Suggested Topics within your search.
Suggested Topics within your search.
- English language 55
- Rhetoric 41
- History 31
- Report writing 30
- Management 25
- Grammar 23
- methods 22
- Law 21
- Moral and ethical aspects 18
- Research 18
- College readers 16
- Human anatomy 14
- Philosophy 13
- Handbooks, manuals, etc 12
- Methodology 12
- Problems, exercises, etc 12
- Social conditions 12
- Study and teaching 12
- Politics and government 11
- Academic writing 10
- Leadership 10
- Nursing 10
- Biochemistry 9
- Calculus 9
- Economic development 9
- Human physiology 9
- Mathematics 9
- Policy sciences 9
- Social aspects 9
- Anatomy 8
-
1581
Beyond Determinism: Geography of Jewishness in Nathan Englander’s “Sister Hills” and Michael Chabon’s The Yiddish Policemen’s Union
Published 2020-07-01“…Nevertheless, the establishment of the State of Israel relied on a strong assertion of redrawn geographical boundaries, which were symbolically strengthened by the authority of the Biblical geography of Jewishness. …”
Get full text
Article -
1582
Understanding Ambiguity in Knowledge, Value and Institutional Structure: A Case Study of Chinese Open Network Community
Published 2023-08-01“…It is expected that explicitness instead of ambiguity transmitted by authority can promote existing order to more open, creative, and satisfying institutional design for net citizens in virtual communities.…”
Get full text
Article -
1583
Conflict, Territory and the Frontier Economy: Smuggling in the Alps of Dauphiné During the 18th Century
Published 2016-04-01“…Paradoxically, the frontier was not only a barrier but also a passage, depending on the different scenarios enacted along its length: a resource, a porous fence, a key place for affirming state power, and an opportunity to circumvent state authority. At a time when nation-states were seeking to affirm their presence, the frontier between Dauphiné and Piedmont, and more specifically the border defining the privileges granted to the Briançon and Queyras districts, offers an excellent opportunity for studying the territorial, economic and social situations generated by the very presence of frontiers and the various forms of power relationships involved in or controlling illegal commerce. …”
Get full text
Article -
1584
Au-delà de la relation « bourreau-victime » dans l’analyse d’une situation de harcèlement psychologique au travail
Published 2005-11-01“…These factors are mainly intensification of the work, weakness of the hierarchical authority, precariousness of the ties to employment, as well as the banalization or negation of the phenomenon, tolerance of incivility, and iniquity or injustice in the workplace. …”
Get full text
Article -
1585
Potential Distribution of Chagas Disease Vectors (Hemiptera, Reduviidae, Triatominae) in Colombia, Based on Ecological Niche Modeling
Published 2016-01-01“…This information could help to guide health authority recommendations on infection monitoring, prevention, and control. …”
Get full text
Article -
1586
Daygurt: A functional drink combining dadih and yoghurt from cow’s milk using response surface methodology
Published 2025-01-01“…Quality and safety assessment confirmed that Daygurt complied with the standards established by the Indonesian Food and Drug Authority.…”
Get full text
Article -
1587
Evaluation of Judicial Procedure in the Essence of the Method of the Wise
Published 2024-06-01“…While examining the conduct of the wise and its authority from the perspective of Imam Khomeini and some experts, the functions of the judicial procedure were also explained. …”
Get full text
Article -
1588
Big Data Approach to Sentiment Analysis in Machine Learning-Based Microblogs: Perspectives of Religious Moderation Public Policy in Indonesia
Published 2024-06-01“…This study aims to evaluate public policies introduced by the Ministry of Religion regarding religious moderation such as changes in the halal logo, transfer of authority for halal certification, and regulations on the volume of loudspeakers in the mosque. …”
Get full text
Article -
1589
A Hybrid OFDM-TDM Architecture with Decentralized Dynamic Bandwidth Allocation for PONs
Published 2013-01-01“…Instead of sending bandwidth demands to the optical line terminal (OLT) which is the only competent authority, each optical network unit (ONU) runs the same bandwidth demand determination algorithm. …”
Get full text
Article -
1590
-
1591
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
Published 2014-02-01“…To address these issues, in this paper an AA (Attribute Authority) server is added to VoIP to design an authentication system with bolstered security and differentiated user access.…”
Get full text
Article -
1592
Entre le massif de l’Aurès et les oasis : apparition, évolution et disparition des communautés ibâḍites du Zâb (viiie-xive siècle)
Published 2012-12-01“…Under the influence of Hawwâra, Banû Birzâl, Miknâsa and Banû Kimlân tribes, all converted to this religious stream, the province called Zāb by the Arabic authors was transformed into an Ibâḍî stronghold. …”
Get full text
Article -
1593
Henri Bergson et les conservateurs espagnols (1907-1940)/I
Published 2013-06-01“…The philosopher Henri Bergson, a very strong intellectual authority in his country between 1900 and 1920, enlisted as a missionary of the Allied cause in the world. …”
Get full text
Article -
1594
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
1595
Campus Commons: Analysis of IIT Patna’s Public open Spaces
Published 2024-09-01“…Furthermore, this study recommends that public open spaces' benefits to education, recreation, & the environment be taken into account by those in authority over campus planning early on. …”
Get full text
Article -
1596
Coordinative Discourse of Strategic Sovereignty Tilting the European Union’s Institutional Balance
Published 2022-11-01“…Institutional balance is a dynamic process in which institutions challenge each other's authority. This process is conceptualized in the article in terms of discursive neo-institutionalism as a coordinative discourse, which forms, challenges and justifies the idea of “strategic sovereignty”. …”
Get full text
Article -
1597
Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat
Published 2025-01-01“…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
Get full text
Article -
1598
INTERIM MEASURES UNDER PARAGRAPH 10 OF ART. 101 OF THE TAX CODE OF THE RUSSIAN FEDERATION: APPLICATION PRACTICE
Published 2021-04-01“…At the same time, according to the Federal Tax Service of Russia, with a sharp reduction in the number of ongoing on-site tax audits, the amount of additional charges for one on-site audit increases сonstantly: in 2016 – 13.6 million rubles, in 2017 – 15.7 million rubles, 2018 – 22.2 million rubles, 2019 – 33.5 million rubles. The tax authority, by charging additional taxes and penalties to the taxpayer, is interested in collecting them. …”
Get full text
Article -
1599
Sovereignty of natural resources and accountability. The case of the Bolivian hydrocarbon policy, 2006-2018
Published 2019-09-01“…Finally, each aspect of the causal mechanism is supported by empirical evidence obtained through the identification of policy instruments organized in a research protocol under the NATO (Nodality, Authority, Treasure and Organization) typology in order to provide external and internal validation for the hypothesis. …”
Get full text
Article -
1600
K. SCHMITT’S THEORY OF PARTISAN: SOCIO-POLITICAL EVENTUALITY OF PARTISAN
Published 2016-10-01“…The behavior of the occupied population can follow three models: expectations of the solution of the conflict between sovereigns and the subsequent acceptance of its results as due - absolute majority population, the active help to the occupying sovereign for the purpose of the statement new political - the collaborator, active opposition of the occupying authority for the purpose of return former political - the partisan.…”
Get full text
Article