-
641
Women’s mountaineering and dissonances within the mountain guide profession
Published 2013-10-01“…Within a profession normed by a myth of masculinity, female clients may indeed send out dissonant signals: on the one hand, they allow the production of expected signs of masculinity, on the other, they may symbolise a feminisation of professional skills, which, in the hierarchy of gender, is stigmatising. In this respect, the guides negotiate a compromise by manoeuvring between the multiple axiological frameworks, which construct and validate both their gender and professional identities. …”
Get full text
Article -
642
Low-Carbon Supplier Selection Using Fuzzy AHP and Goal Programming Approach
Published 2022-01-01“…This study fills this gap by incorporating carbon emission criteria into supplier selection and presenting a method of combining fuzzy analytic hierarchy process (AHP) and fuzzy goal programming (GP) to address the problem of supplier selection and order quota allocation. …”
Get full text
Article -
643
Wiara w życiu i postawie moralnej człowieka w świetle encykliki Lumen fidei papieża Franciszka
Published 2013-11-01“…It cannot be isolated as well from an accepted hierarchy of moral values and one’s own vision as a man. …”
Get full text
Article -
644
State’s Authority Concerning Health Protection in Ordinary Times and During Epidemics
Published 2022-01-01“…It is the role of the healthcare institution to create such conditions, in which the safest and the most effective methods of treatment and prevention are available, and the individual can consciously select which of these realises his or her good to the greatest extent, in accordance with the recognised hierarchy of values, the accepted worldview, and life goals. …”
Get full text
Article -
645
Two Stages of Turkey’s Quest for a Regional Power Status in the Middle East: An Integrated Role- Status-seeking Approach
Published 2020-12-01“…This integrated approach suggests that the role rientations of aspiring regional power and regional counter-roles determine the level of status recognition of that regional power in a given regional power hierarchy. Using this approach, the paper examines the fluctuations in Turkey’s pursuit of regional power status in the Middle East over two uneven stages before and after the Arab Spring. …”
Get full text
Article -
646
Quand les hommes se font passer pour des garçonnes : de l’agentivité du travestissement en moga dans le Japon de l’entre-deux-guerres
Published 2023-02-01“…On the other hand, the emergence of the flapper in Japan certainly prompted the rise of a femininity that challenged the hierarchy between the sexes. But the flapper figure also inspired the constitution of new subjectivities among men who “recognized” themselves in her. …”
Get full text
Article -
647
Monjas, esposas y madres católicas: una panorámica de la feminización de la religión en España a mediados del siglo XIX
Published 2012-09-01“…The hypothesis we will agree is that the feminization of the catholic discourse in the middle of nineteenth century made possible the development of a form of religious life previously refused by the ecclesiastic hierarchy, the feminine congregations of active life. …”
Get full text
Article -
648
La dimension internationale de la recherche en sciences de l’éducation et de la formation : normes académiques, spécificités et paradoxes
Published 2020-06-01“…This article questions the hierarchy of disciplines, cultures and forms of research for the benefit of international cooperation in the 21st century with a view to human development.…”
Get full text
Article -
649
Application of Multilevel Models to Morphometric Data. Part 2. Correlations
Published 2003-01-01“…The most distinct feature of these methods is that separate correlation (covariance) matrices are produced for every level in the hierarchy. In karyometric research, the cell‐level (i.e., within‐tumor) correlations seem to be of major interest. …”
Get full text
Article -
650
Recht sprechen über »besondere Gebilde« – die koloniale Gerichtsbarkeit und das Reichsgericht
Published 2023-09-01“…It then analyses the structure of the so-called »non-native jurisdiction« in the German colonies as an element of colonial state order. A hierarchy of courts was established that reached up to the Reichsgericht in Leipzig. …”
Get full text
Article -
651
Конфессиональная лексика в русском переводе энциклики папы Франциска Laudato si’ – пространство традиции и современности...
Published 2021-10-01“…It was assumed that the encyclical is addressed not only to the representatives of the Church hierarchy but also to all the faithful. Hence, there was the need to draw attention to the pragmatic aspects of the religious language, including the balance between comprehensibility and the use of specialist theological terminology in the translated text. …”
Get full text
Article -
652
Effective Natural Supersymmetry from the Yukawa Deflected Mediations
Published 2017-01-01“…The first generation of squarks can be effectively larger than several TeV which does not introduce any hierarchy problem in order to escape the constraints from LHC. …”
Get full text
Article -
653
Developing participatory tourism in Milan, Italy
Published 2016-07-01“…They also stimulate a reversal of the traditional hierarchy between tourists and residents. Major critical aspects are expressed in reference to different levels of analysis, such as in relation to the capacity building scope of initiatives, or how they might reproduce cultural stereotypes. …”
Get full text
Article -
654
A Wireless Access Multimode Gateway System Applied in Internet of Vehicle
Published 2014-04-01“…Meanwhile, the selection strategy of wireless access network was studied according to the different business classifications to obtain the corresponding weight distribution by using analytic hierarchy process, in order to achieve the optimum network performance. …”
Get full text
Article -
655
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01“…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
Get full text
Article -
656
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
657
The Measurement of Chinese Sentence Semantic Complexity
Published 2020-01-01“…The predication structures are extracted based on the result of sentence-based syntactic analysis, and then the linear expression sequence of a sentence is converted into a semantic hierarchy based on predicate semantic frameworks; the universality of predicate semantic frameworks is obtained by using the spectral clustering algorithm; and the sentence semantic complexity depends on the universality of predicate semantic frameworks at various layers. …”
Get full text
Article -
658
Research misconduct in China: towards an institutional analysis
Published 2025-01-01“…Drawing on the criminology literature on organisational deviance, as well as the concept of cengceng jiama , which illustrates the increase of pressure in the process of policy implementation within a top-down bureaucratic hierarchy, this article develops an institutional analysis of research misconduct in Chinese universities. …”
Get full text
Article -
659
.A Critical Review of the Book Entitled Methodology of Religious Studies
Published 2020-07-01“…Of course, the author has made great efforts to document the methods using religious texts; however, the base of most parts of the book is the same as the common sciences. To explain the hierarchy of religious science, to set up a methodological system appropriate to Islamic worldview, ontology, and epistemology, a serious effort of religious scholars is needed in order to development of the methodology of Islamic humanities.…”
Get full text
Article -
660
Polish-English Terminology of Tari Law as a Challenge for an ESP Translator
Published 2022-11-01“…This study attempts to examine the following phenomena: translator's experience and linguistic competence (their hierarchy) in the process of translating specialistic texts in the field of tariff law as well as the equivalence of translations in the abovementioned subject matter. …”
Get full text
Article