Results for 'Adel Salama'

440 found
Order:
  1. A Perverse Case of the Contingent A Priori.Adèle Mercier - 1995 - Philosophical Topics 23 (2):221-259.
  2. Constructions: a new theoretical approach to language.Adele E. Goldberg - 2003 - Trends in Cognitive Sciences 7 (5):219-224.
    A new theoretical approach to language has emerged in the past 10–15 years that allows linguistic observations about form–meaning pairings, known as ‘construc- tions’, to be stated directly. Constructionist approaches aim to account for the full range of facts about language, without assuming that a particular subset of the data is part of a privileged ‘core’. Researchers in this field argue that unusual constructions shed light on more general issues, and can illuminate what is required for a complete account of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   83 citations  
  3. Transparency and social responsibility issues for wikipedia.Adele Santana & Donna J. Wood - 2009 - Ethics and Information Technology 11 (2):133-144.
    Wikipedia is known as a free online encyclopedia. Wikipedia uses largely transparent writing and editing processes, which aim at providing the user with quality information through a democratic collaborative system. However, one aspect of these processes is not transparent—the identity of contributors, editors, and administrators. We argue that this particular lack of transparency jeopardizes the validity of the information being produced by Wikipedia. We analyze the social and ethical consequences of this lack of transparency in Wikipedia for all users, but (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  4.  54
    Corpus evidence of the viability of statistical preemption.Adele E. Goldberg - 2011 - Cognitive Linguistics 22 (1):131-153.
    The present paper argues that there is ample corpus evidence of statistical preemption for learners to make use of. In the case of argument structure constructions, a verbi is preempted from appearing in a construction A, CxA, if and only if the following probability is high: P(CxB|context that would be suitable for CxA and verbi). For example, the probability of hearing a preemptive construction, given a context that would otherwise be well-suited for the ditransitive is high for verbs like explain (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  5.  36
    Learning argument structure generalizations.Adele E. Goldberg, Devin M. Casenhiser & Nitya Sethuraman - 2004 - Cognitive Linguistics 15 (3).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  6. The Role of Administrative Procedures and Regulations in Enhancing the Performance of The Educational Institutions - The Islamic University in Gaza is A Model.Ashraf A. M. Salama, Youssef M. Abu Amuna, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (2):14-27.
    The study aimed to identify the role of administrative procedures and systems in enhancing the performance of the educational institutions in the Islamic University in Gaza. To achieve the research objectives, the researchers used the analytical descriptive approach to collect information. The researchers used the questionnaire distributed to three categories of employees at the Islamic University (senior management, faculty members, their assistants and members of the administrative board). A random sample of 314 employees was selected and 276 questionnaires were retrieved (...)
    Direct download  
     
    Export citation  
     
    Bookmark   48 citations  
  7.  58
    "Fair Ones of a Purer Caste": White Women and Colonialism in Nineteenth-Century British Columbia.Adele Perry - 1997 - Feminist Studies 23 (3):501.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  1
    Blockchain-Based Smart Contracts Affect the Speed of Arbitration in Resolving Disputes and the Role of the Mediator in the Arbitration Process Especially in Supply and Logistics Contracts.Adel Salem Allouzi - forthcoming - Evolutionary Studies in Imaginative Culture:461-470.
    This research examines the impact of blockchain intelligent contracts on the arbitration rate and the mediator's function of settling disputes in supply and logistics contracts. The quantitative approach for the study and the involvement of 202 legal professionals acquainted with blockchain, the investigation explores the relationships of using smart contracts, trust, and speed of the arbitration process. The research results show that using smart contracts based on blockchain technology significantly improves the arbitration process's speed, efficiency, and transparency and strengthens the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  2
    The Adequacy of the UAE Commercial Law in 2023 in Regulating Artificial Intelligence as a Subject of the Contract.Adel Salem Allouzi, Karima Krim & Mohammad Abdalhafid AlKhamaiseh - forthcoming - Evolutionary Studies in Imaginative Culture:1557-1569.
    The study aims to identify the adequacy of the UAE Commercial Law in 2023 in regulating artificial intelligence as a subject of the contract, This will be done by searching for the way in which the UAE legislator intervened to control the good and effective use of artificial intelligence, whether it was able to reconcile between protecting the interests of the parties to the transaction and encouraging technological development and investment in artificial intelligence to achieve the goals of the National (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Critica dell'estetica" e "Nuovo umanesimo.Adele Canilli - 1964 - [Torino,: Edizioni di "Filosofia,".
    No categories
     
    Export citation  
     
    Bookmark  
  11.  10
    Hessenberg factorization and firework algorithms for optimized data hiding in digital images.Salama A. Mostafa, Jamal N. Hasoon, Muhanad Tahrir Younis & Methaq Talib Gaata - 2022 - Journal of Intelligent Systems 31 (1):440-453.
    Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is separated into three components (RGB). Consequently, the discrete wavelet transform is applied to each component to obtain four bands (high–high, high–low, low–high, and low–low), resulting in 12 bands in total. By omitting the low–low band from each component, a new square matrix (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  13
    Nouvelles formes de dépendances financières dans les pays sous-développés.Pierre Salama - 1995 - Actuel Marx 18:73-84.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. La philosophie du vivant de Maurice Merleau-Ponty: La vie comme puissance créatrice de mondes.Adèle Thorens - 2005 - Revue de Théologie Et de Philosophie 137 (3).
     
    Export citation  
     
    Bookmark  
  14.  28
    Understanding of and attitudes to academic ethics among first‐year university students.Adèle Thomas & André Van Zyl - 2012 - African Journal of Business Ethics 6 (2):143-155.
    This study aimed to explore the understanding of and attitudes towards academic ethics of first-year students at a South African University using a paper-based survey that yielded 3611 respondents. A degree of confusion and ambivalence regarding academic ethical issues exists. The relative wealth of respondents also appears to influence the understanding of and attitudes to academic ethics. Millennial students have a tendency to disregard ownership of knowledge. There is a need for instruction in academic ethics to instil an awareness of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  50
    Student academic dishonesty: What do academics think and do, and what are the barriers to action?Adele Thomas & Gideon P. De Bruin - 2012 - African Journal of Business Ethics 6 (1):13.
  16.  35
    Parameter Optimization of MIMO Fuzzy Optimal Model Predictive Control By APSO.Adel Taieb, Moêz Soltani & Abdelkader Chaari - 2017 - Complexity:1-11.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17. The Relationship between Correcting Deviations in Measuring Performance and Achieving the Objectives of Control - The Islamic University as a Model.Abed Alfetah M. AlFerjany, Ashraf A. M. Salama, Youssef M. Abu Amuna, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (1):74-89.
    The study aimed to identify the relationship between correcting the deviations in the measurement of performance and achieving the objectives of control and the performance of the job at the Islamic University in the Gaza Strip. To achieve the objectives of the research, the researchers used the descriptive analytical approach to collect information. The questionnaire consisted of (20) statements distributed to three categories of employees of the Islamic University (senior management, faculty members, their assistants and members of the administrative board). (...)
    Direct download  
     
    Export citation  
     
    Bookmark   45 citations  
  18. Bridging boundaries versus breaking boundaries: Psycholinguistics in perspective.Adele A. Abrahamsen - 1987 - Synthese 72 (3):355 - 388.
  19. Phenomena and mechanisms: Putting the symbolic, connectionist, and dynamical systems debate in broader perspective.Adele A. Abrahamsen & William P. Bechtel - 2006 - In Robert Stainton (ed.), Contemporary Debates in Cognitive Science. Oxford: Wiley-Blackwell.
    Cognitive science is, more than anything else, a pursuit of cognitive mechanisms. To make headway towards a mechanistic account of any particular cognitive phenomenon, a researcher must choose among the many architectures available to guide and constrain the account. It is thus fitting that this volume on contemporary debates in cognitive science includes two issues of architecture, each articulated in the 1980s but still unresolved: " • Just how modular is the mind? – a debate initially pitting encapsulated mechanisms against (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  20.  17
    Accessibility and Historical Change: An Emergent Cluster Led Uncles and Aunts to Become Aunts and Uncles.Adele E. Goldberg & Crystal Lee - 2021 - Frontiers in Psychology 12:662884.
    There are times when a curiously odd relic of language presents us with a thread, which when pulled, reveals deep and general facts about human language. This paper unspools such a case. Prior to 1930, English speakers uniformly preferred male-before-female word order in conjoined nouns such asuncles and aunts; nephews and nieces; men and women. Since then, at least a half dozen items have systematically reversed their preferred order (e.g.,aunts and uncles, nieces and nephews) while others have not (men and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21. The Relationship between Performance Standards and Achieving the Objectives of Supervision at the Islamic University in Gaza.Ashraf A. M. Salama, Mazen Al Shobaki, Samy S. Abu-Naser, Abed Alfetah M. AlFerjany & Youssef M. Abu Amuna - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 1 (10):89-101.
    The aim of the research is to identify the relationship between the performance criteria and the achievement of the objectives of supervision which is represented in the performance of the job at the Islamic University in Gaza Strip. To achieve the objectives of the research, the researchers used the descriptive analytical approach to collect information. The questionnaire consisted of (22) paragraphs distributed to three categories of employees of the Islamic University (senior management, faculty members, their assistants and members of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  22.  24
    Grief and its Transcendence: Memory, Identity, Creativity.Adele Tutter & Leon Wurmser (eds.) - 2015 - Routledge.
    Grief and its Transcendence: Memory, Identity, Creativity is a landmark contribution that provides fresh insights into the experience and process of mourning. It includes fourteen original essays by pre-eminent psychoanalysts, historians, classicists, theologians, architects, art-historians and artists, that take on the subject of normal, rather than pathological mourning. In particular, it considers the diversity of the mourning process; the bereavement of ordinary vs. extraordinary loss; the contribution of mourning to personal and creative growth; and individual, social, and cultural means of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  53
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  22
    The Self-Reference of the Gorgias.Adele Spitzer - 1975 - Philosophy and Rhetoric 8 (1):1 - 22.
  25. From Reactive to Endogenously Active Dynamical Conceptions of the Brain.Adele Abrahamsen & William Bechtel - unknown
    We contrast reactive and endogenously active perspectives on brain activity. Both have been pursued continuously in neurophysiology laboratories since the early 20thcentury, but the endogenous perspective has received relatively little attention until recently. One of the many successes of the reactive perspective was the identification, in the second half of the 20th century, of the distinctive contributions of different brain regions involved in visual processing. The recent prominence of the endogenous perspective is due to new findings of ongoing oscillatory activity (...)
     
    Export citation  
     
    Bookmark   9 citations  
  26. Three Elements of Stakeholder Legitimacy.Adele Santana - 2012 - Journal of Business Ethics 105 (2):257-265.
    This paper focuses attention on the stakeholder attribute of legitimacy. Drawing upon institutional and stakeholder theories, I develop a framework of stakeholder legitimacy based on its three aspects—legitimacy of the stakeholder as an entity, legitimacy of the stakeholder’s claim, and legitimacy of the stakeholder’s behavior. I assume that stakeholder legitimacy is socially constructed by management and that each of its three aspects exists in degree in the manager’s perception. I discuss how these aspects interact and change over time, and propose (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  27.  25
    The UNESCO Bioethics Programme.Adèle Langlois - 2014 - The New Bioethics 20 (1):3-11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  91
    (1 other version)Diagrams as Tools for Scientific Reasoning.Adele Abrahamsen & William Bechtel - 2015 - Review of Philosophy and Psychology 6 (1):117-131.
    We contend that diagrams are tools not only for communication but also for supporting the reasoning of biologists. In the mechanistic research that is characteristic of biology, diagrams delineate the phenomenon to be explained, display explanatory relations, and show the organized parts and operations of the mechanism proposed as responsible for the phenomenon. Both phenomenon diagrams and explanatory relations diagrams, employing graphs or other formats, facilitate applying visual processing to the detection of relevant patterns. Mechanism diagrams guide reasoning about how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  29. Esther.Adele Berlin - 2001
    No categories
     
