Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Hierarchical key Agreement.

Artykuły w czasopismach na temat „Hierarchical key Agreement”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Hierarchical key Agreement”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Lee, Sung-Woon, i Hyunsung Kim. "Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs". International Journal of Security and Its Applications 8, nr 1 (31.01.2014): 81–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.08.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Guo, Hua, Yi Mu, Zhoujun Li i Xiyong Zhang. "An efficient and non-interactive hierarchical key agreement protocol". Computers & Security 30, nr 1 (styczeń 2011): 28–34. http://dx.doi.org/10.1016/j.cose.2010.10.003.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Alimoradi, Reza, Fateme Amjadi, Seiied-Mohammad-Javad Razavian i M. H. Noorallahzadeh. "A Modified Hierarchical Multiple Key Agreement Scheme for WSN". International Journal of Advanced Networking and Applications 14, nr 03 (2022): 5493–98. http://dx.doi.org/10.35444/ijana.2022.14312.

Pełny tekst źródła
Streszczenie:
Nowadays, sensor networks are one of the hottest scientific issues. A lot of research has been done to improve their efficiency. Wireless Sensor Networks (WSN) are applied as an important and efficient technology in many industries such as military operations, security systems, intelligent transportation systems, medics, agriculture, and many others. Key agreement is a challenging point in the security of these networks. Sensor nodes connect to each other using cryptography techniques, however, use of the classic key management techniques such as key distribution center is inefficient because of resource-constrained nature of the sensor nodes. This paper proposes a hierarchical multiple key agreement scheme. In the proposed scheme, two nodes can produce multiple session keys, just with only one run of the key agreement protocol by two nodes in the hierarchical system. As well as its efficiency, this new scheme is based on identity and non-interactive protocol. Being zero-knowledge proof is another advantage of the scheme.
Style APA, Harvard, Vancouver, ISO itp.
4

Mao, Kefei, Jianwei Liu i Jie Chen. "Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS". Journal of Electrical and Computer Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/1905872.

Pełny tekst źródła
Streszczenie:
Wireless Health Monitoring Systems (WHMS) have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.
Style APA, Harvard, Vancouver, ISO itp.
5

Mao, Kefei, Jie Chen i Jianwei Liu. "An Secure Hierarchical Key Agreement Scheme for Wireless Sensor Networks". International Journal of Multimedia and Ubiquitous Engineering 9, nr 9 (30.09.2016): 187–202. http://dx.doi.org/10.14257/ijmue.2016.11.9.20.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kim, Hyunsung. "Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS". Sensors 14, nr 12 (10.12.2014): 23742–57. http://dx.doi.org/10.3390/s141223742.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhang, Qikun, Zengyu Cai, Yong Gan, Yuan Zhuang i Bingli Wang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity". International Journal of Embedded Systems 11, nr 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.10025637.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Gan, Yong, Bingli Wang, Yuan Zhuang, Zengyu Cai i Qikun Zhang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity". International Journal of Embedded Systems 11, nr 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.104006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Zhang, Qikun, Xianmin Wang, Junling Yuan, Lu Liu, Ruifang Wang, Hong Huang i Yuanzhang Li. "A hierarchical group key agreement protocol using orientable attributes for cloud computing". Information Sciences 480 (kwiecień 2019): 55–69. http://dx.doi.org/10.1016/j.ins.2018.12.023.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Zhu, Guobin, Hu Xiong i Zhiguang Qin. "On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol". Wireless Personal Communications 74, nr 2 (23.07.2013): 883–89. http://dx.doi.org/10.1007/s11277-013-1328-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Chen, Xin. "Research on Communication Protocol Agreement Based on Ad Hoc Network". Applied Mechanics and Materials 687-691 (listopad 2014): 3574–78. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3574.

Pełny tekst źródła
Streszczenie:
Routing technology is the key technology of Ad Hoc network and is one of the most important factors influencing overall performance of network. Routing protocol has not adapted to topological structure of dynamic change for Ad Hoc network, so the new Ad Hoc routing protocol must be designed. The paper starts from the basic concept of Ad Hoc network and proposes an effective key protocol agreement in Ad Hoc network based on bilinear pairing and hierarchical routing protocol which not only makes logical key agreement model correspond to topological structure of actual network , but also supports the establishment and dynamic update of initial group of key and has less communication traffic. The performance analysis indicates that the protocol proposed in the paper is very effective on the network with larger range, stronger ability of equipment process and worse communication environment.
Style APA, Harvard, Vancouver, ISO itp.
12

Li, Xiaoyu, Min Ye, Jiahui Chen, Jianhui Chen i Yeh-Cheng Chen. "A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT". Security and Communication Networks 2021 (6.12.2021): 1–12. http://dx.doi.org/10.1155/2021/6174506.

Pełny tekst źródła
Streszczenie:
Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.
Style APA, Harvard, Vancouver, ISO itp.
13

Roychoudhury, Probidita, Basav Roychoudhury i Dilip Kumar Saikia. "Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks". Security and Communication Networks 2017 (2017): 1–21. http://dx.doi.org/10.1155/2017/1701243.

Pełny tekst źródła
Streszczenie:
In view of the exponential growth in the volume of wireless data communication among heterogeneous devices ranging from smart phones to tiny sensors across a wide range of applications, 3GPP LTE-A has standardized Machine Type Communication (MTC) which allows communication between entities without any human intervention. The future 5G cellular networks also envisage massive deployment of MTC Devices (MTCDs) which will increase the total number of connected devices hundredfold. This poses a huge challenge to the traditional cellular system processes, especially the traditional Mutual Authentication and Key Agreement (AKA) mechanism currently used in LTE systems, as the signaling load caused by the increasingly large number of devices may have an adverse effect on the regular Human to Human (H2H) traffic. A solution in the literature has been the use of group based architecture which, while addressing the authentication traffic, has their share of issues. This paper introduces Hierarchical Group based Mutual Authentication and Key Agreement (HGMAKA) protocol to address those issues and also enables the small cell heterogeneous architecture in line with 5G networks to support MTC services. The aggregate Message Authentication Code based approach has been shown to be lightweight and significantly efficient in terms of resource usage compared to the existing protocols, while being robust to authentication message failures, and scalable to heterogeneous network architectures.
Style APA, Harvard, Vancouver, ISO itp.
14

Lin, Hua Yi. "Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks". Connection Science 34, nr 1 (20.10.2021): 274–300. http://dx.doi.org/10.1080/09540091.2021.1990212.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Das, Ashok Kumar, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid i Xiong Li. "An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks". Security and Communication Networks 9, nr 13 (23.02.2016): 2070–92. http://dx.doi.org/10.1002/sec.1464.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Zhang, Zuoqi, Yong-Wei Zhang i Huajian Gao. "On optimal hierarchy of load-bearing biological materials". Proceedings of the Royal Society B: Biological Sciences 278, nr 1705 (wrzesień 2010): 519–25. http://dx.doi.org/10.1098/rspb.2010.1093.

Pełny tekst źródła
Streszczenie:
Load-bearing biological materials such as shell, mineralized tendon and bone exhibit two to seven levels of structural hierarchy based on constituent materials (biominerals and proteins) of relatively poor mechanical properties. A key question that remains unanswered is what determines the number of hierarchical levels in these materials. Here we develop a quasi-self-similar hierarchical model to show that, depending on the mineral content, there exists an optimal level of structural hierarchy for maximal toughness of biocomposites. The predicted optimal levels of hierarchy and cooperative deformation across multiple structural levels are in excellent agreement with experimental observations.
Style APA, Harvard, Vancouver, ISO itp.
17

Zhang, Tiehui, Xinru Ma, Hengyu Li, Zhaoyan Wang, Shaorong Xie i Jun Luo. "Ordered-Bipartite Consensus of Multi-Agent Systems under Finite Time Control". Applied Sciences 12, nr 23 (2.12.2022): 12337. http://dx.doi.org/10.3390/app122312337.

Pełny tekst źródła
Streszczenie:
Since group consensus (GC) control accounts for one-half of the multi-robot coordination domain, as does complete consensus control, this paper will formulate a certain kind of GC and group bipartite consensus (GBC) in finite time for multi-agent systems (MAS). It should be noted that the key to this work is that information transfer under acyclic partition networks is zero-sum between groups and the cooperative–competitive interaction. The general GC will firstly be achieved under acyclic partition, which reflects the fact that such topology allows the MAS to reach agreement in an ordered and hierarchical process. Further, the information communication is zero-sum within each group under the acyclic partition signed digraph. Thus, the group–bipartite agreement for MAS is given under acyclic bipartite topology. These results display not only an ordered, hierarchical state, but also an intra-group symmetric state. In addition, simulation examples are presented in parallel with the theoretical results.
Style APA, Harvard, Vancouver, ISO itp.
18

Tsamboulas, Dimitrios, Konstanzinos Panou i Constantionos Abacoumkin. "Attractiveness of Transportation Infrastructure Projects to Private-Sector Financing: Assessing the Hierarchical Analysis, Risk Scenario Method". Transportation Research Record: Journal of the Transportation Research Board 1732, nr 1 (styczeń 2000): 12–21. http://dx.doi.org/10.3141/1732-02.

