Results for 'C–C identification'

959 found
Order:
  1. The art of living: Socratic reflections from plat0 to Foucault.C. C. W. Taylor - 2000 - Philosophical Review 109 (3):423-425.
    From his own day to the present Socrates has presented a challenge to philosophers and commentators, a challenge at once of a puzzle to be solved and of an ideal to be continually reshaped in response to the demands of shifting historical perspectives. Alexander Nehamas’s intriguing book combines discussion of this ongoing process, specifically of responses to Socrates by Montaigne, Nietzsche, and Foucault, with exemplification of it via his own response to Socrates. The focus of these responses is specified in (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  2.  44
    Enhancing Identification Mechanisms in UML Class.C. Maria Keet - unknown
    Unlike identification with keys and reference schemes in ER and ORM, UML uses internal, system-generated, identifiers, with a little-known underspecified option for user-defined identifiers. To increase the ontological foundations of UML, we propose two language enhancements for UML, being formally defined simple and compound identifiers and the notion of defined class, which also have a corresponding extension of UML’s metamodel.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  22
    The identification of rhenium in tungsten-rhenium alloys using the field-ion microscope.C. D. Elvin - 1967 - Philosophical Magazine 16 (139):35-43.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  39
    The identification of a preferred inertial frame.C. N. Gordon - 1975 - Foundations of Physics 5 (1):173-183.
    The principle of relativity, that there is no preferred state of uniform motion, has recently come into conflict with certain cosmological observations. In an attempt to overcome this difficulty, an alternative formulation is explored in which this principle is replaced by the principle of universal time, while retaining the invariance of the speed of light. These two postulates lead to a well-defined world model in which one inertial frame has a preferred status. But the invariance properties of the laws of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  28
    High-resolution identification of stacking faults in epitaxial Ba 0.3 Sr 0.7 TiO 3 thin films.C. Lu, L. Bendersky, K. Chang & I. Takeuchi - 2003 - Philosophical Magazine 83 (13):1565-1595.
    The near-interface region of an epitaxial Ba 0.3 Sr 0.7 TiO 3 thin film grown on LaAlO 3 was found to consist of a high density of stacking faults bounded by partial dislocations. The stacking faults can extend over large distances . Various possible atomic configurations of the faults were considered. The atomic structures of the faults were identified using high-resolution electron microscopy and simulation as well as energy-filtered imaging. The and faults were found to lie predominately on the {100} (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  42
    Avian Identification of jiu 鳩 in the ShijingAvian Identification of jiu in the Shijing.C. M. Lai - 1997 - Journal of the American Oriental Society 117 (2):350.
  7.  63
    A Conceptual Approach for a Quantitative Economic Analysis of Farmers’ Decision-Making Regarding Animal Welfare.É Gocsik, H. W. Saatkamp, C. C. de Lauwere & A. G. J. M. Oude Lansink - 2014 - Journal of Agricultural and Environmental Ethics 27 (2):287-308.
    Decisions related to animal welfare standards depend on farmer’s multiple goals and values and are constrained by a wide range of external and internal forces. The aim of this paper is twofold, i.e., to develop a theoretical framework for farmers’ AW decisions that incorporates farmers’ goals, use and non-use values and to present an approach to empirically implement the theoretical framework. The farmer as a head of the farm household makes choices regarding production to maximize the utility of the household. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  37
    Emotion identification across adulthood using the Dynamic FACES database of emotional expressions in younger, middle aged, and older adults.Catherine A. C. Holland, Natalie C. Ebner, Tian Lin & Gregory R. Samanez-Larkin - 2018 - Cognition and Emotion 33 (2):245-257.
