Showing 221 - 240 results of 819 for search '"destroyer"', query time: 0.04s Refine Results
  1. 221

    JEREMIAH 51:15-19 (MT): by M D Terblanche

    Published 2018-12-01
    “…YHWH has the power to execute his plan to destroy Babylon. 51:15-19 did, however, attain a distinct identity through its close connections with the oracles against Babylon. …”
    Get full text
    Article
  2. 222

    “In a Sea of Fire, in a Rain of Bombs.” Jewish Children in Warsaw during September 1939 Siege by Eyal Ginsberg

    Published 2025-01-01
    “…The devastating aftermath saw a quarter of Warsaw’s houses destroyed and approximately 50,000 people killed or wounded. …”
    Get full text
    Article
  3. 223

    La gestion controversée du feu dans les forêts nationales de l’Idaho et de l’ouest du Montana by Nicolas Barbier

    Published 2015-04-01
    “…Wildfires with variable intensity regularly destroy properties. Some of them kill people. Regionally, they are an important human, economic, political and environmental issue. …”
    Get full text
    Article
  4. 224

    Multinational Corporations and the Socio-Economic Unrest in the Niger-Delta Region of Nigeria by Adekunle Alaye

    Published 2023-06-01
    “…In the oil sector for example, which of course is the economic mainstay in Nigeria, these corporations perpetrate heinous activities such as pollution of the environment, inadequate technology transfer, violation of human rights, blunt refusal to discharge their social responsibilities, gas flaring which destroys wildlife, seafood’s and farmland especially in the Niger-Delta region without adequate compensation. …”
    Get full text
    Article
  5. 225

    Liver metastases in gastroenteropancreatic neuroendocrine tumours – treatment methods by Paweł Gut

    Published 2020-01-01
    “…Radiofrequency ablation (RFA) is a technique that involves the use of thermal energy to induce coagulation necrosis, thereby destroying tumour cells. Resection plus RFA is increasingly used in patients with bilateral NET LMs. …”
    Get full text
    Article
  6. 226

    Feral Swine Trapping: Techniques and Designs by Bethany Rose Wight, Raoul Keith Boughton

    Published 2018-07-01
    “…They loosen the soil, destroy native vegetation, and modify the natural chemistry and nutrients of the soil, causing widespread destruction in natural ecosystems, agricultural areas, livestock pastures, and residential areas. …”
    Get full text
    Article
  7. 227

    RUSSIAN ETATISM AND RUSSIAN PATERNALISM IN THE POLITICAL PROCESS OF RUSSIA ON THE EVE OF PETER THE GREAT’S REFORMATION by N. A. Omelchenko

    Published 2021-02-01
    “…Among the main prerequisites are the etatization (nationalization) of society and the associated paternalistic nature of state relations, which formed the traditional foundations of national statehood and strengthened in the 17th century in the context of Russia’s withdrawal from the Turmoil and the restoration of the national statehood destroyed in the time of troubles. The paper investigates the reasons for the formation of these features of the development of national statehood, the main of which the author proposes to search in the civilizational and geopolitical features of the formation and evolution of the Russian state, the weakness of the institutional foundations of Russian politics, stylistic peculiarities of Russian Orthodoxy and a number of other factors.…”
    Get full text
    Article
  8. 228

    Nijmegen, from Oppidum Batavorum to Ulpia Noviomagus, civitas of the Batavi: two successive civitas-capitals by Harry Van Enckevort, Elly N. A. Heirbaut

    Published 2015-12-01
    “…Further growth of the town was cut short by increasing pressure on the local inhabitants, culminating in the Batavian Revolt of 69-70 AD, during which the Oppidum Batavorum was destroyed. A period of integration followed, resulting in the formation of the province of Germania inferior. …”
    Get full text
    Article
  9. 229

    Beyond information seeking: a general model of information behaviour. by Natalya Godbold

    Published 2006-01-01
    “…A model of 'multi-directionality' is explored, to overcome the notion of sequential stages and, using Dervin's concept of 'the gap', modes of information behaviour are developed that include, for example, creating, destroying and avoiding information as well as seeking it. …”
    Get full text
    Article
  10. 230

    Infância e errância: imagens da criança abandonada na ficção brasileira by Licia Soares de Souza

    Published 2015-01-01
    “…If these ideals configurate an edenic space that can determine the positiv e relationships that children establish with themselves and the adult world, in the nocturnal regime of imagination, the escape from this space indicates a negative deviation, capable of destroying a state of innocence. We observe this deviation in the del inquent children in Captains of the sand , by Jorge Amado, which, abandoned in the streets of Salvador, lose their world of purity looking for mechanisms of survival. …”
    Get full text
    Article
  11. 231

    De l’usure au pouvoir de l’argent : les métamorphoses d’un mythe antijuif à travers la caricature en Angleterre by Lucienne Germain

    Published 2003-01-01
    “…Far from being exhaustive, the intent of this article, based on a limited number of caricatures, is to stress the changes which took place over the centuries in numerous and varied portrayals of the “Jewish Money Power”: from the Jew in his capacity as money lender to the Jew as stockbroker, to more contemporary images of the Jewish banker and international financier, monopolising high finance, insinuating himself in all fields and plotting to dominate and destroy the Christian world. Having explained the various transformations in context, this analysis of selected Jewish graphic portrayals will also highlight the constant use of physical features and characteristics that have contributed to creating a misleading image of the Jews and encouraged anti-Semitism.…”
    Get full text
    Article
  12. 232

    EQUIPPING THE YOUTH BY RECOURSE TO THE TOTAL LIFE TRAINING TOOL FOR YOUTH CHALLENGES IN CHRISTIANA: by F.E. Freeks

    Published 2020-06-01
    “…As a consequence, numerous young people’s lives are being destroyed. My current study focuses on the youth of the Christiana District in South Africa as target for a holistic missional outreach programme. …”
    Get full text
    Article
  13. 233

    Kaffeehausliteraten und Exilliteratur im Kontext von Marc Augés Pariser Bistro: Kracauer, Roth und Kesten by Jan T. Schlosser

    Published 2019-12-01
    “…In the other three Roth-texts and in Kracauer’s texts the myth of the literature café cultivated by Marc Augé is destroyed. The café is no longer a positive symbol of joie de vivre. …”
    Get full text
    Article
  14. 234

    REVIEW ON DORMANCY, CAUSES, USES, AND MEASURES OF OVERCOMING IT by Prakash Awasthi

    Published 2023-06-01
    “…Leaching is another method for ending seed dormancy because it destroys the inhibitory components of the seed coat.…”
    Get full text
    Article
  15. 235

    Guiding the security protection of critical information infrastructure with scientific network security concept by Yangzhao LI, Changxiang SHEN, Nan TIAN

    Published 2019-09-01
    “…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
    Get full text
    Article
  16. 236

    RESEARCH OF MECHANICAL PERFORMANCE OF KNITTING CORD REINFORCED RUBBER HOSE by JIN YangFu, WU Hao, QIAN Xin

    Published 2017-01-01
    “…And rubber and cord will not be destroyed. Experimental Bursting pressure of rubber hose is 2. 04 MPa,which is 97% of forecast bursting pressure 2. 10 MPa. …”
    Get full text
    Article
  17. 237

    The Wound as Bridge: The Path of Conocimiento in Gloria Anzaldúa's Work by Mirella VALLONE

    Published 2014-12-01
    “…The latter is an epistemology she developed in the post-Borderlands years, by which she meant a form of spiritual inquiry /activism reached via creative acts.What emerges from this analysis is a vision in which the personal and the social are closely connected and in which various traditions (the Aztec and the Catholic) converge and mix to provide a conception of pain not as privatizing, meaningless, and world-destroying, but as significant and transformative. Even in the last part of her career, when the feeling of personal and social vulnerability became stronger due to her diabetes and to the 9/11 attacks, she invited readers to overcome the temptation to victimhood and to use pain as a conduit to recognizing another’s suffering, opening the possibility of an ethical encounter.…”
    Get full text
    Article
  18. 238

    Data security challenges and countermeasures in financial technology by Jianming ZHU, Hongrui YANG

    Published 2019-08-01
    “…While financial technology brings opportunities to the financial industry,it also brings new challenges.With the rapid development of financial technology,the big data explosion caused by the digitalization,networking and intelligence of financial services has put forward new and greater requirements for data security governance.Based on the analysis of the status quo of financial technology development and financial data security,a financial data security “shell” model for the characteristics of financial data was proposed:the internal is the security goals of ensuring data confidentiality,integrity,and availability; the external is a variety of threats including data leaking,tampering and destroying etc; the middle is various coping strategies,including access strategies,prevention and control strategies,detection strategies,perceived strategies and etc.According to this model,relevant suggestions and countermeasures for data security governance in financial technology are proposed.…”
    Get full text
    Article
  19. 239

    ENVIRONMENTAL DEGRADATION, TRANSNATIONAL CORPORATIONS (TNCS) AND DEVELOPMENT EQUATION IN THE NIGER DELTA by Prince Eze, Ewelie C. Justice

    Published 2022-12-01
    “…The findings of the study show that their unsafe operations destroy people's means of livelihood, damage the health of the environment and negatively impact the economic growth and development of the region. …”
    Get full text
    Article
  20. 240

    Prevention of H-Aggregates Formation in Cy5 Labeled Macromolecules by Jing Kang, Oliver Kaczmarek, Jürgen Liebscher, Lars Dähne

    Published 2010-01-01
    “…The H-aggregates can be destroyed by conformational changes of the PAH induced by interactions with polyanions or in organic solvents. …”
    Get full text
    Article