To see the other types of publications on this topic, follow the link: The Secret Life of Bees.

Journal articles on the topic 'The Secret Life of Bees'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'The Secret Life of Bees.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Benda, William. "The Secret Life of Bees." Journal of Alternative and Complementary Medicine 16, no. 2 (February 2010): 139–40. http://dx.doi.org/10.1089/acm.2009.0431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Castro, Jason. "The Secret Inner Life of Bees." Scientific American Mind 22, no. 6 (December 28, 2011): 18–19. http://dx.doi.org/10.1038/scientificamericanmind0112-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Setri, Teta Irama, and Dwi Budi Setiawan. "Matriarchal Society in The Secret Life of Bees by Sue Monk Kidd." Linguistics and Literature Journal 1, no. 1 (June 29, 2020): 28–33. http://dx.doi.org/10.33365/llj.v1i1.223.

Full text
Abstract:
This research discusses a novel which written by Sue Monk Kidd entitled The Secret Life of Bees. The writers aims to describe the matriarchal society issue that is often regarded as the opposed of patriarchy. This research aims to answer the question how levels of matriarchal society described in the novel The Secret Life of Bees through women characters in the story. This study applies descriptive qualitative method and typically library research. This research applies socio-historical approach in order to look at the relation between literary work and society’s historical elements that happen in the past. At political level, August character shows as the matriarch or the leader in community with important role for overcoming conflict and decision making process. At economical level, it shows that matriarchal society common practice has right and same position in economic affair and giving gift each other to make the economic condition balance. Last, at spiritual and cultural level, it is described that women characters in The Secret Life of Bees believe in feminine divine which is the Black Mary and doing worship for her. In conclusion, The Secret Life of Bees novel clearly depicts matriarchal society based on the theory of Matriarchy by Heide Göettner-Abendroth.Keyword: The Secret Life of Bees, Matriarchy, Matriarchal Society, Levels of Matriarchal Society, Socio-historical Approach
APA, Harvard, Vancouver, ISO, and other styles
4

Pallín López, Carolina. "African-american female stereotyping in The Secret Life of Bees." Epos : Revista de filología, no. 29 (January 1, 2013): 327. http://dx.doi.org/10.5944/epos.29.2013.15198.

Full text
Abstract:
The film that is being analyzed in this article, The Secret Life of Bees, offers a unique piece to work on. This motion picture is based on Sue Monk Kidd’s novel with the same title published in 2003, and was directed by one of the very few African-American women directors, Gina Prince-Bythewood. This story puts forth an unusual depiction of the way African-American women have traditionally been portrayed. One of the key elements that contributes to this rare representation is the «Magical Negro» character in the movie, which has a tradition of being represented by men.The aim of this article is to analyze the way the «Magical Negro» character (August Boatwright) is introduced in The Secret Life of Bees, together with the other female characters (Lily Owens, Rosaleen Daise, June Boatwright and May Boatwright). I will also analyze how these representations contribute or shatter female African-American stereotypes. This film introduces a wide range of icons that go from the illiterate slave to the independent business owner, offering in this way a great piece to examine. This article will constitute an interdisciplinary inquiry which will take into account Gender Studies, Stereotyping, Cultural Studies and African American Studies.El filme que se analiza en este artículo, The Secret Life of Bees, nos ofrece una obra única para examinar. Dicha película está basada en la novela con el mismo título escrita por Sue Monk Kidd, publicada en 2003, y dirigida por una de las pocas directoras afroamericanas, Gina Prince-Bythewood. Esta historia nos muestra una imagen inusual de la mujer afroamericana si se compara con la forma en que tradicionalmente se ha escenificado dicho colectivo. Uno de los elementos clave que contribuye a tal representación es el personaje «Magical Negro» en la película, el cual tradicionalmente ha sido personificado mediante personajes masculinos. El objetivo de este artículo es analizar la forma en que el personaje «Magical Negro» (August Boatwright) es presentado en The Secret Life of Bees junto con el resto de personajes femeninos (Lily Owens, Rosaleen Daise, June Boatwright, May Boatwright). También analizaré las formas en que tales iconos contribuyen o crean una ruptura con respecto a los estereotipos femeninos afroamericanos. Esta cinta muestra una amplia gama de representaciones que van desde la esclava analfabeta hasta la mujer independiente dueña de su propio negocio, ofreciéndonos de esta forma una obra excepcional con la que trabajar. El presente artículo constituye un estudio interdisciplinar que tendrá en cuenta los estudios afroamericanos, de género, de estereotipia y culturales.
APA, Harvard, Vancouver, ISO, and other styles
5

Arifatin, Fais Wahidatul. "STYLISTICS AND FIGURATIVE LANGUAGE IN SUE MONK KIDD’S THE SECRET LIFE OF BEES." Journey (Journal of English Language and Pedagogy) 2, no. 2 (September 21, 2019): 131–45. http://dx.doi.org/10.33503/journey.v2i2.544.

Full text
Abstract:
The goals of this study are to find out kinds of figurative language used by Sue Monk Kidd in his novel, The Secret Life of Bees, to investigate how the artistic effect and linguistic evidence achieved through figurative language and to describe how figurative language supports the theme. The research deals with the use of figurative language in a literary work, novel. Hence, this study contains the figurative language and also Sue Monk Kidd’s stylistics. The Secret Life of Bees was a New York Times bestseller list, it won 2004 book sense book of the year awards, and it was nominated for the orange broadband prize for fiction. This novel also adapted to film directed by Gina Prince-bythewood.
APA, Harvard, Vancouver, ISO, and other styles
6

Zerbe, Kathryn J. "The Secret Life of Secrets: Deleterious Psychosomatic Effects on Patient and Analyst." Journal of the American Psychoanalytic Association 67, no. 1 (February 2019): 185–214. http://dx.doi.org/10.1177/0003065119826624.

Full text
Abstract:
The impact and complex nature of keeping secrets deserves greater scrutiny within psychoanalysis. While the capacity to keep a secret is a developmental achievement that furthers conscious choice and healthy boundary setting between self and others, an individual’s need for privacy must be distinguished from untoward costs of collusion and concealment. Clinical case material shows that not all secrets are unconscious or multilayered, as assumed in most of the psychoanalytic literature. Nonetheless, in these cases deleterious effects to psyche and soma took root. These patients assumed that their secret was irreparably destructive to an essential object relationship; shame, guilt, narcissistic vulnerability, unconscious identification with an injured party, and developmental deficit were other factors found to undergird this mode of pathogenic dissembling. Two clinical examples also demonstrate that embodied countertransference reactions may herald the revelation of a secret in treatment that had been hidden, but in plain view. Secrets appear to exert their profound psychological and physical effects on patient and analyst by biological mechanisms that are as yet poorly understood but are readily observed in clinical practice. Psychoanalysts who keep in conscious awareness both the adaptive value and the potential costs of maintaining the confidences of others over the course of a career are better positioned to assist their patients and themselves in rendering essential self-care.
APA, Harvard, Vancouver, ISO, and other styles
7

Crall, James D., and Ignasi Bartomeus. "The secret life of the “other” bees: Book review of The Solitary Bees: Biology, Evolution, Conservation. Bryan N.Danforth, Robert L.Minckley, and John L.Neff." Evolution 74, no. 9 (August 14, 2020): 2176–79. http://dx.doi.org/10.1111/evo.14067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dressler, Alan, and Louis Abramson. "The Secret Life of Galaxies." Proceedings of the International Astronomical Union 10, S311 (July 2014): 140–45. http://dx.doi.org/10.1017/s1743921315003555.

Full text
Abstract:
AbstractWe have learned much about galaxy evolution since z = 2, and something to even higher redshifts. How can it be that we know so little about! the star formation histories (SFHs) of individual galaxies? Although great progress has been made accumulating huge samples with only rudimentary properties, progress in galaxy evolution means connecting what we've learned to detailed measurements of the life-histories of specific –- not just representative –- systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Rajendran, Jayanthi. "An Affirmation of Black Culture through Revolution of Signs: A New Historicism Insight into Sue Mon Kidd’s The Secret Life of Bees." Scholedge International Journal of Multidisciplinary & Allied Studies ISSN 2394-336X 5, no. 9 (December 9, 2018): 99. http://dx.doi.org/10.19085/journal.sijmas050901.

Full text
Abstract:
<p>The Secret Life of Bees begins with Lily’s encounter of bees in her bedroom. Bees and bee-related objects function as a central symbol and motif in the novel. Apparently, they also signify guidance and demonstrate the power of a female community through a bond of relationship. Signs and symbols study the life within the society which is a part of social, cultural and psychological relation to semiology. And, also this is a girl’s (Lily’s) journey to find the truth about her mother whereby setting the captive nanny Rosaleen free from the bondage and finally out of the cage from the confinement of her father T. Ray. Throughout this novel Lily is in search of truth about her mother and whether her mother loved her or not. Eventually, signs and truth converge at a point in understanding the whole novel in a better perspective. Thus, this paper focuses on applying the signs to the text using semiotic theory and further focus on applying the concept of new historicism to the text in the light of truth which is a matter of interpretation of culture and history through revolution whereby affirming the Black Culture and their identity in white. Reality and courage of the novel are highlighted in the scenario of culture identity.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Maiden, Stephanie L., and Jeff Hardin. "The secret life of α-catenin: Moonlighting in morphogenesis." Journal of Cell Biology 195, no. 4 (November 14, 2011): 543–52. http://dx.doi.org/10.1083/jcb.201103106.

Full text
Abstract:
Cadherin-based intercellular adhesions are important determinants of proper tissue architecture. These adhesions must be both stable and dynamic to maintain tissue integrity as cells undergo morphogenetic movements during development. The role of α-catenin in this process has been vigorously debated due to conflicting in vitro and in vivo evidence regarding its molecular mechanism of action. Recent data supports the classical view that α-catenin facilitates actin attachments at adherens junctions, but also suggests that α-catenin may act as a force transducer, and may have additional roles in the cytoplasm. These multiple functions for α-catenin converge on the regulation of adhesion and may help to explain its stable yet dynamic nature.
APA, Harvard, Vancouver, ISO, and other styles
11

Hauke, Christopher. "Keeping secrets (and deciding what can be told). Individuation, power and the Red book." International Journal of Jungian Studies 3, no. 2 (September 1, 2011): 159–68. http://dx.doi.org/10.1080/19409052.2011.592724.

Full text
Abstract:
Apart from some mentions in Memories, dreams, reflections, the Red book and its contents have been kept from the public for 96 years until its publication in 2009. This delay may have been influenced by the response (especially that from the psychoanalyst Winnicott) to the revelations of Jung's secret inner life in Memories, dreams, reflections. It is ironic that many times Jung refers to the importance of keeping secrets for a sense of self and the promotion of individuation. The discussion centres around two areas of tension: one is that between keeping and revealing secrets, and the other involves keeping the balance between the needs of an information hungry public and the risk of misunderstanding personal psychological material.
APA, Harvard, Vancouver, ISO, and other styles
12

Van Bennekom, Joosje. "Wenzel Jamnitzer’s Centrepiece and the Goldsmith’s Secret." Rijksmuseum Bulletin 66, no. 1 (March 15, 2018): 44–67. http://dx.doi.org/10.52476/trb.9742.

Full text
Abstract:
This article focuses on the ‘Merkelsche Tafelaufsatz’, a large centrepiece made by the Nuremberg-based Wenzel Jamnitzer in 1549. The piece is known for its numerous life casts of small creatures and flowers – real plants and animals placed in a mould with material that was heated, causing the original to be calcined. The void thus created was then filled with silver. Earlier research based on a contemporary French treatise on the subject illustrates how these life casts, especially the animals, could have been made. This article focuses on the casting of the flowers. An experiment recreating the intricate aquilegia in the crowning piece shed light on the casting method the goldsmith and his workshop used to achieve the delicate petals and fragile pistils and stamens. The plants and animals on the centrepiece are identified, and other techniques involved in creating the centrepiece as a whole, are described and examined. The cast ornaments, the paint on some of the life casts and the reinforcement of the main figure are discussed. The article concludes by demonstrating that the dedication cartouche, always thought to have been left empty, must have borne an inscription as some of the letters from it have been reconstructed with analytical techniques.
APA, Harvard, Vancouver, ISO, and other styles
13

Muratova, Altyn, Shara Mazhitaevna Mazhitaуeva, and Bayan Zhumashevna Sarybaeva. "Secret codes in communication and their varieties." Bulletin of Toraighyrov University. Philology series, no. 2,2021 (June 1, 2021): 152–59. http://dx.doi.org/10.48081/jyds8602.

Full text
Abstract:
The article considers the secret means of Kazakh communication and analyzes the purpose and place of using secret means of communication. The types of secret communication, the national characteristics of the phenomenon using examples from works of art are described. It shows that both verbal and non-verbal means of communication take an important place in communication. Based on the semantic analysis of auxiliary means of communication used depending on the worldview and culture, history and lifestyle of each nation, on the basis of language facts the author shows an important place of this phenomenon in the life of each people. Secret language is a phenomenon that exists in a language, but has not been the object of special research, except for one or two statements in the scientific literature. Therefore, our goal is to reveal the nature of the whole phenomenon in language and determine the ways of their transmission.
APA, Harvard, Vancouver, ISO, and other styles
14

Jia, Zhao-Ying, Jie Gu, Bing-Hong Li, Hua-Lei Yin, and Zeng-Bing Chen. "Differential Phase Shift Quantum Secret Sharing Using a Twin Field with Asymmetric Source Intensities." Entropy 23, no. 6 (June 4, 2021): 716. http://dx.doi.org/10.3390/e23060716.

Full text
Abstract:
As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been proposed to break the linear rate-distance boundary. However, this original protocol has a poor performance over channels with asymmetric transmittances. To make it more practical, we present a differential phase shift quantum secret sharing protocol with asymmetric source intensities and give the security proof of our protocol against individual attacks. Taking finite-key effects into account, our asymmetric protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol when the difference in length between Alice’s channel and Bob’s is fixed at 14 km. Moreover, our protocol can provide a high key rate even when the difference is quite large and has great robustness against finite-key effects. Therefore, our work is meaningful for the real-life applications of quantum secret sharing.
APA, Harvard, Vancouver, ISO, and other styles
15

Zakharov, Denis V. "“My Beloved Hal”: Harper Lee's Best Kept Secret." Literature of the Americas, no. 10 (2021): 46–82. http://dx.doi.org/10.22455/2541-7894-2021-10-46-82.

