نتایج جستجو برای: historical event share

تعداد نتایج: 411090  

2002
Loes Braun Floris Wiesman Ida Sprinkhuizen-Kuyper

With the increasing number of documents that are available in digital form, also the number of digital historical documents is increasing (Berkvens, 2001). It cannot be assumed that standard IR systems perform well on historical documents: historical texts differ from modern texts in three ways (Hüning, 1996; Van Der Horst and Marschall, 1989): (a) vocabularies have changed, (b) spelling has ch...

Journal: :پژوهش های علوم تاریخی 0
زهیر صیامیان گرجی استادیار گروه تاریخ دانشگاه شهید بهشتی

in historical sources and studies, among abbasid caliphs, al-amin (april 787 – 24/25 september 813) characterized as a caliph with moral vices. this negative picture emerged from the accounts of muslims historiographical texts, such as al-akhbâr al-tiwâl, in first centuries of islam and the contemporary historical studies about abbasid caliphate, based on that accounts, accept it as his real, h...

Journal: :پژوهش های فلسفی 0
جیمز ریسر استاد فلسفه دانشگاه سیاتل، آمریکا

this paper provides a critical analysis of heidegger’s brief remarks in his “letter on humanism” in which he links ethics to ethos and ultimately to our relation to time and history. central to this analysis is the phrase of heraclitus, ēthos anthrōpōi daimōn, from which heidegger claims that human living (ethos) is inseparable from the event of appropriation (ereignis) which generates our hist...

2011
S. Kortekaas G. A. Papadopoulos

Geological identification of tsunami deposits is important for tsunami hazard studies, especially in areas where the historical data set is limited or absent. Evidence left by historical tsunamis in the coastal sedimentary record of the Gulf of Corinth was investigated by trenching and coring in Kirra on the north coast and Aliki on the south coast. The Gulf of Corinth has a documented tsunami ...

Journal: :International Journal of The History of Sport 2021

The summer and winter Olympics share the five-ring logo. However, their social political connotations differ. Olympic Winter Games displays an aura of a game for rich powerful. A few aspiring nations intend to host this luxurious sporting festival in order polish international reputations as powerful actors global capitalist order. cases Sochi 2014, PyeongChang 2018 Beijing 2022 illustrate patt...

2010
K. N. Scheitlin James B. Elsner J. C. Malmstadt R. E. Hodges T. H. Jagger

[1] The record of past tropical cyclones provides an important means to evaluate the hurricane hazard. Historical chronologies are a source of information about tropical cyclones prior to the modern era. Chenoweth (2006) describes an archive of 383 tropical cyclones occurring during the eighteenth and nineteenth centuries, largely before the official hurricane record. The present study demonstr...

2017
Dorene F. Balmer Boyd F. Richards

A Qualitative Space highlights research approaches that push readers and scholars deeper into qualitative methods and methodologies. Contributors to A Qualitative Spacemay: advance new ideas about qualitative methodologies, methods, and/or techniques; debate current and historical trends in qualitative research; craft and share nuanced reflections on how data collection methods should be revise...

2017
Carol Gilligan Jessica Eddy

A Qualitative Space highlights research approaches that push readers and scholars deeper into qualitative methods and methodologies. Contributors to A Qualitative Spacemay: advance new ideas about qualitative methodologies, methods, and/or techniques; debate current and historical trends in qualitative research; craft and share nuanced reflections on how data collection methods should be revise...

2009
David Colt

Since 1983 the US Central Intelligence Agency has defined terrorism as “premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.” Compared to the many dangers facing the US today, the threat of terrorism is relatively small. Nonetheless, at nearly all levels of US society the res...

Journal: :IBM Systems Journal 2002
Joseph L. Hellerstein Sheng Ma Chang-Shing Perng

Applications such as those for systems management and intrusion detection employ an automated real-time operation system in which sensor data are collected and processed in real time. Although such a system effectively reduces the need for operation staff, it requires constructing and maintaining correlation rules. Currently, rule construction requires experts to identify problem patterns, a pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید