To see the other types of publications on this topic, follow the link: The DAS(Draw A secret).

Journal articles on the topic 'The DAS(Draw A secret)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'The DAS(Draw A secret).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Anchit Verma and Dr. Ganesh Dubey. "National and International Protection of Trade Secret." Legal Research Development an International Refereed e-Journal 5, no. III (2021): 11–17. http://dx.doi.org/10.53724/lrd/v5n3.04.

Full text
Abstract:
Abstract
 This research article contains an introduction to ‘Trade secret as an Intellectual Property’, primarily focused on principles of TRIPS and relevant laws related to trade secret in USA, UK, China and Japan. The paper also Includes Trade Secret Licensing, Factors, restrictions and validity along with Non-Disclosure/ confidentiality agreement. So basically the effort is to draw a comparison between available measures to deal with trade secret issues in India and other countries.
APA, Harvard, Vancouver, ISO, and other styles
2

Apprich, Clemens. "Secret Agents." Digital Culture & Society 4, no. 1 (2018): 29–44. http://dx.doi.org/10.14361/dcs-2018-0104.

Full text
Abstract:
Abstract “Good Old-Fashioned Artificial Intelligence” (GOFAI), which was based on a symbolic information-processing model of the mind, has been superseded by neural-network models to describe and create intelligence. Rather than a symbolic representation of the world, the idea is to mimic the structure of the brain in electronic form, whereby artificial neurons draw their own connections during a self-learning process. Critiquing such a brain physiological model, the following article takes up the idea of a “psychoanalysis of things” and applies it to artificial intelligence and machine learni
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Jingbang, Xiyu Chen, Luyuan Zhang, Shufen Zhou, and Daoshun Wang. "A Multi-Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles." Security and Communication Networks 2022 (May 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/1413976.

Full text
Abstract:
Secure data sharing for the Internet of Vehicles (IoV) has drawn much attention in developing smart cities and smart transportation. One way to achieve that is based on the reputation of the participant vehicles and the interaction between them. Most of the reputation adjustment schemes are aimed at single-secret situations, and there are cases where shared information leaks after reconstruction; and the shared information of all participants need to be updated again. This paper uses binary asymmetric polynomials to realize the asynchronous reconstruction of secrets, that is, multiple secrets
APA, Harvard, Vancouver, ISO, and other styles
4

Oppermann, Eva. "Mary and the Mystery of the Strange Crying: Elements of the Detective Story in The Secret Garden." International Research in Children's Literature 11, no. 1 (2018): 80–90. http://dx.doi.org/10.3366/ircl.2018.0255.

Full text
Abstract:
This contribution demonstrates how Burnett adopts several devices typical of detective fiction, namely clues, secondary secrets, interrogations, Gothic elements and the investigating outsider in a closed (and reclusive) society, in The Secret Garden in order to introduce tension and the motif of a riddle to solve her masterpiece. She also for the first time uses character qualities to develop Mary into a character with a talent to rely on her own observations and draw the correct conclusions. Thus she becomes the prototype of the girl sleuth who will become important in later detective fiction
APA, Harvard, Vancouver, ISO, and other styles
5

Odovichena, Y. A., та O. Y. Orlovskiy. "A соmmercial secret. How can employer protect his secrets?" Uzhhorod National University Herald. Series: Law 1, № 80 (2024): 312–18. http://dx.doi.org/10.24144/2307-3322.2023.80.1.44.

Full text
Abstract:
The article is devoted to the study of measures taken by the employer to prevent the disclosure of commercial secrets by the employee. Such measures should be characterized by efficiency, simplicity, manageability and be comprehensive. In particular, the procedure for implementing local acts at the enterprise is characterized, which contain an exhaustive list of information that constitutes a commercial secret and which are designed to maximally protect the employer from the “leakage” of information that is commercially valuable. Such acts include: Provisions on commercial secrecy, List of inf
APA, Harvard, Vancouver, ISO, and other styles
6

Sabater, César, Florian Hahn, Andreas Peter, and Jan Ramon. "Private Sampling with Identifiable Cheaters." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 361–83. http://dx.doi.org/10.56553/popets-2023-0058.

Full text
Abstract:
In this paper we study verifiable sampling from probability distributions in the context of multi-party computation. This has various applications in randomized algorithms performed collaboratively by parties not trusting each other. One example is differentially private machine learning where noise should be drawn, typically from a Laplace or Gaussian distribution, and it is desirable that no party can bias this process. In particular, we propose algorithms to draw random numbers from uniform, Laplace, Gaussian and arbitrary probability distributions, and to verify honest execution of the pro
APA, Harvard, Vancouver, ISO, and other styles
7

Kinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan." International Theory 11, no. 1 (2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.

Full text
Abstract:
AbstractI explore the construction of women as the secret for the ‘successful’ prosecution of war in Afghanistan. To do so, I take up the mobilization of gender in the US counterinsurgency doctrine as deployed in Afghanistan. I draw on the 2006 Counterinsurgency Field Manual, human rights and humanitarian reports, and scholarly works to identify and analyze this mobilization, paying attention to the colonial histories upon which COIN explicitly and implicitly relies. By critically integrating these sources and the paradigmatic moments that exemplify COIN, I demonstrate the constitutive relatio
APA, Harvard, Vancouver, ISO, and other styles
8

Nguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.

Full text
Abstract:
Graphical password is an authentication means alternative to textual password and biometric password. Graphical passwords are classified into two groups: picture based password and user-drawn based password. To pass the authentication, in the picture based graphical password, users have to choose right photos whereas in the user-drawn based graphical password, users have to draw correct pictures. In this paper, we propose a new user-drawn based graphical password. The proposed scheme requires users to create their secret by selecting individual points or by connecting points into curves from a
APA, Harvard, Vancouver, ISO, and other styles
9

Siebert, Sabina, and Barbara Czarniawska. "Distrust: Not Only in Secret Service Organizations." Journal of Management Inquiry 29, no. 3 (2018): 286–98. http://dx.doi.org/10.1177/1056492618798939.

Full text
Abstract:
In this article, we discuss the issue of distrust in the most extreme example of distrustful organizations: secret service organizations. Distrust may be a basic organizing principle in such organizations, but how is it produced and maintained? Inspired by actor–network theory, we analyzed the devices, codes, rules, and procedures used in secret service organizations, and then asked whether these devices, codes, rules, and procedures differ from those used in ordinary organizations. Based on our analysis, we make two contributions. First, we draw researchers’ attention to distrust that is inte
APA, Harvard, Vancouver, ISO, and other styles
10

EVATT, GEOFFREY W., CHRISTOPH MAYER, AMY MALLINSON, I. DAVID ABRAHAMS, MATTHIAS HEIL, and LINDSEY NICHOLSON. "The secret life of ice sails." Journal of Glaciology 63, no. 242 (2017): 1049–62. http://dx.doi.org/10.1017/jog.2017.72.

Full text
Abstract:
ABSTRACTWe present the first dedicated study into the phenomenon of ice sails. These are clean ice structures that protrude from the surface of a small number of debris-covered glaciers and can grow to heights of over 25 m. We draw together what is known about them from the academic/exploration literature and then analyse imagery. We show here that ice sails can develop by one of two mechanisms, both of which require clean ice to become surrounded by debris-covered ice, where the debris layer is shallow enough for the ice beneath it to melt faster than the clean ice. Once formed, ice sails can
APA, Harvard, Vancouver, ISO, and other styles
11

Turton, Roger W. "Secret Snowflake: Analysis of a Holiday Gift Exchange." Mathematics Teacher 101, no. 5 (2007): 332–39. http://dx.doi.org/10.5951/mt.101.5.0332.

Full text
Abstract:
Like many other institutions, the school where I teach hosts a gift exchange program at the start of the winter holiday season. Students, faculty, and staff who wish to participate place their names in a container. Then, one at a time, each draws the name of the person to whom he or she will be randomly matched. During the course of the next few days, the person who draws the name acts as the Secret Snowflake for the person whose name was drawn. Daily the former provides the latter with small gifts, encouraging messages, and anonymous acts of kindness. Often, these are accompanied by carefully
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Bo, Baokang Zhao, Bo Liu, and Chunqing Wu. "A Security Real-time Privacy Amplification Scheme in QKD System." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2420–36. https://doi.org/10.3217/jucs-019-16-2420.

Full text
Abstract:
Quantum Key Distribution (QKD) technology, based on the laws of physics, can create unconditional security keys between communication parties. In recent years, researchers draw more and more attention to the QKD technology. Privacy amplification is a very significant procedure in QKD system. In this paper, we propose the real-time privacy amplification (RTPA) scheme which converts the weak secret string to a uniform key that is fully secret from Eve. Our detailed proofs show the security of our RTPA scheme. In order to prevent the potential man-in-middle attacks, we employ an authentication pr
APA, Harvard, Vancouver, ISO, and other styles
13

Korobkova, O. K., and M. A. Shadrina. "CONFIDENTIAL INFORMATION OF AN ORGANIZATION IN THE CONDITIONS OF DIGITALIZATION OF THE ECONOMY: TOPICAL ISSUES OF ITS PROTECTION MEASURES." Vestnik of Khabarovsk State University of Economics and Law, no. 2(112) (May 31, 2023): 76–79. http://dx.doi.org/10.38161/2618-9526-2023-2-076-079.

Full text
Abstract:
The article discusses the issues of protecting confidential information of the organization. In the course of the research, the terms "confidentiality of information" and "trade secret" are considered. The conditions under which information can be qualified as confidential are defined. In order to preserve confidential information, a regulation on the preservation of trade secrets has been drawn up.
APA, Harvard, Vancouver, ISO, and other styles
14

Lin, Juan, Chin-Chen Chang, and Ji-Hwei Horng. "Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility." Symmetry 13, no. 12 (2021): 2355. http://dx.doi.org/10.3390/sym13122355.

Full text
Abstract:
Hiding secret data in digital images is an attractive topic in the information security research area. Because the data-embedded stego image looks exactly the same as a regular image, transmitting secret data with stego images does not draw the attention of eavesdroppers, thus fulfilling the goal of information security. Many reversible data hiding (RDH) methods for absolute moment block truncation coding (AMBTC) compressed images have been proposed. These methods hide secret data in an AMBTC-compressed image to produce a stego image and transmit it to the recipient. Upon receiving the stego i
APA, Harvard, Vancouver, ISO, and other styles
15

Johnson, Marion. "Interesting Document, Dangerous Translation." History in Africa 14 (1987): 359–61. http://dx.doi.org/10.2307/3171846.

Full text
Abstract:
Under the not very informative cover title of Munger Africana Library Notes 3, the library of that name published in 1971 a group of four French documents, collectively called The Choiseul papers, secret documents prepared for the peace negotiations to end the Seven Years' War in 1762/63. There is no indication as to the original authorship of these documents, except that the first, with a date of 6 January 1681, is noted as “sent on behalf of M. de Bussy.” The editor, Monique le Blanc, in her short introduction which places these documents in their historical setting, says that they were obta
APA, Harvard, Vancouver, ISO, and other styles
16

Britton, Siobhan. "What we do, is (still) secret? Collection, care and accessibility of zines in UK collections." Art Libraries Journal 43, no. 2 (2018): 72–76. http://dx.doi.org/10.1017/alj.2018.4.

Full text
Abstract:
In 2013, as the dissertation component of an MA Library and Information Studies course at University College London, I carried out a selective study of UK zine libraries and collections. Case studies of both ‘institutional’ collections that were part of established libraries like London College of Communication Library (University of the Arts London) and the British Library, and ‘independent’ collections such as Salford Zine Library, 56a Infoshop and the Edinburgh Fanzine archive were carried out to draw attention to issues around collection, care and accessibility of zine collections. As much
APA, Harvard, Vancouver, ISO, and other styles
17

Zhyhylii, S. P. "Non-disclosure of trade secrets is one of the important conditions of an employment contract." Analytical and Comparative Jurisprudence, no. 2 (April 28, 2025): 421–25. https://doi.org/10.24144/2788-6018.2025.02.60.

Full text
Abstract:
In the conditions of the functioning of the digital (information) society, ensuring the legal protection of trade secrets becomes particularly relevant, which necessitates the need to improve and adapt legal mechanisms to the dynamic development of information technologies. Today, trade secrets are a key factor in the economic development of an enterprise, providing it with competitive advantages, the possibility of market dominance, increased profitability, the creation of barriers to entry for competitors, increased investment attractiveness and effective protection of innovations. At the sa
APA, Harvard, Vancouver, ISO, and other styles
18

Shpugаnych, I. I., and Y. Ya Samahalska. "Right to information on the digital environment." Uzhhorod National University Herald. Series: Law 4, no. 86 (2025): 65–70. https://doi.org/10.24144/2307-3322.2024.86.1.4.10.

Full text
Abstract:
The article analyzes the concept and essence of the right to information as part of the right to freedom of speech and expression. This approach is enshrined in international law and supported by ntional legislation. The Law «On Information» is considered to be as general law regulating the right to information in Ukraine, which stipulates that the right to information includes freely receiving, using, distributing and storing it for the implementation of person’s rights and legitimate his interests. It is also allowed to protect it from illegal encroachment by others. By having analyzed the r
APA, Harvard, Vancouver, ISO, and other styles
19

Mushtaque, Ahmed. "USING BIOMETRICS SYSTEM IN MOBILE BANKING." International Journal of Research – Granthaalayah 4, no. 3 (2017): 119–23. https://doi.org/10.5281/zenodo.847018.

Full text
Abstract:
In these days in this global world mobile technologies are growing very fast and another way world has lots of security problems, that’s why everyone wants to move on biometrics side. Because this is the only secure system for communication and verification function. So in this paper we are using graphical passwords on the first phase then we are using biometric features like as Face, Iris, and palm, Vein acknowledgement for verification function and safe transaction for the Mobile Banking.
APA, Harvard, Vancouver, ISO, and other styles
20

Banawan, Salma, and Ibrahim Kamel. "Hiding Information in Reversible English Transforms for a Blind Receiver." Applied Computational Intelligence and Soft Computing 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/387985.

Full text
Abstract:
This paper proposes a new technique for hiding secret messages in ordinary English text. The proposed technique exploits the redundancies existing in some English language constructs. Redundancies result from the flexibility in maneuvering certain statement constituents without altering the statement meaning or correctness. For example, one can say “she went to sleep, because she was tired” or “Because she was tired, she went to sleep.” The paper provides a number of such transformations that can be applied concurrently, while keeping the overall meaning and grammar intact. The proposed data h
APA, Harvard, Vancouver, ISO, and other styles
21

Sereda, Olena, and Tetyana Krasyuk. "Termination of the employment agreement in the case of abolition of admission to a state secret: to problem issues." Law and innovations, no. 2 (38) (June 24, 2022): 57–63. http://dx.doi.org/10.37772/2518-1718-2022-2(38)-7.

Full text
Abstract:
Problem settings. Problems of protection of state secrets have become especially relevant in recent years, during the deep socio-economic transformations in Ukraine, when, on the one hand, new threats to national security, and on the other, and this must, unfortunately, admit protection of state secrets not always carried out properly. The existence of problems in this important area for the protection of the state is evidenced by the frequent labor disputes, including over various conflicting aspects of access to and access to state secrets, which are considered in administrative courts. Ther
APA, Harvard, Vancouver, ISO, and other styles
22

Tomita, Chihiro, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, and Masakatu Morii. "Extracting the Secrets of OpenSSL with RAMBleed." Sensors 22, no. 9 (2022): 3586. http://dx.doi.org/10.3390/s22093586.

Full text
Abstract:
Concomitant with the increasing density of semiconductors, various attacks that threaten the integrity and security of dynamic random access memory (DRAM) have been devised. Among these, a side-channel attack called RAMBleed is a prolific one that utilizes a general user-level account without special rights to read secret information. Studies have reported that it can be used to obtain OpenSSH secret keys. However, a technique for deriving the Rivest–Shamir–Adleman (RSA) secret keys used in OpenSSL under realistic parameters and environments has not been reported. We propose a method that uses
APA, Harvard, Vancouver, ISO, and other styles
23

Li, Yantong. "A Comparison on the Voltage Output of Al-Cu Primary Battery with its Electrolyte being Coca Cola With and Without Sugar." Insight - Material Science 3, no. 4 (2021): 67. http://dx.doi.org/10.18282/ims.v3i4.376.

Full text
Abstract:
<div>For the primary battery, different electrolyte will affect the voltage output of the battery. In this paper, the influence of sugar on the output voltage was studied by taking Coca Cola as an example. The results show that there is a certain difference between the effect of electrolyte with and without sugar, but the specific reason is not clear, because the formula of beverage is a secret. Further experiments are needed to draw a conclusion.</div><p> </p><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Zeyu, Tiecheng Xia, and Jinbo Wang. "Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem." Discrete Dynamics in Nature and Society 2018 (2018): 1–24. http://dx.doi.org/10.1155/2018/4585083.

Full text
Abstract:
A new fractional two-dimensional triangle function combination discrete chaotic map (2D-TFCDM) with the discrete fractional difference is proposed. We observe the bifurcation behaviors and draw the bifurcation diagrams, the largest Lyapunov exponent plot, and the phase portraits of the proposed map, respectively. On the application side, we apply the proposed discrete fractional map into image encryption with the secret keys ciphered by Menezes-Vanstone Elliptic Curve Cryptosystem (MVECC). Finally, the image encryption algorithm is analysed in four main aspects that indicate the proposed algor
APA, Harvard, Vancouver, ISO, and other styles
25

Gibson, Terrill L. "Secrets and Soul: A Jungian Fable about Pastoral Care." Journal of Pastoral Care 42, no. 1 (1988): 3–12. http://dx.doi.org/10.1177/002234098804200102.

Full text
Abstract:
Stresses the intrinsic value of secret as an authentic way into the human soul, particularly in the practice of the ancient cura animarum. Draws on Jungian thought in seeing secret as initiatory, as process, and as sacrament in pastoral care and pastoral psychotherapy. Uses case materials to illustrate the power of secret in the pastoral counseling project.
APA, Harvard, Vancouver, ISO, and other styles
26

Galis, Meiran, Tomislav Unkašević, Zoran Banjac, and Milan Milosavljević. "Protocols for symmetric secret key establishment: Modern approach." Vojnotehnicki glasnik 70, no. 3 (2022): 604–35. http://dx.doi.org/10.5937/vojtehg70-36607.

Full text
Abstract:
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great importance in raising information security in cyberspace. Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic keys between communication parties have been defined. Results:
APA, Harvard, Vancouver, ISO, and other styles
27

Abbe, Emmanuel, and Sophie Spirkl. "Entropic Matroids and Their Representation." Entropy 21, no. 10 (2019): 948. http://dx.doi.org/10.3390/e21100948.

Full text
Abstract:
This paper investigates entropic matroids, that is, matroids whose rank function is given as the Shannon entropy of random variables. In particular, we consider p-entropic matroids, for which the random variables each have support of cardinality p. We draw connections between such entropic matroids and secret-sharing matroids and show that entropic matroids are linear matroids when p = 2 , 3 but not when p = 9 . Our results leave open the possibility for p-entropic matroids to be linear whenever p is prime, with particular cases proved here. Applications of entropic matroids to coding theory a
APA, Harvard, Vancouver, ISO, and other styles
28

Morrison, Jago, and Alan Burton. "Secrets, leaks and the novel. Writers, British intelligence and the public sphere after World War Two." Arbeiten aus Anglistik und Amerikanistik 48, no. 1 (2023): 71–95. http://dx.doi.org/10.24053/aaa-2023-0004.

Full text
Abstract:
This article makes a pioneering effort to explore the relationship between spy fiction, intelligence and the public sphere in Britain after World War Two. The secret British achievements of code-breaking, atomic science and deception in the World War of 1939–45 were outstanding. Similarly, the British contribution to spy fiction in the twentieth century has been seen as exceptional. However, the complex interconnections between the history and fictions of intelligence in the post-war decades have never been closely examined. This is a period during which the British state aggressively sought t
APA, Harvard, Vancouver, ISO, and other styles
29

Horianskyi, Stanislav. "The Birth of Mannerism: Jacopo Tintoretto’s Secret Dinners." Ethnic History of European Nations, no. 71 (2023): 24–28. http://dx.doi.org/10.17721/2518-1270.2023.71.03.

Full text
Abstract:
The purpose of this publication is to systematise knowledge and conduct an iconographic analysis of Jacopo Tintoretto’s cycle of works entitled The Last Supper. Jacopo Tintoretto’s work is a clear expression of new trends in High Renaissance art, having absorbed all the best from the masters of that period, the following motto was written on the wall of his studio on the San Luca Canal: «Il disegno di Michelangelo ed il colourito di Tiziano» (Michelangelo’s drawing and Titian’s colour). In this way, the artist expressed the main aspiration of his youth: to combine the achievements of the two m
APA, Harvard, Vancouver, ISO, and other styles
30

Thabit, Reema, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Nuur Alifah Roslan, and Roshidi Din. "A Comparative Analysis of Arabic Text Steganography." Applied Sciences 11, no. 15 (2021): 6851. http://dx.doi.org/10.3390/app11156851.

Full text
Abstract:
Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult
APA, Harvard, Vancouver, ISO, and other styles
31

Aloufi, Asma, Peizhao Hu, Yongsoo Song, and Kristin Lauter. "Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey." ACM Computing Surveys 54, no. 9 (2022): 1–37. http://dx.doi.org/10.1145/3477139.

Full text
Abstract:
With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry’s breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capabili
APA, Harvard, Vancouver, ISO, and other styles
32

Ромашев, Юрий, and YUriy Romashyev. "Limitations of Fundamental Human Rights and Freedoms in International Law and Novations in the Russian Criminal Legislation." Journal of Russian Law 1, no. 11 (2013): 75–84. http://dx.doi.org/10.12737/1209.

Full text
Abstract:
The author analyses new amendments related to state secrets protection: amendments to Article 275 ‘High Treason’, Article 276 ‘Espionage’, Article 283 ‘Disclosure of a State Secret’, and adopted Article 283.1 ‘Illegal Receipt of Information Constituting a State Secret’ of the Criminal Code of the Russian Federation in respect to their conformity with acceptable restrictions of fundamental human rights and freedoms. Special attention is paid to theoretical and action-oriented aspects of restrictions of fundamental human rights and freedoms. The author investigates relevant provisions of interna
APA, Harvard, Vancouver, ISO, and other styles
33

Tursun, Kh, and А. Kabyl. "Archival Data of the Activity of Sericul Aldabergenov, which Began from the Alash Idea and Ended with Migration." Iasaýı ýnıversıtetіnіń habarshysy 126, no. 4 (2022): 389–402. http://dx.doi.org/10.47526/2022-4/2664-0686.33.

