Showing 15,041 - 15,060 results of 16,989 for search 'Defekt~', query time: 1.98s Refine Results
  1. 15041

    NOTAS SOBRE UNIVERSIDADE E DEMOCRACIA by Flavio Henrique Albert Brayner

    Published 2020-05-01
    “…Esta resistência tem uma razão: a confusão entre saber e conhecimento, entre instituição e organização, entre saber e poder, entre fins e meios de uma instituição e, no fundo, ela teme que uma eventual “politização” de suas decisões colonize o território científico que ela, supostamente, pretende defender e preservar.…”
    Get full text
    Article
  2. 15042

    Producing the Popular: John Monk Foster and the ‘Industrial Romance’ by Michael Sanders

    Published 2022-03-01
    “…The article traces the ways in which these structural elements reduce the interpretative work required of the novel’s readers and also considers the novel’s defence of popular fiction. The article argues that despite its resolutely and recognisably proletarian milieu, class conflict is almost entirely absent from A Pit-Brow Lassie which posits instead a cross-class moral code based on the work ethic. …”
    Get full text
    Article
  3. 15043
  4. 15044

    Doctoral Education: International Experience and Opportunities for Its Implementation in Russia by S. K. Bekova, E. A. Terentev

    Published 2020-07-01
    “…The analysis is focused on the following aspects of doctoral education: organizational model (1), principles of doctoral candidates’ enrollment (2), educational program and workload (3), principles and mechanisms for tracking doctoral students’ progress (4), principles and procedures for completing educational programs and defending a thesis (5). The key differences of the Russian doctoral education are distinguished. …”
    Get full text
    Article
  5. 15045

    Les représentations filmiques de Marie Stuart– Une femme de pouvoir dans l’air du temps by Armel Dubois-Nayt

    Published 2010-09-01
    “…These cinematic representations are considered in the wider scope of Marian myth-making as it developed in the sixteenth century with the aim of showing that until recently cinema has merely harped on the tropes found in her early modern detractors and defenders. This essay then moves on to argue that despite this reproduction of dated opinions, Mary Queen of Scots in these three films is an icon for the twentieth and twenty-first centuries. …”
    Get full text
    Article
  6. 15046

    O “x” do problema. Uma reflexāo acerca das representações sociais do autor-estrangeiro como suporte ao preconceito e à desigualdade na Europa "quase-multiétnica" by Pierfranco Malizia

    Published 2011-07-01
    “…Trata-se de um assunto certamente não esgotável num ensaio de tamanho limitado como este; portanto, sem a pretensão de sermos exaustivos, tenta-se apenas desenvolver de maneira côngrua (espera-se) algumas questões de fundo; finalmente, lembremos que o discurso que aqui se defende se baseia essencialmente no pressuposto de que cada acção social (e portanto também o preconceito e a desigualdade) funda-se, entre outras, na forma em que nós conhecemos o outro reproduzindo-o numa imagem.…”
    Get full text
    Article
  7. 15047

    Rethinking the Role of the Hatata of Zera Yaecob and the Hatata of Welda Heywat in Ethiopian Philosophy by Fasil Merawi

    Published 2023-06-01
    “…Through a critical engagement with these three defences of the treatises, the paper argues that such three articulations of the texts failed to properly examine the colonial world of knowledge production and religious reformation that animated the texts in the first place. …”
    Get full text
    Article
  8. 15048

    Cyber ranges: survey and perspective by ZOU Xing, HU Ning, GU Zhaoquan, JIA Yan

    Published 2024-10-01
    “…To support research on cybersecurity technologies and to avoid the potential effects of attack and defense exercises and technical verification on real networks and production environments, numerous cyber ranges emerged. …”
    Get full text
    Article
  9. 15049

    Big data security analysis method based on self-update threat intelligence database by Yanfang HOU, Jinhua WANG

    Published 2018-03-01
    “…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
    Get full text
    Article
  10. 15050
  11. 15051

    Classification, Mechanisms of Action, and Therapeutic Applications of Inhibitory Oligonucleotides for Toll-Like Receptors (TLR) 7 and 9 by Petar S. Lenert

    Published 2010-01-01
    “…Our immune defense depends on two specialized armed forces. The innate force acts as an alarm mechanism that senses changes in the microenvironment through the recognition of common microbial patterns by Toll-like receptors (TLR) and NOD proteins. …”
    Get full text
    Article
  12. 15052
  13. 15053

    Les voix post-humaines : Le thème de l’infestation extra-terrestre et la poétique de la subjectivité by Elana Gomel

    Published 2016-12-01
    “…Certains romans sélectionnés sont des classiques de l’Âge d’or : « La bête d’un autre monde » (1948) de John Campbell, Marionnettes humaines (1954) de Robert Heinlein ; d’autres sont des best-sellers contemporains : Infection (2009) et Contagious (2008) de Scott Sigler. Je défends ici une analyse narratologique de ces textes avec une focalisation plus importante sur le déploiement des techniques de voix et de points de vue. …”
    Get full text
    Article
  14. 15054

    Retour sur l’arc d’Orange (Vaucluse), son environnement et sa datation by Djamila Fellague

    Published 2016-12-01
    “…Indeed, if the criteria selected are crucial their choice depends on the hypothesis defended.…”
    Get full text
    Article
  15. 15055

    Analyzing accusation patterns between Hamas and Israel during the Al-Aqsa flood operation by Alaeddin A. Banikalef, Nisreen N. Al-Khawaldeh

    Published 2025-02-01
    “…Through a comprehensive analysis of twenty-four speeches delivered by Abu-Obieda, the military spokesman of Hamas, and Rear Admiral Daniel Hagari, the military spokesperson of the Israel Defense Forces (IDF), this research identifies key accusation patterns and examines the application of Aristotle’s modes of persuasion (ethos, pathos, and logos) alongside word frequency analysis. …”
    Get full text
    Article
  16. 15056

    Jews, Rights, and Belonging in Tunisia: Léon Elmilik, 1861-1881 by Jessica M. Marglin

    Published 2020-12-01
    “…But after he accepted a job working for a Tunisian government official in 1873, Elmilik began regularly defending the Tunisian state’s treatment of its Jews. …”
    Get full text
    Article
  17. 15057

    The Kosovo Covenant by Kinđić Zoran B.

    Published 2024-01-01
    “…Thanks to the blood shed by Serbian knights who were martyrs for the defence of the Orthodox faith and the fatherland, the area of Kosovo has been transformed into a sacred space. …”
    Get full text
    Article
  18. 15058

    L’Affaire Charles Lainé (1818), ou comment la police fabriquait un faux-monnayeur by Étienne Hofmann

    Published 2011-12-01
    “…Benjamin Constant, who had only recently been involved in the Wilfrid Regnault case (that of a man condemned to death for a crime he had not committed), published an article and a pamphlet in defence of Lainé, admiting the crime but also accusing the police and those in power of pursuing practices that were as reprehensible as they were pointless, since the locksmith had never before been a forger, did not belong to any criminal group and presented no potential danger to society. …”
    Get full text
    Article
  19. 15059

    Residential child care and the psychodynamic approach; is it time to try again? by Charles Sharpe

    Published 2006-03-01
    “…These expressions coming as they do from the individual’s unresolved infantile inner conflicts were, according to Freud, manifested in behaviours or defences which were socially harmful to the individual. …”
    Article
  20. 15060

    Manipulation Game Considering No-Regret Strategies by Julio B. Clempner

    Published 2025-01-01
    “…Manipulators intersperse unethical behavior within their typical conduct, deploying deceptive tactics before resuming a baseline demeanor. …”
    Get full text
    Article