Showing 1,841 - 1,860 results of 1,895 for search '"hierarchical"', query time: 0.05s Refine Results
  1. 1841

    « No guys with attitude ». Sociabilité et hiérarchie sexuelle dans une sex party gaie de New York by Etienne Meunier

    Published 2014-07-01
    “…Participants clearly felt that some parties were hierarchized, especially because of the “guy with attitude,” a young and attractive, but denigrating young man. …”
    Get full text
    Article
  2. 1842

    Conceptualizing the personal outcomes of information by J. Kari

    Published 2007-01-01
    “…The outcomes are then analysed hierarchically by dividing them into categories which are further divided into subcategories, until a concrete enough level is reached. …”
    Get full text
    Article
  3. 1843

    Biomimetic fabricated tubular graft in situ immobilized with peptides to restore the vascular structure and regulate the inflammation homeostasis through gastrodin coating by Shiwei Niu, Fan Li, Zhi Lin, Bo Chen, Lechun Lyu, Yongliang Jiang, Wanting Li, Jianlin Jiao, Yi Han, Di Lu, Lin Sun

    Published 2025-03-01
    “…The synthesis process was characterized, its biocompatibility, hierarchically cell induction capacity, anticoagulant effect and the ability to promote neovascularization were evaluated. …”
    Get full text
    Article
  4. 1844

    Development and achievement of aspirations among unaccompanied refugee minors by Elin Sofia Andersson, Pål Ulleberg, Ane-Marthe Solheim Skar, Vivian Tvedt, Marit Solhaug Næss, Tine K. Jensen

    Published 2025-12-01
    “…The qualitative analysis indicated how most of the youth organized their aspirations hierarchically according to their needs, and how aspirations are culturally and socially embedded. …”
    Get full text
    Article
  5. 1845

    App-DDoS detection method using partial binary tree based SVM algorithm by Bin ZHANG, Zihao LIU, Shuqin DONG, Lixun LI

    Published 2018-03-01
    “…As it ignored the detection of ramp-up and pulsing type of application layer DDoS (App-DDoS) attacks in existing flow-based App-DDoS detection methods,an effective detection method for multi-type App-DDoS was proposed.Firstly,in order to fast count the number of HTTP GET for users and further support the calculation of feature parameters applied in detection method,the indexes of source IP address in multiple time windows were constructed by the approach of Hash function.Then the feature parameters by combining SVM classifiers with the structure of partial binary tree were trained hierarchically,and the App-DDoS detection method was proposed with the idea of traversing binary tree and feedback learning to distinguish non-burst normal flow,burst normal flow and multi-type App-DDoS flows.The experimental results show that compared with the conventional SVM-based and naïve-Bayes-based detection methods,the proposed method has more excellent detection performance and can distinguish specific App-DDoS types through subdividing attack types and training detection model layer by layer.…”
    Get full text
    Article
  6. 1846

    A Phenomenology of Closed Society in “The Drowned Girl” by Antanas Vienuolis: Anthropological Profiles by Jūratė Levina

    Published 2023-12-01
    “…Such mechanisms are foregrounded on three planes: (1) social, of the rules of relationships between people, which in the story constitute a hierarchal system of power relations modelled on the structure of the traditional family of the agricultural holding, (2) significative, comprising sense-making discourses (traditional customs and Christianity) whereby the culture, in this story, configures the world without transcending corporeally perceivable horizons of the actually lived present, and (3) anthropological, where sociocultural praxis and self-perception are grounded in the essentially unhuman nature which the culture tries to assimilate and erase without recognising its essential otherness. …”
    Get full text
    Article
  7. 1847

    Desenvolvimento de um índice de vulnerabilidade em saúde nos municípios do Ceará by Gerlânia Maria Rocha Sousa, Maria Elisa Zanella, Patrícia Verônica Pinheiro Sales Lima, João Luís Sampaio Olímpio, Marysol Dantas de Medeiros, Andréa Ferreira da Silva

    Published 2023-12-01
    “…The index was calculated using statistical multivariate analysis techniques, making it possible to hierarchize the municipalities of Ceará in terms of the vulnerability studied. …”
    Get full text
    Article
  8. 1848

    Cidades e exclusão social: o Sul dentro do Sul, o Norte dentro do Sul by Marília Veríssimo Veronese

    Published 2013-01-01
    “…From the debate sparked by the presentation made by Professor Jaqueline Pólvora, in the first edition of the cycle of Debates Brasil-Cabo Verde, Cities and social exclusion, we seek to make connections with the research project entitled "In search of South epistemologies: knowledge about collective life between groups 'underlings'", which sought to identify the knowledge and social practices produced and experienced by groups considered inferior to the hegemonic logics of hierarchization of knowledge and social recognition. Considering the urban space as a place of production of thinking, practices and modes of subjectivation, concerning groups "underlings", we approach a snip of the project, seeking to understand the North-South relations within the South, i.e. to analyze how a group, inserted in an upper-middle-class neighborhood in Porto Alegre, RS, constructs their representations of collective life, in a territory whose surroundings often proves hostile. …”
    Get full text
    Article
  9. 1849

    Lier récits de vie et récits historiques  by Irène Dos Santos

    Published 2022-07-01
    “…These case studies also reveal the complexity of social, political and ethno-racial affiliations in this postcolonial post-imperial context and challenge the social hierarchization inherited from the past and the silence surrounding this heritage.…”
    Get full text
    Article
  10. 1850

    Multi-tenant virtual domain isolation construction method based on L-DHT by Lifeng CAO, Xin LU, Zhensheng GAO, Xuehui DU

    Published 2020-06-01
    “…Aiming at the problem of security isolation of multi-tenant data in cloud environment,a tenant virtual domain isolation construction method based on L-DHT was proposed.Firstly,through the design of multi-tenant isolation mapping algorithm based on label-hash mapping,the balanced mapping mechanism of tenant resources was constructed to realize the distributed management of tenant resources.Secondly,for the security isolation and access between tenant data mapped to the same storage node,based on the predicate encryption mechanism,through the effective binding of security labels and tenant data,a tenant data isolation storage algorithm based on label predicate encryption was designed.Finally,by the design of multi-dimensional tenant data isolation control rules and using the analysis and authentication of security labels,independent,logical and secure virtual domains between tenants were built hierarchically.The security analysis shows that the method constructs tenant virtual domains which are secure and non-interference with each other.The simulation results show that the mapping algorithm can achieve a better dynamic load balance.The efficiency and security of data access are verified by the comparative analysis of tenant data retrieval efficiency and authentication access security.…”
    Get full text
    Article
  11. 1851

    Participations by Mariekie Burger

    Published 2022-10-01
    “…This framework has been criticised in the scholarly discipline of Development Communication and Social Change for being diffusion-based in nature, for its rigid linearity and subsequent hierarchically unequal power relationships, and for its uncritical validation of a particular form of knowledge. …”
    Get full text
    Article
  12. 1852

    Du surveillant général cerné par les murs au conseiller principal d’éducation, passeur de frontières by Christine Focquenoy

    Published 2019-03-01
    “…They reveal a daily life confined by architectural, symbolical and hierarchal walls. The wall metaphorically reflects the educational relationship. …”
    Get full text
    Article
  13. 1853

    Gina Pane and Krzysztof Jung: Queer Love in European Performance Art of the 1970s by Paweł LESZKOWICZ

    Published 2024-12-01
    “…I will analyze ground-breaking performances by Pane and Jung from the 1970s in order to look comparatively at queer art and performance of the time, and also question the way European art history is divided hierarchically into cultural centers and peripheries. …”
    Get full text
    Article
  14. 1854

    Enhancing the Efficiency of a Decision Support System through the Clustering of Complex Rule-Based Knowledge Bases and Modification of the Inference Algorithm by Agnieszka Nowak-Brzezińska

    Published 2018-01-01
    “…In this work, the author introduces an optimization of both the knowledge base structure and the inference algorithm. Hence, a new, hierarchically organized knowledge base structure is proposed as it draws on the cluster analysis method and a new forward-chaining inference algorithm which searches only the so-called representatives of rule clusters. …”
    Get full text
    Article
  15. 1855

    Prémisses de la critique textuelle dans la culture écrite du XVIII-e siècle by Eugen Pavel

    Published 2016-12-01
    “…An animator and mentor of the editing process would also be the Moldavian hierarch Leon Gheuca. The maturity of the textual criticism is reached in this period through the Bible from Blaj, published by Samuel Micu in 1795. …”
    Get full text
    Article
  16. 1856

    La transformation de l’école secondaire en Suède : marchandisation, dissolution et reconstruction des frontières institutionnelles et sociales by Mikael Palme, Elisabeth Hultqvist

    Published 2009-06-01
    “…In this increasingly hierarchic and structured universe, individual schools tend to occupy positions pertaining to specific niches. …”
    Get full text
    Article
  17. 1857

    Distinct plasmablast developmental intermediates produce graded expression of IgM secretory transcripts by Evelyn P. Sievert, Marissa C. Franke, Kayla B. Thomas, Yoseop Yoon, Yongsheng Shi, Roger Sciammas

    Published 2025-02-01
    “…We observed (1) graded μS-PAS usage during PC differentiation, (2) IRF4 and Blimp-1 functioned hierarchically to increase μ abundance as well as μS-PAS usage, and (3) graded μS populations did or did not express Blimp-1. …”
    Get full text
    Article
  18. 1858

    The study of reduplications in Kermānshāhi Kurdish based on morphological reduplication theory by Nasrin Azhideh, Seyyedeh Sareh Sadeghi

    Published 2024-07-01
    “…Putting aside repetitive words which are common between Persian and Kurdish, the rest of words have been hierarchically classified into seven groups; reduplicants involving only phonological similarity of the daughters, reduplicants involving phonological as well as semantic similarity of the daughters, particles, partial suffixal reduplication, partial prefixal reduplication, onomatopoeia and full reduplications. …”
    Get full text
    Article
  19. 1859

    Integrated environmental management model of air pollution control by hybrid model of DPSIR and FAHP by M.J. Mohammadizadeh, A.R. Karbassi, Gh.R. Nabi Bidhendi, M. Abbaspour

    Published 2016-12-01
    “…In this study, responses to improve the factors of pressure, stimulus, the current state and the impacts were examined and compared hierarchically. Finally, their priority relative to each other was achieved. …”
    Get full text
    Article
  20. 1860

    L’exploitation financière des secteurs populaires argentins by Pablo Ignacio Chena, Alexandre Roig

    Published 2018-01-01
    “…It produces the great differentials of the primitive accumulation and hierarchizes the world, taking in priority those that control the technologies of production of interest rates.…”
    Get full text
    Article