Showing 301 - 320 results of 1,108 for search '"judge"', query time: 0.05s Refine Results
  1. 301

    Les mobilisations des victimes de pesticides ont-elles modifié les pratiques des viticulteurs languedociens ? by Christian Nicourt

    Published 2016-05-01
    “…While local authorities are concerned about quality of drinking water, the market is like a judge examining only incriminating facts. The demand for organic wines is growing, while cellarmen customer’s even oenologists challenge winegrowers on their pesticide use. …”
    Get full text
    Article
  2. 302

    Employee performance appraisal using individual performance management by Erialdy Erialdy

    Published 2024-03-01
    “…Company performance is inseparable from individual’s role in carrying out their job duties as the driving force for running of the company, a leader can judge his employees when he knows that is done and produced by these employees, it is obtained from the individual employee success in carrying out a job.…”
    Get full text
    Article
  3. 303

    Mettre cartes sur table et parler de son territoire de l’eau : un (en)jeu pour les acteurs ? by Fabienne Barataud , Aude Arrighi, Amandine Durpoix 

    Published 2015-12-01
    “…This trial was carried out to ensure that the tool is complete and that it enables stakeholders to structure their responses by revealing, to their own satisfaction, those elements that they judge to be explanatory of their territory. It was then verified that, although they are restricted by the same regulatory framework, these territories are far from being identical in their structural and explanatory elements, and that the different stakeholders’ visions for the same territory do not tie in with each other, but are linked to their own objectives. …”
    Get full text
    Article
  4. 304

    Spatio-temporal systems in Chaucer’s language: A discourse-pragmatic analysis by Minako Nakayasu

    Published 2019-12-01
    “…Language has built-in spatio-temporal systems by which speakers judge how distant the situations they wish to express are from their domain, i.e. proximal or distal. …”
    Get full text
    Article
  5. 305

    Sentiment Analysis of Mobile Phone Reviews Using XGBoost and Word Vectors by Wang Zekai

    Published 2025-01-01
    “…Consumer reviews are an important source of data used to judge and examine consumer sentiment, and data mining for reviews of electronic products is an important way to help improve the design of electronic products. …”
    Get full text
    Article
  6. 306

    Particle Swarm Algorithms to Solve Engineering Problems: A Comparison of Performance by Giordano Tomassetti, Leticia Cagnina

    Published 2013-01-01
    “…Comparison is made both in terms of fixed iterations tests to judge the solution quality reached and fixed threshold to evaluate how quickly each algorithm reaches near-optimal solutions. …”
    Get full text
    Article
  7. 307

    Abuse Of Authority By State Officials In Corruption Cases: The Case Of Complete Systematic Land Registration Program by Ahmad Hadi Prayitno, Dwi Wahyono, M Rizal Bagaskoro

    Published 2025-02-01
    “…The judge’s decision in the corruption case involving the abuse of authority in The Complete Systematic Land Registration (Pendaftaran Tanah Sistematis Lengkap or PTSL) program underscores the importance of legal certainty in holding perpetrators accountable for actions that harm state and community finances. …”
    Get full text
    Article
  8. 308
  9. 309

    Právní institut apelace v pražském procesním traktátu Parvus ordinarius by Jakub Razim

    Published 2025-01-01
    “…Firstly, we know from the ownership note that it once belonged to Pavel of Slavíkovice, a liberal arts bachelor at the University of Prague, who worked as a notary and became a criminal judge of the clergy in Prague before 1436. Secondly, the Prague version of Parvus ordinarius met the needs of the domestic legal environment thanks to the gloss added to the treatise in the first half of the 14th century. …”
    Get full text
    Article
  10. 310

    An Improved ARIMA-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks by Qin Yu, Lyu Jibin, Lirui Jiang

    Published 2016-01-01
    “…Specifically, we improve the traditional time series ARIMA model to make traffic prediction and judge the traffic anomaly in a WSN. Simulated and real WSN traffic data gathered from University of North Carolina are used to carry out simulations on Matlab. …”
    Get full text
    Article
  11. 311

    OPTIMAL DESIGN ANALYSIS OF PCTFE SEAT STRUCTURE OF ULTRA-LOW TEMPERATURE BALL VALVE BASED ON RESPONSE SURFACE METHOD (MT) by ZHANG XiHeng, YU RongFang, ZHANG Chi, ZHOU Yi, SUN ShuaiJun

    Published 2023-01-01
    “…The stress-strain relationship of PCTFE, the material of low-temperature ball valve seat, under different working conditions was studied, and the tensile strength is the only important basis to judge the strength of PCTFE. The central combination design method was adopted, established the response surface model of stress on structural parameters, analyzed the interaction between parameters. …”
    Get full text
    Article
  12. 312

    Big data security analysis method based on self-update threat intelligence database by Yanfang HOU, Jinhua WANG

    Published 2018-03-01
    “…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
    Get full text
    Article
  13. 313

    Research on dynamic evaluation method of individual scientific impact under multiple key nodes by Shuang Ma

    Published 2023-09-01
    “…The pr(y)-index of a 5-year time window is more sensitive to judge the of influence on scientific career. Conclusion. …”
    Get full text
    Article
  14. 314

    Das valas comuns aos direitos humanos: a descoberta dos desaparecimentos forçados na Espanha contemporânea by Francisco Ferrándiz

    Published 2012-01-01
    “…In this sense, the series of Human Rights reports such as those by Amnesty International, but more clearly Judge Garzon¿s attempt at indicting Francoism and the aftermath of his indictment by the Supreme Court, have become crucial operators of this irruption of human rights discourses and practices in the debates around 'historical memory' in the country, more specifically though legally¿bound concepts such as 'crimes against humanity' and 'forced disappearances'.…”
    Get full text
    Article
  15. 315

    Study on Calculation of Cross-section Area of River Based on Analysis Method of Mid-point Distance Section by DANG Xicheng, LUO Yi, WANG Haiyan, LI Rong

    Published 2021-01-01
    “…The cross-section area is one of the key factors in flow measurement by velocity area method,and its calculation accuracy is directly related to the accuracy of flow measurement.Due to the complexity and diversity of the river section,the existing software algorithm cannot accurately judge the real position of the river flow through the large section data,resulting in the extraction error of the range of the cross section and the vertical depth.Therefore,with computer programming technology,this paper puts forward the analysis method of river mid-point distance section for identifying the position of river flow and judging the type of section,such as single section and compound section,extracting the water's edge and vertical line,and calculating the area.The application shows that the software can accurately analyze the river flow position under different hydraulic conditions by this method,and calculate the river cross-section area,achieving the purpose of algorithm design.This method can be widely used in automatic hydrological detection equipment or hydrological analysis software to improve the analysis ability of the equipment or software for cross-section flow area of river.…”
    Get full text
    Article
  16. 316

    Creation of Reliable Relevance Judgments in Information Retrieval Systems Evaluation Experimentation through Crowdsourcing: A Review by Parnia Samimi, Sri Devi Ravana

    Published 2014-01-01
    “…One of the crowdsourcing applications in IR is to judge relevancy of query document pair. In order to have a successful crowdsourcing experiment, the relevance judgment tasks should be designed precisely to emphasize quality control. …”
    Get full text
    Article
  17. 317

    Mathematical Modeling and Simulation of Online Teaching Effect Evaluation Based on Decision Tree Algorithm by Pingli Sun

    Published 2022-01-01
    “…Through this evaluation model, teachers can accurately judge students’ learning interests and improve students’ academic performance. …”
    Get full text
    Article
  18. 318

    The specifics of criminalistic activity in criminal judicial process by A.V. Mishin

    Published 2017-04-01
    “…The criminalistic activity in criminal judicial process is a complex of purposeful and regulatory proving activities performed by court (judge) and professional participants of the process, such as state prosecutor and defender (Art. 85 of the Criminal Procedure Code of the Russian Federation), by using criminalistic means, methods, and technologies. …”
    Get full text
    Article
  19. 319

    The Dialeqticue of Simile in Bayhaqi's History by قدسیه رضوانیان, زهرا مقدسی

    Published 2015-06-01
    “…Bayhaqi usually expresses his mean in this supplemental narration, mean while he made reader to judge about that issue; an anecdote that set up like antithesis against the main story (thesis) in order to form the preliterate story (synthesis) in the mind of reader. …”
    Get full text
    Article
  20. 320

    Quantitative Analysis of Comprehensive Influence of Music Network Based on Logistic Regression and Bidirectional Clustering by Yi-Kun Zhao, Guo-Qing Wang, Xiao-Xiao Zhan, Peng-Hui Yang

    Published 2021-01-01
    “…Secondly, the multiobjective logistic regression is used to construct the music similarity measurement model and, combined with music influence and music similarity, to judge whether the influence of different musicians is the actual influence. …”
    Get full text
    Article