نتایج جستجو برای: physical identity
تعداد نتایج: 775621 فیلتر نتایج به سال:
We define identity theft as the unauthorized use and exploitation of another individual’s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen o...
1. Introduction It was a scientist, Ullin Place (1956), who first proposed the modern psycho-physical identity theory. Over subsequent decades, though, it has been philosophers of mind, who have seized on Place's proposal. Those philosophers directed most of their energies at finding fault with the identity theory. Armed with logic, ordinary language, an endless supply of intuitions about mind ...
Social networks have been shown to help protect mental and physical health. But how can we develop and sustain policy to socially engage communities to reap such health benefits. First, the value of social groups needs to be incorporated into cost–benefit analyses that are used to make decisions about resource allocation. Moreover, by thinking of social identity resources as real tangible resou...
with the intensification of violent terrorist operations in the world, in terms of the structural causes of terrorism has been much academic research. the active area of terrorism is not only physical variables and variable should ideological and psychological, environmental and cultural-identity also tracked. the reasons are complex and varied phenomenon of terrorism and can not cause its root...
Identity management has to comprise all areas of life throughout one’s whole lifetime to gain full advantages, e.g., ease-of-use for all kinds of digital services, authenticity and authorisation, reputation and user-controlled privacy. To help laying the foundations for identity management applicable to people’s whole life, we describe the formation of digital identities happening numerous time...
Based on our deployments of Livenotes, a Tablet-based application for collaborative note-taking in open educational settings, we observe that communication breakdowns, potentially affecting learning, arise from imperfect knowledge about other users' identities. This leads us to argue that user identity is an under-explored topic in ubicomp. We show that the concept of identity needs to be expan...
In Long Term Evolution (LTE) networks, physical cell identity allocation (PCI) is crucial for quality of service and somewhat similar to scrambling code allocation in WCDMA. PCI, or Layer 1 identity, is an essential configuration parameter of a radio cell. It identifies the cell in mobility functions such as cell reselection and handover. In this paper simulation results, in order to optimize P...
It is shown how a pure background tensor formalism provides a concise but explicit and highly flexible machinery for the generalised curvature analysis of individual embedded surfaces and foliations such as arise in the theory of topological defects in cosmological and other physical contexts. The unified treatment provided here shows how the relevant extension of the Raychaudhuri identity is r...
nowadays, huge tendency to fashion and consumerism could be assumed as the origin of identitycrisis among women and in their houses. this phenomenon is like a veil between man and the fact of his human being. given that the physical properties of man-made environments (house) are influenced by human properties and, in return, have an important role in giving identity to their audience, identifi...
myiasis is the invasion of body tissues of humans and animals by the larvae of the diptera or two-winged flies. there are only sporadic reports in the literature concerning human ear myiasis. a 62-year-old bedridden woman in an intensive care unit was examined because of her intense swollen and erythematous right ear. physical examination revealed 80 live larvae (maggots) in the posterior part ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید