Showing 1,581 - 1,600 results of 33,375 for search '"authority"', query time: 0.10s Refine Results
  1. 1581

    Beyond Determinism: Geography of Jewishness in Nathan Englander’s “Sister Hills” and Michael Chabon’s The Yiddish Policemen’s Union by Filip Boratyn

    Published 2020-07-01
    “…Nevertheless, the establishment of the State of Israel relied on a strong assertion of redrawn geographical boundaries, which were symbolically strengthened by the authority of the Biblical geography of Jewishness. …”
    Get full text
    Article
  2. 1582

    Understanding Ambiguity in Knowledge, Value and Institutional Structure: A Case Study of Chinese Open Network Community by Yao Jin

    Published 2023-08-01
    “…It is expected that explicitness instead of ambiguity transmitted by authority can promote existing order to more open, creative, and satisfying institutional design for net citizens in virtual communities.…”
    Get full text
    Article
  3. 1583

    Conflict, Territory and the Frontier Economy: Smuggling in the Alps of Dauphiné During the 18th Century by Anne Montenach

    Published 2016-04-01
    “…Paradoxically, the frontier was not only a barrier but also a passage, depending on the different scenarios enacted along its length: a resource, a porous fence, a key place for affirming state power, and an opportunity to circumvent state authority. At a time when nation-states were seeking to affirm their presence, the frontier between Dauphiné and Piedmont, and more specifically the border defining the privileges granted to the Briançon and Queyras districts, offers an excellent opportunity for studying the territorial, economic and social situations generated by the very presence of frontiers and the various forms of power relationships involved in or controlling illegal commerce. …”
    Get full text
    Article
  4. 1584

    Au-delà de la relation « bourreau-victime » dans l’analyse d’une situation de harcèlement psychologique au travail by Michel Vézina, Julie Dussault

    Published 2005-11-01
    “…These factors are mainly intensification of the work, weakness of the hierarchical authority, precariousness of the ties to employment, as well as the banalization or negation of the phenomenon, tolerance of incivility, and iniquity or injustice in the workplace. …”
    Get full text
    Article
  5. 1585

    Potential Distribution of Chagas Disease Vectors (Hemiptera, Reduviidae, Triatominae) in Colombia, Based on Ecological Niche Modeling by Gabriel Parra-Henao, Laura C. Suárez-Escudero, Sebastián González-Caro

    Published 2016-01-01
    “…This information could help to guide health authority recommendations on infection monitoring, prevention, and control. …”
    Get full text
    Article
  6. 1586

    Daygurt: A functional drink combining dadih and yoghurt from cow’s milk using response surface methodology by Gusnedi, Ahmad Habibi Nur, Sartika Wiwi, Darwel, Tristi Utami Citra

    Published 2025-01-01
    “…Quality and safety assessment confirmed that Daygurt complied with the standards established by the Indonesian Food and Drug Authority.…”
    Get full text
    Article
  7. 1587

    Evaluation of Judicial Procedure in the Essence of the Method of the Wise by Moein Gholamalipour, Ahmad Bagheri

    Published 2024-06-01
    “…While examining the conduct of the wise and its authority from the perspective of Imam Khomeini and some experts, the functions of the judicial procedure were also explained. …”
    Get full text
    Article
  8. 1588

    Big Data Approach to Sentiment Analysis in Machine Learning-Based Microblogs: Perspectives of Religious Moderation Public Policy in Indonesia by Mhd. Furqan, Ahmad Fakhri Ab. Nasir

    Published 2024-06-01
    “…This study aims to evaluate public policies introduced by the Ministry of Religion regarding religious moderation such as changes in the halal logo, transfer of authority for halal certification, and regulations on the volume of loudspeakers in the mosque. …”
    Get full text
    Article
  9. 1589

    A Hybrid OFDM-TDM Architecture with Decentralized Dynamic Bandwidth Allocation for PONs by Taner Cevik

    Published 2013-01-01
    “…Instead of sending bandwidth demands to the optical line terminal (OLT) which is the only competent authority, each optical network unit (ONU) runs the same bandwidth demand determination algorithm. …”
    Get full text
    Article
  10. 1590
  11. 1591

    User Access Control and Authentication System for VoIP Service in Mobile Communication Environments by Ho-Kyung Yang, Jeong-Kyung Moon, Cheol-Rim Choi, Hwang-Bin Ryou

    Published 2014-02-01
    “…To address these issues, in this paper an AA (Attribute Authority) server is added to VoIP to design an authentication system with bolstered security and differentiated user access.…”
    Get full text
    Article
  12. 1592

    Entre le massif de l’Aurès et les oasis : apparition, évolution et disparition des communautés ibâḍites du Zâb (viiie-xive siècle) by Allaoua Amara

    Published 2012-12-01
    “…Under the influence of Hawwâra, Banû Birzâl, Miknâsa and Banû Kimlân tribes, all converted to this religious stream, the province called Zāb by the Arabic authors was transformed into an Ibâḍî stronghold. …”
    Get full text
    Article
  13. 1593

    Henri Bergson et les conservateurs espagnols (1907-1940)/I by Camille Lacau Saint-Guily

    Published 2013-06-01
    “…The philosopher Henri Bergson, a very strong intellectual authority in his country between 1900 and 1920, enlisted as a missionary of the Allied cause in the world. …”
    Get full text
    Article
  14. 1594

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  15. 1595

    Campus Commons: Analysis of IIT Patna’s Public open Spaces by Nazish Abid, Mazharul Haque

    Published 2024-09-01
    “…Furthermore, this study recommends that public open spaces' benefits to education, recreation, & the environment be taken into account by those in authority over campus planning early on. …”
    Get full text
    Article
  16. 1596

    Coordinative Discourse of Strategic Sovereignty Tilting the European Union’s Institutional Balance by T. A. Romanova, S. V. Mazanik

    Published 2022-11-01
    “…Institutional balance is a dynamic process in which institutions challenge each other's authority. This process is conceptualized in the article in terms of discursive neo-institutionalism as a coordinative discourse, which forms, challenges and justifies the idea of “strategic sovereignty”. …”
    Get full text
    Article
  17. 1597

    Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat by Muhammad Ramli

    Published 2025-01-01
    “…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
    Get full text
    Article
  18. 1598

    INTERIM MEASURES UNDER PARAGRAPH 10 OF ART. 101 OF THE TAX CODE OF THE RUSSIAN FEDERATION: APPLICATION PRACTICE by N. Z. Zotikov

    Published 2021-04-01
    “…At the same time, according to the Federal Tax Service of Russia, with a sharp reduction in the number of ongoing on-site tax audits, the amount of additional charges for one on-site audit increases сonstantly: in 2016 – 13.6 million rubles, in 2017 – 15.7 million rubles, 2018 – 22.2 million rubles, 2019 – 33.5 million rubles. The tax authority, by charging additional taxes and penalties to the taxpayer, is interested in collecting them. …”
    Get full text
    Article
  19. 1599

    Sovereignty of natural resources and accountability. The case of the Bolivian hydrocarbon policy, 2006-2018 by César Augusto Camacho-Soliz

    Published 2019-09-01
    “…Finally, each aspect of the causal mechanism is supported by empirical evidence obtained through the identification of policy instruments organized in a research protocol under the NATO (Nodality, Authority, Treasure and Organization) typology in order to provide external and internal validation for the hypothesis. …”
    Get full text
    Article
  20. 1600

    K. SCHMITT’S THEORY OF PARTISAN: SOCIO-POLITICAL EVENTUALITY OF PARTISAN by M. P. Ostromenskij

    Published 2016-10-01
    “…The behavior of the occupied population can follow three models: expectations of the solution of the conflict between sovereigns and the subsequent acceptance of its results as due - absolute majority population, the active help to the occupying sovereign for the purpose of the statement new political - the collaborator, active opposition of the occupying authority for the purpose of return former political - the partisan.…”
    Get full text
    Article