Pełny tekst źródła
Streszczenie:
A method to identify the attractiveness for private financing of a transport infrastructure project is presented. The objective of the method is to assist the public sector in identifying the attractiveness of a transportation infrastructure project for private financing, highlighting the factors that tend to reduce such attractiveness and providing the means to examine the viability of alternative risk-allocation scenarios related to risks undertaken by the state or private sector. The method allows for the simulation of the private sector’s attitude toward risk, employing practices of risk assessment in investments. Its innovation lies in how the whole process is structured so that participants understand beforehand whether an agreement can be concluded and which factors involved are critical. A key property of the method is the ease by which priorities of different risk components are synthesized into a hierarchical form through pairwise comparisons. This method, although targeted primarily for the public sector, could assist both private and public stakeholders investing in transport infrastructure projects (termed private-public partnerships) to reach an agreement. Basically, it is an interactive process characterized by the conflicting objectives and judgments of both public and private sectors.
Style APA, Harvard, Vancouver, ISO itp.
19

Liu, Feifei, Yu Yan, Yu Sun, Jianwei Liu, Dawei Li i Zhenyu Guan. "Extremely Lightweight PUF-based Batch Authentication Protocol for End-Edge-Cloud Hierarchical Smart Grid". Security and Communication Networks 2022 (29.11.2022): 1–14. http://dx.doi.org/10.1155/2022/9774853.

Pełny tekst źródła
Streszczenie:
Smart grid is gradually replacing traditional grid with two-way communication and improved management. Besides the efficiency and reliability it brings, the smart grid is inevitably fraught with rampant physical and cyber-attack. Although several physical unclonable function (PUF)-based schemes have been proposed, they are unsuited to the end-edge-cloud hierarchical smart grid. This paper proposes a PUF-based batch authentication and key agreement protocol, which protects both meters and gateways and provides end-to-end authentication between meters and the server. By offloading heavy operations from field devices to the server, the computation overhead is reduced substantially. Moreover, we innovatively devolve batch authentication and access control to the gateway, which additionally decreases downlink communication and signaling cost, and is superior to most recent schemes. Our protocol is proved by Tamarin under extended Dolev–Yao adversary and the Real-or-Random model and is evaluated to be secure against various attacks. Using extremely lightweight operations, our protocol is implemented on the MSP430FR5969 microcontroller.
Style APA, Harvard, Vancouver, ISO itp.
20

Talamo, Maurizio, Franco Arcieri, Andrea Dimitri i Christian H. Schunck. "A Blockchain based PKI Validation System based on Rare Events Management". Future Internet 12, nr 2 (14.02.2020): 40. http://dx.doi.org/10.3390/fi12020040.

Pełny tekst źródła
Streszczenie:
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is an infrastructure based on a hierarchical model, but the use of PKIs in non-hierarchical contexts has exposed them to many types of attacks. Here, we discuss weaknesses exploited in past attacks and we propose a solution based on an original consensus algorithm developed for use on blockchain technology. In this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining fast consensus. The main properties of the solution are that a consensus may be reached even when not all members of the involved PKI participate in a transaction, and that no advanced trust agreement among PKIs is needed. The proposed solution is able to detect PKI attacks and can distinguish errors from attacks, allowing precise management of anomalies.
Style APA, Harvard, Vancouver, ISO itp.
21

Kolańska-Stronka, Magdalena, Oleg Gorbaniuk i Michał Wilczewski. "From exploratory research to structural models: A multilevel lexical approach to studying the image of marketing objects". Przegląd Wschodnioeuropejski 11, nr 2 (30.12.2020): 131–43. http://dx.doi.org/10.31648/pw.6496.

Pełny tekst źródła
Streszczenie:
The key problem in studies of marketing objects (e.g., brands, political parties) is the lack of agreement on the universal dimensions through which such objects are perceived, as well as on methodologies allowing their identification. As a result, researchers often use structural models (and instruments) that lack ecological validity. We offer a solution to that problem by presenting a methodology that draws on lexical research and which has allowed researchers to establish universal dimensions of personality perception in psychology. By discussing the theoretical and methodological tenets of the multilevel lexical approach to exploring images of marketing objects, we also overcome another problem of neglecting the hierarchical structure of the phenomena and data.
Style APA, Harvard, Vancouver, ISO itp.
22

Kim, Hyunsung, i Sung Woon Lee. "Secure Energy Efficient Data Collection Scheme Over Wireless Multimedia Sensor Networks". Journal of Computational and Theoretical Nanoscience 13, nr 10 (1.10.2016): 7375–84. http://dx.doi.org/10.1166/jctn.2016.5729.

Pełny tekst źródła
Streszczenie:
A secure data collection in wireless multimedia sensor networks (WMSNs) has given attention to one of security issues. WMSNs pose unique security challenges due to their inherent limitations in communication and computing, which makes vulnerable to various attacks. For the energy efficiency, WMSNs adopt mobile sinks to collect data from sensor nodes. Thus, how to gather data securely and efficiently is an important issue WMSNs. In this paper, we propose a secure energy efficient data collection scheme over WMSNs, which are based on Bilinear pairing and symmetric key cryptosystem. First of all, we devise a security model based on a hierarchical key structure for the security mechanisms, authentication, key agreement, confidentiality, and integrity. Based on the model, we propose a secure energy efficient data collection scheme, which could establish secure session in one round. The proposed scheme could efficiently remedy security and efficiency problems in the previous data collection schemes over WMSNs. It has only about 18% of overhead for the security but also has energy efficiency compared with the other related schemes.
Style APA, Harvard, Vancouver, ISO itp.
23

Zhao, E.-G., S.-B. Qian, X. Zhou, L.-J. Li, L.-Y. Zhu i L. Zhang. "Rapid mass transfer between the twin components in the hierarchical triple system GK Cep". Monthly Notices of the Royal Astronomical Society 504, nr 4 (3.05.2021): 5155–63. http://dx.doi.org/10.1093/mnras/stab1188.

Pełny tekst źródła
Streszczenie:
ABSTRACT GK Cep is an eclipsing binary that contains two A-type components with an orbital period of 0.936 d. The high mass ratio and the contact or near-contact configuration make it a key target to understand binary evolution. However, the physical properties and evolutionary state are still unknown. Here we present the UV light curve obtained by using the lunar-based ultraviolet telescope (LUT) and several eclipse times obtained with the Sino-Thai 70-cm telescope and the 1.0-m telescope at Yunnan Observatories. Analysis of the LUT light curve suggests that GK Cep is a near-contact semidetached system where the slightly less massive component is the hotter one that is filling the critical Roche lobe. Meanwhile, a hotspot is found on the neck of the more massive but cooler component. By using all available times for the light minimum, it is detected that the O–C curve shows a cyclic oscillation while it undergoes an upward parabolic change. The increase of the orbital period, the high mass ratio, the semidetached configuration with a lobe-filling less massive component, and the presence of a hotspot on the more massive component all suggest that GK Cep is in a key evolutionary state just after the shortest-period evolutionary stage during the rapid mass transfer. The cyclic change in the O–C curve reveals that GK Cep contains a solar-type stellar companion in a triply hierarchical system that is in agreement with the spectroscopic result. The third body contributes about 2.6 per cent to the total light of the triple system.
Style APA, Harvard, Vancouver, ISO itp.
24

Firoiu, Daniela, George H. Ionescu, Ramona Pîrvu, Laura Mariana Cismaș, Sorin Tudor i Ioana C. Patrichi. "Dynamics of Implementation of SDG 7 Targets in EU Member States 5 Years after the Adoption of the Paris Agreement". Sustainability 13, nr 15 (24.07.2021): 8284. http://dx.doi.org/10.3390/su13158284.

