Personal identity

Xem 1-20 trên 36 kết quả Personal identity
  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Comparison of Spectral-Only and Spectral/Spatial Face Recognition for Personal Identity Verification

    pdf6p dauphong16 18-02-2012 16 2   Download

  • Roberto Assagioli was an Italian psychiatrist who, in 1910, rejected what he felt was the psychoanalytic overemphasis on analyzing the childhood dynamics underlying psychopathology. Accordingly, he conceived “psychosynthesis,” emphasizing how the human being integrated or synthesized the many aspects of the personality into increasing wholeness. An early student of psychoanalysis, Assagioli respected and valued Freud’s views but considered them “limited” (Assagioli 1965a).

    pdf235p cronus75 13-01-2013 20 6   Download

  • The protection of privacy and personality is one of the most fascinating issues confronting any legal system. This book provides a detailed comparative analysis of the laws relating to commercial exploitation of personality in France, Germany, the United Kingdom and the United States. It examines the difficulties in reconciling privacy and personality with intellectual property rights in an individual’s identity and in balan- cing such rights with the competing interests of freedom of expression and freedom of competition.

    pdf286p lyly_5 23-03-2013 46 4   Download

  • This is the nineteenth book in a series initiated by the Society for Industrial and Organizational Psychology in 1983 (SIOP) and published by Jossey-Bass. Originally published as the Frontiers Series, the SIOP Executive Committee voted in 2000 to change the name of the series to Organizational Frontiers Series in order to enhance the identity and visibility of the series. The purpose of the publication of series volumes in a general sense was to promote the scientific status of the field. Ray Katzell first edited the series, and Irwin Goldstein and Sheldon Zedeck followed him....

    pdf394p kimngan_1 04-11-2012 10 1   Download

  • One of the key tasks for analyzing conversational data is segmenting it into coherent topic segments. However, most models of topic segmentation ignore the social aspect of conversations, focusing only on the words used. We introduce a hierarchical Bayesian nonparametric model, Speaker Identity for Topic Segmentation (SITS), that discovers (1) the topics used in a conversation, (2) how these topics are shared across conversations, (3) when these topics shift, and (4) a person-specific tendency to introduce new topics. ...

    pdf10p nghetay_1 07-04-2013 16 1   Download

  • Security—of our systems, our organizations, our personal identities—is more important than ever, and we, as an industry, need to advance the art and technology of security to make it less elusive, more readily achievable. I’m well aware that being responsible for security in an organization is not an easy job, and my objective for Mission-Critical Security Planner is to make that job easier and the results more effective.

    pdf433p tailieuvip13 19-07-2012 30 7   Download

  • Speaker recognition is the process of automatically extracting personal identity information by analysis of spoken utterances. In this section, speaker recognition is taken to be a general process whereas speaker identification and speaker verification refer to specific tasks or decisionmodes associatedwith this process. Speaker identification refers to the task of determining who is speaking and speaker verification is the task of validating a speaker’s claimed identity.

    pdf22p longmontran 18-01-2010 44 6   Download

  • When retrograde dissociative amnesia is accompanied by suddenly leaving the customary environment and compromised knowledge about personal identity – the condition is named dissociative fugue. Fugues have been reported for over a century, though they were frequently erroneously associated with epilepsy (e.g., Burgl, 1900; Donath, 1899). A century ago, these conditions were named Wanderlust in Germany (cf e.g. Burgl, 1900). Fugue states were described to be preponderant in children and young adults (Dana, 1894; Donath, 1908).

    pdf172p wawawawawa 27-07-2012 32 6   Download

  • People often wear their causes on their t-shirts, in their choice of traditional attire or other garments, or by way of specific costumes, pieces of jewellery or particular accessories. In Was it something I wore? Dress; identity; materiality, the contributors explore the construction and performance of personal and social identities.

    pdf397p chieckhanpieu 21-03-2013 16 5   Download

  • Speaker recognition is the process of automatically extracting personal identity information by analysis of spoken utterances.

    pdf22p nguyen4 17-11-2009 59 4   Download

  • In July 2009, the wife of a high-level government executive in the United Kingdom published personal data in a social networking site. This garnered a lot of attention, not for the confidentiality of the content but for the lack of awareness there is about the accessibility of your online content. There is also another issue at play here, which is the fact that once you publish any picture online, you lose control over it as people leech and republish it on places you do not even know.

    pdf9p khongmuonnghe 04-01-2013 24 4   Download

  • During the time we met as a Commission, tragedies such as the African famines, the leak at the pesticides factory at Bhopal, India, and the nuclear disaster at Chernobyl, USSR appeared to justify the grave predictions about the human future that were becoming commonplace during the mid-1980s. But at public hearings we held on five continents, we also heard from the individual victims of more chronic, widespread disasters: the debt crisis, stagnating aid to and investment in developing countries, falling commodity prices and falling personal incomes.

    pdf93p yeurauxanh88 28-09-2012 21 3   Download

  • Sexual and reproductive health (SRH) was given an international consensus def- inition at the International Conference on Population and Development (ICPD) in 1994. At its core is the promotion of healthy, voluntary and safe sexual and reproductive choices for individuals and couples, including decisions on family size and timing of marriage, that are fundamental to human well-being. Sexual- ity and reproduction are vital aspects of personal identity and key to creating fulfilling personal and social relationships within diverse cultural contexts.

    pdf41p thankinhphanliet 21-12-2012 18 3   Download

  • Article 8 of the Charter of Fundamental Rights of the European Union expressly recognises the fundamental right to the protection of personal data. However, since the adoption of the Data Protection Directive in 1995, broad technological changes have taken place1. The ability of organisations to collect, store and process personal data has increased Not many digital technologies are designed to obtain detailed logs of their usage by individuals, which are then accessible for surveillance and marketing purposes.

    pdf330p bin_pham 05-02-2013 18 2   Download

  • We act in accordance with our self-image. This self-image—which, in turn, governs our every act—is conditioned in varying degree by three factors: heritage, education, and self-education. The part that is inherited is the most immutable. The biological endowment of the individual—the form and capacity of his nervous system, his bone structure, muscles, tissue, glands, skin, senses—are all determined by his physical heritage long before he has any established identity. His self-image develops from his actions and reactions in the normal course of experience....

    pdf186p loaken_1 15-11-2012 17 1   Download

  • debt protection, identity theft protection, credit score tracking, and other products that are supplementary to the credit provided by the card itself. This bulletin outlines the Consumer Financial Protection Bureau’s (“CFPB” or “the Bureau”) expectation that institutions under its supervision and their service providers offer such products in compliance with Federal consumer financial law.

    pdf6p enter1cai 12-01-2013 20 1   Download

  • One way to get a credit reporting agency to quickly block identity theft- related information from appearing on your credit report is to submit a detailed law enforcement report (“Identity Theft Report”). You can obtain an Identity Theft Report by taking this form to your local law enforcement office, along with your supporting documentation. Ask an officer to witness your signature and complete the rest of the information in this section.

    pdf6p enter1cai 12-01-2013 9 1   Download

  • Chapter 3 - Perception and personality in organisations. Chapter learning objectives: Outline the perceptual process, explain how we perceive ourselves and others through social identity, discuss the accuracy of stereotypes, describe the attribution process and two attribution errors, diagram the self-fulfilling prophecy process, discuss three types of diversity initiatives, explain how the johari window can help improve our perceptions,...

    ppt27p tangtuy04 16-03-2016 11 1   Download

  • Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click Dim conn As New OleDb.OleDbConnection("Provider=SQLNCLI;Server=.\SQLEXPRESS;Database=TênData; Uid=sa; Pwd=MậtKhau;") conn.Open() Dim cmd As New OleDb.OleDbCommand("CREATE TABLE persons ( " & _ "AutoId int identity ," &

    pdf1p hoangnhan123 12-10-2009 585 199   Download

  • Những thuật ngữ marketing phổ biến English Tiếng Việt A Advertising Quảng cáo Auction-type pricing Định giá trên cơ sở đấu giá B Benefit Lợi ích .

    pdf21p binhmap_5 07-01-2013 57 19   Download

Đồng bộ tài khoản