Full text
Abstract:
Writer’s dating life is an important part of his literary work. It either inspires the author to literary feats, or makes him unable to work successfully. The love life of the 1961 Pulitzer Prize winner Nelle Harper Lee has always been a subject of interest for her biographers, since information about it was carefully hidden. Ms. Lee did not give interviews, did not speak publicly, and answered “Hell, no,” for all requests to help create an authorized biography of her. In March 2018, Stuart A. Rose Manuscript, Archives, & Rare Book Library (Atlanta, USA) bought six unique letters by Harper Lee. They were written in the period from 1956 to 1961 and addressed to Harold Gray Caufield, a New York architect, whose biography has not yet attracted the attention of researchers. The author of the article, having read Harper Lee's letters thoughtfully, made his own investigation to uncover littleknown details about Harold Caufield’s personality. What kind of relationship did Nelle and Harold really have? The article reproduces photos of the probable lover of Harper Lee for the first time.
APA, Harvard, Vancouver, ISO, and other styles
16

Philpott, Lloyd Frank. "The Secret Lives of Postnatally Depressed Dads." Boolean: Snapshots of Doctoral Research at University College Cork, no. 2015 (January 1, 2015): 179–82. http://dx.doi.org/10.33178/boolean.2015.37.

Full text
Abstract:
Close your eyes and take a moment to think about postnatal depression (PND). What comes into your mind? What images present themselves? Historically, PND has typically been associated with women. It has also been perceived as a product of biological causes. Consequently, most of the research to date has focused on mothers. However, researchers now conceptualise that PND is also the product of psychosocial causes such as sleep disturbance, relationship conflict and financial strain. It can therefore be presumed that such factors would also impact on the mental health of fathers or male partners in the postnatal period. The study of Paternal Postnatal Depression (PPND) is still in its infancy. However, an understanding of the problem has advanced considerably over the last ten years. The transition and adaptation to fatherhood is considered one of the most acute transformations experienced during a man’s life. The experience is influenced by personal, infant ...
APA, Harvard, Vancouver, ISO, and other styles
17

Jacobsen, Annette V., and James M. Murphy. "The secret life of kinases: insights into non-catalytic signalling functions from pseudokinases." Biochemical Society Transactions 45, no. 3 (June 15, 2017): 665–81. http://dx.doi.org/10.1042/bst20160331.

Full text
Abstract:
Over the past decade, our understanding of the mechanisms by which pseudokinases, which comprise ∼10% of the human and mouse kinomes, mediate signal transduction has advanced rapidly with increasing structural, biochemical, cellular and genetic studies. Pseudokinases are the catalytically defective counterparts of conventional, active protein kinases and have been attributed functions as protein interaction domains acting variously as allosteric modulators of conventional protein kinases and other enzymes, as regulators of protein trafficking or localisation, as hubs to nucleate assembly of signalling complexes, and as transmembrane effectors of such functions. Here, by categorising mammalian pseudokinases based on their known functions, we illustrate the mechanistic diversity among these proteins, which can be viewed as a window into understanding the non-catalytic functions that can be exerted by conventional protein kinases.
APA, Harvard, Vancouver, ISO, and other styles
18

Takeo, Satomi, and R. Scott Hawley. "Rumors of Its Disassembly Have Been Greatly Exaggerated: The Secret Life of the Synaptonemal Complex at the Centromeres." PLoS Genetics 8, no. 6 (June 28, 2012): e1002807. http://dx.doi.org/10.1371/journal.pgen.1002807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Houtkooper, Riekelt H., Carles Cantó, Ronald J. Wanders, and Johan Auwerx. "The Secret Life of NAD+: An Old Metabolite Controlling New Metabolic Signaling Pathways." Endocrine Reviews 31, no. 2 (April 1, 2010): 194–223. http://dx.doi.org/10.1210/er.2009-0026.

Full text
Abstract:
A century after the identification of a coenzymatic activity for NAD+, NAD+ metabolism has come into the spotlight again due to the potential therapeutic relevance of a set of enzymes whose activity is tightly regulated by the balance between the oxidized and reduced forms of this metabolite. In fact, the actions of NAD+ have been extended from being an oxidoreductase cofactor for single enzymatic activities to acting as substrate for a wide range of proteins. These include NAD+-dependent protein deacetylases, poly(ADP-ribose) polymerases, and transcription factors that affect a large array of cellular functions. Through these effects, NAD+ provides a direct link between the cellular redox status and the control of signaling and transcriptional events. Of particular interest within the metabolic/endocrine arena are the recent results, which indicate that the regulation of these NAD+-dependent pathways may have a major contribution to oxidative metabolism and life span extension. In this review, we will provide an integrated view on: 1) the pathways that control NAD+ production and cycling, as well as its cellular compartmentalization; 2) the signaling and transcriptional pathways controlled by NAD+; and 3) novel data that show how modulation of NAD+-producing and -consuming pathways have a major physiological impact and hold promise for the prevention and treatment of metabolic disease.
APA, Harvard, Vancouver, ISO, and other styles
20

Rachewiltz, Igor De. "The Secret History of the Mongols: A Mongolian epic chronicle of the thirteenth century Translated with a historical and philological commentary." Inner Asia 7, no. 1 (2005): 125–32. http://dx.doi.org/10.1163/146481705793647044.

Full text
Abstract:
AbstractThe appearance of this new publication by Igor de Rachewiltz is evidence of the unquenchable interest in the Mongolian medieval literary monument The Secret History of the Mongols. To quote: ‘The real interest of the Secret History lies . . . in its faithful description of the Mongol tribal life in the 12th and 13th centuries’. Why is this text so especially valuable? Firstly, ‘The Secret History stands alone also because it is so close to the events which it relates’ (p. lxiv), and secondly, ‘The Secret History is and remains a true and original Mongol product, unique of its kind, for no other nomadic or seminomadic people has ever created a literary masterpiece like it, in which epic poetry and narrative are so skilfully and indeed artistically blended with fictional and historical accounts’ (p. xxvi). In the present study the author used more than forty translations in different languages. By doing it he pays a tribute to his predecessors: ‘Mostaert’s outstanding contribution’ (p. cxiii), ‘Mostaert’s and Ligeti’s epoch-making studies’ (p. lxxv), ‘Cleaves’ book is nevertheless of paramount importance’ (p. lxxvi) etc. To complete the translation and the commentary, the author used bibliographies, references, and dictionaries, all of which helped him to create a piece of work which revealed different sides of Mongolian life in the period of formation of the Mongolian Empire. For instance, the mentality of the time is revealed through interpretation of various folk motifs. Types of social organisation are revealed by explanation of terms, social positions, ranks and hierarchy, the levels of political organisation, and through analysis of interrelations between social groups and the elite. The present translation is the product of thirty years’ continuous investigation into this difficult text. ‘Over 1,300 primary and secondary sources, as well as monographs and essays in many languages, have been consulted by the author’. One can not disagree with the statement that, despite the longevity of observation and interest in it, the Secret History still remains ‘a true mine of information’.
APA, Harvard, Vancouver, ISO, and other styles
21

Mahmudah, Muhlisatul, and Tri Novita Irawati. "Cryptosystem Polyalphabetic Cipher Application." Jurnal Axioma : Jurnal Matematika dan Pembelajaran 5, no. 1 (January 9, 2020): 11–19. http://dx.doi.org/10.36835/axi.v5i1.539.

Full text
Abstract:
Polyalphabetic cipher cryptosystem is the study of mathematical techniques that related to aspects of information security such as confidentiality, data integrity, authentication and authentication of data origin. With the internet, long distance communication can be done quickly and cheaply. However, the internet is not very secure because it is a public communication medium that can be used by anyone so it is very vulnerable to information tapping. Cryptography has been widely used in life for example banking atm ATMs, account numbers sacrificed, sending secret military messages. By applying polyalphabetic cipher cryptosystems, pins, account numbers and secret messages sent will be more secure and the information will not be easily known. Keywords: polyalphabetic cipher cryptosystem, banking, pin
APA, Harvard, Vancouver, ISO, and other styles
22

Tan, Longdan, Yuliang Lu, Xuehu Yan, Lintao Liu, and Xuan Zhou. "XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes." Multimedia Tools and Applications 79, no. 9-10 (December 9, 2019): 5719–41. http://dx.doi.org/10.1007/s11042-019-08351-0.

Full text
Abstract:
AbstractQuick response (QR) codes are becoming increasingly popular in various areas of life due to the advantages of the error correction capacity, the ability to be scanned quickly and the capacity to contain meaningful content. The distribution of dark and light modules of a QR code looks random, but the content of a code can be decoded by a standard QR reader. Thus, a QR code is often used in combination with visual secret sharing (VSS) to generate meaningful shadows. There may be some losses in the process of distribution and preservation of the shadows. To recover secret images with high quality, it is necessary to consider the scheme’s robustness. However, few studies examine robustness of VSS combined with QR codes. In this paper, we propose a robust (k, n)-threshold XOR-ed VSS (XVSS) scheme based on a QR code with the error correction ability. Compared with OR-ed VSS (OVSS), XVSS can recover the secret image losslessly, and the amount of computation needed is low. Since the standard QR encoder does not check if the padding codewords are correct during the encoding phase, we replace padding codewords by initial shadows shared from the secret image using XVSS to generate QR code shadows. As a result, the shadows can be decoded normally, and their error correction abilities are preserved. Once all the shadows have been collected, the secret image can be recovered losslessly. More importantly, if some conventional image attacks, including rotation, JPEG compression, Gaussian noise, salt-and-pepper noise, cropping, resizing, and even the addition of camera and screen noises are performed on the shadows, the secret image can still be recovered. The experimental results and comparisons demonstrate the effectiveness of our scheme.
APA, Harvard, Vancouver, ISO, and other styles
23

van Wyhe, John. "Mind the gap: did Darwin avoid publishing his theory for many years?" Notes and Records of the Royal Society 61, no. 2 (March 27, 2007): 177–205. http://dx.doi.org/10.1098/rsnr.2006.0171.

Full text
Abstract:
It is widely believed that Charles Darwin avoided publishing his theory of evolution for many years. Many explanations have been proposed to identify Darwin's reasons or motives for doing so. This essay demonstrates that Darwin's delay is a recent historiographical theme for which there is no clear evidence, and indeed is overwhelmingly contradicted by the historical evidence. It is also shown that Darwin's belief in evolution was not a secret before publication. Instead of a man afraid of his secret theory's being revealed to his prejudiced contemporaries, it is demonstrated that Darwin was understandably very busy and began his species book when he had completed work in hand, just as he had intended all along. This essay therefore rewrites a fundamental chapter in the story of Darwin's life and work as usually told.
APA, Harvard, Vancouver, ISO, and other styles
24

Gregg, Richard. "Dar'ia's Secret; or What Happens in Moroz, Krasnyi Nos." Slavic Review 45, no. 1 (1986): 38–48. http://dx.doi.org/10.2307/2497920.

Full text
Abstract:
“One of Nekrasov's very greatest works, the long poem Moroz, Krasnyi Nos, which by virtue of its profound penetration into the life of the peasant and its powerful pictorial and lyrical style transcends almost everything which has been written about the Russian countryside, has yet to be studied [izucheno] in our country.” So wrote Kornei Chukovskii a quarter of a century ago.The critic's complaint was surely exaggerated. After all, one of the century's most eminent Nekrasov scholars, Vladislav E. Evgen'ev-Maksimov, had given the poem his serious and sustained attention, and lesser investigators have in the last fifty years significantly increased our understanding of its metrical, folkloric, and polemical aspects. These critical forays notwithstanding, in a sense Chukovskii's statement holds true to this day. For if it is agreed that what we expect most from criticism is an expanded understanding of what a literary work is about; if, in other words, it is the critic as exegete whom we value most highly (there are of course those who would dispute the premise), then Moroz, Krasnyi Nos has indeed been neglected. For, more than 120 years after its publication a serious hermaneutic study of this famous poem is still wanting.
APA, Harvard, Vancouver, ISO, and other styles
25

Tzontcheva, Anna. "The Secret Life of Fat: What are Fat Cells Doing for the Regulation of Metabolism." Journal of Medical Biochemistry 27, no. 4 (October 1, 2008): 401–8. http://dx.doi.org/10.2478/v10011-008-0023-2.

Full text
Abstract:
The Secret Life of Fat: What are Fat Cells Doing for the Regulation of MetabolismAdipose tissue has long been regarded as an organ the sole purpose of which was to store excess energy as triglycerides, and release energy as free fatty acids, which itself is an essential self-defense system for survival during starvation. This point of view has now changed, fat tissue has emerged as an endocrine and secretory organ affecting more than one metabolic pathway. Its major endocrine function is secreting several hormones, notably leptin and adiponectin. Also, adipose tissue releases adipo-kines involved in inflammation and hemostasis: growth factors (TNFα, transforming growth factor-beta, nerve growth factor, VEGF), cytokines (IL-1β, IL-6, IL-10), chemokines (IL-8), acute-phase proteins (haptoglobin, serum amyloid A) and prothrombotic factor (plasminogen activator inhibitor-1). This review aims to present some of the recent topics of selected adipokine research that may be of particular importance.
APA, Harvard, Vancouver, ISO, and other styles
26

Jeong, Sooyong, Cheolhee Park, Dowon Hong, Changho Seo, and Namsu Jho. "Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems." Security and Communication Networks 2021 (February 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/6680782.

Full text
Abstract:
Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector-Valued Tree Parity Machine (VVTPM), which is a generalized architecture of TPM models and can be more efficient and secure for real-life systems. In terms of efficiency and security, we show that the synchronization time of the VVTPM has the same order as the basic TPM model, and it can be more secure than previous results with the same synaptic depth.
APA, Harvard, Vancouver, ISO, and other styles
27

Choi, Wonsuk, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, and Dong Hoon Lee. "Energy-Aware Key Exchange for Securing Implantable Medical Devices." Security and Communication Networks 2018 (May 14, 2018): 1–16. http://dx.doi.org/10.1155/2018/1809302.

