Showing 2,001 - 2,020 results of 4,640 for search 'Defekt~', query time: 1.57s Refine Results
  1. 2001

    The information gain of explicitly provided over self-generated contextual knowledge for behavioral control. by Lukas Magnaguagno, Stephan Zahno, Ernst-Joachim Hossner

    Published 2025-01-01
    “…To this end, we measured the positioning of female handball players (N = 36 experts + 36 near-experts) in a virtual-reality defensive task as a function of their teammates' defensive-strength patterns, which was either explicitly instructed or had to be self-generated. …”
    Get full text
    Article
  2. 2002
  3. 2003

    Enhancement of state response capability and famine mitigation: a comparative analysis of two drought events in northern China during the Ming dynasty by F. Tian, F. Tian, Y. Su, Y. Su, X. Chen, X. Chen, L. Tao, L. Tao

    Published 2025-02-01
    “…Shandong, Beijing, Tianjin, and Hebei demonstrated strong defensive capabilities and effective state emergency responses, while Shanxi had weaker defensive abilities, making it more vulnerable to famine. …”
    Get full text
    Article
  4. 2004

    RELIGIOUS SYNCRETISM IN THE LENSES OF JEWISH-BUDHHISM: A RELIGIOUS IDEA IN MODERN AFRICA DEVELOPMENT WUKARI JOURNAL OF HUMANITIES by ZACHARIAH BULUS `` TAKORE, YAKUBU DOMINIC ALKALI, DANIEL BEM APUUIVOM

    Published 2024-07-01
    “…When the individual practices a particular religion, it may be both Judaism and Buddhism.One typical example could that of the people of Crete in ancient days who always fought themselves, but when enemies threatening to attack them, they combined forces and defeated the enemies. By such act, they defended their interest collectively which enhanced their welfare and growth. …”
    Get full text
    Article
  5. 2005

    Data-driven understanding on soccer team tactics and ranking trends: Elo rating-based trends on European soccer leagues. by Dong Hee Jung, Jason J Jung

    Published 2025-01-01
    “…For the count-based method, the number of forwards, midfielders, and defenders is used to calculate respective defense and attack scores. …”
    Get full text
    Article
  6. 2006

    Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System by Hyoungjun Kim, Jae-Yeol Kim, Kyung-Ho Lee

    Published 2025-01-01
    “…The cyber-threat inference method minimizes damage through early detection and blocking of successive attacks using a threat class sequence system (TCSS). …”
    Get full text
    Article
  7. 2007

    A cooperative jamming decision-making method based on multi-agent reinforcement learning by Bingchen Cai, Haoran Li, Naimin Zhang, Mingyu Cao, Han Yu

    Published 2025-02-01
    “…Results show that MA-CJD significantly reduces the time defense units are detected while minimizing jamming resource consumption. …”
    Get full text
    Article
  8. 2008

    PCCN: Polarimetric Contexture Convolutional Network for PolSAR Image Super-Resolution by Lin-Yu Dai, Ming-Dian Li, Si-Wei Chen

    Published 2025-01-01
    “…Meanwhile, PolSAR image resolution is usually lower than the synthetic aperture radar (SAR) image, which may limit its potentials for target detection and recognition. Image super-resolution with the convolutional neural network is a promising solution to fulfill this issue. …”
    Get full text
    Article
  9. 2009

    Powstanie narodowe czy bunt rekrutów? Rozkład wojsk austriackich w 1809 roku w Galicji by Michał Baczkowski

    Published 2024-01-01
    “…It involved mass as well as individual desertions, surrender into captivity without a fight, and finally a group defection to the enemy’s side. …”
    Get full text
    Article
  10. 2010

    Headaches attributed to cranial and cervical artery dissections by Diana Doukhi, Stéphanie Debette, Jérome Mawet

    Published 2025-02-01
    “…By synthesizing current evidence, the review aims to improve early detection and clinical management of CCAD in headache patients.…”
    Get full text
    Article
  11. 2011

    Phenotypic and transcriptomic analyses reveal major differences between apple and pear scab nonhost resistance by Vergne, Emilie, Chevreau, Elisabeth, Ravon, Elisa, Gaillard, Sylvain, Pelletier, Sandra, Bahut, Muriel, Perchepied, Laure

    Published 2023-01-01
    “…Very few differentially expressed genes were detected during apple/V. pyrina interaction, preventing the inferring of underlying molecular mechanisms. …”
    Get full text
    Article
  12. 2012

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
    Get full text
    Article
  13. 2013

    ‘Traditional Authorities’ and Community Rights in Contemporary Mozambique: between Activism and Incorporation by Giovanni Battista Martino

    Published 2021-10-01
    “…Close examination of empirical data collected during field research in Inhambane province provides convincing evidence of traditional authorities’ general inability to develop effective discursive strategies for the representation and defence of their communities’ interests and rights. …”
    Get full text
    Article
  14. 2014
  15. 2015

    ANALYSIS OF CHANGES IN AFRICAN SWINE FEVER VIRUS GENETIC STRUCTURE AND BIOLOGICAL PROPERTIES DURING ADAPTATION TO CONTINUOUS CELL CULTURE by Ali Mazloum, N. G. Zinyakov, A. S. Pershin, I. V. Shevchenko, I. Yu. Zhukov, D. N. Fedoseyeva, D. V. Sharypova, A. S. Igolkin, N. N. Vlasova

    Published 2019-01-01
    “…Identifcation of such genes will enable preparation of deletion mutant ASF virus strains as well as development and testing of pilot safe vaccines based on the said virus strains. …”
    Get full text
    Article
  16. 2016

    Erbin Regulates Tissue Factors Through Ras/Raf Pathway in Coagulation Disorders in Sepsis by Yang C, Lei C, Jing G, Xia Y, Zhou H, Wu D, Zuo J, Gong H, Wang X, Dong Y, Aidebaike D, Wu X, Song X

    Published 2025-02-01
    “…However, the role of Erbin in coagulation disorders in sepsis and the relationship between Erbin and macrophage regulation of coagulation function are still unclear.Methods: At the cellular level, macrophages were treated with lipopolysaccharide (LPS) or MEK inhibitor (PD98059), protein expression levels were detected by Western blot, co-immunoprecipitation (Co-IP), and immunofluorescence, mRNA expression levels were detected by quantitative real-time polymerase chain reaction (qPCR), and the concentration of tissue factor (TF) in cell supernatant was detected by enzyme linked immunosorbent assay (ELISA). …”
    Get full text
    Article
  17. 2017
  18. 2018
  19. 2019

    Metabolomics profiling reveals p-aminobenzoic acid enhances resistance to Fusarium head blight in wheat by Yiluo Tan, Kangjun Wang, Mingming Guo, Guangxu Zhang, Xiaofeng Li, Yijun Shi, Maosheng He, Dayong Xu, Feng Chen, Jiwei Fan

    Published 2025-02-01
    “…A total of 1001 metabolites were detected, 109 of which were significantly changed due to FHB infection. …”
    Get full text
    Article
  20. 2020

    Analysis and optimization of energy harvesting characteristics of converter valve magnetic field self-powered harvester by WANG Wei, SU Wenbo, XU Chenjin, WU Yuwei, SHI Yuchen

    Published 2025-01-01
    “…On this basis, the energy harvesting characteristics of the chip-based energy harvesting device under deflection condition, influenced by the application environment, are studied. …”
    Get full text
    Article