-
41
Factors of activity of the troops of NKVD of the USSR during the East Prussian strategic offensive operation
Published 2023-05-01Subjects: Get full text
Article -
42
»V imenu narodov Jugoslavije!« Procesi pred vojaškimi sodišči poleti 1945
Published 2024-12-01Subjects: “…proceedings against members of the slovenian home guard…”
Get full text
Article -
43
The use of information technologies to predict and diagnose the psychological trauma of servicemen – combatants
Published 2018-11-01Subjects: Get full text
Article -
44
Stiffness characteristics of the lower extremities in Women’s Chinese Basketball Association competition athletes: normative values and position differences
Published 2025-02-01“…Vertical stiffness was also evaluated by OptoGait system.ResultsDescriptive statistics were used to establish the normative values of stiffness for forwards, centres and guards. The Kruskal Wallis test and post hoc Bonferroni pairwise comparisons found significant higher stiffness of the left patellar tendon (PT) in guards than centres (p = 0.004) and in guards than forwards (p = 0.012), right PT stiffness in guards than centres (p = 0.016) and in guards than forwards (p = 0.017), mean PT stiffness in guards than centres (p = 0.003) and in guards than forwards (p = 0.008); stiffness of the right soleus (SOL) in guards than forwards (p = 0.033), stiffness of the left biceps femoris (BF) in forwards than centres (p = 0.049) and in guards than centres (p = 0.038); and stiffness of the left vertical stiffness (hopping) in forwards than centres (p = 0.041).ConclusionForwards, centres and guards were characterised by significantly different stiffness values, which could be utilised for improvement of athletic performance and injury prevention.…”
Get full text
Article -
45
On Eternal Domination of Generalized Js,m
Published 2021-01-01“…An eternal dominating set of a graph G is a set of guards distributed on the vertices of a dominating set so that each vertex can be occupied by one guard only. …”
Get full text
Article -
46
Eternal Domination of Generalized Petersen Graph
Published 2021-01-01“…An eternal dominating set of a graph G is a set of guards distributed on the vertices of a dominating set so that each vertex can be occupied by one guard only. …”
Get full text
Article -
47
Problem Solving and Personality in Security Officers
Published 2021-12-01“…The study was conducted to examine the relationship between problem solving skills and personality traits of university security guards. The research was carried out with 190 security personnel working at universities in 2019. …”
Get full text
Article -
48
Combating economic crime in Ukraine in 1946–1949
Published 2023-12-01“…The most common crimes were the following: 1) maliciously delaying the repair of agricultural machinery, allegedly due to the lack of spare parts and specialists; 2) theft of grain during its transportation and sowing by persons responsible for this (weighers, field crew leaders, guards); 3) theft of seeds and fuel by security guards; 4) theft and embezzlement of seeds by officials of collective and state farms and subsidiary farms; 5) theft of seed by reducing the seeding rate and theft of fuel due to lack of control over its consumption; 6) theft of seeds by employees of storage facilities with their subsequent resale at markets at speculative prices; 7) creation of surplus seeds by weighing, moistening, writing off for drying, and increasing waste during sorting. …”
Get full text
Article -
49
BIOPOLITICS AND HOMO SACER IN A TORTURE CENTER IN CHILE *
Get full text
Article -
50
Italijansko nasilje na območju Bloške planote, 1941–1943
Published 2024-12-01“…There is also a brief presentation of theemergence and activity of Village Guards in Bloke under Italian command.…”
Get full text
Article -
51
Culhwch ac Olwen como texto de transición de la materia artúrica
Published 2017-12-01“…On the other hand, Arthur is “chief of the princes of this island”, he possesses a renowned court, and jealously guards customs and values. His court also provides the narrative frame for adventures and the set for their retelling, as well as housing a stable cast of warriors.Therefore, this paper seeks to analyse the figure of Arthur, his court and his warriors as a stage of transition in the Arthurian legend. …”
Get full text
Article -
52
Bagnards, « arabes » et porte-clefs en Guyane : Naissance et usages d’un rôle pénal et colonial (1869-1938)
Published 2019-06-01“…In contemporary writings by convicts, journalists or doctors, the “Arabs” appear especially when they assumed a role assisting prison guards. The punitive configuration of “convict,” “Arab”, and porte-clefs structured a unique situation that seems, a priori, to undermine the hierarchy of “races” commonly accepted in France. …”
Get full text
Article -
53
Effect of Induced Plant Expression on Ants and Extrafloral Nectaries Number in Cotton and Castor
Published 2021-12-01“…Artificial induction techniques can be utilized in pest management programs to attract and conserve plant guards, viz., biocontrol agents, including ants in the field. …”
Get full text
Article -
54
İngiliz Konsolos James Henry Monahan’ın Raporlarında Bitlis Vilayeti (1896-1898)
Published 2020-06-01“…In our study, the famine in Bitlis province of 1896-1898 and the subsequent migration events, the tax issue, various debt systems applied within the province, the livelihoods of the people, security problems, the issue of Kurdish guards (bekdji) and the socio-economic structure of the province were examined in detail.…”
Get full text
Article -
55
Prototype Of DPO Search Information System (People Search List) On CCTV Cameras Using Face Recognition
Published 2023-12-01“…The face recognition apps provide information to the authorities by notifying the notification on the user's smartphone (security guard). So face recognition apps have been applied to the Green Cakra Housing, to help security guards monitor the entrance and exit of guests in the housing. …”
Get full text
Article -
56
PRIVATE SECURITY SURVEILLANCE SYSTEM
Published 2021-10-01“…This security system is designed to reduce the need of having personnel stationed as security guards over a home. It has the primary unit called the Area Watch Unit (AWU) consisting of a motion detection unit that effectively detects motion around specified perimeters which is then followed by a computer vision to identify and classify what caused the motion. …”
Get full text
Article -
57
Climate change reflects on security of the border villages, case study: Salas Babajani border villages
Published 2020-06-01“…Because these people will face the same dangers as engaging in border guards between the two countries, Iran will result in the risk of death for those who were once farmers or ranchers and the security of the area would also be compromised.…”
Get full text
Article -
58
EVALUATING THREATS OF ARMED BANDITRY ON HUMAN AND FOOD SECURITY IN SHIRORO LOCAL GOVERNMENT AREA OF NIGER STATE, NIGERIA
Published 2023-12-01“…The study adopted the Routine Activity Theory as its theoretical framework, emphasizing the prevalence of motivated offenders, the presence of suitable targets, and the absence of guards as key tenets. According to the theory, these factors played pivotal roles in the surge of brigandage activities in the study area. …”
Get full text
Article -
59
REPRESENTATION OF MUTUAL TERMS AND RESEARCH SKILLS TOWARDS GRADE POINT AVERAGE: EXPLORATION STUDY
Published 2018-05-01“…This study concludes that there is a significant correlation between IR and KR guards in the same period as the GPA. Based on the investigation, it is expected to provide benefits as one of the considerations for the selection and determination of learning mods related to learning. …”
Get full text
Article -
60
Construction of a 5G Wireless Semantic Web-Assisted English Digital Learning Resource Query System
Published 2021-01-01“…We propose a quality algorithm for 5G wireless networks, which not only captures the characteristics of 5G wireless networks such as local broadcast and node movement but also combines quality predicates as guards with broadcast reception actions, which are used to portray that a node can continue to execute subsequent processes only when the node reception actions satisfy certain conditions, which works together with the node default value mechanism to reduce the impact caused by unreliable links. …”
Get full text
Article