Full text
Abstract:
Implantable medical devices (IMDs) continuously monitor the condition of a patient and directly apply treatments if considered necessary. Because IMDs are highly effective for patients who frequently visit hospitals (e.g., because of chronic illnesses such as diabetes and heart disease), their use is increasing significantly. However, related security concerns have also come to the fore. It has been demonstrated that IMDs can be hacked—the IMD power can be turned off remotely, and abnormally large doses of drugs can be injected into the body. Thus, IMDs may ultimately threaten a patient’s life. In this paper, we propose an energy-aware key exchange protocol for securing IMDs. We utilize synchronous interpulse intervals (IPIs) as the source of a secret key. These IPIs enable IMDs to agree upon a secret key with an external programmer in an authenticated and transparent manner without any key material being exposed either before distribution or during initialization. We demonstrate that it is difficult for adversaries to guess the keys established using our method. In addition, we show that the reduced communication overhead of our method enhances battery life, making the proposed approach more energy-efficient than previous methods.
APA, Harvard, Vancouver, ISO, and other styles
28

Kapaló, James A. "Performing Clandestinity: The Religious Underground, the Secret Police and the Media in Communist Eastern Europe." Journal of the British Association for the Study of Religion (JBASR) 22 (December 15, 2020): 16. http://dx.doi.org/10.18792/jbasr.v22i0.45.

Full text
Abstract:
The Cold War was frequently cast in the West as a religious war, a conflict between Christianity and atheism of the Marxist-materialist kind. Propaganda narratives produced by the opposing sides pitted faith against godlessness or science and progress against superstition and exploitation. The religious underground, which was at the centre of much of this propaganda activity, had both a metaphorical and literal meaning. With the opening of the secret police archives in the region, scholars of religions have been presented with important new sources to understand the relationship between anti-religious propaganda, western projections of religious life under communism and the actual clandestine practices of underground religious groups. Whilst the textual materials found in the archives have been the primary focus of attention for both historians and transitional justice projects, the search for ‘truths’ about the past has largely overlooked the visual and material traces of religion produced by and about religious groups. In this article, I explore the complex intersection of the religious underground and the secret police and how this was reflected in the public media and film during communism. Through an exploration of photographic and filmic representations of religious clandestinity produced by or with the help of the secret police, this article illustrates how such imagery, despite its complicity in the construction of a certain image of the religious underground, nevertheless also reveals aspects of the lived reality, creativity and agency of underground communities. This research is based on the findings of the European Research Council Project, Creative Agency and Religious Minorities: Hidden Galleries in the Secret Police Archives in Central and Eastern Europe (project no. 677355).
APA, Harvard, Vancouver, ISO, and other styles
29

Houston, TF. "The Symbiosis of Acarid Mites, Genus Ctenocolletacarus (Acarina, Acariformes), and Stenotritid Bees, Genus Ctenocolletes (Insecta, Hymenoptera)." Australian Journal of Zoology 35, no. 5 (1987): 459. http://dx.doi.org/10.1071/zo9870459.

Full text
Abstract:
Details of the life history of acarid mites of the genus Ctenocolletacarus have emerged from studies of nests of their hosts, Ctenocolletes albomarginatus and Ce. nicholsoni, and from rearing mites in the laboratory. The mites are closely associated with their hosts at all stages and their complete breeding cycle occurs in the hosts' sealed brood cells. Only the phoretic deutonymph leaves the cells. The mites, like their hosts, are univoltine. One to a few hypopi dismount from nesting females into each new brood cell and rapidly transform through non-mobile tritonymphs to adults of both sexes. Female mites oviposit on the ceiling of the cell during the host larva's early instars, giving rise to hundreds of larvae and then protonymphs by the time the host larva has completed feeding. Protonymphs metamorphose to hypopi once the host larva has defaecated and entered the prepupal phase. Hypopi remain with the dormant prepupa until the following season when they secrete themselves beneath the terga of the newly emerged adult bee. Circumstantial evidence, suggesting that hypopi are transmitted venereally between adult bees, is discussed. Adult, larval and protonymphal mites ingest pollen and the late protonymphal stage invades the faeces of the larval host. Sanitary control is a possible pay-off for the hosts.
APA, Harvard, Vancouver, ISO, and other styles
30

Yarmolinets, V. A. "‘On account of famine, the internment camp has been dissolved, and the countess is starving at home…’. Letters of Vladimir and Elena Nedzelsky to Vera Bunin from the years 1922–1924." Voprosy literatury, no. 5 (November 9, 2019): 257–73. http://dx.doi.org/10.31425/0042-8795-2019-5-257-273.

Full text
Abstract:
The Nedzelsky are telling Vera Bunina about Viktor, the son of their mutual friend, the writer A. Fyodorov: how he has just turned up in Kishinev, having escaped from the ‘red’ Odessa. The letters from Leeds Russian Archive offer an insight into Viktor’s life in Romania, as well as clues to decipher V. Kataev’s story Werther Has Already Been Written [Uzhe napisan Verter], inspired by the Fyodorovs’ tragic family history. Another theme is related to V. Nedzelsky’s confession of his secret passion for another woman and his desperate efforts to negotiate humanitarian aid (a Hoover food parcel) to save his starving beloved from death. This information can substantially enrich the biographies of the two remarkable Russian female scientists.
APA, Harvard, Vancouver, ISO, and other styles
31

Nuryanto, Carto. "RECONSTRUCTION OF THE CRIMINAL SANCTION POLICY AND ACTION (DOUBLE TRACK SYSTEM) IN LAW ENFORCEMENT FOR NARCOTIC CRIME PREVENTION REFFERED TO RELIGIOUS JUSTICE." Jurnal Pembaharuan Hukum 5, no. 3 (December 11, 2018): 339. http://dx.doi.org/10.26532/jph.v5i3.3756.

Full text
Abstract:
Narcotics abuse is a dangerous problem that can impede the progress of the Indonesian nation in implementing development in every sector of life. Where we know that Indonesia in the decade of the '70s had not yet become a lucrative area for drug marketing. At that time, this country is only a transit area for illicit goods to be shipped to Australia or to other Asia Pacific countries. But two decades later, Indonesia has become a lucrative market for the drug dealers. Even touted to be producers of goods that can make sense of hovering it. The problems faced today are related to the drug is that North Sumatra ranked third after Jakarta and East Kalimantan in the rate of drug users. Setting up a rehabilitation center for criminals, especially drug is a solution. They need the healing process of the illicit drug dependence. Jail is not the best solution for this problem, hold but also perform medical therapy before going to work and we call it “double track system”. It's no secret that many drug users in Penitentiary but still drug dependence. This is because they just physically restrained but the disease has not been cured. They need treatment that has not been achieved. It's no secret that many drug users in Penitentiary but still drug dependence. This is because they just physically restrained but the disease has not been cured. They need treatment that has not been achieved. It's no secret that many drug users in Penitentiary but still drug dependence. This is because they just physically restrained but the disease has not been cured. They need treatment that has not been achieved.
APA, Harvard, Vancouver, ISO, and other styles
32

Yimer, Ali Hussien. "Challenging the Challenges of E-Government." International Journal of Digital Strategy, Governance, and Business Transformation 11, no. 1 (January 2021): 1–12. http://dx.doi.org/10.4018/ijdsgbt.286772.

Full text
Abstract:
Information and Communication Technologies advancement is influencing life-style. Making human being involved in the evolution of the life process, information and communication technology has been changing changes every activities. Societies are significantly reacting to events and activities locally and globally. This situation transfers the world society to a networked mood of life. The more a society utilizes technology, the more the secret of world is understood. When revising many kinds of literature about e-government implementation, the researcher found most journal articles and books analyze successions or failures of e-government. This paper is different in that it forwards some possible ways to overcome and solve problems that implementation of e-government. Even though revising successes and failures of e-government projects is important to get experiences, thinking over how to avoid those challenges is more fruitful when adopting e-government applications.
APA, Harvard, Vancouver, ISO, and other styles
33

Nakajima, Tatsuhiro. "Ecopsychology of Demeter and Persephone: from ancient life of Eleusinian mystery to postmodern biopolitics of Fukushima nuclear disaster." International Journal of Jungian Studies 7, no. 3 (September 2, 2015): 194–205. http://dx.doi.org/10.1080/19409052.2015.1051568.

Full text
Abstract:
When reading the mythology of Persephone, Demeter, and Artemis from the perspective of ecopsychology, the meanings of natural disasters like the 2011 Japan Earthquake, followed by the Fukushima Nuclear Power Plant Disaster, are revealed in depth. The mythology of Persephone and Demeter provides an idea of the object relation between an individual life (bios) and life in general (zoë). Harold F. Searles analyzed the relation between environmental crisis and technology. The problem of externalization of developmental anxiety of the paranoid-schizoid position has been pointed out by Carl Jung, Wolfgang Giegerich, and Brigitte Egger in terms of unconscious acting out of mythology. In the history of science, epistemology of the notion of nature has been centered around the aphorism of Heraclitus: ‘Nature loves to hide’. As Jung presented an idea of psychoid unconscious, we need to find the secret of nature within the mystery of being.
APA, Harvard, Vancouver, ISO, and other styles
34

Walters, William. "Everyday secrecy: Oral history and the social life of a top-secret weapons research establishment during the Cold War." Security Dialogue 51, no. 1 (December 9, 2019): 60–76. http://dx.doi.org/10.1177/0967010619887850.

Full text
Abstract:
Despite the welcome turn within security studies towards a more material- and practice-oriented understanding of state secrecy, the ways in which security actors experience, practise and negotiate secrecy in their everyday work lives has been rather overlooked. To counter this neglect the article calls for attention to everyday secrecy. Focusing on a former top-secret weapons research facility in the UK called Orford Ness, it uses oral history to give an account of ex-employees’ memories, experiences and practices concerning secrecy. Such a focus reveals that subjects make sense of procedures and rules of secrecy in ways that are sometimes surprising and unexpected. Ultimately this perspective emphasizes that secrecy is not just what governments and organizations prescribe and proscribe; it is also shaped by subjects who negotiate these rules. Everyday secrecy matters: as a perspective it shows that secrecy is not simply imposed by states and organizations from ‘above’; it is also made from ‘below’, albeit very asymmetrically.
APA, Harvard, Vancouver, ISO, and other styles
35

Barisic, Lara Spalldi, and Taib Delic. "Facts and Doubts about the Beginning of Human Life and Personality." Donald School Journal of Ultrasound in Obstetrics and Gynecology 10, no. 3 (2016): 205–13. http://dx.doi.org/10.5005/jp-journals-10009-1470.

Full text
Abstract:
ABSTRACT Scientists have been negligent in failing to translate science into the terms that allow mankind to share their excitement of discovering life before birth. In spite of remarkable scientific development, man's curiosity, and speculations dating back to Hippocrates, life before birth still remains a big secret. Various kinds of intellectuals were involved in trying to offer their contribution to solve the human life puzzle. Their leading idea is that each newborn child will reach its full potential if its development in uterus is not exposed to any adverse influence, providing the best possible environment for the embryo/fetus. Considering the embryo/fetus, we should always keep in mind the amazing aspect of human life where the mother and the embryo/fetus, although linked in the most intimate relationships, are at all times two separate people. Considering the embryo/fetus as the person opened a new set of questions about its personality and human rights. Today, scientific data and hypotheses, philosophical thought, and issues in the humanities have become a necessity in order to deal with ethical, juridical, and social problems arising from man's interference in many aspects and stages of life. How to cite this article Kurjak A, Spalldi Barisic L, Delic T, Porovic S, Stanojevic M. Facts and Doubts about the Beginning of Human Life and Personality. Donald School J Ultrasound Obstet Gynecol 2016;10(3):205-213.
APA, Harvard, Vancouver, ISO, and other styles
36

Vaskiv, Mykola. "Authors of Ukrainian Travel Essays of 1920s – 1930s as Secret Agents and Spies." Слово і Час, no. 5 (May 29, 2019): 74–81. http://dx.doi.org/10.33608/0236-1477.2019.05.74-81.

Full text
Abstract:
The article deals with the engagement of the Ukrainian authors of travel essays about foreign life to the intelligence and spy activities in different forms, usually for performing the special tasks alongside with observation and making literary notes. Various textual ‘footprints’ in their travel writings prove this fact. In two interwar decades Ukrainian travel writings had a period of rise and rapid development; they were generously financed by publishing houses, editorial boards of the magazines, different state institutions and labor unions. Numerous books by amateur and experienced professional writers, predominantly about their trips around Ukrainian and other Soviet lands, were published in large numbers. Very often the travelers were professional military men, secret agents or followed out the instructions of the special service, openly recognizing it in their books. Not so many, but still a lot of travel writings described what had been seen, heard and read abroad. Crossing the border of the USSR required essential expenses in foreign currency and special permissions; therefore only selected representatives of literature could visit European and Asian countries. This fact makes one suspect them of cooperation with different intelligence institutions. The textual analysis of the books written by S. Holovanivskyi, O. Dosvitnii, K. Kotko, L. Nedolia, V. Polishchuk and others proves that these suspicions are well-grounded. It is evidenced by numerous slips, omissions, reports on rather strange travel routes, repeated meetings abroad with Soviet consular and embassy employees, political emigrants, illegal immigrants and left-wing artists. It is obvious that the essayists were the transmitters of secret information in oral form addressed both abroad and backwards, so that it could not be found by any customs officers or counterintelligence agents. It seems that such a secret mission influenced the texts of travel writings, intensifying their anti-Western, ‘anti-capitalist’ orientation and class bias.
APA, Harvard, Vancouver, ISO, and other styles
37

Mendoza, Jaime E., Maram Tolba, and Yasmine Saleh. "Strengthening Marriages in Egypt: Impact of Divorce on Women." Behavioral Sciences 10, no. 1 (December 25, 2019): 14. http://dx.doi.org/10.3390/bs10010014.

Full text
Abstract:
Divorce rates have been increasing around the world, and the Middle East is not immune to this reality. This pilot study investigates the phenomenological experiences of divorce for 20 Egyptian females. The study is qualitative, using in-depth interviews asking 14 questions that address different aspects of struggling marriages and post-divorce life. Five main themes were derived using a conventional approach to content analysis. The themes are: Expectations before marriage, secret life, relational dynamics, mental health, and resilience. Several sub-themes were identified in each category. The themes and subthemes are discussed. What was surprising was that many women experienced a greater sense of resilience and level of empowerment as a result of their post-divorce process. Recommendations for future research are discussed, including a replication of the study with a more stratified sample group and inclusion of men prior to developing any interventions.
APA, Harvard, Vancouver, ISO, and other styles
38

Pattinson, John Patrick. "THE MAN WHO WAS WALTER." Victorian Literature and Culture 30, no. 1 (March 2002): 19–40. http://dx.doi.org/10.1017/s1060150302301025.

Full text
Abstract:
His tall upright figure and quick penetrating glance indicate the man of energy and decision, and those who are most intimately acquainted with him know best that these qualities are combined with a large measure of kindliness and breadth of view, and a readiness to be of use to such as are brought into contact with him in official capacity and in private life. (Biograph 158)IT IS MY PURPOSE to demonstrate that the above paragraph, published in 1880, is a description of the man who wrote My Secret Life, the man who called himself Walter. I shall be very little concerned with literary or psychological analysis. I intend simply to present the process of research which led me to conclude, beyond reasonable doubt, that I have discovered the identity of the author, then to summarize such biographical information as I have been able to obtain from contemporary sources or archival records, and to comment, where necessary, on the correspondences or differences between Walter’s narrative and the real man’s outer life.
APA, Harvard, Vancouver, ISO, and other styles
39

Bartilotti, Cátia, and Antonina Dos Santos. "The secret life of deep-sea shrimps: ecological and evolutionary clues from the larval description of Systellaspis debilis (Caridea: Oplophoridae)." PeerJ 7 (September 18, 2019): e7334. http://dx.doi.org/10.7717/peerj.7334.

Full text
Abstract:
Currently there are 21 shrimp species in the northeastern Atlantic and Mediterranean Sea which are considered to belong to the superfamily Oplophoroidea, but the larval development is unknown for most of them. The complete larval development of Systellaspis debilis (Milne-Edwards, 1881), here described and illustrated, is the first one to have been successfully reared in the laboratory, consisting of four zoeal and one decapodid stages. The zoeae were found to be fully lecithotrophic, which together with the females’ lower fecundity, are probably evolutionary consequences of the species mesopelagic habitat.
APA, Harvard, Vancouver, ISO, and other styles
40

Bejczy, István P. "The sacra infantia in Medieval Hagiography." Studies in Church History 31 (1994): 143–51. http://dx.doi.org/10.1017/s0424208400012845.

Full text
Abstract:
In his De civitate Dei, Augustine stated that anyone who wants to lead a good and Christian life must necessarily have lived in sin in his life up to then. It is quite conceivable that Augustine had his own course of life in mind when writing these words; he never made a secret of his own sinful youth, as is clear from the Confessiones. None the less, his statement is expressed in the form of a general rule.Many medieval saints’ lives seem to accord with Augustine’s statement. The saint repents after a life of sin and henceforth leads a model Christian life until the day of his death. Thus the eventual victory of Christianity over the forces of evil was demonstrated.However, there are also many vitae that follow a different pattern. The saint is sometimes supposed to have been perfect in every respect from childhood onward. He was born a saint rather than becoming one through a process of ‘spiritual maturation’. Stories about such precocious saints have not escaped notice in modern scholarship. Following E. R. Curtius, the phrase puer senex is sometimes used to denote the topos; in hagiography, expressions such as as quasi senex and cor gerens senile are used.
APA, Harvard, Vancouver, ISO, and other styles
41

Nowak, Justyna. "Dlaczego nadal myślę o wojnie?" Politeja 17, no. 2(65) (April 30, 2020): 89–98. http://dx.doi.org/10.12797/politeja.17.2020.65.06.

Full text
Abstract:
Why Am I Still Thinking about World War II? Post-memory Experience of Sacha Batthyany Sacha Batthyany found out that in 1945 his aunt hosted a ball during which 180 Jews were shot by her guests. Their mass grave has not been found until today. She also helped many Nazis escape from Hungary. Sacha’s family kept these stories secret for years. For Sacha, the discovery of his family’s past becomes the beginning of a new life, recognizing the tormenting feeling of guilt as inherited from his ancestors. Can we define the sense of guilt as traumatic? We can certainly try to do it. Yet, trauma assumes different shapes and reveals its huge interpretative potential.
APA, Harvard, Vancouver, ISO, and other styles
42

Bukvic, Rajko. "Reacquaintance with the „irreplaceable ” minister." Zbornik Matice srpske za drustvene nauke, no. 140 (2012): 393–400. http://dx.doi.org/10.2298/zmsdn1240393b.

Full text
Abstract:
The paper considers the renewed interest in the life and work of Arseny Grigorevich Zverev, a long-time people?s commissioner, i.e. the USSR finance minister. The focus is on his secret report prepared for the Prime Minister I. V. Dzugashvili prior to the monetary reform of 1947, one of the most successful reforms in the whole monetary history. Having been published relatively recently in one of the newest historical journals, this report established Zverev as the true author of this reform. At the same time, it presents a brief review of the history of money and monetary systems in Russia, i.e. the USSR, including the monetary reform in the early 1920?s.
APA, Harvard, Vancouver, ISO, and other styles
43

Mustata, Dana. "History in the Backstage of Romanian Television Archives." Making Sense of Digital Sources 1, no. 1 (February 21, 2012): 57. http://dx.doi.org/10.18146/2213-0969.2012.jethc010.

Full text
Abstract:
The historical value of audiovisual archives lies as much in the documented collection they have to offer as in the losses that history has imprinted on them. Controversial material that has been confiscated by the secret police in communist Romania or records of programmes that have been destroyed due to economizing practices of ‘taking the silver out of the pellicle’ are important facts in the history of Romanian television. Equally important for history is the ‘leftover’ material filmed during the Romanian revolution, which now lives in the shadow of the screened footage. Pursuing the life story of an archival institution and understanding its relations with history forms an important preliminary step for the historian in assessing the documented history within the archive.
APA, Harvard, Vancouver, ISO, and other styles
44

Sparrow, Elizabeth. "The Alien Office, 1792–1806." Historical Journal 33, no. 2 (June 1990): 361–84. http://dx.doi.org/10.1017/s0018246x00013376.

Full text
Abstract:
This investigation and my ability to describe alien office structure is due more to chance than prior intention as it arose out of a difficult examination of the life of Thomas Pitt, second Lord Camelford (1775–1804). Lacking direct sources about him, I turned to an examination of his friends and associates and gradually a pattern emerged: an international network of secret agents. But who directed them, and from where? For a time the answer eluded me, and I was not helped by the statement in the guide to the public record office, that no alien office correspondence remains. In fact there is a considerable quantity, but with the exception of H.O. 5, which is entirely alien office, it is scattered in other H.O. classes as well as various F.O., W.O., and A.D.M. classes. But the late Alfred Cobban provided a lead and he had clearly recognized 1792 as a turning point in secret service. Others who have written before on this subject limited themselves to an examination of one of William Wickham's principal agents, Dandré, no doubt chiefly because at the time they wrote, much material that I have been able to consult was not then available to the public; i.e. a large part of the Wickham collection; the Talbot papers and the residue of Lord Grenville's papers.
APA, Harvard, Vancouver, ISO, and other styles
45

Wojnowski, Zbigniew. "De-Stalinization and the Failure of Soviet Identity Building in Kazakhstan." Journal of Contemporary History 52, no. 4 (October 17, 2016): 999–1021. http://dx.doi.org/10.1177/0022009416653457.

Full text
Abstract:
Khrushchev's Secret Speech about Stalinist crimes in February evoked heated public responses in many parts of the USSR. In stark contrast, the momentous changes of 1956 evoked little controversy among inhabitants of Soviet Kazakhstan. De-Stalinization has mostly been studied as a state-led attempt to breathe a new life into communism, or a process in which the regime and its citizens negotiated the meanings of Soviet utopia after the traumas of Stalinism. But the Kazakhstani case suggests that state–society dynamics in 1956 were often shaped not so much by the revolutionary state and the practices of ‘searching for socialism’, but rather by the limited reach of utopian ideas, the weakness of Soviet structures in the provinces, and deep social and ethnic fragmentation.
APA, Harvard, Vancouver, ISO, and other styles
46

Yu. Ivanchenko, Mariia. "The National Specifics of Betrayal Metaphors Actualization in English Language Consciousness." Arab World English Journal, no. 3 (November 15, 2020): 205–20. http://dx.doi.org/10.24093/awej/elt3.18.

Full text
Abstract:
The article deals with metaphors of betrayal in English. The concept of betrayal studied concerning the peculiarities of its national and cultural actualization. The main issue of the work is to identify the principles of knowledge and ideas about the extra lingual reality presentation in English language consciousness. The significance of the study lies in identifying the axiological dominants of the researched concept cognitive structure, its ethnocultural specificity. The research data includes 543 examples naming betrayal inventoried through the complete selection from dictionaries, the thesaurus of English metaphors, fiction texts, etc. The method applied in this research corresponds to the objectives and data. The semantic and contextual analysis provided in lexicographical sources and fiction texts helps sort out the data collected. All examples divided into blocks: to betray- to scam, to deceive, to betray – to reveal the secret, to betray relations, to betray yourself. The analysis showed that betrayal actualized with the verbs, which contain semes to send a beep, to move in space, to remove, to leave, to put something over something, to leave; nouns – somatics; fauna; geographical objects; artifacts; adjectives with the semantic imperfect; adverbs – out, away. The result of the study shows that to respect confidentiality, personal life, ability to keep the secrets, to be honest, decent, to respect private interests are of primary importance for the English. They mostly appreciate loyalty, devotion, reliability, respect, tolerance in human relationships.
APA, Harvard, Vancouver, ISO, and other styles
47

Hwang, Yong-Woon, and Im-Yeong Lee. "A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment." Sensors 20, no. 17 (August 31, 2020): 4934. http://dx.doi.org/10.3390/s20174934.

Full text
Abstract:
Recent developments in cloud computing allow data to be securely shared between users. This can be used to improve the quality of life of patients and medical staff in the Internet of Medical Things (IoMT) environment. However, in the IoMT cloud environment, there are various security threats to the patient’s medical data. As a result, security features such as encryption of collected data and access control by legitimate users are essential. Many studies have been conducted on access control techniques using ciphertext-policy attribute-based encryption (CP-ABE), a form of attribute-based encryption, among various security technologies and studies are underway to apply them to the medical field. However, several problems persist. First, as the secret key does not identify the user, the user may maliciously distribute the secret key and such users cannot be tracked. Second, Attribute-Based Encryption (ABE) increases the size of the ciphertext depending on the number of attributes specified. This wastes cloud storage, and computational times are high when users decrypt. Such users must employ outsourcing servers. Third, a verification process is needed to prove that the results computed on the outsourcing server are properly computed. This paper focuses on the IoMT environment for a study of a CP-ABE-based medical data sharing system with key abuse prevention and verifiable outsourcing in a cloud environment. The proposed scheme can protect the privacy of user data stored in a cloud environment in the IoMT field, and if there is a problem with the secret key delegated by the user, it can trace a user who first delegated the key. This can prevent the key abuse problem. In addition, this scheme reduces the user’s burden when decoding ciphertext and calculates accurate results through a server that supports constant-sized ciphertext output and verifiable outsourcing technology. The goal of this paper is to propose a system that enables patients and medical staff to share medical data safely and efficiently in an IoMT environment.
APA, Harvard, Vancouver, ISO, and other styles
48

Olechowski, Piotr. "Początki działalności Konsulatu Generalnego RP w Kijowie po II wojnie światowej (1947−1949)." Przegląd Wschodnioeuropejski 10, no. 2 (December 30, 2019): 179–92. http://dx.doi.org/10.31648/pw.5472.

Full text
Abstract:
The article is about first period of diplomatic operation of Consulate General of the Republic of Poland in Kyiv after the end of the Second World War. The Consulate, which has been set in 1946, was able to start its work at the beginning of ‘1948 (even though the first Polish diplomatic corps appeared in Kyiv in September the year before). That case shows fully dependence of the Polish Ministry of Foreign Affairs on their Moscow principals. In the article has been described questions of setting-by the Consulate, constructing its staff and their first tasks. What is more, on the grounds of documents of the secret Soviet services’ it has been shown some methods of invigilation the Staff ’s of the Consulate. The Author also described in short the relationships between the Consulate’s personnel and specific of everyday life.
APA, Harvard, Vancouver, ISO, and other styles
49

Khan, Fazal. "Combating Obesity through the Built Environment: Is There a Clear Path to Success?" Journal of Law, Medicine & Ethics 39, no. 3 (2011): 387–93. http://dx.doi.org/10.1111/j.1748-720x.2011.00608.x.

Full text
Abstract:
It is no secret that one of the biggest public health challenges facing this nation is the obesity epidemic. Two-thirds of adults and one-third of children and teens are either obese or overweight. For adults, the number of obese has doubled since 1980, and for children age 6-11 the number of obese has quadrupled. The epidemic has changed what we thought we knew about medicine. For example, until fairly recently, type 2 diabetes was known as “adult-onset” diabetes. But doctors have dropped this moniker as youth account for almost half of new type 2 diabetes in certain communities. Further, there has always been an assumption that life spans and health would improve with advancements in medicine and technology. However, obesity is related to over 20 major chronic diseases, and therefore obese children are more than twice as likely to die before the age of 55 compared to healthy-weight children. In other words, if trends are not reversed, America’s current generation of children are likely to have shorter life spans than their parents.
APA, Harvard, Vancouver, ISO, and other styles
50

Newton, Ronald C. "Ducini, Prominenti, Antifascisti: Italian Fascism and the Italo-Argentine Collectivity, 1922-1945." Americas 51, no. 1 (July 1994): 41–66. http://dx.doi.org/10.2307/1008355.

Full text
Abstract:
One evening in April 1926 a party of Italian emigrants outward bound from Genoa aboard the steamer Conte Verde celebrated their impending new life in Argentina by singing the fascist anthem “Giovinezza.” They thereby angered a larger number of passengers and crew, who responded with a lusty rendition of the Socialist “Bandiera Rossa.” Tension grew, but Conte Verde’s captain averted further unpleasantness by escorting the fascists to safety at the ship's bow; at the same time Second Captain Rivarola restored order among the antifascists. The Genoa police prefecture reported the incident to Benito Mussolini's cabinet, but as the quarrel had been transferred to Argentine soil there was little to be done–for the moment. The secret police would maintain surveillance of the troublemakers in Argentina and of their families in Italy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography