Suggested Topics within your search.
Suggested Topics within your search.
- Animal welfare 1
- Animals 1
- Brothers and sisters 1
- Cultural property 1
- Desertions 1
- Elias (Fictitious character) 1
- Fantasy 1
- Fugitives from justice 1
- Group homes for youth 1
- Historic preservation 1
- History 1
- Imaginary places 1
- Intelligence service 1
- Laia (Fictitious character) 1
- Management 1
- Orphans 1
- Prisons 1
- Protection 1
- Rats 1
- Repatriation 1
- Romance fiction 1
- Treatment 1
- Vietnam War, 1961-1975 1
-
221
JEREMIAH 51:15-19 (MT):
Published 2018-12-01“…YHWH has the power to execute his plan to destroy Babylon. 51:15-19 did, however, attain a distinct identity through its close connections with the oracles against Babylon. …”
Get full text
Article -
222
“In a Sea of Fire, in a Rain of Bombs.” Jewish Children in Warsaw during September 1939 Siege
Published 2025-01-01“…The devastating aftermath saw a quarter of Warsaw’s houses destroyed and approximately 50,000 people killed or wounded. …”
Get full text
Article -
223
La gestion controversée du feu dans les forêts nationales de l’Idaho et de l’ouest du Montana
Published 2015-04-01“…Wildfires with variable intensity regularly destroy properties. Some of them kill people. Regionally, they are an important human, economic, political and environmental issue. …”
Get full text
Article -
224
Multinational Corporations and the Socio-Economic Unrest in the Niger-Delta Region of Nigeria
Published 2023-06-01“…In the oil sector for example, which of course is the economic mainstay in Nigeria, these corporations perpetrate heinous activities such as pollution of the environment, inadequate technology transfer, violation of human rights, blunt refusal to discharge their social responsibilities, gas flaring which destroys wildlife, seafood’s and farmland especially in the Niger-Delta region without adequate compensation. …”
Get full text
Article -
225
Liver metastases in gastroenteropancreatic neuroendocrine tumours – treatment methods
Published 2020-01-01“…Radiofrequency ablation (RFA) is a technique that involves the use of thermal energy to induce coagulation necrosis, thereby destroying tumour cells. Resection plus RFA is increasingly used in patients with bilateral NET LMs. …”
Get full text
Article -
226
Feral Swine Trapping: Techniques and Designs
Published 2018-07-01“…They loosen the soil, destroy native vegetation, and modify the natural chemistry and nutrients of the soil, causing widespread destruction in natural ecosystems, agricultural areas, livestock pastures, and residential areas. …”
Get full text
Article -
227
RUSSIAN ETATISM AND RUSSIAN PATERNALISM IN THE POLITICAL PROCESS OF RUSSIA ON THE EVE OF PETER THE GREAT’S REFORMATION
Published 2021-02-01“…Among the main prerequisites are the etatization (nationalization) of society and the associated paternalistic nature of state relations, which formed the traditional foundations of national statehood and strengthened in the 17th century in the context of Russia’s withdrawal from the Turmoil and the restoration of the national statehood destroyed in the time of troubles. The paper investigates the reasons for the formation of these features of the development of national statehood, the main of which the author proposes to search in the civilizational and geopolitical features of the formation and evolution of the Russian state, the weakness of the institutional foundations of Russian politics, stylistic peculiarities of Russian Orthodoxy and a number of other factors.…”
Get full text
Article -
228
Nijmegen, from Oppidum Batavorum to Ulpia Noviomagus, civitas of the Batavi: two successive civitas-capitals
Published 2015-12-01“…Further growth of the town was cut short by increasing pressure on the local inhabitants, culminating in the Batavian Revolt of 69-70 AD, during which the Oppidum Batavorum was destroyed. A period of integration followed, resulting in the formation of the province of Germania inferior. …”
Get full text
Article -
229
Beyond information seeking: a general model of information behaviour.
