Showing 501 - 520 results of 1,415 for search '"hierarchy"', query time: 0.04s Refine Results
  1. 501

    À propos des Relatives Appositives. Syntaxe, sémantique, pragmatique by Jean-Charles Khalifa

    Published 1999-12-01
    “…On the basis of a representative sample of 500, we try to lay the groundwork of a typology of NRRCs, showing in particular that the relative frequency of each of the 4 types we distinguish falls perfectly in line with the “perceptual hierarchy” proposed by psycholinguistics, not only for NRRCs, but for restrictive clauses as well, and which reflects syntactic complexity. …”
    Get full text
    Article
  2. 502

    Intervention publique versus régulation professionnelle by Amandine Rauly

    Published 2015-06-01
    “…To do this, new organizational and technological devices are established and alter production relations and medical care hierarchy. These changes induce conflicts that freeze the deployment of telemedicine until a new institutional compromise emerges.…”
    Get full text
    Article
  3. 503

    La pédagogie des compétences dans le primaire catholique ivoirien by Rodrigue N’sanman

    Published 2023-06-01
    “…And this, of course, reinforces the tendency of the hierarchy to consider the staff as being docile. In actual fact, this is far from being the case. …”
    Get full text
    Article
  4. 504

    Research on national security risk assessment model of open government data by Biao WANG, Xingyang LIU, Ka XU, Wangyang LIU, Kenan WANG, Yuqing XIA

    Published 2020-12-01
    “…As an important strategic resource of national and social development,the government open data is of great value.But China lack standards in the security risk assessment of government open data,especially the security of national data is at risk.Based on the theory of information security risk assessment,a government open data security risk assessment model was constructed with national security assets,open data vulnerability and security threat as the main security risk elements.Analytic hierarchy process (AHP) and fuzzy comprehensive evaluation methods were used to quantify and evaluate the security risks of government open data,and the validity of the model is verified by example.…”
    Get full text
    Article
  5. 505

    Exemplum virtuose vivendi. Zamyšlení nad vzorem svatosti Kateřiny ze Sieny a nad jeho proměnami v běhu dějin by Kateřina Čadková

    Published 2012-01-01
    “…First of all the problem of interaction between the saint (male or female) and its social background (confessors, regular order, friends and relatives, social and ecclesiastic hierarchy) has to be faced, as well as the historical context, which the sources were originating from. …”
    Get full text
    Article
  6. 506

    Power PTN security comprehensive evaluation based on power application by Lidan GAO, Fengjie SUN, Guojun LIU, Jianqi LI

    Published 2015-12-01
    “…Abstract:Traditional multi service transport network based on SDH has a low adaptability to the data service and flexibility.PTN technology which makes up the deficiency of the original SDH network is a good supplement to SDH network.According to the requirements of security performance in PTN equipment,the technology and theory of multi index comprehensive evaluation was studied by referring to the relevant standards,the key evaluation index of power PTN security performance test was put forward.Finally,the security performance of the three models was evaluated by using the analytic hierarchy process and fuzzy evaluation system,and the feasibility of the evaluation system was verified.…”
    Get full text
    Article
  7. 507

    Ontology model based on security parameters capturing process for network systems by Tao LI, NJiu-chuan LI, Ai-qun HU

    Published 2017-02-01
    “…Multiple attributes such as information source and hierarchy were abstracted, which were benefit for analysis of se-curity parameters. …”
    Get full text
    Article
  8. 508

    Réseaux catholiques féminins. Une perspective de genre sur une mobilisation transnationale. by Magali Della Sudda

    Published 2013-12-01
    “…However, the networks were reactivated after the War under the control of the Holy See, confirming the ambiguous place of lay women within the Church hierarchy.…”
    Get full text
    Article
  9. 509

    Application analysis of fgOTN in power communication network by LIU Jianming

    Published 2025-01-01
    “…For the application of fine grain optical transport network (fgOTN) technology in power communication network, the evolution of fgOTN technology and its characteristics were deeply analyzed, and compared with synchronous digital hierarchy (SDH) and optical transport network (OTN), it was found that fgOTN had powerful management and control capabilities, flexible networking and service bearing capabilities, reliable protection mechanisms, and good compatibility and evolution capabilities, which were suitable for communication network applications in industries such as electric power.…”
    Get full text
    Article
  10. 510

    Colonialité et occidentalocentrisme : quels enjeux pour la production des savoirs ? by Rachel Solomon Tsehaye, Henri Vieille-Grosjean

    Published 2018-03-01
    “…Il also constitutes an analytical grid of the hierarchy in the spread of knowledge and the subsistence of subaltern groups.…”
    Get full text
    Article
  11. 511

    Devenir auxiliaire de puériculture en 1950 : parcours de formation des premières élèves de l’École de Bron by Zoé Poli

    Published 2023-10-01
    “…In the history of childcare professions, the second half of the 20th century saw the professionalization of early childhood carers but also the establishment of a hierarchy among these professions. One of the stages in this transition can be understood through the frameworks of the courses offering training in the profession of childcare assistant, where the diploma was instituted by the decree of 1947. …”
    Get full text
    Article
  12. 512

    Oprawy ksiąg biskupa warmińskiego Szymona Rudnickiego w zbiorach dawnej Biblioteki Katedralnej w Gnieźnie by Radosław Franczak, Michał Muraszko

    Published 2015-12-01
    “…Na każdej z omawianych opraw znajduje się superekslibris właściwy hierarchy. W tekście przedstawiono dwa rodzaje superekslibrisów duchownego, które mogą wskazywać na jego bibliofilskie zamiłowania.…”
    Get full text
    Article
  13. 513

    Creating a typology of parishes in England and Wales: Mining 1881 census data by Kevin Schürer, Tatiana Penkova

    Published 2015-09-01
    “…Cluster analysis is used in order to identify associations and structure within the data. A hierarchy of cluster structures is constructed with two, three, four and five clusters in 21-dimensional data space. …”
    Get full text
    Article
  14. 514

    LEACH protocol based security mechanism for Sybil attack detection by CHEN Shan-shan1, YANG Geng2, CHEN Sheng-shou2

    Published 2011-01-01
    “…Low energy adaptive clustering hierarchy(LEACH) could effectively reduce energy consumption of wireless sensor network(WSN).However,a novel security mechanism was proposed based on LEACH protocol called LEACH-S in order to improve the security performance of WSN.The mechanism adopted a received signal strength indicator(RSSI) based policy for Sybil attack detection in WSN,and a reasonable threshold was chosen to initialize Sybil attack detection strategy in which case attack may occur with high possibility.The simulation results show that the mechanism can detect Sybil attack effectively at the cost of low energy consumption.…”
    Get full text
    Article
  15. 515

    Мотив семейного разлада в русской беллетристике о жизни духовенства 1860–1870-х гг. by Marta Łukaszewicz

    Published 2018-06-01
    “…The examination of several literary works of the 1860s and 1870s has shown that it is the depiction of the negative aspects of clergymen's family life that dominates, the reasons for which being different moral principles, hierarchy of values and major life objectives. Usually it is a priest's wife that is presented as a negative character, although the opposite may be also observed. …”
    Get full text
    Article
  16. 516

    Weakly Coupled B-Type Kadomtsev-Petviashvili Equation: Lump and Rational Solutions by Na Xiong, Wen-Tao Li, Biao Li

    Published 2020-01-01
    “…Through the method of ZN-KP hierarchy, we propose a new (3+1)-dimensional weakly coupled B-KP equation. …”
    Get full text
    Article
  17. 517

    Application of Balanced Scorecard in Performance Management and Evaluation of Listed Companies by Xuqin Song

    Published 2022-01-01
    “…Finally, we use the analytic hierarchy process (AHP) to conduct a comprehensive performance evaluation of enterprise A and propose corresponding safeguards for the smooth implementation of the system according to the evaluation results.…”
    Get full text
    Article
  18. 518

    Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection by MA Lin-ru1, YANG Lin2, WANG Jian-xin2, TANG Xin2

    Published 2006-01-01
    “…A new similarity membership function based on the attribute hierarchy tree was defined in the process of clustering. …”
    Get full text
    Article
  19. 519

    Les syndicats, les commissaires et le politique : (re)valorisations et conflits autour de la profession policière en Tunisie (2011-2022) by Audrey Pluta

    Published 2023-12-01
    “…While police chiefs held the key positions of power under Ben Ali, uniformed officers now tend to occupy positions in the senior ministerial hierarchy. These developments point to the emergence of a new generation of security executives. …”
    Get full text
    Article
  20. 520

    Organizacijska kultura v izbrani pravni osebi javnega sektorja [Organisational Culture in Selected Legal Entity in Public Sector] by Sonja Belac, Katarina Košmrlj, Mirko Markič

    Published 2017-06-01
    “…The results of the survey revealed that AJPES is dominated by a hierarchy culture and that in the opinion of employees, the organisation’s preferred or future culture should be a clan culture type in all its aspects. …”
    Get full text
    Article