نتایج جستجو برای: outside capabilities
تعداد نتایج: 183537 فیلتر نتایج به سال:

 The Inquisition (miḥna) of al-Maʾmūn (d. 218/833) was a serious attempt to establish the caliph as arbiter Islamic orthodoxy . It actively prosecuted by succeeding two caliphs, and finally abolished his nephew, al-Mutawakkil, in 237/852 most information we have about it far is how carried out Baghdad Various sources, mostly biographical, also tell us something its prosecution Basra, Kufa...
Can creativity be taught? Multiple sources attest that the business community values in potential new hires, but a signature pedagogy of teaching for classes has not yet emerged. To contribute to body evidence-based practice, this study assessed impact several in-class activities were deployed among undergraduate students see if these enhanced their creative problem-solving abilities, as by pre...
Medical services in current-time rely heavily on digital imaging technology due to image modalities utilized in medical field such as the computer tomography and magnetic resonance imaging. These techniques require image-processing tools and digital management that has been the primary reason for development of Picture Archiving and Communication Systems (PACS). The limitation to PACS is that t...
In this paper we introduce Hermes, a lightweight smart shoe and its supporting infrastructure aimed at extending instability analysis and human balance monitoring outside of a laboratory environment. By combining embedded sensing, signal processing and modeling techniques we create a scientific tool capable of quantifying high-level measures. The system monitors walking behavior and uses an ins...
Anomaly detection involves characterizing the behaviors of individuals or systems and recognizing behavior that is outside the norm. This paper describes some preliminary results concerning the robustness and generalization capabilities of machine learning methods in creating user profiles based on the selection and subsequent classification of command line arguments. We base our method on the ...
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network access technologies, and allow resource access based on user preferences. P2P computing is an area which will be affected by this new trend. In this paper, we proposed a resource replication strategy for context-aware...
Beyond 3G usually refers to heterogeneous scenarios where different Radio Access Technologies (RATs) coexist and operate in a coordinated way. This brings a new challenge to offer services to the users over an efficient and ubiquitous radio access. In this way, the user can be served through the RAT that fits better to the terminal capabilities and service requirements, and also a more efficien...
The future of mobile telecommunications is aimed at creating a usercentric wireless world which takes into account user’s preferences, as well as communication context (e.g., network and terminal heterogeneity or user location). In order to enable context-aware personalization of communication services offered by next-generation mobile networks, we propose an agentbased approach in combination ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید