UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 20,048
1.
  • La Polémique D'une Écriture... La Polémique D'une Écriture au Féminin: La Construction de L'identité Féminine dans les Œuvres Littéraires des Écrivaines Francophones de l'Afrique Subsaharienne
    Kourouma, Kelly Michigan academician, 01/2021, Volume: 48, Issue: 1
    Journal Article
    Peer reviewed

    Qu'est-ce qu'une ecriture feminine ? Existe-t-il une ecriture specifiquement feminine ? (l'écriture a-t-elle un sexe ?) Peut-on parler d'une ecriture africaine veritablement feminine ? Ce probleme du ...
Full text
2.
  • The theory of lie: from the... The theory of lie: from the sophists to socrates
    Nesmeyanov, Evgeny; Petrova, Yulia; Abueva, Nazhavat ... SHS Web of Conferences, 2019, Volume: 72
    Journal Article, Conference Proceeding
    Peer reviewed
    Open access

    The last third of the 20th century and the first decade of the 21st century show the growth of scientific and especially, scientific-promotional papers on the problems of the particularities and ...
Full text

PDF
3.
  • La variété des genres et de... La variété des genres et des styles dans Les Voyageurs de l'Impériale d'Aragon: esquisse d'analyse sociologique
    Aron, Paul Contextes (Liège), 12/2016 18
    Journal Article
    Peer reviewed

    The traditional criticism has rarely considered the style of the great novels of Aragon. It has privileged the thematic and narratological approaches of a corpus itself which is not often covered in ...
Full text
4.
  • How good are we at detectin... How good are we at detecting deception? A review of current techniques and theories
    Tredoux, Colin; Nortje, Alicia South African journal of psychology, 12/2019, Volume: 49, Issue: 4
    Journal Article
    Peer reviewed

    The task of discerning truth from untruth has long interested psychologists; however, methods for doing so accurately remain elusive. In this article, we provide an overview and evaluation of methods ...
Full text
5.
  • Computer-Mediated Deception... Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication
    Ho, Shuyuan Mary; Hancock, Jeffrey T.; Booth, Cheryl ... Journal of management information systems, 01/2016, Volume: 33, Issue: 2
    Journal Article
    Peer reviewed

    Computer-mediated deception threatens the security of online users' private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain ...
Full text
6.
Full text

PDF
7.
  • Memory-Based Event-Triggeri... Memory-Based Event-Triggering H∞ Load Frequency Control for Power Systems Under Deception Attacks
    Tian, Engang; Peng, Chen IEEE transactions on cybernetics, 11/2020, Volume: 50, Issue: 11
    Journal Article
    Peer reviewed

    This article proposes a memory-based event-triggering <inline-formula> <tex-math notation="LaTeX">H_{\infty } </tex-math></inline-formula> load frequency control (LFC) method for power systems ...
Full text
8.
  • Intelligent deception techn... Intelligent deception techniques against adversarial attack on the industrial system
    Kumari, Suchi; Yadav, Riteshkumar Jayprakash; Namasudra, Suyel ... International journal of intelligent systems, 20/May , Volume: 36, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Community detection algorithms (CDAs) are aiming to group nodes based on their connections and play an essential role in the complex system analysis. However, for privacy reasons, we may want to ...
Full text
9.
  • Sha Ma Sha Ma
    Qu, Sheng Chinese literature today, 01/2014, Volume: 4, Issue: 1
    Journal Article
    Peer reviewed

    Once a year, at the cremation grounds of the Yi people The firebirds fly into people's expectations, dwelling for a long time The Yi people sit alone Watching the firebirds swim about like clouds ...
Full text
10.
  • Research Article Phishing S... Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
    Jingguo Wang; Herath, T.; Rui Chen ... IEEE transactions on professional communication, 12/2012, Volume: 55, Issue: 4
    Journal Article
    Peer reviewed

    Research problem: Phishing is an email-based scam where a perpetrator camouflages emails to appear as a legitimate request for personal and sensitive information. Research question: How do ...
Full text
1 2 3 4 5
hits: 20,048

Load filters