نتایج جستجو برای: formal deeds
تعداد نتایج: 125549 فیلتر نتایج به سال:
There is little extant research on the psychological or physiological response to witnessing good deeds. The authors call the emotional reaction to virtue “moral elevation” and the authors examined its effects on mother-infant dyads. Breastfeeding women who watched a morally elevating video were more likely to nurse their infants and were marginally more likely to hug them, compared to women wh...
In formal concept analysis, it is well-known that the number of concepts can be exponential in worst case. To analyze average case, we introduce a probabilistic model for random contexts and prove has superpolynomial asymptotic lower bound.
This research examines the aspects of notary's responsibility as a public servant, specifically regarding individuals with disabilities, in relation to Law Number 25 2009 on Public Services. The notary is involved and has provide services public. In this study, researcher addresses two topics: duties responsibilities use Braille script desired deeds. To answer these discussions, author adopts n...
Jmrn 0. THOMAs, WrLLIA~I E. RrnELIN, 1 JAMES R. WooDWARD, AND FLOYD DEEDs Western Regional Research Laboratory, Agricultural Research Service, U.S. Department of Agriculture, Albany, California 94710 Receiced .April 28, 1967 When properly used, diphenylamine (DPA) prevents apple scald to a high degree, yet only minute residues of the compound ( <8 ppm) remain on and in the treated fruit (Harvey...
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P systems, where there is little incentive for proper behavior. In our scheme, using ecash for reputation points, the reputation of each user is closely related to his real identity rather than to his current pseudonym. Thus, our schem...
Using sophisticated means, Identity (ID) Thieves can acquire victims’ personal information for their own deeds from online news providers. This paper discusses how ID Thieves may compile their stock of trade from Directory Harvest Attacks (DHAs) and launch the attacks against online news providers with two possible attack methodologies. This follows by an evaluation of the inadequacy of the cur...
This work presents the application of a discrete medical image registration framework to multi-organ segmentation in different modalities. The algorithm works completely automatically and does not have to be tuned specifically for different datasets. A robust similarity measure, using the local self-similarity context (SSC), is employed and shown to outperform other commonly used metrics. Both ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید