Academic literature on the topic 'Delire de relation des sensitifs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Delire de relation des sensitifs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Delire de relation des sensitifs"

1

Berrahal, I., A. Oumaya, R. Chebbi, H. Snene, and S. Gallali. "Le délire de relation des sensitifs de Kretschmer : à propos de deux cas." European Psychiatry 28, S2 (2013): 52–53. http://dx.doi.org/10.1016/j.eurpsy.2013.09.137.

Full text
Abstract:
ObjectifsRappeler le concept du délire de relation des sensitifs de Kretschmer.MéthodologieÉtude de cas : présenter deux vignettes cliniques avec revue de la littérature.RésultatsLe délire de relation chez les personnalités sensitives (ou paranoïa sensitive de Kretschmer) est une forme dépressive de la paranoïa qui a été décrite par Kretschmer en 1919. Il est défini par le développement progressif d’idées de persécution sur un fond prémorbide sensitif (hyperémotif et hyposthénique). On ne retrouve pas, dans les personnalités qualifiées de sensitives ou sensibles, la surestime de soi ou la quér
APA, Harvard, Vancouver, ISO, and other styles
2

Brémaud, Nicolas. "Particularités de la paranoïa sensitive." Perspectives Psy 57, no. 3 (2018): 206–13. http://dx.doi.org/10.1051/ppsy/2018573206.

Full text
Abstract:
L’auteur se propose de revenir sur ce délire bien particulier qu’est le délire de relation des sensitifs (ou paranoïa sensitive), isolé par Kretschmer en 1918. Si le nom de Kretschmer est assez peu cité dans la littérature, les « caractères » sensitifs mis en avant sont pourtant encore souvent repris dans la description de tableaux cliniques de certaines formes de paranoïa, et nous montrerons ainsi que ce délire est bien d’actualité. Après avoir exposé les grandes lignes de la conception kretschmérienne et donc les particularités de la paranoïa sensitive, nous proposons une courte revue de la
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Delire de relation des sensitifs"

1

ESTORGES, JEAN-PAUL. "Le delire de relation des sensitifs : un concept psychiatrique toujours actuel." Aix-Marseille 2, 1992. http://www.theses.fr/1992AIX20956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KEPCZYNSKI, FRANCOIS. "De l'authenticite au delire paranoiaque des sensitifs de kretschmer : a propos d'une observation." Lille 2, 1994. http://www.theses.fr/1994LIL2M135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

COHOU, DIDIER. "Paranoia sensitive d'ernst kretschmer : disparition ou dissolution du concept dans les nouvelles nosographies." Dijon, 1994. http://www.theses.fr/1994DIJOM101.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Delire de relation des sensitifs"

1

Hansen, Laura Pinto. "The Spy Who Never Has to Go Out Into the Cold." In Encyclopedia of Criminal Activities and the Deep Web. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch017.

Full text
Abstract:
At the height of the Cold War, spies were more likely to be required to live secret lives in deep undercover. The same held true for corporate and industry spies. Even though government and industry spies may still be required to go out in the field, the digital and big data ages have offered the relative comfort of executing spy operations within one's home or office, offering challenges to detecting, investigating, and controlling espionage. Due to various network means, spies never have to “go out into the cold” – code for going deep undercover. Some of the network conduits discussed are the dark web and deep web and their roles in making covert operations even more secretive than when spies were required to go in the field. Methods of obtaining sensitive information and disabling computer systems are explored as well, including phishing and various means to deliver malware, presented in layman's terms. Once the stuff of science fiction and Hollywood movies, life is very much imitating art, with examples given from famous cyber espionage cases.
APA, Harvard, Vancouver, ISO, and other styles
2

Hurson, Ali R., and Xing Gao. "Location-Based Services." In Electronic Services. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-967-5.ch046.

Full text
Abstract:
The past decade has seen advances in wireless network technologies and an explosive growth in the diversity of portable computing devices such as laptop computers, handheld personal computers, personal digital assistants (PDAs), and smart phones with Internet access. Wireless networking technologies and portable devices enable users to access information in an “anytime, anywhere” fashion. For example, a mobile user (MU) on the highway may query local weather, traffic information, nearby gas stations, next rest areas, or restaurants within 10 miles. Such new demands introduce a new type of services, location-based services (LBS), where certain location constraints (e.g., the user’s current location) are used in the service provision. The idea of queries with location constraints is originally introduced by Imielinski and Badrinath (1992), in which mobile users are likely to query information relating to their current positions, leading to the need for LBS. Such services are also termed as location dependent information services (LDIS) in Lee, Lee, Xu, and Zheng (2002). LBS system is the context sensitive systems in a mobile computing environment that consider the user’s location as a significant and dynamic factor affecting the information and services delivered to the users. The major LBS applications include: • Destination guides with maps, driving directions, and real time prompt • Location-based traffic and weather alerts • Wireless advertising and electronic coupons to nearby mobile devices • Movie, theatre and restaurant location and booking • Store locating applications helping users to find the desired services • Telematics-based roadside assistance (e.g., OnStar from General Motors) • Personal content and messaging (Live Chat with friends) • Mobile Yellow Pages provide local information • Information Services (News, Stocks, Sports) • E911: (Wireless carriers provide wireless callers’ numbers and locations.) Generally, LBS services can be classified into three general categories: telematics LBS, Internet LBS, and wireless LBS (Telc). Telematics LBS is the integration of wireless communications, vehicle monitoring systems, and location devices. Telematics LBS applications include automated vehicle location, fleet tracking, online navigation, and emergency assistance. For example, a trucking company can track all their fleet, proactively warn about traffic ahead, and estimate the arrival time. Commercial LBS providers are beginning to offer important management applications that help direct vehicle fleets and ensure optimal usage of key assets. Telematics LBS is a multibillion dollar service industry and is currently the largest segment of the LBS market (Telc). Internet LBS provide Internet users the services relevant to their specified locations. Because they use a user-specified location instead of the user’s current location, no positioning technology is required. For example, one can find turn-by-turn driving direction from one location to another and search for tour information about the destination. These services are targeting applications with stationary users, relatively powerful computers, and reliable network connections. As a result, Internet LBS support sophisticated services, such as local business searching and comparison, trip planning, online virtual tours, and so forth. Wireless LBS deliver location relevant content to cell phones, PDAs, and other wireless devices. Equipped with automated positioning technologies, MUs can query local weather, nearby traffic information, and local businesses close to them. For example, a user can search neighboring post office or coffer shop from the PDA. The wireless LBS market is currently in a nascent stage, but it will potentially become the largest segment of the LBS market. The deployment of third generation (3G) mobile network, which support handsets that are both mobile and location sensitive, will lead to more wireless LBS subscribers and more useful LBS applications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Delire de relation des sensitifs"

1

Peters, O. A. J., and R. H. M. Huijsmans. "Assessing Hydrodynamic Behavior During Offshore Loading and Discharge in the Heavy Marine Transport." In ASME 2011 30th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2011. http://dx.doi.org/10.1115/omae2011-49174.

Full text
Abstract:
Heavy Marine Transport is a well accepted method to move large heavy offshore related floating structures around the world. This type of transport is normally limited to getting from and going to sheltered locations, where loading and discharge operation of these objects are safely carried out in very mild environment. However, there is an increasing demand for loading and discharge at offshore locations; and as these operations are sensitive to environmental criteria, this has consequences for the scheduling issues. Also, with increasing size and weight of offshore structures and the desire t
APA, Harvard, Vancouver, ISO, and other styles
2

Gilles, Ph, S. Courtin, R. Vincent, M. Yescas, and F. Gommez. "Methodology for Numerical Welding Simulation Validation: The Dissimilar Metal Weld Case." In ASME 2013 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/pvp2013-97475.

Full text
Abstract:
Welding processes induce residual stresses and distortion in the welded joint and the connected components. For manufacturing purpose distortion is the main issue and up to now the problem is handled by post weld corrective actions. Welding residual stress fields are not considered at the design stage in French codes and standards. However, it is well known that residual stresses are likely to increase the risks of fatigue or corrosion and may cause failure in brittle materials. Ferritic parts of large components are post-weld heat treated; allowing disregarding the influence of residuals stre
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Delire de relation des sensitifs"

1

Price, Roz. Inclusion of Marginalised Groups in Sensitive Programming in Pakistan. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.090.

Full text
Abstract:
This rapid review focuses on the different variations of discrimination against marginalized groups, with a focus on the effect of intersecting and overlapping inequalities and the different experiences and outcomes they have on the varied groups. It highlights how marginalized groups have been included in interventions addressing issues of discrimination in Pakistan. The review also looks into different change interventions that deliver inclusive outcomes for women, girls and persons with disabilities with a focus on preventing violence against those groups. The review notes that intersecting
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!