نتایج جستجو برای: behavioral mediums

تعداد نتایج: 149593  

2012
Julio Fernando Peres Alexander Moreira-Almeida Leonardo Caixeta Frederico Leao Andrew Newberg

Despite increasing interest in pathological and non-pathological dissociation, few researchers have focused on the spiritual experiences involving dissociative states such as mediumship, in which an individual (the medium) claims to be in communication with, or under the control of, the mind of a deceased person. Our preliminary study investigated psychography - in which allegedly "the spirit w...

Journal: :CoRR 2012
Youssef Bassil

Currently, cryptography is in wide use as it is being exploited in various domains from data confidentiality to data integrity and message authentication. Basically, cryptography shuffles data so that they become unreadable by unauthorized parties. However, clearly visible encrypted messages, no matter how unbreakable, will arouse suspicions. A better approach would be to hide the very existenc...

2004
Sheldon BROWN

The developments of digital technology provide opportunities for artists to radically rethink the notion of mediums as entities that are containers to be filled with the content of their artwork. Digital technologies provide the capability for artists to create their own functional mediums along with a particular artwork. However, this technological creativity can create daunting development ta...

2001
Dieter Swatschek Wolfgang Schatton Josef Kellermann Werner E.G. Müller Jörg Kreuter

A previously described isolation procedure for collagen of the marine sponge Chondrosia reniformis Nardo was modified for scaling-up reasons yielding 30% of collagen (freeze-dried collagen in relation to freeze-dried sponge). Light microscope observations showed fibrous structures. Transmission electron microscopy studies proved the collagenous nature of this material: high magnifications showe...

Journal: :CoRR 2015
Anjan K. N. K. Srinath Abraham Jibi

Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build rob...

Journal: :Clinical pediatrics 2014
Michele L Ybarra Victor C Strasburger Kimberly J Mitchell

BACKGROUND Emerging research suggests sexual media affects sexual behavior, but most studies are based on regional samples and few include measures of newer mediums. Furthermore, little is known about how sexual media relates to sexual violence victimization. METHODS Data are from 1058 youth 14 to 21 years of age in the national, online Growing up with Media study. RESULTS Forty-seven perce...

Journal: :Biophysical journal 2007
Mikhail Y Berezin Hyeran Lee Walter Akers Samuel Achilefu

The polarity of biological mediums controls a host of physiological processes such as digestion, signaling, transportation, metabolism, and excretion. With the recent widespread use of near-infrared (NIR) fluorescent dyes for biological imaging of cells and living organisms, reporting medium polarity with these dyes would provide invaluable functional information in addition to conventional opt...

2011
Paul Sturges

Whilst African civil conflicts are usually presented in the media as either political struggles, terrorism or mere banditry, in some at least there is a substantial spiritual element. Conflicts Zimbabwe, Mozambique and elsewhere in African have been shown to contain highly significant contributions from spirit forces intermediated by mediums, traditional healers, and prophets. Aspects of the Ac...

2017
Ayyappa Kumar Sista Kameshwar Wensheng Qin

In literature, extensive studies have been conducted on popular wood degrading white rot fungus, Phanerochaete chrysosporium about its lignin degrading mechanisms compared to the cellulose and hemicellulose degrading abilities. This study delineates cellulose and hemicellulose degrading mechanisms through large scale metadata analysis of P. chrysosporium gene expression data (retrieved from NCB...

2005
Suen Yek

TCP/IP fingerprinting is a common technique used to detect unique network stack characteristics of an Operating System (OS). Its usage for network compromise is renowned for performing host discovery and in aiding the blackhat to determine a tailored exploit of detected OSs. The honeyd honeynet is able to countermeasure blackhats utilising TCP/IP fingerprinting via host device emulation on a vi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید