Suggested Topics within your search.
Suggested Topics within your search.
- History 12
- Sports 6
- Anesthesia 5
- Economic conditions 5
- Torts 5
- Management 4
- Social service 4
- Sociological aspects 4
- Sports medicine 4
- Income distribution 3
- Journalism 3
- Moral and ethical aspects 3
- Orthopedics 3
- Public administration 3
- Research 3
- Sex role 3
- Study and teaching 3
- Women 3
- methods 3
- Anesthetics 2
- Authorship 2
- Automobiles 2
- Children 2
- Citizen participation 2
- Curricula 2
- Curriculum planning 2
- Digital techniques 2
- Domestic relations 2
- Economic policy 2
- Education 2
-
19041
La traversée médiatique du simple soldat. À partir de l’œuvre de Bertrand Carrière
Published 2012-03-01“…Our reading of Carrière’s work leads to some considerations aboutThe Wartime Memories Project,a website collecting memories (stories and photos) of the Great War and the Second World War. …”
Get full text
Article -
19042
A survey on the positive mass theorem for asymptotically flat initial data sets
Published 2025-01-01Get full text
Article -
19043
L’Histoire culbutée : Shakespeare et ses jeux de mots
Published 2022-01-01“…Out of ancient history and the history of England, Shakespeare created a parallel world of obscene tableaux, shows, and stories, through a selective and meticulous orchestration of the signifying at play in any language. …”
Get full text
Article -
19044
A PLEA FOR LEADERSHIP THEORIES
Published 2021-06-01“…In this article, I critically analyse the trivialisation of leadership, often based on success stories, and offer seven methods to include theory in leadership classes, namely electing students; reversing the order: practice-theory instead of theory-practice; creating aha experiences with theory; selecting “good” theory; pointing out the benefit of a special theory; viewing theories as eye-glasses, and suggesting eye-glasses from different disciplines. …”
Get full text
Article -
19045
A Fine-Grained Mobile Data Security Model
Published 2014-01-01“…The creating, modifying, storing and transmitting of the data label and application label were controlled and managed by the label control management module. …”
Get full text
Article -
19046
Leaving the chasm behind: Autoethnography, creativity and the search for identity in academia
Published 2022-08-01“…The findings support Bochner’s (1994) idea that social science research can benefit from deliberately value-laden stories alongside empirical data and theories. The findings also developed the author’s previous autoethnographic paper, which drew on his own social media posts as qualitative and quantitative data Atherton (2020b). …”
Get full text
Article -
19047
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01“…Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. …”
Get full text
Article -
19048
Unpublished calendars of 1853-1854 by Laurynas Ivinskis
Published 2024-08-01“…Ivinskis' biography are disclosed. All didactic stories and other articles that were banned in 1853-1854 survived in Ivinskis' manuscripts and were published in later editions of the calendars. …”
Get full text
Article -
19049
The Local Impact of Migratory Legends: The Process and Function of Localisation
Published 2013-01-01“…Thus, the contemporary legends about foreigners in Velenje, which at their core are stories about the Other, are also characterised by their experiential backdrop.…”
Get full text
Article -
19050
Are Cows Comfortable in Modern Dairy Facilities?
Published 2018-12-01“…Some factors that may decrease or limit the ability of cows to express natural behaviors include but are not limited to resting area and resting behavior, time spent away from pen (i.e. for milking and other management procedures), feed and water access and availability, stocking density, and environmental factors such as heat stress. …”
Get full text
Article -
19051
Sculpture as Literature and History: Captive and Captivating Venus Figures from the Greek Revolutionary Era
Published 2022-04-01“…The Venus de Milo has become an iconic figure, heavily overwritten by aesthetic judgments, adventure stories of movement and migration, and the accounts of personal and political trajectories, all playing out in the upper and Western echelons of imperialist Europe and its classist (and racist) underpinnings.…”
Get full text
Article -
19052
(Des)memória e catástrofe: considerações sobre a literatura pós-golpe de 1964
Published 2014-01-01“…In this context, the stories – told by many authors and some of the survivors of repression – seem to play an important role in supplying the deficiencies of the History, in order to show, effectively even if through fiction, the nefas that characterized in particular torture and murder of opponents. …”
Get full text
Article -
19053
Récits écoféministes de voyages interstellaires : observer et créer de nouveaux mondes.
Published 2019-06-01“…The Ekumen cycle is a set of science-fiction books written between 1966 and 2002 by the american author Ursula le Guin. By telling stories of new worlds discoveries which reconsiders the mankind/nature, man/woman dualisms and dominations, the writer is involved in the creation of eco-feminist demands and ideas ; thus the Ekumen tales may qualify as eco-feminist fiction. …”
Get full text
Article -
19054
Facts about Carbohydrate
Published 2014-03-01“…Carbohydrate in the form of glucose provides energy to cells, tissues, and organs to carry out daily activities. Some glucose is stored in the liver and muscle cells for later use when required. …”
Get full text
Article -
19055
High-performance and high-concurrency encryption scheme for Hadoop platform
Published 2019-12-01“…,single encryption algorithm,complicated key management,low encryption performance) and they cannot protect data stored in Hadoop effectively,a high-performance encryption and key management scheme for Hadoop was proposed.Firstly,a three-level key management system was extended with the domestic commercial cipher algorithm.Then,a new data structure for encryption zone key to reduce time consumption was designed.Finally,the computing process of data stream in parallel was scheduled.The experimental results show that compared with the existing Hadoop schemes,the proposed scheme can improve the efficiency of key management,and can speed up file encryption.…”
Get full text
Article -
19056
Le post-humanisme chinois et la science-fiction politique de Chen Qiufan
Published 2024-06-01“…This essay examines the “posthumanist” dimensions of three sf stories by Chen Qiufan (a.k.a. Stanley Chan) : “Smog Society” (2010), “Year of the Rat” (2009), and “The Flower of Shazui” (2012), with the aim of establishing whether there are any substantial differences between posthumanism in the Chinese and Euro-American cases. …”
Get full text
Article -
19057
History, hagiography, romance…
Published 2023-07-01“…However, the abbreviated Middle English prose Brut preserved in Edinburgh University Library MS 184 and two other manuscripts is unusual in its blending of narrative elements from historical accounts, hagiography, and romance to portray Athelstan as an English hero, and in its telling its 15-century audience where they could still see physical relics of Athelstan’s reign in their own day, giving them the opportunity to be vicariously connected to the storied history of their nation. This article traces sources and traditions this Brut’s compiler most likely drew from and considers what implications this may have for our understanding of this particular manuscript and of the evolution and adaptation of Brut chronicles in the late Middle Ages.…”
Get full text
Article -
19058
Medicalisation of Birth in Transylvania in the Second Half of the 19th Century. A Subject to be Investigated
Published 2021-03-01“…Ethnic and confessional minorities often displayed starkly different patterns in the selection of these instrumental figures. …”
Get full text
Article -
19059
Overview of searchable encryption research
Published 2018-07-01“…With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.…”
Get full text
Article -
19060
New technology in libraries work and the problems of education in the field of librarianship and bibliography
Published 2024-08-01“… The article deals with the problem of the changing demands of education for librarianship and information work in developed capitalist countries as a result of the application of computers and changing technology of library work. …”
Get full text
Article