Suggested Topics within your search.
Suggested Topics within your search.
- History 24
- Law 24
- English language 16
- Philosophy 14
- methods 13
- Anesthesia 12
- Biochemistry 10
- Methodology 10
- Research 10
- Criminal law 7
- English 7
- French language 7
- Law and legislation 7
- Management 7
- Molecular biology 7
- Social service 7
- Women 7
- Academic writing 6
- Administrative law 6
- Contracts 6
- Politics and government 6
- Psychology 6
- Social conditions 6
- Social sciences 6
- Study and teaching 6
- literature 6
- Authorship 5
- Constitutional law 5
- Domestic relations 5
- Education, Higher 5
-
250081
La invención histórica del desarrollo: una aproximación crítica y latinoamericana al sistema-mundo moderno
Published 2021-05-01“…It is argued that development has been a discourse of transhistoric power that has made Euro-American practices, experiences and traditions a universal cultural model, through which a hegemonic and essentialist vision of the West has been strengthened, while building a deficit and outsourced alterity.…”
Get full text
Article -
250082
La construction professionnelle par la quête d’un langage commun, le cas des enseignants débutants en classe maternelle
Published 2011-11-01“…Attempting to integrate a professional community, beginners have no choice, in the course of their first work experiences, but to learn its codes, its relations between subject, matter of work and other actors, in a system of interactions they discover from the inside: they are in search of a “common language” within that universe. Based on a study carried out with trainee primary teachers at the time of their first practice in nursery classes, the articulation of professional didactics, activity clinic and “course of action” frameworks allows one to consider characteristic features of that learning of a “common language”, whose mastery then means actual professionalism.…”
Get full text
Article -
250083
Health Beyond Health: Insights and Implications from the Fourth National Health Summit of Nepal, 2024
Published 2024-12-01“…With subthemes ranging from universal health coverage to the impact of climate change on health, the event highlighted the importance of a holistic, intersectoral approach to health system strengthening. …”
Get full text
Article -
250084
Profil Pemimpin Publik: Studi Deskriptif mengenai Kepemimpinan pada Generasi Milenial
Published 2020-07-01“…The sampling method conducted using convenience sampling and there are 275 respondents who are millennial beginner voters, consisting of students from 26 universities spread across Indonesia. The results show that the value that should be in the leader according to millennials is leaders who showed the real work, responsible, and decisive person. …”
Get full text
Article -
250085
Talk About Crime Among Young People in Northern Mexico: The Impact of Drug Trafficking in the Neighborhood
Published 2025-01-01“…A total of 48 group interviews were carried out with young people in junior high, high school, and universities and analyzed for thematic content using MAXQDA 20 software. …”
Get full text
Article -
250086
O discurso sobre a precariedade em Luiz Ruffato e Arlindo Gonçalves
Published 2013-01-01“…Like our fragmented perception of a degraded urban universe, here the landscape indicates our relationship with the alter territory.…”
Get full text
Article -
250087
Corpus Applications in ELT in Colombia: An Exploratory Survey
Published 2025-01-01“…Data were gathered through a survey of English instructors at Colombian universities to assess their familiarity with corpus linguistics. …”
Get full text
Article -
250088
GUC-secure protocol for private relational join operator computing
Published 2014-11-01“…It is one of important applications of secure multiparty computation that privacy-preserving SQL computation in distributed relational database.There are only few works dealing with provably-secure privacy-preserving data manipulations in contrast with comparatively abundant works on privacy-preserving data-query in database,among which the join operator is the most powerful in generating new data (relation).By making use of anonymous IBE (identity-based encryption) scheme and its user private-keys blind generation techniques,a very general cryptographic protocol framework is proposed for secure 2-party join computation.This construction is provably GUC (generalized universally composable) secure in the standard model with acceptable efficiency.…”
Get full text
Article -
250089
Apports et perspectives de l’architecture émotionnelle aux sciences et architecture de paysage
Published 2009-12-01“…This process follows an universal concept : offer to the human bean what the nasride sultans named in the Alhambra an « inspiring retreat », and what Gilles Clément called today an « interior viewpoint ». …”
Get full text
Article -
250090
Revolution of the development paradigm of network technology system—network of networks
Published 2022-06-01“…Polyphyly and diversity are the first criterion of the development of the universe.At present, the development of network technology has not been divorced from the basic paradigm of self-evolution based on a single system or self-replacement, which has greatly restricted the innovation demand of the network technology system and related services characterized with “human-network-thing” as the object, the integration of computing, storage and transmission as the means, and multi-dimensional and multi-dimensional integrated new world.From the perspective of thinking and methodology, a multimodal network development paradigm that separates the network technology system from the supporting environment was proposed.Combined with the scenarios of cloud computing, the new modes and application scenarios of polymorphic network business operation were prospected.…”
Get full text
Article -
250091
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
250092
Devenir conseiller principal d’éducation : recompositions et tensions d’un système de formation
Published 2022-12-01“…., 2010), the training of CPE has evolved towards that of professionalization (Wittorski, 2008), within the framework of the universalization of training. Recent reforms have strengthened the professionalizing dimension, by backing it up with the ambition of an integrative alternation. …”
Get full text
Article -
250093
Cinemas and Spectators of International Development
Published 2019-12-01“…However, it attends not only to the ideal spectators these films attempted to create, but also to the experiences of spectators themselves, concluding that audience reactions to development films, particularly among non-experts, were often skeptical of the universal modernization trajectories on which the films insisted.…”
Get full text
Article -
250094
Quaternary Neural Belief Propagation Decoding of Quantum LDPC Codes With Overcomplete Check Matrices
Published 2025-01-01“…One of the major challenges in implementing QLDPC codes in quantum computers is the lack of a universal decoder. In this work, we first propose to decode QLDPC codes with a belief propagation (BP) decoder operating on overcomplete check matrices. …”
Get full text
Article -
250095
Intermediate Mass Black Holes: Their Motion and Associated Energetics
Published 2014-01-01“…We also consider their formation in the early universe and also discuss the possibility of supermassive black holes forming from mergers of several IMBH and compare the relevant time scales involved with other scenarios.…”
Get full text
Article -
250096
La experiencia cuencana como "rito de paso" de la migración académica española a Ecuador
Published 2023-05-01“…The socio-economic crisis Spain has experienced since 2008, connected with the process of the Ecuadorian government to attract qualified human resources abroad, both converged in a massive insertion of Spaniards in as researchers and professors at universities in Ecuador during the period 2011-2015. …”
Get full text
Article -
250097
Para uma compreensão da Clausura Monástica e Emparedamento enquanto fenómenos históricos e religiosos
Published 2015-06-01“…In this article we seek the relations between the enclosure and the walling in as parts of a universal religious language and we explore the manifestations of self closure and desired walling in which took place in a particular moment of increasing ascetic and monastic mouvements of the history of Christianity. …”
Get full text
Article -
250098
Patterns in the Use of Cooperative Agents for Innovation in the Brazilian Manufacturing Industry
Published 2015-01-01“…In this sense, there was a la rger low valuation of the external cooperation agents, mainly universities and researc h centers, indicating an innovation model that is still far from the concept of open innovati on. …”
Get full text
Article -
250099
Community engagement challenges and perceptions in private higher education institutions
Published 2024-12-01“…Community engagement is now considered as important as teaching and learning, as well as research and innovation at universities. The Council on Higher Education expects formal engagement from public and private higher education institutions. …”
Get full text
Article -
250100
The role of sport in research and development in Switzerland - An overview
Published 2025-01-01“…Sport is barely visible institutionally at universities, universities of applied sciences or teacher training colleges. …”
Get full text
Article