Hidden

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emancipatory knowing: Hidden necessity

Background & Aim: Knowledge patterns in nursing are key foundation elements for the development of knowledge and practice. Carper identified four fundamental knowledge patterns; empirical, personal, ethical and aesthetic. Chain and Kramer added the pattern of emancipatory knowledge to Carperchr('39')s patterns. The pattern of emancipatory knowledge in nursing has been neglected. The aim of this...

متن کامل

Hidden Variables or Hidden Theories?

We show that a modified Relativity Principle could explain in a " classical " way the strange correlations of entangled photons. We propose a gedanken experiment with balls and boxes that predicts the same distribution of probability of the Quantum Mechanics in the case of the EPR experiment with a pair of entangled photons meeting a pair of polarizers. In the light of this gedanken experiment,...

متن کامل

Hidden and Not So Hidden Symmetries

Hidden symmetries entered the literature in the late Eighties when it was observed that there could be gain of Lie point symmetry in the reduction of order of an ordinary differential equation. Subsequently the reverse process was also observed. Such symmetries were termed “hidden”. In each case the source of the “new” symmetry was a contact symmetry or a nonlocal symmetry, that is, a symmetry ...

متن کامل

Discovering Hidden Evidence Discovering Hidden Evidence

Discovering Hidden Evidence C. Hosmer Chet Hosmer WetStone Technologies, Inc., Cortland, New York, USA ABSTRACT Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. In addition, new information suggests that the download of an arsenal of software tools that perform these...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Te Kaharoa

سال: 2020

ISSN: 1178-6035

DOI: 10.24135/tekaharoa.v16i5.328