Showing 16,421 - 16,440 results of 16,989 for search 'Defekt~', query time: 1.99s Refine Results
  1. 16421

    Scientific Publication Ethics by Osman İnci

    Published 2015-06-01
    “…Their most important difference from the other kinds is showing conscious deceptive intention. Duplication, salamislicing, publications aiming partiality, partiality in choice of sources, authorship rights violations (Author concealment, Gift Autorship, Honory Autorship or Ghost Autorship,author addition changing the order of author list), and not thanking to the contributers are other irregular applications. …”
    Get full text
    Article
  2. 16422

    Emotion-Induced Memory Distortions: Insights from Deese-Roediger-McDermott and Misinformation Paradigms—A Comprehensive Review by Gunjan Joshi, Tanisha Rathore, Kedarmal Verma

    Published 2025-03-01
    “…The presence of intense emotional experiences within these environments, combined with the presence of multiple sources of deceptive information, increases the likelihood of the formation of false memories induced by suggestion. …”
    Get full text
    Article
  3. 16423
  4. 16424

    Influence of indole acetic acid, arginine and mango fruit waste biochar on nutrients, chlorophyll contents and antioxidants of Fenugreek in salt affected soil by Misbah Hareem, Sammina Mahmood, Subhan Danish, Rana Khalid Iqbal, Abdullah A. Alarfaj, Sulaiman Ali Alharbi

    Published 2025-01-01
    “…L-arginine, an amino acid, is crucial for plant defense mechanisms, forming proline, polyamines, and nitric oxide, which regulate biological activities and prevent oxidative damage. …”
    Get full text
    Article
  5. 16425

    In the scientific research of prof. dr. bekir chobanzadeh opinions on m. fuzūlīʼs language by PERVİN

    Published 2024-12-01
    “…Chobanzadehʼs ideas were compared with the views of contemporary Turkologists, the discussions around the problem in question were mentioned in detail, and these were essentially determined that the idea that Azerbaijani language is at the center of gravity of the language of Fuzuliʼs works is more defended in researches. …”
    Get full text
    Article
  6. 16426

    Notice of suspicion: procedural significance and influence on the methodology of pre-trial investigation by Volobuyev A.

    Published 2024-12-01
    “…he purpose of the article is to determine the essence of the notification of suspicion as an intermediate procedural decision; the possibility of its appeal by the defense; the impact of the notification of suspicion on the methodology of the pre-trial investigation. …”
    Get full text
    Article
  7. 16427

    Can Jurors Disregard Inadmissible Evidence? Using the Multiphase Optimization Strategy to Test Interventions Derived from Cognitive and Social Psychological Theories by Pamela N. Sandberg, Tess M. S. Neal, Karey L. O’Hara

    Published 2024-12-01
    “…Appeals courts repeatedly affirm instructions to disregard as a sufficient safeguard of defendants’ constitutional rights, despite research finding that jurors do not disregard when instructed. …”
    Get full text
    Article
  8. 16428

    The Role of Quercetin, a Flavonoid in the Management of Pathogenesis Through Regulation of Oxidative Stress, Inflammation, and Biological Activities by Hajed Obaid A. Alharbi, Mohammad Alshebremi, Ali Yousif Babiker, Arshad Husain Rahmani

    Published 2025-01-01
    “…Its role in the prevention of various pathogenesis has been well-documented, primarily through its ability to inhibit oxidative stress, inflammation, and enhance the endogenous antioxidant defense mechanisms. Electronic databases such as Google Scholar, Scopus, PubMed, Medline, and Web of Science were searched for information regarding quercetin and its role in various pathogeneses. …”
    Get full text
    Article
  9. 16429
  10. 16430

    Ictiose como uma manifestação de sarcoidose: um relato de caso by Romão Augusto Alves Filgueira Sampaio, Giovany Gomes Capistrano, Cláudio Cesar Monteiro de Castro

    Published 2024-12-01
    “…As etiologias são as mais variadas, incluindo desde defeitos genéticos hereditários até formas secundárias a doenças sistêmicas. …”
    Get full text
    Article
  11. 16431

    Genome-wide association study for charcoal rot resistance in soybean harvested in Kazakhstan by A. Zatybekov, S. Abugalieva, S. Didorenko, A. Rsaliyev, A. Maulenbay, C. Fang, Y. Turuspekov

    Published 2023-11-01
    “…Candidate genes within the identified genomic regions were explored for their functional annotations and potential roles in plant defense responses. The findings from this study may further contribute to the development of molecular breeding strategies for enhancing CR resistance in soybean cultivars. …”
    Get full text
    Article
  12. 16432

    Personal Peacefulness and Cyber-Bystanding of Internet Users in Indonesia by Nurfitriany Fakhri, Faradillah Firdaus, Irdianti, Sahril Buchori, Ria Andriany Fakhri

    Published 2024-06-01
    “…Findings – Results revealed a significant relationship between personal peacefulness and defender bystander behavior. However, no significant relationships were found with passive or reinforcer bystander behaviors. …”
    Get full text
    Article
  13. 16433

    Genotype-dependent resilience mediated by melatonin in sweet corn by Tahoora Batool Zargar, Mawia Sobh, Oqba Basal, Szilvia Veres

    Published 2025-01-01
    “…Under severe water deprivation (12% PEG), melatonin increased root length by 75%, peroxidase activity by 31% while reducing malondialdehyde content by 34% in genotype Dessert indicating enhanced antioxidant defense and reduced oxidative damage. Likewise in genotype Royalty, stomatal conductance increased by 68%, with increasing specific area by 125% on melatonin treatment under severe water deprivation. …”
    Get full text
    Article
  14. 16434

    A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure by Sardar Muhammad Ali, Abdul Razzaque, Muhammad Yousaf, Sardar Sadaqat Ali

    Published 2025-01-01
    “…These results illustrate the effectiveness of ML and DL in identifying cybersecurity threats, highlighting their potential to enhance defenses against emerging cyber risks.…”
    Get full text
    Article
  15. 16435

    Expression of catecholaminergic genes in the midbrain and prepulse inhibition in rats with a genetic catatonia by M. A. Ryazanova, O. I. Prokudina, V. S.  Plekanchuk, T. A. Alekhina

    Published 2017-12-01
    “…The GC rat strain (from the words “genetic” and “catatonia”) was created by selection for predisposition to passive-defensive reaction of catatonic freezing in response to stressing stimuli. …”
    Get full text
    Article
  16. 16436

    Hanibal, un dușman „exemplar” (glose pe marginea Istoriilor lui Titus Livius by Alexandra Ciocârlie

    Published 2007-12-01
    “…Carthaginois exemplaire, qui pousse à l’excès les qualités (force, courage, habileté) et les défauts (cruauté, perfidie, impiété) de son ethnie, Hannibal n’est pas envisagé dans une lumière exclussivement défavorable. …”
    Get full text
    Article
  17. 16437

    El artesano y el artista : aspectos de la iconografía de San José by Pierre Civil

    Published 2010-06-01
    “…La figuration du patron des peintres, le pinceau à la main, vient appuyer la revendication corporatiste de la défense de l’artiste et l’affirmation du caractère intellectuel de la peinture.Ces complexes variations sur le travail des deux saints font se croiser bon nombre d’images significatives (œuvres du Greco, Ribalta, Carducho, Murillo, Valdès Leal...) et de textes célébratifs (traités religieux, sermons, comedias ou poésies). …”
    Get full text
    Article
  18. 16438

    El género y el futuro de la macroeconomía: una perspectiva evolutiva by Sheila Dow

    Published 2021-01-01
    “…Permite, además, sentar las bases para defender la igualdad de género, tanto en derechos como en resultados. …”
    Get full text
    Article
  19. 16439

    Effects of different Lys/Met ratios on the antioxidant capacity, tissue morphology, and fatty acid composition of subcutaneous fat in Tibetan sheep on low-protein diets: a lipidomi... by Rengeerli Sa, Fengshuo Zhang, Xianhua Zhang, Wei Gao, Yu Zhang, Jiacheng Gan, Shengzhen Hou, Linsheng Gui

    Published 2025-01-01
    “…Furthermore, the findings showed that the upregulation of PPARγ, FASN, FAD4, CPT1A, and GPX4 can enhance adipocyte differentiation and lipid accumulation, thereby improving metabolic function in subcutaneous adipose tissue via the regulation of lipid metabolism and oxidative defense mechanisms.DiscussionIn summary, this study provides a theoretical foundation for optimizing precision feeding strategies for Tibetan sheep, offering crucial data to support enhancements in production efficiency and meat quality.…”
    Get full text
    Article
  20. 16440

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article