منابع مشابه
Emancipatory knowing: Hidden necessity
Background & Aim: Knowledge patterns in nursing are key foundation elements for the development of knowledge and practice. Carper identified four fundamental knowledge patterns; empirical, personal, ethical and aesthetic. Chain and Kramer added the pattern of emancipatory knowledge to Carperchr('39')s patterns. The pattern of emancipatory knowledge in nursing has been neglected. The aim of this...
متن کاملHidden Variables or Hidden Theories?
We show that a modified Relativity Principle could explain in a " classical " way the strange correlations of entangled photons. We propose a gedanken experiment with balls and boxes that predicts the same distribution of probability of the Quantum Mechanics in the case of the EPR experiment with a pair of entangled photons meeting a pair of polarizers. In the light of this gedanken experiment,...
متن کاملHidden and Not So Hidden Symmetries
Hidden symmetries entered the literature in the late Eighties when it was observed that there could be gain of Lie point symmetry in the reduction of order of an ordinary differential equation. Subsequently the reverse process was also observed. Such symmetries were termed “hidden”. In each case the source of the “new” symmetry was a contact symmetry or a nonlocal symmetry, that is, a symmetry ...
متن کاملDiscovering Hidden Evidence Discovering Hidden Evidence
Discovering Hidden Evidence C. Hosmer Chet Hosmer WetStone Technologies, Inc., Cortland, New York, USA ABSTRACT Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. In addition, new information suggests that the download of an arsenal of software tools that perform these...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Te Kaharoa
سال: 2020
ISSN: 1178-6035
DOI: 10.24135/tekaharoa.v16i5.328