ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Economy
Education
Social Sciences
Religion
Research
Biology
Agronomy and forestry
Technology
Administration - Business
Architecture and Urbanism
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
Ukraine
South Africa
Pakistan
Romania
India
Italy
Canada
all records (78)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
175.778  Articles
1 of 17.579 pages  |  10  records  |  more records»
Security information method for jpeg / exif documents generally aims to prevent security attack by protecting documents with password and watermark. Both methods cannot used to determine the condition of data integrity at the detection stage of the inform... see more

In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture ... see more

Autoimmune diseases are diseases that attack the human immune system. Autoimmunity is a disorder of the immune system due to the failure of the body's defenses to stabilize conditions so that the immune system attacks a healthy body which is considered a ... see more

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of ... see more

This study aims to analyze the effect of bid-ask spread, market value, variance return, and earnings per share on stock holding period. The population in this study is the company’s share listed on the Indonesia Sharia Stock Index for the 2015-2018 period... see more

The article aimed to substantiate the differentiated impact of critical internal factors of the economic activities on the market value of shares for joint-stock companies accounting for the organizational development cycle. Using the Company’s Financial ... see more

Implementasi ilmu kriptografi menjadi semakin sering digunakan seiring dengan daruratnya keamanan data. Ilmukriptografi yang di dalamnya terdapat fungsi hash mengubah data menjadi sebuah nilai representasi agar data yang dimaksudtidak dapat dengan mudah d... see more

AbstractPurpose: The study investigated the perceptions of Shared Value (SV) and its antecedents and outcomes within the mining industry in South Africa.Design/methodology/approach: After conducting a literature overview of the South African mining indust... see more

Based on the continuous flourishing of Sharia banking all over the globe, the current study aims to examine the impact of various factors on Sharia banking performance. These factors include cost efficiency, financial risks, funding, board characteristics... see more

1 of 17.579 pages  |  10  records  |  more records»