Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
14781
Virtual commander’s operational decision-making model based on thinking simulation
Published 2025-02-01Get full text
Article -
14782
As Ordens Militares em combate nos finais da Idade Média: o caso da Guerra da Sucessão de Castela (1475-1479)
Published 2016-06-01“…Taking in account the War of Succession of Castile 1475-1479, we seek to understand - based on portuguese, castilian and aragonese sources – the (active) role assumed by the Military Orders on the preparations and on the operations of the campaign led by Afonso V at the neighboring kingdom, with a high point in the Battle of Toro (1476), as well as the defense of the portuguese frontier; and the actions on the Castile of the Catholic Kings, characterized by volatility positions and internal conflict, these militias staged, as we shall see, various military actions, revealing determinants in the evolution of strife.…”
Get full text
Article -
14783
L’environnement au profit des plus riches ? Construction et hybridation d’un front écologique métropolitain dans la Péninsule du Cap (Afrique du Sud)
Published 2014-05-01“…Then, are investigated strategies of defence by these groups of residents, differentiated between exclusive conservation of rural heritage and more hybrid environmental projects aiming to better include all Peninsula inhabitants.…”
Get full text
Article -
14784
Cardiac involvement in Scorpion envenomation: A review of literature
Published 2025-01-01“…Cardiac biomarkers, electrocardiography and transthoracic echocardiography helps detect cardiotoxicity and guide management. Early use of antivenom and/or alpha-adrenergic blockade may prevent or reverse cardiotoxicity. …”
Get full text
Article -
14785
La reconversion des écrivains catholiques après-guerre en Belgique francophone : le cas de l’hebdomadaire Vrai
Published 2019-04-01“…Orientés vers l’action politique, ils lient efficacement leurs goûts littéraires avec la défense de convictions anticommunistes et patriotiques bien affirmées. …”
Get full text
Article -
14786
Simple-Random-Sampling-Based Multiclass Text Classification Algorithm
Published 2014-01-01Get full text
Article -
14787
Research and application exploration of threat intelligence system of telecom operators
Published 2022-12-01“…With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.…”
Get full text
Article -
14788
Prediction of Matrix Failure in Fibre Reinforced Polymer Composites
Published 2013-01-01Get full text
Article -
14789
Violence politique et légitimisme pendant la Première guerre carliste : une occasion manquée
Published 2018-07-01“…How could this armed conflict revive the tensions between the defenders of Absolutist Regimes and the Liberals outside Spain? …”
Get full text
Article -
14790
Le féminisme pris aux pièges
Published 2010-12-01“…This erosion of feminist coalitions, however conflictive they may be, represents a decentering – or erasure – of radical feminism in favour of protectionist reforms, on one side, and integrationist reforms, on the other.…”
Get full text
Article -
14791
Motivation and Life Satisfaction of Employees in the Public and Private Sectors
Published 2012-10-01Get full text
Article -
14792
Postfazione. La fragilità della sovranità tra colonialismi ed epistemologie dei sud del mondo
Published 2024-06-01“…Through a diachronic and positioned gaze, the objective is to bring the notions of "terraformation" and "coloniality" into dialogue with the different epistemologies and ontologies of the global South represented by the insular contexts proposed in the dossier; in them, food sovereignty, marginalization and "isolation", the result of endocolonial practices that perpetuate socio-environmental inequalities and conflicts, are combined with forms of resistance, defense of territorial autonomy, and the demand for health and well-being. …”
Get full text
Article -
14793
Analysis of elite male wrestlers' social comparison levels according to socio-demographic backgrounds
Published 2014-02-01“…Social comparison can be identified as a defensive tendency that people use as a means of self-evaluation. …”
Get full text
Article -
14794
Turkey's Struggle with Internet in its 3rd year: Don Quixote, Ostrich, Harakiri
Published 2010-06-01“…But it doesn't do this by defending or negotiating the issue on international forums or United Nations. …”
Get full text
Article -
14795
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…Furthermore, the impact of different attack and defense strategies on system security of different methods is simulated and analyzed in this paper.…”
Get full text
Article -
14796
La créativité dans la production de fictions télévisées en France : une notion en trompe-l’œil ?
Published 2017-12-01“…We then show that the audiovisual production is in fact artificially and even deceptively structured around the notion of creativity, serving as mere window-dressing in producer-broadcaster relations. …”
Get full text
Article -
14797
Dissociation: understanding the dynamics of primary and secondary capacities
Published 2025-01-01“… This article explores the psychological defense mechanism of dissociation within the context of trauma and micro-traumas, particularly its impact on primary and secondary capacities as defined in Positive Psychotherapy (PPT). …”
Get full text
Article -
14798
Manipulating Disclosure to Repair Corporate Image After an Environmental Disaster: A Study of the Impact of the Dam Failure on Samarco’s Sustainability Reports
Published 2022-01-01“…Thus, the company resorted to defensive arguments through which it sought to evade responsibility, with the manipulation of negative environmental disclosure, in order to divert the outside public's attention from adverse information.…”
Get full text
Article -
14799
The End of History?
Published 2018-07-01“…The unsettling end of the sequence of plays is deceptively restorative and Henry VIII, unlike the Book of Revelations, leaves the final outcome of events open. …”
Get full text
Article -
14800
Images de l’étrange : Punch ou la re-présentation du paradigme bourgeois
Published 2006-12-01“…Under the pencil of Keene, Leech or du Maurier, the picture became one of the means through which the bourgeois identity was built, defended and promoted. Inadequacies, flaws and imperfections both questioned and constructed the prevailing model, thus « re-presenting » it. …”
Get full text
Article