نتایج جستجو برای: outside capabilities

تعداد نتایج: 183537  

Journal: :Bulletin of the Royal College of Psychiatrists 1981

Journal: :Journal of the American Oriental Society 2021


 The Inquisition (miḥna) of al-Maʾmūn (d. 218/833) was a serious attempt to establish the caliph as arbiter Islamic orthodoxy . It actively prosecuted by succeeding two caliphs, and finally abolished his nephew, al-Mutawakkil, in 237/852 most information we have about it far is how carried out Baghdad Various sources, mostly biographical, also tell us something its prosecution Basra, Kufa...

Journal: :Journal of effective teaching in higher education 2021

Can creativity be taught? Multiple sources attest that the business community values in potential new hires, but a signature pedagogy of teaching for classes has not yet emerged. To contribute to body evidence-based practice, this study assessed impact several in-class activities were deployed among undergraduate students see if these enhanced their creative problem-solving abilities, as by pre...

2000
Jinman Kim David Dagan Feng Tom Weidong Cai

Medical services in current-time rely heavily on digital imaging technology due to image modalities utilized in medical field such as the computer tomography and magnetic resonance imaging. These techniques require image-processing tools and digital management that has been the primary reason for development of Picture Archiving and Communication Systems (PACS). The limitation to PACS is that t...

2014
Hyduke Noshadi Shaun Ahmadian Hagop Hagopian Jonathan Woodbridge Foad Dabiri Navid Amini Majid Sarrafzadeh Nick Terrafranca

In this paper we introduce Hermes, a lightweight smart shoe and its supporting infrastructure aimed at extending instability analysis and human balance monitoring outside of a laboratory environment. By combining embedded sensing, signal processing and modeling techniques we create a scientific tool capable of quantifying high-level measures. The system monitors walking behavior and uses an ins...

2001
Jack Marin Daniel Ragsdale John Surdu

Anomaly detection involves characterizing the behaviors of individuals or systems and recognizing behavior that is outside the norm. This paper describes some preliminary results concerning the robustness and generalization capabilities of machine learning methods in creating user profiles based on the selection and subsequent classification of command line arguments. We base our method on the ...

Journal: :JCP 2008
Letian Rong

The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network access technologies, and allow resource access based on user preferences. P2P computing is an area which will be affected by this new trend. In this paper, we proposed a resource replication strategy for context-aware...

2006
Oriol Sallent

Beyond 3G usually refers to heterogeneous scenarios where different Radio Access Technologies (RATs) coexist and operate in a coordinated way. This brings a new challenge to offer services to the users over an efficient and ubiquitous radio access. In this way, the user can be served through the RAT that fits better to the terminal capabilities and service requirements, and also a more efficien...

2008
Fran Frkovic Vedran Podobnik Krunoslav Trzec Gordan Jezic

The future of mobile telecommunications is aimed at creating a usercentric wireless world which takes into account user’s preferences, as well as communication context (e.g., network and terminal heterogeneity or user location). In order to enable context-aware personalization of communication services offered by next-generation mobile networks, we propose an agentbased approach in combination ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید