Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8661
An Agent-Based Auction Protocol on Mobile Devices
Published 2014-01-01“…This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. …”
Get full text
Article -
8662
D’une industrie… l’autre ?
Published 2013-06-01“…Starting from a contextualization of Cindy Patton’s text, the authors invite consideration of the timeliness of these questions in light of contemporary issues related to the production of identities and communities that helps us see of the establishment of the « targets » of the prevention and treatment of HIV, as well as the effects of the depoliticization secured by the medicalization of the fight against the epidemic.…”
Get full text
Article -
8663
Kelekatan dan Kesejahteraan Psikologis Anak dan Remaja: Studi Meta-Analisis
Published 2021-01-01“…The results show that (1) the correlation effect between secure attachment and positive psychological well-being was significant; (2) the correlation effect of secure attachment with negative psychological well-being indicates a significant value; (3) the correlation effect between avoidance and positive psychological well-being was significant; (4) the correlation effect between avoidance and negative psychological well-being was significant; (5) the correlation effect between anxious and positive psychological well-being was not significant; (6) the correlation effect between anxious and negative psychological well-being was significant; (7) the correlation effect between disorganized with positive psychological well-being was significant; (8) the correlation effect between disorganized and negative psychological well-being was significant. …”
Get full text
Article -
8664
Ureteric Injury due to the Use of LigaSure
Published 2013-01-01“…The use of LigaSure has made securing haemostasis and tissue dissection relatively easy especially in laparoscopic surgery; however, if not used with care it can cause damage to the surrounding structures through lateral spread of energy. …”
Get full text
Article -
8665
An Optimal Routing Framework for an Integrated Urban Power–Gas–Traffic Network
Published 2024-01-01“…The developed non-probabilistic framework provides decision-makers with various secure options to avoid worst-case scenarios and promote social and environmental benefits. …”
Get full text
Article -
8666
Chaotic Motions in the Real Fuzzy Electronic Circuits
Published 2013-01-01“…In the research field of secure communications, the original source should be blended with other complex signals. …”
Get full text
Article -
8667
A Comparative Study of the Duty of Loyalty of Company Directors and Its Impact on Conflict of Interest Management and Data Retention in Iranian and English Law
Published 2024-06-01“…Today, in the common law system, in order to secure the interests of the shareholders and preserve the company's information, compliance with the "duty of loyalty" is considered the most important regulation for managers. …”
Get full text
Article -
8668
Quantification of nipple size and shape among an ethnically diverse sample of US women
Published 2023-09-01“…Viable data were secured from 78% of the scans undertaken, yielding 538 datasets from 329 participants. …”
Get full text
Article -
8669
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
Published 2013-01-01“…We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. …”
Get full text
Article -
8670
Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles
Published 2019-07-01“…The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme.…”
Get full text
Article -
8671
Calculation of the quantity of oxygen required for maintenance of the predetermined temperature of steel during its boiling period in a steel-melting arc furnace
Published 2000-08-01“…The article provides а mathematical model of steel smelting in a steel-melting arc furnace with provision for calculation of necessary quantity of oxygen for maintenance of preset temperature of steel when arcs are switched off It shows that oxygen supply during the arcs disconnection period secures energy consumption reduction.…”
Get full text
Article -
8672
Simulation of bond prices
Published 2005-12-01“…The proposed methods are illustrated by the Lithuanian Government securities. The results show that a squared binomial (two-factor) bond market model approximates the bond prices more precisely than analogous quadronomial (one-factor) model. …”
Get full text
Article -
8673
Resource Mobilization Policy Guidelines
Published 2022“…It is intended to enhance capacity of University stakeholders in securing resources for Kabale University’s mandate as documented in the Statutory Instrument No. 36 of July 2015, establishment of Kabale University…”
Get full text
Other -
8674
Ozon uygulamasının devital ağartma yapılan dentinde rezin simanın shear bağlanma dayanımına etkisi
Published 2014-08-01“…Ozon uygulanan Secure siman örnekleri (G5), G1, G3, ve G7 gruplarından anlamlı derecede daha düşük bağlanma dayanımı gösterdi (P < 0.05). …”
Get full text
Article -
8675
Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture
Published 2024-01-01“…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
Get full text
Article -
8676
Asymptotic hyperfunctions, tempered hyperfunctions, and asymptotic expansions
Published 2005-01-01Get full text
Article -
8677
Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes
Published 2025-01-01“…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
Get full text
Article -
8678
Bilgiyi Süzmek
Published 2011-09-01“…The article deals with the concerns about Secure Internet Law to be enforced on November 22, 2011, and points out that individuals of democratic societies are capable of filtering information and families have a part to play in protecting from the information pollution on the Internet. …”
Get full text
Article -
8679
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01“…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
Get full text
Article -
8680
ID-based transitive signature schemes without random oracle
Published 2010-01-01“…Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s transitivity of the proposed scheme was reduced to the CDH assumption based on the bilinear pairing.A complexity analysis of the proposed scheme was thereafter presented.…”
Get full text
Article