To see the other types of publications on this topic, follow the link: Good Thief.

Journal articles on the topic 'Good Thief'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Good Thief.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Schrage, E. J. H. "A thief can’t pass good title." Maandblad voor Vermogensrecht 29, no. 9 (2019): 293–303. http://dx.doi.org/10.5553/mvv/157457672019029009001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gilchrist, Susan Fargo. "THE GOOD THIEF IMAGINED AS A PEDDLER." Source: Notes in the History of Art 17, no. 2 (1998): 4–14. http://dx.doi.org/10.1086/sou.17.2.23205597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei, Chenji, Jie Zheng, Lihui Xiong, et al. "Evaluation and Utilization of Nano-Micron Polymer Plug for Heterogeneous Carbonate Reservoir with Thief Zones." Advances in Polymer Technology 2020 (January 12, 2020): 1–7. http://dx.doi.org/10.1155/2020/3498583.

Full text
Abstract:
Thief zones are highly permeable zones in oil reservoirs which affect the performance greatly during water flooding. The most effective way to prevent the invalid circle of thief layer is the injection of high-concentration polymer slugs. In this paper, the plugging effect of nano-micron polymer flooding on the thief zone is studied by experimental and theoretical analysis. The changes of water content and flow resistance were analyzed under different conditions. The result shows that the model presented here has good agreement with the experimental results. The displacement effect is the best when the thief zone is located on the upper part of the reservoir. And the water content will decrease with the increase of flow resistance after nano-micron polymer injection. Besides, the higher the polymer concentration, the more obvious the decrease of water content, and more effective the plugging. This study has provided a quick and reasonable guide in the later adjustment of water flooding development of carbonate reservoirs with thief layers.
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Anzhu, Fachao Shan, Xiao Yang, Jiaqi Li, Chenggang Wang, and Junjian Li. "Thief zone identification and classification in unconsolidated sandstone reservoirs: A field case study." Journal of Petroleum Exploration and Production Technology 11, no. 9 (2021): 3451–62. http://dx.doi.org/10.1007/s13202-021-01239-6.

Full text
Abstract:
AbstractChanneling between injectors and producers leads to bypassed oil left in the reservoir, which is one of most common reasons that wells in mature oil fields experience high water cut after long-term waterflooding. Identification and evaluation of the higher permeable channels (thief zones) are the key to effectively plug these thief zones and improve the conformance of water flood. This study applies three different methods to identify and evaluate the thief zones of a water injection project in North Buzazi Oilfield, a thick-bedded unconsolidated sandstone heavy oil reservoir in Manghestau, Kazakhstan. The thief zones, which evolve as a result of formation erosion and sand production, are identified and classified with respect to four different levels of significance using fuzzy comprehensive evaluation, production/injection profile method and pressure index (PI) methods. Good consistency is observed among the identification results using these methods. Finally, we present two ways to quantitatively evaluate the characteristics of the thief zones using water–oil-ratio as the input, which can be readily applied for future field development design.
APA, Harvard, Vancouver, ISO, and other styles
5

Karczewski, Pantelejmon. "Theological and liturgical significance of troparia of the Beatitudes (Makarismoi) of the Holy Friday Matins." Elpis 24 (2022): 9–13. http://dx.doi.org/10.15290/elpis.2022.24.01.

Full text
Abstract:
On Good Friday matins, after singing the antiphons and before reading the canon, the verses of the Gospel blessings are read, which in liturgical practice begin with the words of the good thief: “Remember me, o Lord, in Your Kingdom”. The phrase of the thief hanging on the Cross sounds special on Good Friday – it is the day on which these words were spoken originally. Special troparions are added to the verses of the blessings, which talk about various aspects of Christ’s passion, mainly through the prism of the thief’s repentance. In the paper, the texts are analyzed taking into account the Greek original and selected translations.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Bingjian, Hamad Najeh, Jim Lantz, Mansoor Ali Rampurawala, Ihsan Gok, and Mohammed Al-Khabbaz. "Detecting Thief Zones in Carbonate Reservoirs by Integrating Borehole Images With Dynamic Measurements: Case Study From the Mauddud Reservoir, North Kuwait." SPE Reservoir Evaluation & Engineering 13, no. 02 (2010): 193–202. http://dx.doi.org/10.2118/116286-pa.

Full text
Abstract:
Summary One of the key issues in creating a good reservoir model in carbonate reservoirs is identifying the horizontal permeability conduits—"thief zones"—if there are any. In the Sabriyah field in Kuwait, dynamic measurements showed evidence of thief zones in the Lower Cretaceous (Albian) Mauddud formation. Early water breakthrough has occurred in some wells. Previous studies indicated that it was very challenging to detect the thinly layered thief zones using conventional openhole logs. This paper describes a method of recognizing the different types of thief zones in the Mauddud carbonate reservoirs using high-resolution image logs with calibration from core and dynamic measurements and by integrating image logs with nuclear magnetic resonance (NMR) and conventional openhole logs. The Mauddud carbonates are Early Albian in age and consist of grainstones, wackstones, and mudstones deposited in a ramp setting. Observations from production logging tools (PLTs) and production data indicated that there are a few thief zones in different levels within the vertical Mauddud sequence. A previous core study shows that the fractures in the Mauddud formation are short (<10 cm) and concentrated in diagenetically cemented layers. The fractured thin layers are believed to be the principal type of thief zone. Another type of thief zone is associated with better-developed vuggy porosity. This study shows that both fractured and vuggy porosity-related types of thief zones can potentially be detected through integration of high-resolution image logs with PLT, NMR, and conventional logs. In addition, methods of estimating fracture permeability and porosity-related permeability based on logs are also proposed. The log-estimated permeability determined using this approach fits better with the production profile and can then be used to evaluate the thief zones in a more quantitative manner.
APA, Harvard, Vancouver, ISO, and other styles
7

Namazi, Majid, Conrad Sanderson, M. A. Newton, and Abdul Sattar. "Surrogate Assisted Optimisation for Travelling Thief Problems." Proceedings of the International Symposium on Combinatorial Search 11, no. 1 (2021): 111–15. http://dx.doi.org/10.1609/socs.v11i1.18542.

Full text
Abstract:
The travelling thief problem (TTP) is a multi-component optimisation problem involving two interdependent NP-hard components: the travelling salesman problem (TSP) and the knapsack problem (KP). Recent state-of-the-art TTP solvers modify the underlying TSP and KP solutions in an iterative and interleaved fashion. The TSP solution (cyclic tour) is typically changed in a deterministic way, while changes to the KP solution typically involve a random search, effectively resulting in a quasi-meandering exploration of the TTP solution space. Once a plateau is reached, the iterative search of the TTP solution space is restarted by using a new initial TSP tour. We propose to make the search more efficient though an adaptive surrogate model (based on a customised form of Support Vector Regression) that learns the characteristics of initial TSP tours that lead to good TTP solutions. The model is used to filter out non-promising initial TSP tours, in effect reducing the amount of time spent to find a good TTP solution. Experiments on a broad range of benchmark TTP instances indicate that the proposed approach filters out a considerable number of non-promising initial tours, at the cost of missing only a small number of the best TTP solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Guittard, Jennifer. "When the Good Object is also a Thief: A Memoir of Adoption." Journal of the American Psychoanalytic Association 70, no. 1 (2022): 39–76. http://dx.doi.org/10.1177/00030651221084598.

Full text
Abstract:
This contemporary Kleinian memoir explores the possible existence of an intrapsychic, adoption-specific preoedipal triad including child, birth mother, and adoptive mother that can shape the emerging mind. As an intrapsychic construct, the adoption triad comes to exist in the infantile mind, requiring that adoptees contend with four additional part-object maternal representations: a villain (bad birth mother), a victim (good birth mother), a rescuer (good adoptive other), and a thief (bad adoptive mother). The psychic complexities of this possible adoption triad are explored, with an eye to how it might illuminate the psychosocial challenges experienced by some adoptees, including dysregulated behavior, rage, dissociation, and shame. To this end, Bion’s ideas regarding presymbolic, nondefensive communication and Winnicott’s understanding of use of the object are invoked. Expanding the preoedipal paradigm of adoption to include the possibility of an intrapsychic, adoption-specific maternal triad can enhance our understanding of the psychology of adoption, as well as highlight the need to consider the ways in which internal objects can exist simultaneously in both dyadic and triadic paradigms.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Wenhao, Xingguo Chen, Yuwei Li, and Cheng Zhu. "Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack–Defense Game." Applied Sciences 14, no. 20 (2024): 9234. http://dx.doi.org/10.3390/app14209234.

Full text
Abstract:
This paper presents a novel multi-dimensional asymmetric game model for network attack–defense decision-making, called “Catch the Cyber Thief”. The model is built upon the concept of partially observable stochastic games (POSG) and is designed to systematically incorporate multi-dimensional asymmetry into network attack–defense problems. The attack agent is called a “thief” who wants to control a key host by exploring the unfamiliar network environment, and the defense agent is called a “police” who needs to catch the opponent before its goal is accomplished. The results indicate that the asymmetry of network attack and defense is not only influenced by attack and defense strategies but also by spatio-temporal factors such as the attacker’s initial position, network topology, and defense lag time. In addition, we have found that there may exist the “attack rhythm,” which makes “how to maintain a good attack rhythm” and “how to generate a robust defense strategy against different attackers” worth exploring. Compared with existing attack–defense game models, our game model can better generate a direct mapping relationship with real elements, enabling us to understand network attack and defense interactions better, recognize security risks, and design defense strategies that can directly serve real-world decision-making.
APA, Harvard, Vancouver, ISO, and other styles
10

Schoot, Henk J. M. "Eucharistic Transformation. Thomas Aquinas’ Adoro Te Devote." Perichoresis 14, no. 2 (2016): 67–79. http://dx.doi.org/10.1515/perc-2016-0011.

Full text
Abstract:
Abstract Originally the Adoro te devote was not a liturgical hymn but a prayer, probably intended by Thomas Aquinas for personal use when attending mass. Quoting the at present most reliable version of the poem, the author studies Adoro te devote from the angle of transformation: poetic, Eucharistic and mystic or eschatological transformation. Structure and form are analysed, and a number of themes discussed: two alternative interpretations of adoration, several concepts of truth intended in the poem, the good thief and doubting Thomas as symbols of moral and spiritual imperfection, and (present and future) living in connection, in union with God.
APA, Harvard, Vancouver, ISO, and other styles
11

Elkatatny, Salaheldin, Hany Gamal, Abdulmalek Ahmed, Pranjal Sarmah, Shiv Sangaru, and Maryam Alohaly. "A Novel Solution for Severe Loss Prevention While Drilling Deep Wells." Sustainability 12, no. 4 (2020): 1339. http://dx.doi.org/10.3390/su12041339.

Full text
Abstract:
The loss of circulation is a big problem in drilling operations. This problem is costly, time-consuming and may lead to a well control situation. Much research has investigated the effectiveness of using different chemicals as lost circulation material (LCM) to stop mud and cement slurry losses. However, there remain many limitations for using such LCM types, especially when it comes to field applications. This paper presents a new high strength lost circulation material (HSLCM) that could effectively be used for managing severe lost circulation cases. The HSLCM could easily be pumped into the thief zone where it forms a gel that solidifies after a setting time to provide sealing between the wellbore and the thief zone. With this technique, the material stops the circulation losses, and hence enhances the well bore stability by reducing the well bore stresses. The HSLCM has a high compressive strength and it has a high acid solubility of around 96%. Because the HSLCM has high tolerance towards contamination, it can be utilized with water-based mud or invert emulsion-drilling fluids, hence providing a wide window of applications with the drilling fluids. In this study, laboratory experiments were conducted to evaluate the rheology, thickening time, compressive strength, and acid solubility of the HSLCM. The results showed good performance for the HSLCM as LCM. In addition, a case field study is presented which shows a successful field treatment for severe losses.
APA, Harvard, Vancouver, ISO, and other styles
12

Putri, Melina Ananda, and Dwi Widi Pratito S. N., SE. M.M. "MENGUNGKAP KEBERHASILAN BAURAN PEMASARAN PADA USAHA KULINER TOKO ROTI." JURNAL STIE SEMARANG (EDISI ELEKTRONIK) 15, no. 3 (2023): 82–94. http://dx.doi.org/10.33747/stiesmg.v15i3.657.

Full text
Abstract:
Thisf researchf isf motivatedf byf thisf periodf off technologicalf advancementf andf competitivef marketf competition, culinaryf businessf peoplef whof want to win the competition must pay attention and implement the right marketing strategy. Onef strategyf thatf isf widelyf usedf byf culinaryf businessf actorsf isf thef marketingf mixf strategyf (Marketingf Mixf Strategy). Basically, thef purposef off establishingf af companyf isf tof seekf thef maximumf possiblef profit. Thisf researchf usesf af qualitativef approach, thef locationf off thef studyf isf atf Galaxyf Bakeryf Ungaranf Bakeryf Jalanf Hos.Cokroaminotof Rukof Alun-Alun Center No.4, Ungaran Village, West Ungaran District, Krajan, Ungaran, Ungaran Bar. District, Semarang Regency, Central Java 50511. Dataf sourcesf usef observation, finterviews, fand fdocumentation. Thef resultsf off thisf studyf are: Galaxyf Bakery Bakery strategy in the form of a variety of products and flavors, affordable prices, strategic locations withf comfortf and goodf service, promotionf on socialf mediaf and wordf of mouthf carried out byf consumersf themselvefs aref able to make potential customers interested in coming and becoming regular customers.
APA, Harvard, Vancouver, ISO, and other styles
13

Oktanugraha, Rifky Fajar, and Salamun Rohman Nudin. "Implementasi Algoritma A* (A Star) dalam Penentuan Rute Terpendek yang Dapat Dilalui Non Player Character pada Game Good Thief." Journal of Informatics and Computer Science (JINACS) 2, no. 01 (2020): 74–85. http://dx.doi.org/10.26740/jinacs.v2n01.p74-85.

Full text
Abstract:
Abstrak—Game merupakan salah satu media dimana didalamnya terdapat sebuah makna dan seiring berjalannya waktu, pengguna akan mengetahui makna yang disampaikan oleh si pembuat game dari game yang dimainkan. Algoritma diperlukan untuk membuat gamelebih menarik. Hal ini berbanding lurus dengan jumlah pengguna, semakin menarik game yang dimainkan, semakin banyak orang yang akan memainkan game tersebut. Algoritma A* (A Star) merupakan algoritma yang digunakan untuk menentukan rute terpendek objek menuju ke tujuan, dengan menghitung harga yang harus dipakai dan mencari harga terkecil yang harus dibayarkan. Pada penelitian ini akan dibuat sebuah game dengan nama Good Thiefdimana game ini bercerita tentang seorang pencuri baik yang dikejar oleh penjaga. Algoritma A*(A Star) akan digunakan untuk menentukan rute terpendek yang dapat dilalui oleh NPC. Algoritma A* (A Star) akan diterapkan di setiap NPC dari Tingkat kesulitan mudah (LV 1) hingga tingkat kesulitan sulit (LV 3) dilakukan beta testing untuk mengetahui apakah game dapat berjalan dengan baik di setiap levelnya, hasil yang didapatkan dari 6 responden yang ikut dalam pengujian game ini cukup memuaskan yaitu sebesar 83,22% 
 
 Kata Kunci— Game, Media, Algoritma, A*(A Star),NPC, Rute Terpendek.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Minghui. "Intelligent Storage Data Classification System Based on the BP Neural Network." Journal of Control Science and Engineering 2022 (June 24, 2022): 1–7. http://dx.doi.org/10.1155/2022/5771148.

Full text
Abstract:
In order to solve the problem of multifeature recognition and classification of many kinds of pests, this study puts forward a method of pest feature classification using the BP neural network. Through the preprocessing of stored grain pest images, five characteristic parameters are obtained and optimized and input into the BP network for training. The experimental results show that sample 3 of flat grain thief and sample 4 of bark beetle are not well recognized. Because these two kinds of pests have small bodies and thin legs, some detailed features are eliminated after image processing, resulting in a low recognition rate. But the overall recognition rate can reach 95%. Conclusion. The experiment has obtained good recognition results. This method is accurate and effective for the classification and recognition of stored grain pests and provides a scientific basis for the scientific decision-making of controlling stored grain pests.
APA, Harvard, Vancouver, ISO, and other styles
15

Ric, Vincent T. Fullitan, F. Mamac Jason, T. Palma Joshua, C. Labastida Jestone, P. Garay Michael, and Danesa S. Rabia Maria. "Automatic Street Lighting Controller with Anti-Theft Alarm." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 5 (2022): 87–91. https://doi.org/10.35940/ijrte.D6613.0110522.

Full text
Abstract:
<strong>Abstract</strong>. In times when security is the topmost priority of every community, the provision of adequate and functional streetlights is deemed necessary as one of the measures to protect life and property. In this study, the researchers designed and constructed a prototype device Automatic Streetlight Controller with anti-theft alarm using a Light-dependent resistor (LDR) and Photodiode &ndash; Infrared LED tandem. This study was conducted to assess the qualitative description, functionality, and level of acceptability regarding the constructed Automatic Streetlight Controller with Anti-theft device in terms of its performance as to device and simulator/trainer, the convenience of use, safety, assembly of parts, and cost. A mixed research design was used that includes both qualitative and quantitative research design. The qualitative description of the device was presented in narrative form and assessed using a focused-group discussion. Quantitative research design is done using quasi-experimental in testing the functionality, trials were made to assess its functionality and descriptive survey method was used to assess the level of acceptability. Probability sampling was also used thru the lottery method to get the two (2) selected groups of respondents: the 3rd year BSIT- Electricity block B students and community barangay officials of Calunasan, Calape, Bohol. T-test was used to test its significance using the 0.05&alpha;. Results have shown that on testing the device has 100% good performance and is rated as it functions well. The acceptability level was rated &ldquo;very high&rdquo; which means highly acceptable by both respondents. Therefore, the device can be used if implanted in existing street lights or newly built ones to improve the condition of our street lights to properly illuminate the streets for an improved security system.
APA, Harvard, Vancouver, ISO, and other styles
16

Sireesha, V. N., and Attada Manasa. "Fingerprint and Iris Biometric Controlled Smart Banking Machine Embedded with GSM Technology for OTP." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44497.

Full text
Abstract:
This project aims to develop a highly secure and user-friendly smart banking machine that integrates fingerprint and iris biometric authentication with GSM technology for OTP (One-Time Password) verification. The system eliminates the need for traditional ATM cards and PINs, replacing them with advanced biometric authentication techniques to enhance security and convenience. The GSM module ensures secure OTP delivery to registered mobile numbers, providing an additional security layer for transactions. Biometrics technology is rapidly progressing and offers attractive opportunities and inventions. In recent years, biometric identification has grown in popularity as a way of private identification in ATM authentication systems. Biometric authentication system is reliable, economical, save time, and has more advantage compare to other like visa cards. The user suspects their password may be stolen or attack by thief then the user changes their password when they expect the password attack by the thief. In order to solve this kind of problem we design biometric authentication system, because biometrics is the science of using human measurements to identify people. Biometric is selective because it has unique characteristics that is no one shares and remain the same over time. In this project, a microcontroller-based prototype of ATM cashbox access system using fingerprint sensor and Iris recognition module is implemented. An Arduino microcontroller developed by Microchip Technology is used in the system. This research, which can increase the speed of money withdrawal almost 3 times fast; could have positive impact on the customer’s satisfaction. Digital security has acquired special importance thanks to vast amount of digital information and therefore the high value that's frequently been attached thereto. Normally we use passwords for security. Effective user authentication applications are crucial to guard information security. In response to the growing number of threats to data security, a good sort of authentication mechanisms is developed. Here we introduce a new security system which uses finger iris recognition system for authentication in ATM networks. Keywords: Biometric security, biometric technology, ATM (Automated Teller Machine), Red-tacton, Point of Sale (POS).
APA, Harvard, Vancouver, ISO, and other styles
17

Zdybek, Przemysław Marcin, and Radosław B. Walczak. "Does the Culture of Honor do well in Poland?" Family Forum 9 (February 27, 2020): 113–30. http://dx.doi.org/10.25167/ff/1289.

Full text
Abstract:
This paper deals with the issue of honor culture in Poland. In a traditional honor culture, honorable men should be sensitive to situations where their honor is defiled. They should also be ready to defend their good name (Cohen and Nisbett, 1997), even if it means using violence. In such a culture women cannot actively defend their honor. The authors checked the gender role differences (both in actor and observer perspective) in attitudes towards honorable behaviors.&#x0D; The paper presents two experiments, analyzed with repeated ANOVA measures. In the first study, which is a replication of the research conducted by Szmajke (1999), men and women (N=156) evaluated a letter written by an "honorable" killer and a "dishonorable" thief (in two gender versions). The second study (N=146) replicated the results of the first one.The results confirm the traditional concept of the culture of honor as a permission for aggression used by men to defend their good name, in the eyes of both women and men. The use of violence by women in an analogues situation is evaluated negatively by both genders. Results shows that the general gender roles in Polish culture of honor keeps men as active user of violence to respond for the provacation. Women are not allowed to active violent defend of their honor.
APA, Harvard, Vancouver, ISO, and other styles
18

Zadorina, Alena O. "Eve, Magdalina, Samaritian... (To the Typology of Female Images in the Novel of L. M. Leonov “Thief”)." Vestnik NSU. Series: History, Philology 20, no. 9 (2021): 108–16. http://dx.doi.org/10.25205/1818-7919-2021-20-9-108-116.

Full text
Abstract:
Purpose. The article presents the results of the analysis of key female images in the novel by L. M. Leonov “Thief”: Masha Dolomanova, Tatiana Vekshina, Zinaida Balueva, Ksenia Babkina – whose fates are united by a typological commonality. The relevance of the study is due to the rethinking of the role of women in the modern world and art, and the formation of heroines, unhappy men in the world of men, in the literature of the 20th century developed, including under the influence of post-revolutionary, post-war reality, under the influence of urbanization.&#x0D; Methodology. The study based on the works devoted to the poetics of motif, image. To achieve the goal, the following tasks were set: determination of artistically significant motives; comparison of plot lines with precedent texts (mostly biblical); explanation of details that clarify the essence of female images. Using the method of motif analysis, identified the main motives involved in creating the storylines of each heroine, and their variants.&#x0D; Results. The motif of violence is highlighted, which is presented in the following allomotives: sexual violence (including deprivation of innocence) – for all heroines, except for Zinaida Balueva; physical violence (beating) – images of Masha Dolomanova, Zinaida Balueva – and suicide (Ksenia Babkina); psychological abuse (like suppression of will, lack of care) – all heroines. Within the framework of the method of structural-typological analysis, female characters were correlated with the poles of the binary opposition between the evil wife and the good wife, ascending to the Holy Scriptures. It was found that, in addition to the motive of violence, which is present in the storyline of each heroine, but conditioned not by the will of the person, but by chance, Leonov’s female characters are united by the motive of temptation, temptation, which allows one to assess their individual position and explain the tragic outcome of life.&#x0D; Conclusion. The female images in the novel “Thief” are comparable with such biblical personalities as Eve, Mary Magdalene, an unnamed Samaritan woman, Tatiana the Martyr. Their fates are determined by the actions or desires of other heroes, which, given the fact that they have not found their own God, ultimately leads to despair and irrevocable death.
APA, Harvard, Vancouver, ISO, and other styles
19

Tuck, Robert. "Fiction of the Ninja." Japanese Language and Literature 59, no. 1 (2025): 43–78. https://doi.org/10.5195/jll.2025.347.

Full text
Abstract:
The claim that the legendary thief Ishikawa Goemon attempted to assassinate the warlord Oda Nobunaga by dripping poison down a thread into the latter’s mouth is a staple of English-language histories of the so-called ‘ninja.’ Despite its widespread circulation in popular histories of Japan, there is good reason to believe that this famous assassination attempt never actually happened. In this article, I trace the Ishikawa Goemon legend through a range of Japanese-language documentary and literary sources, attempting to find a source for the poison-thread tale. I conclude that the story is not only fiction but modern fiction, resulting from a misunderstanding of the climactic scene of a 1962 ninja movie, Shinobi no mono, as depicting an historical event. The poison-thread technique, I also suggest, is not an authentic historical technique at all but a borrowing from a 1925 novel by the mystery writer Edogawa Ranpo. The article concludes by exploring how the poison-thread story managed to circulate unchallenged for more than fifty years, and by offering some observations on the serious methodological flaws of English-language ‘ninja’ histories to date.
APA, Harvard, Vancouver, ISO, and other styles
20

BOUTLAS, GEORGE. "THE SHALLOW WATERS OF EVIL – ARENDT AND KANT." Arhe 21, no. 42 (2024): 111–32. https://doi.org/10.19090/arhe.2024.42.111-132.

Full text
Abstract:
In The Origins of Totalitarianism (1951) Hannah Arendt will introduce a concept of radical evil as an historical appearance of something “we actually have nothing to fall back on in order to understand, a phenomenon that confronts us with its overpowering reality and breaks down all standards we know”. Arendt will not insist on her initial conception of radical evil and in her book Eichmann in Jerusalem a Report on the Banality of Evil (1963), the radical evil will be replaced by the banality of evil. According to this last view “evil is a surface phenomenon, and instead of being radical, it is merely extreme”, is “thought defying,” and that is its “banality.” Only the good has depth and can be radical. Arendt contrasts this banality with her own former conception of radical evil as also with Kant’s conception of radical evil (the latter wrongly in our opinion). In this paper, we will try to show the conceptual closeness between the banality of evil in Arendt and radical evil in Kant, as well as the radicality of good in Arendt as equal to the acquisition of good character in Kant’s Religion. Henry Allison claims that “Kant, by ‘radical evil’, does not mean a particular, especially perverse, form of evil but rather the root or ground of the very possibility of all moral evil.” In Kant, radical evil is deflationed from political and religious empirical elements. The term seems to be an olive branch which Kant offers to the church and the doctrine of original sin which he deconstructs in Religion as meaningless in time while he accepts its limited value in reason (morally). Evil for Kant is something that simply exists in the radix of our choices, as a propensity, the same as good does. Kantian radical evil acquires the banal aspect of evil character. For Kant, Eichmann has an evil heart the same way a thief has it. That’s why it is the Arendtian banality of evil that comes closer to Kantian radical evil. On the other hand, good heart for Kant demands our struggle to acquire it. That’s why the radicality of good in Arendt seems to be on a par with the acquisition of good heart in Kant.
APA, Harvard, Vancouver, ISO, and other styles
21

Bashara, Zainab R., Farqad A. Hadi, and Martin Kasing. "Interpretation of Mud Losses in Carbonates Based on Cuttings Description, Well-Logging, Seismic and Coherency Data." Iraqi Journal of Chemical and Petroleum Engineering 24, no. 4 (2023): 17–30. http://dx.doi.org/10.31699/ijcpe.2023.4.2.

Full text
Abstract:
Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm. The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potential mud losses, resulting in high NPT. This is due to its diagenetic features such as succrosic dolomites and vuggy zones that could act as thief zones. Seismic potential was used for the prediction of the geological related non-productive drilling time in the Hartha interval. The seismic data quality in this interval was good, with geological observations already made. Detailed interpretation and analysis of the Hartha interval were performed and integrated with the existing seismic interpretation, rock properties, and NPT database to calibrate wells with the loss events to the seismic observations.
APA, Harvard, Vancouver, ISO, and other styles
22

Ayu Ariastuti, Putu. "UPACARA NGAJAGA-JAGA DI PURA DALEM DESA ADAT TIYINGAN KECAMATAN PETANG KABUPATEN BADUNG (Perspektif Pendidikan Agama Hindu)." Jurnal Penelitian Agama Hindu 1, no. 2 (2017): 63. http://dx.doi.org/10.25078/jpah.v1i2.217.

