Criticism of distance

Xem 1-20 trên 43 kết quả Criticism of distance
  • Ebook Multimedia-based instructional design: computer-based training, web-based training, distance broadcast training, performance-based solutions – Part 1 presents the following content: Chapter 1 introduction to multimedia needs assessment and front-end analysis, chapter 2 needs assessment, chapter 3 front-end analysis, chapter 4 audience analysis, chapter 5 technology analysis, chapter 6 situational analysis, chapter 7 task analysis, chapter 8 critical incident analysis, chapter 9 issue analysis, chapter 10 objective analysis, chapter 11 media analysis, chapter 12 extant data analysis,…

    pdf255p runthenight05 11-01-2023 7 1   Download

  • This research is located spatially and conceptually within site-specific arts practice. There is a rich history here that began with the awakening of artists and institutions in the 1960s to the importance of the conditions of site (Kraus 1977). Here, the critical relationship between artist and their subject spaces set a challenge to how we engage with the environments in which we work and live.

    pdf135p runordie3 06-07-2022 2 0   Download

  • The critical situation of the lining stability occurs when the two tunnels were simultaneously excavated. The following lower tunnel should be excavated at an enough distance behind the preceding upper tunnel. The appropriate distance in this case study is about of three times of the shield length.

    pdf6p viwendy2711 05-10-2021 4 0   Download

  • Many cell lines currently used in medical research, such as cancer cells or stem cells, grow in confluent sheets or colonies. The biology of individual cells provide valuable information, thus the separation of touching cells in these microscopy images is critical for counting, identification and measurement of individual cells.

    pdf12p vikentucky2711 26-11-2020 10 1   Download

  • This paper reveals and analyzes the frequency bifurcation phenomena in the fractional-order inductive power transfer (FOIPT) system with series-series compensation topology. Using fractional calculus theory and electric circuit theory, the circuit model of the series-series compensated FOIPT system is first proposed, then taking the case of a single variable fractional order as an example, three frequency analytical solutions of frequency bifurcation equation are solved by using Taylor expansion method.

    pdf8p dayhoctainha 10-09-2020 17 0   Download

  • It is well known that neighbor discovery is a critical component of proactive routing protocols in wireless ad hoc networks. However there is no formal study on the performance of proposed neighbor discovery mechanisms. This paper provides a detailed model of key performance metrics of neighbor discovery algorithms, such as node degree and the distribution of the distance to symmetric neighbors. The model accounts for the dynamics of neighbor discovery as well as node density, mobility, radio and interference.

    pdf13p kethamoi1 20-11-2019 16 0   Download

  • In this paper, we propose the predictor of the Emergency Braking System (EBS), which adapts to driver’s intentions. For design of such system, we mainly made fuzzy predictor and fuzzy Driver Intention Reader (DIR), using fuzzy algorithm. And, we simulated several typical situations to evaluate the system performance. As a result, we have confirmed the functionality and reliability of the system logics.

    pdf5p praishy2 27-02-2019 33 0   Download

  • A third criterion for effective research on skills transfer is study over time. To be certain that students are transferring skills from their first language rather than using skills learned in their second language, researchers must study subjects who have received reading instruction in their first language prior to receiving it in their second language, and who have received sufficient first-language instruction to have developed a base of first-language skills that can be transferred.

    pdf44p commentcmnr 03-06-2013 59 6   Download

  • There are advantages and disadvantages to using any type of routing protocol.  Some of their inherent pitfalls, and.  Remedies to these pitfalls.  Understanding the operation of distance vector routing is critical to enabling, verifying, and troubleshooting these protocols.RIP: Routing Information Protocol originally specified in RFC 1058.  Metric: Hop count  Hop count greater than 15 means network is unreachable.  Routing updates: Broadcast/multicast every 30 seconds

    pdf71p vanmanh1008 21-05-2013 68 2   Download

  • For example, Iran’s investments in science yielded significantly increased output but a relatively stable acceptance rate from publishers. India likewise increased submissions by nearly 450% but saw a decrease of 4.2% in acceptance rate (Table 4).

    pdf20p docvachiase 03-05-2013 49 3   Download

  • A device which performs logical operations and processes data. Computers are composed of, at a minimum: (1) a central processing unit (CPU) to perform operations; (2) user input devices such as a keyboard, mouse, digitizer or game controller; and (3) a display screen to output information. For the purposes of this specification, computers include both stationary and portable units, including desktop computers, gaming consoles, integrated computers, notebook computers, tablet PCs, desktop-derived servers and workstations.

    pdf34p dacotaikhoan 25-04-2013 37 1   Download

  • Moore (1993) identified three types of interactions that occur in distance education: those between students and subject content, those between students and academics, and those between the students themselves. Until relatively recently, opportunities for interaction between students in distance education programs were limited. The design of such programs therefore tended to follow the instructional model (Okada, 2005) and focus heavily on facilitating student interaction with the subject content. During the past 15 years, the rapid spread of the ...

    pdf12p thieubaotrang 16-04-2013 68 3   Download

  • Once you have identified the relevant database(s), use OneSearch to conduct a comprehensive search in those files. In OneSearch you can search up to 60 databases, browse the indexes using the EXPAND command, display records, or use any of the available system features, such as Duplicate Detection and RANK. For more information on using OneSearch or DIALINDEX, refer to the Dialog Pocket Guide, online at Step-by-step examples of complete search sessions using DIALINDEX appear below.

    pdf216p nhacsihuytuan 13-04-2013 66 3   Download

  • [x-(Adenosyl)alkyl]cobalamins (homoadenosylcobalamins) are useful ana-logues of adenosylcobalamin to get information about the distance between Co and C5¢, which is critical for Co-C bond activation. In order to use them as probes for exploring the active sites of enzymes, the coenzymic properties of homoadenosylcobalamins for diol dehydratase and ethanol-amine ammonia-lyase were investigated. The kcat and kcat ⁄Kmvalues for adenosylmethylcobalamin were about 0.27% and 0.15% that for the regu-lar coenzyme with diol dehydratase, respectively. ...

    pdf10p fptmusic 12-04-2013 46 1   Download

  • Pursuant to the provision of the Privacy Act of 1974, HUD is providing notice of its formal adoption of a new system of records for the Office of General Counsel (OGC) EDiscovery Management System (EDMS). The OGC discovery productions typically require the preservation, collection and analysis of massive emails, word processing documents, PDF files, spreadsheets, presentations, database entries, and other documents in a variety of electronic file formats, as well as paper records.

    pdf12p giamdocamnhac 06-04-2013 42 3   Download

  • The data included below must be interpreted with caution, indeed those providing the data themselves advise caution in using it. The European data comes from the European Business Angel Network (EBAN), and the US data comes from the Angel Capital Association or the Centre for Venture Research, University of New Hampshire. EBAN note that their numbers only include activity that takes place within Business Angel networks, and as such by no means represent the full extent of Business Angel activity existing in Europe.

    pdf0p hongphuocidol 04-04-2013 43 7   Download

  • Organizations using SAS software in conjunction with DBMS systems rely on the semantic power of SAS to develop processes that answer business questions. When they are confident that the model solution they have implemented in SAS is correct, they re-implement part or all of it using development tools that run natively inside their DBMS. They do this to address the challenges listed previously. Companies pay a high price both in terms of manpower and implementation time to remain competitive with market activity.

    pdf12p yasuyidol 02-04-2013 60 5   Download

  • Significant changes have been made to the proposed eastern Chad/northeastern CAR UN peacekeeping force this month. In his latest report, issued August 10 2007, the UN Secretary-General proposed that military tasks and functions will be performed by a European Union military force and last 12 months from the time of the deployment; with a possible UN successor operation likely to follow. This agreement has already been accepted by Chad’s President Idriss Deby.

    pdf19p nhacnenzingme 23-03-2013 57 3   Download

  • Initially the concept of “marketing to children” is defined; examples of marketing techniques are provided and an explanation given as to how marketing works and who is involved. Policy development is then described in a “step-by-step” process, starting with what is required for a situation analysis and moving to the pros and cons of adopting a comprehensive or stepwise policy approach; which children need protection; what communication channels and marketing techniques to target; and what foods should be included or excluded.

    pdf168p dangsuynghi 15-03-2013 78 9   Download

  • They say what doesn’t break you makes you stronger. For hedge funds, 2012 was a backbreaking year to put it mildly. Heightened market volatility, stressed global macroeconomic conditions, and underperformance relative to traditional investing vehicles were just a few of the factors that challenged hedge funds in 2012. Add the extra weight of an increasing regulatory burden, and many fund leaders might have been forgiven for packing it in.

    pdf8p lenh_hoi_xung 01-03-2013 56 7   Download



p_strKeyword=Criticism of distance

nocache searchPhinxDoc


Đồng bộ tài khoản