Auswahl der wissenschaftlichen Literatur zum Thema „Anti-usurpation“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Anti-usurpation" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Anti-usurpation"
Didukh, Andrii. „The Dawn of Belarusian Independence and the Usurpation of Power by Aleksandr Lukashenko regime“. Ethnic History of European Nations, Nr. 73 (2024): 133–38. http://dx.doi.org/10.17721/2518-1270.2024.73.17.
Der volle Inhalt der QuelleChan. „Rhetorical Reversal and Usurpation: Isaiah 10:5-34 and the Use of Neo-Assyrian Royal Idiom in the Construction of an Anti-Assyrian Theology“. Journal of Biblical Literature 128, Nr. 4 (2009): 717. http://dx.doi.org/10.2307/25610216.
Der volle Inhalt der QuelleConnell, Philip. „Edmund Burke and the First Stuart Revolution“. Journal of British Studies 59, Nr. 3 (Juli 2020): 463–94. http://dx.doi.org/10.1017/jbr.2020.40.
Der volle Inhalt der QuelleKushcheva, Marina V. „NAPOLEON BONAPARTE AND HENRY DE GUISE. CONSTRUCTING AN IMAGE OF THE POWER IN THE AGE OF THE FIRST EMPIRE“. RSUH/RGGU Bulletin. Series Political Sciences. History. International Relations, Nr. 2 (2022): 65–74. http://dx.doi.org/10.28995/2073-6339-2022-2-65-74.
Der volle Inhalt der QuellePhillips, Peter. „A Catholic Community: Shrewsbury. Part II: 1850–1920“. Recusant History 20, Nr. 3 (Mai 1991): 380–402. http://dx.doi.org/10.1017/s0034193200005495.
Der volle Inhalt der QuelleChizhkov, Sergey. „Factors of formation of legal consciousness in Russia in the 18th - first half of the 19th centuries.“ Polylogos 7, Nr. 4 (26) (2023): 0. http://dx.doi.org/10.18254/s258770110029276-5.
Der volle Inhalt der QuelleWHATMORE, RICHARD. „ROUSSEAU AND THE REPRESENTANTS: THE POLITICS OF THE LETTRES ECRITES DE LA MONTAGNE“. Modern Intellectual History 3, Nr. 3 (22.09.2006): 385–413. http://dx.doi.org/10.1017/s1479244306000850.
Der volle Inhalt der QuelleUmeljic, Vladimir. „A paradigm shift in German historiography: In the state of Croatia (1941-1945) there was no genocide against the Serbs?“ Zbornik Matice srpske za drustvene nauke, Nr. 141 (2012): 523–50. http://dx.doi.org/10.2298/zmsdn1241523u.
Der volle Inhalt der QuelleFarinacci-Fernós, Jorge. „Constitutional Courts as Majoritarian Instruments“. ICL Journal 14, Nr. 4 (20.12.2020): 379–97. http://dx.doi.org/10.1515/icl-2020-0014.
Der volle Inhalt der QuelleLupo, Kyle B., Xue Yao, Shambhavi Borde, Jiao Wang, Sandra Torregrosa-Allen, Bennett D. Elzey, Sagar Utturkar, Nadia A. Lanman, MacKenzie McIntosh und Sandro Matosevic. „synNotch-programmed iPSC-derived NK cells usurp TIGIT and CD73 activities for glioblastoma therapy“. Nature Communications 15, Nr. 1 (01.03.2024). http://dx.doi.org/10.1038/s41467-024-46343-3.
Der volle Inhalt der QuelleDissertationen zum Thema "Anti-usurpation"
Tak, Hemlata. „End-to-End Modeling for Speech Spoofing and Deepfake Detection“. Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS104.pdf.
Der volle Inhalt der QuelleVoice biometric systems are being used in various applications for secure user authentication using automatic speaker verification technology. However, these systems are vulnerable to spoofing attacks, which have become even more challenging with recent advances in artificial intelligence algorithms. There is hence a need for more robust, and efficient detection techniques. This thesis proposes novel detection algorithms which are designed to perform reliably in the face of the highest-quality attacks. The first contribution is a non-linear ensemble of sub-band classifiers each of which uses a Gaussian mixture model. Competitive results show that models which learn sub-band specific discriminative information can substantially outperform models trained on full-band signals. Given that deep neural networks are more powerful and can perform both feature extraction and classification, the second contribution is a RawNet2 model. It is an end-to-end (E2E) model which learns features directly from raw waveform. The third contribution includes the first use of graph neural networks (GNNs) with an attention mechanism to model the complex relationship between spoofing cues present in spectral and temporal domains. We propose an E2E spectro-temporal graph attention network called RawGAT-ST. RawGAT-ST model is further extended to an integrated spectro-temporal graph attention network, named AASIST which exploits the relationship between heterogeneous spectral and temporal graphs. Finally, this thesis proposes a novel data augmentation technique called RawBoost and uses a self-supervised, pre-trained speech model as a front-end to improve generalisation in the wild conditions