line of resistance
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 7)

H-INDEX

2
(FIVE YEARS 1)

2021 ◽  
Vol 8 (2-3) ◽  
pp. 147-165
Author(s):  
Biao Xiang

The world during the COVID-19 pandemic became more divided than united, both between states and among individuals. Opinions are polarized partly because, as I have observed in urban China, the public is simultaneously preoccupied by the very near (the self) and the very far (the imagined ‘world’), but neglect the space in between, and as a result fail to recognize how the social world is concretely constituted through interconnected differences. This article advocates a way of perceiving the world by taking ‘the nearby’ (fujin in Chinese) as a central scope. The nearby is a lived space where one encounters people with diverse backgrounds on a regular basis. The nearby brings different positions into one view, thus constituting a ‘scope’ of seeing. Such a scope enables nuanced understandings of reality and facilitates new social relations and actions. The nearby could form a line of resistance against the power of the state, capital and technology, that is turning local communities into units of administrative control and value extraction. This article calls for a ‘First Mile Movement’, in which artists, researchers and activists work together to help facilitate citizens with the construction of their nearby as a basis for reflecting upon life experiences, testing grand ideologies and engaging in public discussion.


Author(s):  
Silvana Dwi Nurherdiana

The coronavirus disease 2019 (SARS-CoV2) has attracted most interest in current years due to the worst impact for the global public health. In this situation, the whole world requires wearing face shield and mask as the personal protective equipment, especially for medical personnel. Polymer technology have been introduced as a helping tool against SARS-CoV2 by producing healthcare product such as face shield as the first line of resistance due to it was cost effectiveness, sterile nature, versatility and easy to modify. This article clarifies the discussion about face shields in the polymer technology as the point of view and aims at providing a deeper understanding about polymer, polymeric material, synthesis methodology and its application for responding SARS-CoV2 pandemic in a form of face shields. The study of the synthesis route and methodology, chemical and physical properties of the polymer for face shields have also been described.


2021 ◽  
Vol 10 (2) ◽  
pp. 144-156
Author(s):  
Enkin Asrawijaya

The Kendeng Mountains, which are rich of limestone, clay, spring and other varying mining sources, are a strategic choice for establishing a cement factory. The plan to establish a cement factory was supported by government but was opposed by the Samin community along with Kendeng farmers. This study aims to discuss the resistance of the Samin (Sedulur Sikep) indigenous people to extractive companies. To discuss this article, we need a theory that can be used to analyze how these volunteers grow and work. This theory is Parsons’ volunteer Action theory. Meanwhile, the research method used was an ethnographic approach. The results showed that the strength gained by the Samin community is the awareness of striving to uphold the maturity of its members through the spirit of a volunteer. This voluntary spirit is developed by cultivating farmer solidarity. Some actors have good rhetorical abilities so that the JMPPK is established to move with an active and open line of resistance.


2020 ◽  
Vol 5 (3) ◽  
Author(s):  
Do Thi Thuy Trang ◽  
Nguyen Thi Thu Thuy

<p>Truong Chinh was a theorist and General Secretary who contributes greatly to the history of Vietnam. During the course of revolutionary activities, he wrote numerous works, his most important work is known as “The resistance war will win”. This work is a deep evidence of the Party's resistance line, having a significant role in directing the entire Party and Vietnamese people to resolutely fight against our enemies by a unified way in order to bring the resistance to the complete victory. Therefore, within the scope of the article, the author focuses on analyzing the basic content of the work: from the ideology of identifying the nation’s enemies to devising a line of resistance against invading force, from which the great value of the work can be pointed out.</p><p> </p><p><strong> Article visualizations:</strong></p><p><img src="/-counters-/edu_01/0688/a.php" alt="Hit counter" /></p>


2020 ◽  
pp. 107-132
Author(s):  
Jennifer A. Delton

This chapter shows how the National Association of Manufacturers (NAM) reorganized and slowly emerged as the first line of resistance to the new New Deal state—thus conforming perfectly to New Dealers' view of capitalists as class-bound reactionaries. Much has been written about the reactionary anti-New Deal National Association of Manufacturers (NAM). The chapter reviews that history to demonstrate its significance in terms of the organization's identity, the struggle for workplace control, and US history in general. But some New Deal policies—such as the National Industrial Recovery Act of 1933, the Reciprocal Trade Agreements Act of 1934, and the establishment of the Export–Import Bank in 1934—furthered NAM's agendas in industrial rationalization and trade expansion. This highlights the tension between the conservative principles of its leaders and the progressive prerogatives of global capitalism.


Now daily's larger part of PC frameworks, passwords is the technique for decision for validating clients. A procedure by which a framework confirms the personality of a client is known as 'Confirmation'. Confirmation may likewise be summed up by saying that "to validate" signifies "to approve". Confirmation is the main line of resistance against trading off classification and uprightness. The most generally and normally utilized confirmation is conventional "Username" and "Secret phrase". For such verification by and large content (alphanumeric) is utilized. It is outstanding, in any case, that passwords are defenseless to assault: clients will in general pick passwords that are anything but difficult to recollect, and regularly this implies they are likewise simple for an assailant to get via hunting down hopeful passwords. Token and biometric based validation frameworks were presented as an option for those plans. Be that as it may, these plans are all around expensive. Consequently, Graphical plan was acquainted as a variety with the login/secret key plan. In this paper we investigate a way to deal with client confirmation that sums up the idea of a literary secret key and that, as a rule, improves the security of client verification over that given by printed passwords. In this proposed framework we have utilized another system for confirmation. It is a variety to the login/secret phrase plan utilizing graphical secret phrase utilized in a graphical way. We have presented a structure of our proposed Graphical Password Authentication System (GPAS), which is resistant to the basic assaults endured by other confirmation plans.


Life Sciences ◽  
2019 ◽  
Vol 217 ◽  
pp. 34-40 ◽  
Author(s):  
Behrad Darvishi ◽  
Keivan Majidzadeh-A ◽  
Reihane Ghadirian ◽  
Marjan Mosayebzadeh ◽  
Leila Farahmand

Author(s):  
Ranjana Kumari ◽  
Achint Chugh

Ad-hoc system is a gathering of wireless movable nodes enthusiastically creating a momentary network lacking the use of any core-existing centralized administration or network infrastructure. MANET has some limitations owing to infrastructure, mobility, capabilities of mobile nodes or due to system as a whole. Limitations due to infrastructure or system, Broadcast nature of communications, frequent disconnections / partitions, Limited bandwidth, packet loss due to transmission error, variable capacity links. Cooperative procedures, Exposed medium, dynamically varying system topology, inadequacy of centralized monitoring, Nonexistence of clear line of resistance. There is no layered security in MANETs like in wired network. Data packets routed between a sender node (source) and a receiver node (destination) of a MANET often traverse along a path spanning multiple links, which is known as the multihop path. The paper provides survey to DDoS attacks prevention and detection methods.


2017 ◽  
Vol 7 (3) ◽  
pp. 199-205
Author(s):  
Tommaso Piazza

It is an alleged virtue of Pritchard’s Epistemological Disjunctivism (ed) that it makes available a promising line of resistance against the sceptic about perceptual knowledge. According to José Zalabardo’s reconstruction of it, however, this line of resistance—in particular, the solution it supplies to what Pritchard calls the Evidential Problem—is ultimately flawed. Whether or not the solution criticized by Zalabardo is the one supplied by ed—which Pritchard has denied—my aim in this paper is to show that Zalabardo’s criticism of this solution fails. To begin with, I show that it is based on excessively demanding epistemic principles. Moreover, I argue that on a more plausible epistemic principle Zalabardo’s conclusion doesn’t go through.


Sign in / Sign up

Export Citation Format

Share Document