Pełny tekst źródła
Streszczenie:
The European Union, by adopting the European Green Deal, aims at an extremely ambitious goal to become climate neutral by 2050. This objective implies a massive investment plan to reduce disparities between EU Member States and to support their transformation efforts in order to reshape the Union into a modern, resource-efficient and competitive economy. The objective of this paper is to analyze the dynamics of implementation of SDG 7 targets in EU Member States 5 years after the adoption of the Paris Agreement. Using hierarchical clustering analysis to reveal hidden associative structures, EU countries were grouped in 2015 and 2019 based on Eurostat data in order to identify and analyze key characteristics, but also to evaluate their evolution over time. The results of this research revealed clusters of high-performing countries, as well as countries that require increased attention and support to ease the transition to a greener economy. If in 2015 the cluster of the best performing countries consisted of four EU countries, in 2019, their number increased to eight EU countries, simultaneously with an improvement of the indicators, proving a real concern and involvement regarding the achievement of SDG 7 targets.
Style APA, Harvard, Vancouver, ISO itp.
25

Chang, Chung-Hao, i Shih-Fang Lo. "Impact Analysis of a National and Corporate Carbon Emission Reduction Target on Renewable Electricity Use: A Review". Energies 15, nr 5 (28.02.2022): 1794. http://dx.doi.org/10.3390/en15051794.

Pełny tekst źródła
Streszczenie:
The Paris Agreement requires countries to propose their National Determined Contributions (NDCs) and encourages companies to engage in climate action. This two-stage study explores the mutual influence of national and corporate carbon reduction targets and their effect on the adoption of renewable energy using Hierarchical Linear Modeling (HLM). The subjects are companies nested in the G20, engaging in the Science-Based Target initiative (SBTi) or the RE100 initiative. These empirical results show corporate targets are positively correlated to adoption of renewable energy, and development of renewable energy varies by country groups, however; national targets are insignificantly correlated. Our key findings: (1) companies which set SBTs are more willing to use renewable energy to achieve their targets but prefer power purchase agreements (PPAs) and renewable energy certificates (RECs) to investment in renewables. (2) The effect of a national-level target on corporate renewable energy use is non-significant, probably because most multinational corporations are used to compliance and their performances are likely to be better than the national deployment on climate change. We argue that an industrial energy transition to renewables is economically beneficial and needs substantial support in the form of policies or subsidies, instead of just setting targets or attracting publicity.
Style APA, Harvard, Vancouver, ISO itp.
26

Otomo, Ruriko. "Healthcare, language and a free-trade agreement: Institutional logics of on-the-job Japanese language training for migrant healthcare workers". Multilingua 39, nr 3 (27.05.2020): 343–67. http://dx.doi.org/10.1515/multi-2019-0007.

Pełny tekst źródła
Streszczenie:
AbstractFaced with a pressing demand for eldercare workers, Japan signed Economic Partnership Agreements (EPAs) to recruit workers from Southeast Asian countries. The EPA limits the employment period for migrant workers, unless they successfully pass the healthcare licensure examination in Japanese. Therefore, they receive on-the-job training and prepare for the examination, making their host institutions partly responsible for assisting the training and exam preparation. In this system, migrants’ Japanese ability, tested against a strict standard, is the key to their being successfully accepted as good workers. Migrant workers and their employers are thus important actors in a neoliberal logic in which mastering a specific language practice and demonstrating it on standardized tests is deemed important for one’s social mobility. To analyse how this logic is realised in a healthcare workplace, this paper draws on fieldwork data in an eldercare home employing EPA workers. The operation scheme of the EPA and institutional policy will be highlighted as underlying mechanisms for the creation of neoliberal subjects. I argue these measures primarily support the hierarchical relationships between Japanese and non-Japanese, and between employer and employee. I also discuss consequential ways in which on-the-job training has differentially impacted employment trajectories of the migrant workers.
Style APA, Harvard, Vancouver, ISO itp.
27

Zheng, Kaifa, Caiyang Ding i Jinchen Wang. "A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation". Electronics 12, nr 12 (19.06.2023): 2737. http://dx.doi.org/10.3390/electronics12122737.

Pełny tekst źródła
Streszczenie:
The node–edge–cloud collaborative computation paradigm has introduced new security challenges to data sharing. Existing data-sharing schemes suffer from limitations such as low efficiency and inflexibility and are not easily integrated with the node–edge–cloud environment. Additionally, they do not provide hierarchical access control or dynamic changes to access policies for data privacy preservation, leading to a poor user experience and lower security. To address these issues, we propose a data-sharing scheme using attribute-based encryption (ABE) that supports node–edge–cloud collaborative computation (DS-ABE-CC). Our scheme incorporates access policies into ciphertext, achieving fine-grained access control and data privacy preservation. Firstly, considering node–edge–cloud collaborative computation, it outsources the significant computational overhead of data sharing from the owner and user to the edge nodes and the cloud. Secondly, integrating deeply with the “node–edge–cloud” scenario, the key distribution and agreement between all entities embedded in the encryption and decryption process, with a data privacy-preserving mechanism, improve the efficiency and security. Finally, our scheme supports flexible and dynamic access control policies and realizes hierarchical access control, thereby enhancing the user experience of data sharing. The theoretical analysis confirmed the security of our scheme, while the comparison experiments with other schemes demonstrated the practical feasibility and efficiency of our approach in node–edge–cloud collaborative computation.
Style APA, Harvard, Vancouver, ISO itp.
28

Gao, Tianhan, Nan Guo, Kangbin Yim i Qianyi Wang. "PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience". Computer Science and Information Systems 11, nr 3 (2014): 975–99. http://dx.doi.org/10.2298/csis130917060g.

Pełny tekst źródła
Streszczenie:
Multi-operator wireless mesh networks (WMNs) have attracted increasingly attentions as a low-cost accessing approach for future large-scale mobile network. Security and privacy are two important objectives during the deployment of multi-operator WMNs. Despite the necessity, limited literature research takes both privacy and user experience into account. This motivates us to develop PPS, a novel privacy-preserving security scheme, for multi-operator WMNs. On one hand, most of the privacy needs are satisfied with the hybrid utilization of a tri-lateral pseudonym and a ticket based on proxy blind signature. On the other hand, the sophisticated unlinkability is implemented where mobile user is able to keep his pseudonym unchanged within the same operator in order to gain better user experience. PPS is presented as a suite of authentication and key agreement protocols built upon the proposed three-tire hierarchical network architecture. Our analysis demonstrates that PPS is secure and outperforms other proposal in terms of communication and computation overhead.
Style APA, Harvard, Vancouver, ISO itp.
29

Prakash, Chandra, Vivek Roy i Parikshit Charan. "Mitigating interorganizational conflicts in humanitarian logistics collaboration: the roles of contractual agreements, trust and post-disaster environmental uncertainty phases". International Journal of Logistics Management 33, nr 1 (10.12.2021): 28–52. http://dx.doi.org/10.1108/ijlm-06-2021-0318.

Pełny tekst źródła
Streszczenie:
PurposeGovernance is the key to establishing effective collaboration among humanitarian logistics partners addressing an ongoing relief work. With a focus on humanitarian interorganizational collaboration, this research draws on governance theories to investigate how conflicts can be mitigated in this challenging setting.Design/methodology/approachThe focus on governance extends attention to the frontiers of contractual agreement, trust and environmental uncertainty to be applied in the humanitarian setting. To develop perspectives, an online survey of 289 field executives working in humanitarian organizations across the globe is conducted. The findings are based on hierarchical regressions.FindingsEnvironmental uncertainty, in humanitarian logistics, is not straightforward, but wields distinctive challenges in the response phase (immediate to the disaster) as well as the recovery phase (beginning of build back) – to loom prospects of conflict between partners. Findings outline that contractual agreement can increase conflict during the response phase (high environmental uncertainty), but mitigate it during the recovery phase (low environmental uncertainty). Furthermore, contractual agreement interactively strengthens the ability of trust to reduce conflict. Yet, trust acting alone shows best outcome to mitigate conflict.Research limitations/implicationsContrary to the established understanding in traditional logistics suggesting the vitality of contracts to easily mitigate challenges posed by environmental uncertainty, the humanitarian setting extends a unique outset for interorganizational governance based on the temporality of response and recovery phases.Originality/valueThis research pioneers to quantitatively examine the setting of humanitarian logistics based on survey. Given the difficulty of data acquisition, the extant research has largely relied on qualitative investigations when considering the agenda of governance.
Style APA, Harvard, Vancouver, ISO itp.
30

Griesbauer, Eva-Maria, Ed Manley, Daniel McNamee, Jeremy Morley i Hugo Spiers. "What determines a boundary for navigating a complex street network: evidence from London taxi drivers". Journal of Navigation 75, nr 1 (6.10.2021): 15–34. http://dx.doi.org/10.1017/s0373463321000679.

