نتایج جستجو برای: each session 50
تعداد نتایج: 1459977 فیلتر نتایج به سال:
background and purpose: methods: results: between the two settings. however, the mean score for lecture sessions was slightly higher in lecture settings. conclusion: key words : l ecturing , c omputer b ased l earning , d istance e ducation since this study reveals that the learning outcomes in traditional lecture based settings and computer based study are not signifi...
PURPOSE Recent investigations into effects of intensity or distribution of aphasia therapy have provided moderate evidence supporting intensive therapy schedules on aphasia treatment response. The purpose of the present study was to investigate the feasibility of creating an intensive therapy session without extending the amount of daily time a person spends in treatment. METHOD Individuals w...
This letter considers the development of transmission strategies for downlink massive multiple-input multiple-output networks, with objective minimizing completion time transmission. Specifically, we introduce a session-based scheme that splits into sessions and allocates different rates in users. In each session, one user is selected to complete its will not join subsequent sessions, which res...
Traditionally, each party in a (dyadic or multiparty) session implements exactly one role specified in the type of the session. We refer to this kind of session as an individual session (i-session). As a generalization of i-session, a group session (g-session) is one in which each party may implement a group of roles based on one channel. In particular, each of the two parties involved in a dya...
WHAT: 8:30 9:00 Arrival, light breakfast 9:00 9:15 Welcome 9:15 10:00 Talk 1 (Phil Kellman) 10:00 10:15 Morning break 10:15 11:50 Session I (Townsend, Chen, Thurman, Erlikhman, Wagemans) 11:50 12:40 Lunch break 12:45 1:30 Talk 2 (Irv Biederman) 1:30 2:55 Session II (Bartlett, Carrigan, van der Helm, White, Little) 2:55 3:10 Afternoon break 3:10 4:45 Session III (Pomerantz, Peterson, G...
The term ‘Session Fixation vulnerability’ subsumes issues inWeb applications that under certain circumstances enable the adversary to perform a session hijacking attack through controlling the victim’s session identifier value. We explore this vulnerability pattern. First, we give an analysis of the root causes and document existing attack vectors. Then we take steps to assess the current attac...
s • Résumés Vol. 50, Suppl., June / juin 2007 www.cma.ca/cjs Canadian Spine Society © 2007 Canadian Medical Association Can J Surg, Vol. 50, Suppl., June 2007 — Abstracts 3 Wednesday, March 21, 2007 / Le mercredi 21 mars 2007 Executive committee meeting / Rencontre du comité executive Thursday, March 22, 2007 / Le jeudi 22 mars 2007 Plenary session / Assemblée plénière Symposium / Symposium Med...
The Symposium consisted of eight sessions of oral presentations as well as various workshops and poster sessions. This report reviews the presentations in the following sessions and discusses the main conclusions and issues arising from each session: Session 1: Biosafety - experience and results Session 2: Introgression, invasion and fitness Session 3: Biotic and abiotic stress resistance Sessi...
This research aims to determine how the use of Augmented Reality technology propiciates learning achievements through generate emotions in students. The metodology used for development this was selection and application ARToolKit open-source software, specialized augmented reality implementation, after that, we implemented a 3D model on topic “Cell Biology” developed “Unity3D”. A Likert scale t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید