-
21
Wikipédia à tous les étages. Usages de l’encyclopédie pour l’enseignement en géographie
Published 2021-06-01“…Despite these recommendations, students massively use Wikipedia for information retrieval, while considering, after their teachers, that it is an illegitimate source of information. Thus, the encyclopedia has an ambivalent status, it is both used and despised by students and teachers while very few of them are contributors. …”
Get full text
Article -
22
‘If this is of God’: Choosing to Curse in Ghanaian Charismatic Christianity
Published 2021-12-01“…It shows that it is not only the motive and intention of the one at prayer but also the cultural and religious values that make cursing prayers legitimate or illegitimate. …”
Get full text
Article -
23
« On ne devrait exiger de personne de parler dans un micro ». Les débats autour de la présence des micros dans les prétoires dans la RFA des années 1950
Published 2024-10-01“…A critical discourse denouncing the presence of microphones as illegitimate and dangerous coexisted with a more open discourse, albeit in a minority. …”
Get full text
Article -
24
The use of big data in interdisciplinary research on example of the Greater Mediterranean macroregion
Published 2022-09-01“…Among the main problems and threats, the authors consider the following: personal data confidentiality breach, and increased data manipulation for political purposes, the emergence of illegitimate forms of citizens self-organisation, the transition of Internet users to anonymous accounts due to the practice of “privatization” of personal data by non-state and terrorist groups in regional spaces, preventing the qualitative collection of data. …”
Get full text
Article -
25
Secure Multicast Routing Algorithm for Wireless Mesh Networks
Published 2016-01-01“…SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.…”
Get full text
Article -
26
Crimillegal Orders: Revisiting Organized Crime’s Political Power
Published 2016-05-01“…Taking recourse to the conceptions of political order put forward by Weber, Fukuyama and North, Wallis and Weingast, I explain how regular patterns of social exchange and interaction - involving public and private, and state and non-state actors - that span an assumed divide between the realms of legality (“legitimate upper world”) and criminality (“illegitimate underworld”) influence the character, shape and evolution of political order. …”
Get full text
Article -
27
En chair et en os ? Sens, sensations et sensationnalisme dans Desperate Remedies (1871) de Thomas Hardy
Published 2007-03-01“…This paper explores how Thomas Hardy reworks the literary conventions of the sensation novel in Desperate Remedies. Featuring an illegitimate child, a husband suspected of bigamy, drugs, poisons and characters hiding beneath deceitful appearances, Desperate Remedies revisits Victorian sensationalism and investigates sensations and the senses in a brand new way.…”
Get full text
Article -
28
Representing succession: Tudor royal portraits, 1544–1546: context, production and analysis
Published 2025-12-01“…In preparation for an invasion of France in 1544, Henry VIII signed his third Act of Succession, an inflexion point in his reign which established his two daughters, formerly declared illegitimate, as official heirs to his kingdom. This inclusion had been vigorously advocated by their stepmother, Henry’s sixth queen, Kateryn Parr (1512–1548). …”
Get full text
Article -
29
SUCCESSES AND FAILURES OF FOREIGN POLICY OF NICHOLAS I (ACCORDING THE MEMORIES OF CONTEMPORARIES)
Published 2017-11-01“…These reminiscences make it possible to discover the attitude of Nicolas I to the European revolutions in the first half of XIX-th and illegitimate monarchs in Europe. They let us track the way the foreign policy influenced the Russian inner policy. …”
Get full text
Article -
30
Fast Antinoise RFID-Aided Medical Care System
Published 2015-10-01“…Besides, because our scheme enables a nurse to target specific group tags during a medicine round, it is able to generate proofs even when the illegitimate tags are on site. We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. …”
Get full text
Article -
31
IS TRANSLANGUAGING LEGITIMATE IN ENGLISH LEARNING?: STUDENTS’ PERSPECTIVES FROM INDONESIA
Published 2024-12-01“…However, the teachers still think it is an illegitimate practice. Therefore, this research aims to support the idea of using Indonesian language in English language learning and explore its practice for students scaffolding. …”
Get full text
Article -
32
Support Vector Machine for Behavior-Based Driver Identification System
Published 2010-01-01“…We propose to recognize illegitimate drivers through their driving behaviors. …”
Get full text
Article -
33
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
34
Improved QRD-M Detection Algorithm for Generalized Spatial Modulation Scheme
Published 2017-01-01“…Then, in the searching process of the M branches, the branches corresponding to the illegitimate transmit antenna combinations (TACs) and related to invalid number of active antennas are cut in order to improve the validity of the resultant branches at each level by taking advantage of characteristics of GSM signals. …”
Get full text
Article -
35
Jurisprudential and Legal Principles and Rules Corresponding to the Obtaining of Evidence in Iranian Criminal Law Emphasizing the Procedure of the International Criminal Court
Published 2021-01-01“…Among the most important principles governing the obtaining of evidence in Iranian criminal law and the International Criminal Court, we can name the principle of legitimacy of obtaining of evidence, the presumption of innocence, the principle of free evaluation of evidence, the principle of freedom of obtaining of evidence, and the principle of legality of evidence that non-observance of these principles and obtaining of evidence through illegitimate ways is not only against human rights and the dignity of humans and the administrators of justice but also causes a reversal of the verdict in the Court of Appeal. …”
Get full text
Article -
36
Russian-Greek Political and Ecclesiastical Relations in 20-30s of the 19th Century
Published 2020-07-01“…After the start of the Greek uprising in 1821, Russia took an ambivalent position: as a patron of all orthodox Christians in the Ottoman Empire, it sought to support the Greeks, but Russia also had to recognize the Greek revolution as an illegitimate rebellion. As a member of the Holy Alliance of European Powers Russia had no other choice but to adhere to the principles of legitimism. …”
Get full text
Article -
37
Post-verbal agreement and obligatory presence of particle to in Polish dual copula clauses
Published 2024-12-01“…The examination shows that T-NPNOM2 φ-Agree in DCCs under consideration cannot be established as SpecTP-movement of NPNOM2 is illegitimate; NPNOM2 if formally and syntactically part of Pred’ and is also farther from T than NPNOM1, the pre-verbal nominal expression. …”
Get full text
Article -
38
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01“…The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer of information.…”
Get full text
Article -
39
Children «on the side»: feeding industry on territory of Tavrida Province in late XIX–early XX centuries
Published 2021-09-01“…The disintegration of the patriarchal family entailed a massive exodus of women to cities, which in turn turned out to be on the quantitative indicators of illegitimate births. Lack of funds for food, prompted mothers to leave the child to the mercy of fate. …”
Get full text
Article -
40
Assessing the Impact of Corruption on Human Rights and Civil Liberties during COVID-19 in South Africa
Published 2024-11-01“…For a while, this kind of regulation and issuing of tenders through illegitimate processes has been politically discussed as one of the factors that impoverish the state and increase corruption. …”
Get full text
Article