Showing 201 - 220 results of 819 for search '"destroyer"', query time: 0.06s Refine Results
  1. 201

    Fur Processing in Raižiai in the 20th Century: Craft and Image by Jonas Mardosa

    Published 2023-10-01
    “…The analysis of the collect­ ed material indicates that the Soviet era which began to destroy the craft due to ideological circumstances, and the change in the direction of the activity needs of a modernizing society, destroyed the way of life of the society, therefore, the craft of Raižiai Tatars, having a hundred­year history, naturally disappeared at the end of the 20th century. …”
    Get full text
    Article
  2. 202

    La “familizzazione” dell’impresa: alcune riflessioni sul familismo imprenditoriale in Brianza nella crisi economica attuale by Simone Ghezzi

    Published 2017-03-01
    “…This form of unequal transmission of capital, based on gender, may leave painful scars within the family, undermining or even destroying personal relationships and kinship solidarity.  …”
    Get full text
    Article
  3. 203

    “The Ages Humble Servant” : l’écriture de la catastrophe entre modernité et tradition dans The Storm (1704) de Daniel Defoe by Nathalie BERNARD, Emmanuelle PERALDO

    Published 2017-12-01
    “…Daniel Defoe’s first book-length work, The Storm, was published in 1704, i.e. a few months only after the violent storm that destroyed the southern counties of England and Wales in November 1703. …”
    Get full text
    Article
  4. 204

    The United States, the United Nations, and the Second Occupation of Korea, 1950-1951 by Steven Lee

    Published 2010-12-01
    “…But now, islanders and military personnel died as a result of the bombardment from the North in broad daylight, and houses and facilities were destroyed. South Korean people felt shock, fear and anxiety. …”
    Get full text
    Article
  5. 205

    Photocatalyst and Decoration Design in Indoor Public Spaces Based on the Photocatalytic Function of Nanometer Titanium Dioxide by Ling Yang

    Published 2022-01-01
    “…When impurities appear in the air, they are destroyed by the photocatalyst, and the impurities are converted into substances that are harmless to the human body. …”
    Get full text
    Article
  6. 206

    Sir James Fitzjames Stephen (1829-1894) : un intellectuel sceptique, critique des idées libérales de son temps by Catherine Hajdenko-Marshall

    Published 2012-06-01
    “…One had to resist progress which could destroy society. Impervious to the ideas of his period but unquestionably stamped with the teachings of the Old Whigs, Sir James Fitzjames Stephen remains a key character to understand the spirit of resistance at work in the second half of the 19th century, at the same time a sceptic, a moraliser and a Conservative.…”
    Get full text
    Article
  7. 207

    Procesy s katolickými duchovními a členy řádů projednávané Krajským soudem v Ústí nad Labem v letech 1953-1960 by Ivana Hrachová

    Published 2008-01-01
    “…In 1949, the state's real intention was unambiguously revealed – to subjugate or destroy the church in Czechoslovakia. The internment of top representatives of the catholic church and arrests of ordinary priests took place at that time together with state organized anti-clerical actions aimed against the church unity. …”
    Get full text
    Article
  8. 208

    SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization by Jiahua Zhang, Zhongxue Yang, Jiangping Wang, Yukai Shi, Liang Wei

    Published 2015-04-01
    “…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
    Get full text
    Article
  9. 209

    SDN based e-mail repudiation source restraining method by Zhi-geng HAN, Xia FENG, Geng CHEN

    Published 2016-09-01
    “…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
    Get full text
    Article
  10. 210

    Feral Swine Trapping: Techniques and Designs by Bethany Rose Wight, Raoul Keith Boughton

    Published 2018-07-01
    “…They loosen the soil, destroy native vegetation, and modify the natural chemistry and nutrients of the soil, causing widespread destruction in natural ecosystems, agricultural areas, livestock pastures, and residential areas. …”
    Get full text
    Article
  11. 211

    Magic and Collage: Language in Ginsberg’s "Wichita Vortex Sutra" by Elisa Sabbadin