    ABSTRACTFacial stimuli are widely used in behavioural and brain science research to investigate emotional facial processing. However, some studies have demonstrated that dynamic expressions elicit stronger emotional responses compared to static images. To address the need for more ecologically valid and powerful facial emotional stimuli, we created Dynamic FACES, a database of morphed videos from younger, middle-aged, and older adults displaying naturalistic emotional facial expressions. To assess adult age differences in emotion identification of dynamic stimuli and to provide normative (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  41
    Nosewitness Identification: Effects of Lineup Size and Retention Interval.Laura Alho, Sandra C. Soares, Liliana P. Costa, Elisa Pinto, Jacqueline H. T. Ferreira, Kimmo Sorjonen, Carlos F. Silva & Mats J. Olsson - 2016 - Frontiers in Psychology 7:173324.
    Although canine identification of body odor (BO) has been widely used as forensic evidence, the concept of nosewitness identification by human observers was only recently put to the test. The results indicated that BOs associated with male characters in authentic crime videos could later be identified in BO lineup tests well above chance. To further evaluate nosewitness memory, we assessed the effects of lineup size (Experiment 1) and retention interval (Experiment 2), using a forced-choice memory test. The results (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  24
    Intradimensional variability and concept identification.Robert C. Haygood, Terry L. Harbert & Jane A. Omlor - 1970 - Journal of Experimental Psychology 83 (2p1):216.
  11.  30
    Word identification in reading and the promise of subsymbolic psycholinguistics.Guy C. Van Orden, Bruce F. Pennington & Gregory O. Stone - 1990 - Psychological Review 97 (4):488-522.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  12.  52
    Words, pictures, and priming: On semantic activation, conscious identification, and the automaticity of information processing.T. H. Carr, C. McCauley, R. D. Sperber & C. M. Parmelee - 1982 - Journal of Experimental Psychology 8:757-777.
  13.  17
    L'identification médicolégale des traces biologiques.C. Brandt-Casadevall & Patrice Mangin - 1998 - Médecine et Droit 1998 (32):7-9.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  14
    The Identification of Two Mu'tazilite MSS.Richard C. Martin - 1978 - Journal of the American Oriental Society 98 (4):389-393.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  19
    Identification and functional characterization of electrophysiologically studied cortical neurons.C. D. Woody - 1978 - Behavioral and Brain Sciences 1 (3):510-511.
  16. Scrutinizing Privacy in Multi-Omics Research: How to Provide Ethical Grounding for the Identification of Privacy-Relevant Data Properties.C. W. Safarlou, A. L. Bredenoord, R. Vermeulen & K. R. Jongsma - 2021 - American Journal of Bioethics 21 (12):73-75.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  18
    An Empirical Evaluation of Supervised Learning Methods for Network Malware Identification Based on Feature Selection.C. Manzano, C. Meneses, P. Leger & H. Fukuda - 2022 - Complexity 2022:1-18.
    Malware is a sophisticated, malicious, and sometimes unidentifiable application on the network. The classifying network traffic method using machine learning shows to perform well in detecting malware. In the literature, it is reported that this good performance can depend on a reduced set of network features. This study presents an empirical evaluation of two statistical methods of reduction and selection of features in an Android network traffic dataset using six supervised algorithms: Naïve Bayes, support vector machine, multilayer perceptron neural network, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  20
    The identification of concepts defined by attribute change.Robert C. Haygood & Herbert H. Bell - 1975 - Bulletin of the Psychonomic Society 5 (6):444-446.
  19.  50
    Managing Socio-Ethical Challenges in the Development of Smart Farming: From a Fragmented to a Comprehensive Approach for Responsible Research and Innovation.C. Eastwood, L. Klerkx, M. Ayre & B. Dela Rue - 2019 - Journal of Agricultural and Environmental Ethics 32 (5):741-768.
    Smart farming has largely been driven by productivity and efficiency aims, but there is an increasing awareness of potential socio-ethical challenges. The responsible research and innovation approach aims to address such challenges but has had limited application in smart farming contexts. Using smart dairying research and development in New Zealand as a case study, we examine the extent to which principles of RRI have been applied in NZ smart dairying development and assess the broader lessons for RRI application in smart (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  20.  32
    Identification of emotional facial expressions among behaviorally inhibited adolescents with lifetime anxiety disorders.Bethany C. Reeb-Sutherland, Lela Rankin Williams, Kathryn A. Degnan, Koraly Pérez-Edgar, Andrea Chronis-Tuscano, Ellen Leibenluft, Daniel S. Pine, Seth D. Pollak & Nathan A. Fox - 2015 - Cognition and Emotion 29 (2):372-382.
  21.  44
    On the Question of Identification of a Scientific Theory (A Reply to "Van Fraassen's Concept of Empirical Theory" by Pérez Ransanz).Bas C. Van Fraassen & Pérez Ransanz - 1985 - Critica 17 (51):21 - 29.
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  38
    Documentation of Capacity and Identification of Substitute Decisionmakers in Ontario.Thomas C. Foreman, Dorothyann Curran, Joshua T. Landry & Michael A. Kekewich - 2014 - Cambridge Quarterly of Healthcare Ethics 23 (3):334-340.
    Documenting capacity assessments and identifying substitute decisionmakers in healthcare facilities is ethically required for optimal patient care. Lack of such documentation has the potential to generate confusion and contention among patients, their family members, and members of the healthcare team. An overview of our research at the Ottawa Hospital and issues that influence the consistency of documentation in the Canadian context are presented here, as well as ideas for the mitigation of these issues and ways to encourage better documentation.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23. Identification and Appearance as Epistemic Groundwork.Nicolas C. Gonzalez - 2023 - Logos and Episteme 14 (4):439-449.
    The idea that appearances provide justifications for beliefs—the principle of phenomenal conservatism—is self-evidently true. In the case of cognitive penetration, however, it seems that certain irrational etiologies of a belief may influence the epistemic quality of that belief. Susanna Siegel argues that these etiologies lead to ‘epistemic downgrade.’ Instead of providing us with a decisive objection, cognitive penetration calls for us to clarify our epistemic framework by understanding the formative parts of appearances. In doing so, the two different but inseparable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  20
    The Digital Print: Identification and Preservation.Martin C. Jürgens (ed.) - 2009 - Getty Conservation Institute.
    This invaluable resource demystifies the complex, rapidly changing, and sometimes confusing world of digital print technologies.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25. Stakeholder engagement by South African businesses: Identification and prioritization of stakeholders.J. C. Mwangi, L. J. Vuuren & G. J. Rossouw - 2005 - African Journal of Business Ethics 1 (1):39.
    The term "stakeholder engagement" has gained increasing prominence over the last few years. This prominence is fueled by a range of issues such as an increased dissatisfaction with business's focus on stockholder/shareholder interests and the demands for greater transparency from business following major business scandals. A perceived response to this issue in South Africa has been the inclusion of guidelines on stakeholder engagement in the King II Report on Corporate Governance. Despite this growing interest, there has not been clarity on (...)
     
