Showing 15,941 - 15,960 results of 16,989 for search 'Defekt~', query time: 2.52s Refine Results
  1. 15941

    Pengalaman Negatif Pendidik Sebaya Kelompok Kunci Lelaki Seks dengan Lelaki dalam Memberikan Layanan Pencegahan HIV by Mahathir, Bunga Permata Wenny, Nurlita, Lutfiah Khairunnisa

    Published 2024-10-01
    “…In order to deal with unpleasant situations sensibly, it is vital to provide adequate support and protection recommendations, as well as   having awareness of self-defence mechanisms. …”
    Get full text
    Article
  2. 15942

    Experimental and Constitutive Model Study on Dynamic Mechanical Behavior of Metal Rubber under High-Speed Impact Loading by Youchun Zou, Chao Xiong, Junhui Yin, Kaibo Cui, Xiujie Zhu, Huiyong Deng, Shijun Song

    Published 2021-01-01
    “…The development of lightweight, impact-resistant, and high energy-consuming materials is of great significance for improving the defense capabilities of military equipment. As a new type of damping material, metal rubber has demonstrated great potential for application in the field of impact protection. …”
    Get full text
    Article
  3. 15943

    ÜNİVERSİTE ÖĞRENCİLERİ ARASINDA ANINDA MESAJLAŞMA KULLANIMI by Birol Günar, Şükrü Balcı

    Published 2013-11-01
    “…Anında mesajlaşma servislerini kız/erkek arkadaşlarıyla romantik iletişim kurmak için daha çok kullanan denekler, günlük daha uzun süre anında mesajlaşmaktadırlar.…”
    Get full text
    Article
  4. 15944

    Protecting Consumers Against Defamation Claims: The Role of Common Interest in Product Reviews by Evi Kongres, Fajar Sugianto, Erny Herlin Setyorini, Bariyima Sylvester Kokpan, Sheng Zhang

    Published 2024-12-01
    “…The research findings accentuate the significance of invoking the public interest doctrine in consumer-related litigation, thereby fortifying legal defenses against defamation allegations.…”
    Get full text
    Article
  5. 15945

    Investigation on the stress-strain relationship of rubberized concrete under uniaxial compression by Jianfan Wang

    Published 2025-01-01
    “…The incorporation of rubber increased the peak strain of concrete, with the maximum increase reaching 26.2%. The ultimate deflection increased by about 8.0%. Meanwhile, the toughness index was found to increase, with an increase of about 36.8%. …”
    Get full text
    Article
  6. 15946

    Population persistence, phenotypic divergence, and metabolic adaptation in yarrow (Achillea millefolium L.) by Gianalberto Losapio, Baptiste Doussot, Fabrizio Araniti, Leonardo Bruno, Roger Guevara, Rodolfo Dirzo

    Published 2024-12-01
    “…Furthermore, we document differentiation in metabolic diversity involving plant defenses and stress response. These findings suggest that ongoing adaptation is constrained by long‐term changes in temperature and precipitation as well as by local biotic interactions. …”
    Get full text
    Article
  7. 15947

    Numerical Investigation on the Effects of Embedding PVC Pipes in Reinforced Concrete Beams. by Ampaire, Comboni

    Published 2024
    “…After the analysis was turned in, the results were compared to those of a solid beam, including stresses, strains, the load-deflection ductility index, and crack patterns. The results indicated that the stresses in the bottom reinforcement and concrete increased as the pipe size grew. …”
    Get full text
    Thesis
  8. 15948

    Custos colaterais da violência no Brasil: rumo a um direito moldado pela insegurança? by Diego Werneck Arguelhes, Mariana Pargendler

    “…Demonstra-se que as políticas adaptativas têm ganhado espaço nos mais diversos ramos do ordenamento jurídico nacional, influenciando áreas aparentemente tão díspares e estranhas à problemática da insegurança como o direito comercial, o direito administrativo e até mesmo as regras de trânsito. Defende-se que, não obstante a sua aceitação e influência crescentes, tais medidas não podem ser aceitas de forma acrítica. …”
    Get full text
    Article
  9. 15949

    The Yugoslav National Front: Attempt(s) to unify the Yugointegralists extreme right 1935-1939 by Dragosavljević Vasilije

    Published 2025-01-01
    “…At the same time, this paradox (in addition to the instability of Stojadinović's political principles) clearly illustrates the role of the theory of integral Yugoslavism as the last line of defense for the integrity of the Yugoslav state in moments of crisis.…”
    Get full text
    Article
  10. 15950

    Counteraction to sabotage measures on ammunition depots in the context of hybrid warfare by Ye. V. Karmannyi, M. V. Lys

    Published 2018-11-01
    “…In the context of the military conflict, where Ukraine is located, the issue of counteracting and combating actions of sabotage, which is understood as an act aimed at weakening the state of explosions, arson, or other actions aimed at mass destruction of people, causing bodily harm or other harm to their health, destruction or damage of objects that have an important national or defense significance, etc. In our study, particular attention is paid to such objects as stockpiles of ammunition, where weapons, missiles, ammunition, explosives, firearms, special means are stored. …”
    Get full text
    Article
  11. 15951
  12. 15952

