Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
15261
La presse italienne, le pouvoir politique et l’autorité judiciaire durant le fascisme
Published 2004-09-01“…On one hand, left-wing parties viewed the judiciary as a bourgeoisie-closely allied to the government; on the other hand, the fascist groups published blacklists containing the names of Judges they claimed were too weak in dealing with left-wing activists or too biased against fascist defendants. The Giacomo Matteotti case was a turning-point in the consolidation of the Benito Mussolini’s power, using the crisis, he transformed Italy into a totalitarian regime: with all opposition newspapers banned and fascists publications kept under strict control. …”
Get full text
Article -
15262
Predviđanje zahteva za korektivno održavanje primenom metode analize i prognoze vremenske serije
Published 1990-11-01Get full text
Article -
15263
On Individual Repositioning Distance along Platform during Train Waiting
Published 2018-01-01“…Maximum likelihood estimation is proposed and applied to a case study of commuter rail line in Paris: journeys between stations Vincennes and La Défense along line A of the Regional Express Railways. …”
Get full text
Article -
15264
COOPERAREA ÎN INTELLIGENCE DINTRE ALIANȚA NORD-ATLANTICĂ ȘI UNIUNEA EUROPEANĂ
Published 2023-01-01“…An important dimension for the NATO-EU partnership to achieve its objectives is collaboration and cooperation in intelligence, and the main element is the formation of a center of excellence in intelligence analysis in Bucharest, Romania having an extremely important role in the supervision and defense of the eastern flank of NATO. By collaboration we refer to the initiation and development of specific actions aimed at obtaining, verifying and capitalizing on information and information products, while cooperation implies the organization, coordination, support and joint realization of specific actions by the structures of the information community. …”
Get full text
Article -
15265
De las nulidades contractuales y el arbitramento en materia administrativa
Published 2003-01-01“…En este ensayo se abordan sólo algunos de los aspectos e inconvenientes que tiene el arbitramento en materia Adminis- trativa, sobre todo en los casos en que se discute sobre los vicios o defectos del contrato como acto jurídico…”
Get full text
Article -
15266
Economic Security in Border Areas: The Fulfillment of Community Welfare
Published 2024-10-01“…While Law Number 43 of 2008 aims to manage borders, unclear authority and regulatory overlap hinder effectiveness, compounded by military-focused defense strategies, limited budgets, and inadequate infrastructure. …”
Get full text
Article -
15267
Sexualités au Maghreb
Published 2010-12-01“…While refusing to adopt the “Orientalist” perspective (Arab-Islamic sexuality explained by the sacred texts) the “culturalist” perspective (a specifically North African way of configuring sexuality), the “moralist” perspective (societies being menaced by political islam or the “corrupted West”) and the “activist” perspective (as a defence of individual freedom, notably sexual, feminism, or political Islam), these contemporary ethnographies recreate the tensions between individualism and community ethos, between national and local dictates, between western ethics and religious proscription, all of these attracting considerable media coverage. …”
Get full text
Article -
15268
RESULTS OF RESEARCH INTO CO LOA CITADEL (2007 - 2014): MATERIALS AND DISCUSSION
Published 2019-09-01“…Co Loa citadel, built by King An Duong, inherited a previous one - the citadel/ramparts of a defensive village from a chiefdom of the late Dong Son period. …”
Get full text
Article -
15269
Re-visitando la Hegemonía conservadora: raza y política en Cartagena (Colombia), 1885-1930
Published 2018-01-01“…Concluyo que estos sectores, para defender los espacios de representación política e intelectual que lograron conquistar, articularon un discurso que cuestionó la supuesta inferioridad racial de los afrodescendientes que varios miembros de la élite blanca intentaron imponer durante la Hegemonía conservadora.…”
Get full text
Article -
15270
Blood serum IgE and muscle element levels in Cyprinus carpio infested by Argulus foliaceus in Lake Çavuşçu (Konya/Turkey): Assessment of their impact on human health
Published 2024-12-01“…IgE is considered part of the parasite-specific immune defense system called allergic antibody. The results were compared with serum IgE levels in non-parasitized carp. …”
Get full text
Article -
15271
Trust evaluation model for distributed home photovoltaic collection scenarios in new power system
