Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
14521
Wyjaśnienie dogmatu chalcedońskiego w VI wieku. Interpretacja osoby i natury przez teologów „neochalcedonizmu” według Aloisa Grillmeiera
Published 2022-03-01“…In this article, with the help of Alois Grillmeier’s analysis in his work Jesus der Christus, the author presents the efforts of the two most influential theologians who defended and deepened the teaching of the Council within the framework of the so called “Neochalcedonism” in the sixth century, Leontius of Byzantium and Leontius of Jerusalem. …”
Get full text
Article -
14522
Neutrophils in Tuberculosis: Heterogeneity Shapes the Way?
Published 2017-01-01“…This review analyzes data on neutrophil defensive and pathological functions during tuberculosis and considers hypotheses explaining the dualism of neutrophils during M. tuberculosis infection and tuberculosis disease.…”
Get full text
Article -
14523
Quand des parents interprètent les normes scolaires : le cas du travail scolaire hors la classe en début de primaire
Published 2019-01-01“…Our study is in line with theories defending a "relational hypothesis" (Bautier and Goigoux, 2004) which considers that misunderstandings (Bautier & Rochex, 2007, Bautier & Rayou, 2013) play an important role in explaining educational inequalities. …”
Get full text
Article -
14524
I trovatori come fondamento dell'identità occitana: la linea Jaufré Rudèl-Jean de Nostredame-Frédéric Mistral
Published 2016-06-01“…Cette contribution souhaite enquêter sur la place occupée par les troubadours dans la défense et l’illustration d’une langue progressivement minorisée. …”
Get full text
Article -
14525
Del concepto de familia: visión social.
Published 2024-06-01“… El artículo reseña asuntos que inciden en la actual coyuntura (precarización laboral – trabajo decente, economía del cuidado e inequidad de género) y la noción de familia como sujeto político y colectivo, con el fi n de asumirla y comprenderla como una construcción social, a partir de desarrollos conceptuales y metodológicos propios que permiten su fundamentación disciplinaria y posicionamiento en la sociedad del conocimiento. …”
Get full text
Article -
14526
AVRUPA BİRLİĞİ ve IRAK KRİZİ : BÖLÜNMEDEN YENİDEN BİRLEŞMEYE UZUN, İNCE BİR YOL
Published 2003-01-01“…The aim of this article is to assess the implications of the recent Iraqi crisis for American-European relations, the European Union's evolving Common Foreign and Security Policy/ European Security and Defence Policy and the future prospects for global governance. …”
Get full text
Article -
14527
Twostriped Walkingstick, Anisomorpha buprestoides (Stoll) (Insecta: Phasmatodea: Pseudophasmatidae)
Published 2005-04-01“…The last common name is particularly apt as this species is capable of squirting a strong-smelling defensive spray that is painfully irritating to the eyes and mucous membranes (Gray 1835, Meinwald et al. 1962, Eisner 1965, Stewart 1937, Hatch et al. 1993, Paysse et al. 2001, Dziezyc 1992). …”
Get full text
Article -
14528
Nonprofit Neighborhoods: An Urban History of Inequality and the American State, By Claire Dunning, The University of Chicago Press, 2022
Published 2025-01-01“…Using the case of Boston, the author informs readers that the government-nonprofit partnerships fueled by grants, contracts, and loans within the framework of nonprofit neighborhoods maintains and advances racism and inequity in America. The author defends this proposition by leveraging a historical lens, archival data, and autobiographical descriptions to magnify readers' attention on the racially biased treatment of leaders, workers, and community members associated with nonprofit neighborhoods among diverse communities. …”
Get full text
Article -
14529
Entrepreneurial Competencies and Strategic Behavior: a Study of Micro Entrepreneurs in an Emerging Country
Published 2019-01-01“…Moreover, entrepreneurs who were Reactors possessed a mean of 6 out of the ten entrepreneurial competencies, Defenders had 7.97, Analyzers had 8.38, and Prospectors had 8.56. …”
Get full text
Article -
14530
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
14531
La place du paysagiste dans le paysage agricole
Published 2017-12-01“…Whereas a similarity between landscape architects and farmers had been clearly established in the 1990s, the aesthetic approach to the landscape is sometimes criticised by the farming sector which defends its vocation of producing food. Giving lessons about the landscape therefore becomes counter-productive. …”
Get full text
Article -
14532
Agentivité ou autonomie ? Pour une théorie critique de la vulnérabilité
Published 2021-07-01“…In this text, I try to answer this question by defending two arguments: I first argue that, for both theoretical and political reasons, we should neither oppose nor identify vulnerability and agency. …”
Get full text
Article -
14533
Research on knowledge graph construction technology for cyber threat intelligence based on large language models
Published 2024-11-01“…Through instruction prompts and context learning, AutoCTI2KG automatically generated cybersecurity and attack knowledge graphs from cyber threat intelligence and provided actionable defense recommendations. Experimental results show that the proposed framework performs excellently in constructing cybersecurity and attack knowledge graphs, with F1 scores around 0.90, demonstrating the potential of large language models in knowledge graph construction in the cybersecurity domain. …”
Get full text
Article -
14534
Las elecciones presidenciales de 1946 y el peronismo naciente vistos por el periódico La Vanguardia
Published 2004-09-01“…It was thus that La Vanguardia, born in 1894 as a « scientific socialist newspaper. Defender of the working class », ended up in 1946 sympathizing with interests that were not exactly the same as the ones workers pursued.…”
Get full text
Article -
14535
Power Link Optimization for a Neurostimulator in Nasal Cavity
Published 2017-01-01Get full text
Article -
14536
La frontière entre le bilād al-islām et le bilād al-Nūba : enjeux et ambiguïtés d’une frontière immobile (VIIe-XIIe siècle)
Published 2011-03-01“…When delimiting bilād al-islām, Arabic geographers unanimously agreed in designating Aswan as the last frontier-town of Islam, in charge of defending Egyptian territory from potential Nubian enemies.A closer examination of the sources brings to light the unexpected complexity of this frontier system. …”
Get full text
Article -
14537
SDN security prediction method based on bayesian attack graph
Published 2021-11-01“…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
Get full text
Article -
14538
-
14539
-
14540
Naked Censorship: Stripping the Censors’ Discourse
Published 2013-11-01“…This inter-disciplinary paper aims to shed light on the principles that led to the establishment of theatre censorship legislation and the politics of inertia of the ensuing governments, hence offering an alternative perspective to the moral argument first utilised by Walpole and later forwarded as a final defence. In doing so, we will explore the gap between the censors’ procedures and their discourses, thereby gaining an insight into the means and hidden dynamics of this disciplinary control. …”
Get full text
Article