نتایج جستجو برای: secure mother
تعداد نتایج: 101974 فیلتر نتایج به سال:
Different initiatives are initiated to utilize ICT to maintain and develop democracy. Democracy models are developed to explain differences between different democracies. This paper reports from a case study where a webbased discussion board is developed and implemented. The findings indicate that politicians and citizens add support to different democracy models by their contributions to the w...
Data fusion is the final step of a typical data integration process, after schematic conflicts have been overcome and after duplicates have been correctly identified. We present the relational data fusion system FuSem, which uses schema mappings and information about duplicates to decide what to fuse, i.e., which tuples to merge into one. The aspect emphasized by the demo is how to fuse the dup...
In the demo, we demonstrate a mobile food recognition system with Fisher Vector and liner one-vs-rest SVMs which enable us to record our food habits easily. In the experiments with 100 kinds of food categories, we have achieved the 79.2% classification rate for the top 5 category candidates when the ground-truth bounding boxes are given. The prototype system is open to the public as an Android-...
OBJECTIVE To study the processes by which donor-conceived children incorporate donor conception into their subjective sense of identity. DESIGN Cross-sectional. SETTING Family homes. PATIENT(S) Nineteen donor-conceived adolescents. INTERVENTION(S) Administration of an interview and questionnaire. MAIN OUTCOME MEASURE(S) The mother-child relationship was assessed through the Friends an...
This study was conducted to determine whether or not there is a relationship between secure attachment mother and child social emotional development. One of the factors that play major role in development children attachment. uses correlational quantitative method with side technique, namely purposive sample number subjects as many 97 students' guardians (especially mothers) at RA Aisyah IT Pek...
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
I describe and evaluate the hypothesis that effects from parent-offspring conflict and genomic imprinting on human neurodevelopment and behavior are central to evolved systems of mother-child attachment. The psychological constructs of Bowlby’s attachment theory provide phenomenological descriptions of how attachment orchestrates affective-cognitive development, and patterns of imprinted gene e...
The aim of this research was to examine whether attachment relationships significant others, such as parents and/or sports coaches, enable thriving and competition performance within sport. Two studies employing cross-sectional prospective designs were carried out across different samples athletes varied skill levels sports. In Study 1, we found athletes’ their coach significantly associated wi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید