Showing 1,601 - 1,620 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 1601

    Les funérailles charognardes. Homicide, cannibalisme et sacrifice humain pour les Yurakaré (Amazonie bolivienne) by Vincent Hirtzel

    Published 2013-12-01
    “…The Yurakaré approach to homicide focuses on the palingenesis of the victim as a carrion bird that eats its own corpse, a circularity which can be linked in the last resort to a historically grounded representation of a powerful Andean sovereign (particularly the Inca) executing his rebellious subjects. This study reveals a transformation of the Amazonian cannibalism which is also a Foothill critique of this kind of human sacrifice and is intended to contribute to a general theory of war, cannibalism and sacrifice in South America, beyond the academic frontier dividing highlands and lowlands.…”
    Get full text
    Article
  2. 1602

    Whole-being Framework by Marea Saldarriaga

    Published 2023-08-01
    “…A whole-system approach is necessary so that executives can thrive without running the risk of burning out. …”
    Get full text
    Article
  3. 1603

    Frontostriatal Cognitive Staging in Parkinson's Disease by Raúl de la Fuente-Fernández

    Published 2012-01-01
    “…A simple PD-related frontostriatal cognitive dysfunction (PDFCD) staging is proposed. Executive dysfunction and mental fatigue (stage I), depression/anxiety (stage IIa), apathy/pain (stage IIb), and dementia (stage III) reflect a sequential process of dopamine depletion occurring in different regions of the striatum (stages I and II) and the frontal cortex (stage III). …”
    Get full text
    Article
  4. 1604

    Cross-chain medical data sharing scheme based on elliptic curve signcryption by YU Huifang, LI Lei

    Published 2024-12-01
    “…Signcryption process was completed by smart contracts to obtain high execution efficiency. Deletion and modification functions of medical data were deployed in smart contracts to solve the frequent updation problem of medical data.…”
    Get full text
    Article
  5. 1605

    Multi-level feedback based time synchronization algorithm for wireless sensor networks by HUANGFU Wei1, ZHOU Xin-yun1, CHEN Can-feng3

    Published 2009-01-01
    “…Aiming at the fast and efficient time synchronization protocol for the wireless sensor networks under resource constraints, a novel feedback-based full-scale time synchronization(FTS) algorithm was proposed.The basic idea of FTS is to execute iteratively time synchronization downlink operations on all the nodes of the wireless sensor network and collect the two-way path delay information from only a part of nodes to calculate the average delay adjustment per hop.The stochastically feedback scheme is adopted to reduce the uplink packets.The FTS algorithm also consists of the mechanisms of synchronization error monitoring and clock skew correction.The FTS was implemented on the popular TelosB sensor nodes from UC Berkeley.The experiments show that FTS is a fast, resource-efficient algorithm with ra-tional synchronization precision.…”
    Get full text
    Article
  6. 1606

    Sur les traces d’un « sujet en devenir » by Daniel Favre

    Published 2014-09-01
    “…He will thus be able to carry out an action program and to check its execution. Self-regulation, and thus the capacity for a subject to become a little more a subject, could depend on an education allowing one to become more conscious of the coupling between the activity of feeling and the activity to think, which we call: “to think what one feels and to feel what one thinks”. …”
    Get full text
    Article
  7. 1607

    Double initial and caustic curves in diametrically compressed transparent discs - Application to the contact length by Christos Markides

    Published 2019-09-01
    “…An experimental protocol is then implemented in the case a thin cylindrical transparent disc is compressed between the jaws of the Inter­na­tional Society for Rock Mechanics suggested device for the execution of the Brazilian-disc test. The experimental method of caustics can provide the con­tact length quite accurately, even in the case of double curves which seem that are not always a consequence of a wide contact region.…”
    Get full text
    Article
  8. 1608

    Agentivité grammaticale et agentivité intrinsèque by Eliane Camargo

    Published 2013-12-01
    “…These are characterised by three causative operators, ‑ma, ‑{a}n, ‑man, the semantic content of which presents a dimension that is broader than that of a simple relationship between a causer and an affected executant. These operators translate various semantic parameters such as action control, intentionality, permissiveness, connivence, advantage and annoyance. …”
    Get full text
    Article
  9. 1609

    The bicameral system as a successor to decentralisation by Miloš Senčur

    Published 2009-10-01
    “…In fact, the weakening of the parliament's role in relation to the executive also diminishes the role and position of the second chamber. …”
    Get full text
    Article
  10. 1610

    Stochastic gradient descent algorithm preserving differential privacy in MapReduce framework by Yihan YU, Yu FU, Xiaoping WU

    Published 2018-01-01
    “…Aiming at the contradiction between the efficiency and privacy of stochastic gradient descent algorithm in distributed computing environment,a stochastic gradient descent algorithm preserving differential privacy based on MapReduce was proposed.Based on the computing framework of MapReduce,the data were allocated randomly to each Map node and the Map tasks were started independently to execute the stochastic gradient descent algorithm.The Reduce tasks were appointed to update the model when the sub-target update models were meeting the update requirements,and to add Laplace random noise to achieve differential privacy protection.Based on the combinatorial features of differential privacy,the results of the algorithm is proved to be able to fulfill ε-differentially private.The experimental results show that the algorithm has obvious efficiency advantage and good data availability.…”
    Get full text
    Article
  11. 1611

    Turismo, patrimônio e políticas públicas na Amazônia Maranhense by Linda Maria Rodrigues

    Published 2022-03-01
    “…The results identify incomplete narratives regarding the execution of public policies, despite the extensive tourist potential that includes the municipalities of the Amazon pole and the strategic proposals, endowed with programs and projects for the development of the identified areas…”
    Get full text
    Article
  12. 1612

    Model of preemptive embedded systems for optimizing real-time performance by WEN Tao1, WANG Ji-yong2, WANG Xiao-xia1, ZOU Xiang1

    Published 2005-01-01
    “…This model described the relationship between overheads incurred by preemptions and the properties of real-time tasks, such as priorities, periods, execution times, deadlines, release times etc. It also showed the relation between the schedulability of the task set and properties of its real-time tasks. …”
    Get full text
    Article
  13. 1613

    Effective strategy for hybrid sensor networks in an unknown environment by ZHUANG Wei1, 2, SONG Guang-ming1

    Published 2008-01-01
    “…The coordination of two networks could enhance abilities in sensing, task executing, communication, etc. Meanwhile, simultaneous localization and naviga- tion acting as the important applications in hybrid sensor networks were illustrated in this paper. …”
    Get full text
    Article
  14. 1614

    Analysis of Pomegranate Dye Coated Titanium Nanotubes Anode for Solar Cell Application by P. Thenmozhi, P. Sathya, S. Meyvel, Subash Thanappan

    Published 2022-01-01
    “…The titanium nanotube arrays (TNAs) were fixed as anode for dye-sensitized solar cell application. The execution of dye-sensitized solar cells (DSSCs) is found on natural dyes removed out from natural materials. …”
    Get full text
    Article
  15. 1615

    Adultère, indices médicaux et recul de la torture à Genève (XVIIe siècle) by Sara Beam

    Published 2016-02-01
    “…In 1645, Nicolarde Boeuf was found to have syphilis and was charged with adultery, a crime that, when proven, sometimes resulted in a sentence of execution in Geneva.  When she denied the charges, she was tortured repeatedly, found guilty, and ultimately hanged. …”
    Get full text
    Article
  16. 1616

    Faith development of the teenager during the Sunday evening worship service by H. P. Jansen

    Published 2012-12-01
    “…The article would provide guidelines for all stakeholders that are involved in the planning and execution of the liturgy of the evening worship service. …”
    Get full text
    Article
  17. 1617

    Construction model of excellent team for communication research institutes by Youli HUANG

    Published 2016-12-01
    “…Finally, the effectiveness of the model was analyzed, and the results show that the model is effective in improving the train of thought,promoting the strategy execution ability and enhancing the creativity and cohesion of the research team.…”
    Get full text
    Article
  18. 1618

    Protocol for generating liver metastasis microtissues to decipher cellular interactions between metastatic intestinal cancer and liver tissue by Maria Lamprou, Ana Krotenberg Garcia, Saskia Jacoba Elisabeth Suijkerbuijk

    Published 2025-03-01
    “…We then detail procedures for immunofluorescence staining, mounting microtissues, and sorting cells.For complete details on the use and execution of this protocol, please refer to Krotenberg Garcia et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  19. 1619

    Protocol for assessing immune-target cell interactions using a single-cell cytotoxicity assay by Zhihao Wei, Konglan Lin, Min Huang, Shicheng Su, Yiwen Lu

    Published 2025-03-01
    “…This protocol facilitates observation of the dynamics of immune-target cell interactions at the single-cell level.For complete details on the use and execution of this protocol, please refer to Li et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  20. 1620

    Protocol for differentiating hematopoietic progenitor cells from human pluripotent stem cells in chemically defined monolayer culture by Shaokang Mo, Kengyuan Qu, Jun Shen, Kuangyu Yen

    Published 2025-03-01
    “…This protocol serves as a framework for exploring human hematopoiesis and generating various functional blood cells.For complete details on the use and execution of this protocol, please refer to Shen et al.1 and Qu et al.2 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article