Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
9121
Tower d’Alun Hoddinott, ou la tentative de créer un opéra populaire
Published 2004-05-01“…In spite of all its musical and dramatic qualities, there have been few performances of Tower and Opera Box has never succeeded in securing any staging of it in London.…”
Get full text
Article -
9122
L’environnement juridique de la lutte contre la pollution par les plastiques en Asie du Sud-Est (ASEAN)
Published 2024-12-01“…External aid is the key to securing funding, which is sorely lacking in most of these developing countries. …”
Get full text
Article -
9123
Government Efforts to Protect Habitat for the Florida Panther on Private Lands
Published 2016-10-01“…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
Get full text
Article -
9124
The Establishment of Ramadan Principality
Published 2013-12-01“…They showed maximum effort during the campaigns by Mamluks onto the Armenians living in Cukurova, and after the collapse of this state, they secure their position in that region as being subject to Mamluks. …”
Get full text
Article -
9125
BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE
Published 2013-05-01“…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
Get full text
Article -
9126
Ensuring the resilience of health systems in the face of the effects of climate change
Published 2025-01-01“…Becoming resilient: heath infrastructures are impacted by the effects of climate change, such as the need to cool premises during heatwaves, disruptions to energy supplies, and securing logistics chains.2. Preparing for the exacerbation of chronic diseases that will lead to an overload of the health system.3. …”
Get full text
Article -
9127
Perfect secrecy cryptosystem with nonuniform distribution of keys
Published 2018-11-01“…More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its applications.How to design a basic cryptosystem by using a group of orthogonal Latin squares was first studied and an example to illustrate how to design nonlinear encryption transformations for a basic cryptosystem was given.Then,how to design the sequence of keys by using random method with nonuniform distribution was discussed,and it was strictly proven in theory that the infinite random “one-time pad” cryptosystem based on the designed basic cryptosystem was of perfect secrecy.Since the obtained result generalizes the existing one for random “one-time pad” cryptosystem to be perfect by using a basic cryptosystem with modulo addition,it may be used as a wider ideal simulated prototype to design stream cipher algorithms.Since the number of basic cryptosystems that can be designed is much more than one of the common basic cryptosystems with modulo addition,the obtained result is effective supplement and perfection to mainstream design method for the current stream cryptosystems.…”
Get full text
Article -
9128
A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application
Published 2022-01-01“…Finally, chaos-based encoding/decoding algorithms for secure data transmission are developed by designing a state chain diagram, which indicates the applicability of the new chaotic system.…”
Get full text
Article -
9129
Human Resource Information System with Machine Learning Integration
Published 2022-06-01“…Based on the thorough evaluation of the experts and respondents, it was found that the human resource information system is highly usable, secured, efficient, and provides a fast and easy way to manage employees' records and predict employees over using a supervised machine learning that uses the linear regression method. …”
Get full text
Article -
9130
Government Efforts to Protect Habitat for the Florida Panther on Private Lands
Published 2016-10-01“…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
Get full text
Article -
9131
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
9132
South Africa’s Battle Against COVID-19 Pandemic
Published 2022-02-01“…As the country struggles to secure and administer COVID-19 vaccines to its people, the Coronavirus has been rapidly mutating and causing new waves of infections within the nation. …”
Get full text
Article -
9133
BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE
Published 2013-05-01“…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
Get full text
Article -
9134
Disaster Management and Identification of Safe and Hazardous Landslide Zones in Rural Areas of Sarwabad County
Published 2015-03-01“…Moreover, it is found that nearly 46 percent of the rural population and 31 villages of the area are located in safe or low-hazard-level landslides, while the rest of the settlements and rural population are located in the mid and high-hazard-level zones and, as such, are need to be secured in these zones.…”
Get full text
Article -
9135
Generative text steganography method based on emotional expression in semantic space
Published 2023-04-01“…Aiming at the problems that “over optimizing” the quality of steganographic text and lack of constraints on the semantic expression of the generated steganographic text in existing generative text steganography methods, a generative text steganography method was proposed based on emotional expression in semantic space.In order to make use of the scene fusion provided by the new media platform to obtain many camouflage scenes, the focus was how to use the unsupervised extraction model to extract the emotional expression combination candidate set from the original data set, then sort the candidate set of emotional expression combinations based on the improved bipartite graph sorting algorithm to obtain the emotional expression combination set, map them to the semantic space, and then implement embedding secret information while generating the user’s opinions based on the emotion expression combinations.Experimental results show that, compared with the existing generative text steganography methods in semantic space, the product reviews generated by the proposed method have a minimum perplexity of 10.536, and have a strong correlation with the chosen product, which can further guarantee the cognitive concealment of steganographic texts.At the same time, the proposed method can also be effectively used in the field of secure and confidential communication, and can avoid the senders being traced and analyzed.…”
Get full text
Article -
9136
SOCIOLOGICAL IMPACT OF VOTE BUYING IN NORTH-WEST ZONE OF NIGERIA: THE STUDY OF THE 2015 AND 2019 ELECTIONS
Published 2025-01-01“…The ill competent ones occupied elective political positions because they used money to secured votes, while the qualified ones were left behind hence, they were unable to use money during primary and secondary elections. …”
Get full text
Article -
9137
Maternal and Pediatric Health Outcomes in relation to Gestational Vitamin D Sufficiency
Published 2015-01-01“…With increasing evidence pointing to fetal origins of some later life disease, securing vitamin D sufficiency in pregnancy appears to be a simple, safe, and cost-effective measure that can be incorporated into routine preconception and prenatal care in the offices of primary care clinicians. …”
Get full text
Article -
9138
-
9139
Credit Risk Management Practices and Loan Performance of Commercial Banks in Uganda. A Case Study of Commercial Banks in Mbarara City
Published 2023“…Commercial banks should reexamine their clients’ profile from time to time, and ensuring that changes in clients’ credit quality change from time to time will always standout of others in terms of performance Commercial banks should ensure that effectiveness of credit risk controls are done well by looking out for collateral securities from clients before extending loans. Besides collateral securities, ensuring that clients do not take credit that exceeds a certain limit minimizes the level of default. …”
Get full text
Thesis -
9140
Hemolytic Crisis following Naphthalene Mothball Ingestion in a 21-Month-Old Patient with Glucose-6-Phosphate Dehydrogenase (G6PD) Deficiency
Published 2019-01-01“…Care should be taken to secure these products and prevent ingestion.…”
Get full text
Article