Showing 10,561 - 10,580 results of 16,751 for search '"originalism"', query time: 0.10s Refine Results
  1. 10561

    Le diverse facce della montagna in declino: un’esperienza lombarda by Luisa Pedrazzini

    Published 2019-04-01
    “…The lack of snow and dramatic ice melting put in crisis local economy, with decline and recession and is the origin of great natural disasters too, causing a radical change in the way of life of the Alps’ inhabitants. …”
    Get full text
    Article
  2. 10562

    Dinamika Kehidupan Kethoprak di Kabupaten Pati 1950-2007 by Azmi Globalian Nazal, Dhanang Respati Puguh

    Published 2023-05-01
    “…Kethoprak is a traditional performing art originating from Surakarta. Kethoprak is not able to develop optimally in its ownregion, because it cannot compete with wayang wong. …”
    Get full text
    Article
  3. 10563

    From Multivalent Writing to a Poetics of the Book: A Media-Specific Analysis of Mary Ruefle’s A Little White Shadow by Catherine Ann Winters

    Published 2022-12-01
    “…This work of erasure reproduces the marks Ruefle made to obscure words in the source text of the same name by Emily Malbone Morgan, published in 1889, by creating a facsimile of the original altered with white correction fluid. By utilizing the material object as an essential element of the poem, Ruefle engages this form to move beyond the concept of the book as object or apparatus for presenting poetry. …”
    Get full text
    Article
  4. 10564

    Algorithmic Generation of Parameterized Geometric Models of the Aortic Valve and Left Ventricle by Nikita Pil, Alex G. Kuchumov

    Published 2024-12-01
    “…In particular, we developed 22 variations of left ventricular geometries, including one original model, seven models with varying wall thicknesses, seven models with varying heights, and seven models with varying shapes. …”
    Get full text
    Article
  5. 10565

    Research on Orbital Angular Momentum Mode Detection in an Atmospheric Environment with Fusion Transfer Learning by Chenghu Ke, Youmei Chen, Xizheng Ke

    Published 2024-12-01
    “…The results show that compared with traditional convolutional neural networks, the modal classifier proposed in this paper reduces the dataset size to 1/10 of the original and successfully improves the OAM detection accuracy by 15.84%. …”
    Get full text
    Article
  6. 10566

    Toward Enhanced Prediction of High‐Impact Solar Energetic Particle Events Using Multimodal Time Series Data Fusion Models by Pouya Hosseinzadeh, Soukaina Filali Boubrahimi, Shah Muhammad Hamdi

    Published 2024-06-01
    “…Abstract Solar energetic particle (SEP) events, originating from solar flares and Coronal Mass Ejections, present significant hazards to space exploration and technology on Earth. …”
    Get full text
    Article
  7. 10567

    Ippolit Bogdanovich and Voltaire’s 'Épître à l’impératrice de Russie': Adapting Praise by Andrew Kahn

    Published 2024-11-01
    “…Ippolit Bogdanovich was one of the most versatile poets of the period, appreciated for his original compositions and recognised for his adaptations of French poetry. …”
    Get full text
    Article
  8. 10568

    Analysis of user behavior and satisfaction under the elderly adaptation mode of an APP based on the fuzzy-IPA model by Jian Yang, Taotao Yang, Lu Li

    Published 2025-01-01
    “…The key findings are as follows: (1) The APP aging mode is quite popular; (2) middle-aged and elderly users hesitate to use the aging mode due to “loss of original functions” and “secondary interface layout and font adjustments”; (3) better user experience in the aging mode leads to higher satisfaction, whereas higher initial expectations lead to lower satisfaction; (4) four aspects-“simple operation,” “ease of learning,” “understanding of function descriptions,” and “effective help system”-have high importance but low satisfaction levels. …”
    Get full text
    Article
  9. 10569

    Regional Aggressive Root Resorption Caused by Neuronal Virus Infection by Inger Kjær, Carsten Strøm, Nils Worsaae

    Published 2012-01-01
    “…The purpose is to present cases with idiopathic (of unknown origin) root resorption occurring regionally. Two cases of female patients, 26 and 28 years old, referred with aggressive root resorption were investigated clinically and radiographically. …”
    Get full text
    Article
  10. 10570

    The Psychometric Properties of the Meaning in Life Questionnaire (MLQ) in Patients with Life-Threatening Illnesses by Maede Naghiyaee, Bahman Bahmani, Ali Asgari

    Published 2020-01-01
    “…The confirmatory factor analysis supported the original two-factor model of the MLQ, comprised of the presence of meaning (five items) and search for meaning (five items). …”
    Get full text
    Article
  11. 10571