    Export citation  
     
    Bookmark  
  30.  17
    Empirical Models for Biblical Criticism.Adele Berlin & Jeffrey H. Tigay - 1987 - Journal of the American Oriental Society 107 (1):145.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  15
    Confini: musica tra visioni e follia.Adele Boghetich - 2020 - Varese (Italy): Zecchini editore. Edited by Nicola Guerini.
    Sguardo d'insieme -- Armonia delle sfere celesti : Hildegard von Bingen, symphonia -- Il tempo di Dio : Johann Sebastian Bach, Cantata Gottes Zeit -- Trasmutazioni : Wolfgang Amadeus Mozart, Die Zauberflöte -- "Questo bacio vada al mondo intero" : Ludwig van Beethoven, An die Freude -- Viaggio d'inverno : Franz Schubert, Winterreise -- Inni all notte : Richard Wagner, Tristan und Isolde -- L'ultimo rito : Richard Wagner, Parsifal -- Azzurre solitudini : Gustav Mahler, Terza sinfonia -- Universi sonori (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  41
    Hypertext.Adele McCollum & David Stuehler - 1989 - Inquiry: Critical Thinking Across the Disciplines 4 (4):9-11.
  33.  58
    Are Language Conventions Philosophically Explanatory?Adele Mercier - 2003 - Croatian Journal of Philosophy 3 (2):111-124.
    Conventional behavior is behavior engaged in because of, or due to, convention. There are two senses of “due to”: the convention explains my behavior by actually causing it; or the convention explains my behavior by providing reasons I have for engaging in this behavior. Either way, behaviors cannot be explained by conventions unless the conventions exist; and conventions cannot provide me with (conscious) reasons for engaging in my behavior unless I know what they are. I argue that, far from causing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  44
    Letter from Pennsylvania.Adele R. Minissale - 2010 - The Chesterton Review 36 (1/2):358-361.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35.  31
    Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction.Salama A. Mostafa, Bashar Ahmed Khalaf, Ahmed Mahmood Khudhur, Ali Noori Kareem & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 31 (1):1-14.
    Floods are one of the most common natural disasters in the world that affect all aspects of life, including human beings, agriculture, industry, and education. Research for developing models of flood predictions has been ongoing for the past few years. These models are proposed and built-in proportion for risk reduction, policy proposition, loss of human lives, and property damages associated with floods. However, flood status prediction is a complex process and demands extensive analyses on the factors leading to the occurrence (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  19
    Warmth and Unity with all Women?: Historicizing Racism in the Australian Women's Movement1.Adele Murdolo - 1996 - Feminist Review 52 (1):69-86.
    In this paper I discuss the four Women and Labour conferences which were held in Australian capital cities over the seven years between 1978 and 1984. I explore the ways in which the history of Australian feminist activism during this period could be written, questioning in particular the claim that the Women and Labour conferences have been central to the history of Australian feminism. I discuss the ways in which a historical sense could be established, using writings about the conferences (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  18
    (1 other version)Ecophobia and Natural Disaster in Catastrophic and Apocalyptic Narratives.Adele Tiengo Tiengo - forthcoming - Governare la Paura. Journal of Interdisciplinary Studies.
    The aim of this essay is to approach the long literary tradition of catastrophic or apocalyptic narratives in relation to natural disasters and to explore examples of ecological threats to human species in contemporary Anglophone literature. By using the concept of ecophobia – a widespread irrational fear for nature – the author analyses novels by George R. Stewart ( Storm and Earth Abides ) and by Margaret Atwood ( Oryx and Crake ). Among the shared traits of these novels, the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38. Construction grammar.Adele E. Goldberg - 2002 - In Lynn Nadel (ed.), Encyclopedia of Cognitive Science. Macmillan.
     
    Export citation  
     
    Bookmark   3 citations  
  39. “the Mercurial Significance Of Raiding”: Baby Hermes And Animal Theft In Contemporary Crete.Adele Haft - 1997 - Arion 4 (2).
    No categories
     
    Export citation  
     
    Bookmark   3 citations  
  40.  14
    Anatomy, and Biochemistry.Adele Diamond - 2002 - In Donald T. Stuss & Robert T. Knight (eds.), Principles of Frontal Lobe Function. Oxford University Press. pp. 466.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  41.  23
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  43
    A dynamic dual process model of risky decision making.Adele Diederich & Jennifer S. Trueblood - 2018 - Psychological Review 125 (2):270-292.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43. On Communication-Based D e Re Thought, Commitments D e Dicto, and Word Individuation.Adele Mercier - 1999 - In Kumiko Murasugi & Robert Stainton (eds.), Philosophy and linguistics. Boulder: Westview Press. pp. 85--111.
    Provides an account of how necessary subjective syntactic investments on the part of speakers affect the semantic contents of their words and the possibilities for their thought-contents.
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  44.  35
    Faculty reluctance to report student plagiarism: A case study.Adèle Thomas - 2017 - African Journal of Business Ethics 11 (1).
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  51
    Ethics and the Networked Business.Adele Santana, Antonino Vaccaro & Donna J. Wood - 2009 - Journal of Business Ethics 90 (S4):661 - 681.
    Pushing through a logical continuum of closed-to open-system views of organizations necessarily changes the conceptualization of a firm from a strongly bounded entity to a configuration of networks and sub-networks, which exists and operates in a larger systemic network configuration. We unfold a classification of management processes corresponding to views of the firm along the closed/open-systems continuum. We examine ethical issues that are likely to devolve from these classes of management processes, and we suggest typical means by which managers will (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  46. Neutrosophic Crisp Set Theory.A. A. Salama & Florentin Smarandache - 2015 - Columbus, OH, USA: Educational Publishers.
    Since the world is full of indeterminacy, the Neutrosophics found their place into contemporary research. We now introduce for the first time the notions of Neutrosophic Crisp Sets and Neutrosophic Topology on Crisp Sets. We develop the 2012 notion of Neutrosophic Topological Spaces and give many practical examples. Neutrosophic Science means development and applications of Neutrosophic Logic, Set, Measure, Integral, Probability etc., and their applications in any field. It is possible to define the neutrosophic measure and consequently the neutrosophic integral (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  47.  5
    The Effects of Artificial Intelligence and Modern Technology on Commercial Transactions for Commercial Transactions Law 2023.Adel Salem AlLouzi, Karima Krim & Mohammad Abdalhafid AlKhamaiseh - forthcoming - Evolutionary Studies in Imaginative Culture:635-652.
    In light of the Fourth Industrial Revolution, the intervention of artificial intelligence in commercial transactions has expanded, and it has not remained a mere subject or subject of the contract, whether it is a material or moral product, but has gone beyond that to have a fundamental and effective role in concluding the contract as an electronic agent that makes the contract automated and concluded in whole or in part in an automated manner without human intervention. The UAE legislator was (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. Neutrosophic Crisp Set Theory.A. Salama & Florentin Smarandache - 2014 - Neutrosophic Sets and Systems 5:27-35.
    The purpose of this paper is to introduce new types of neutrosophic crisp sets with three types 1, 2, 3. After given the fundamental definitions and operations, we obtain several properties, and discussed the relationship between neutrosophic crisp sets and others. Also, we introduce and study the neutrosophic crisp point and neutrosophic crisp relations. Possible applications to database are touched upon.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  49. Comment on: But do we need universal Grammar? by Ameka, FK et al.Adele F. Goldberg - 2004 - Cognition 94 (1):77-84.
  50.  30
    Religious Belief and Self‐Deception.Adèle Mercier - 2009 - In Russell Blackford & Udo Schüklenk (eds.), 50 Voices of Disbelief. Wiley‐Blackwell. pp. 41–47.
1 — 50 / 440