Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
The Cambridge History of the Mongol Empire
BIRAN and KIM 2023 The Cambridge History of the Mongol Empire 2 vols set2023 •
In the thirteenth and fourteenth centuries Chinggis Khan and his progeny ruled over two-thirds of Eurasia. Connecting East, West, North and South, the Mongols integrated most of the Old World, promoting unprecedented cross-cultural contacts and triggering the reshuffle of religious, ethnic, and geopolitical identities. The Cambridge History of the Mongol Empire studies the Empire holistically in its full Eurasian context, putting the Mongols and their nomadic culture at the center. Written by an international team of more than forty leading scholars, this two-volume set provides an authoritative and multifaceted history of 'the Mongol Moment' (1206–1368) in world history and includes an unprecedented survey of the various sources for its study, textual (written in sisteen languages), archaeological, and visual. This groundbreaking Cambridge History sets a new standard for future study of the Empire. It will serve as the fundamental reference work for those interested in Mongol, Eurasian, and world history. Available at https://www.cambridge.org/gb/universitypress/subjects/history/east-asian-history/cambridge-history-mongol-empire?localeText=GBR+United+Kingdom&locale=en_GB&query=&remember_me=on
2013 •
Suvremena Psihologija
Warning against faking on personality questionnaire: Are warned participants more honest?2014 •
The integration of Blockchain technology with Enterprise Resource Planning (ERP) systems presents a novel approach to enhancing organizational data security, transparency, and operational efficiency. This research navigates through the uncharted waters of this integration, exploring its potential, challenges, and implications through a comprehensive investigation and three distinct case studies. The case studies, derived from varied industries, illuminate the practicalities, hurdles, and triumphs experienced by organizations in implementing and operating within a Blockchain-enhanced ERP environment. Through a meticulous comparative analysis, this study aims to unravel the strategic, technical, and organizational layers involved in such integration, providing insights and recommendations for practitioners and researchers embarking on this digital expedition. The findings of this research are anticipated to pave the way for further explorations and developments in the realm of ERP and...
Proceedings of LAW VIII - The 8th Linguistic Annotation Workshop
Finding your “Inner-Annotator”: An Experiment in Annotator Independence for Rating Discourse Coherence Quality in Essays2014 •
The Journal of Neuroscience
Receptor Subtypes Involved in the Presynaptic and Postsynaptic Actions of Dopamine on Striatal Interneurons2003 •
2005 •
2019 •
Perancangan topologi jaringan yang aman merupakan solusi untuk mengamankan server sebuah instansi. Serangan hacker yang kerap sekali mencari kesempatan untuk mengetahui aktivitas suatu jaringan, dan mencari celah kelemahan yang ada. Teknik dengan kemampuan dalam merecord semua kegiatan paket masuk dan keluar pada suatu data dan mencari intersep yang memungkinkan merecord username dan password ketika host login pada suatu ur, dalam hal ini pada segmen jaringan antara host dan hacker disebut Teknik Sniffing. Pada penelitian ini penulis menggunakan teknik sniffing untuk mengetahui kelemahan dari jaringan wifi dan LAN di Universitas Pembangunan Panca Budi Medan. Dari hasil penelitian beberapa host yang menjadi target sniffing, diketahui mengakses beberapa url sosisal media dan page login url lainnya. Akses username dan password di record ketika aplikasi bettercap melakukan fitur sniffer disetiap hostnya. Ada beberapa host yang dijadikan target hanya akan tetapi username dan password tid...
International Journal of Innovative Studies in Sociology and Humanities
The Massive Degeneration of Green Space in the City/Oasis of BecharJournal of Plastic, Reconstructive & Aesthetic Surgery
Surgical tip: A cheap and readily available alternative to the 10cc syringe lock for Coleman fat grafting2010 •
Biochemical and Biophysical Research Communications
3H-uridine uptake in human leukemia HL-60 cells exposed to extremely low frequency electromagnetic fields1992 •
JOURNAL OF THE COLLEGE OF EDUCATION FOR WOMEN
The Level of Career Involvement of Primary School Managers in Baghdad2018 •
2014 •
JCIC : Jurnal CIC Lembaga Riset dan Konsultan Sosial
Pelanggaran Privasi Dalam Program Realita Investigasi Polisi di Indonesia: Ancaman, Kebijakan, Dan Kebutuhan Pembaruan2021 •
2004 •