-
121
DEVIANT BEHAVIOR OF STUDENTS IN THE SOCIAL AND PSYCHOLOGICAL ADAPTATION IN HIGHER EDUCATION
Published 2015-06-01“…Explore areas such as the impact of neurosis on I-conceptual structures of personality: lie as a self-deception both in the form of an inadequate indicator of self-bias, distort the perception of their own social significance and lies as a means to manipulate the behavior of participants in social interaction. …”
Get full text
Article -
122
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01“…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
Get full text
Article -
123
Intersectionalities of the Left and Right in Latin America and Europe. An exploration of contemporary political processes
Published 2023-09-01“…Based on the populist discourse that exploits the discontent caused by neoliberal democracy, they gain followers for nationalist, cultural, and racist reasons that in the end are nothing more than right-wing deception to protect the rule of capital. Faced with the restoration of an already exhausted neoliberal model, an intersectionality appears between the Left and the Right which, far from confirming the diagnosis of the end of ideologies and the deactivation of the class struggle, rekindles conflicts over capital. …”
Get full text
Article -
124
Specifics of combating corruption at higher education institutions in the context of integrity policy
Published 2023-06-01“…Positions of domestic and foreign scholars on the essence and importance of academic integrity, the definition of “academic integrity” enshrined in legislation have been analysed, and the legally enshrined forms of academic integrity have been characterised, namely: academic plagiarism, self-plagiarism, fabrication, falsification, cheating, deception, bribery, biased assessment, providing assistance to students during the assessment of their learning outcomes or creating obstacles not provided for by the terms and/or procedures for such assessment, as well as impact in any form. …”
Get full text
Article -
125
Digitalisation Profile of the Elderly and ‘Grey Digital Violence’
Published 2024-12-01“…The elderly are sometimes exposed to actions such as deception, fraud, insult and humiliation by those who use digital technologies with bad intentions. …”
Get full text
Article -
126
Jacobean Morality and Moral Performativity in Volpone and Women Beware Women
Published 2021-04-01“…Volpone’s inner world and motivations for his actions show that he is initially driven by negative traits; greed, extravagance and deception. The motivation behind the excessive need for pleasure and satisfaction, initially, is his need for more material possessions and his fortune, for which he commits unjust actions and acts out deceptive behaviour. …”
Get full text
Article -
127
Chemical Changes Under Heat Stress and Identification of Dendrillolactone, a New Diterpene Derivative with a Rare Rearranged Spongiane Skeleton from the Antarctic Marine Sponge <i>...
Published 2024-12-01“…From the dichloromethane extract of sponge samples from Deception Island collected in January 2023, we isolated a novel derivative with an unusual β-lactone diterpene skeleton here named dendrillolactone (<b>1</b>), along with seven previously described diterpenes, including deceptionin (<b>2</b>), a gracilane norditerpene (<b>3</b>), cadlinolide C (<b>4</b>), a glaciolane norditerpene (<b>5</b>), membranolide (<b>6</b>), aplysulphurin (<b>7</b>), and tetrahydroaplysulphurine-1 (<b>8</b>). …”
Get full text
Article -
128
Distributed optimization and scheduling strategy for source load storage distribution grid based on alliance chain
Published 2024-08-01“…In response to issues as difficult global information acquisition, less consideration of flexible load and energy storage unit access, individual deception, and insufficient security in the optimization scheduling process of active distribution networks, this paper constructed a distribution network optimization scheduling model that includes sources, loads, and storage. …”
Get full text
Article -
129
Feasibility and acceptability for LION, a fully remote, randomized clinical trial within the VA for light therapy to improve sleep in Veterans with and without TBI: An MTBI2 sponso...
Published 2025-01-01“…Participant masking via deception balanced expectancy assumptions across arms. …”
Get full text
Article -
130
The Oxford handbook of language and law /
Published 2012Table of Contents: “…Identification of authorship and deception -- Author identification in the forensic setting / Carole E. …”
View in OPAC
Book -
131
Ethical attitudes of the future Russian officials and businessmen: Comparative analysis
Published 2023-02-01“…Compared to future entrepreneurs, future officials are significantly more likely to justify the act of appropriation, deception due to omissions, and revenge within the law. …”
Get full text
Article -
132
Longitudinal impact of past-year reproductive coercion on contraceptive use dynamics in Sub-Saharan Africa: evidence from eight population-based cohortsResearch in context
Published 2025-02-01“…Summary: Background: Reproductive coercion (RC) is a type of abuse where a partner intentionally attempts to interfere with fertility through deception or violence, often by manipulating one’s contraceptive use or reproductive decision-making. …”
Get full text
Article -
133
LA CRITIQUE IRONIQUE DE L’ACQUISITION DE LA DOCTRINE DE LIBERTE ABSOLUE DANS “L’IMMORALISTE” D’ANDRE GIDE / ANDRE GIDE’İN AHLAKSIZ ADLI ROMANINDA MUTLAK ÖZGÜRLÜK DOKTRİNİN EDİNİMİN...
Published 2016-06-01“…Il découvre que la doctrine de la liberté absolue lui mène à la misère et à la déception et ne fait pas le bonheur. Le fait qu'il se repent de ses pervers des relations sexuelles et qu’il invoque à ses amis nous montrent l'ironie de la doctrine de la liberté absolue.…”
Get full text
Article -
134
Presenting Iran's new economic diplomacy model with an export approach for neighboring countries with an emphasis on cultural and media diplomacy capacities
Published 2024-12-01“…Robert Cohen, one of the most important theorists of neoliberal institutionalism, states that international institutions make cooperation between countries easier by reducing the possibility of deception and facilitate cooperation through information, monitoring and reducing transaction costs (Keohane, 1993). …”
Get full text
Article -
135
The rise and fall of promises: a preliminary method to trace promises in science and technology
Published 2025-12-01“…This scandal resulted from continuous overpromises and deceptive promises, practices not uncommon in science. …”
Get full text
Article -
136
Masochism of Play
Published 2025-01-01“…This practice research begins with the deceptively simple question: Why?…”
Get full text
Article -
137
An Unusual Case of Tracheoesophageal Fistulae
Published 2012-01-01“…We present the case of a patient with a deceptive history for TEF and report an approach that provides adequate oxygenation, ventilation, surgical exposure, and postoperative analgesia with excellent outcome.…”
Get full text
Article -
138
A New Construction of Multisender Authentication Codes from Pseudosymplectic Geometry over Finite Fields
Published 2013-01-01“…The parameters and the probabilities of deceptions of this code are also computed.…”
Get full text
Article -
139
A Construction of Multisender Authentication Codes with Sequential Model from Symplectic Geometry over Finite Fields
Published 2014-01-01“…In this paper, we construct multisender authentication codes with sequential model from symplectic geometry over finite fields, and the parameters and the maximum probabilities of deceptions are also calculated.…”
Get full text
Article -
140
Les racines de la « révolution du 25 janvier » en Égypte : une réflexion géographique
Published 2011-10-01“…The stalemate of the political system and the deceptive effects of an economic liberalization with little trickle-down effect explain the run-up to the revolution. …”
Get full text
Article