ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Law
History
Education
Technology
Communication
Research
Social Sciences
Literature
Economy
Political Sciences
all records (47)

Languages
English
Spanish

Countries
Indonesia
Brazil
USA
South Africa
Canada
Ukraine
Spain
United Arab Emirates
Norway
Germany
all records (43)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (19)

Filter  
 
248  Articles
1 of 26 pages  |  10  records  |  more records»
AbstractThis article examines the reason behind the charge to secrecy imposed by Jesus on the leper in Mark 1:40–45, in the context of African experience, the implications of the meaning conveyed and the challenges posed on the church and the gospel enter... see more

Context. The task of increasing the secrecy of information transmission based on combined random coding is considered. Theobject of research is the integration processes of stochastic, block and timer coding.Objective. The aim of the article is to develop... see more

Present-day scholarship on religious conversions diverts from classic Protestant paradigms of sudden conversions and instant transformations of the self. Instead, it stresses that converts make active choices that are influenced by specific cont... see more

Context. The task of increasing the secrecy of information transmission based on combined random coding is considered. Theobject of research is the integration processes of stochastic, block and timer coding.Objective. The aim of the article is to develop... see more

AbstractThis article examines the reason behind the charge to secrecy imposed by Jesus on the leper in Mark 1:40–45, in the context of African experience, the implications of the meaning conveyed and the challenges posed on the church and the gospel enter... see more

Unattended Wireless Sensor Networks are a different type of wireless sensor net- works where sensors operate in hostile environments without a fixed sink to route the sensed data to. Alternatively, sensors accumulate and store their sensed data until a mo... see more

Asymptotic secrecy-capacity achieving polar coding schemes are proposed for the memoryless degraded broadcast channel under different reliability and secrecy requirements: layered decoding or layered secrecy. In these settings, the transmitter wishes to s... see more

Leaking bank secrecy harms the privacy rights and electronic personal data of customers. Therefore this study discusses the issue of customer protection against leakage of bank secrets as a violation of the privacy rights and electronic personal data of b... see more

Leaking bank secrecy harms the privacy rights and electronic personal data of customers. Therefore this study discusses the issue of customer protection against leakage of bank secrets as a violation of the privacy rights and electronic personal data of b... see more

1 of 26 pages  |  10  records  |  more records»