Suggested Topics within your search.
Suggested Topics within your search.
- Contracts 13
- Breach of contract 2
- Contract law 2
- Labor market 2
- Law 2
- Letting of contracts 2
- Actions and defenses 1
- Administrative law 1
- Agency (Law) 1
- Building 1
- Contract Law 1
- Contract bridge 1
- Contracting out 1
- Copyright 1
- County services 1
- Criminal investigation 1
- Economic policy 1
- Economics 1
- Estimates 1
- Fraud investigation 1
- History 1
- Industrial policy 1
- Investigations 1
- Language 1
- Liberty of contract 1
- Local finance 1
- Local government 1
- Metropolitan areas 1
- Metropolitan government 1
- Municipal services 1
-
901
COMPARISON OF CONSTRUCTION RELATED REWORK IN UGANDA AND MOZAMBIQUE
Published 2014-05-01“…In Uganda, the mean percentage rework range was 12.45% - 15.58% of the construction contract scope. It was determined that the mean percentage of rework-related impact on project budget and schedule was 4.53% and 8.42% respectively. …”
Get full text
Article -
902
Problems of legal guarantees of workers’ rights in the field of working time, rest time and wages in the conditions of martial law
Published 2023-09-01“…Legal guarantees of employee rights are legal norms that ensure the realization and protection of the rights of an individual working on the basis of an employment contract, as well as the activities of authorized bodies and organizations for the implementation of these norms. …”
Get full text
Article -
903
The Causes of Variation Orders and Their Effects on Cost and Time of Projects in Sulaimani Governorate
Published 2020-06-01“…It includes an amendment of the initial scope of work as in the awarded contract. This study analyses the causes of variation orders and their effects on cost and time of projects in Sulaimani governorate. …”
Get full text
Article -
904
Using lean manufacturing tools in materials supply management during the life cycle of a construction project
Published 2024-05-01“…When choosing the Engineering, Procurement, Construction (EPC) contract model, the life cycle of construction projects is managed by a specialized contractor organization. …”
Get full text
Article -
905
A renewable integrated multi-area system for LFC incorporating electrical vehicle with SoC estimation
Published 2025-01-01“…The analysis is done under bilateral and contract violation cases with and without generation rate constraints. …”
Get full text
Article -
906
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
Get full text
Article -
907
Coordination of a Green Supply Chain with One Manufacturer and Two Competing Retailers under Different Power Structures
Published 2019-01-01“…Finally, the developed two-part tariff contract is practicable and beneficial for both the manufacturer and the two retailers.…”
Get full text
Article -
908
THE IMPROVEMENT OF PUBLIC PROCUREMENT MANAGEMENT AT GOVERNMENT AGENCIES OF MOSCOW
Published 2016-02-01“…The practice of the Federal Law № 44 published 5 April 2013, provisions application related to setting up of a contract service in sphere of public procurement is considered by the example of the authority of the South-Eastern administrative district of Moscow.…”
Get full text
Article -
909
Droit d’auteur et restauration des œuvres à caractère technologique
Published 2019-01-01“…The goal is to establish, as soon as the work of art is acquired by the museum, a dialogue between the artist and the curator or the restorer so as to anticipate any conflict and fix the outlines of the future restoration in a contract. …”
Get full text
Article -
910
Le CLAS : un accompagnement à la scolarité ou une autre classe ?
Published 2018-06-01“…This article, on the basis of an enquiry about a local contract for schooling support focusing its actions on homework assistance, highlights its characteristics as a protraction of school time and questions learning support ways and means in such amenities as regards in respect of their original aims developed in the 2001 schooling support charter.…”
Get full text
Article -
911
«PHILOSOPHY» AS AN EDUCATIONAL COURSE: THE CHANGE OF THE CONCEPT
Published 2017-10-01“…The thematic waymarks we offer have been developed as a part of the Government Contract Project for the layout of the according conception of the course and the indicative working program of the discipline for undergraduate students of non-philosophical humanitarian specialties.…”
Get full text
Article -
912
The crime of breach of trust
Published 2024-01-01“… The crime of breach of trust is among the crimes against funds, which directly targets the transaction that occurs between the victim and the offender, as this crime is meant to be the violation of a person's right to the property of another person by breach of trust deposited in him, so that delivery must take place as a temporary possession based on a contract of trust, which is approved by the Algerian legislator original and complementary penalties, and this is due to the special nature of such transactions that fall on it This kind of crime. …”
Get full text
Article -
913
Energy Risk Analysis With Dynamic Amplitude Estimation and Piecewise Approximate Quantum Compiling
Published 2024-01-01“…The calculation of the expected value, value at risk, and conditional value at risk of contract portfolios on quantum hardware provides a proof of principle of the new algorithm.…”
Get full text
Article -
914
Des (dés)accords grammaticaux dans la dénomination écrite de la personne en France : un tumulte graphique entre passions tristes et passions joyeuses
Published 2019-12-01“…They are supposed to be non-discriminating but they obey the same contract: they reply to the first injunction keeping to the agreement between the sex of the referent and grammatical gender, but they correct the paradox un-signifying masculine marks and re-signifying feminine marks in order to masculine and feminine have same value of humankind.Even if it does not avoid the aporia of a submission to the referentialist logic, the present “graphical turmoil” shows a clear willingness – to make writing less discriminating – provoking restlessly general outcries and invectives. …”
Get full text
Article -
915
Tinjauan Hukum Tentang Penjualan Aplikasi Berbayar Dengan Cara Pinjam Akun Pribadi (Apple Id)
Published 2018-12-01“…The legal impact of the sales of paid apps by lending personal account constitutes branch of a contract which can be asked for liability based on Article 32 Law No 11 of 2008 concerning Information Electronic Transactions, Law No 28 of 2014 corcerning Copyright. …”
Get full text
Article -
916
Optimization of Breeding Tools in Quinoa (<i>Chenopodium quinoa</i>) and Identification of Suitable Breeding Material for NW Europe
Published 2024-12-01“…In conclusion, our study identified various contract-free varieties that may be suitable for cultivation in NW Europe. …”
Get full text
Article -
917
System-Level Digital Twin Modeling for Underwater Wireless IoT Networks
Published 2024-12-01“…These strategies are integrated into a smart contract, namely, the UCB-based Smart Contract with a Security Prediction model and Minimum-Cost Flow (UCB-SCPF) policy. …”
Get full text
Article -
918
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
Published 2022-12-01“…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
Get full text
Article -
919
An Introduction to Annuities
Published 2014-07-01“… An annuity contract is purchased from a life insurance company. …”
Get full text
Article -
920
Composted Materials on Florida Roadsides
Published 2003-10-01“… This fact sheet gives a brief overview of a two-year project conducted by researchers of the University of Florida's Institute of Food and Agricultural Sciences (UF/IFAS) as part of contract WO#7 with the Florida Department of Transportation (FDOT). …”
Get full text
Article