Pełny tekst źródła
Streszczenie:
AbstractSpatial boundaries play an important role in defining spaces, structuring memory and supporting planning during navigation. Recent models of hierarchical route planning use boundaries to plan efficiently first across regions and then within regions. However, it remains unclear which structures (e.g. parks, rivers, major streets, etc.) will form salient boundaries in real-world cities. This study tested licensed London taxi drivers, who are unique in their ability to navigate London flexibly without physical navigation aids. They were asked to indicate streets they considered as boundaries for London districts or dividing areas. It was found that agreement on boundary streets varied considerably, from some boundaries providing almost no consensus to some boundaries consistently noted as boundaries. Examining the properties of the streets revealed that a key factor in the consistent boundaries was the near rectilinear nature of the designated region (e.g. Mayfair and Soho) and the distinctiveness of parks (e.g. Regent's Park). Surprisingly, the River Thames was not consistently considered as a boundary. These findings provide insight into types of environmental features that lead to the perception of explicit boundaries in large-scale urban space. Because route planning models assume that boundaries are used to segregate the space for efficient planning, these results help make predictions of the likely planning demands of different routes in such complex large-scale street networks. Such predictions could be used to highlight information used for navigation guidance applications to enable more efficient hierarchical planning and learning of large-scale environments.
Style APA, Harvard, Vancouver, ISO itp.
31

Wang, Rui, Donglan Liu, Xin Liu, Jianfei Chen, Lei Ma, Yong Wang, Hao Zhang i in. "Securing Topology Control in SDWSNs Using Identity-Based Cryptography". Journal of Sensors 2023 (19.07.2023): 1–20. http://dx.doi.org/10.1155/2023/6187353.

Pełny tekst źródła
Streszczenie:
In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.
Style APA, Harvard, Vancouver, ISO itp.
32

Ruiz-Martínez, Álvaro, Thomas M. Bartol, Terrence J. Sejnowski i Daniel M. Tartakovsky. "Efficient models of polymerization applied to FtsZ ring assembly inEscherichia coli". Proceedings of the National Academy of Sciences 115, nr 19 (23.04.2018): 4933–38. http://dx.doi.org/10.1073/pnas.1719391115.

Pełny tekst źródła
Streszczenie:
High protein concentrations complicate modeling of polymer assembly kinetics by introducing structural complexity and a large variety of protein forms. We present a modeling approach that achieves orders of magnitude speed-up by replacing distributions of lengths and widths with their average counterparts and by introducing a hierarchical classification of species and reactions into sets. We have used this model to study FtsZ ring assembly inEscherichia coli. The model’s prediction of key features of the ring formation, such as time to reach the steady state, total concentration of FtsZ species in the ring, total concentration of monomers, and average dimensions of filaments and bundles, are all in agreement with the experimentally observed values. Besides validating our model against the in vivo observations, this study fills some knowledge gaps by proposing a specific structure of the ring, describing the influence of the total concentration in short and long kinetics processes, determining some characteristic mechanisms in polymer assembly regulation, and providing insights about the role of ZapA proteins, critical components for both positioning and stability of the ring.
Style APA, Harvard, Vancouver, ISO itp.
33

Melani, Leandro Hartleben, Bruno César Zanardo Honório, Ulisses Miguel da Costa Correia i Alexandre Campane Vidal. "The use of variational mode decomposition in assisting sedimentary cyclicity analysis: A case study from an Albian carbonate reservoir, Campos Basin, southeast Brazil". GEOPHYSICS 85, nr 3 (1.05.2020): B77—B86. http://dx.doi.org/10.1190/geo2019-0447.1.

Pełny tekst źródła
Streszczenie:
The sedimentary cyclicity analysis investigates the cyclic patterns and the different hierarchical orders of cyclicity in the stratigraphic record. The detection of cyclic depositional patterns is a key element of quantitative stratigraphy. It is often based on well-log data, which can be challenging due to the presence of superimposed cycles and nongeologic artifacts. We have developed an approach to assist the detection of sedimentary cyclicity in well-log signals based on a multiscale spectral analysis method. First, we apply variational mode decomposition to decompose the gamma-ray logs into band-limited subsignals, the intrinsic mode functions (IMFs), to investigate different orders of smoothness, signal-to-noise ratio, and the cyclicity embedded in the geologic record. Conventional time-domain analysis is carried out to understand the general trends in the IMFs, which enables us to better identify long-term cycles associated with transgressive-regressive (T-R) sequences. Then, by appropriately selecting a given IMF and extracting the instantaneous frequency (IF) and its mirrored version, we build a cyclicity log that can map expressive behavior change in the time-frequency domain. Because the IF is more sensitive to the signal variations, we could highlight the short-term cycles throughout the formation in detail. The detected short-term cycles are in agreement with the T-R sequence. We apply our method to the Albian carbonate succession of Macaé Group, Campos Basin, Brazil. We understand that our method can be a valuable tool for semiautomated detection of sedimentary cycles, assisting in the characterization of different hierarchical orders of cyclicity.
Style APA, Harvard, Vancouver, ISO itp.
34

Cullum, Carola, Kevin H. Rogers, Gary Brierley i Ed T. F. Witkowski. "Ecological classification and mapping for landscape management and science". Progress in Physical Geography: Earth and Environment 40, nr 1 (27.10.2015): 38–65. http://dx.doi.org/10.1177/0309133315611573.

Pełny tekst źródła
Streszczenie:
There is growing demand for biogeographical landscape classifications and ecological maps that describe patterns of spatially co-varying biotic and abiotic ecosystem components. This demand is fuelled by increasing data availability and processing capacity, by institutional practices of land and water resource management and planning and by the growth of transdisciplinary science that requires the development of a shared conceptual framework through which to view landscape character and behaviour. Despite the widespread use of ecological maps, and the extent to which they have become embedded in institutional practice, policy and law, no standard approach to ecosystem mapping has emerged, such that there are many valid ways of mapping the same landscape. Consensus is possible only when there is agreement on the spatial entities to be mapped. We propose a way of defining such entities and identifying them in any given landscape. Landscapes are conceived in terms of a conceptual biophysical template that constrains a wide range of ecological processes at various hierarchical levels. The template is conceived as comprising co-evolved associations of soils, vegetation, topography and hydrology that form a dynamic mosaic characteristic of a particular topographic, climatic and geological context that is continually being shaped by many perturbations. We synthesise themes from vegetation, soil and river sciences, using hierarchy theory to frame a perspective that facilitates the definition of mappable landscape entities at three hierarchical levels of organisation. These entities are conceived as archetypal structural-functional units, with form and process linked in conceptual models that underpin each archetype. We describe how our approach has been used to map ecological entities in Kruger National Park, South Africa, showing how the proposed framework integrates key system components, providing transparent foundations for transdisciplinary approaches to landscape management and science.
Style APA, Harvard, Vancouver, ISO itp.
35

Schmidt, Thomas, Maria-Rosa Cioni, Florian Niederhofer, Jonathan Diaz i Gal Matijevic. "VMC proper motions of the Magellanic Bridge". Proceedings of the International Astronomical Union 14, S344 (sierpień 2018): 130–33. http://dx.doi.org/10.1017/s1743921318006762.

Pełny tekst źródła
Streszczenie:
AbstractDwarf galaxies enable us to study early phases of galaxy evolution and are key to many open questions about the hierarchical structure of the Universe. The Large and Small Magellanic Cloud (LMC and SMC) are the most luminous dwarf galaxy satellites of the Milky Way (MW). They are most likely gravitationally bound to each other, and their last interaction occurred about 200 Myr ago. Also, they are in an early phase of minor merging with the MW and will impact the Galactic structure in the future because of their relatively large mass. However, there are still major uncertainties regarding their origin and their interactions with one another and with the Milky Way. We cross-correlated the VMC and Gaia DR2 data to select a sample of stars that likely belong to the Magellanic Bridge, a feature formed of gas and stars which is connecting the LMC and the SMC. We removed potential MW foregound stars using a combination of parallax and colour-magnitude criteria and calculated the proper motions of the Bridge member stars. Our analysis supports a motion of star towards the LMC, which was found to be in good agreement with a dynamical simulation, of the SMC being stripped by the LMC.
Style APA, Harvard, Vancouver, ISO itp.
36

Di Noto, Vito, Keti Vezzu, Francesca Lorandi, Gioele Pagot, Stephen Paddison i Thomas A. Zawodzinski. "(Invited) A Formalism Relating the Relative Humidity to the Proton Conductivity Mechanism of Membranes". ECS Meeting Abstracts MA2022-02, nr 57 (9.10.2022): 2179. http://dx.doi.org/10.1149/ma2022-02572179mtgabs.

