نتایج جستجو برای: practical identity
تعداد نتایج: 347233 فیلتر نتایج به سال:
Background & Aim: Nursing professionalization is a developmental experience that evolves throughout professional nurses’ careers. Nursing systems that prepare nurses include experiences that are important in the early development of nursing identity. This phenomenenon is also foundational to the assumption of various nursing roles. Methods & Materials: A phenomenological approach was used in or...
Recent research has shown that academic writing is not ‘author-evacuated’ but, rather, carries a representation of the writers’ identity. One way through which writers project their identity in academic writing is stance-taking toward propositions advanced in the text. Appropriate stance-taking has proved to be challenging for novice writers of Research Articles (RAs), especially those writing ...
The field of Applied Literature is concerned with the practical usages of literature, including the potentials of literature to empower and transform individuals. Jungian criticism, with its suggestions of the possibility of individuation and self-actualization in individuals, has been an important source for scholars in the field of Applied Literature for healing. Still, the traditional Jungia...
Social media (SM) platforms are frequently used by pre-teen (8–12-year old) consumers for curating their self-identity, developing social relationships and learning. This paper identifies the building blocks that drive SM engagement. We use Gioia method to analyse interview data collected from 32 pre-teens parents, in France. Findings show primary FoMO (Fear of Missing Out) inclusive experience...
Theater and architecture create space and the spirit of life through settings, and both possess the nature of movement, time, rhythm, light, and color. Space and time are the most important common elements of these two arts. Theater directors and designers can put on meaningful and identity- based performances if they make organic use of the human-space relationship in creating space. Phenomeno...
Despite the Internet has been rapidly developed in the past three decades, its intrinsic security mechanism, e.g., IP source address validation and user identification authentication, is still not well addressed. This results in numerous cyber security threats. In order to enhance the Internet accountability and deter potential cyber-attacks, in this paper, we propose TrueID, an IPv6 header ext...
At Eurocrypt 2005, Waters proposed an efficient identity-based encryption (IBE) scheme and its extension to a hierarchical IBE (HIBE). We describe a (H)IBE scheme which improves upon Waters scheme by significantly reducing the size of the public parameters. The reduction is based on two ideas. The first idea involves partitioning n-bit identities into l-bit blocks while the second idea involves...
Central to the ethos of digital ecosystems (DEs) is that DEs should be distributed and have no central points of failure or control. This essentially mandates a decentralised system, which poses significant challenges for identity. Identity in decentralised environments must be treated very differently to identity in traditional environments, where centralised naming, authentication and authori...
Markov logic is a highly expressive language recently introduced to specify the connectivity of a Markov network using first-order logic. While Markov logic is capable of constructing arbitrary first-order formulae over the data, the complexity of these formulae is often limited in practice because of the size and connectivity of the resulting network. In this paper, we present approximate infe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید