Showing 1,561 - 1,580 results of 33,375 for search '"authority"', query time: 0.09s Refine Results
  1. 1561

    Assessment of a Planned Municipal Solid Waste Management System in Sri Lanka by Disna Eheliyagoda, Nimal Prematilake

    Published 2016-05-01
    “… Systematic Municipal Solid Waste Management (MSWM) authorities of Sri Lanka contributes to exchange  some productive outputs with localities; however it is still not in a successful mode due to limitations and environmental failures in their operation. …”
    Get full text
    Article
  2. 1562
  3. 1563

    Aswameda Sebagai Prosesi Ritual Berbalut Kuasa dalam Teks Aswamedaparwa by I Nyoman Duana Sutika, I Ketut Ngurah Sulibra

    Published 2024-11-01
    “…Regions that recognize the authority of Hastinapura will allow horses to pass, whereas regions that try to block them will be resolved by war. …”
    Get full text
    Article
  4. 1564

    The Development of Klidang Lor Port Batang, 1975-2014 by Mifta Abdirozaq, Yety Rochwulaningsih, Alamsyah Alamsyah

    Published 2024-01-01
    “…In 1988-1998, the port authority built a harbor pier and lighthouse to make it easier for ships to dock. …”
    Get full text
    Article
  5. 1565

    La ruine angkorienne et le fromager : une mise en cloche d’un paysage fantasmé synonyme d’inaction ? by Sébastien Preuil

    Published 2019-12-01
    “…Today, although most Khmers do not appreciate this image of temples reclaimed by the forest which they consider as disrespectful of deities and a sign of the decline of their civilization, some monuments are voluntarily maintained by the Apsara Authority in a state of ruin in order to perpetuate romantic images which appeal to foreign tourists. …”
    Get full text
    Article
  6. 1566

    The history of landfills and landfill gas management in the U.S. by William F. Ritter

    Published 2024-02-01
    “…Environmental Protection Agency the authority to regulate landfills and establish new criteria for landfills which resulted in closure of 50% of the existing landfills. …”
    Get full text
    Article
  7. 1567

    Reevaluating Conventional Strategies: Harnessing Traditional Structures to Counter Violent Extremism in Pakistan by Sardar Jehanzaib Ghalib

    Published 2025-01-01
    “…Since 2012, this structure has been employed by the military across multiple tiers to suppress insurgencies, predominantly in the FATA, Swat region, Dir, and other districts where the authority of the state is at risk. The strategic alliance between the military and traditional structures is critical for combating insurgency.  …”
    Get full text
    Article
  8. 1568

    Transports of Translation: Creativity and Healing by Sara GREAVES

    Published 2022-12-01
    “…Along with the numerous cultural, religious or political functions of translation (establishing religious authority or nation-building, for instance, as with the King James Version of the Bible), along with its didactic use in language-learning and its intercultural one in aesthetic transmission and appropriation, translation can also play a healing role. …”
    Get full text
    Article
  9. 1569

    Criteria for decision-making for the best reclamation solution by Gaćina Radmila, Bajić Sanja, Dimitrijević Bojan, Gluščević Branko

    Published 2024-01-01
    “…To minimize the effects of mining, environmental management is obligated to stabilize the land, so it is productive after mine closure and leads to the best possible purpose. Regulatory authority sets out the criteria for reclamation to be accomplished by the mine reclamation program such as compliance, land re-contouring, revegetation, and final completion.…”
    Get full text
    Article
  10. 1570

    VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms by UZhi-jun W, UIYi C, UEMeng Y

    Published 2015-01-01
    “…Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence,the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP,the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore,the virtual nodes have the ability of resilience,which can complete the seamless switching between being attacked nodes in cloud computing platform,and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters,such as the number of being attacked nodes in hash secure access path (HSAP),and the switching time and the handoff delay between nodes,are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach,and enhances the security of cloud computing platform.…”
    Get full text
    Article
  11. 1571

    Application of Governance in spatial scales by hassan kamran

    Published 2022-06-01
    “…The rule of law over higher power and superiority imply that no other legal authority is superior to it. Since the study of sovereignty in political geography is very important, therefore, it is necessary to examine its dimensions and spatial levels. …”
    Get full text
    Article
  12. 1572

    Feminist spiritualities, gender equality and sustainable development: The possibilities of a countermovement by N. Swanepoel, T. van Wyk

    Published 2023-06-01
    “…This “voice” implied recognition and authority, to a certain degree, in a patriarchal-oriented reality. …”
    Get full text
    Article
  13. 1573

    The constitution of war in the Middle East by Samad Zangana, Oudha Yousif, Anas Akram Mohammed Subhi Abbas, Aqeel Nadea Abdulateef

    Published 2025-01-01
    “…The article explores the constitutional basis that grants legal authority for military operations in the region.  This study aims to examine the constitutional systems that provide authorization for war in the Middle East, assessing their impact on regional and global peace, security, accountability, and the safeguarding of human rights. …”
    Get full text
    Article
  14. 1574

    National Spatial Planning and the Constraints pertaining to the New Territorial Governance in Post-Revolutionary Tunisia by Mourad Ben Jelloul

    Published 2017-06-01
    “…And in order to reduce territorial inequity public authorities committed themselves on the one hand to major projects in the field of infrastructure and large-scale public facilities, on the other hand to deep-reaching institutional and legislative reforms namely by issuing and adopting the new Local Authorities Code and Urban Planning Code. …”
    Get full text
    Article
  15. 1575

    Assessment of a Planned Municipal Solid Waste Management System in Sri Lanka by Disna Eheliyagoda, Nimal Prematilake

    Published 2016-05-01
    “… Systematic Municipal Solid Waste Management (MSWM) authorities of Sri Lanka contributes to exchange  some productive outputs with localities; however it is still not in a successful mode due to limitations and environmental failures in their operation. …”
    Get full text
    Article
  16. 1576

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  17. 1577

    Guillelmus Durantis (1230/1237–1296) by Rafał Wojciechowski

    Published 2025-02-01
    “…In this article, the Author undertook the task of compiling a biography of Guillelmus Durantis, a bishop and legal scholar, and the characteristics of his work. …”
    Get full text
    Article
  18. 1578

    « This » comme marqueur privilégié du genre : le cas des résumés de thèses by Geneviève Bordet

    Published 2011-12-01
    “…We argue that the mastering of the interpretive space provided by the use of “this” helps the PhD candidate to demonstrate his/her legitimacy and authority, therefore contributing to his/her admission inside the academic community.…”
    Get full text
    Article
  19. 1579

    Common Property and Local Development. Research Elements for Friuli Venezia Giulia (Italy) by Maurizio Daici

    Published 2021-05-01
    “…With this opinion, in 1927, the legislator mainly acted to get the agricultural properties free from common uses (grazing, gathering wood, etc.) and to reduce the extensions of the properties opened to a shared utilisation, by putting them at the same time under the authority of the municipalities. However, from the 1950s, law provisions for special measures in favour of mountain areas indicated the common properties (meadows, forests, farm buildings) as valuable resources for development initiatives, not only in traditional activity sectors (especially in the touristic sector). …”
    Get full text
    Article
  20. 1580

    Family violence in the new Russian realities: essence, types and reasons by R. M. Sadykov, N. L. Bolshakova

    Published 2022-09-01
    “…It is believed that family members resort to physical violence in cases where they have no other opportunity to influence the family’s decision-making due to lack of authority. Psychological concepts have established a special role in the causes of violence of such factors as the weakening of instinctual control, frustration, aggressiveness, alcoholism, psychopathology. …”
    Get full text
    Article