Published 2006-01-01“…A model of 'multi-directionality' is explored, to overcome the notion of sequential stages and, using Dervin's concept of 'the gap', modes of information behaviour are developed that include, for example, creating, destroying and avoiding information as well as seeking it. …”
Get full text
Article -
230
Infância e errância: imagens da criança abandonada na ficção brasileira
Published 2015-01-01“…If these ideals configurate an edenic space that can determine the positiv e relationships that children establish with themselves and the adult world, in the nocturnal regime of imagination, the escape from this space indicates a negative deviation, capable of destroying a state of innocence. We observe this deviation in the del inquent children in Captains of the sand , by Jorge Amado, which, abandoned in the streets of Salvador, lose their world of purity looking for mechanisms of survival. …”
Get full text
Article -
231
De l’usure au pouvoir de l’argent : les métamorphoses d’un mythe antijuif à travers la caricature en Angleterre
Published 2003-01-01“…Far from being exhaustive, the intent of this article, based on a limited number of caricatures, is to stress the changes which took place over the centuries in numerous and varied portrayals of the “Jewish Money Power”: from the Jew in his capacity as money lender to the Jew as stockbroker, to more contemporary images of the Jewish banker and international financier, monopolising high finance, insinuating himself in all fields and plotting to dominate and destroy the Christian world. Having explained the various transformations in context, this analysis of selected Jewish graphic portrayals will also highlight the constant use of physical features and characteristics that have contributed to creating a misleading image of the Jews and encouraged anti-Semitism.…”
Get full text
Article -
232
EQUIPPING THE YOUTH BY RECOURSE TO THE TOTAL LIFE TRAINING TOOL FOR YOUTH CHALLENGES IN CHRISTIANA:
Published 2020-06-01“…As a consequence, numerous young people’s lives are being destroyed. My current study focuses on the youth of the Christiana District in South Africa as target for a holistic missional outreach programme. …”
Get full text
Article -
233
Kaffeehausliteraten und Exilliteratur im Kontext von Marc Augés Pariser Bistro: Kracauer, Roth und Kesten
Published 2019-12-01“…In the other three Roth-texts and in Kracauer’s texts the myth of the literature café cultivated by Marc Augé is destroyed. The café is no longer a positive symbol of joie de vivre. …”
Get full text
Article -
234
REVIEW ON DORMANCY, CAUSES, USES, AND MEASURES OF OVERCOMING IT
Published 2023-06-01“…Leaching is another method for ending seed dormancy because it destroys the inhibitory components of the seed coat.…”
Get full text
Article -
235
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01“…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
Get full text
Article -
236
RESEARCH OF MECHANICAL PERFORMANCE OF KNITTING CORD REINFORCED RUBBER HOSE
Published 2017-01-01“…And rubber and cord will not be destroyed. Experimental Bursting pressure of rubber hose is 2. 04 MPa,which is 97% of forecast bursting pressure 2. 10 MPa. …”
Get full text
Article -
237
The Wound as Bridge: The Path of Conocimiento in Gloria Anzaldúa's Work
Published 2014-12-01“…The latter is an epistemology she developed in the post-Borderlands years, by which she meant a form of spiritual inquiry /activism reached via creative acts.What emerges from this analysis is a vision in which the personal and the social are closely connected and in which various traditions (the Aztec and the Catholic) converge and mix to provide a conception of pain not as privatizing, meaningless, and world-destroying, but as significant and transformative. Even in the last part of her career, when the feeling of personal and social vulnerability became stronger due to her diabetes and to the 9/11 attacks, she invited readers to overcome the temptation to victimhood and to use pain as a conduit to recognizing another’s suffering, opening the possibility of an ethical encounter.…”
Get full text
Article -
238
Data security challenges and countermeasures in financial technology
Published 2019-08-01“…While financial technology brings opportunities to the financial industry,it also brings new challenges.With the rapid development of financial technology,the big data explosion caused by the digitalization,networking and intelligence of financial services has put forward new and greater requirements for data security governance.Based on the analysis of the status quo of financial technology development and financial data security,a financial data security “shell” model for the characteristics of financial data was proposed:the internal is the security goals of ensuring data confidentiality,integrity,and availability; the external is a variety of threats including data leaking,tampering and destroying etc; the middle is various coping strategies,including access strategies,prevention and control strategies,detection strategies,perceived strategies and etc.According to this model,relevant suggestions and countermeasures for data security governance in financial technology are proposed.…”
Get full text
Article -
239
ENVIRONMENTAL DEGRADATION, TRANSNATIONAL CORPORATIONS (TNCS) AND DEVELOPMENT EQUATION IN THE NIGER DELTA
Published 2022-12-01“…The findings of the study show that their unsafe operations destroy people's means of livelihood, damage the health of the environment and negatively impact the economic growth and development of the region. …”
Get full text
Article -
240
Prevention of H-Aggregates Formation in Cy5 Labeled Macromolecules
Published 2010-01-01“…The H-aggregates can be destroyed by conformational changes of the PAH induced by interactions with polyanions or in organic solvents. …”
Get full text
Article