    From Stars to Stones: The Cultural and Linguistic Roots of the Name ‘Skardu’ by Muhammad Nazir, Sajjad Hussain

    Published 2024-08-01
    “…Drawing from linguistic analysis and historical texts the current study examines the origin of the name Skardu from the Tibetan word Skar-mDo, usually referred to as a star-lit fort /valley or starry place. …”
    Get full text
    Article
  12. 10572

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  13. 10573

    Open-Source Telemedicine Platform for Wireless Medical Video Communication by A. Panayides, I. Eleftheriou, M. Pantziaris

    Published 2013-01-01
    “…Objective video quality assessment is based on PSNR ratings, following calibration using the variable frame delay (VFD) algorithm that removes temporal mismatch between original and received videos. Clinical evaluation is based on atherosclerotic plaque ultrasound video assessment protocol. …”
    Get full text
    Article
  14. 10574

    Strategy Committees on European Public Boards: Characteristics and Tasks by Małgorzata Kuczara

    Published 2024-01-01
    “…The voluntary nature of revealing information about SCs implies that reported characteristics and tasks may not fully represent the actual state. Originality/Value: It is the first study to explore SCs in various European countries by showing their scale, structures, compositions and especially the tasks they declare and handle.…”
    Get full text
    Article
  15. 10575

    El registro burocrático del mérito: condiciones morales y lealtad. Un estudio de los legajos personales de los comandantes en jefe de la armada argentina (1955-1983) by Ivonne Barragán Sáez

    Published 2024-12-01
    “…Analiza un corpus documental original, que no cuenta con antecedentes de análisis sistemáticos, los legajos de conceptos y de servicios de catorce comandantes. …”
    Get full text
    Article
  16. 10576

    Peripheral Gangerene, an Unusual Presentation of Infantile Kawasaki: A Case Report and Literature Review by Fatemeh Tahghighi, Maryam Bakhtiari Koohsorkhi, Vahid Ziaee

    Published 2021-01-01
    “…The diagnosis of Kawasaki disease and echocardiographic evaluation of the coronary arteries should be considered in young infants with prolonged fever of unknown origin. Peripheral gangrene is a rare but important complication of infantile Kawasaki disease, although the exact mechanism in not fully understood.…”
    Get full text
    Article
  17. 10577

    Distribution and genetic diversity of three apple viruses in Belarus by P. V. Kuzmitskaya, O. Yu. Urbanovich

    Published 2016-12-01
    “…The study of phylogenetic relationships between viruses isolated in different countries did not reveal any clear-cut relationship between their geographical origin and the degree of similarity of virus genome fragments.…”
    Get full text
    Article
  18. 10578

    The Secret Life of Secret Agents: Alan Bennett and John Schlesinger’s An Englishman Abroad (1983) and A Question of Attribution (1991) by Nicole Cloarec

    Published 2016-12-01
    “…Although biopics are still widely held in critical disdain, a number of new stimulating perspectives on the genre have recently emerged. One original approach consists in tackling the biopic as a form of adaptation and an example of intermedial rewriting, thus enabling to overreach the traditional fiction-versus-fact debate. …”
    Get full text
    Article
  19. 10579

    CRITICAL ANALYSIS OF THE RELIABILITY OF INTUITIVE MORAL DECISIONS by V. V. Nadurak

    Published 2017-06-01
    “…The work is based on the methodological attitude of empirical ethics, involving the use of findings from empirical research in ethical reflection and decision making. Originality. The main kinds of intuitive moral decisions are identified: 1) intuitively emotional decisions (i.e. decisions made under the influence of emotions that accompanies the process of moral decision making); 2) decisions made under the influence of moral risky psychological aptitudes (unconscious human tendencies that makes us think in a certain way and make decisions, unacceptable from the logical and ethical point of view); 3) intuitively normative decisions (decisions made under the influence of socially learned norms, that cause evaluative feeling «good-bad», without conscious reasoning). …”
    Get full text
    Article
  20. 10580

    Prime-number-assisted block-based neighbor discovery protocol in wireless sensor networks by Woosik Lee, Jong-Hoon Youn, Teukseob Song

    Published 2019-01-01
    “…For example, for two sensors whose duty cycles are different, if the lengths of their discovery schedules are relatively prime, the prime-number-assisted block-based neighbor discovery protocol simply uses the balanced incomplete block design–based neighbor discovery protocol without adding any additional active slots; otherwise, it changes the original balanced incomplete block design–based schedule using a prime number. …”
    Get full text
    Article