    Published 2021-10-01
    “…In "Wichita Vortex Sutra," Ginsberg’s use of language is especially noteworthy: on the one hand, the poet charges language with a spiritual, magical power, and on the other hand, he destroys it, fragments it, and recreates it through the collage. …”
    Get full text
    Article
  12. 212

    Palais, forteresses et pyramides. Patrimoine matériel et immatériel de la justice. Quelle histoire pour l’organisation pénale napoléonienne en France ? by Frédéric Chauvaud

    Published 2024-01-01
    “…The courthouses, sometimes nicknamed the Temples of Justice, preserved, destroyed and renovated, have a history in which the Napoleonic period occupies a decisive place, even if few achievements have seen “the light of day”. …”
    Get full text
    Article
  13. 213

    Grenzüberschreitungen / Traversées des frontières by Aude Therstappen

    Published 2021-12-01
    “…The journal Recherches germaniques, with its ‘naturally’ comparative positioning, its dual focus on German literature and history of thought, and the place it reserves for Alsace, is thus intimately linked to the collections of the Bibliothèque nationale et universitaire de Strasbourg, formerly the Kaiserliche Universitäts- und Landesbibliothek. Destroyed and then reconstituted thanks to international donations and in particular those from the German Empire, the collections of the Bnu constitute a privileged mirror of the eventful history of the region. …”
    Get full text
    Article
  14. 214

    Intercambios artísticos en una diócesis transfronteriza by Marta Cendón Fernández

    Published 2022-01-01
    “…After that, they tried to rebuild their cathedral buildings: first Braga, with an initial project largely destroyed around 1110 and then Tui after a period of relocation in the monastery of San Bartolomé. …”
    Get full text
    Article
  15. 215

    A Morpho-Syntactic Analysis of Personal Names in Oǹdó by Sunday Olayinka Awolaoye

    Published 2023-11-01
    “…It is considered among Yorùbá to be of life longer, even than the bearer of the names, hence the need for a name to be protected from being destroyed. All these are what scholars have said about names in the standard dialect of Yorùbá. …”
    Get full text
    Article
  16. 216

    Toward Molecular Level of the “Salmonella-Victim” Ecology, Genetics, and Evolution by S.N. Rumyantsev

    Published 2004-01-01
    “…Even the ability of Salmonella to destroy the victims cells has been the subject of century-long discussions. …”
    Get full text
    Article
  17. 217

    Some notes about the books of Žygimantas Augustas in the Vilnius University Library by Alma Braziūnienė

    Published 2024-08-01
    “…The majority of this collection was dispersed and partly destroyed during wars and other calamities. At present, the Library of Vilnius University possesses only 14 volumes (20 titles) from this collection. …”
    Get full text
    Article
  18. 218

    La collégialité détournée : les racines organisationnelles du harcèlement psychologique dans les universités by Chantal Leclerc, Cécile Sabourin, Micheline Bonneau

    Published 2005-05-01
    “…One troubling fact: the means used to overwhelm, destroy or subdue are the very instruments of collegiality that are diverted; the formal or informal powers of recommendation, appraisal and decision-making are abused; and colleagues and students are manipulated and successfully silenced or made to conspire against an individual or group. …”
    Get full text
    Article
  19. 219

    Effects of Acupuncture and Rehabilitation Training on Limb Movement and Living Ability of Patients with Hemiplegia after Stroke by Juhua Zhang, Yingmei Mu, Yunxia Zhang

    Published 2022-01-01
    “…Patients with stroke hemiplegia are mostly tetraplegic and have difficulty regulating their balance, and their long-term symmetry has been destroyed. The application in the rehabilitation process of acupuncture in patients with hemorrhagic stroke may produce unexpected effects. …”
    Get full text
    Article
  20. 220

    An Improved Wavelet Correction for Zero Shifted Accelerometer Data by Timothy S. Edwards

    Published 2003-01-01
    “…The test article may have been destroyed or it may be impossible or prohibitively costly to recreate the test. …”
    Get full text
    Article