Showing 15,261 - 15,280 results of 16,989 for search 'Defekt~', query time: 2.17s Refine Results
  1. 15261

    La presse italienne, le pouvoir politique et l’autorité judiciaire durant le fascisme by Yannick Beaulieu

    Published 2004-09-01
    “…On one hand, left-wing parties viewed the judiciary as a bourgeoisie-closely allied to the government; on the other hand, the fascist groups published blacklists containing the names of Judges they claimed were too weak in dealing with left-wing activists or too biased against fascist defendants. The Giacomo Matteotti case was a turning-point in the consolidation of the Benito Mussolini’s power, using the crisis, he transformed Italy into a totalitarian regime: with all opposition newspapers banned and fascists publications kept under strict control. …”
    Get full text
    Article
  2. 15262
  3. 15263

    On Individual Repositioning Distance along Platform during Train Waiting by Fabien Leurent, Xiaoyan Xie

    Published 2018-01-01
    “…Maximum likelihood estimation is proposed and applied to a case study of commuter rail line in Paris: journeys between stations Vincennes and La Défense along line A of the Regional Express Railways. …”
    Get full text
    Article
  4. 15264

    COOPERAREA ÎN INTELLIGENCE DINTRE ALIANȚA NORD-ATLANTICĂ ȘI UNIUNEA EUROPEANĂ by Şerban-Dan PREDESCU, Tiberiu TĂNASE

    Published 2023-01-01
    “…An important dimension for the NATO-EU partnership to achieve its objectives is collaboration and cooperation in intelligence, and the main element is the formation of a center of excellence in intelligence analysis in Bucharest, Romania having an extremely important role in the supervision and defense of the eastern flank of NATO. By collaboration we refer to the initiation and development of specific actions aimed at obtaining, verifying and capitalizing on information and information products, while cooperation implies the organization, coordination, support and joint realization of specific actions by the structures of the information community. …”
    Get full text
    Article
  5. 15265

    De las nulidades contractuales y el arbitramento en materia administrativa by Jesús David Orozco Vanegas

    Published 2003-01-01
    “…En este ensayo se abordan sólo algunos de los aspectos e inconvenientes que tiene el arbitramento en materia Adminis- trativa, sobre todo en los casos en que se discute sobre los vicios o defectos del contrato como acto jurídico…”
    Get full text
    Article
  6. 15266

    Economic Security in Border Areas: The Fulfillment of Community Welfare by Budi Hermawan Bangun, Fatma Muthia Kinanti, Muhammad Rafi Darajati

    Published 2024-10-01
    “…While Law Number 43 of 2008 aims to manage borders, unclear authority and regulatory overlap hinder effectiveness, compounded by military-focused defense strategies, limited budgets, and inadequate infrastructure. …”
    Get full text
    Article
  7. 15267

    Sexualités au Maghreb by Valérie Beaumont, Corinne Cauvin Verner, François Pouillon

    Published 2010-12-01
    “…While refusing to adopt the “Orientalist” perspective (Arab-Islamic sexuality explained by the sacred texts) the “culturalist” perspective (a specifically North African way of configuring sexuality), the “moralist” perspective (societies being menaced by political islam or the “corrupted West”) and the “activist” perspective (as a defence of individual freedom, notably sexual, feminism, or political Islam), these contemporary ethnographies recreate the tensions between individualism and community ethos, between national and local dictates, between western ethics and religious proscription, all of these attracting considerable media coverage. …”
    Get full text
    Article
  8. 15268

    RESULTS OF RESEARCH INTO CO LOA CITADEL (2007 - 2014): MATERIALS AND DISCUSSION by Trịnh Hoàng Hiệp

    Published 2019-09-01
    “…Co Loa citadel, built by King An Duong, inherited a previous one - the citadel/ramparts of a defensive village from a chiefdom of the late Dong Son period. …”
    Get full text
    Article
  9. 15269

    Re-visitando la Hegemonía conservadora: raza y política en Cartagena (Colombia), 1885-1930 by Francisco Javier Flórez Bolívar

    Published 2018-01-01
    “…Concluyo que estos sectores, para defender los espacios de representación política e intelectual que lograron conquistar, articularon un discurso que cuestionó la supuesta inferioridad racial de los afrodescendientes que varios miembros de la élite blanca intentaron imponer durante la Hegemonía conservadora.…”
    Get full text
    Article
  10. 15270

    Blood serum IgE and muscle element levels in Cyprinus carpio infested by Argulus foliaceus in Lake Çavuşçu (Konya/Turkey): Assessment of their impact on human health by Gümüş Numan Emre

    Published 2024-12-01
    “…IgE is considered part of the parasite-specific immune defense system called allergic antibody. The results were compared with serum IgE levels in non-parasitized carp. …”
    Get full text
    Article
  11. 15271

    Trust evaluation model for distributed home photovoltaic collection scenarios in new power system by Li LI, Xiaolong WANG, Zhixin ZHANG, Rongliang SHI, Xu GUO

