Showing 161 - 180 results of 217 for search '(((els OR (else OR elsae)) OR esa) OR (((mdella OR idella) OR mbplla) OR (ella OR bella)))', query time: 0.18s Refine Results
  1. 161

    Gaps In Primary Care And Health System Performance In Six Latin American And Caribbean Countries by Macinko, James, Guanais, Frederico C., Mullachery, Pricila, Jimenez, Geronimo

    Published 2016
    “…We applied a validated survey on access, use, and satisfaction with health care services to nationally representative samples of the populations of Brazil, Colombia, El Salvador, Jamaica, Mexico, and Panama. Respondents reported considerable gaps in the ways in which primary care is organized, financed, and delivered. …”
    Get full text
    Get full text
    Journal Article
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166

    Information encryption processing over wireless LAN by Nguyen, Daniel Vinh Quang.

    Published 2013
    “…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
    Get full text
    Final Year Project (FYP)
  7. 167
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172

    Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming by Singh, Sushil Kumar, Kumar, Manish, Khanna, Ashish, Virdee, Bal Singh

    Published 2025
    “…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
    Get full text
    Article
  13. 173
  14. 174

    Cache refinement type for side-channel detection of cryptographic software by Jiang, Ke, Bao, Yuyan, Wang, Shuai, Liu, Zhibo, Zhang, Tianwei

    Published 2023
    “…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
    Get full text
    Conference Paper
  15. 175

    Rethinking small-footprint counter-terrorism: moving from kinetic operations to security force assistance by Bell, Louis

    Published 2015
    “…Drawing on the experiences of U.S. advisory efforts in El Salvador and the Philippines, this paper demonstrates that a counter-terrorism strategy centred on Security Force Assistance holds far more potential than the current enemy-centric policy. …”
    Get full text
    Thesis
  16. 176
  17. 177
  18. 178
  19. 179

    Choice of DLVO approximation method for quantifying the affinity between latex particles and membranes by Lay, Huang Teik, Ong, Chi Siang, Wang, Rong, Chew, Jia Wei

    Published 2023
    “…In particular, while both the Poisson-Boltzmann (P–B) and linear superposition approximation (LSA) equations can quantify the electrostatics (EL) interaction energy component, the former assumes constant potential, while the latter additionally considers constant charge scenarios. …”
    Get full text
    Journal Article
  20. 180

    Material characterization of additive manufactured metal parts for failure analysis by Seow, Mei Qi

    Published 2019
    “…The samples are tested for its mechanical properties via tensile testing, there are differences in mechanical performance such as YS, UTS, EL, ROA is observed. This resulted in the differences of microstructural defects, fractography and porosity analysis using Scanning Electron Microscope (SEM) and Optical Microscope (OM). …”
    Get full text
    Final Year Project (FYP)