to identify and characterise heterogeneous secure network traffic by Faiz Ul Islam, Guangjie Liu, Weiwei Liu, Qazi Mazhar ul Haq

    Published 2023-03-01
    “…Abstract The evergrowing diversity of encrypted and anonymous network traffic makes network management more formidable to manage the network traffic. …”
    Get full text
    Article
  3. 1803

    BanglaBlend: A large-scale nobel dataset of bangla sentences categorized by saint and common form of bangla languageMendeley Data by Umme Ayman, Chayti Saha, Azmain Mahtab Rahat, Sharun Akter Khushbu

    Published 2025-02-01
    “…To achieve the best data quality, rigorous pre-processing techniques such as anonymization and duplication removal were used. The style designations were extensively validated in three steps to ensure correctness. …”
    Get full text
    Article
  4. 1804

    Machine Learning in Money Laundering Detection Over Blockchain Technology by Algimantas Venckauskas, Sarunas Grigaliunas, Linas Pocius, Rasa Bruzgiene, Andrejs Romanovs

    Published 2025-01-01
    “…The approach combines machine learning algorithms with a pre-training process, normalization, model training, and a de-anonymization process to analyze and identify illicit transactions effectively. …”
    Get full text
    Article
  5. 1805

    Expert-analytical Support of Foreign Policy Activities by A. A. Varfolomeev, O. P. Ivanov, I. V. Surma, Y. A. Trefilova

    Published 2021-11-01
    “…The survey and interviews were anonymous. The research is within structural-functional, institutional and regulatory approaches. …”
    Get full text
    Article
  6. 1806

    A survey of obstetric ultrasound uses and priorities for artificial intelligence-assisted obstetric ultrasound in low- and middle-income countries by Amy Sarah Ginsburg, Zylee Liddy, Eren Alkan, Kayla Matcheck, Susanne May

    Published 2025-01-01
    “…To better understand current uses of OBUS in low- and middle-income countries and perceptions regarding potential use of artificial intelligence (AI)-assisted OBUS, we conducted an anonymous online global survey. A total of 176 respondents representing 34 countries participated, including 41% physicians, 49% nurses or midwives, and 6% ultrasound technicians. …”
    Get full text
    Article
  7. 1807

    The interaction effect of personality hardiness and fear of failure to predict achievement motivation adolescents of working mother by Syarifah Farradinna, Sindy Putri Arlena

    Published 2023-06-01
    “…Participants were recruited anonymously and willingly from universities in Pekanbaru, Indonesia, Riau. …”
    Get full text
    Article
  8. 1808

    Blockchain covert communication scheme based on the cover of normal transactions by Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG

    Published 2022-08-01
    “…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
    Get full text
    Article
  9. 1809

    The Lion’s Share of Laughter: A French Angle on the Dramaturgy of Pyramus and Thisbe by Richard Hillman

    Published 2011-09-01
    “…Cet article explore la relation entre la « tragédie » de Pyrame et Thisbé mise sur scène, de manière burlesque, par les Artisans dans Le songe d’une nuit d’été et certains analogues français, dont deux particulièrement intéressants : un long poème de jeunesse par Antoine De Baïf (1572-73) reprenant le récit d’Ovide, ainsi qu’une courte pièce anonyme, basée sur l’Ovide moralisé, qui a été éditée (vers 1535) sous le titre de Moralité nouuelle, recreatifue, & profitable, a quatre personnaiges, pièce certainement destinée à la scène. …”
    Get full text
    Article
  10. 1810

    Cross-domain authentication scheme based on consortium blockchain by Jianlin NIU, Zhiyu REN, Xuehui DU

    Published 2022-06-01
    “…To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockchain.The consortium blockchain was introduced into the cross-domain authentication scene by designing the layered cross-domain authentication architecture including entity layer, proxy layer, blockchain layer and storage layer.In the storage layer, abstract data format was designed and stored in the chain, and the complete data corresponding to the abstract data was stored in the interplanetary file system under the chain.This safe and reliable on-chain distributed storage scheme solved the limitation problem of on-chain storage caused by introduction of blockchain.Besides, an identity management scheme based on permanent autonomy identity and temporary identity was proposed to solve the challenges that it is difficult to cancel identity and to supervise anonymous identity after combining IBC system.On this basis, complete cross-domain full authentication, re-authentication and key negotiation protocols were designed to implement the cross-domain authentication process.In terms of security, SVO logic was used to analyze the authentication protocol, and the security of the cross-domain authentication protocol was proved.The performance of calculation overhead, communication overhead and consortium blockchain were tested and analyzed by simulation.Analysis results showed that the protocol satisfies the security requirements and has improved calculation overhead performance on both server and client sides, comparing with other related works.In terms of communication overhead, it also has better performance.The query/write latency was tested by the consortium blockchain tool, and the results showed that the scheme has good usability.…”
    Get full text
    Article
  11. 1811

    Voices of change: experiences of early women urology residents — a single institution qualitative research study by Aurora J. Grutman

    Published 2025-02-01
    “…Participants were provided written consent and assured of anonymity. In semi-structured interviews guided by a set of IRB-approved questions, participants discussed personal backgrounds, medical school experiences, and residency experiences. …”
    Get full text
    Article
  12. 1812

    Intelligent Digital Currency and Dynamic Coding Service System Based on Internet of Things Technology by Shanshen Li, Xin Jing

    Published 2020-01-01
    “…The amazing rise of digital currency is not only favored by investors but also attractive to lawbreakers for its anonymity and decentralization. This paper mainly discusses the intelligent digital currency and dynamic coding service system based on Internet of Things technology. …”
    Get full text
    Article
  13. 1813

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  14. 1814

    INCREASE OF DEMAND FOR GRADUATES OF HIGHER EDUCATION INSTITUTIONS by Ruslan A. Abramov, Irina V. Pronina, Elena Yu. Khalatenkova

    Published 2017-01-01
    “…The authors have conducted anonymous opinion survey of prestigious economic universities undergraduates (bachelor and master degree course) and graduates specialized in this sphere. …”
    Get full text
    Article
  15. 1815

    A TEI Schema for the Representation of Computer-mediated Communication by Michael Beißwenger, Maria Ermakova, Alexander Geyken, Lothar Lemnitzer, Angelika Storrer

    Published 2012-10-01
    “…It allows for easy anonymization of CMC data for purposes in which the annotated data are made publicly available and includes metadata which are necessary for referencing random excerpts from the data as references in dictionary entries or as results of corpus queries. …”
    Get full text
    Article
  16. 1816

    Practical epistemology: the role of peer review in organizing scientific research by A. V. Shestopal, V. I. Konnov

    Published 2014-02-01
    “…The authors also consider the main procedural elements - preparation of individual reviews, consideration by panels, anonymity of reviewers. Finally the article addresses the problems of peer review such as non-transparent process, elitism in selecting reviewers, conservativeness of decisions, and possible ways of handling these problems.…”
    Get full text
    Article
  17. 1817

    INTEGRITY WHISTLEBLOWERS IN THE ROMANIAN LEGAL SYSTEM by Florin STOICA

    Published 2024-05-01
    “…We can understand the reasons behind this encouragement, however, in the Romanian context, we believe that the prioritisation of internal reporting can and must be corroborated with subsequent instrumentation actions a anonymous reports. Seen as a measure that comes to consecrate the modernism of the Romanian legal system, but also as a measure of the legislative maturity it has reached after countless reforms, the initiation of investigations regarding integrity whistleblowers has become a reality. …”
    Get full text
    Article
  18. 1818

    Survey on Ethereum phishing detection technology by Zhao CAI, Tao JING, Shuang REN

    Published 2023-04-01
    “…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
    Get full text
    Article
  19. 1819

    Enhancing the research enterprise at a health sciences university: A call for an institutional paradigm shift by Bryan G. Beutel, Taryn Bissing, Aaditya Patel, Nicolette Duong, Jan Talley

    Published 2025-01-01
    “…Materials and Methods: An anonymous survey developed using participatory research methods was disseminated to all students at a graduate health sciences university in 2023. …”
    Get full text
    Article
  20. 1820

    Evaluating interdisciplinary breastfeeding and lactation knowledge, attitudes and skills: An evaluation of a professional graduate programme for healthcare professionals. by Denise McGuinness, Kate Frazer, Karl F Conyard, Paula Cornally, Lauren Cooper, Niamh Vickers

    Published 2025-01-01
    “…All students enrolled in a six month programme were invited to complete an online anonymous survey at two time points: January 2023 and July 2023. …”
    Get full text
    Article