Pełny tekst źródła
Streszczenie:
The relationship between relative humidity of gas phase and proton conductivity in proton exchange membranes has been subject of extensive investigations [1],[2]. Herein, a theoretical framework is presented which describes proton transport in relation to stepwise equilibria that reflect the water uptake. In the proposed model, at first, the hydration process is treated as a stepwise equilibrium process, in agreement with experimental observations. Several hierarchical levels of structure evolve with increasing hydration. These levels are easily confirmed by the analysis of the electric response of perfluorinated based membranes by complex dielectric and conductivity spectra. Thus, a wide range of literature data on hydration of Nafion as a function of activity and temperature has been analyzed by means of the proposed model to extract chemical parameters diagnostic of the type of interactions characterizing the hydrophilic domains of membranes. These parameters, which are crucial in order to modulate the ion transport phenomena in ionomers, are then introduced into the model to describe the functional dependence of conductivity on water activity in gas phase. The treatment of proton conductivity is built on the approaches commonly adopted to describe transport in solids [3]. Key proton migration phenomena appropriate to the levels of the structural hierarchy are considered. The conductivity model is used to describe a set of conductivity vs. water uptake data as a function of temperature, with data taken to exceptionally low water contents. The formalism is then used to analyze a set of data for a perfluorosulfonic acid (PFSA) membrane as a function of hydration, temperature and polymer equivalent weight. The main advantage of the proposed framework is the possibility of a straightforward application to multiple membrane types based on the energetics of water uptake. Actually, the focus on chemical interactions allows to better correlate the effects of the morphology and relaxation events of the matrix to the proton migration phenomena of the membrane. Acknowledgements This work has received funding from: (a) the European Union’s Horizon 2020 research and innovation program under grant agreement 881603; (b) the project ‘Advanced Low-Platinum hierarchical Electrocatalysts for low-T fuel cells’ funded by EIT Raw Materials. References [1] Kreuer K.D., Schuster M., Obliers B., Diat O., Traub U., Fuchs A., Klock U., Paddison S.J., Maier J. 2008 J. Power Sources 178 499-509. [2] Maalouf M., Pyle B., Sun C.N., Wu D., Paddison S.J., Schaberg M., Emery M., Lochhaas K.H., Hamrock S.J., Ghassemi H., Zawodzinski, T.A. 2009 ECS Trans. 25 1473. [3] A.D. LeClaire and A. Rabinovitch, 1981, J. Phys. C, 14 3863.
Style APA, Harvard, Vancouver, ISO itp.
37

Bär, Kristian, Thomas Reinsch i Judith Bott. "The PetroPhysical Property Database (P<sup>3</sup>) – a global compilation of lab-measured rock properties". Earth System Science Data 12, nr 4 (13.10.2020): 2485–515. http://dx.doi.org/10.5194/essd-12-2485-2020.

Pełny tekst źródła
Streszczenie:
Abstract. Petrophysical properties are key to populating local and/or regional numerical models and to interpreting results from geophysical investigation methods. Searching for rock property values measured on samples from a specific rock unit at a specific location might become a very time-consuming challenge given that such data are spread across diverse compilations and that the number of publications on new measurements is continuously growing and data are of heterogeneous quality. Profiting from existing laboratory data to populate numerical models or interpret geophysical surveys at specific locations or for individual reservoir units is often hampered if information on the sample location, petrography, stratigraphy, measuring method and conditions is sparse or not documented. Within the framework of the EC-funded project IMAGE (Integrated Methods for Advanced Geothermal Exploration, EU grant agreement no. 608553), an open-access database of lab-measured petrophysical properties has been developed (Bär et al., 2017, 2019b: P3 – database, https://doi.org/10.5880/GFZ.4.8.2019.P3. The goal of this hierarchical database is to provide easily accessible information on physical rock properties relevant for geothermal exploration and reservoir characterisation in a single compilation. Collected data include classical petrophysical, thermophysical, and mechanical properties as well as electrical conductivity and magnetic susceptibility. Each measured value is complemented by relevant meta-information such as the corresponding sample location, petrographic description, chronostratigraphic age, if available, and original citation. The original stratigraphic and petrographic descriptions are transferred to standardised catalogues following a hierarchical structure ensuring inter-comparability for statistical analysis (Bär and Mielke, 2019: P3 – petrography, https://doi.org/10.5880/GFZ.4.8.2019.P3.p; Bär et al., 2018, 2019a: P3 – stratigraphy, https://doi.org/10.5880/GFZ.4.8.2019.P3.s). In addition, information on the experimental setup (methods) and the measurement conditions are listed for quality control. Thus, rock properties can directly be related to in situ conditions to derive specific parameters relevant for simulating subsurface processes or interpreting geophysical data. We describe the structure, content and status quo of the database and discuss its limitations and advantages for the end user.
Style APA, Harvard, Vancouver, ISO itp.
38

McAdams, Stephen. "Musical Forces and Melodic Expectations: Comparing Computer Models and Experimental Results". Music Perception 21, nr 4 (1.06.2004): 457–98. http://dx.doi.org/10.1525/mp.2004.21.4.457.

Pełny tekst źródła
Streszczenie:
Recent work on "musical forces" asserts that experienced listeners of tonal music not only talk about music in terms used to describe physical motion, but actually experience musical motion as if it were shaped by quantifiable analogues of physical gravity, magnetism, and inertia. This article presents a theory of melodic expectation based on that assertion, describes two computer models of aspects of that theory, and finds strong support for that theory in comparisons of the behavior of those models with the behavior of participants in several experiments. The following summary statement of the theory is explained and illustrated in the article: Experienced listeners of tonal music expect completions in which the musical forces of gravity, magnetism, and inertia control operations on alphabets in hierarchies of embellishment whose stepwise displacements of auralized traces create simple closed shapes. A "single-level" computer program models the operation of these musical forces on a single level of musical structure. Given a melodic beginning in a certain key, the model not only produces almost the same responses as experimental participants, but it also rates them in a similar way; the computer model gives higher ratings to responses that participants sing more often. In fact, the completions generated by this model match note-for-note the entire completions sung by participants in several psychological studies as often as the completions of any one of those participants matches those of the other participants. A "multilevel" computer program models the operation of these musical forces on multiple hierarchical levels. When the multilevel model is given a melodic beginning and a hierarchical description of its embellishment structure (i.e., a Schenkerian analysis of it), the model produces responses that reflect the operation of musical forces on all the levels of that hierarchical structure. Statistical analyses of the results of a number of experiments test hypotheses arising from the computer models' algorithm (S. Larson, 1993a) for the interaction of musical forces as well as from F. Lerdahl's similar (1996) algorithm. Further statistical analysis contrasts the explanatory power of the theory of musical forces with that of E. Narmour's (1990, 1992) implication-realization model. The striking agreement between computer-generated responses and experimental results suggests that the theory captures some important aspects of melodic expectation. Furthermore, the fact that these data can be modeled well by the interaction of constantly acting but contextually determined musical forces gives support to the idea that we experience musical motions metaphorically in terms of our experience of physical motions.
Style APA, Harvard, Vancouver, ISO itp.
39

Grudić, Michael Y., J. M. Diederik Kruijssen, Claude-André Faucher-Giguère, Philip F. Hopkins, Xiangcheng Ma, Eliot Quataert i Michael Boylan-Kolchin. "A model for the formation of stellar associations and clusters from giant molecular clouds". Monthly Notices of the Royal Astronomical Society 506, nr 3 (5.07.2021): 3239–58. http://dx.doi.org/10.1093/mnras/stab1894.

Pełny tekst źródła
Streszczenie:
ABSTRACT We present a large suite of magnetohydrodynamic simulations of turbulent, star-forming giant molecular clouds (GMCs) with stellar feedback, extending previous work by simulating 10 different random realizations for each point in the parameter space of cloud mass and size. It is found that once the clouds disperse due to stellar feedback, both self-gravitating star clusters and unbound stars generally remain, which arise from the same underlying continuum of substructured stellar density, i.e. the hierarchical cluster formation scenario. The fraction of stars that are born within gravitationally bound star clusters is related to the overall cloud star formation efficiency set by stellar feedback, but has significant scatter due to stochastic variations in the small-scale details of the star-forming gas flow. We use our numerical results to calibrate a model for mapping the bulk properties (mass, size, and metallicity) of self-gravitating GMCs on to the star cluster populations they form, expressed statistically in terms of cloud-level distributions. Synthesizing cluster catalogues from an observed GMC catalogue in M83, we find that this model predicts initial star cluster masses and sizes that are in good agreement with observations, using only standard IMF and stellar evolution models as inputs for feedback. Within our model, the ratio of the strength of gravity to stellar feedback is the key parameter setting the masses of star clusters, and of the various feedback channels direct stellar radiation (photon momentum and photoionization) is the most important on GMC scales.
Style APA, Harvard, Vancouver, ISO itp.
40

Lian, Jianhui, Daniel Thomas, Cheng Li, Zheng Zheng, Claudia Maraston, Dmitry Bizyaev, Richard R. Lane i Renbin Yan. "SDSS-IV MaNGA: environmental dependence of gas metallicity gradients in local star-forming galaxies". Monthly Notices of the Royal Astronomical Society 489, nr 1 (16.08.2019): 1436–50. http://dx.doi.org/10.1093/mnras/stz2218.

