Showing 16,001 - 16,020 results of 16,989 for search 'Defekt~', query time: 1.87s Refine Results
  1. 16001
  2. 16002

    The “Lieutenant Generation” and the Traditions of MGIMO-University by A. V. Shestopal

    Published 2015-04-01
    “…The establishment of the groundwork of the MGIMO corporate ethic: exigency and amicability, proactiveness and responsibility, openness to the outside world and firmness in defending one's positions - is inseparably connected with the years of the "lieutenant generation", with its first enrollments and first graduations. …”
    Get full text
    Article
  3. 16003
  4. 16004

    The definition of the state value in terms of functional quintessence by S. G. Pevko

    Published 2024-03-01
    “…Internal functions include, for example, regulatory, defence, etc., while external functions include diplomatic and economic (in the context of foreign activities). …”
    Get full text
    Article
  5. 16005

    Bejlisova aféra. Antisemitismus a ruský politický život v letech 1911-1913 by Zbyněk Vydra

    Published 2006-01-01
    “…They used the affair for defending their own position in Russian politics against the radical right and the tsarist regime. …”
    Get full text
    Article
  6. 16006

    Overcoming β-Cell Dysfunction in Type 2 Diabetes Mellitus: CD36 Inhibition and Antioxidant System by Il Rae Park, Yong Geun Chung, Kyu Chang Won

    Published 2025-01-01
    “…Oral hypoglycemic agents, such as metformin, teneligliptin, and pioglitazone, have shown protective effects on β-cells by enhancing antioxidant defenses. These agents reduce glucotoxicity via mechanisms such as suppressing CD36 expression and stabilizing mitochondrial function. …”
    Get full text
    Article
  7. 16007
  8. 16008
  9. 16009

    La forteresse de Sadr, une lecture géo-historique au temps des croisés by Corinne Feïss-Jehel, Jean-Michel Mouton, Claudine Piaton, Pierre-Jérôme Jehel, Jeannine Le Rhun

    Published 2011-10-01
    “…At the heart of the Sinai desert lies the Sadr fortress, today called Qal-at al-Gindi, is the most authentic archeological legacy left in the Middle East by the famous Kurdish sovereign Saladin (1174-1193). …”
    Get full text
    Article
  10. 16010

    A Protective Role of Canonical Wnt/β-Catenin Pathway in Pathogenic Bacteria-Induced Inflammatory Responses by Zhongjia Jiang, Weiping Zhou, Xing Tian, Peng Zou, Ning Li, Chunmeng Zhang, Yanting Li, Guangyan Liu

    Published 2024-01-01
    “…Inflammation is a complex host defensive response against various disease-associated pathogens. …”
    Get full text
    Article
  11. 16011
  12. 16012

    Rationalization of Evil through Media: A Twitter Discourse Analysis on Israel's Genocide against Palestine after October 7 by Filiz Orhan Çağlayan

    Published 2024-12-01
    “…Netanyahu and US President Joe Biden and the official X accounts of the Office of the Prime Minister of Israel and Israel Defense Forces will be subjected to discourse analysis, limited to October-November. …”
    Get full text
    Article
  13. 16013
  14. 16014

    Implicit Forms of Ethnic Insult for Europeans (as Found in Rhyming Slang) by E. Y. Gorshunova, Y. V. Gorshunov

    Published 2014-12-01
    “…Along with the explicit, direct, offensive and non-politically correct ethnic labels and nicknames there are quite a few with a deceptive, innocuous shape that conceals their offensive content. …”
    Get full text
    Article
  15. 16015
  16. 16016

    Exploring the impact of pesticide exposure on physiological and metabolic dynamics in olive trees infested by key bioagressors by Yamna OUGUAS, Abdelaziz Bouizgaren

    Published 2024-09-01
    “…These changes suggest that treated olive trees experienced stress and activated defense mechanisms in response.…”
    Get full text
    Article
  17. 16017

    A estratégia da urgência: considerações sobre O cheiro do ralo, de Lourenço Mutarelli by Ivana Ferigolo Melo

    Published 2018-01-01
    “…Reconociendo la fuerte presencia de ese elemento estructural en la referida narrativa, se busca, en este estudio, defender la hipótesis de que dicho elemento formal se presenta como un recurso eficiente para el alcance y la captación de lectores apresurados. …”
    Get full text
    Article
  18. 16018

    Endoplasmic Reticulum Stress: Its Role in Disease and Novel Prospects for Therapy by Axel H. Schönthal

    Published 2012-01-01
    “…The cell reacts to ER stress by initiating a defensive process, called the unfolded protein response (UPR), which is comprised of cellular mechanisms aimed at adaptation and safeguarding cellular survival or, in cases of excessively severe stress, at initiation of apoptosis and elimination of the faulty cell. …”
    Get full text
    Article
  19. 16019

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  20. 16020

    The impact of experimental forest fire on collembolan communities by Izabella Olejniczak, Anna Prędecka, Stefan Russel

    Published 2014-12-01
    “…Contribution of epigeic, hemiedaphic and euedaphic species in collembolan communities of investigated areas could point to different defense strategies of these invertebrates. Immature individuals of Collembola were the most numerous in burnt plots and at the border of burnt plots and this phenomenon is probably crucial for the reconstruction of collembolan communities after the fire.…”
    Get full text
    Article