    Published 2023-07-01
    “…Aiming at the problem that the existing sensor network trust evaluation model could not be directly applied to the new power system distributed home photovoltaic collection scenario, which was difficult to meet the require-ments of strong computing power and high defense power of the new power system, a distributed dynamic trust evaluation model based on multi-index detection was proposed.Firstly, the communication trust evaluation based on Bayes was carried out according to the historical interaction of terminal acquisition nodes.Then, the currently col-lected data was evaluated by perceptual trust based on its historical data support degree and regional trust based on probability density.Finally, the entropy weight method was used to decentralize each trust module’s values dynamically.The node activeness and double reward and punishment mechanism were introduced to calculate the comprehensive trust value and realize the dynamic update.The experimental results show that the four levels of the trust evaluation model are suitable for the new power system environment and can be used to detect the distributed in 20 round period of household photovoltaic power generation collection given the signal in the scene, achieve dynamic and accurate trust evaluation of abnormal nodes in the case of physical environment factors, equipment quality factors, human misoperation and malicious intrusion.…”
    Get full text
    Article
  12. 15272

    La enfermería como apertura a la interdisciplina by José Enrique Gómez Álvarez

    Published 2017-11-01
    “…A partir de estos dos elementos se propone y defiende que el mejor término para describir su objeto es complejo, considerando la propuesta de Rolando García de sistema complejo, para defender a la enfermería como un todo complejo, incluso al compararla con los elementos teóricos (como los de la enfermería) y las evidencias empíricas de testimonios de la práctica de la enfermería. …”
    Get full text
    Article
  13. 15273

    Higher School and Science: Values and Meanings (To the Question of a Status of the Course “History and Philosophy of Science”) by N. I. Kuznetsova

    Published 2018-07-01
    “…The article addresses the actual problems of teaching one of the mandatory training courses included in the program of preparation for the final examination before Thesis defense for the degree of Candidate of Sciences. The immediate pragmatic purpose of the introduction of a new subject “History and philosophy of science” in 2007 was to acquaint graduate students and applicants with the basics of research work, to demonstrate them the norms of professional scientific work. …”
    Get full text
    Article
  14. 15274

    Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU

    Published 2022-07-01
    “…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
    Get full text
    Article
  15. 15275

    THE SPECIFICITY OF THE MINOR'S LIABILITY IN COMPARATIVE CRIMINAL LAW by Ana-Maria ROTĂRESCU

    Published 2024-05-01
    “…Criminal liability is the most serious form of legal liability, since it occurs when the most important social values are harmed, social values that become legal values by virtue of the legislator's defense. One category of active subjects of a conflict - seen as a criminal legal relationship - is minors. …”
    Get full text
    Article
  16. 15276

    Modeling and security analysis of hardware trojan attack based on GSCPN by MEI Bo, GUO Wei, CAO Zhipeng, LI Peijie, ZHANG Wenbo

    Published 2024-08-01
    “…Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack and security assessment model based on the generalized stochastic coloring Petri net (GSCPN) was proposed. …”
    Get full text
    Article
  17. 15277

    Expressões retóricas do amor no Cancioneiro Geral de Garcia de Resende by Geraldo Augusto Fernandes

    Published 2025-01-01
    “…In antiquity, the orator was guided by elocutio to make his speech a rich ornament with the intention of convincing his audience that he, the orator, defended a correct thesis, and that his oratory was, above all, a piece for delight. …”
    Get full text
    Article
  18. 15278

    Antoine Hennion: música, mediação e amadores by Paula Guerra, Marcílio Dantas Brandão, Alix Didier Sarrouy

    Published 2019-12-01
    “…Neste artigo, relevamos o posicionamento de Antoine Hennion, que defende que o ato de interpretação musical e o significado da música são inseparáveis do consumo de textos pelos públicos; trata-se, então, de dar ênfase interpretativa a um processo que é também subjetivo, onde os públicos surgem como agentes reflexivos e criativos. …”
    Get full text
    Article
  19. 15279

    Why women or why not men? sex and autoimmune diseases by Gilberto Cincinelli, Elena Generali, Rajkiran Dudam, Vinod Ravindran, Carlo Selmi

    Published 2018-01-01
    “…This enhanced reactivity may contribute to the stronger defense against infectious agents and to the reasons for which, on the other hand, women are more prone to develop autoimmune diseases. …”
    Get full text
    Article
  20. 15280

    Advancing Gender Equality in Muslim Leadership by Fatima Essop

    Published 2025-01-01
    “…The research argues that the exclusion of women from ulama bodies is neither theologically justified nor practically defensible. By drawing on egalitarian interpretations of Islamic traditions, historical examples of women's scholarly contributions in Islam, and contemporary global practices of women's religious leadership, the article challenges entrenched patriarchal interpretations that restrict women's roles. …”
    Get full text
    Article