Pełny tekst źródła
Streszczenie:
ABSTRACT Within the standard model of hierarchical galaxy formation in a Λ cold dark matter universe, the environment of galaxies is expected to play a key role in driving galaxy formation and evolution. In this paper, we investigate whether and how the gas metallicity and the star formation surface density (ΣSFR) depend on galaxy environment. To this end, we analyse a sample of 1162 local, star-forming galaxies from the galaxy survey Mapping Nearby Galaxies at APO (MaNGA). Generally, both parameters do not show any significant dependence on environment. However, in agreement with previous studies, we find that low-mass satellite galaxies are an exception to this rule. The gas metallicity in these objects increases while their ΣSFR decreases slightly with environmental density. The present analysis of MaNGA data allows us to extend this to spatially resolved properties. Our study reveals that the gas metallicity gradients of low-mass satellites flatten and their ΣSFR gradients steepen with increasing environmental density. By extensively exploring a chemical evolution model, we identify two scenarios that are able to explain this pattern: metal-enriched gas accretion or pristine gas inflow with varying accretion time-scales. The latter scenario better matches the observed ΣSFR gradients, and is therefore our preferred solution. In this model, a shorter gas accretion time-scale at larger radii is required. This suggests that ‘outside–in quenching’ governs the star formation processes of low-mass satellite galaxies in dense environments.
Style APA, Harvard, Vancouver, ISO itp.
41

Zeidler, Peter, Elena Sabbi i Antonella Nota. "The Internal Line-of-Sight Kinematics of NGC 346: The Rotation of the Core Region". Astrophysical Journal 936, nr 2 (1.09.2022): 136. http://dx.doi.org/10.3847/1538-4357/ac8004.

Pełny tekst źródła
Streszczenie:
Abstract We present the stellar radial velocity analysis of the central 1 ′ × 1 ′ of the young massive Small Magellanic Cloud star cluster NGC 346. Using VLT/MUSE integral field spectroscopy in combination with Hubble Space Telescope photometry, we extract 103 spectra of cluster member stars suited to measure accurate line-of-sight kinematics. The cluster member stars show two distinct velocity groups at v 1 = − 3.3 − 0.2 + 0.3 km s − 1 and v 2 = 2.6 − 0.1 + 0.1 km s − 1 , relative to the systemic velocity of (165.5 ± 0.2) km s−1, and hint at a third group at v 3 = 9.4 − 0.1 + 0.1 km s − 1 . We show that there is neither a correlation between the velocity groups and the spatial location of the stars, nor their locus on optical color–magnitude diagrams, which makes the stellar velocity a key parameter to separate individual stellar components in such a young star cluster. Velocity group 2 shows clear rotation with Ω2 =(−0.4 ± 0.1) Myr−1, corresponding to (−4.9 ± 0.7) km s−1 at radial distance of 10 pc from the center, a possible remnant of the formation process of NGC 346 through the hierarchical collapse of the giant molecular cloud. The ionizing gas has lost any natal kinematic imprint and shows clear expansion, driven by far-ultraviolet fluxes and stellar winds of the numerous OB stars in the cluster center. The size of this expanding bubble and its expansion velocity of 7.9 km s−1 are in excellent agreement with the estimate that the latest star formation episode occurred about two million years ago.
Style APA, Harvard, Vancouver, ISO itp.
42

Luo, Yurong, Hui Li, Ruhui Ma i Zhenyang Guo. "A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services". Security and Communication Networks 2021 (19.04.2021): 1–18. http://dx.doi.org/10.1155/2021/6697155.

Pełny tekst źródła
Streszczenie:
The fifth-generation (5G) mobile communication technology has already deployed commercially and become a global research focus. The new features of 5G include unlimited information exchange, a large variety of connections with independent energy, and diversified high transmission rate services. Collective synergy of services is expected to change the way of life and future generations and introduce new converged services to the ICT industry. Different application services have to meet differentiated security demands. From the perspective of security, in order to support the multiservice of 5G services, it is necessary to consider the new security mechanism driven by the service. Based on 5G massive data stream, the 5G system can provide customized real-world services for potential users and reduce the user experience gap in different scenarios. However, 3GPP Extensible Authentication Protocol (EAP), which is the present entity authentication mechanism for the 5G service layer, is only an individual authentication architecture and unable to fulfill the flexible security objectives of differentiated services. In this paper, we present a new hierarchical identity management framework as well as an adaptable and composable three-factor authentication and session key agreement protocol for different applications in 5G multiservice systems. Finally, we propose an authorization process by combining with the proposed three-factor authentication mechanism and Service-Based Architecture (SBA) proposed by the 3GPP committee. The proposed mechanism can concurrently provide diverse identity authentication schemes corresponding to four different security levels by easily splitting or assembling three-factor authentication protocol blocks. The proposed scheme can be simultaneously applied to a variety of applications to improve the efficiency and quality of service and reduce the complexity of the whole 5G multiservice system, instead of designing or adopting several different authentication protocols. The performance evaluation results indicate that the proposed scheme can guarantee the multiple security of the system with ideal efficiency.
Style APA, Harvard, Vancouver, ISO itp.
43

Silveira, Mariana Balau. "De Copenhagen a Paris: a evolução do BASIC no complexo de Regime de Mudanças Climáticas". Brazilian Journal of International Relations 8, nr 2 (28.08.2019): 384–405. http://dx.doi.org/10.36311/2237-7743.2019.v8n2.08.p384.

Pełny tekst źródła
Streszczenie:
O fracasso do Protocolo de Kyoto em desenvolver uma estrutura de governança climática eficaz e inclusiva provocou um movimento de multiplicação de agrupamentos no âmbito do Regime Internacional de Mudanças Climáticas (RIMC), como o BASIC. A mudança e gradual fragmentação do regime evidencia o seu caráter não-hierárquico e não-integrado – podendo ser denominado, portanto, um “complexo de regime”. A iminência de reforma na estrutura institucional, com a COP 21 como marco importante, porém, representa a transição de uma estratégia top-down anterior para uma abordagem bottom-up cujo foco reside na contribuição nacional dos países. O principal argumento do presente artigo, a partir de uma análise comparativa longitudinal das COPs, é de que esse movimento indicaria uma fragmentação gradual do BASIC enquanto coalizão de negociação política, ao mesmo tempo em que sugere novos rumos para o regime. Abstract: The failure of the Kyoto Protocol in developing an effective and inclusive climate governance structure caused the multiplication of groups, such as the BASIC countries, under the International Climate Change Regime (UNFCCC). Its gradual fragmentation shows the non-hierarchical character of this “regime complex”. The imminent reform of the institutional framework, with COP 21 as an important landmark, however, represents the transition from a previous top-down strategy to a bottom-up approach where the focus lies in national contributions rather than a broader accord. The main argument of this article, based on a longitudinal comparative analysis of the COPs, is that this movement would indicate a gradual fragmentation of BASIC as a political bargaining coalition, while suggesting new directions for the UNFCCC. Key-words: BASIC, Climate Change, Paris Agreement. Recebido em: março/2019. Aprovado em: agosto/2019.
Style APA, Harvard, Vancouver, ISO itp.
44

Mokrotsky, Muhaylo, Roman Shostak, Dmutro Novak, Vitaliy Korostelev i Yuriy Sinilo. "DETERMINATION OF EFFICIENCY INDICATORS FOR JUSTIFICATION OF OPERATIONAL AND TACTICAL REQUIREMENTS FOR THE RESEARCH AND IMPACT COMPLEX OF ROCKET EYELAS". Collection of scientific works of Odesa Military Academy, nr 16 (11.02.2022): 48–58. http://dx.doi.org/10.37129/2313-7509.2021.16.48-58.

