Results 91 to 100 of about 2,411,901 (357)
A Structural Equation Modeling Approach to Understand User's Perceptions of Acceptance of Ride-Sharing Services in Dhaka City [PDF]
This research aims at building a multivariate statistical model for assessing users' perceptions of acceptance of ride-sharing services in Dhaka City. A structured questionnaire is developed based on the users' reported attitudes and perceived risks.
arxiv
This study investigates the role of hole‐blocking layers (HBLs), particularly the combination of two HBLs in photomultiplication‐type organic photodetectors (PM‐OPDs), which results in high gain and record‐fast response. The proposed HBL strategy also allows for the use of photoactive layer with balanced donor–acceptor stoichiometry, which can be ...
Awais Sarwar+7 more
wiley +1 more source
Conceptualizing Biopolitics: Citizen-State Interactions in the Securing of Water Services in South Africa [PDF]
Despite constitutional obligations to provide clean water to all citizens in South Africa, access to water and related services remains highly contested. The discord between constitutional promises and lived realities of water access, particularly through national infrastructure, provides a platform on which to examine Foucauldian notions of ...
openaire +3 more sources
Low‐dimensional halide perovskite thin films, (BA)2(MA)n‐1PbnBr3n+1 (n = 1, 2), exhibit both semiconducting and ferroelectric properties, enabling mechanical and light energy harvesting. Using Cr/Cr₂O₃ or PCBM as barrier layers ensures reproducible ferroelectricity.
Raja Sekhar Muddam+8 more
wiley +1 more source
Terrorism is a global threat to the whole humanity, which has particularly negative and harmful consequences. Terrorist attacks, incidents, and actions are a form of security endangerment with varied and constantly changing ways of committing. The fight against terrorism is highly dependent on the efficiency of the measures and activities of the law ...
Ilijevski, Ice+2 more
openaire +1 more source
Budgetary Policy in the Financial Security System
The financial security of the state becomes especially important given the crisis manifestations in the global financial system, loosening of the state control over the monetary system and the increasing political pressures on economic processes.
V. МЕLNYK, О. SAVASTEIEVA
doaj +1 more source
Secure History Preservation Through Timeline Entanglement [PDF]
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the temporal ordering of system states in a provable manner. We extend secure timelines to encompass multiple, mutually distrustful services, using timeline entanglement.
arxiv
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana+2 more
wiley +1 more source
Motivational Strategies and Security Service Delivery in Universities in Cross River State, Nigeria
This study assessed two motivational strategies and their respective ties to the security service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study.
Comfort R. Etor, Asuquo, Michael E.
openaire +2 more sources
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Universal composability (UC) is a primary security flavor for designing oblivious transfer (OT) due to its advantage of arbitrary composition. However, the study of UC-secure OT over lattices is still far behind compared with constructions over ...
Momeng Liu+6 more
doaj +1 more source