Results 91 to 100 of about 2,411,901 (357)

A Structural Equation Modeling Approach to Understand User's Perceptions of Acceptance of Ride-Sharing Services in Dhaka City [PDF]

open access: yesarXiv, 2022
This research aims at building a multivariate statistical model for assessing users' perceptions of acceptance of ride-sharing services in Dhaka City. A structured questionnaire is developed based on the users' reported attitudes and perceived risks.
arxiv  

Tailoring Hole‐Blocking Layers Enables a Versatile Approach for Fast Photomultiplication‐Type Organic Photodetectors

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates the role of hole‐blocking layers (HBLs), particularly the combination of two HBLs in photomultiplication‐type organic photodetectors (PM‐OPDs), which results in high gain and record‐fast response. The proposed HBL strategy also allows for the use of photoactive layer with balanced donor–acceptor stoichiometry, which can be ...
Awais Sarwar   +7 more
wiley   +1 more source

Conceptualizing Biopolitics: Citizen-State Interactions in the Securing of Water Services in South Africa [PDF]

open access: yesMedical Anthropology, 2015
Despite constitutional obligations to provide clean water to all citizens in South Africa, access to water and related services remains highly contested. The discord between constitutional promises and lived realities of water access, particularly through national infrastructure, provides a platform on which to examine Foucauldian notions of ...
openaire   +3 more sources

Self‐Poled Halide Perovskite Ruddlesden‐Popper Ferroelectric‐Photovoltaic Semiconductor Thin Films and Their Energy Harvesting Properties

open access: yesAdvanced Functional Materials, EarlyView.
Low‐dimensional halide perovskite thin films, (BA)2(MA)n‐1PbnBr3n+1 (n = 1, 2), exhibit both semiconducting and ferroelectric properties, enabling mechanical and light energy harvesting. Using Cr/Cr₂O₃ or PCBM as barrier layers ensures reproducible ferroelectricity.
Raja Sekhar Muddam   +8 more
wiley   +1 more source

THE NEED OF COOPERATION BETWEEN THE PRIVATE SECURITY COMPANIES AND THE STATE SECURITY SERVICES IN THE FIGHT AGAINST TERRORISM

open access: yesTHE EURO-ATLANTIC VALUES IN THE BALKAN COUNTRIES, 2020
Terrorism is a global threat to the whole humanity, which has particularly negative and harmful consequences. Terrorist attacks, incidents, and actions are a form of security endangerment with varied and constantly changing ways of committing. The fight against terrorism is highly dependent on the efficiency of the measures and activities of the law ...
Ilijevski, Ice   +2 more
openaire   +1 more source

Budgetary Policy in the Financial Security System

open access: yesNaukovij Vìsnik Nacìonalʹnoï Akademìï Statistiki, Oblìku ta Auditu, 2020
The financial security of the state becomes especially important given the crisis manifestations in the global financial system, loosening of the state control over the monetary system and the increasing political pressures on economic processes.
V. МЕLNYK, О. SAVASTEIEVA
doaj   +1 more source

Secure History Preservation Through Timeline Entanglement [PDF]

open access: yesarXiv, 2002
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the temporal ordering of system states in a provable manner. We extend secure timelines to encompass multiple, mutually distrustful services, using timeline entanglement.
arxiv  

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

Motivational Strategies and Security Service Delivery in Universities in Cross River State, Nigeria

open access: yes, 2021
This study assessed two motivational strategies and their respective ties to the security service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study.
Comfort R. Etor, Asuquo, Michael E.
openaire   +2 more sources

Dual-Mode Encryption for UC-Secure String OT from Learning with Errors

open access: yesIET Information Security
Universal composability (UC) is a primary security flavor for designing oblivious transfer (OT) due to its advantage of arbitrary composition. However, the study of UC-secure OT over lattices is still far behind compared with constructions over ...
Momeng Liu   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy