نتایج جستجو برای: identity like

تعداد نتایج: 761739  

2005
Róbert Oravecz László Lajtai

The paper presents the process of refugee identity transformation in the mirror of the Slovene refugee politics. It has been discussed that the problem of the refugee mental health can not be identified with the psychopathological phenomenon of the PTSD. The identity processing of the refugees changes within the relational system of the cross-cultural communication. That has been determined by ...

Journal: :Electr. J. Comb. 2012
Markus Fulmek

In this paper, we show how general determinants may be viewed as generating functions of nonintersecting lattice paths, using the Lindström–Gessel–Viennotmethod and the Jacobi-Trudi identity together with elementary observations. After some preparations, this point of view provides “graphical proofs” for classical determinantal identities like the Cauchy-Binet formula, Dodgson’s condensation fo...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه محقق اردبیلی - دانشکده علوم 1388

دستگاه معادلات خطی افزوده در بسیاری از محاسبات علمی و کاربردی،مثل حل تقریبی مسأله استوکس به روش عناصر متناهی ظاهر می شود. در این پایان نامه ابتدا روشهایsor-like ، ssor وmssor برای حل اینگونه دستگاه ها را مطالعه می کنیم. سپس یک پیش شرط ساز ساده اما کارا برای روش sor-like ارائه می شود. در ادامه شکل اصلاح شده ای از روشssor بنام issor ارائه می گردد. در پایان نتایج عددی برای نشان دادن کارائی روشها ر...

Journal: :Genes & development 2006
Ruth Grosskortenhaus Kristin J Robinson Chris Q Doe

Embryonic development requires generating cell types at the right place (spatial patterning) and the right time (temporal patterning). Drosophila neuroblasts undergo stem cell-like divisions to generate an ordered sequence of neuronal progeny, making them an attractive system to study temporal patterning. Embryonic neuroblasts sequentially express Hunchback, Krüppel, Pdm1/Pdm2 (Pdm), and Castor...

2014
N. Ben Bouazza M. Lemoudden B. El Ouahidi D. Bourget

Traditional identity approaches in a cloud environment that demands scale and openness, suffer from a number of limits, especially when the enterprise uses multiple cloud service providers (CSPs) and user credentials are not shared with other providers. Multiple attempts to solve this problem have been proposed like federated Identity that has a number of advantages, even though it suffers from...

Journal: :CoRR 2011
Mohit Kohli

Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enable...

2014
Jan Van den Stock Beatrice de Gelder

Faces provide information about multiple characteristics like personal identity and emotion. Classical models of face perception postulate separate sub-systems for identity and expression recognition but recent studies have documented emotional contextual influences on recognition of faces. The present study reports three experiments where participants were presented realistic face-body compoun...

Journal: :Developmental science 2008
Mayu Nishimura Daphne Maurer Linda Jeffery Elizabeth Pellicano Gillian Rhodes

In adults, facial identity is coded by opponent processes relative to an average face or norm, as evidenced by the face identity aftereffect: adapting to a face biases perception towards the opposite identity, so that a previously neutral face (e.g. the average) resembles the identity of the computationally opposite face. We investigated whether children as young as 8 use adaptive norm-based co...

2009
Rajanish Dass Sujoy Pal

An efficient identity management has been an aspiring and dream for many nations and organizations. The objectives for uniquely identifying individuals have been different for different entities. For some, the need for better security had been the driving factor, while for others identity management would mean better transparency and improved efficiency. The challenges in implementing an effici...

2012
Sufian Hameed Tobias Kloht Xiaoming Fu

A vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. In this paper we introduce iSATS, a new email sender authentication system based on Identity-based public key cryptography. iSATS leverages an identity based s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید