Suggested Topics within your search.
Suggested Topics within your search.
- Law 3
- Common law 2
- Interpretation and construction 2
- Judges 2
- Methodology 2
- Administrative law 1
- Context (Linguistics) 1
- Criminal Pleading 1
- Criminal Practice 1
- Criminal Procedure 1
- Evidence 1
- History 1
- Judge-made law 1
- Organizational Behavior 1
- Perspective (Linguistics) 1
- Semantics 1
- Sentencing 1
- Sociological jurisprudence 1
- Subjectivity (Linguistics) 1
-
301
Les mobilisations des victimes de pesticides ont-elles modifié les pratiques des viticulteurs languedociens ?
Published 2016-05-01“…While local authorities are concerned about quality of drinking water, the market is like a judge examining only incriminating facts. The demand for organic wines is growing, while cellarmen customer’s even oenologists challenge winegrowers on their pesticide use. …”
Get full text
Article -
302
Employee performance appraisal using individual performance management
Published 2024-03-01“…Company performance is inseparable from individual’s role in carrying out their job duties as the driving force for running of the company, a leader can judge his employees when he knows that is done and produced by these employees, it is obtained from the individual employee success in carrying out a job.…”
Get full text
Article -
303
Mettre cartes sur table et parler de son territoire de l’eau : un (en)jeu pour les acteurs ?
Published 2015-12-01“…This trial was carried out to ensure that the tool is complete and that it enables stakeholders to structure their responses by revealing, to their own satisfaction, those elements that they judge to be explanatory of their territory. It was then verified that, although they are restricted by the same regulatory framework, these territories are far from being identical in their structural and explanatory elements, and that the different stakeholders’ visions for the same territory do not tie in with each other, but are linked to their own objectives. …”
Get full text
Article -
304
Spatio-temporal systems in Chaucer’s language: A discourse-pragmatic analysis
Published 2019-12-01“…Language has built-in spatio-temporal systems by which speakers judge how distant the situations they wish to express are from their domain, i.e. proximal or distal. …”
Get full text
Article -
305
Sentiment Analysis of Mobile Phone Reviews Using XGBoost and Word Vectors
Published 2025-01-01“…Consumer reviews are an important source of data used to judge and examine consumer sentiment, and data mining for reviews of electronic products is an important way to help improve the design of electronic products. …”
Get full text
Article -
306
Particle Swarm Algorithms to Solve Engineering Problems: A Comparison of Performance
Published 2013-01-01“…Comparison is made both in terms of fixed iterations tests to judge the solution quality reached and fixed threshold to evaluate how quickly each algorithm reaches near-optimal solutions. …”
Get full text
Article -
307
Abuse Of Authority By State Officials In Corruption Cases: The Case Of Complete Systematic Land Registration Program
Published 2025-02-01“…The judge’s decision in the corruption case involving the abuse of authority in The Complete Systematic Land Registration (Pendaftaran Tanah Sistematis Lengkap or PTSL) program underscores the importance of legal certainty in holding perpetrators accountable for actions that harm state and community finances. …”
Get full text
Article -
308
STRATEGIC LAWSUITS AGAINST JOURNALISTS - AN UNCONVENTIONAL WAY TO ENACT CIVIL LIABILITY
Published 2024-05-01Get full text
Article -
309
Právní institut apelace v pražském procesním traktátu Parvus ordinarius
Published 2025-01-01“…Firstly, we know from the ownership note that it once belonged to Pavel of Slavíkovice, a liberal arts bachelor at the University of Prague, who worked as a notary and became a criminal judge of the clergy in Prague before 1436. Secondly, the Prague version of Parvus ordinarius met the needs of the domestic legal environment thanks to the gloss added to the treatise in the first half of the 14th century. …”
Get full text
Article -
310
An Improved ARIMA-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks
Published 2016-01-01“…Specifically, we improve the traditional time series ARIMA model to make traffic prediction and judge the traffic anomaly in a WSN. Simulated and real WSN traffic data gathered from University of North Carolina are used to carry out simulations on Matlab. …”
Get full text
Article -
311
OPTIMAL DESIGN ANALYSIS OF PCTFE SEAT STRUCTURE OF ULTRA-LOW TEMPERATURE BALL VALVE BASED ON RESPONSE SURFACE METHOD (MT)
Published 2023-01-01“…The stress-strain relationship of PCTFE, the material of low-temperature ball valve seat, under different working conditions was studied, and the tensile strength is the only important basis to judge the strength of PCTFE. The central combination design method was adopted, established the response surface model of stress on structural parameters, analyzed the interaction between parameters. …”
Get full text
Article -
312
Big data security analysis method based on self-update threat intelligence database
Published 2018-03-01“…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
Get full text
Article -
313
Research on dynamic evaluation method of individual scientific impact under multiple key nodes
Published 2023-09-01“…The pr(y)-index of a 5-year time window is more sensitive to judge the of influence on scientific career. Conclusion. …”
Get full text
Article -
314
Das valas comuns aos direitos humanos: a descoberta dos desaparecimentos forçados na Espanha contemporânea
Published 2012-01-01“…In this sense, the series of Human Rights reports such as those by Amnesty International, but more clearly Judge Garzon¿s attempt at indicting Francoism and the aftermath of his indictment by the Supreme Court, have become crucial operators of this irruption of human rights discourses and practices in the debates around 'historical memory' in the country, more specifically though legally¿bound concepts such as 'crimes against humanity' and 'forced disappearances'.…”
Get full text
Article -
315
Study on Calculation of Cross-section Area of River Based on Analysis Method of Mid-point Distance Section
Published 2021-01-01“…The cross-section area is one of the key factors in flow measurement by velocity area method,and its calculation accuracy is directly related to the accuracy of flow measurement.Due to the complexity and diversity of the river section,the existing software algorithm cannot accurately judge the real position of the river flow through the large section data,resulting in the extraction error of the range of the cross section and the vertical depth.Therefore,with computer programming technology,this paper puts forward the analysis method of river mid-point distance section for identifying the position of river flow and judging the type of section,such as single section and compound section,extracting the water's edge and vertical line,and calculating the area.The application shows that the software can accurately analyze the river flow position under different hydraulic conditions by this method,and calculate the river cross-section area,achieving the purpose of algorithm design.This method can be widely used in automatic hydrological detection equipment or hydrological analysis software to improve the analysis ability of the equipment or software for cross-section flow area of river.…”
Get full text
Article -
316
Creation of Reliable Relevance Judgments in Information Retrieval Systems Evaluation Experimentation through Crowdsourcing: A Review
Published 2014-01-01“…One of the crowdsourcing applications in IR is to judge relevancy of query document pair. In order to have a successful crowdsourcing experiment, the relevance judgment tasks should be designed precisely to emphasize quality control. …”
Get full text
Article -
317
Mathematical Modeling and Simulation of Online Teaching Effect Evaluation Based on Decision Tree Algorithm
Published 2022-01-01“…Through this evaluation model, teachers can accurately judge students’ learning interests and improve students’ academic performance. …”
Get full text
Article -
318
The specifics of criminalistic activity in criminal judicial process
Published 2017-04-01“…The criminalistic activity in criminal judicial process is a complex of purposeful and regulatory proving activities performed by court (judge) and professional participants of the process, such as state prosecutor and defender (Art. 85 of the Criminal Procedure Code of the Russian Federation), by using criminalistic means, methods, and technologies. …”
Get full text
Article -
319
The Dialeqticue of Simile in Bayhaqi's History
Published 2015-06-01“…Bayhaqi usually expresses his mean in this supplemental narration, mean while he made reader to judge about that issue; an anecdote that set up like antithesis against the main story (thesis) in order to form the preliterate story (synthesis) in the mind of reader. …”
Get full text
Article -
320
Quantitative Analysis of Comprehensive Influence of Music Network Based on Logistic Regression and Bidirectional Clustering
Published 2021-01-01“…Secondly, the multiobjective logistic regression is used to construct the music similarity measurement model and, combined with music influence and music similarity, to judge whether the influence of different musicians is the actual influence. …”
Get full text
Article