Showing 241 - 260 results of 1,108 for search '"judge"', query time: 0.04s Refine Results
  1. 241

    La cuestión de la limpieza de sangre y la disimulación religiosa en algunos entremeses del siglo xvii : de la burla a la sátira social by Carine Herzig

    Published 2020-06-01
    “…The authors make fun of the society of their time and of some of these most remarkable "types" (such as the mayor or the local judge, for example), by resorting to ridicule and exaggeration. …”
    Get full text
    Article
  2. 242

    Construction of an Early Risk Warning Model of Organizational Resilience: An Empirical Study Based on Samples of R&D Teams by Si-hua Chen

    Published 2016-01-01
    “…It is of particular importance for enterprises to apprehend the intensity of organizational resilience and thereby judge their abilities to withstand pressure. By conducting an exploratory factor analysis and a confirmatory factor analysis, this paper clarifies a five-factor model for organizational resilience of R&D teams. …”
    Get full text
    Article
  3. 243

    Des lieux pour un « non-lieu » : Le camp algérien Paul-Cazelles et Hocine Kahouadji, militant FLN by Susan Slyomovics

    Published 2019-06-01
    “…Based on the development of incarceration by French authorities through the continuous and dynamic use of the law, multiple spaces of detainment were created to accommodate populations under the legal condition of “non-lieu” (illegal detention): absent sufficient charges against the indicted party, the investigating judge dismisses the case with “non-lieu.” Despite decisions of “non-lieu” rendered by the French legal system, many Algerian FLN militants arrested in France were kept imprisoned serially in carceral sites and transferred from metropolitan prisons to Algeria’s colonial ones. …”
    Get full text
    Article
  4. 244

    Critical Analysis of Retrials Causes in Iran’s Act of Civil Procedure: With Comparative Study in French Law by Ali Abbas Hayati

    Published 2018-07-01
    “…The first case happens when it is proved that the judgment has been pronounced based on false testimony or witness statement or oath, and second case happens if it is demonstrated before the court that the issuing judge has gone wrong that is effective in being the judgment unjust.…”
    Get full text
    Article
  5. 245

    Landscapes as Narrative Commentary in Cormac McCarthy’s Blood Meridian or the Evening Redness in the West by Dianne C. Luce

    Published 2017-12-01
    “…Each of these scenes bears a title reminiscent of painted landscapes, such as “Under the Animas peaks” or “Night scene with moon, blossoms, judge.” Each comprises a static composition that slows the violent action and also functions as a prose poem, rich in allusiveness. …”
    Get full text
    Article
  6. 246

    Effects of Adding End Information on the Happiness Judgment: by Yoshitsugu Fujishima

    Published 2024-10-01
    “…These results suggest that ending information can be used to judge happiness only when it becomes more salient. …”
    Get full text
    Article
  7. 247

    Pedro Boza (1660-1715) : au service de la justice dans la sierra zapotèque du Mexique by Thomas Calvo

    Published 2019-01-01
    “…Towards the end of his life, as a simple witness of assistance, apparently without any power, he was able to take advantage of the circumstances, to become indispensable in the judicial mechanisms, acting simultaneously as clerk and quasi-judge. In this way he helped to normalize the life of the province. …”
    Get full text
    Article
  8. 248

    Precision and Recall Ratios in Evaluating The Quality of Literature Searches by Nazlı Alkan

    Published 1994-12-01
    “…These two criteria frequently used to judge the performance of searches. Significance of Precision and Recall is described and definitions are given. …”
    Get full text
    Article
  9. 249

    Vehicle anti-collision algorithm based on vehicle to vehicle communication by Yourong CHEN, Jinhao WAN, Junjie CHEN, Tiaojuan REN

    Published 2016-11-01
    “…In order to improve the accuracy of predicting vehicle collision accidents and reduce the probability of collision accidents,vehicle anti-collision algorithm(VACA)based on vehicle to vehicle communication was proposed.According to Beidou location coordinates of vehicle itself and other vehicles in the vicinity,VACA used Kalman prediction algorithm to predict next vertical and horizontal locations of vehicles.VACA used data prejudge method to directly judge whether collision will happen.When it could't be directly judged,safe distance with variable acceleration was calculated,and collision state prediction model was established and solved,then minimum collision prediction time could be obtained.If the minimum time was less than threshold value,alarm signal would be sent to remind driver.Simulation results show that compared with IVCWM and ECWA,VACA can predict collision accident more accurately and has certain application value.…”
    Get full text
    Article
  10. 250

    Calculation and Analysis of Meshing Contact of Involute Spur Gear by Yuda Wang, Lü Hongzhan, Zhiyong Hou, Shuyan Wang, Weiguang Ma, Feng Li

    Published 2021-12-01
    “…The analysis of meshing process of involute spur gear is an important basis to judge the transmission quality,and especially contact stress,transmission error and meshing stiffness are key indexes. …”
    Get full text
    Article
  11. 251

    La promotion d’une idéologie carolingienne autour de la reine Gerberge (milieu duXe siècle) by Justine Audebrand

    Published 2019-06-01
    “…As the sister of the powerful Otto I, she was well placed to judge the balance of power between Otto and the Carolingians, and she began to construct, in collaboration with Bishop Rorico of Laon, a discourse aimed to counteract Ottonian supremacy. …”
    Get full text
    Article
  12. 252

    FAULT DIAGNOSIS OF PUMPING UNIT BASED ON GLOBAL AND LOCAL FEATURES by ZHAO XinYu, FAN Jun, HE Fang, TANG LiWen

    Published 2023-12-01
    “…In order to accurately and timely judge the fault location of pumping unit and change the inefficient manual fault diagnosis mode, a fault identification method of pumping unit based on Mahalanobis Taguchi system was proposed . …”
    Get full text
    Article
  13. 253

    The use and trust of information sources related to the efficacy and safety of dietary supplements among US vs Chinese consumers: an exploratory study by Andrew M. Forman, Ven Sriram

    Published 2025-01-01
    “…Dietary supplements are generally exempt from strict governmental regulations, leaving consumers to rely on various information sources to judge the safety and efficacy of these products. …”
    Get full text
    Article
  14. 254

    A cozinha e a mesa em Loulé medieval nos seus utensílios de uso comum: o testemunho dos Inventários de Órfãos by Iria Gonçalves

    Published 2019-03-01
    “…The documents of the so-called Fund of the judge of the orphans of Loulé, from the Historical Archive of this city, are rare pieces in the Portuguese medieval context, with enormous interest for the study of medieval orphanage. …”
    Get full text
    Article
  15. 255

    The Network behind the Chronicle by Leah Shopkow

    Published 2023-07-01
    “…Richard Poore heard Andres’s case as a judge-delegate, and was probably responsible for it being returned to the pope for final judgment. …”
    Get full text
    Article
  16. 256

    Efficiently computing RKN for keyword queries on XML data by HENZi-yang C, ANGXuan W, ANGXian T

    Published 2014-07-01
    “…Considering that existing methods cannot correctly identify RKN for ELCA semantics,the definitions of RKN and the RKN-Base algorithm were proposed,which can correctly judge whether a given node is an RKN of some ELCA node by sequentially scanning the set of inverted lists once. …”
    Get full text
    Article
  17. 257

    Christian gacaca and Official gacaca in Post-genocide Rwanda. by Philippe Denis

    Published 2019-01-01
    “… In October 1998, a think tank of the Rwandan state proposed the establishment of gacaca jurisdictions - popular courts charged with judging the people involved in the genocide against the Tutsi. …”
    Get full text
    Article
  18. 258

    AN AXIAL STIFFNESS JUDGMENT METHOD FOR LIMIT-POINT BUCKLING OF SPATIAL COMPRESSION MEMBERS by ZHOU QiCai, LI WenJun, WU QingLong, XIONG XiaoLei

    Published 2016-01-01
    “…Studies show that the buckling of local compression members may happen before the overall buckling of bars structures,and the axial stiffness judgment method can precisely judge the buckling of spatial compression members in engineering structures.…”
    Get full text
    Article
  19. 259

    Software behavior trust forecast model based on check point scene information by Junfeng TIAN, Yuhui GUO

    Published 2018-09-01
    “…In order to ensure the trustworthiness of software,and evaluate the trusted status of the software after running for a period of time by monitoring software behavior dynamically,a software behavior trust forecast model on checkpoint scene information which was called CBSI-TM was presented.The model set up a number of checkpoints in the software running track,and introduced the time increment of adjacent checkpoints,and the change of CPU utilization rate to define the scene information,and reflected the relationship between adjacent checkpoints scene information.Then the RBF neural network classifier evaluated the status of the current checkpoint to judge the trustworthiness of the software,and the semi weighted Markov model predicted the situation of the next checkpoint to evaluate the trustworthiness of future running trend of the software.The experimental results show that the CBSI-TM model can predict the future trusted status of the software effectively,and verify that the model is more reasonable and effective.…”
    Get full text
    Article
  20. 260

    Reputation mechanism based on multi-path routing protocol in ad hoc networks by CUI Guo-hua, LU She-jie, LIU Zhi-yuan, GENG Yong-jun

    Published 2008-01-01
    “…After receive all the pieces of a data packet,the destina-tion node could judge whether a malicious modification had been occurred,if so,the malicious node would be found out or be located in a malicious-node-group by a detecting process. …”
    Get full text
    Article