Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
15941
Pengalaman Negatif Pendidik Sebaya Kelompok Kunci Lelaki Seks dengan Lelaki dalam Memberikan Layanan Pencegahan HIV
Published 2024-10-01“…In order to deal with unpleasant situations sensibly, it is vital to provide adequate support and protection recommendations, as well as having awareness of self-defence mechanisms. …”
Get full text
Article -
15942
Experimental and Constitutive Model Study on Dynamic Mechanical Behavior of Metal Rubber under High-Speed Impact Loading
Published 2021-01-01“…The development of lightweight, impact-resistant, and high energy-consuming materials is of great significance for improving the defense capabilities of military equipment. As a new type of damping material, metal rubber has demonstrated great potential for application in the field of impact protection. …”
Get full text
Article -
15943
ÜNİVERSİTE ÖĞRENCİLERİ ARASINDA ANINDA MESAJLAŞMA KULLANIMI
Published 2013-11-01“…Anında mesajlaşma servislerini kız/erkek arkadaşlarıyla romantik iletişim kurmak için daha çok kullanan denekler, günlük daha uzun süre anında mesajlaşmaktadırlar.…”
Get full text
Article -
15944
Protecting Consumers Against Defamation Claims: The Role of Common Interest in Product Reviews
Published 2024-12-01“…The research findings accentuate the significance of invoking the public interest doctrine in consumer-related litigation, thereby fortifying legal defenses against defamation allegations.…”
Get full text
Article -
15945
Investigation on the stress-strain relationship of rubberized concrete under uniaxial compression
Published 2025-01-01“…The incorporation of rubber increased the peak strain of concrete, with the maximum increase reaching 26.2%. The ultimate deflection increased by about 8.0%. Meanwhile, the toughness index was found to increase, with an increase of about 36.8%. …”
Get full text
Article -
15946
Population persistence, phenotypic divergence, and metabolic adaptation in yarrow (Achillea millefolium L.)
Published 2024-12-01“…Furthermore, we document differentiation in metabolic diversity involving plant defenses and stress response. These findings suggest that ongoing adaptation is constrained by long‐term changes in temperature and precipitation as well as by local biotic interactions. …”
Get full text
Article -
15947
Numerical Investigation on the Effects of Embedding PVC Pipes in Reinforced Concrete Beams.
Published 2024“…After the analysis was turned in, the results were compared to those of a solid beam, including stresses, strains, the load-deflection ductility index, and crack patterns. The results indicated that the stresses in the bottom reinforcement and concrete increased as the pipe size grew. …”
Get full text
Thesis -
15948
Custos colaterais da violência no Brasil: rumo a um direito moldado pela insegurança?
“…Demonstra-se que as políticas adaptativas têm ganhado espaço nos mais diversos ramos do ordenamento jurídico nacional, influenciando áreas aparentemente tão díspares e estranhas à problemática da insegurança como o direito comercial, o direito administrativo e até mesmo as regras de trânsito. Defende-se que, não obstante a sua aceitação e influência crescentes, tais medidas não podem ser aceitas de forma acrítica. …”
Get full text
Article -
15949
The Yugoslav National Front: Attempt(s) to unify the Yugointegralists extreme right 1935-1939
Published 2025-01-01“…At the same time, this paradox (in addition to the instability of Stojadinović's political principles) clearly illustrates the role of the theory of integral Yugoslavism as the last line of defense for the integrity of the Yugoslav state in moments of crisis.…”
Get full text
Article -
15950
Counteraction to sabotage measures on ammunition depots in the context of hybrid warfare
Published 2018-11-01“…In the context of the military conflict, where Ukraine is located, the issue of counteracting and combating actions of sabotage, which is understood as an act aimed at weakening the state of explosions, arson, or other actions aimed at mass destruction of people, causing bodily harm or other harm to their health, destruction or damage of objects that have an important national or defense significance, etc. In our study, particular attention is paid to such objects as stockpiles of ammunition, where weapons, missiles, ammunition, explosives, firearms, special means are stored. …”
Get full text
Article -
15951
-
15952
Une pierre à l’édifice ? La littérature mise au service des patrimoines
Published 2024-12-01“…Comment comprendre cependant les transferts de valeurs fondant ces échanges lorsque la littérature est mobilisée pour la défense d’objets relevant déjà d’un patrimoine constitué ou en cours de constitution ? …”
Get full text
Article -
15953
Impact of Indirect Taxes on Income Distribution
Published 2020-04-01“…For this reason, the idea that the government intervenes in the market and allocates the income as it should be being a highly defended subject in the literature.There is no doubt that the state needs certain instruments when allocating income among economic actors in the market. …”
Get full text
Article -
15954
Survey on intellectual property protection for deep learning model
Published 2022-04-01“…With the rapid development of deep learning technology, deep learning models have been widely used in many fields such as image classification and speech recognition.Training a deep learning model relies on a large amount of data and computing power, thus selling the trained model or providing specific services (DLaaS, e.g.) has become a new business.However, the commercial interests of model trainers and the intellectual property rights of model developers may be violated if the model is maliciously stolen.With deep neural network watermarking becoming a new research topic, multimedia copyright protection techniques were used for deep learning model protection.Numerous methods have been proposed in this field and then a comprehensive survey is needed.the existing deep neural network watermarking methods were elaborated and summarized and the future research directions of this field were discussed.The overall framework of neural network watermarking was presented, whereby the basic concepts such as classification model and model backdoor were introduced.Secondly, the existing methods were divided into two types according to the mechanism of watermark embedding, one is to embed the watermark bits into the carrier of internal information of the network, and the other one uses the established backdoor mapping as the watermark.These two existing deep neural network watermarking methods were analyzed and summarized, and attacks to the watermarks were also introduced and discussed.By analyzing the white-box and black-box conditions in watermarking scenario, it comes to the conclusion that the model is difficult to be effectively protected when it is distributed in the white-box manner, and the neural network watermark defenses in the black-box distribution and black-box verification are both worthy for further research.…”
Get full text
Article -
15955
MalAware: A tabletop exercise for malware security awareness education and incident response training
Published 2024-01-01“…It enables staff to leverage scenario-based and simulated security breach examples, including role-play, to establish appropriate malware defences. MalAware’s practical hands-on exercises can assist trainees in gaining essential malware and other threat mitigation skills, helping to protect the security and privacy of IoTs.…”
Get full text
Article -
15956
Kissing the Church Bell or Ringing the Church Bell? (About a verse of the ode of “Tarsaeiyeh”)
Published 2024-01-01“…The main complexity of the verse in question is the reference that "kissing the church bell" has the ironic meaning of becoming an infidel and leaving the religion of Islam.The main problem in Khaqani's verse is that "kissing the church bell" does not occur in any of the old texts, and unlike kissing the crucifix, "kissing the church bell" was never widespread in Christianity; In addition to the various statements of the commentators of Khaqani's collection of poems, two detailed articles have exclusively dealt with this topic; the first article is about the proposal to correct "Kissing the church bell" to "Drinking the church bell" and the second defends the authenticity of the recording of "kissing the church bell" and rejects the first article. …”
Get full text
Article -
15957
Identification and Characterization of a Novel Rat MAVS Variant Modulating NFκB Signaling
Published 2025-01-01“…The innate immune response serves as the primary defense against viral infections, with the recognition of viral nucleic acids by pattern recognition receptors (PRRs) initiating antiviral responses. …”
Get full text
Article -
15958
Development of digital competence of university teachers and teaching staff
Published 2024-12-01Get full text
Article -
15959
Studying strategic behaviour of small industrial enterprises in the context of the organizational and industry life cycle concepts
Published 2025-01-01“…The results showed that mature small enterprises with an ‘aggressive’ intuitively strategic behaviour are the predominant type of business in a mature industry, while for small enterprises in a growing industry ‘defender’ and ‘counterstrategy’ are the prevalent strategies at all the life cycle stages. …”
Get full text
Article -
15960
GaitVision: Real-Time Extraction of Gait Parameters Using Residual Attention Network
Published 2021-01-01“…This work was specially designed for Defence Department premises authentication. The authors have achieved an accuracy of 90%±1.3% in real time. …”
Get full text
Article