Suggested Topics within your search.
Suggested Topics within your search.
- Animal welfare 1
- Animals 1
- Brothers and sisters 1
- Cultural property 1
- Desertions 1
- Elias (Fictitious character) 1
- Fantasy 1
- Fugitives from justice 1
- Group homes for youth 1
- Historic preservation 1
- History 1
- Imaginary places 1
- Intelligence service 1
- Laia (Fictitious character) 1
- Management 1
- Orphans 1
- Prisons 1
- Protection 1
- Rats 1
- Repatriation 1
- Romance fiction 1
- Treatment 1
- Vietnam War, 1961-1975 1
-
201
Fur Processing in Raižiai in the 20th Century: Craft and Image
Published 2023-10-01“…The analysis of the collect ed material indicates that the Soviet era which began to destroy the craft due to ideological circumstances, and the change in the direction of the activity needs of a modernizing society, destroyed the way of life of the society, therefore, the craft of Raižiai Tatars, having a hundredyear history, naturally disappeared at the end of the 20th century. …”
Get full text
Article -
202
La “familizzazione” dell’impresa: alcune riflessioni sul familismo imprenditoriale in Brianza nella crisi economica attuale
Published 2017-03-01“…This form of unequal transmission of capital, based on gender, may leave painful scars within the family, undermining or even destroying personal relationships and kinship solidarity. …”
Get full text
Article -
203
“The Ages Humble Servant” : l’écriture de la catastrophe entre modernité et tradition dans The Storm (1704) de Daniel Defoe
Published 2017-12-01“…Daniel Defoe’s first book-length work, The Storm, was published in 1704, i.e. a few months only after the violent storm that destroyed the southern counties of England and Wales in November 1703. …”
Get full text
Article -
204
The United States, the United Nations, and the Second Occupation of Korea, 1950-1951
Published 2010-12-01“…But now, islanders and military personnel died as a result of the bombardment from the North in broad daylight, and houses and facilities were destroyed. South Korean people felt shock, fear and anxiety. …”
Get full text
Article -
205
Photocatalyst and Decoration Design in Indoor Public Spaces Based on the Photocatalytic Function of Nanometer Titanium Dioxide
Published 2022-01-01“…When impurities appear in the air, they are destroyed by the photocatalyst, and the impurities are converted into substances that are harmless to the human body. …”
Get full text
Article -
206
Sir James Fitzjames Stephen (1829-1894) : un intellectuel sceptique, critique des idées libérales de son temps
Published 2012-06-01“…One had to resist progress which could destroy society. Impervious to the ideas of his period but unquestionably stamped with the teachings of the Old Whigs, Sir James Fitzjames Stephen remains a key character to understand the spirit of resistance at work in the second half of the 19th century, at the same time a sceptic, a moraliser and a Conservative.…”
Get full text
Article -
207
Procesy s katolickými duchovními a členy řádů projednávané Krajským soudem v Ústí nad Labem v letech 1953-1960
Published 2008-01-01“…In 1949, the state's real intention was unambiguously revealed – to subjugate or destroy the church in Czechoslovakia. The internment of top representatives of the catholic church and arrests of ordinary priests took place at that time together with state organized anti-clerical actions aimed against the church unity. …”
Get full text
Article -
208
SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization
Published 2015-04-01“…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
Get full text
Article -
209
SDN based e-mail repudiation source restraining method
Published 2016-09-01“…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
Get full text
Article -
210
Feral Swine Trapping: Techniques and Designs
Published 2018-07-01“…They loosen the soil, destroy native vegetation, and modify the natural chemistry and nutrients of the soil, causing widespread destruction in natural ecosystems, agricultural areas, livestock pastures, and residential areas. …”
Get full text
Article -
211
Magic and Collage: Language in Ginsberg’s "Wichita Vortex Sutra"
Published 2021-10-01“…In "Wichita Vortex Sutra," Ginsberg’s use of language is especially noteworthy: on the one hand, the poet charges language with a spiritual, magical power, and on the other hand, he destroys it, fragments it, and recreates it through the collage. …”
Get full text
Article -
212
Palais, forteresses et pyramides. Patrimoine matériel et immatériel de la justice. Quelle histoire pour l’organisation pénale napoléonienne en France ?
Published 2024-01-01“…The courthouses, sometimes nicknamed the Temples of Justice, preserved, destroyed and renovated, have a history in which the Napoleonic period occupies a decisive place, even if few achievements have seen “the light of day”. …”
Get full text
Article -
213
Grenzüberschreitungen / Traversées des frontières
Published 2021-12-01“…The journal Recherches germaniques, with its ‘naturally’ comparative positioning, its dual focus on German literature and history of thought, and the place it reserves for Alsace, is thus intimately linked to the collections of the Bibliothèque nationale et universitaire de Strasbourg, formerly the Kaiserliche Universitäts- und Landesbibliothek. Destroyed and then reconstituted thanks to international donations and in particular those from the German Empire, the collections of the Bnu constitute a privileged mirror of the eventful history of the region. …”
Get full text
Article -
214
Intercambios artísticos en una diócesis transfronteriza
Published 2022-01-01“…After that, they tried to rebuild their cathedral buildings: first Braga, with an initial project largely destroyed around 1110 and then Tui after a period of relocation in the monastery of San Bartolomé. …”
Get full text
Article -
215
A Morpho-Syntactic Analysis of Personal Names in Oǹdó
Published 2023-11-01“…It is considered among Yorùbá to be of life longer, even than the bearer of the names, hence the need for a name to be protected from being destroyed. All these are what scholars have said about names in the standard dialect of Yorùbá. …”
Get full text
Article -
216
Toward Molecular Level of the “Salmonella-Victim” Ecology, Genetics, and Evolution
Published 2004-01-01“…Even the ability of Salmonella to destroy the victims cells has been the subject of century-long discussions. …”
Get full text
Article -
217
Some notes about the books of Žygimantas Augustas in the Vilnius University Library
Published 2024-08-01“…The majority of this collection was dispersed and partly destroyed during wars and other calamities. At present, the Library of Vilnius University possesses only 14 volumes (20 titles) from this collection. …”
Get full text
Article -
218
La collégialité détournée : les racines organisationnelles du harcèlement psychologique dans les universités
Published 2005-05-01“…One troubling fact: the means used to overwhelm, destroy or subdue are the very instruments of collegiality that are diverted; the formal or informal powers of recommendation, appraisal and decision-making are abused; and colleagues and students are manipulated and successfully silenced or made to conspire against an individual or group. …”
Get full text
Article -
219
Effects of Acupuncture and Rehabilitation Training on Limb Movement and Living Ability of Patients with Hemiplegia after Stroke
Published 2022-01-01“…Patients with stroke hemiplegia are mostly tetraplegic and have difficulty regulating their balance, and their long-term symmetry has been destroyed. The application in the rehabilitation process of acupuncture in patients with hemorrhagic stroke may produce unexpected effects. …”
Get full text
Article -
220
An Improved Wavelet Correction for Zero Shifted Accelerometer Data
Published 2003-01-01“…The test article may have been destroyed or it may be impossible or prohibitively costly to recreate the test. …”
Get full text
Article