Pełny tekst źródła
Streszczenie:
Based on the results of scientific research, the authors consider a set of conditions and factors that determine the effectiveness of the reconnaissance and strike complex and identify a set of indicators in the interests of forming operational and tactical requirements for products that should be equipped with promising weapons and military equipment. One of the key tasks in the creation of these complexes is the task of substantiating the operational and tactical requirements (OTV) for armaments and military equipment, using a set of indicators of combat performance, which would most fully take into account (quantitatively and qualitatively) external and internal conditions and factors. , which determine the necessary parameters of the characteristics of the use of reconnaissance and strike systems. Analysis of existing approaches shows that the identified performance indicators, which would take into account all the essential patterns of use of reconnaissance and strike systems is quite a difficult task due to the complexity and variety of conditions and factors, processes that determine the effectiveness of complexes. According to the system approach, determining the effectiveness of the complex as an element of a group of troops (forces) can be done by sequentially building a hierarchical structure of indicators, partial actions of the components of the complex, its functioning and their mutual agreement on the purpose, place, sequence of forces and means involved. to perform tasks. The effectiveness of the application and the quality of functioning of the reconnaissance and strike complex of missile troops and artillery is mainly assessed by indicators that are numerical characteristics of its combat properties. They are a quantitative measure of the quality of functioning of the reconnaissance and strike complex. Its quality is determined by the external and internal characteristics of the properties. Keywords: indicator, reconnaissance and strike complex, operational and tactical requirements, missile troops and artillery.
Style APA, Harvard, Vancouver, ISO itp.
45

NESKORODIEVA, Inna, Volodymyr RODCHENKO, Olena PARKHOMENKO, Yuliia KVITKA i Anton KVITKA. "DETERMINATION THE SYSTEM OF FACTORS DEVELOPING COMMERCIAL MEDIATION IN UKRAINE". Ukrainian Journal of Applied Economics 4, nr 4 (30.10.2019): 60–69. http://dx.doi.org/10.36887/2415-8453-2019-4-7.

Pełny tekst źródła
Streszczenie:
Introduction. Business environment functions according to peculiar laws and rules. That constantly accompanied by commercial risks, setbacks and a variety of conflicts. Failure to resolve and exacerbate conflicts in the business environment threatens to cause unforeseen losses of expected profits, cash or property, bankruptcy, debt growth and more. Therefore, the threat of adverse effects of commercial conflicts, the issue of implementation and development of business mediation is relevant as a rapid method of conflict resolution on terms of mutual agreement of the parties' interests in view of the lengthy terms of court proceedings. The purpose of the article is to scientifically substantiate the approach to systematization and prioritization of factors of business mediation development in the current conditions of economic development of Ukraine as a method of successful non-judicial settlement of commercial conflicts. Results. In September 2019, 326 senior and middle managers of Ukrainian companies have surveyed to identify key factors for the development of mediation in the business environment in Ukraine in order to resolve commercial conflicts. It is established that business representatives need immediate practical implementation of business mediation, but at the same time, there is low awareness of Ukrainian entrepreneurs about the existence of a mediation institute, its principles and the procedure for conducting it. Using the principal component method (factor analysis), the factors component composition of business mediation development in modern conditions of Ukrainian economy development has been determined. The hierarchical structure of factors for the business mediation development as an effective institution for resolving commercial conflicts has been determined by calculating the variance percentage. It is determined that the factors of business mediation development are formed by 32,4% of the potential level by calculating the integral indicator. Conclusions. The following system of key factors of business mediation development in modern conditions has been determined on the empirical research basis: the factor of institutional development; education factor; psychological factor and efficiency factor. The most destructive influence on the business mediation development is played by the retarded factors of institutional development and education. These research results can be used in the state strategy setting of business mediation development in Ukraine. The identified system of factors can serve as a guideline for the introduction of the necessary state measures for the non-judicial settlement development of commercial conflicts in the business environment in Ukraine, and determining the priority of their implementation. Keywords: business mediation, business environment, commercial conflicts, factors of development, non-judicial conflict resolution.
Style APA, Harvard, Vancouver, ISO itp.
46

Noreika, Donatas, Algimantas Švegžda, Rytis Stanikūnas, Vygandas Vanagas i Henrikas Vaitkevičius. "ABIAKĖS KONKURENCIJOS REIŠKINIO LAIKINĖS CHARAKTERISTIKOS". Psichologija 37 (1.01.2008): 7–19. http://dx.doi.org/10.15388/psichol.2008.0.2618.

Pełny tekst źródła
Streszczenie:
Abiakė (binokulinė) konkurencija (angl. binocular rivalry) – tai suvokimo reiškinys, kai sąmoningas suvokimas pakaitomis persijunginėja tarp dviejų vaizdų, pateikiamų į vieną ir kitą akį. Tyrimo tikslas – ištirti abiakės konkurencijos reiškinio vidutinio dominavimo laiko priklausomybę nuo pateikiamų stimulų mirksėjimo dažnio. Į abi akis buvo pateikiami milisekundžių dažniu mirksintys stimulai ir tirta, ar nuo stimulo mirksėjimo dažnio priklauso vidutinis dominavimo laikas. Šią sąveiką tyrimo rezultatai patvirtino. Taip pat nustatėme, kad vidutinio dominavimo laiko priklausomybės nuo stimulo mirksėjimo dažnio funkcija nėra monotoninė: jai būdingi ekstremumai, dažniausiai pasitaikantis atstumas tarp artimiausių ekstremumų yra 5–12 ms. Ekstremumų taškų padėtis mirksėjimo dažnio skalėje nėra stabili.Pagrindiniai žodžiai: suvokimas, akių konkurencija, laikinės charakteristikos.Temporal Features of Binocular Rivalry Donatas Noreika, Algimantas Švegžda, Rytis Stanikūnas, Vygandas Vanagas, Henrikas Vaitkevičius SummaryBinocular rivalry is a phenomenon of visual perception in which perception alternates between two different images, presented to each eye’s resopective sites. Binocular rivalry has been investigated for decades, yet its nature has not been understood well. Most investigators agree now that rivalry is not a simple process but is based on complex interaction of hierarchical processes of visual system. Theoretical models are being created to describe binocular rivalry. One of the key things which the models have to explain is the temporal features of binocular rivalry: its dominant time distribution, the influence of the strength of the stimulus upon that etc. There is no agreement whether subtle temporal changes in presentation of stimuli are crucial for rivalry processes. The aim of the study was to investigate whether rivalry dominant time is influenced by flickering rate of stimuli presented to both eyes. 4 male subjects (mean age 31.8 y. with normal or corrected to normal vision) took part in the study. The stimuli were white round circles with a 45° slanting black line crossing it. The lines shown to different eyes were orthogonal to each other. Each line was subtended by 1.7 degrees. A special tachistoscope was constructed for presenting of the stimuli. In experiment 1 the stimuli were flickering in counter phase. The duration of the stimulus presentation was 5, 7, 10, 12, 15, 17, 20, 25, 30 ms. Moreover we also investigated dominant time under continuous stimuli presentation (constant view). In the second experiment the stimulus displayed to the right eye was flickering and the left one was kept steady. The subject had to press the corresponding key when he perceived the line displayed to the left eye. Dominant time was the time during which the corresponding key was pressed by the subject. Each subject took part in some 3 to 28 experiments. The results show that the flickering rate of the stimuli influences the dominant time. The function of mean dominant time versus the rate of the flickering is not a monotonic function – it has extremums with distance between two closest maximum or minimum being equal to about 5–12 ms. But the location of the extremums on the frequencies scale is not stable. We discuss a possible relation of the obtained results with the known neurophysiologic data and the theories of discrete perception.Key words: perception, binocular rivalry, temporal features.
Style APA, Harvard, Vancouver, ISO itp.
47

Djulbegovic, Benjamin, Tea Reljic, Shira Elqayam, Adam Cuker, Iztok Hozo, Qi Zhou, Shelly-Anne Li i in. "How Do ASH Guidelines Panels Make Decisions? Association between Decision Making Factors and the Strength of Recommendations". Blood 132, Supplement 1 (29.11.2018): 4707. http://dx.doi.org/10.1182/blood-2018-99-110132.

