Showing 1,881 - 1,900 results of 2,597 for search 'Iolaus~', query time: 2.19s Refine Results
  1. 1881

    Pérez Soto, Carlos. Una nueva antipsiquiatría. Crítica y conocimiento de las técnicas de control psiquiátrico by Daniel Durán Sandoval, Juan Román Torrealba

    Published 2014-05-01
    “…En el mismo informe además la FNE constató que tal colusión les permitió a las farmacias obtener alrededor de $27.000 millones en ingresos brutos. …”
    Get full text
    Article
  2. 1882

    Accrocher les potentiels décrocheurs by Sonia Lefeuvre, Gabriela Valente

    Published 2024-09-01
    “…Indeed, the acceptance of this system by the universities could give the illusion of working for social equality and student success, even though they participate in a mechanism of depoliticization of the question of inequality in higher education.…”
    Get full text
    Article
  3. 1883

    A Proposal to Reform Slot Allocation at Capacity-Constrained Commercial Airports by Andreas Knorr, Alexander Eisenkopf

    Published 2022-06-01
    “…In most countries of the world, there is no market mechanism for this. A grandfather clause restricts entry for new entrants at congested airports. …”
    Get full text
    Article
  4. 1884

    KLÂSİK TÜRK ŞİİRİNDE REÎS-İ ŞÂİRÂNLIK VE VEKÂLETNÂMELER / HEAD OF POETS IN CLASSICAL TURKISH POETRY AND VEKALETNAMES by Ahmet SEVGİ

    Published 2015-01-01
    “…Şeyhî, Ahmet Paşa ve Necatî gibi üç büyük şairin attığı bu sağlam temel üzerine inşa edilen şiir sarayının sultanları da olmuş şüphesiz. Biz bu makalemizde “sultânü'ş-şuarâ, melikü'ş-şuarâ, şeyhü'ş-şuarâ” gibi adlarla anılan “reîs-i şâirân”lık ve  “vekâletnâme”ler konusu üzerinde duracağız.…”
    Get full text
    Article
  5. 1885

    Acute Gastric Dilatation Resulting in Gastric Emphysema Following Postpartum Hemorrhage by Suhail Aslam Khan, Edmond Boko, Haseeb Anwar Khookhar, Sheila Woods, A. H. Nasr

    Published 2012-01-01
    “…Gastric emphysema as a result of a benign nongangrenous condition such as gastroparesis, adynamic ileus can be successfully managed conservatively. …”
    Get full text
    Article
  6. 1886

    Attribute-based revocable collaborative access control scheme by Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU

    Published 2021-05-01
    “…To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group-based attribute group were changed to reflect the update of rights, and further, an efficient re-encryption algorithm was used to realize the immediate revocation of attributes and users.The translation value was used to achieve the revocation of collaborative policy by update corresponding ciphertext.The security analysis shows the scheme can guarantee data confidentiality, forward/backward security, and resist collusion attack under chosen plaintext attack.Compared with the related works, the proposal achieved more complete and efficient revocation scheme.…”
    Get full text
    Article
  7. 1887

    Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network by Xiao-rui ZHONG, Chun-guang MA

    Published 2014-03-01
    “…Witnesses of a dynamic accumulator (DA) can ensure whether an object has been accumulated.On the basis of this,node membership in a cluster was verified and a novel authenticated group key management protocol was proposed,which supports node revocation and addition.In order to establish a group key for a cluster,each member provides their assigned number to join accumulation.DAAG can not only guarantee the confidentiality of witnesses,but also keep non-members from calculating novel group keys by binding witness with group key update.The security and performance analyses show that DAAG is resistant against replay attack,forgery attack and collusion attack,and can provide forward security and backward security.…”
    Get full text
    Article
  8. 1888

    New Diagnostic Techniques for Esophageal Disorders by A Lazarescu

    Published 2008-01-01
    “…When combined with pH-metry, impedance can confirm that retrograde bolus movement (ie, reflux) is occurring while simultaneously measuring changes in pH levels. …”
    Get full text
    Article
  9. 1889

    Potential risks to the National Health Service (NHS) of a Post-Brexit US Trade Deal by Louise Dalingwater

    Published 2021-08-01
    “…Moreover, in late November 2019, Jeremy Corbyn contended that Conservatives were negotiating a secret trade deal containing clauses which would open the NHS up to American pharmaceutical companies. …”
    Get full text
    Article
  10. 1890

    Ergin, E., Polat, Ö., Akkaya, M.A., Alır Derbent, G., Cevrioğlu, M.H. (2023). İzmir Milli Kütüphane Harita ve Şehir Planları Kataloğu. Nobel Akademik Yayıncılık. ISBN: 978-625-3... by Mehmet Erken

    Published 2024-09-01
    “…Kütüphaneleri insanlık tarihi açısından değerli kılan en temel husus sahip oldukları dermenin kıymeti ve bu dermeyi kullandırabilme becerileridir. Tarihe mâl olmuş kütüphanelere bakıldığında söz konusu becerileriyle ön plana çıktıkları görülmektedir. …”
    Get full text
    Article
  11. 1891

