Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
16001
Performance of Polymer Composite Constituted Cabinet Dryer Integrated within a Solar Flat Plate Collector
Published 2023-01-01Get full text
Article -
16002
The “Lieutenant Generation” and the Traditions of MGIMO-University
Published 2015-04-01“…The establishment of the groundwork of the MGIMO corporate ethic: exigency and amicability, proactiveness and responsibility, openness to the outside world and firmness in defending one's positions - is inseparably connected with the years of the "lieutenant generation", with its first enrollments and first graduations. …”
Get full text
Article -
16003
Terahertz Science and Technology in Astronomy, Telecommunications, and Biophysics
Published 2025-01-01Get full text
Article -
16004
The definition of the state value in terms of functional quintessence
Published 2024-03-01“…Internal functions include, for example, regulatory, defence, etc., while external functions include diplomatic and economic (in the context of foreign activities). …”
Get full text
Article -
16005
Bejlisova aféra. Antisemitismus a ruský politický život v letech 1911-1913
Published 2006-01-01“…They used the affair for defending their own position in Russian politics against the radical right and the tsarist regime. …”
Get full text
Article -
16006
Overcoming β-Cell Dysfunction in Type 2 Diabetes Mellitus: CD36 Inhibition and Antioxidant System
Published 2025-01-01“…Oral hypoglycemic agents, such as metformin, teneligliptin, and pioglitazone, have shown protective effects on β-cells by enhancing antioxidant defenses. These agents reduce glucotoxicity via mechanisms such as suppressing CD36 expression and stabilizing mitochondrial function. …”
Get full text
Article -
16007
Effect of synthesis on the purity and particle size of ZrB2 powder
Published 2016-01-01Get full text
Article -
16008
Korisničke mogućnosti automatske telefonske centrale ASB-501 u funkciji interfonske centrale
Published 1990-07-01Get full text
Article -
16009
La forteresse de Sadr, une lecture géo-historique au temps des croisés
Published 2011-10-01“…At the heart of the Sinai desert lies the Sadr fortress, today called Qal-at al-Gindi, is the most authentic archeological legacy left in the Middle East by the famous Kurdish sovereign Saladin (1174-1193). …”
Get full text
Article -
16010
A Protective Role of Canonical Wnt/β-Catenin Pathway in Pathogenic Bacteria-Induced Inflammatory Responses
Published 2024-01-01“…Inflammation is a complex host defensive response against various disease-associated pathogens. …”
Get full text
Article -
16011
Research on the Mechanical Properties of a Glass Fiber Reinforced Polymer-Steel Combined Truss Structure
Published 2014-01-01Get full text
Article -
16012
Rationalization of Evil through Media: A Twitter Discourse Analysis on Israel's Genocide against Palestine after October 7
Published 2024-12-01“…Netanyahu and US President Joe Biden and the official X accounts of the Office of the Prime Minister of Israel and Israel Defense Forces will be subjected to discourse analysis, limited to October-November. …”
Get full text
Article -
16013
Observation of two-dimensional time-reversal broken non-Abelian topological states
Published 2024-11-01Get full text
Article -
16014
Implicit Forms of Ethnic Insult for Europeans (as Found in Rhyming Slang)
Published 2014-12-01“…Along with the explicit, direct, offensive and non-politically correct ethnic labels and nicknames there are quite a few with a deceptive, innocuous shape that conceals their offensive content. …”
Get full text
Article -
16015
Semantic Integration of Sensor Data and Disaster Management Systems: The Emergency Archetype Approach
Published 2013-05-01Get full text
Article -
16016
Exploring the impact of pesticide exposure on physiological and metabolic dynamics in olive trees infested by key bioagressors
Published 2024-09-01“…These changes suggest that treated olive trees experienced stress and activated defense mechanisms in response.…”
Get full text
Article -
16017
A estratégia da urgência: considerações sobre O cheiro do ralo, de Lourenço Mutarelli
Published 2018-01-01“…Reconociendo la fuerte presencia de ese elemento estructural en la referida narrativa, se busca, en este estudio, defender la hipótesis de que dicho elemento formal se presenta como un recurso eficiente para el alcance y la captación de lectores apresurados. …”
Get full text
Article -
16018
Endoplasmic Reticulum Stress: Its Role in Disease and Novel Prospects for Therapy
Published 2012-01-01“…The cell reacts to ER stress by initiating a defensive process, called the unfolded protein response (UPR), which is comprised of cellular mechanisms aimed at adaptation and safeguarding cellular survival or, in cases of excessively severe stress, at initiation of apoptosis and elimination of the faulty cell. …”
Get full text
Article -
16019
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
16020
The impact of experimental forest fire on collembolan communities
Published 2014-12-01“…Contribution of epigeic, hemiedaphic and euedaphic species in collembolan communities of investigated areas could point to different defense strategies of these invertebrates. Immature individuals of Collembola were the most numerous in burnt plots and at the border of burnt plots and this phenomenon is probably crucial for the reconstruction of collembolan communities after the fire.…”
Get full text
Article