Pełny tekst źródła
Streszczenie:
Abstract Background: Clinical practice guidelines (CPGs) represent a key mechanism for optimizing health care decision making. CPGs are a product of discussion by a group of, typically, 10-20 individuals with varying expertise. Little is known how CPG panels actually make their recommendations. Objective: In a study of real-life decision making, we investigated the factors considered by members of panels convened by the American Society of Hematology (ASH) to develop guidelines, when using the widely accepted formal GRADE (Grading of Recommendations Assessment, Development, and Evaluation) system. Methods: To account for panel level factors and individual level factors, we employed two level hierarchical, random-effect, multivariate logistic and ordered logistic regression analysis. Results: 101 participants taking part in 8 CPGs panels issued 1,289 recommendations. Association of GRADE (normative) factors with the strength of recommendations (SOR) dominated the findings over the non-GRADE (descriptive) factors. In the main analysis certainty in evidence (regardless of direction for or against intervention) [OR=1.83 (95CI% 1.45 to 2.31;p<0.0001)], balance of benefits and harms [OR=1.49 (95CI% 1.30 to 1.69;p<0.0001)] and variability or uncertainty in the patients' values and preferences [OR=1.47 (95CI% 1.15 to 1.88;p<0.002)] were the strongest predictors of SOR coded as "neither for nor against" , "weak for or against" or "strong for or against" health intervention. Greater judgment of certainty of evidence proved highly associated with a strong recommendation [OR=3.60 (95% CI 2.16 to 6.00;p<0.00001] when panel members were issuing recommendation "for" interventions. When, however, panels made recommendations "against" intervention, certainty in evidence was not associated with probability of issuing strong recommendation [OR=0.98 (95%CI: 0.57 to 1.8; p=0.94)]. Two panelist characteristics were associated with strong recommendations: age (per decade) [OR=1.79 (95 CI% 1.2 to 2.84; p<0.005)], and greater intolerance of uncertainties [OR=0.57 (95 CI% 0.37 to 0.86; p<0.008)]. Agreement between individual panel members and the group ranged from very poor (average kappa of -0.01 in one panel) to moderate (kappa=0.64 in another panel), with most panels in an intermediate range. We also found that the panel members who were asked by the ASH to recuse themselves from voting due to high risk of conflict of interest (COI) would have voted differently if they were allowed to do so. Conclusion: Factors associated with GRADE's conceptual framework proved, in general, highly associated with strong versus weak recommendations and with the direction of recommendation. However, some non-GRADE factors of importance for decision-making were also identified. Findings that panel members with high risk of COI made different judgments than those without COI provide empirical support for the importance of managing conflict of interest. The low agreement between individual panel members and group consensus, and failure of certainty of evidence to be associated with strength of recommendations against an intervention, suggest the need for improvements in the process. Disclosures Cuker: Synergy: Consultancy; Genzyme: Consultancy; Kedrion: Membership on an entity's Board of Directors or advisory committees; Spark Therapeutics: Research Funding.
Style APA, Harvard, Vancouver, ISO itp.
48

Feng, Dao Yan, Yu Xiao Li, Hui Yang i Xing Zhong Guo. "Preparation and Characterization of Hierarchically Porous SiO2@C@MnO2 Monoliths". Key Engineering Materials 768 (kwiecień 2018): 224–30. http://dx.doi.org/10.4028/www.scientific.net/kem.768.224.

Pełny tekst źródła
Streszczenie:
Hierarchical porous SiO2@C@MnO2monoliths have been fabricated by two step approaches: Elemental carbon was covered the internal surface of porous silica monoliths with impregnation and carbonized in inert atmosphere, and MnO2was directly grown on the skeleton of SiO2@C accompanied by redox reaction between C and KMnO4. The effects of glucose and KMnO4concentrations, and hydrothermal reaction on the morphology of MnO2particles on the surface of SiO2monoliths were investigated in detail. The results showed that the optimal factors of reaction condition involved 0.08 mol·L-1glucose solution, 0.03 mol·L-1KMnO4solution and the reaction time of 5 h. SEM images and BET results indicated that the macroporous structure of the as-prepared material was preserved after modification, while the specific surface area and pore volume decreased with increasing amount of MnO2to some degree. The XPS spectra of SiO2@C@MnO2is in good agreement with reported data in MnO2. The crystal phase of MnO2was α-MnO2after thermal treatment at the temperature of 600 °C from the XRD patterns. Three-dimensional porous well-defined morphological SiO2@C@MnO2be promising materials for the catalytic elimination of air pollutants since large quantities can be obtained from porous structure combined with α-MnO2equipped with high active performance.
Style APA, Harvard, Vancouver, ISO itp.
49

Oh, Kyung Seok, Kwang Hwan Oh, Jun Ho Jang i Kyung Seop Han. "Development of Universal Test Method to Evaluate the Plastic Deformation of Sheet Metal". Key Engineering Materials 462-463 (styczeń 2011): 961–66. http://dx.doi.org/10.4028/www.scientific.net/kem.462-463.961.

Pełny tekst źródła
Streszczenie:
Universal test method to evaluate sheet metal formability was developed using finite element method based on axiomatic design. The newly developed formability test intended to generate the various modes of deformation and to control the onset of failure independently under each mode of deformation. The functional requirements (FRs) and the design parameters (DPs) of the test system were defined on axiomatic design approach and decomposed until the design reaches final stage. The independence axiom was applied throughout the design process to maintain the hierarchical independence of the formability test system. The flow diagram representing the system architecture was introduced after decomposition to give a help to establish the systematic design procedures and to determine the design parameters. Numerical simulation was carried out to determine the specific value of DPs which satisfies the FRs. Numerical results showed that modes of deformation varies accompanying various strain paths and good controllability of sheet forming is obtained for different kinds of materials. Experimental work was finally conducted to validate the proposed design. Stamping results represented that the outcome of the deformed geometry and strains are in good agreement with the numerical results.
Style APA, Harvard, Vancouver, ISO itp.
50

Guo, Zhen, Xianjiang Li, Xiuqin Li, Qinghe Zhang, Hongmei Li, Clare Ho, Tony CH Lam i in. "Supplementary comparison study - fipronil-sulfone in chicken egg powder (APMP.QM-S16)". Metrologia 59, nr 1A (1.01.2022): 08009. http://dx.doi.org/10.1088/0026-1394/59/1a/08009.

Pełny tekst źródła
Streszczenie:
Main text The APMP.QM-S16 comparison was coordinated by the National Institute of Metrology, China (NIM) on behalf of the Technical Committee on Amount of Substance (TCQM) of the Asia Pacific Metrology Programme (APMP) and the Organic Analysis Working Group (OAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) for National Measurement Institutes (NMIs) and Designated Institutes (DIs) which provide measurement services in organic analysis under the 'Comité International des Poids et Mesures' Mutual Recognition Arrangement (CIPM MRA). Fipronil is a broad-spectrum insecticide attributed to the phenylpyrazole family. Due to its high toxicity to invertebrates and long persistence, it has been one of the most widely used insecticides to control household and agricultural pests since its appearance in the market. Fipronil has also shown genotoxicity and cytotoxicity to many vertebrate animals, like mammals, birds, fish, reptiles and so on. Moreover, fipronil could have negative effects on the liver, kidneys and thyroid glands of humans. Its oxidation metabolite is fipronil-sulfone that could induce even higher toxicity than fipronil. In 2017, a fipronil-in-egg scandal occurred in the European Union (EU) that involved more than 15 states. The detected concentration of the sum of fipronil and fipronil-sulfone was many times higher than the EU maximum residue limit in bird egg (5 μg/kg). Besides European countries, fipronil-contaminated eggs were also found in Asian areas like China, Hong Kong and South Korea. Systematic monitoring and control of pesticide residues are necessary to safeguard public health. Fipronil-sulfone was selected to be representative of pesticide residues in this comparison. This study provides the means for assessing measurement capabilities for determination of low-polarity measurands in a procedure that requires extraction, clean-up, analytical separation, and selective detection in a food matrix. Generally, it provides a demonstration of a laboratory's capabilities in determining the medium molecular weight analytes (mass range 300-500) with low polarity (pKow < -2) at mass fraction levels of 4 to 400 μg/kg in a high fat, high protein and low carbohydrate food matrix that falls within Sector 4 of the AOAC Food-matrix Triangle. Seven NMIs/DIs participated in the APMP.QM-S16 comparison. Different methods such as liquid-liquid extraction, QuEChERS and SPE were applied in the sample pre-treatment and HPLC-MS/MS, HPLC-HRMS, and GC-MS/MS were applied for detection by the participants. Most participating laboratories applied isotope dilution mass spectrometry (IDMS) techniques with fipronil-sulfone-13C4,15N2 as internal standard, except EC-JRC-Geel which used matrix matched external calibration method. In the aspect of the traceability for the measurement results, most participants either used their own CRMs, other NMIs' CRMs or the pure materials assessed in-house to guarantee traceability to SI unit. One lab was excluded from the SCRV evaluation, as they did not meet the CIPM metrological traceability requirements. As a result, six sets of valid results were used for the estimation of the SCRV. Finally Hierarchical Bayes was considered to be the appropriate estimator to calculate SCRV, which was determined as 121.82 μg/kg with a standard uncertainty of 1.77 μg/kg. Inspection of the degree of equivalence plots for the fipronil-sulfone mass fraction assignments in APMP.QM-S16 indicated that there was excellent agreement of results. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database https://www.bipm.org/kcdb/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii