Results for 'atm'

44 found
Order:
  1. Mobile ATM Buffer Capacity Analysis.Stephen Bush, Evans F., B. Joseph & Victor Frost - 1996 - Acm-Baltzer Mobile Networks and Nomadic Applications 1 (1):67--73.
    This paper extends a stochastic theory for buffer fill distribution for multiple “on‘ and “off‘ sources to a mobile environment. Queue fill distribution is described by a set of differential equations assuming sources alternate asynchronously between exponentially distributed periods in “on‘ and “off‘ states. This paper includes the probabilities that mobile sources have links to a given queue. The sources represent mobile user nodes, and the queue represents the capacity of a switch. This paper presents a method of analysis which (...)
     
    Export citation  
     
    Bookmark  
  2.  25
    ATM Card Cloning and Ethical Considerations.Paramjit Kaur, Kewal Krishan, Suresh K. Sharma & Tanuj Kanchan - 2019 - Science and Engineering Ethics 25 (5):1311-1320.
    With the advent of modern technology, the way society handles and performs monetary transactions has changed tremendously. The world is moving swiftly towards the digital arena. The use of Automated Teller Machine cards has led to a “cash-less society” and has fostered digital payments and purchases. In addition to this, the trust and reliance of the society upon these small pieces of plastic, having numbers engraved upon them, has increased immensely over the last two decades. In the past few years, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  5
    Extending the ATMS.Johan de Kleer - 1986 - Artificial Intelligence 28 (2):163-196.
  4.  8
    Problem solving with the ATMS.Johan de Kleer - 1986 - Artificial Intelligence 28 (2):197-224.
  5.  18
    Hypothesis: Ataxia‐telangiectasia: Is ATM a sensor of oxidative damage and stress?Galit Rotman & Yosef Shiloh - 1997 - Bioessays 19 (10):911-917.
    Ataxia‐telangiectasia (A‐T) is a pleiotropic recessive disorder characterized cerebellar ataxia, immunodeficiency, specific developmental defects, profound predisposition to cancer and acute radiosensitivity. Functional inactivation of single gene product, ATM, accounts for this compound phenotype. We suggest that ATM acts as a sensor of reactive oxygen species and/or oxidative damage cellular macromolecules, including DNA. In turn, ATM induces signalling through multiple pathways, thereby coordinating acute phase stress responses with cell cycle checkpoint control and repair of oxidative damage. Absence of ATM is proposed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6. al-Ḥatm wa-al-ḥurrīyah fī al-qānūn al-ʻilmī.Aḥmad Ibrāhīm Sharīf - 1972 - [Cairo]: Dār al-Taʼlīf wa-al-Nashr.
     
    Export citation  
     
    Bookmark  
  7.  21
    Checkpoint signaling: Epigenetic events sound the DNA strand‐breaks alarm to the ATM protein kinase.Robert T. Abraham - 2003 - Bioessays 25 (7):627-630.
    The ATM protein kinase is centrally involved in the cellular response to ionizing radiation (IR) and other DNA double‐strand‐break‐inducing insults. Although it has been well established that IR exposure activates the ATM kinase domain, the actual mechanism by which ATM responds to damaged DNA has remained enigmatic. Now, a landmark paper provides strong evidence that DNA‐strand breaks trigger widespread activation of ATM through changes in chromatin structure.1 This review discusses a checkpoint activation model in which chromatin perturbations lead to the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  58
    A Control and Management Network for Wireless ATM Systems.Stephen Bush, Jagannath F., Evans Sunil, B. Joseph, Victor Frost, Gary Minden & K. Sam Shanmugan - 1997 - Acm-Baltzer Wireless Networks 3:267--283.
    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network.Stephen F. Bush - 1999 - Dissertation,
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such (...)
     
    Export citation  
     
    Bookmark  
  10.  16
    SQ/TQ cluster domains: concentrated ATM/ATR kinase phosphorylation site regions in DNA-damage-response proteins.Ana Traven & J.�rg Heierhorst - 2005 - Bioessays 27 (4):397-407.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  19
    G. Ballarino (a cura di), "Cogestione, conflitto, confronto. L'ATM di Milano negli anni '90".Asher Colombo - 2002 - Polis 16 (3):465-467.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12. On the Relation Between Nonmonotonic ATMS and ALPSN.K. Nakamatsu & A. Suzuki - 1995 - Proc. Japanese Society for Ai Sig Fai 9502 (1):1-8.
     
    Export citation  
     
    Bookmark  
  13. Electronic Banking Services from the Point of View of Bank Customers in Palestine.Suliman A. El Talla, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (10):45-60.
    This study aims to identify the electronic banking services in Palestine from the point of view of the customers of the banks, where researchers used the descriptive analytical method, through a questionnaire distributed electronically to the sample of beneficiaries of the electronic banking services provided by banks operating in Palestine. The study reached a number of results, the most important of which are: There is a moderate degree of efficiency of electronic banking services provided in banks operating in Palestine from (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14. Do Accelerating Turing Machines Compute the Uncomputable?B. Jack Copeland & Oron Shagrir - 2011 - Minds and Machines 21 (2):221-239.
    Accelerating Turing machines have attracted much attention in the last decade or so. They have been described as “the work-horse of hypercomputation” (Potgieter and Rosinger 2010: 853). But do they really compute beyond the “Turing limit”—e.g., compute the halting function? We argue that the answer depends on what you mean by an accelerating Turing machine, on what you mean by computation, and even on what you mean by a Turing machine. We show first that in the current literature the term (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  15. On Credentials.Barry Smith, Olimpia Giuliana Loddo & Giuseppe Lorini - 2020 - Journal of Social Ontology 6 (1):47-67.
    Credentials play an important role in all modern societies, but the analysis of their nature and function has thus far been neglected by social philosophers. We present a view according to which the function of credentials is certify the identity and the institutional status (including the rights) of individuals. More importantly, credentials enable rights-holders to exercise their rights, so that for a particular right to be exercisable the right-holder should possess, carry and sometimes show to an authority (or QR code (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  9
    Activating the abscission checkpoint: Top2α senses chromatin bridges in cytokinesis.Eleni Petsalaki & George Zachos - 2024 - Bioessays 46 (5):2400011.
    How chromatin bridges are detected by the abscission checkpoint during mammalian cell division is unknown. Here, we discuss recent findings from our lab showing that the DNA topoisomerase IIα (Top2α) enzyme binds to catenated (“knotted”) DNA next to the midbody and forms abortive Top2‐DNA cleavage complexes (Top2ccs) on chromatin bridges. Top2ccs are then processed by the proteasome to promote localization of the DNA damage sensor protein Rad17 to Top2‐generated double‐strand DNA ends on DNA knots. In turn, Rad17 promotes local recruitment (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  36
    ‘Doing Dignity Work’: Indian Security Guards’ Interface with Precariousness.Ernesto Noronha, Saikat Chakraborty & Premilla D’Cruz - 2020 - Journal of Business Ethics 162 (3):553-575.
    Increasing global competition has intensified the use of informal sector workforce worldwide. This phenomenon is true with regard to India, where 92% of the workers hold precarious jobs. Our study examines the dynamics of workplace dignity in the context of Indian security guards deployed as contract labour by private suppliers, recognising that security guards’ jobs were marked by easy access, low status, disrespect and precariousness. The experiences of guards serving bank ATMs were compared with those working in large reputed organisations. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  17
    述語論理知識を扱う全解探索仮説推論の高速化.林 貴宏 越野 亮 - 2001 - Transactions of the Japanese Society for Artificial Intelligence 16:202-211.
    A hypothetical reasoning, which can find an explanation for a given set of observation by assuming some hypothetical sets, is a useful knowledge processing framework because of its theoretical basis and usefulness for practical problems such as diagnostics, scheduling, and design. It is, however, known to be computationally very expensive for large problems because it must deal with incomplete knowledge. Predicate-logic allows powerful and compact knowledge representation compared to propositional-logic. Efficient methods to proceed reasoning have been developed for propositional-logic. However (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  20
    İslam Bilim Tarihi’nde İlk Tercüme Faaliyetleri ve Bilgi Üretimine Katkısı.Mustafa Bariş - 2018 - Cumhuriyet İlahiyat Dergisi 22 (1):705-730.
    Ekonomik ilişkiler ve fetihler sonucu çok geniş bir coğrafyaya yayılan ve bunun bir sonucu olarak da birçok farklı kültürle karşılaşan Müslümanlar, özellikle Bizans (Helen/Yunan), İran ve kısmen Hint kültürleriyle temasları sonucunda bu kültürlere karşı büyük bir ilgi ve merak duymuşlardır. Özellikle İskenderiye, Harran ve Cündişâpûr gibi şehirlerin fethedilmesinin ve bu şehirlerdeki ilmî geleneğin Müslümanlar üzerinde önemli etkileri olmuştur. Nitekim bu fetihler akabinde Müslümanlar, sadece dinî ilimlerle yetinmemiş, bunun yanında antik düşünce geleneğini ve kadim kültürleri tanımak amacıyla o kültürlere ait eserleri (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  7
    Enrichment metrics for the identification of stabilizers of the telomeric G quartet using genetic algorithm.Melissa Correa & Santiago Solorzano - 2020 - Minerva 1 (1):13-23.
    In this study a combination of computer tools for coupling and virtual screening is detailed, in 108 active molecules and 3620 decoys to find stabilizers for G quadruplex. To have more precise results, combinations of coupling programs with fifteen energy scoring functions were applied. The validation and evaluation of the metrics was done with the CompScore genetic algorithm. The results showed an increase in BEDROC and EF of 50% compared to other strategies, as well as reflecting early recognition of active (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  13
    La recuperación psicocorporal como eje básico para la formación valoral ambiental.R. Eisenberg, C. Chávez, V. Cuevas, J. Gutiérrez, S. Rosas & A. M. Landázuri - 2004 - Polis: Revista Latinoamericana 9.
    Se presentan en este artículo los resultados que surgieron de incorporar lecciones de Autoconciencia por el Movimiento (ATM) -como estrategia pedagógica- para reconocer y actuar en pro de nuestro ambiente interno y externo, realizado con un grupo interprofesional de mujeres. El grupo se forma e investiga a sí mismo, bajo el enfoque de la Investigación Acción Participativa, y busca comprender mejor los procesos de formación ambiental en los campos de la salud y el ambiente.
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  5
    African Traditional Medicine: Autonomy and Informed Consent.Peter Ikechukwu Osuji - 2014 - Cham: Imprint: Springer.
    This book focuses on informed consent in African Traditional Medicine (ATM). ATM forms a large portion of the healthcare systems in Africa. WHO statistics show that as much as 80% of the population in Africa uses traditional medicine for primary health care. With such a large constituency, it follows that ATM and its practices should receive more attention in bioethics. By comparing the ethics of care approach with the ATM approach to Relational Autonomy In Consent (RAIC), the authors argue that (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  88
    Abusing One’s Position.Huw Price - 2011 - Philosophy and Phenomenological Research 82 (3):772-779.
    I once stood staring at a map in a large US airport, looking for an ATM. Next to me a couple also stared at the map, trying to figure out where in the airport they were. “Sheesh!” said the male at last, pointing to the red dot and the words ‘You are here’ in the key beside the map: “We’re way over here, right off the map!” Jenann Ismael’s understanding of red dots lies very much at the other extreme, but (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  24.  18
    Actors, objects, figures: the sociomaterial turn in action theory.Felipe Raglianti - 2018 - Cinta de Moebio 63:343-356.
    Resumen: Algo particular de los estudios de la ciencia, tecnología y sociedad son sus formas de relacionar objetos y prácticas. La relación difiere del papel que tiene en la sociología de la ciencia y en la construcción social de la tecnología. Suele afirmarse en CTS, contradiciendo conocimientos humanistas, que la naturaleza de los actores sociales no estaría definida por adelantado. Asumir lo semiótico como algo excepcional del sujeto humano, donde los objetos sólo acreditan sus agencias a través de procesos simbólicos, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  22
    Fransız Şarkiyat Kurumu Inalco’nun Kuruluş, Gelişim ve Faaliyet Alanlarının Tespiti.Hakan Temi̇r & İsmail Meti̇n - 2023 - Cumhuriyet İlahiyat Dergisi 27 (3):786-808.
    Dil, düşüncelerin ifade edilmesini, bilgi aktarımını ve sosyal etkileşimi sağlayan temel bir olgudur. Dil eğitimi ise kültürler arası iletişimi kolaylaştıran ve dünya genelinde etkili iletişim kurma becerisi kazandıran bir faaliyettir. Birden fazla dil bilmek, farklı kültürlere ve bakış açılarına açık olmayı sağlar. Yaşadığı dünya düzeni içerisinde çağın gerisinde kalmak istemeyen, uygar ve etkileşimli bir toplum olma niyetini taşıyan Fransa hükümet yetkilileri dil eğitimi konusunda ciddi adımlar atmıştır. 1795 yılında Doğu dilleri üzerine uzmanlaş Inalco’yu kurarak başta Osmanlı olmak üzere İslâm dünyasının (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26.  15
    Bileşimsellik İlkesinin Önemsizliği Üzerine.Toy Tolgahan - 2023 - Felsefe Arkivi 58:23-37.
    Anlambilimsel bileşimsellik ilkesi, herhangi bir ifadenin anlamının o ifadenin parçalarının anlamlarının bir fonksiyonu olduğunu bildirmektedir. İlke Gottlob Frege’nin dilsel anlamı fonksiyon argüman uygulaması olarak ele alan çalışmalarına dayanmaktadır. Bileşimselliğin, Richard Montague ile birlikte biçimsel anlambilim içerisinde merkezi bir rol aldığı görülmektedir. Bileşimsellik ilkesi, dilsel yapı ve anlamsal yapı arasında homomorfik bir ilişki bulunduğunu bildirmektedir. İlkenin savunucuları bileşimselliğin dilin sistematik ve üretken yapısına önemli katkılar sağladığını iddia etmektedirler. Wlodek Zadrozny, bu görüşe karşı olarak, bileşimselliğin dilin sistematik yapısına herhangi bir katkı sağlamadığını (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  9
    HIPK2: A tumour suppressor that controls DNA damage‐induced cell fate and cytokinesis.Thomas G. Hofmann, Carolina Glas & Nadja Bitomsky - 2013 - Bioessays 35 (1):55-64.
    In response to DNA‐damage, cells have to decide between different cell fate programmes. Activation of the tumour suppressor HIPK2 specifies the DNA damage response (DDR) and tips the cell fate balance towards an apoptotic response. HIPK2 is activated by the checkpoint kinase ATM, and triggers apoptosis through regulatory phosphorylation of a set of cellular key molecules including the tumour suppressor p53 and the anti‐apoptotic corepressor CtBP. Recent work has identified HIPK2 as a regulator of the ultimate step in cytokinesis: the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  15
    Economies of disclosure.Jeff Bollinger - 2004 - Acm Sigcas Computers and Society 34 (3):1-1.
    Imagine this scenario: a bank customer walks up to an ATM to withdraw cash from her account. While entering her PIN, she accidentally presses the '3' key at the same time as the 'Clear' key. Instantly $100 comes out of the cash dispenser! Curious, she checks the receipt and seeing that the money did not from her account, she tries the same operation. Again, $100 comes out of the cash dispenser. At this point she has two options, A: she can (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  29.  12
    ATP puts the brake on DNA double‐strand break repair.Karl-Peter Hopfner - 2014 - Bioessays 36 (12):1170-1178.
    DNA double‐strand breaks (DSBs) are one of the most deleterious forms of DNA damage and can result in cell inviability or chromosomal aberrations. The Mre11‐Rad50‐Nbs1 (MRN) ATPase‐nuclease complex is a central player in the cellular response to DSBs and is implicated in the sensing and nucleolytic processing of DSBs, as well as in DSB signaling by activating the cell cycle checkpoint kinase ATM. ATP binding to Rad50 switches MRN from an open state with exposed Mre11 nuclease sites to a closed (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  51
    Reliability in Plantinga´s Account of Epistemic Warrant.John Wingard Jr - 2002 - Principia: An International Journal of Epistemology 6 (2):249-278.
    In das paper 1 ccmstder the rehabday condaton in Atm PlanungaS's proper functionabst account of eptstemtc warrant I begm by reviewing m some detail the features of the rehabdity condition as Planunga lias aruculated a From there, 1 consider what is needed to ground or secure the sort of rehability whzch Plantinga has m mind, and argue that what is needed is a significant causai condam which has generally been overlooked Then, after identifying eight verstons of the relevant sort of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  3
    Checking in on Cds1 (Chk2): A checkpoint kinase and tumor suppressor.Clare H. McGowan - 2002 - Bioessays 24 (6):502-511.
    Together, DNA repair and checkpoint responses ensure the integrity of the genome. Coordination of cell cycle checkpoints and DNA repair are especially important following genotoxic radiation or chemotherapy, during which unusually high loads of DNA damage are sustained. In mammalian cells, the checkpoint kinase, Cds1 (also known as Chk2) is activated by ATM in response to DNA damage. The role of Cds1 as a checkpoint kinase depends on its ability to phosphorylate cell cycle regulators such p53, Cdc25 and Brca1. A (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  21
    Closing the gaps among a web of DNA repair disorders.Rhett J. Michelson & Ted Weinert - 2000 - Bioessays 22 (11):966-969.
    As recently as six years ago, three human diseases with similar phenotypes were mistakenly believed to be caused by a single genetic defect. The three diseases, Ataxia-telangiectasia, Nijmegen breakage syndrome, and an AT-like disorder are now known, however, to have defects in three separate genes: ATM, NBS1, and MRE11. Furthermore, new recent studies have shown now that all three gene products interact; the ATM kinase phosphorylates NBS1,1 which, in turn, associates with MRE11 to regulate DNA repair. Remarkably or expectedly, depending (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  21
    ユビキタス環境と Web サービスを仲介するミドルエージェントの開発.Nakaido Takeshi Terasaki Tatsuya - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:343-350.
    According to the widespread use of Web Services, composition of multiple services is becoming a main issue. BPEL was proposed as a Web Services workflow language in this context. Then, in many cases we need much interactions between a service requester and a BPEL process execution engine. However for the end user under the ubiquitous environment where the service is executed with a cellular phone or PDA, the interaction means simply a burden. The reason is: (1)it is hard to carry (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. Le credenziali: parole, disegni e poteri deontici.Barry Smith - 2020 - Teoria E Critica Della Regolazione Sociale 1 (20):59-73..
    Driving licenses, identity cards, passports, boarding passes, credit cards, ATM cards – all of these are examples of credentials. Credentials are documents that play a fundamental role in all modern societies. However, philosophers and social ontologists have not yet addressed the analysis of their nature and function. This paper aims to fill this gap through a review of the essential characteristics of credentials, as documents whose primary purpose is to certify the identity and institutional status of the bearer, for example (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. Infinitely Complex Machines.Eric Steinhart - 2007 - In Intelligent Computing Everywhere. Springer. pp. 25-43.
    Infinite machines (IMs) can do supertasks. A supertask is an infinite series of operations done in some finite time. Whether or not our universe contains any IMs, they are worthy of study as upper bounds on finite machines. We introduce IMs and describe some of their physical and psychological aspects. An accelerating Turing machine (an ATM) is a Turing machine that performs every next operation twice as fast. It can carry out infinitely many operations in finite time. Many ATMs can (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  31
    Prosthetic gods: The posthuman threat of self-service technology.Thomas B. Cavanagh - 2008 - Interaction Studies 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the exploitation of consumers (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  18
    Prosthetic gods: The posthuman threat of self-service technology.Thomas B. Cavanagh - 2008 - Interaction Studiesinteraction Studies Social Behaviour and Communication in Biological and Artificial Systems 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the exploitation of consumers (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  9
    Prosthetic gods.Thomas B. Cavanagh - 2008 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the exploitation of consumers (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  18
    Seventh International Buddhist-Christian Conference.David W. Chappell - 2001 - Buddhist-Christian Studies 21 (1):109-111.
    In lieu of an abstract, here is a brief excerpt of the content:Buddhist-Christian Studies 21.1 (2001) 109-111 [Access article in PDF] Seventh International Buddhist-Christian Conference David W.Chappell Soka University of America Pack your bags! The annual meeting of the Society for Buddhist-Christian Studies in Nashville decided that the next international conference will be held August 5-12, 2003, in Chiang Mai, Thailand.An invitation was extended to the society by Dr. John Butt, director of the Institute for the Study of Religion and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  15
    Tumorigenesis and neurodegeneration: two sides of the same coin?John F. Staropoli - 2008 - Bioessays 30 (8):719-727.
    Dysregulation of genes that control cell‐cycle progression and DNA repair is a hallmark of tumorigenesis. It is becoming increasingly apparent, however, that these defects also contribute to degeneration of post‐mitotic neurons under certain conditions. The gene for ataxia‐telangiectasia mutated (ATM) is a prototype for this dual mechanism of action, with loss‐of‐function mutations causing not only selective degeneration of cerebellar neurons but also increased susceptibility to breast cancer and hematologic malignancy. Increased dosage of amyloid precursor protein in Down syndrome (trisomy 21) (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  23
    Malezya Kamusal Zekât Uygulaması Üzerine = On the Malaysian Public Zakat Administration.İsmail Yalçın - 2016 - Cumhuriyet İlahiyat Dergisi 20 (2):235-235.
    Zakat is a monetary form of religious worship that establishes a bridge between a rich and a poor, helps those who are in need and contributes to peace and tranquillity within a society. When zakat is collected properly under a government control and transmitted to those who deserve, it helped to decrease the gap between the poor and the rich, supported activities of social solidarity and revived the economy as well. Malaysia after its independence in 1957 has developed an interest (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  20
    The Influence of Niẓām al-Mulk: Potrait of An Authorizied Vizier.Nurullah Yazar - 2020 - Cumhuriyet İlahiyat Dergisi 24 (1):247-266.
    Türk ve İslam tarihinin kırılma noktalarından birisi 1040 yılında Selçuklular ile Gazneliler arasında cereyan eden Dandanakan Savaşı’dır. Savaşın ardından Selçuklular hızlı bir yükselişle özellikle Sünnî İslam coğrafyasında etkin ve belirleyici güç haline gelmiştir. Göçebe kültürden gelen ve bir oba hüviyetinde iken çok kısa bir sürede önlenemez bir şekilde hâkimiyet alanını Türkistan coğrafyasından Anadolu içlerine kadar genişleten Büyük Selçuklu Devleti, kurumsal olarak da olgunlaşmaya başlamıştır. Bu noktada hem merkezi yönetimde hem de vilayetlerde ortaya çıkan yetişmiş eleman ihtiyacını birçoğu daha önce Gazneli (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  13
    Impact of Spatial Orientation Ability on Air Traffic Conflict Detection in a Simulated Free Route Airspace Environment.Jimmy Y. Zhong, Sim Kuan Goh, Chuan Jie Woo & Sameer Alam - 2022 - Frontiers in Human Neuroscience 16:739866.
    In the selection of job candidates who have the mental ability to become professional ATCOs, psychometric testing has been a ubiquitous activity in the ATM domain. To contribute to psychometric research in the ATM domain, we investigated the extent to which spatial orientation ability (SOA), as conceptualized in the spatial cognition and navigation literature, predicted air traffic conflict detection performance in a simulated free route airspace (FRA) environment. The implementation of free route airspace (FRA) over the past few years, notably (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  6
    فتح الجليل على عبده الذَّليل في بيان ما ورد في الاستخلاف في الجمعة من الأقاويل لنوح بن مصطفى القونوي (ت:1070هـ/1660م) دراسة وتحقيق. [REVIEW]Hamza Kheli̇fati̇ - 2019 - van İlahiyat Dergisi 7 (11):194-206.
    Bu çalı ş mada Nuh b. Mustafa el-Konevi’nin “fethu'l-celil alâ abdihi'z-zelîl fî beyâni mâ verede fi'l-istihlâf fi'l-cümü'ati mine'l-ekâvil ” adlı risalesinin tahkikli çalı ş ması yapıldı. Büyük bir alim ve fakih olan müellifimiz zamanın Konya müftüsüdür. Mısır’a tabli ğ ve ilmi faaliyetlerini gerçekleçtirmek için hicret ettikten sonra orada vefat etmi ş tir. İ lmi alanlarda bir çok gayreti vardır. Özellikle fıkıh ve fıkıh usulü sahasında önemli eserlere imza atmı ş tır. Söz konusu bu risale, süleymaniye kütüphanesine ba ğ lı veliyüddin (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark