Search
Now showing items 401-410 of 487
Is there a symbiotic relationship between secularism and fundamentalism?
(
Common Ground Research Networks
, 2019 , Article)
This article explores the relationship between secularization and fundamentalism in 'Western' liberal society and the manner it impacts socio-political "exclusionary" narratives, which is a theme both timely and important. ...
Islam and the myth of the other: The noble colloquy between st. francis of assisi and sultan al-malik al-kāmil
(
Wiley
, 2019 , Article)
This article aims to explore a profound ethical challenge confronting heterogeneous, multi-denominational, and ethnically variegated societies as they confront modernity, seek bonding capital, and come to terms with their ...
الشركة ذات المسؤولية المحدودة المملوكة لشخص واحد- في قانون الشركات التجارية القطري الجديد رقم 11 لعام 2015 : دراسة قانونية تحليلية
(
مركز الدراسات القانونية والقضائية - وزارة العدل
, 2019 , Article)
تتولى الشركة بصفة عامة القيام بمشروعات اقتصادية لا يمكن القيام بها من قبل تاجر فرد، أيا كانت قدراته. وتُعتبر الشركة أداة رئيسية لجذب وزيادة الاستثمارات في البلاد المختلفة. وعلاوة على ذلك، ومن خلال تأسيس الشركة يمكن للأفراد ...
The Arrhythmogenic E105A CAM Mutation Dysregulates Normal Cardiac Function in Zebrafish by Altering CAM-Ca2+ and CAM-RyR2 Interactions
(
Elsevier
, 2019 , Article)
Calmodulin (CaM) is a multifunctional calcium (Ca2+)-binding messenger that directly interacts with the cardiac ryanodine receptor 2 (RyR2), a large transmembrane Ca2+ channel that mediates Ca2+ release from the sarcoplasmic ...
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
Online parallelized service function chain orchestration in data center networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, much attention has been focused on deploying service function chains (SFCs), each of which is composed of a set of virtual network functions (VNFs) in a specified order. This is a promising approach for ...
Spammer Detection and Fake User Identification on Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ...
Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Cloud computing has been a cost-efficient paradigm for deploying various applications in datacenters in recent years. Therefore, efficient provisioning for virtual data center (VDC) requests from different service providers ...
Location privacy preservation for mobile users in location-based services
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
Resource allocation in information-centric wireless networking with D2D-enabled MEC: A deep reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Recently, information-centric wireless networks (ICWNs) have become a promising Internet architecture of the next generation, which allows network nodes to have computing and caching capabilities and adapt to the growing ...