    Unfair Terms and Unpredictability in the Insurance Contract by Ioana Nely MILITARU

    Published 2025-01-01
    “…The courts interpret the insurance policies clauses that are ambiguous, unclear, and even illegal. …”
    Get full text
    Article
  12. 1892

    Multi-authority attribute-based encryption scheme with policy dynamic updating by Xi-xi YAN, Yuan LIU, Zi-chen LI, Yong-li TANG

    Published 2017-10-01
    “…Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.…”
    Get full text
    Article
  13. 1893

    Research on trust transitivity and aggregation in evidential trust model by JIANG Li-ming1, ZHANG Kun1, XU Jian1, LIAO Jun1, ZHANG Hong1

    Published 2011-01-01
    “…Current trust models had some certain disadvantages in dealing with trust transitivity and trust aggregation.Firstly,these models ignored the feedback trust measurement on the direct recommender in the process of trust transitivity.Secondly,the models contained the problems of information loss or repetitive calculation for the limits in analysis and dis-posal of the dependent relationships among referral chains.A new evidential trust model was proposed,and the problems existed in current methods for transferring and aggregating trust relationships were addressed by combing D-S evidence with graph theory.It can be seen from the simulation results that compared with existing trust models,the proposed model is more robust on defending malicious attacks for various strategy cheating and collusion,and has more remarkable en-hancements in the accuracy of trust measurement.…”
    Get full text
    Article
  14. 1894

    Disruption of Budget Rules in the Legal System of the Country: Preemptive Clarification as a Solution (A Case Study of the Budgets from 2020 to 2023) by Mohammad Barzegar Khosravi, Aminollah Paknejad, Amirhosein Bamati Toosi

    Published 2024-12-01
    “…Budget Laws in Iran consist of provisions (the single article and notes) and figures (tables and appendices). Clause 9 of the General Policies of the Legislative System, issued on 6/7/1398, mandates adherence to the principles of legislative drafting in the preparation of budget bills. …”
    Get full text
    Article
  15. 1895

    Event-Related Potentials Elicited by Face and Face Pareidolia in Parkinson’s Disease by Gulsum Akdeniz, Gonul Vural, Sadiye Gumusyayla, Hesna Bektas, Orhan Deniz

    Published 2020-01-01
    “…Pareidolia is a type of complex visual illusion that permits the interpretation of a vague stimulus as something known to the observer. …”
    Get full text
    Article
  16. 1896

    Gastroenterological Surgery and Management of Clostridioides difficile Infection: A Review by Tomonori Takano, Hiroyuki Aiba, Mitsuo Kaku, Hiroyuki Kunishima

    Published 2025-01-01
    “…Fever and diarrhea are the common symptoms of Clostridioides difficile infection (CDI); however, pseudomembranous enteritis, megacolonization, and paralytic ileus have been observed in severe cases. C. difficile spores are resistant to several types of disinfectants. …”
    Get full text
    Article
  17. 1897

    Amasra ve Amasralı Semavi Eyice Üzerine Bir Araştırma-İnceleme by Sema Doğan

    Published 2023-12-01
    “…Bartın’ın bir ilçesi olan Amasra İlkçağ’dan itibaren günümüze kadar Roma, Bizans, Ceneviz ve Osmanlı dönemlerinde var olmuş bir liman kasabasıdır. Tabiat örtüsünün zenginliği sebebiyle uzun yıllar tekne yapım merkezi olarak topraklarında barınan her me-deniyeti zenginleştirmiştir. …”
    Get full text
    Article
  18. 1898

    Risk Assessment Maturity Level of Academic Information System Using ISO 27001 System Security Engineering-Capability Maturity Model by Nurbojatmiko Nurbojatmiko, Qurrotul Aini, Nabil Cahya Wasiqi, Muhammad Fitra Alfajri, Zahra Ulinnuha, Yuni Kurnia Purwati, Indah Kusuma Ayu, Natasya Aurora Yasmin

    Published 2024-06-01
    “…This research results show the maturity level of information security in the academic information system based on three clauses as the embodiment of the stability of the academic administration activities services at the Science and Technology Faculty. …”
    Get full text
    Article
  19. 1899

    A constructionist approach to Arabic active participles by Ayman Yasin, Osama Abdelghafer

    Published 2025-12-01
    “…Last, using Distributed Morphology, we show how the active participle projects into a root clause.…”
    Get full text
    Article
  20. 1900

    A Brief Analysis of the Status of a Transgender Beneficiary for Purposes of an Islamic Will Within the South African Context by Muneer Abduroaf

    Published 2022-07-01
    “… A Muslim within the South African context can ensure that his or her compulsory estate devolves in terms of the Islamic law of compulsory succession by virtue of executing a will, that includes a clause to this degree. This article looks at a fictitious scenario where a testator (X) executes an Islamic will and leaves behind a son (Y) and a transgender son (Z) (whose birth-assigned sex was female and identifies as male) as his only relatives. …”
    Get full text
    Article