    Une pierre à l’édifice ? La littérature mise au service des patrimoines by Mathilde Labbé, Marcela Scibiorska

    Published 2024-12-01
    “…Comment comprendre cependant les transferts de valeurs fondant ces échanges lorsque la littérature est mobilisée pour la défense d’objets relevant déjà d’un patrimoine constitué ou en cours de constitution ? …”
    Get full text
    Article
  13. 15953

    Impact of Indirect Taxes on Income Distribution by Şahin Karabulut

    Published 2020-04-01
    “…For this reason, the idea that the government intervenes in the market and allocates the income as it should be being a highly defended subject in the literature.There is no doubt that the state needs certain instruments when allocating income among economic actors in the market. …”
    Get full text
    Article
  14. 15954

    Survey on intellectual property protection for deep learning model by Xinya WANG, Guang HUA, Hao JIANG, Haijian ZHANG

    Published 2022-04-01
    “…With the rapid development of deep learning technology, deep learning models have been widely used in many fields such as image classification and speech recognition.Training a deep learning model relies on a large amount of data and computing power, thus selling the trained model or providing specific services (DLaaS, e.g.) has become a new business.However, the commercial interests of model trainers and the intellectual property rights of model developers may be violated if the model is maliciously stolen.With deep neural network watermarking becoming a new research topic, multimedia copyright protection techniques were used for deep learning model protection.Numerous methods have been proposed in this field and then a comprehensive survey is needed.the existing deep neural network watermarking methods were elaborated and summarized and the future research directions of this field were discussed.The overall framework of neural network watermarking was presented, whereby the basic concepts such as classification model and model backdoor were introduced.Secondly, the existing methods were divided into two types according to the mechanism of watermark embedding, one is to embed the watermark bits into the carrier of internal information of the network, and the other one uses the established backdoor mapping as the watermark.These two existing deep neural network watermarking methods were analyzed and summarized, and attacks to the watermarks were also introduced and discussed.By analyzing the white-box and black-box conditions in watermarking scenario, it comes to the conclusion that the model is difficult to be effectively protected when it is distributed in the white-box manner, and the neural network watermark defenses in the black-box distribution and black-box verification are both worthy for further research.…”
    Get full text
    Article
  15. 15955

    MalAware: A tabletop exercise for malware security awareness education and incident response training by Giddeon Angafor, Iryna Yevseyeva, Leandros Maglaras

    Published 2024-01-01
    “…It enables staff to leverage scenario-based and simulated security breach examples, including role-play, to establish appropriate malware defences. MalAware’s practical hands-on exercises can assist trainees in gaining essential malware and other threat mitigation skills, helping to protect the security and privacy of IoTs.…”
    Get full text
    Article
  16. 15956

    Kissing the Church Bell or Ringing the Church Bell? (About a verse of the ode of “Tarsaeiyeh”) by Majid Mansouri

    Published 2024-01-01
    “…The main complexity of the verse in question is the reference that "kissing the church bell" has the ironic meaning of becoming an infidel and leaving the religion of Islam.The main problem in Khaqani's verse is that "kissing the church bell" does not occur in any of the old texts, and unlike kissing the crucifix, "kissing the church bell" was never widespread in Christianity; In addition to the various statements of the commentators of Khaqani's collection of poems, two detailed articles have exclusively dealt with this topic; the first article is about the proposal to correct "Kissing the church bell" to "Drinking the church bell" and the second defends the authenticity of the recording of "kissing the church bell" and rejects the first article. …”
    Get full text
    Article
  17. 15957

    Identification and Characterization of a Novel Rat MAVS Variant Modulating NFκB Signaling by Ihsan Nalkiran, Hatice Sevim Nalkiran

    Published 2025-01-01
    “…The innate immune response serves as the primary defense against viral infections, with the recognition of viral nucleic acids by pattern recognition receptors (PRRs) initiating antiviral responses. …”
    Get full text
    Article
  18. 15958
  19. 15959

    Studying strategic behaviour of small industrial enterprises in the context of the organizational and industry life cycle concepts by Elena D. Vaisman, Irina S. Pylaeva, Maria V. Podshivalov

    Published 2025-01-01
    “…The results showed that mature small enterprises with an ‘aggressive’ intuitively strategic behaviour are the predominant type of business in a mature industry, while for small enterprises in a growing industry ‘defender’ and ‘counterstrategy’ are the prevalent strategies at all the life cycle stages. …”
    Get full text
    Article
  20. 15960

    GaitVision: Real-Time Extraction of Gait Parameters Using Residual Attention Network by Mohammad Farukh Hashmi, B. Kiran Kumar Ashish, Prabhu Chaitanya, Avinash Keskar, Sinan Q. Salih, Neeraj Dhanraj Bokde

    Published 2021-01-01
    “…This work was specially designed for Defence Department premises authentication. The authors have achieved an accuracy of 90%±1.3% in real time. …”
    Get full text
    Article