Showing 19,221 - 19,240 results of 22,124 for search 'stOrk~', query time: 1.79s Refine Results
  1. 19221

    How the Slovaks Helped Count Dracula: Stereotypes of the Late 19th Century by Martin Kasarda

    Published 2025-02-01
    “…Bram Stoker’s iconic horror novel is heavily influenced by Central and Eastern European mythological pre-Christian stories about the undead, people undergoing lycanthropic metamorphoses, and vampires. …”
    Get full text
    Article
  2. 19222

    Sauver la planète, un burger à la fois : Les stratégies communicationnelles de la viande végétale by Mathieu Chaput, Alexander Paulsson

    Published 2023-10-01
    “…Recruiting various collaborators in restaurants, grocery stores, and celebrities to help normalize plant-based meat, Beyond Meat further calls upon consumers as members of a social movement whose engagement would save the planet, one burger at a time.…”
    Get full text
    Article
  3. 19223

    Emigration from Tajikistan to the Baltic States: trends and prospects of development by A. Kh. Rakhmonov

    Published 2021-04-01
    “…An important research method was conducting interviews with experts, as well as a secondary analysis of sociological surveys and Internet resources with stories of the life and migration of emigrants from Tajikistan to the Baltic countries.…”
    Get full text
    Article
  4. 19224

    Digital Cultural Heritage – Challenging Museums, Archives and Users by Pille Pruulmann-Vengerfeldt, Agnes Aljas

    Published 2011-03-01
    “…This article will analyse the many challenges that creating, storing and using digital heritage has brought to the memory institutions and their professionals. …”
    Get full text
    Article
  5. 19225

    Afrodescendentes em São Leopoldo: memória coletiva e processos de identidade by José Ivo Follmann, Adevanir Aparecida Pinheiro

    Published 2011-01-01
    “…We stress the technique called "focus collective hermeneutics", through which we try, by means of workshops with a group of Afro-descendants, to construct a contextualized and pedagogically involving and engaging comprehension, starting from life stories and personal and other reports, collected among the black population of São Leopoldo. …”
    Get full text
    Article
  6. 19226

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  7. 19227

    Green Peach Aphid, Myzus persicae (Sulzer) (Insecta: Hemiptera: Aphididae) by John L. Capinera

    Published 2004-04-01
    “…These aphids also can be transported long distances by wind and storms.  This document is EENY-222, one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  8. 19228

    Unstable Modes and Order Parameters of Bistable Signaling Pathways at Saddle-Node Bifurcations: A Theoretical Study Based on Synergetics by Till D. Frank

    Published 2016-01-01
    “…The procedure is outlined in general and an explicit example is worked out in detail.…”
    Get full text
    Article
  9. 19229

    Nomadic Memory in Aleksandar Hemon’s Memoirs by Rubén Peinado-Abarrio

    Published 2023-11-01
    “…Specifically, it applies Rosi Braidotti’s notion of nomadic memory to Hemon’s telling of his and his family’s life stories. Analyzed with the tools provided by critical posthumanism, Hemon’s nonfiction becomes an example of remembering in what Braidotti calls a minority-mode. …”
    Get full text
    Article
  10. 19230

    A Igreja Universal do Reino de Deus: ação social além-fronteiras by Nina Rosas

    Published 2016-01-01
    “…The ethnographic material is composed of articles and stories collected from newspapers, journals, magazines, websites and blogs created by the church and that register social actions of the UCKG during 2009 and 2010.…”
    Get full text
    Article
  11. 19231

    Memórias fraturadas: passado, identidade e imaginação em Borges e Mutarelli by Pedro Galas Araújo

    Published 2011-01-01
    “…This paper discusses such issues through the dialogue between the stories “O outro” and “Funes, o memorioso”, by Jorge Luis Borges, and the comics narrative “A caixa de areia ou eu era dois em meu quintal” by Lourenço Mutarelli, including aspects such as identity construction and the use of imagination in that operation.…”
    Get full text
    Article
  12. 19232

    Distributed nearneighbor search algorithm based on real-time traffic information in dynamic road network by Chen YE, Zhen-yu YANG, Jian YU, Qi LONG

    Published 2014-12-01
    “…A novel distributed near neighbor search algorithm that makes use of real-time traffic information is presented.The geographic information are stored in the nearest smart camera using Voronoi partition,and cameras are located in the intersection.The intersection unimpeded degree is modeled and the time which vehicle travel between adjacent intersec-tions is estimated.When a vehicle search for some near neighbors,smart cameras set a delay to broadcast the near neighbor search packet based on the traffic parameters collected by smart camera networks.In this way,the near neighbor search packet can be transmitted according to current road conditions.Thus get the path to near targets quickly and effec-tively.Extensive experiments are londucted on real data sets,and the results show that proposed algorithm is efficient and scalable to large number of concurrent query,significantly outperforming state-of-the-art methods.…”
    Get full text
    Article
  13. 19233

    Image privacy preservation scheme based on QR code and reversible visible watermarking by Yuanzhi YAO, Feng WANG, Wenbo YAN, Nenghai YU

    Published 2019-11-01
    “…With the privacy leakage problem of image delivery in networks,an image privacy preservation scheme based on QR code and reversible visible watermarking was proposed.In order to preserve the privacy information including shooting time,shooting location and detailed description,the encrypted privacy information was stored in cloud platforms and corresponding universal resource locator was generated firstly.Secondly,the universal resource locator was encoded as the QR code and it was embedded into the cover image using reversible visible watermarking.Therefore,the access control for privacy information could be achieved.The visual perceptual model was utilized to select adaptive watermark embedding parameters to balance watermark visibility and marked image quality.Experimental results demonstrate that the good visual quality of marked images can be obtained and the embedded QR code can be correctly decoded.The proposed scheme can guarantee marked image quality and reduce the risk of private information leakage.…”
    Get full text
    Article
  14. 19234

    Study on Differentiated Security Service Based on Cloud Computing by Dongmei Li, Shijun Yin, Jianyong Chen

    Published 2013-03-01
    “…Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited.…”
    Get full text
    Article
  15. 19235

    Investigation of Fish Resource in the Yongding River System by ZHOU Xushen, HU Zhen, CUI Wenyan, XU Ning, WANG Liming

    Published 2020-01-01
    “…To understand the population makeup and fauna distribution of fish stocks at YongdingRiver. Based on fish surveys in 2016 and relevant literature, this paper summarizes the species offish in Yongding River, concludes that Yongding River is belong to riverplain region afteranalysis,and obtains the loss index of fish according to existing species and historical data. …”
    Get full text
    Article
  16. 19236

    De quelles indignations parle-t-on ? by Leïla Tazir

    Published 2022-11-01
    “…It has also impacted trajectories and life stories from one part of outraged people (Indignados). …”
    Get full text
    Article
  17. 19237

    TO EMPTY THE SEA WITH A THIMBLE: READERLY EXPLOITS, DISCOVERIES AND LOSSES by Piotr Nowak

    Published 2016-12-01
    “…From the late forties of 20th century and until 1989, the year which many of my readers in Poland will associate with the end of censure, publishing houses were highly cautious and selective in their production of outstanding works of literature, philosophy and other scholarly works. …”
    Get full text
    Article
  18. 19238

    Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT by Di Fan, Wenxue Sun, Huiyuan Zhao, Wenshuo Kang, Changzhi Lv

    Published 2022-01-01
    “…The algorithm uses NSCT, DCT, SVD, and Schur decomposition to extract video features and audio features and generates zero-watermark stream through synthesis, which is stored in a third-party organization for detection and identification. …”
    Get full text
    Article
  19. 19239

    Retrieving, Translating, and Archiving, Hubert Ogunde’s Aye by Adedoyin Aguoru

    Published 2022-07-01
    “…The significance of Hubert Ogunde’s works as precursor to the Nigerian Operatic Alarinjo (Travelling) theatre can only be preserved in translated forms that makes the performance texts retrievable. …”
    Get full text
    Article
  20. 19240

    Invalidating Factorial Survey Experiments Using Invalid Comparisons Is Bad Practice: Learning from Forster and Neugebauer (2024) by Justin T. Pickett

    Published 2025-01-01
    “…The two experiments included: (1) different factor levels (for three factors), (2) different unvalidated applicant names (to manipulate ethnicity), (3) different applicant photos, (4) different fixed factors (e.g., applicant stories about moving), and (5) different experimental settings (e.g., testing, instrumentation, and conditions of anonymity). …”
    Get full text
    Article