Full text
Abstract:
The article, based on data from secret funds, restores the political activities of the representative of the movement Alash Serikula Aldabergenov, whose identity has not yet been investigated. Under the Soviet rule, the political activity of S. Aldabergenov, who participated in the First All-Kazakh Congress with М. Shokai in 1917, which held in Orinbor, took on the most difficult character. The fact that under colonial power he was a regional administrator is evidenced by archival data on the beginning of subsequent political repressions. S. Aldabergenov's documents from secret funds made it p
APA, Harvard, Vancouver, ISO, and other styles
34

Hallsby, Atilla. "Recanonizing Rhetoric: The Secret in and of Discourse." Journal for the History of Rhetoric 25, no. 3 (2022): 346–70. http://dx.doi.org/10.5325/jhistrhetoric.25.3.0346.

Full text
Abstract:
Abstract Challenges to rhetoric’s canon often occur under the rubric of revising that canon and its foundational, shared meaning. Read through the strategies of deconstruction, the secret offers a common ground for recanonizing approaches by centering either a concealed quantity in ancient rhetoric’s granular archive (the secret in discourse) or an unfolding idea whose transformation has rendered it unrecognizable to its original version (the secret of discourse). This article draws on Jacques Derrida’s “White Mythology” (1974) and A Taste for the Secret (2001) before addressing how the secret
APA, Harvard, Vancouver, ISO, and other styles
35

Benjelloun, M’hammed. "The Slumber and Wake of Dada in Mahi Binebine’s The Slumber of the Slave." International Journal of English Literature and Social Sciences 7, no. 4 (2022): 040–47. http://dx.doi.org/10.22161/ijels.74.7.

Full text
Abstract:
Mahi Binebine published his first novel The Slumber of the Slave* in 1992. Unlike his subsequent publications which all received the due critical acclaims, this first book did not seem to draw the expected attention and went almost unnoticed. It was praised by few critics and was considered as a shy debut. Nevertheless, for a first novel, Le Sommeil de l’Esclave, seems – to me – to gather all the elements of an incoming successful career. Let us not forget that we are thirty years back, and that we are before a former mathematics teacher who spent eight years in Paris, and who decided to chose
APA, Harvard, Vancouver, ISO, and other styles
36

Zhyhylii, S. P. "Normative legal support of trade secrets and the place of labor legislation in it." Uzhhorod National University Herald. Series: Law 1, no. 78 (2023): 309–14. http://dx.doi.org/10.24144/2307-3322.2023.78.1.50.

Full text
Abstract:
The article examines the regulatory legal protection of commercial secrecy and the place of labor legislation in it. It is noted that the availability of effective regulatory and legal instruments provided by the state, state bodies and local self-government bodies is one of the most important areas of legal regulation of trade secrets in Ukraine. Attention is drawn to the fact that relations related to the protection of commercial secrets are regulated by normative legal acts belonging to various branches of law, in particular the Civil Code of Ukraine, the Economic Code of Ukraine, the Crimi
APA, Harvard, Vancouver, ISO, and other styles
37

Aqdas, Shayan. "Unraveling Madness: Linguistic Complexities in ‘Waiting for the Barbarian’ and ‘The Secret History’." International Journal of English Literature and Social Sciences 8, no. 5 (2023): 177–84. http://dx.doi.org/10.22161/ijels.85.28.

Full text
Abstract:
The research paper is a qualitative study of the multifaceted role of language as a potent tool of power and its connection to the theme of madness within the novels "Waiting for the Barbarians" by Coetzee and "The Secret History" by Tartt. Within the world of fiction, language emerges as a dynamic force, enabling creators to craft narratives that draw upon intricate emotions and characterizations. Close textual reading and analysis serve as the primary instruments for data collection, and this research contextualizes itself within the broader landscape of literary analysis, postcolonial studi
APA, Harvard, Vancouver, ISO, and other styles
38

Xing, Fengyue, Xuehu Yan, Long Yu, and Longlong Li. "A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain." Entropy 24, no. 3 (2022): 318. http://dx.doi.org/10.3390/e24030318.