Full text
Abstract:
&lt;p&gt;&lt;em&gt;Ngajaga-jaga ceremony is a religious ceremony performed as a sacrifice to Bhuta Kala which aims to get a good life and achieve happiness and harmony. But the difference that is known is very unique is the ceremonial infrastructure used in the ceremony Ngajaga-jagaused the cow, Isused only bone, tail, and to the burned cow, while the meat is made timbungan. Unique infrastructure, there are also other uniqueness that can be seen from the implementation of the Ngajaga-jaga ceremony, the head of the cow is stolen by a citizen, and who stole the head of the cow Is pursued by the sekaa line by using wood tlugtug. When the thief is captured, the thief will ask a ransom of 200 kepeng bucks.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;The problems to be discussed include: (1) How is the procession of Ngajaga-jaga ceremony atDalem Temple, Adat Village Tiyingan, Petang District, Badung Regency? (2) What is the function of Ngajaga-jaga Ceremony atDalem Temple, Adat Village of Tiyingan, Petang District, Badung Regency? (3) What values of Hindu religious education are contained in the Ngajaga-jaga Ceremony at Dalem Temple, Adat Village Tiyingan, Petang District, Badung Regency? This research aims to (1) Know the procession of Ngajaga-jaga ceremony in DalemTemple Adat Tiyingan Village, Petang District, Badung Regency, (2) Understand the function of Ngajaga-jaga ceremony at Dalem TempleAdat Tiyingan Village, Petang Sub-district, Badung Regency 3) Describe the values of Hindu religious education contained in the Ngajaga-jaga ceremony at DalemTemple Adat Tiyingan Village, Petang District Badung Regency. Theories used to analyze the problem are: Structuralism Theory of Ratna, Theory of Functionalism of Kaplan, The Theory of Value of Max Scheler. This type of research is qualitative research. The research location is in Adat Village Tiyingan, while the determination of the informant using purposive sampling technique. The methods used to collect data are: observation, interview, document study, and literature study.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;The results show (1) Ngajaga-jaga ceremonial procession consists of three parts, namely: preparation process, implementation process and final process. (2) The function of the Ngajaga-jaga ceremony are: (1) Religious Function, consisting of 3 parts: Purgatory Function, Function Offering, Nyomya Bhuta Kala Function, (2) Social Function, (3) Educational Function. (3) Educational Values contained in Ngajaga-jaga ceremonies include: (1) Tattwa Education Value, (2) Value of Ethics Education, (3) Value of Educational Ceremony, (4) Value of Aesthetic Education.&lt;/em&gt;&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
23

Farabi, Syeda Farjana, Barna Biswas, Md Imran Sarkar, et al. "Identifying suspicious internet threat exchanges using machine learning algorithms to ensure privacy and cybersecurity in the USA." Journal of Infrastructure, Policy and Development 8, no. 15 (2024): 8848. https://doi.org/10.24294/jipd8848.

Full text
Abstract:
The usage of cybersecurity is growing steadily because it is beneficial to us. When people use cybersecurity, they can easily protect their valuable data. Today, everyone is connected through the internet. It’s much easier for a thief to connect important data through cyber-attacks. Everyone needs cybersecurity to protect their precious personal data and sustainable infrastructure development in data science. However, systems protecting our data using the existing cybersecurity systems is difficult. There are different types of cybersecurity threats. It can be phishing, malware, ransomware, and so on. To prevent these attacks, people need advanced cybersecurity systems. Many software helps to prevent cyber-attacks. However, these are not able to early detect suspicious internet threat exchanges. This research used machine learning models in cybersecurity to enhance threat detection. Reducing cyberattacks internet and enhancing data protection; this system makes it possible to browse anywhere through the internet securely. The Kaggle dataset was collected to build technology to detect untrustworthy online threat exchanges early. To obtain better results and accuracy, a few pre-processing approaches were applied. Feature engineering is applied to the dataset to improve the quality of data. Ultimately, the random forest, gradient boosting, XGBoost, and Light GBM were used to achieve our goal. Random forest obtained 96% accuracy, which is the best and helpful to get a good outcome for the social development in the cybersecurity system.
APA, Harvard, Vancouver, ISO, and other styles
24

Кудрявцева, Ирина Петровна. "PHRASEOLOGICAL UNITS OF MODERN ENGLISH WITH THE COMPONENT “TIME” IN THE FIFTIES-EIGHTIES AMERICAN NOVELS BY IRWIN SHAW." Tomsk state pedagogical university bulletin, no. 3(215) (May 24, 2021): 85–91. http://dx.doi.org/10.23951/1609-624x-2021-3-85-91.

Full text
Abstract:
Введение. Исследуются фразеологические единицы с компонентом time в текстах литературных произведений известного американского писателя Ирвина Шоу (1913–1984). Цель – рассмотреть функционирование фразеологических единиц с компонентом time в англоязычном художественном тексте с помощью семантического и контекстуального анализа. Материал и методы. Материал исследования отбирался в романах: «Acceptable Losses» («Допустимые потери») (1982), «Bread Upon Waters» («Хлеб по водам») (1981), «Beggarman, Thief» («Нищий, вор») (1977), «Voices of a Summer Day» («Голоса летнего дня») (1965), «Lucy Crown» («Люси Краун») (1956), «The Troubled Air» («Растревоженный эфир») (1951). Использовался метод сплошной выборки, фразеологической идентификации и семантического анализа фразеологического значения в контексте. Результаты и обсуждение. Фразеологические единицы современного английского языка с компонентом time можно сгруппировать по семантическому значению. В материале исследования выделяется семь групп со значением: повторяемость (постоянно, часто, иногда), длительность (долго), временной отрезок (ожидание или пустая трата времени), временная точка (благоприятное время), временные отношения (последовательность, своевременность, одновременность), шкала времени (настоящее, прошлое, будущее) и субъективно оцениваемое время (приятное, неприятное). Фразоупотребления встречаются в узуальной и окказиональной форме. Среди прочих были рассмотрены следующие фразеологические единицы для упомянутых фразеосемантических групп: all the time, for the hundredth time, from time to time (повторяемость); half the time, take one’s time (длительность); a waste of time, stall for time, bide one’s time (временной отрезок); in one’s own time (временная точка); one thing at a time, it’s about time, at the same time (временные отношения); for the time being, at the time, for old times’ sake, in good time (шкала времени); have a good time, have a hard time, give smb a rough time (субъективно оцениваемое время). В контекстном употреблении зачастую раскрываются дополнительные оттенки значения фразеологической единицы. Заключение. Делаются наблюдения об особенностях реализации фразеологического значения в контексте. Результаты исследования могут применяться в спецкурсах, семинарах по фразеологической стилистике современного английского языка. Introduction. This article describes the use of phraseological units with the word component “time” on the basis of texts from the literary works of the American writer Irwin Shaw (1913–1984). Aim. To trace the usage of phraseological units with the component “time” in the context of literary texts with the help of semantic and contextual analysis. Material and methods. The research material includes several novels of the author of the fifties and eighties of the twentieth century: “Acceptable Losses” (1982), “Bread Upon Waters” (1981), “Beggarman, Thief” (1977), “Voices of a Summer Day” (1965), “Lucy Crown” (1956), “The Troubled Air” (1951). The method of phraseological semantic analysis was used as well as the method of phraseological identification. Results and discussion. The article considers phraseological contexts in detail concerning their semantics. Set expressions are distinguished by the following meaning: repeatability, duration, time interval, time point, time relations, time scale and subjectively estimated time. Within each group there is an additional separation by differential seme and examples of phraseological units with the discussed meaning. Repeatability (constantly, often, sometimes): all the time, for the hundredth time, from time to time. Duration (long): half the time, take one’s time. Time period (waiting or a waste of time): a waste of time, stall for time, bide one’s time. Time point (favorable time): in one’s own time. Temporary relations (simultaneity, sequence, at the time arranged): one thing at a time, at the same time, it’s about time. Timeline (present, past, future): for the time being, at the time, for old times’ sake, in good time. Subjectively estimated (pleasant or unpleasant): have a good time, have a hard time and give smb a rough time. Conclusion. Phraseological contexts are found in normal and occasional forms. The usage of phraseological units in speech exposes additional shades of meaning. The actual material and conclusions of this work can be applied in teaching special aspects of phraseological stylistics and the use of modern English set expressions in speech.
APA, Harvard, Vancouver, ISO, and other styles
25

Sumari, Arwin Datumaya Wahyudi, Ricky Yulian Adi Pratama, and Odhitya Desta Triswidrananta. "SISTEM PREDIKSI TINGKAT KRIMINALITAS MENGGUNAKAN METODE TRIPLE EXPONENTIAL SMOOTHING: STUDI KASUS PADA POLRES KABUPATEN PROBOLINGGO." JURNAL TEKNIK INFORMATIKA 13, no. 2 (2021): 171–78. http://dx.doi.org/10.15408/jti.v13i2.18128.

Full text
Abstract:
Criminality is all forms of action and conduct that violate the law as well social and religious norms that are detrimental to the society both economically and psychologically. The emergence of verious crime forms with new dimension recently shows that the criminality is always developing. In the effort to reduce the increase of the crime rate, a crime action prediction system is needed to anticipate the future. In this research a crime rate prediction system based in the types of criminal action using Triple Exponential Smoothing (TES) method has been developed, and the prediction accuracy of the system is measured by using Mean Absolute Percentage Error (MAPE) method with a case study on Resort Police of Kabupaten Probolinggo, East Jawa. From the conducted test, obtained results MAPE score of theft by weighting (Curat) type is 7% or Very Accurate prediction criterion. MAPE score for crime action type Others, motor vehicle theft (Curanmor), Destruction, and Fraud are 9.8%, 14.4%, 13.6%, and 16%, or Good prediction criterion. For crime action type Beatings, violent theft (Curas), severe persecution (Anirat), Murder, and Thief each one has MAPE score 23.2%, 31.2%, 21.2%, 33.2%, and 50%, or Reasonable prediction criterion, while MAPE score for Animal Theft is 92% or Inaccurate prediction criterion. In general, the criminality rate prediction system using TES method that has been developed for the case study on Resort Police of Kabupaten Probolinggo obtains MAPE score 28,3% or Reasonable prediction criterion.
APA, Harvard, Vancouver, ISO, and other styles
26

Thomas, W. Robert. "The Conventional Problem with Corporate Sentencing (and One Unconventional Solution)." New Criminal Law Review 24, no. 3 (2021): 397–432. http://dx.doi.org/10.1525/nclr.2021.24.3.397.

Full text
Abstract:
A recent wave of expressive accounts of corporate criminal law operate on the promise that corporate punishment can express a unique form of condemnation not capturable through civil enforcement. Unfortunately, the realities of corporate sentencing have thus far failed to make good on this expressive promise. Viewed in light of existing conventions that imbue meaning into our practices of punishment, corporate sentences rarely impose hard treatment in a manner or degree that these conventions seem to require. Accordingly, standard corporate sanctions turn out to be ill-suited to deliver—and, often, will likely undermine—the stigmatic punch upon which expressive defenses of corporate criminal law depend. A common response to this conventional problem with corporate sentencing has been to propose more, and harsher, corporate punishments. However, this approach overlooks the extent to which corporate punishment derives its stigmatic force from preexisting norms and conventions concerning individual punishment. If trying to improve corporate punishment, then, expressivists might instead seek either to leverage or to dismantle the underlying conventions that give existing sanctions meaning. An example of the former strategy would be to revitalize long-neglected proposals for corporate shaming by adopting a criminal convention currently absent from the corporate space—namely, the pervasive, stigmatic application of epithets like “thief” or “felon.” An example of the latter would be to join criminal justice reformers in targeting conventions that, in recent decades, have enabled increasingly draconian sentencing practices. On this view, dissolving corporate sentencing’s conventional problem may represent a further, incidental benefit of systemic criminal justice reform.
APA, Harvard, Vancouver, ISO, and other styles
27

Jasiūnaitė, Birutė. "Magpie in Lithuanian and Slavic Ethnic Culture." Slavistica Vilnensis 66, no. 1 (2021): 73–84. http://dx.doi.org/10.15388/slavviln.2021.66(1).61.

Full text
Abstract:
The article, based on a variety of ethnolinguistic material, especially folklore texts, aims to reveal the main similarities and differences in the interpretation of the image of the magpie in the ethnic culture of Lithuanians and Slavs. This bird in two traditions, in Lithuanian and in Slavonic, is treated ambivalently, more often negatively. This is due to the peculiarities of the bird’s appearance, and in particular the variegation of its plumage. This characteristic feature in the ethnic culture of many peoples is traditionally associated with evil spirits. Too talkative people, most often women, are compared with this bird. Common is the motive of the thief magpie. The name of the bird in all the languages is feminine, therefore, in both Lithuanian and Slavic mythopoetic texts, the social roles of a peasant woman are attributed to it: a daughter-in-law, a mother, a hostess, a cook, a nanny. Another common feature is the image of a magpie as a sorceress, herald of good or evil news and future events. These functions are associated with the tendency to depict witches and other mythical characters in the form of a magpie. The most striking differences in the interpretation of the magpie are the following ones: it is unusual for Lithuanians to associate the idea of procreation with it, and some Slavs (for example, the Czechs) believe that magpies bring children into the house. Lithuanians are also unaware of some features of the “working” behavior of a magpie, for example, the threshing motive. In their turn, Lithuanians attribute such crafts as shoemaking, brewing, and agriculture to magpies.
APA, Harvard, Vancouver, ISO, and other styles
28

Bailey, Alison. "On Gaslighting and Epistemic Injustice: Editor's Introduction." Hypatia 35, no. 4 (2020): 667–73. http://dx.doi.org/10.1017/hyp.2020.42.

Full text
Abstract:
Social justice demands that we attend carefully to the epistemic terrains we inhabit as well as to the epistemic resources we summon to make our lived experiences tangible to one another. Not all epistemic terrains are hospitable—colonial projects landscaped a good portion of our epistemic terrain long before present generations moved across it. There is no shared epistemic terra firma, no level epistemic common ground where knowers share credibility and where a diversity of hermeneutical resources play together happily. Knowers engage one another on a politically saturated, unlevel knowing field where members of dominant groups work to forcibly maintain their epistemic home-terrain advantage. I use the metaphor of the unlevel knowing field to capture these oppressive epistemic structures. The unlevel knowing field is a hungry place where all knowledge that fails to nurture and sustain dominant ways knowing risks being dragged onto the dominator's epistemic home turf to be mined, coopted, consumed, or destroyed. Knowledge and willful ignorance circulate with equal vigor in this hungry world. From the standpoint of oppressed/resisting peoples, the unlevel knowing field is a minefield, an epistemic twilight zone, which must be traversed with considerable care and endless attention. The harms epistemic injustice produces are not disembodied harms. Repeated acts of injustice (epistemic or otherwise) weather our bodies, dull our minds, weaken our hearts, and traumatize the spirit of our communities. They create public-health precarities and invite mental, emotional, physical, and spiritual illness into our being. Epistemic oppression is a cruel thief. It is disorienting, exhausting, and deadly. It triggers anger, anxiety, depression, and resistance. It steals our time, energy, and attention away from more beautiful things.
APA, Harvard, Vancouver, ISO, and other styles
29

Semenova, Olena. "GENRE-STYLISTIC AND COMMUNICATIVE-PRAGMATIC SPECIFICITY OF THE FRENCH DETECTIVE STORY." Naukovì zapiski Nacìonalʹnogo unìversitetu «Ostrozʹka akademìâ». Serìâ Fìlologìčna 1, no. 18(86) (2023): 44–47. https://doi.org/10.25264/2519-2558-2023-18(86)-44-47.

Full text
Abstract:
The conceptual standard of the detective genre is the conceptual system of «murder» – «investigation» – «explanation», which organizes the cognitive structure of the detective story. These concepts unfold in the form of scenarios, causing a phased presentation of events, communicative behavior and discursive self-organization of the detective story characters, where the description of the main characters and events occur only at the beginning of the detective story. The following plot compositions, episodes do not distract the reader’s attention from artistic details and allow you to concentrate on the process of intellectual solution. The main character (a detective) undoubtedly has the form of deductive thinking, his other personal qualities are presented quite schematically. The plot of the detective story is based on the conflict of «good» and «evil», and its invariant scheme is implemented by the invariant system of characters «detective» – «thief»– «victim» and has invariant plot components «crime», «investigation», «solution». The dominant genre feature of the detective story is its structural organization. The core of the story is always the intrigue of intellectual investigation, and the information space around the core performs an attributive function. The detective story always resembles direct communication between the author and the reader at the level of complicity in the search for a solution to the crime, speech interaction between the addressee and the addresser. Since the crime is an antisocial act, the communicative purpose of the detective story is to evaluate events and characters from a moral point of view. It has been found that as a result of the analysis of communicative circumstances, the main meaning-forming text component, the main genre components of the detective text are the motive of communication, communicative means, the communicative space, the content of communication. It is confirmed that linguostylistic means and structural components are aimed at keeping the reader’s attention.
APA, Harvard, Vancouver, ISO, and other styles
30

Rismayanti, Ni Putu Devy, and Putu Nuniek Hutnaleontina. "PENGARUH TIME BUDGET PRESSURE, KONFLIK PERAN DAN PEMAHAMAN GOOD GOVERNANCE PADA KINERJA AUDITOR DI INSPEKTORAT PROVINSI BALI." Hita Akuntansi dan Keuangan 1, no. 2 (2020): 454–81. http://dx.doi.org/10.32795/hak.v1i2.992.

Full text
Abstract:
Auditor performance is the work achieved by the auditorf in carrying out his duties based on the responsibilities given to him and becomes one off thef benchmarks in assessing whether thef work done by an auditor is goodf or vice versa. Generally thef decline in auditorf performance occurs due tof several factors such as pressuref and different instructions for completingf thef auditf. This study aims tof determine the time budget pressure, role conflict and comprehension of good governancef towards performance off the auditor in Inspectorate off Balif Province. Thef population off this study were all functional position auditor and all officials off local government affairs in Inspectorate of Bali Province and the samplingf method was using saturated or census sample method. This study used a sample of 56 respondents. Data analysis techniques used in this study is Multiple Linear Regression. Based on thef results off this study, it can be seen thatf timef budget pressure and role conflict have a significant negative effect on auditor performance. While comprehension of good governance has a significant positive effect on auditor performance.
APA, Harvard, Vancouver, ISO, and other styles
31

V, Kavitha. "Cultural principles as expressed in the Murka Nayanar Puranam." International Research Journal of Tamil 4, S-6 (2022): 16–21. http://dx.doi.org/10.34256/irjt22s63.

Full text
Abstract:
Tamil language has a very ancient history among Indian languages. Literatures in the Tamil language are also excellent factors in making that history better. Due to the proliferation of devotional texts in Tamil, the Tamil language is known as the "Language of Devotion". Saiva and Vaishnavism can be traced back to antiquity through the proverb of Tolkappiyar. Shaiva religion were revived by the Pallavas and the Cholas in the sixth century AD. During the reign of Raja Raja Chola, Nambiyandar nambi compiled the Tirupatikas in the Thillai temple into ten editions. He also added his own songs to the eleven editions. Then he added the great legend of the sekkilar and made it twelve times. The native name of the sekkilar is Arunmozhithevar. This is the twelfth edition of "Periyapuranam" composed by him. The name he gave to this book was "Thiruthondar Puranam". The history of vegetarians is proudly called the Great Myth. The coffee tells the story of 63 Nayans with beauty and devotion. Literature in the classical Tamil language is a portrayal of human life. Literature is a good guide to a happy life. There are many rare ideas in the literature about living in that genre. In this age where writing and speaking about individual rights tends to dismantle all of the bundles of fruitful traditions, there is now an increasing need to talk and write a lot about the responsibilities of every human being. There is no point in talking about the rights of those who shirk responsibilities. The number of crimes is likely to decrease only if individual morality is maintained in the federation of society. The fact that theft cannot be eradicated unless the thief is looked after is a testament to the fact that most prisons and prisons will be redundant if everyone in the country is disciplined in their adoption. This article examines family culture thinking, which takes precedence over individual morals, through the myth of the Murkanayanar.
APA, Harvard, Vancouver, ISO, and other styles
32

Anna Szuba-Boroń. "Obraz przestępcy w prozie Sergiusza Piaseckiego." Archives of Criminology, no. XL (September 16, 2018): 535–60. http://dx.doi.org/10.7420/ak2018n.

Full text
Abstract:
Twenty years of personal experience in crime-related field that furthermore inspiredreflection on the reasons of crime made a Polish writer, Sergiusz Piasecki, interestingfor forensic sciences. His life started with a turbulent and difficult childhood, hematured among the turmoil of the Soviet Revolution and joined the guerrillas fightingBolsheviks, finally to graduate from the School of Infantry Cadets in Warsaw and beassigned to the Lithuanian-Belarusian Division in Vilnius. After the Bolshevik War,being a decommissioned soldier, Piasecki painfully experienced life in poverty. Thiswas when he began to earn his sustenance by smuggling. He later entered a few-yearlongcooperation with the 2nd Division of the High Command of the Polish Army andbecame an intelligence agent. In 1926, being unemployed again, he robbed a suburbantrain. In accordance with the law in force, the summary court sentenced him to death.However, the President of the Republic Ignacy Mościcki pardoned Pia secki, exchangingthe penalty to 15 years in prison. Piasecki served 11 years of his sentence in the prisonsof Lida, Nowogódek, Rawicz, Mokotów, Koronowo, and finally in the toughest prisonof the Second Republic – at Święty Krzyż (the Holy Cross) near Kielce. The 20 yearsfrom 1917 to 1937 were the period decisive for the writing realism and thoroughnessof descriptions of the criminal world and presented protagonists, as well as analysesof psychological and social circumstances that lead individuals to the path of crime.Beginning with Piasecki’s first published book Kochanek Wielkiej Niedźwiedzicy (Lover of the Greater Bear, aka Lover of the Ursa Major) whose author enjoyed a quite uniquestatus of criminal prisoner, and which presented the facts of life of smugglers onthe Polish-Soviet fringe in 1922–1924, the precious study of the criminal world wascontinued in the trilogy Jabłuszko, Spojrzę ja w okno, and Nikt nie da nam zbawienia(Apple, Shall I Look into the Window, and No One is to Redeem us). In Żywot człowiekarozbrojonego (Life of the Human Disarmed), the protagonist moves through all the levelsof conflict with the law, and the reader follows the process of his reflections to becomefamiliar with the impact of the external world on the dramatic choices made.The work of Piasecki follows the current of prose keen on social environmentof the 1930s, based on authenticity and autobiographic experience, and whose cog -nitive values result among others from the personal involvement of the author, whocorroborates knowledge based on experience and direct contact. It is a specific typeof participatory observation: a method of researching criminal phenomena wherethe observer is part of the criminal world.The goal of the writer, which he actually frequently emphasised, was the eagernessto share the knowledge on criminals with the society, with the provision thatthe criminal world he portrayed was multidimensional rather than just a separate,specific social group, standing out from among the “normal” people. He also paidspecial attention to the life’s circumstances that can “make” anyone a criminal. It is alsocharacteristic of Piasecki to juxtapose criminals against people who are “mechanically”honest. In examining the writer’s views on crime, such a ploy demolishes the positivistdivision of the society into criminals and decent people. Honest by default, manya decent citizen proves to be a bad man. On the other hand, many derailed outcastsfrom the society are in fact good and truly honest. Some stories presented by Piaseckiare quite precise illustrations of theories in the crime sciences. In his descriptionsof the demimonde of the Minsk thieves, Piasecki described them in terms very closeto those presented by Edward Sutherland in The Professional Thief, a book writtenby a professional thief with Sutherland’s sociological commentary.The history of literature knows many writers whose works were based on the introspectionof their respective authors, and whose content allows delving into the socialreality of a given time and an insightful analysis of criminal personalities, as well as anattempt at defining the factors that influence criminal behaviours. Such a knowledgeof the human/the criminal is especially well articulated in realistic prose (Balzac,Zola, Faulkner, Steinbeck, Marquez, Remarque, Piasecki, Nachalnik, Wiskowski, Mironowicz).Certainly, the belles-lettres play a special role in this context, providinga source of knowledge, especially if by the virtue of the vicissitudes of his or her life andthoughts the author can convey information helpful in explaining and understanding the assessment of the phenomena investigated by criminal sciences.
APA, Harvard, Vancouver, ISO, and other styles
33

Pi, Yi Biao. "Campus Tracking System Based on IoT." Applied Mechanics and Materials 599-601 (August 2014): 1416–19. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1416.

Full text
Abstract:
A new campus tracking system to solve the problem of campus thefts based on IoT is presented in this paper. The data of RFID tags was collected by FRID reader and transmitted over short distance by ZigBee. Then the data was transferred to PC, which was connected to ZigBee coordinator node and transferred to the user or administrator through campus network at last. The user or administrator landed tracking system to select items by the entrance guard system or not. Therefor valuables were ensured in security and the thief would be blocked. If the thief forced the goods out entrance guard system, Beidou navigation chip embedded objects would be opened, and goods would be tracked with the Beidou navigation system. Experimental results show that the system can manage campus valuables intelligently.
APA, Harvard, Vancouver, ISO, and other styles
34

Kechichian, Hamazasasp, and Giuseppe Munarini. "Alcune note sul Sacramento della Penitenza celebrato in rito armeno." Studia Universitatis Babeș-Bolyai Theologia Catholica 68, no. 1-2 (2023): 115–35. http://dx.doi.org/10.24193/theol.cath.2023.06.

Full text
Abstract:
"Some notes regarding the Sacrament of Penance in the Armenian rite. The authors, the first of whom is “vardapet”, or “master priest” of the Armenian Mekhitarist Congregation, the second an Armenian scholar and graduate of the Armenian Academy of San Lazzaro in Venice, intended to present succinctly some characteristics, especially ritual, concerning the Sacrament of Penance or Reconciliation as it is conferred in the Armenian Church. Passages of Scripture are cited in which the Saviour gives the Church the potestas to grant forgiveness to the faithful. Reference is made to various situations present in Sacred Scripture and to the magnanimity of the Saviour who grants forgiveness, for example the forgiveness of the Good Thief who recognizes his own sins and turns, aware of his life as a sinner, to the Saviour, who suffered for us on the Cross, in order to be “remembered” in the Kingdom of Heaven. And Jesus assures him that he would be with Him in paradise. The authors emphasize the importance of profound change, called “change of mentality” or “metanoia”. After some historical remarks, the authors make references to the Liturgy and the Scripture in order to help the reader to meditate on the great gift of forgiveness, one of the greatest given by the Saviour before ascending to heaven and leaving us not alone, but in the shadow of his merciful love. There is also no lack, even if offered in a succinct way, of references to other traditions in which the faithful, recognizing their sins, turn to God for his forgiveness. Among the characters mentioned in these pages, Manasses cannot be missing, he who changed his mentality to get closer to God, while recognizing the serious sins he has committed. In the appendix there are some passages, including that of the ARJAKUMN (ABSOLUTION), which help us to understand the state of sin and the longing to escape from a road that leads to death, also because we have allowed ourselves to be enchanted by the one who, in many Eastern traditions, is not even mentioned, that is, Satan. Among the various prayers, the recognition of involuntary sins is also striking, a recognition that the faithful make before the priest pronounces the words of absolution. Among the authors mentioned, Saint Nersès the Gracious, Patriarch of the Armenians (1102-1173), is particularly remembered. Keywords: sin, penance, confession, Sacrament, tradition, forgivenes, absolution."
APA, Harvard, Vancouver, ISO, and other styles
35

Hachabizwa, Caswell, Mickey Banda, Joseph Hainza, Sikhanyiso Mutemwa, Krikor Erzingastian, and Elliot Kafumukache. "Cadaveric embalming using a modified Thiel method as an alternative to the formalin method." Anatomy Journal of Africa 9, no. 2 (2020): 1797–806. http://dx.doi.org/10.4314/aja.v9i2.199945.

Full text
Abstract:
Formalin embalming method is cheaper and commonly used. Thiel method is said to be complex, expensive, not commonly used but offers better cadavers for student teaching. The study aimed at exploring the effects of two embalming methods; modified Thiel and formalin methods on cadavers in terms of muscle softness, joint flexibility, tissue colour, formalin smell and the ease with which structures can be identified. This was an experimental study design done over the period of three months where four adult male cadavers were embalmed (two under each method) and the outcome was compared. Using gravity about Ten Litres of arterial and five Litres venous Thiel fluids was slowly infused into each Thiel cadaver through the carotid artery and femoral vein respectively and cadavers remained overnight. Thiel cadavers were submerged in the tank containing about 300L of Thiel fluid, covered with a blanket and left for eight weeks. Each formalin cadaver was infused with about 15Litres of 10% formalin using the carotid artery and then wrapped in transparent plastics. Thereafter, cadavers were codified and placed in different rooms where participants examined and dissected some regions starting with Thiel cadavers and crossing over to the formalin cadavers after twenty-four hours. Thiel cadavers were softer than formalin (mean = 4.89 ± 0.53 Thiel and 2.1 ± 1.26 for formalin). For joint flexibility, at least 75% of participants strongly agreed for Thiel and at least 75% of the participants strongly disagreed for formalin (mean = 4.81 ± 0.86 Thiel and 1.71 ± 1.13 formalin). Tissue colour was closer to natural in Thiel compared to the formalin cadavers (mean = 4.82 ± 0.55 Thiel and 1.77 ± 1.07 formalin). There were no complaints due to irritant formalin smell in Thiel cadavers as opposed to the formalin ones (mean = 1.15 ± 0.55 Thiel and 4.56 ± 1.15 formalin). At least 75% agreed that it was easy to identify structures in the Thiel cadavers than formalin (mean = 4.67 ± 0.61 and 2.61 ± 1.14 formalin). Thiel embalming method offers good quality cadavers that are soft, flexible; tissue colour closer to natural state and without is strong formalin smell and structures can easily be identified.&#x0D; Key words: Cadaveric embalming, modified Thiel, formalin methods
APA, Harvard, Vancouver, ISO, and other styles
36

Van Dung, Chu, N. A. Goryachev, Mai Trong Tu, and Trieu Trung Kien. "Khanh Thien gold-ore-magmatic cluster (North Vietnam)." IOP Conference Series: Earth and Environmental Science 962, no. 1 (2022): 012049. http://dx.doi.org/10.1088/1755-1315/962/1/012049.

Full text
Abstract:
Abstract New data on the gold mineralization related of the Late Paleozoic alkaline complexes of North Vietnam are presented. Two types of gold mineralization associated with syenites and granosyenites have been identified: gold only and gold-polymetallic. Geochemical characteristics are given for both types and the first data on the sulfur isotopic composition of ore minerals.
APA, Harvard, Vancouver, ISO, and other styles
37

Nam, Le Van, Tran Duc Thanh, Nguyen Van Thao, et al. "The first step of application of water quality index (WQI) to assessment of sea water quality in the Gulf of Tonkin in 2018." Tạp chí Khoa học và Công nghệ Biển 20, no. 4B (2021): 171–81. http://dx.doi.org/10.15625/1859-3097/15831.

Full text
Abstract:
The study to calculate the water quality index was conducted in the Gulf of Tonkin at the surface water in August 2018. The calculation results showed that out of 48 surveyed points, there was 1 point in the Northeast area at poor water quality, 15 points in the Northeast and coastal areas from Thanh Hoa to Thua Thien Hue at medium water quality, 14 points in the Gulf of Tonkin, Northeast and Con Co Island at good water quality, the remaining 18 points in the Gulf of Tonkin and Bach Long Vi Island at excellent water quality. Overall, the average water quality of the whole region was good (average WQI = 79). Considering each area, the Gulf of Tonkin area had good and excellent water quality, the Northeast had water quality from poor to good level, the coastal areas from Thanh Hoa to Thua Thien Hue had medium water quality, Con Co Island area had good water quality, Bach Long Vi Island area had excellent water quality.
APA, Harvard, Vancouver, ISO, and other styles
38

Ahmadou, Samba Toure, Sow Djibril, Lamine lo Mamadou, and Hadji Balla Moussa Niakhate El. "Application of the Road Earthmoving Guide to Platform Soils in the Region of Thies: Axises of Thies-Fandene and Thies-Sanghe." Journal of Scientific and Engineering Research 8, no. 7 (2021): 12–17. https://doi.org/10.5281/zenodo.10608513.

Full text
Abstract:
<strong>Abstract</strong> After finding that there is no adequate document concerning road earthworks linked to the non-existence of national standards in Senegal defining the conditions for completion, the purpose of this document is to propose a method of good execution of the upper platform of the earthworks and the layers of form. To do this, a study was carried out on platform soils in the Thi&egrave;s region, which is one of the 14 regions and the second region of Senegal. It is at 72.4 km from Dakar (SENEGAL). Two 2.5 km long roadways have been chosen on Thi&egrave;s to carry out manual surveys on these platform soils, the first axis is in the municipality of Fand&egrave;ne located northeast, at 8 km from the region, the second in the rural municipality of Sangh&eacute; located in the south, at6 km from the region.
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Tianshe, Shouzhi Pu, Bing Chen, and Jingkun Xu. "Electron-donating methoxyl group position effect on properties of diarylethene derivatives having a pyrazole unit." Canadian Journal of Chemistry 85, no. 1 (2007): 12–20. http://dx.doi.org/10.1139/v06-182.

Full text
Abstract:
New types of asymmetrical photochromic diarylethene derivatives having a pyrazole unit, namely 1-[1,3,5-trimethyl-1-pyrazol-4-yl],2-[2-methyl-5-(4-methoxylphenyl)-1-thien-3-yl]perfluorocyclopentene (1a), 1-[1,3,5-trimethylpyrazol-4-yl],2-[2-methyl-5-(3-methoxylphenyl)-1-thien-3-yl] perfluorocyclopentene (2a), 1-[1,3,5-trimethyl-pyrazol-4-yl],2-[2-methyl-5-(2-methoxylphenyl)-1-thien-3-yl]perfluorocyclopentene (3a), and 1-[1,3,5-trimethyl-pyrazol-4-yl],2-[2-methyl-5-phenyl-1-thien-3-yl]perfluorocyclopentene (4a), were synthesized. Their optical and electrochemical properties, such as photochromism, photochromic cyclization–cycloreversion kinetics, and fluorescence and electrochemical properties were investigated in detail. The results show that all of these compounds have good photochromism, high cycloreversion quantum yield, and relatively strong fluorescence. Their cyclization-cycloreversion processes were determined to be zeroth to first order reactions. The oxidations of diarylethenes 1a–4a were initiated at 0.73, 1.11, 0.79, and 1.03 V, respectively. Furthermore, introduction of the electron-donating methoxyl group at different positions of the terminal phenyl ring was found to strongly influence these optical and electrochemical properties.Key words: photochromism, diarylethene, electron-donating group, optical and electrochemical properties.
APA, Harvard, Vancouver, ISO, and other styles
40

Barber, Jill. "‘Stolen Goods’: The Sexual Harassment of Female Servants in West Wales during the Nineteenth Century." Rural History 4, no. 2 (1993): 123–36. http://dx.doi.org/10.1017/s095679330000025x.

Full text
Abstract:
‘How came I to be his property? What right has he in me, but such as a thief may plead to stolen goods?’ cried Pamela, the virtuous servant maid of Richardson's novel. Pamela was written in 1740, but the assumption that masters had sexual rights over their servants cast a long shadow. The questions Pamela raises about powerlessness and ‘worth’ are crucial to understanding the plight of female servants in the nineteenth century. This study examines why servants were particularly vulnerable to sexual harassment, the consequences of sexual abuse for victims and offenders, and underlying male attitudes which affected both the incidence of assaults and the justice meted out by the courts.
APA, Harvard, Vancouver, ISO, and other styles
41

Adiyatma, Septhian Eka, Naufal Giri Purwoko, Finna Maessy Pangestika, and Dewi Kandiati. "Society and Law Enforcement Personnel in Trading Stolen Goods." Law Research Review Quarterly 6, no. 2 (2020): 101–16. http://dx.doi.org/10.15294/lrrq.v6i2.31107.

Full text
Abstract:
The existence of violating public order, as well as violation activities in accordance with article 480 of the Criminal Code are the characteristics of Kokrosono traders. The provisions of the article refer to criminal relief measures in terms of helping perpetrators of theft crimes obtain benefits from the results of their actions. The uniqueness of merchandise on Jalan Madukoro is that some traded goods are stolen goods. Capital of confidence in the thief makes the stock of stolen goods from the perpetrators of theft is always there. In this case, thieves and stolen merchants can automatically be subject to criminal penalties because there is an intentional element in them, different from the buyer who must be investigated first. This behavior can only be overcome with two channels, namely legal channels and non-legal channels. The legal route leads to regulations related to the detention activities in criminal law and to the extra-legal channels only as countermeasures before the event occurs. Significant differences regarding countermeasures between after and before are in their aftermath.
APA, Harvard, Vancouver, ISO, and other styles
42

Nguyen, Thanh Gia, Nguyen Thanh Dat Hoang, Van Hiep Nguyen, et al. "Awareness regarding self-prevention and response to heatwaves among the residents in several wards and communes in Thua Thien Hue province." Tạp chí Y Dược Huế 15, no. 2 (2025): 186–94. https://doi.org/10.34071/jmp.2025.2.26.

Full text
Abstract:
Background: Heatwaves pose a threat to public health in Vietnam, and unprecedented heatwaves have been recorded in Thua Thien Hue province over recent years. Objective: This study aimed to examine the knowledge, attitudes, and practices (KAP) regarding self-protection and response to heatwaves among residents in some Thua Thien Hue province communes and investigate their associated factors. Materials and methods: A cross-sectional study involving 500 participants was conducted in March 2024. Multivariate logistic regression analysis was utilized to identify the associated factors. Results: Our findings indicated that the prevalence of heat-related illnesses was 24.2%, while chronic diseases accounted for 41.6%. The proportions of residents demonstrating good knowledge, attitudes, and practices regarding self-protection and responses to heatwaves were 92.0%, 61.2%, and 62.2%, respectively. Factors associated with knowledge regarding prevention and responses to heatwaves included age group, educational background, heat-related illnesses, chronic diseases, nature of work, primary cooling methods, and information sources. Attitudes were influenced by profession, area of residence, financial family status, and knowledge. Factors associated with practices included age group, educational background, area of residence, chronic diseases, nature of work, primary cooling methods, information sources, knowledge, and attitudes (p&lt;0.05). Conclusion: A high proportion of participants demonstrated good knowledge. However, attitudes and practices regarding heat prevention measures were relatively low. Our findings could help reframe and communicate Thua Thien Hue’s heat wave plans in the light of climate change
APA, Harvard, Vancouver, ISO, and other styles
43

Agussalim, Agussalim, Muhammad Saleng, Hermansyah Hermansyah, et al. "Healthy Living in Makassar’s Family Based on Thier Faith." Journal of Clinical Case Reports and Studies 3, no. 1 (2022): 01–06. http://dx.doi.org/10.31579/2690-8808/091.

Full text
Abstract:
Various aspects of human life are organized in Muslim community, including health problems. Islam highly upholds the health in which many people are deceived from such health. One of the efforts that can be done to maintain the health given by god is to implement clean and Healthy Living Behavior in families, schools and others. This research was conducted at Mosque of Antang, Makassar. This research was conducted using Cross Sectional design. The sample used as many as 40 respondents; data analysis used is univariate and bivariate with chi-square test. The results of statistical tests of Hand Washing Orders and defecation obtained a value of p Value of 0.000, and Smoking Prohibition obtained a value of p Value of 0.001, the test results showed that there is a relationship between Hand Washing Orders, defecation and Smoking Prohibition with Clean and Healthy Living Behavior, because the calculated value of P &lt; α = 0.05. Based on the research, it can be concluded that Clean and Healthy Living Behavior of Applied Mosque Antang is in the good category. Where they are washing Their Hands, Make Latrines and without Smoking because of the encouragement of faith in their hearts, fear and obedience to the command of God and the magnitude of their love for the Messenger. Therefore, it is expected through this research that the People of Indonesia to further increase faith and following to god and love and practice of the Messenger of God in daily life.
APA, Harvard, Vancouver, ISO, and other styles
44

Anderson, Keith B., Erik Durbin, and Michael A. Salinger. "Identity Theft." Journal of Economic Perspectives 22, no. 2 (2008): 171–92. http://dx.doi.org/10.1257/jep.22.2.171.

Full text
Abstract:
Identity theft is made possible by the nature of modern payment systems. In the modern economy, sellers are willing to offer goods and services to strangers in exchange for a promise to pay, provided the promise is backed up by data that link the buyer to a specific account or credit history. Identity theft involves acquiring enough data about another person to counterfeit this link, enabling the thief to acquire goods while attributing the charge to another person's account. In this article, we discuss what is (and is not) known about the prevalence and cost of identity theft, describe the institutional framework in which identity theft takes place, and consider some of the main policy issues associated with the problem.
APA, Harvard, Vancouver, ISO, and other styles
45

Golubenkova, Alexandra S., Nikita E. Golantsov, Alexey A. Festa, and Leonid G. Voskressensky. "1-Benzyl-2-(thien-2-yl)-4,5-dihydro-1H-imidazole." Molbank 2020, no. 2 (2020): M1137. http://dx.doi.org/10.3390/m1137.

Full text
Abstract:
Imidazolines are a valuable class of organic compounds, namely ligands of imidazoline receptors, chiral ligands for metal catalysis, synthetic intermediates. The title compound has been prepared through a modified procedure, employing N-benzylethylenediamine and thiophene-2-carbaldehyde under the action of N-bromosuccinimide (NBS) in dichloromethane (DCM) in a good 78% yield.
APA, Harvard, Vancouver, ISO, and other styles
46

Luyten, I., L. Jie, A. Van Aerschot, et al. "2′-Deoxyuridines with a 5-Heteroaromatic Substituent: Synthesis and Biological Evaluation." Antiviral Chemistry and Chemotherapy 6, no. 4 (1995): 262–70. http://dx.doi.org/10.1177/095632029500600409.

Full text
Abstract:
A series of novel 2′-deoxyuridines with a thienyl substituent in the 5-position were synthesized as potential anti-HSV-1 agents. The brominated derivatives (1d, 1e and 3b) were obtained via halogenation reactions of the protected 5-(thien-2-yl)-2′-deoxyuridine and 5-(thien-3-yl)-2′-deoxyuridine, respectively. The palladium-catalysed cross-coupling reaction with stannylated thiophene was used for the synthesis of ( E)-5-(2-thienylvinyl)-2′-deoxyuridine and 5-(5,2′-dithien-2-yl)-2′-deoxyuridine. These compounds show moderate to good activity against herpes simplex virus type 1 (HSV-1) in the order of decreasing activity 1d&gt;4&gt;1e&gt;3b∼5. Finally, two substituted 5-isoxazol derivatives of 2′-deoxyuridine (6a and 6b) were obtained via a 1,3-dipolar cycloaddition of the protected 5-ethynyl-2′-deoxyuridine. These new compounds demonstrated poor affinity for the virus-specific enzyme thymidine kinase.
APA, Harvard, Vancouver, ISO, and other styles
47

Dung, Nguyen Thi. "The effectiveness of Topic-Based Writing on EFL Learners’ Writing Skill." Randwick International of Education and Linguistics Science Journal 1, no. 3 (2020): 290–99. http://dx.doi.org/10.47175/rielsj.v1i3.138.

Full text
Abstract:
Being accepted as out of the four essential language skills in the language learning process, writing seems to be difficult for numerous EFL learners. This research is an endeavor to explore if learners can grow out of the writing difficulties with topic-based writing activity. 78 third-year students at the Faculty of Foreign Languages of Phan Thiet University in Phan Thiet City, Binh Thuan Province participated in the study. These students were in the two writing classes, one class was treated as the experimental group (EG) and the other as the control group (CG). Research findings exposed the benefits of topic-based writing activity in nurturing learners' writing motivation and enhancing their writing skill. Furthermore, this activity gave students good chances to widen their knowledge on the topic, enrich their emotion on disadvantaged people, and build a friendly learning environment outside the classroom. The necessity and usefulness of the application of topic-based writing activity was predominantly recognized among students.
APA, Harvard, Vancouver, ISO, and other styles
48

Segun, Olowolabi. "Influence of School Environment on the Academic Performance of Secondary School Students in Akoko South West Local Government Area of Ondo State." Randwick International of Education and Linguistics Science Journal 1, no. 3 (2020): 432–38. http://dx.doi.org/10.47175/rielsj.v1i3.155.

Full text
Abstract:
Being accepted as out of the four essential language skills in the language learning process, writing seems to be difficult for numerous EFL learners. This research is an endeavor to explore if learners can grow out of the writing difficulties with topic-based writing activity. 78 third-year students at the Faculty of Foreign Languages of Phan Thiet University in Phan Thiet City, Binh Thuan Province participated in the study. These students were in the two writing classes, one class was treated as the experimental group (EG) and the other as the control group (CG). Research findings exposed the benefits of topic-based writing activity in nurturing learners' writing motivation and enhancing their writing skill. Furthermore, this activity gave students good chances to widen their knowledge on the topic, enrich their emotion on disadvantaged people, and build a friendly learning environment outside the classroom. The necessity and usefulness of the application of topic-based writing activity was predominantly recognized among students.
APA, Harvard, Vancouver, ISO, and other styles
49

Karpova, Oksana. "Object of offence and circumstances of thefts from warehouses." European Socio-Legal & Humanitarian Studies, no. 3 (March 30, 2025): 88–95. https://doi.org/10.61345/2734-8873.2024.3.7.

Full text
Abstract:
The following components of the forensic characteristics of thefts from warehouses have been investigated: the circumstances of the commission of a criminal offense and the subject of the criminal offense. A forensic classification of warehouses has been developed depending on: the structure of the warehouse building: large, medium, small, separate rooms for storing products, open or covered areas; levels of protection: high, medium level of protection, without protection, the area is not protected; characteristics of the storage conditions of goods: refrigerated, freezer, insulated or heated, with different degrees of humidity (dry, wet); operating mode: 24 hours a day, working hours during the day, working depending on the need for this; location of the warehouse from access roads and settlements: in densely populated cities, in the immediate vicinity of cities, within a five-kilometer zone, in towns and small towns, in villages. The place, time and other components of the circumstances of the theft, their dependence on the object of the unlawful encroachment were investigated. It was established that the circumstances of the commission of a criminal offense are an important element of the forensic characterization, which is closely related to the subject of the criminal offense and the traces left at the crime scene. It is proposed to divide the objects of the unlawful encroachment depending on the method of sale of the stolen goods into: objects intended for further sale; objects intended for their further use in industrial production or the service sector both by the thief himself and by the circle of his relatives, friends, acquaintances; objects used directly by the thief for his own consumption. These elements are decisive for the development of other components of the forensic characterization, namely: methods of committing the offense, trace picture, characteristics of the offender and the injured party.
APA, Harvard, Vancouver, ISO, and other styles
50

PERUMA, RANI, DURAISAMY P, JAYARAMAN C, and MANI S. "RATIONALISED FERTILISER PRESCRIPTION FOR GROUNDNUT BASED ON SOIL TEST CROP RESPONSE STUDIES." Madras Agricultural Journal 75, May June (1988): 164–72. http://dx.doi.org/10.29321/maj.10.a02105.

Full text
Abstract:
Soil Test-Crop Response Studies have been conducted on red soil-Irugur series (Typic Ustorthont) with groundnut-POL 2 as test crop. Fertilizer prescription equations have been developed, test verified on other varieties/on allied soil series. Thef ertiliser prescription equation developed for Irugur senes holds good for association/allied series- Palladam and Somayanur; and also suitable for other variety-Groundnut TMV 7.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography