نتایج جستجو برای: formal deeds

تعداد نتایج: 125549  

2008
Jennifer A. Silvers Jonathan Haidt

There is little extant research on the psychological or physiological response to witnessing good deeds. The authors call the emotional reaction to virtue “moral elevation” and the authors examined its effects on mother-infant dyads. Breastfeeding women who watched a morally elevating video were more likely to nurse their infants and were marginally more likely to hug them, compared to women wh...

Journal: :Information Sciences 2021

In formal concept analysis, it is well-known that the number of concepts can be exponential in worst case. To analyze average case, we introduce a probabilistic model for random contexts and prove has superpolynomial asymptotic lower bound.

Journal: :International Journal of Educational Review, Law And Social Sciences 2023

This research examines the aspects of notary's responsibility as a public servant, specifically regarding individuals with disabilities, in relation to Law Number 25 2009 on Public Services. The notary is involved and has provide services public. In this study, researcher addresses two topics: duties responsibilities use Braille script desired deeds. To answer these discussions, author adopts n...

Journal: :Toxicology and applied pharmacology 1967
J O Thomas W E Ribelin J R Woodward F DeEds

Jmrn 0. THOMAs, WrLLIA~I E. RrnELIN, 1 JAMES R. WooDWARD, AND FLOYD DEEDs Western Regional Research Laboratory, Agricultural Research Service, U.S. Department of Agriculture, Albany, California 94710 Receiced .April 28, 1967 When properly used, diphenylamine (DPA) prevents apple scald to a high degree, yet only minute residues of the compound ( <8 ppm) remain on and in the treated fruit (Harvey...

2008
Elli Androulaki Seung Geol Choi Steven M. Bellovin Tal Malkin

We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P systems, where there is little incentive for proper behavior. In our scheme, using ecash for reputation points, the reputation of each user is closely related to his real identity rather than to his current pseudonym. Thus, our schem...

2004
Gim Hiong Soh Timo Vuori

Using sophisticated means, Identity (ID) Thieves can acquire victims’ personal information for their own deeds from online news providers. This paper discusses how ID Thieves may compile their stock of trade from Directory Harvest Attacks (DHAs) and launch the attacks against online news providers with two possible attack methodologies. This follows by an evaluation of the inadequacy of the cur...

2015
Mattias P. Heinrich Oskar Maier Heinz Handels

This work presents the application of a discrete medical image registration framework to multi-organ segmentation in different modalities. The algorithm works completely automatically and does not have to be tuned specifically for different datasets. A robust similarity measure, using the local self-similarity context (SSC), is employed and shown to outperform other commonly used metrics. Both ...

Journal: :International Journal of Mathematics 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید