-
1
-
2
On refactorization problems and rational Lax matrices of quadrirational Yang-Baxter maps
Published 2025“…We present rational Lax representations for one-component parametric quadrirational Yang–Baxter maps in both the abelian and non-abelian settings. …”
Get full text
Get full text
Article -
3
A study of the legal effect of the main provisions of the income tax treaty between France and the United Kingdom
Published 1984“…This thesis analyses the taxation rules applicable to different classes of income and the respective rights to tax of both the state of source and the state of residence. Its main objective is to provide an exhaustive explanation of the rules of taxation, together with an illustration of their practical operation. …”
Get full text
Thesis -
4
-
5
-
6
-
7
-
8
-
9
Transformational jewellery: practice-based research on the relationship between transformation and emotional attachment
Published 2015“…This specific transformation, which has been identified in both text and practical works, constitute the main contribution to knowledge in the field of contemporary jewellery.…”
Get full text
Thesis -
10
Influence of rainfall pattern on suction distribution and slope stability
Published 2024Get full text
Thesis -
11
Secure channel free public key encryption with multiple keywords search
Published 2020“…However, no matter what happened, Multiple Keywords Search and Keyword Guessing Attack are still two main research interests for the consideration. This PhD research aims to propose a few PEKS schemes in order to solve both Single and Multiple Keyword(s) Search issues and resist Off-line Keyword Guessing Attack (OKGA) and/or Inside Keyword Guessing Attack (IKGA). …”
Get full text
Thesis -
12
Multistage neural network ensemble: adaptive combination of ensemble results
Published 2003Get full text
Thesis -
13
Microbial induced calcite precipitation treatment on tropical residual soil
Published 2024Get full text
Thesis -
14
-
15
Fuzzy logic application to searchable cryptography
Published 2020“…Besides, some PEKS schemes are not secure mainly because they are vulnerable to Off-line Keyword Guessing Attack (OKGA). …”
Get full text
Conference or Workshop Item -
16
-
17
-
18
Governance of heritable human gene editing world-wide and beyond
Published 2022Get full text
Article -
19
-
20