Published 2023-07-01“…Aiming at the problem that the existing sensor network trust evaluation model could not be directly applied to the new power system distributed home photovoltaic collection scenario, which was difficult to meet the require-ments of strong computing power and high defense power of the new power system, a distributed dynamic trust evaluation model based on multi-index detection was proposed.Firstly, the communication trust evaluation based on Bayes was carried out according to the historical interaction of terminal acquisition nodes.Then, the currently col-lected data was evaluated by perceptual trust based on its historical data support degree and regional trust based on probability density.Finally, the entropy weight method was used to decentralize each trust module’s values dynamically.The node activeness and double reward and punishment mechanism were introduced to calculate the comprehensive trust value and realize the dynamic update.The experimental results show that the four levels of the trust evaluation model are suitable for the new power system environment and can be used to detect the distributed in 20 round period of household photovoltaic power generation collection given the signal in the scene, achieve dynamic and accurate trust evaluation of abnormal nodes in the case of physical environment factors, equipment quality factors, human misoperation and malicious intrusion.…”
Get full text
Article -
15272
La enfermería como apertura a la interdisciplina
Published 2017-11-01“…A partir de estos dos elementos se propone y defiende que el mejor término para describir su objeto es complejo, considerando la propuesta de Rolando García de sistema complejo, para defender a la enfermería como un todo complejo, incluso al compararla con los elementos teóricos (como los de la enfermería) y las evidencias empíricas de testimonios de la práctica de la enfermería. …”
Get full text
Article -
15273
Higher School and Science: Values and Meanings (To the Question of a Status of the Course “History and Philosophy of Science”)
Published 2018-07-01“…The article addresses the actual problems of teaching one of the mandatory training courses included in the program of preparation for the final examination before Thesis defense for the degree of Candidate of Sciences. The immediate pragmatic purpose of the introduction of a new subject “History and philosophy of science” in 2007 was to acquaint graduate students and applicants with the basics of research work, to demonstrate them the norms of professional scientific work. …”
Get full text
Article -
15274
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01“…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
Get full text
Article -
15275
THE SPECIFICITY OF THE MINOR'S LIABILITY IN COMPARATIVE CRIMINAL LAW
Published 2024-05-01“…Criminal liability is the most serious form of legal liability, since it occurs when the most important social values are harmed, social values that become legal values by virtue of the legislator's defense. One category of active subjects of a conflict - seen as a criminal legal relationship - is minors. …”
Get full text
Article -
15276
Modeling and security analysis of hardware trojan attack based on GSCPN
Published 2024-08-01“…Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack and security assessment model based on the generalized stochastic coloring Petri net (GSCPN) was proposed. …”
Get full text
Article -
15277
Expressões retóricas do amor no Cancioneiro Geral de Garcia de Resende
Published 2025-01-01“…In antiquity, the orator was guided by elocutio to make his speech a rich ornament with the intention of convincing his audience that he, the orator, defended a correct thesis, and that his oratory was, above all, a piece for delight. …”
Get full text
Article -
15278
Antoine Hennion: música, mediação e amadores
Published 2019-12-01“…Neste artigo, relevamos o posicionamento de Antoine Hennion, que defende que o ato de interpretação musical e o significado da música são inseparáveis do consumo de textos pelos públicos; trata-se, então, de dar ênfase interpretativa a um processo que é também subjetivo, onde os públicos surgem como agentes reflexivos e criativos. …”
Get full text
Article -
15279
Why women or why not men? sex and autoimmune diseases
Published 2018-01-01“…This enhanced reactivity may contribute to the stronger defense against infectious agents and to the reasons for which, on the other hand, women are more prone to develop autoimmune diseases. …”
Get full text
Article -
15280
Advancing Gender Equality in Muslim Leadership
Published 2025-01-01“…The research argues that the exclusion of women from ulama bodies is neither theologically justified nor practically defensible. By drawing on egalitarian interpretations of Islamic traditions, historical examples of women's scholarly contributions in Islam, and contemporary global practices of women's religious leadership, the article challenges entrenched patriarchal interpretations that restrict women's roles. …”
Get full text
Article