Full text
Abstract:
(k,n)-threshold secret image sharing (SIS) protects an image by dividing it into n shadow images. The secret image will be recovered as we gather k or more shadow images. In complex networks, the security, robustness and efficiency of protecting images draws more and more attention. Thus, we realize multiple secret images sharing (MSIS) by information hiding in the sharing domain (IHSD) and propose a novel and general (n,n)-threshold IHSD-MSIS scheme (IHSD-MSISS), which can share and recover two secret images simultaneously. The proposed scheme spends less cost on managing and identifying shad
APA, Harvard, Vancouver, ISO, and other styles
39

Egorova, K. B. "Riots in Svisloch Gymnasium: Persecution of Secret Societies among Polish-Lithuanian Youth." Nauchnyi dialog 12, no. 3 (2023): 382–97. http://dx.doi.org/10.24224/2227-1295-2023-12-3-382-397.

Full text
Abstract:
The article deals with the riots in the Svisloch gymnasium that occurred after the closure of the trial of the Philarets and Philomaths (1824), which was initiated by N. N. Novosiltsev, as well as about possible interpretive models that make it possible to supplement the knowledge existing in Polish and European historiography about the reasons that prompted the tsarist government to carry out such a brutal reprisal against Polish youth. A valuable source on the history of secret societies in the Svisloch Gymnasium, which was not taken into account when publishing documents of the investigativ
APA, Harvard, Vancouver, ISO, and other styles
40

Roy, George J., Jennifer A. Eli, Hendrix Leslie, and LuAnn Graul. "Using History to Model with Mathematics: The German Tank Problem." Mathematics Teaching in the Middle School 23, no. 7 (2018): 370–77. http://dx.doi.org/10.5951/mathteacmiddscho.23.7.0370.

Full text
Abstract:
During World War II, the Allied Forces were concerned with the monthly production of tires, tanks, and other military equipment in Germany (Flaspohler and Dinkheller 1999; Ruggles and Brodie 1947). Knowing these production totals was important for international security. To determine military production, the Allied Forces in England recruited individuals from a wide range of educational and occupational backgrounds to help analyze serial numbers found on military equipment and to analyze secret codes (Pioneer Productions 2014). We used this historical context to challenge a class of twenty-six
APA, Harvard, Vancouver, ISO, and other styles
41

Younus, Zeyad Safaa, and Ghada Thanoon Younus. "Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data." Journal of Intelligent Systems 29, no. 1 (2019): 1216–25. http://dx.doi.org/10.1515/jisys-2018-0225.

Full text
Abstract:
Abstract This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover vide
APA, Harvard, Vancouver, ISO, and other styles
42

Attisani, Antonio. "Acta Gnosis." TDR/The Drama Review 52, no. 2 (2008): 75–106. http://dx.doi.org/10.1162/dram.2008.52.2.75.

Full text
Abstract:
In this selection from Un teatro apocrifo, Attisani goes beyond previous academic acknowledgments of Grotowski's interest in Gnostic texts, tracing the influence of key materials found in the Nag Hammadi and the significance of Gnostic belief as a secret subcurrent in the 20th-century theatrical avantgarde.
APA, Harvard, Vancouver, ISO, and other styles
43

Islam, Ahmad Fikrul, and Zaenal Arifin. "Tinjauan Sosiologi Hukum terhadap Penyelesaian Talak di Bawah Tangan." Hukum dan Demokrasi (HD) 24, no. 4 (2024): 231–46. http://dx.doi.org/10.61234/hd.v24i4.45.

Full text
Abstract:
This research is motivated by the findings of researchers in the field regarding the existence of secret divorce processes in Wakan Village, Jerowaru District, East Lombok Regency. In Wakan Village, there are many controversies surrounding the secret divorce settlement. In this study, the researcher aims to understand the process of secret divorce settlement among the community in Wakan Village and the impacts that arise from such secret divorces from a socio-legal perspective. The researcher utilized qualitative research in this study, collecting both primary and secondary data. Data collecti
APA, Harvard, Vancouver, ISO, and other styles
44

McEldowney, John F. "Legal aspects of the Irish secret service fund, 1793–1833." Irish Historical Studies 25, no. 98 (1986): 129–37. http://dx.doi.org/10.1017/s0021121400026444.

Full text
Abstract:
Eunan O’Halpin’s short paper, ‘The secret service vote and Ireland, 1868- 1922’, raises important questions about accountability for the payment of money for secret service work, a term not defined in any statute in nineteenth-century Ireland. What did ‘secret service work’ include and to what extent was the money properly authorised?The purpose of this article is to examine some of the legal implications of the use of secret service money Accounts for 1833 in the Hatherton papers show the amount of money paid, to whom and for what purposes. Edward John Littleton, first Baron Hatherton (1791 –
APA, Harvard, Vancouver, ISO, and other styles
45

ANDROSHCHUK, H., and Ya KOPIL. "Institute of secret inventions in ensuring national security of the state: problem issues." INFORMATION AND LAW, no. 2(45) (May 30, 2023): 172–85. http://dx.doi.org/10.37750/2616-6798.2023.2(45).282338.

Full text
Abstract:
The work analyzes the institute of secret inventions in the context of ensuring the national security of the state. It is noted that most secret inventions are simultaneously service inventions. The national legislation of many states restricts the submission of international applications to other agencies for reasons of national security. At the same time, many Ukrainian inventors apply for inventions directly to other countries, without first applying for an invention in Ukraine and obtaining the appropriate permission. The unauthorized flow of inventions, the so-called patent migration from
APA, Harvard, Vancouver, ISO, and other styles
46

Dănilă, Adriana. "Das Frauenbild im Sozialismus. Eine exemplarische Untersuchung der Tageszeitung der rumäniendeutschen Minderheit Neuer Weg (1950)." Germanistische Beiträge 50, no. 1 (2024): 304–20. http://dx.doi.org/10.2478/gb-2024-0017.

Full text
Abstract:
Abstract This study focuses on the image of women in socialist society, as it appears in several articles on International Women’s Day in the Romanian-German newspaper Neuer Weg in the 1950s. The political authorities of the time would use Women’s Day to draw attention not only to problems specific to women, such as the protection of mother and child, women in the family and at work, but also to discuss political issues such as equal rights for women, universal, equal, secret and direct women’s suffrage and securing peace. The author takes the standpoint of sociolinguistics and pragmalinguisti
APA, Harvard, Vancouver, ISO, and other styles
47

Zarubina, K. A. "POLICE SURVEILLANCE OR METHODS OF WORKING WITH «POLITICALLY UNRELIABLE PERSONS» IN THE SECOND HALF OF THE XIX- EARLY XX CENTURIES (ON THE EXAMPLE OF KURSK PROVINCE)." Vestnik Bryanskogo gosudarstvennogo universiteta 06, no. 02 (2022): 57–62. http://dx.doi.org/10.22281/2413-9912-2022-06-02-57-62.

Full text
Abstract:
Using the example of the Kursk province, the article examines the main methods of government work with persons with dubious «political reliability», «potential» and «real» political criminals in the second half of the XIX - early XX centuries. This paper examines the types (investigative, judicial and administrative) of police supervision. Special attention is paid to the analysis of the public and secret (secret) modes of police surveillance. During the period under review, persons who, by their behavior, gave any reason for distrust (in political terms) were subject to secret (secret) superv
APA, Harvard, Vancouver, ISO, and other styles
48

Beglov, Alexey. "Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources." ISTORIYA 13, no. 6 (116) (2022): 0. http://dx.doi.org/10.18254/s207987840021686-3.

Full text
Abstract:
In this article the authors formulate generalizing observations on the mechanisms of interaction between the Soviet secret services and religious communities in the USSR during the whole period of its existence. The basis for these generalizations was the research of the past thirty years as well as the materials of the international symposium “Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources” held by the Centre for the Study of the History of Religion and Church History at the Department of Modern and Contemporary History
APA, Harvard, Vancouver, ISO, and other styles
49

Kent, Candice. "‘The secret self’: time, memory and childhood in two short stories by Katherine Mansfield." Acta Academica: Critical views on society, culture and politics 39, no. 3 (2007): 1–20. https://doi.org/10.38140/aa.v39i3.1148.

Full text
Abstract:
This article examines Katherine Mansfield’s notion of self by considering two of her short stories, ‘Prelude’ (1918) and ‘At the bay’ (1922), as well as her biographical writing. It links her desire to acknowledge “the secret self” with her inclination to examine and contest existing notions of the self and its expression in fiction. Mansfield was concerned with exploring the self at its least inhibited, and for this reason the article focuses on works that draw on childhood reminiscences. It also discusses Mansfield’s innovative use of time to suggest the properties of memory. It explores how
APA, Harvard, Vancouver, ISO, and other styles
50

Virtue, Patrick. "GANs Unplugged." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 17 (2021): 15664–68. http://dx.doi.org/10.1609/aaai.v35i17.17845.

Full text
Abstract:
With the influx of deepfake and style transfer technology in today's news and social media, everyone is told that these applications are powered by artificial intelligence and deep learning, but too often the explanation of how it works goes no further. Rather than waiting until second semester of computer science grad school to learn about generative adversarial networks (GANs), we propose a classroom activity to introduce GANs to secondary school students. Our GANs Unplugged activity steps outside a traditional classroom environment and forms groups of students that physically act as the var
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!