Results 11 to 20 of about 6,519,461 (316)
Many Internet of Things (IoT) devices use an Advanced Encryption Standard (AES) algorithm to secure data stored and transmitted during the communication process. The AES algorithm often suffers DC (DC) attacks. Little has been done to prevent DC attacks,
Khumbelo Difference Muthavhine +1 more
doaj +1 more source
Different symmetries, different mechanisms
AbstractThree common symmetries exist in the natural visual world: (i) mirror symmetry, i.e., reflections around a vertical axis, (ii) radial symmetry, i.e., rotations around a point, and (iii) translational symmetry, i.e., shifted repetitions. Are these processed by a common class of visual mechanism?
Jennings, B +3 more
openaire +4 more sources
Climate change denialist think tanks have played a major role in climate obstructionism in the United States, and we are beginning to learn that there are also certain European think tanks acting in line with their U.S. counterparts.
Jose A. Moreno +2 more
doaj +2 more sources
Seeing the bigger picture: what is gynaecology for?
This paper situates Rodrigo de Castro Lusitano’s De uniuersa mulierum medicina (1603), within the longer history of gynaecology and of the questions raised by having a separate branch of medicine dedicated to women.
Helen King
doaj +1 more source
Performing neutrality in ‘post’-conflict Burundi
The reintegration of ex-combatants has a number of dimensions: economic, social, and political. This article explores what reintegration, defined as the shedding of the ex-combatant identity, means for the political participation of former combatants in
Guðrún Sif Friðriksdóttir
doaj +1 more source
Documenting Attachment: 'Affective border control in applications for family reunification'
From 2002 to 2018, Denmark was the only country in the world to enforce a migration law demanding that couples seeking family reunification in Denmark documented their combined “attachment” to the Danish nation.
Sofie Jeholm, Mons Bissenbakker
doaj +1 more source
Nonlocal Integro-Differential Equations of the Second Order with Degeneration
We study the solvability for boundary value problems to some nonlocal second-order integro–differential equations that degenerate by a selected variable.
Aleksandr I. Kozhanov
doaj +1 more source
Southern Urbanism, Legalization, and the Limits of Migration Law
As a relatively well-defined subset of global migration law, refugee law and policy present important sites for contestation, agenda setting, normative pronouncements, and symbolic action.
Loren B. Landau
doaj +1 more source
Ev/ اَوْ Bağlacının İfadeye Kattığı Farklı Anlamların Türkçe Meâllere Aktarımı Sorunu
Dilde kullanılan kelimelerin genel olarak bir asıl/temel manası bulunmasının yanı sıra, bu kelimeler zamanla temel anlamının dışında yeni ve özel anlamlar kazanır. Ortaya çıkan bu anlamlar temel anlamdan bütünüyle bağımsız olmaz.
Ahmet Karadağ
doaj +1 more source
The purpose of this paper is to revisit the concepts of a third in logic and philosophy that have existed since antiquity, widely separated in time and space, but expressing what we consider a higher level of understanding, without going outside the ...
Joseph Brenner, Zhensong Wang
doaj +1 more source