    Export citation  
     
    Bookmark  
  26.  78
    Causation and the identification of actions: Comments.V. C. Chappell - 1963 - Journal of Philosophy 60 (23):700-701.
  27.  17
    Solution mode in concept-identification problems and magnitude of the overlearning reversal effect.Barry Lowenkron & Erik C. Driessen - 1971 - Journal of Experimental Psychology 89 (1):85.
  28. Stakeholder engagement by South African businesses: Identification and prioritization of stakeholders.J. C. Mwangi, L. J. van Vuuren & G. J. Rossouw - 2005 - African Journal of Business Ethics 1 (1):39.
    The term "stakeholder engagement" has gained increasing prominence over the last few years. This prominence is fueled by a range of issues such as an increased dissatisfaction with business's focus on stockholder/shareholder interests and the demands for greater transparency from business following major business scandals. A perceived response to this issue in South Africa has been the inclusion of guidelines on stakeholder engagement in the King II Report on Corporate Governance. Despite this growing interest, there has not been clarity on (...)
     
    Export citation  
     
    Bookmark  
  29.  18
    (1 other version)Identification of grain boundary dislocations.C. T. Forwood & P. Humble - 1975 - Philosophical Magazine 31 (5):1025-1048.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  14
    Qualitative system identification: deriving structure from behavior.A. C. Cem Say & Selahattin Kuru - 1996 - Artificial Intelligence 83 (1):75-141.
  31.  19
    Identification of Visual Attentional Regions of the Temporoparietal Junction in Individual Subjects using a Vivid, Novel Oddball Paradigm.Kathryn J. Devaney, Maya L. Rosen, Emily J. Levin & David C. Somers - 2019 - Frontiers in Human Neuroscience 13.
  32. Hostile Epistemology.C. Thi Nguyen - 2023 - Social Philosophy Today 39:9-32.
    Hostile epistemology is the study of how environmental features exploit our cognitive vulnerabilities. I am particularly interested in those vulnerabilities arise from the basic character of our epistemic lives. We are finite beings with limited cognitive resources, perpetually forced to reasoning a rush. I focus on two sources of unavoidable vulnerability. First, we need to use cognitive shortcuts and heuristics to manage our limited time and attention. But hostile forces can always game the gap between the heuristic and the ideal. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  33. Tempered realism about the force of selection.C. Kenneth Waters - 1991 - Philosophy of Science 58 (4):553-573.
    Darwinians are realists about the force of selection, but there has been surprisingly little discussion about what form this realism should take. Arguments about the units of selection in general and genic selectionism in particular reveal two realist assumptions: (1) for any selection process, there is a uniquely correct identification of the operative selective forces and the level at which each impinges; and (2) selective forces must satisfy the Pareto-style requirement of probabilistic causation. I argue that both assumptions are (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   82 citations  
  34.  17
    War and Ethics in the Ancient Near East: Military Violence in Light of Cosmology and History.C. L. Crouch - 2009 - Walter de Gruyter.
    The monograph considers the relationships of ethical systems in the ancient Near East through a study of warfare in Judah, Israel and Assyria in the eighth and seventh centuries BCE. It argues that a common cosmological and ideological outlook generated similarities in ethical thinking. In all three societies, the mythological traditions surrounding creation reflect a strong connection between war, kingship and the establishment of order. Human kings’ military activities are legitimated through their identification with this cosmic struggle against chaos, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  26
    Ambivalent Identification as a Moderator of the Link Between Organizational Identification and Counterproductive Work Behaviors.Valeria Ciampa, Moritz Sirowatka, Sebastian C. Schuh, Franco Fraccaroli & Rolf van Dick - 2019 - Journal of Business Ethics 169 (1):119-134.
    Although counterproductive work behaviors can be extremely damaging to organizations and society as a whole, we do not yet fully understand the link between employees’ organizational attachment and their intention to engage in such behaviors. Based on social identity theory, we predicted a negative relationship between organizational identification and counterproductive work behaviors. We also predicted that this relationship would be moderated by ambivalent identification. We explored counterproductive work behaviors toward the organization and other individuals. Study 1, a survey (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Darius the Mede: A Study in Historical Identification.J. C. WHITCOMB - 1959
    No categories
     
    Export citation  
     
    Bookmark  
  37.  29
    Ethics and Amniocentesis for Fetal Sex Identification.John C. Fletcher - 1980 - Hastings Center Report 10 (1):15-17.
  38.  9
    Hegel: Lectures on the Philosophy of Religion Volume Iii: Volume Iii: The Consummate Religion.Peter C. Hodgson (ed.) - 2007 - Oxford University Press UK.
    The Hegel Lectures Series Series Editor: Peter C. Hodgson Hegel's lectures have had as great a historical impact as the works he himself published. Important elements of his system are elaborated only in the lectures, especially those given in Berlin during the last decade of his life. The original editors conflated materials from different sources and dates, obscuring the development and logic of Hegel's thought. The Hegel Lectures series is based on a selection of extant and recently discovered transcripts and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  14
    Recall and recognition memory in concept identification.Robert C. Calfee - 1969 - Journal of Experimental Psychology 81 (3):436.
  40.  32
    Plutarch, Alexander and Caesar: Two New Fragments?C. B. R. Pelling - 1973 - Classical Quarterly 23 (2):343-344.
    Niebuhr saw that several paragraphs had been lost from the beginning of the Caesar; Ziegler suggested that the lacuna extended to the end of the Alexander. Both hypotheses are confirmed, if the identification of two new fragments is admitted.At 10. 11 p. 368, Zonaras is epitomizing the text of Caes.; he recounts the Story of Caes. 60. 3, and continues: Editors leave the provenance of the passage unspecified: ‘addita sunt pauca de nomine Caesaris‘. The correction of the vulgar error (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. The Body and the Self-Identification of Conscious Life: The Science of Man between Physiology and Psychology in Maine de Biran.C. Canullo - 2000 - Analecta Husserliana 66:203-224.
     
    Export citation  
     
    Bookmark  
  42.  15
    Ave ancilla trinitatis (Goldenes ‘Ave Maria’ ): The Identification of a Marian Prayer-Type in Mechthild von Magdeburg’s ‘Das fließende Licht der Gottheit’.William C. McDonald - 2012 - Frühmittelalterliche Studien 46 (1):301-320.
    Name der Zeitschrift: Frühmittelalterliche Studien Jahrgang: 46 Heft: 1 Seiten: 301-320.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. Théologies politiques et eschatologie.C. Duquoc - 1996 - Recherches de Science Religieuse 84 (1):67-86.
    Les théologies politiques et de la libération semblent de nos jours en voie d'essoufflement, et ce phénomène pose problème.Elles s'étaient situées, en Europe, sur le terrain de la modernité, de la liberté, de la solidarité avec les victimes d'une histoire de violences ; en Amérique Latine, elles s'étaient vouées à l'émancipation socio-économique des classes populaires. La pertinence des unes et des autres ne devrait pas être mise en doute : elles prennent au sérieux la Promesse eschatologique, le souci privilégié que (...)
    No categories
     
    Export citation  
     
    Bookmark  
  44.  19
    Memory and identification of simulated odors in elderly and young persons.Joseph C. Stevens, William S. Cain & Annick Demarque - 1990 - Bulletin of the Psychonomic Society 28 (4):293-296.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  18
    The "cycle" of Agathias: new identifications scrutinised.Ronald C. MacCail - 1969 - Journal of Hellenic Studies 89:87-96.
  46. Can focusing attention eliminate parafoveal identification asymmetry.G. Chastain, C. Cline, M. Rumold & G. Burgess - 1992 - Bulletin of the Psychonomic Society 30 (6):481-481.
     
    Export citation  
     
    Bookmark  
  47.  19
    HIP: A Method for Linguistic Hyperbole Identification in Discourse.Christian Burgers, Britta C. Brugman, Kiki Y. Renardel de Lavalette & Gerard J. Steen - 2016 - Metaphor and Symbol 31 (3):163-178.
    ABSTRACTThis article introduces the Hyperbole Identification Procedure, a first systematic method for identifying linguistic hyperbole in discourse. We start by comparing existing definitions of linguistic hyperbole. Based on the commonalities shared by these definitions, we provide our operational definition of hyperbole as “an expression that is more extreme than justified given its ontological referent.” The next section argues why it is useful to identify hyperbole, as with metaphor in Metaphor Identification Procedure Vrije Universiteit, at the level of lexical (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  29
    A Principle-Based Approach to Visual Identification Systems for Hospitalized People with Dementia.T. V. Brigden, C. Mitchell, K. Kuberska & A. Hall - 2024 - Journal of Bioethical Inquiry 21 (2):331-344.
    A large proportion of hospital inpatients are affected by cognitive impairment, posing challenges in the provision of their care in busy, fast-paced acute wards. Signs and symbols, known as visual identifiers, are employed in many U.K. hospitals with the intention of helping healthcare professionals identify and respond to the needs of these patients. Although widely considered useful, these tools are used inconsistently, have not been subject to full evaluation, and attract criticism for acting as a shorthand for a routinized response. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  51
    The IARC Monographs: Updated procedures for modern and transparent evidence synthesis in cancer hazard identification.Jonathan M. Samet, Weihsueh A. Chiu, Vincent Cogliano, Jennifer Jinot, David Kriebel, Ruth M. Lunn, Frederick A. Beland, Lisa Bero, Patience Browne, Lin Fritschi, Jun Kanno, Dirk W. Lachenmeier, Qing Lan, Gérard Lasfargues, Frank Le Curieux, Susan Peters, Pamela Shubat, Hideko Sone, Mary C. White, Jon Williamson, Marianna Yakubovskaya, Jack Siemiatycki, Paul A. White, Kathryn Z. Guyton, Mary K. Schubauer-Berigan, Amy L. Hall, Yann Grosse, Véronique Bouvard, Lamia Benbrahim-Tallaa, Fatiha El Ghissassi, Béatrice Lauby-Secretan, Bruce Armstrong, Rodolfo Saracci, Jiri Zavadil, Kurt Straif & Christopher P. Wild - unknown
    The Monographs produced by the International Agency for Research on Cancer (IARC) apply rigorous procedures for the scientific review and evaluation of carcinogenic hazards by independent experts. The Preamble to the IARC Monographs, which outlines these procedures, was updated in 2019, following recommendations of a 2018 expert Advisory Group. This article presents the key features of the updated Preamble, a major milestone that will enable IARC to take advantage of recent scientific and procedural advances made during the 12 years since (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  34
    Attribute selection in concept identification.Douglas C. Chatfield & Erwin J. Janek - 1972 - Journal of Experimental Psychology 95 (1):97.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 959