Showing 8,661 - 8,680 results of 9,720 for search '"security"', query time: 0.10s Refine Results
  1. 8661

    An Agent-Based Auction Protocol on Mobile Devices by Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen, Dai-Lun Chiang, Yu-Ting Chen

    Published 2014-01-01
    “…This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. …”
    Get full text
    Article
  2. 8662

    D’une industrie… l’autre ? by Sandrine Musso, Vinh-Kim Nguyen

    Published 2013-06-01
    “…Starting from a contextualization of Cindy Patton’s text, the authors invite consideration of the timeliness of these questions in light of contemporary issues related to the production of identities and communities that helps us see of the establishment of the « targets » of the prevention and treatment of HIV, as well as the effects of the depoliticization secured by the medicalization of the fight against the epidemic.…”
    Get full text
    Article
  3. 8663

    Kelekatan dan Kesejahteraan Psikologis Anak dan Remaja: Studi Meta-Analisis by Hepi Wahyuningsih, Resnia Novitasari, Fitri Ayu Kusumaningrum

    Published 2021-01-01
    “…The results show that (1) the correlation effect between secure attachment and positive psychological well-being was significant; (2) the correlation effect of secure attachment with negative psychological well-being indicates a significant value; (3) the correlation effect between avoidance and positive psychological well-being was significant; (4) the correlation effect between avoidance and negative psychological well-being was significant; (5) the correlation effect between anxious and positive psychological well-being was not significant; (6) the correlation effect between anxious and negative psychological well-being was significant; (7) the correlation effect between disorganized with positive psychological well-being was significant; (8) the correlation effect between disorganized and negative psychological well-being was significant. …”
    Get full text
    Article
  4. 8664

    Ureteric Injury due to the Use of LigaSure by Muazzam Tahir, William Gilkison

    Published 2013-01-01
    “…The use of LigaSure has made securing haemostasis and tissue dissection relatively easy especially in laparoscopic surgery; however, if not used with care it can cause damage to the surrounding structures through lateral spread of energy. …”
    Get full text
    Article
  5. 8665

    An Optimal Routing Framework for an Integrated Urban Power–Gas–Traffic Network by Mohammad Jadidbonab, Hussein Abdeltawab, Yasser Abdel-Rady I. Mohamed

    Published 2024-01-01
    “…The developed non-probabilistic framework provides decision-makers with various secure options to avoid worst-case scenarios and promote social and environmental benefits. …”
    Get full text
    Article
  6. 8666

    Chaotic Motions in the Real Fuzzy Electronic Circuits by Shih-Yu Li, Cheng-Hsiung Yang, Chin-Teng Lin, Li-Wei Ko, Tien-Ting Chiu

    Published 2013-01-01
    “…In the research field of secure communications, the original source should be blended with other complex signals. …”
    Get full text
    Article
  7. 8667

    A Comparative Study of the Duty of Loyalty of Company Directors and Its Impact on Conflict of Interest Management and Data Retention in Iranian and English Law by mohammadreza Pasban, salah mahmoodi

    Published 2024-06-01
    “…Today, in the common law system, in order to secure the interests of the shareholders and preserve the company's information, compliance with the "duty of loyalty" is considered the most important regulation for managers. …”
    Get full text
    Article
  8. 8668

    Quantification of nipple size and shape among an ethnically diverse sample of US women by Peter Wildfeuer, Alexis Alban, Bob Worrell, Shilo Ben Zeev, Judith Shamian, Mike Woolridge

    Published 2023-09-01
    “…Viable data were secured from 78% of the scans undertaken, yielding 538 datasets from 329 participants. …”
    Get full text
    Article
  9. 8669

    A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics by Zhuo Hao, Sheng Zhong, Nenghai Yu

    Published 2013-01-01
    “…We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. …”
    Get full text
    Article
  10. 8670

    Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles by Min Yang, Yong Feng, Xiaodong Fu, Qian Qian

    Published 2019-07-01
    “…The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme.…”
    Get full text
    Article
  11. 8671

    Calculation of the quantity of oxygen required for maintenance of the predetermined temperature of steel during its boiling period in a steel-melting arc furnace by I. G. Biokh, S. A. Fomenko, S. M. Kozlov, O. G. Khopova, M. P. Guljaev, M. G. Pshonik

    Published 2000-08-01
    “…The article provides а mathematical model of steel smelting in a steel-melting arc furnace with provision for calculation of necessary quantity of oxygen for maintenance of preset temperature of steel when arcs are switched off It shows that oxygen supply during the arcs disconnection period secures energy consumption reduction.…”
    Get full text
    Article
  12. 8672

    Simulation of bond prices by Jelena Artamonova

    Published 2005-12-01
    “…The proposed methods are illustrated by the Lithuanian Government securities. The results show that a squared binomial (two-factor) bond market model approximates the bond prices more precisely than analogous quadronomial (one-factor) model. …”
    Get full text
    Article
  13. 8673

    Resource Mobilization Policy Guidelines by Kabale University

    Published 2022
    “…It is intended to enhance capacity of University stakeholders in securing resources for Kabale University’s mandate as documented in the Statutory Instrument No. 36 of July 2015, establishment of Kabale University…”
    Get full text
    Other
  14. 8674

    Ozon uygulamasının devital ağartma yapılan dentinde rezin simanın shear bağlanma dayanımına etkisi by Betül Özçopur, Özer Alkan, Öznur Eraslan, Eylem Ayhan Alkan, Gürcan Eskitaşçıoğlu

    Published 2014-08-01
    “…Ozon uygulanan Secure siman örnekleri (G5), G1, G3, ve G7 gruplarından anlamlı derecede daha düşük bağlanma dayanımı gösterdi (P < 0.05). …”
    Get full text
    Article
  15. 8675

    Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture by Andrea Mølgaard

    Published 2024-01-01
    “…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
    Get full text
    Article
  16. 8676
  17. 8677

    Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes by Obinna P. Fidelis, Caleb Stubbs, Katrina L. Easton, Caroline Billings, Alisha P. Pedersen, David E. Anderson, Dustin L. Crouch

    Published 2025-01-01
    “…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
    Get full text
    Article
  18. 8678

    Bilgiyi Süzmek by M. Tayfun Gülle

    Published 2011-09-01
    “…The article deals with the concerns about Secure Internet Law to be enforced on November 22, 2011, and points out that individuals of democratic societies are capable of filtering information and families have a part to play in protecting from the information pollution on the Internet. …”
    Get full text
    Article
  19. 8679

    Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments by Karim El-Khanchouli, Hanaa Mansouri, Nawal El Ghouate, Hicham Karmouni, Nour-Eddine Joudar, Mhamed Sayyouri, S. S. Askar, Mohamed Abouhawwash

    Published 2025-01-01
    “…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
    Get full text
    Article
  20. 8680

    ID-based transitive signature schemes without random oracle by MA Xiao-long1, GU Li-ze1, CUI Wei4, YANG Yi-xian1, HU Zheng-ming1

    Published 2010-01-01
    “…Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s transitivity of the proposed scheme was reduced to the CDH assumption based on the bilinear pairing.A complexity analysis of the proposed scheme was thereafter presented.…”
    Get full text
    Article