Showing 1,001 - 1,020 results of 33,375 for search '"authority"', query time: 0.09s Refine Results
  1. 1001
  2. 1002
  3. 1003

    Rapports de force et crise de l’autorité dans le mouvement Freinet entre 1945 et 1968 : quand l’horizontalité questionne la verticalité by Xavier Riondet

    Published 2022-11-01
    “…Can we lead and should we drive a direction in a pedagogical movement that itself questions certain forms of authority? To answer this question, this text addresses the question of power relations and the crisis of authority in the context of the development of the Freinet Movement between 1945 and 1968. …”
    Get full text
    Article
  4. 1004

    « ‘A flat dichotomist’ : Critique marlovienne de la méthode ramiste » by Laetitia Sansonetti

    Published 2014-10-01
    “…While Ramus’s avowed aim was to promote a form of universal logic built on method (meaning for him the “order” or “disposition” of ideas from the simple to the complex ones) and syllogistic division, “Ramus” became a label attached to both the man and his doctrine and standing for novelty and the refusal to submit to authority, be it the scholastic authority of Aristotle’s commentators or the religious authority of French Catholicism (a convert to Protestantism, he died during the St. …”
    Get full text
    Article
  5. 1005

    أقسام المکتبات والمعلومات المعتمدة من الهیئة القومیة لضمان الجودة والاعتماد فى مصر : دراسة تحلیلة مقارنة... by د. هبة مدحت المنباوى

    Published 2020-01-01
    “…The research covers an important and vital topic in the field of qualityassurance and accreditation of the accredited programs in the libraries,documents and information departments in the faculties of Art at the publicuniversities, both for the bachelor's degree and through the standards issued bythe National Authority for Quality Assurance and Accreditation.The study presents the concept of total quality management andaccreditation in academic education, the definition of the National Authority forQuality Assurance and Accreditation, and the standards of the College of Artsand then the standard used in the social and human sciences.The study aimed to determine the number of libraries and informationdepartments in the faculties of Art at Egyptian Government Universities and todetermine the number of accredited bachelor's programs in the libraries andinformation departments in the faculties of Art in public universities in Egypt bythe National Authority for Quality Assurance, Accreditation and Access to pointsof difference and points of agreement between these programs.The study used the field approach to address the subject of the study andthe questionnaire as a tool to collect data on the programs of the sections.Then the study was followed by statistics to compare the programs of thefour departments in order to answer the study questions which are the answers totheir objectives.The departments are Libraries and Information Sciences Faculty of Arts,Ain Shams University, Department of Libraries and Information College of Arts,Sohag University, Library, Documentation and Information TechnologyDepartment, Faculty of Arts, Cairo University.…”
    Get full text
    Article
  6. 1006

    Anonymous trust management scheme of VANET based on attribute signature by Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO

    Published 2023-04-01
    “…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
    Get full text
    Article
  7. 1007
  8. 1008

    Defect in the procedure as a ground for invalidating the public procurement procedure by Magdalena Taraszkiewicz

    Published 2023-12-01
    “…Contracting authority in accordance with Art. 255 PPL is obliged to cancel the public procurement procedure in the event of any of the events listed in this provision. …”
    Get full text
    Article
  9. 1009

    Pouvoir, jeux d’argent et liminarité. L’impôt antique, théâtre de la souveraineté by Michaël Girardin

    Published 2021-06-01
    “…While paying, the faithful ones (in the case of ‘religious’ taxation) or the subjects (in the case of ‘political’ taxation) manifested their acknowledgment of the authority, the legitimacy of authority to possess the place, and last but not least, their submission. …”
    Get full text
    Article
  10. 1010

    POTENTIAL OF THE KANTIAN NOTION OF SOCIAL JUSTICE by Z. Kieliszek

    Published 2020-12-01
    “…In addition, Kan’s notion of justice was correlated with the works of modern authors: John Rawls, Robert Nozick and Otfried Höffe, showing identical and different elements in them. …”
    Get full text
    Article
  11. 1011
  12. 1012
  13. 1013

    Blockchain-based high transparent PKI authentication protocol by Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN

    Published 2022-08-01
    “…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
    Get full text
    Article
  14. 1014

    Settlement of Tax Disputes in the Russian Federation and Germany by A. A. Konyukhova

    Published 2015-04-01
    “…Consequently, the taxpayer submits his first application in writing to the tax authority that issued the tax act, though in some cases to a higher tax authority. …”
    Get full text
    Article
  15. 1015

    Heat transfer software for local materials in Cameroon (HTSLM 1.0): simplified building energy software based on local realities by Lynda Phalone Ndjonnou Tchawa, Lucien Mandeng Mandeng, Joël Durel Tchinang Tchameu, Ramses Tanankem Menkem, Florian Kamsu Kom, Jacques Lionel Ntamag, Joseph Pondi

    Published 2025-01-01
    “…The curves obtained for hourly indoor temperatures for the chosen days in the five climatic zones defined for the software, all show a realistic bell-shaped evolution, thus prefiguring a digital decision support tool for such admitted infrastructures to be made of materials from the Local Materials Promotion Authority of Cameroon.…”
    Get full text
    Article
  16. 1016
  17. 1017

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study covered two public sector organisations specifically, Uganda Wildlife Authority and National Forestry Authority. Focus was made on information security practices critical to managing information like human security, information classification, procedures for information labelling, compliance, standards, command and control techniques. …”
    Get full text
    Article
  18. 1018

    A theory of Legal Argumentation: The theory of rational Discourse as theory of Legal Justification.

    Published 1989
    Table of Contents: “…Furthering debate between leading theories of Law -- The Explantory Role of the Weak Natural Law Thesis -- In Defense of Hart -- Law's Authority is not a Claim to Preemption -- The Normative Fallacy Regarding Law's Authority -- The Problem about the Nature of Law vis-à-vis Legal Rationality Revisited : Towards an Integrative Jurisprudence -- Part II. …”
    View in OPAC
    Book
  19. 1019

    Paul’s self-presentation and his opinion on the art of persuasion in 1 Corinthians by Elma Cornelius

    Published 2024-06-01
    “…However, even in the events of Paul’s authority being jeopardized by the Corinthians, he could not be forced to exhibit his character in 1 Corinthians and fall into rhetorical display. …”
    Get full text
    Article
  20. 1020

    Édito - L’autorité et le pouvoir éducatifs à l’épreuve des politiques d’éducation by Camille Roelens, Stéphan Mierzejewski

    Published 2022-11-01
    “…This dossier addresses the issue of the recomposition of power and authority relationships within the school system by examining the relationships at work between the different actors of the school institution responsible for defining, supervising and implementing public policies that are supposed to respond to the challenges of the time. …”
    Get full text
    Article