Suggested Topics within your search.
Suggested Topics within your search.
- History 61
- English language 32
- Management 23
- Research 23
- methods 22
- Politics and government 20
- Rhetoric 19
- Study and teaching 19
- Methodology 17
- Report writing 17
- Social aspects 17
- Moral and ethical aspects 15
- Social conditions 15
- Economic conditions 14
- Economic development 14
- Economic policy 14
- Law 14
- Philosophy 14
- Grammar 13
- History and criticism 12
- Anesthesia 11
- Mass media 11
- Constitutional court 10
- Biochemistry 9
- Court of Appeal 9
- Handbooks, manuals, etc 9
- Law reports, digests, etc 9
- Psychological aspects 9
- Education 8
- Medicine 8
-
308681
La responsabilidad civil del abogado en el derecho español: Perspectiva jurisprudencial
Published 2006-01-01“…Pese a que durante mucho tiempo las reclamaciones de responsabilidad civil contra los abogados fueron escasas, en los últimos años se ha producido un incremento considerable del número de sentencias en las que se declara la responsabilidad civil de estos profesionales. …”
Get full text
Article -
308682
O możliwości zastosowania teorii prawa Zygmunta Ziembińskiego w rozstrzyganiu problemów bioetycznych
Published 2013-06-01Get full text
Article -
308683
Consideraciones ético-metodológicas para la investigación en educación inicial
Published 2011-01-01“…En estudios realizados en educación inicial, es poco frecuente que los investigadores e investigadoras describan los dilemas metodológicos y éticos que enfrentan durante su trabajo, ni la forma en que perciben a los niños y niñas dentro de la investigación. …”
Get full text
Article -
308684
-
308685
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01“…,quantum communication,public key infrastructure,physical layer security,blockchain,trusted computing and privacy protection.Apart from teaching the related technologies,the remarkable achievements and efforts of Chinese scientists were shown and the future work was indicated.Students are grouped to do literature research,expand their knowledge,exchange the learning experience and explore the law of scientific research in these new aspects.Students can not only absorb the knowledge of cutting-edge technology,but also learn the method and spirit to address scientific problems.A useful reference for education and teaching method of course ideological for graduate students was provided.…”
Get full text
Article -
308686
Successive memory image analysis method for malicious codes
Published 2017-02-01“…On the basis of the analysis of a single memory image, different memory images were analysised comparatively. …”
Get full text
Article -
308687
Milkweed Assassin Bug (Suggested Common Name) Zelus longipes Linnaeus (Insecta: Hemiptera: Reduviidae)
Published 2011-06-01“…They are generalist predators feeding on a wide range of soft-bodied prey in garden and fields, such as mosquitoes, flies, earthworms, cucumber beetles, and caterpillars (fall armyworm, rootworm, etc.) …”
Get full text
Article -
308688
Cooked Air
Published 2021-06-01“…The relationship between architecture, inhabitants and air management has become increasingly reliant on ventilation standards, in turn increasing reliance on technical specialists, and creating a gap in ventilation knowledge. Through an examination of ASHRAE Standard 62.2, this essay asks why is it that, as ventilation processes become increasingly measurable, there is an equal tendency to reverse awareness in relation to the human sensation, when the standard itself underlines the reality of both phenomenal and intellectual knowledge towards air quality assessment. …”
Get full text
Article -
308689
New SNR estimation algorithm based on relevance vector machine
Published 2013-04-01“…A new SNR estimation algorithm based on relevance vector machine (RVM) was proposed,it can not only be used under the flat fading channel,but also meet the request of larger estimation range and higher estimation accuracy of PSK.The estimation model was created by using RVM,based on the relation between the SNR and the two-order moments and four-order moments,and the reliable weights of the model can be figured out by straining and studying.Simulation results show that this algorithm has lots of advantages,for example,it uses less data and has larger estimation range than general algorithm,in addition,its estimation accuracy becomes higher in the effective estimation rang,and it is applicable to more modulation signals.…”
Get full text
Article -
308690
Eduquer le désir : Foucault, Freud et les sexualités impériales
Published 2010-05-01Get full text
Article -
308691
-
308692
IMPACT OF SUBSIDIES ON THE FINANCIAL POSITION OF LOCAL GOVERNMENT BUDGETARY ESTABLISHMENTS IN POLAND
Published 2020-06-01“…The article presents an assessment of the impact of subsidies received from the budget of a local government unit on the financial situation of local government budgetary establishments in Poland. …”
Get full text
Article -
308693
Inference of Process Capability Index Cpy for 3-Burr-XII Distribution Based on Progressive Type-II Censoring
Published 2020-01-01“…In this paper, we discussed the estimation of the index Cpy for a 3-Burr-XII distribution based on Progressive Type-II censoring. …”
Get full text
Article -
308694
Cull Cow Beef Quality Issues: Hide Defects, Contamination, and Non-Ambulatory Cattle
Published 2014-12-01“… Cull cattle are those that are sold from a herd for lack of performance, lack of resources, or genetic improvement. …”
Get full text
Article -
308695
Related-key impossible boomerang cryptanalysis on LBlock
Published 2017-05-01“…The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.A 15-round related-key impossible boomerang distinguisher was constructed.Based on the new distinguisher,an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end.The attack on 22-round LBlock required data complexity of only 2<sup>51.3</sup>plaintexts and computational complexity of about 2 <sup>71.54</sup>22-round encryptions.Compared with published cryptanalysis results on 22-round LBlock,proposed attack has great advantages on data and computational complexities.…”
Get full text
Article -
308696
BAĞIMSIZ DENETİM KALİTESİ: DENETİM FİRMALARI ÜZERİNE BİR ARAŞTIRMA
Published 2011-12-01Get full text
Article -
308697
DYNAMICS PERFORMANCE OPTIMIZATION OF DELTA PARALLEL MECHANISM
Published 2016-01-01“…Performance index is not sensitive to parameter perturbation,good for the body to maintain its excellent raw performance for a long time.…”
Get full text
Article -
308698
Robust Nonlinear Partial Least Squares Regression Using the BACON Algorithm
Published 2018-01-01“…In addition to the linear form of PLS, there are other versions that are based on a nonlinear approach, such as the quadratic PLS (QPLS2). …”
Get full text
Article -
308699
As memórias do que aconteceu: religiosidade, tecnologias e traduções nos meios populares
Published 2013-01-01“…The article discusses ethnographic references of a project that investigates how the use of audiovisual recording technologies allows lower classes subjects objectify themselves in religious manifestations, producing reflexivities on various events and their religious- ness. …”
Get full text
Article -
308700
Handbook of Florida Water Regulation: On-Site Sewage Treatment and Disposal
Published 2011-08-01“…This revised document is part of the Handbook of Florida Water Regulation, which consists of 2-4 page fact sheets that provide an accurate, current, and authoritative summary of the principal, federal, and state (Florida) laws that directly or indirectly relate to agriculture. It provides a basic overview of the many rights and responsibilities that farmers and farmland owners have under both federal and state laws as well as the appropriate contact information to obtain more detailed information. …”
Get full text
Article