oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

时间不限

( 2023 )

( 2019 )

( 2018 )

( 2017 )

自定义范围…

匹配条件: “ Kester;” ,找到相关结果约90条。
列表显示的所有文章,均可免费获取
第1页/共90条
每页显示
Psicologia e a constru o da cidadania
Kester Carrara
Psicologia: Ciência e Profiss?o , 1996, DOI: 10.1590/s1414-98931996000100003
Abstract:
Rese a de "El legado de Rubén Ardila. Psicología: de la Biología a la Cultura" de Luis Flóres Alarcón (ed.)
Kester Carrara
Revista Interamericana de Psicología , 2004,
Abstract:
Rese a de "Trece Trucos de Magia:El Origen Verbal de los Mitos en Psicología" de Juan A. Robinson
Kester Carrara
Revista Interamericana de Psicología , 2005,
Abstract:
J. Heijs, F. Westra, Que le tigre danse. Huub Bals. Een biografie
B. Kester
BMGN : Low Countries Historical Review , 1998,
Abstract:
A. Karskens, Pleisters op de ogen, pleister op de mond. De geschiedenis van de Nederlandse oorlogsverslaggeving van Heiligerlee tot Kosovo
B. Kester
BMGN : Low Countries Historical Review , 2002,
Abstract:
The noncoding universe
Kester Jarvis, Miranda Robertson
BMC Biology , 2011, DOI: 10.1186/1741-7007-9-52
Abstract: BMC Biology first tackled these questions [1] on the publication of a somewhat combative paper from Tim Hughes and colleagues in PLoS Biology [2] challenging earlier claims of pervasive transcription of noncoding DNA, and of a Q&A for BMC Biology from John Mattick, who is a particularly energetic and articulate exponent of the notion that an extensive noncoding transcriptome with regulatory functions accounts for the evolution of organismal complexity [3]. More than a year on, PLoS Biology has published a rejoinder from Mattick and colleagues [4] to the paper from van Bakel et al. [2], along with a rejoinder to the rejoinder from van Bakel et al.[5].The original contention of van Bakel et al. was, broadly speaking, that if you analyze the transcriptome with RNA-seq technology rather than with the tiling array technology that is the basis for much of the most notable evidence of pervasive transcription, the genome looks considerably less pervasively transcribed; and that most of the noncoding transcription occurs in the vicinity of active genes and can probably be accounted for by leaky transcriptional machinery and excised introns. One obvious question - raised at the time, and now explored by Clark et al. [4] - is whether RNA-seq analysis is more reliable than microarray-based techniques for the measurement of the transcriptome. The more fundamental and difficult question is whether most of the noncoding RNA of unknown function is in fact just transcriptional noise and meaningless intronic debris, or whether it has important regulatory functions yet to be discovered. These questions are not answered by the opposing Perspective articles published in PLoS Biology.The following statements can probably be regarded as non-contentious. Most dark matter transcripts are, as stated in the title of van Bakel et al. [2] and acknowledged by Clark et al. [4], associated with known genes. Rare transcripts that are detected by microarray analysis may be missed by RNA-seq. But in
Open-Distance Education as a Mechanism for Sustainable Development: Reflections on the Nigerian experience
Rashid Aderinoye,Kester Ojokheta
International Review of Research in Open and Distance Learning , 2004,
Abstract: This article examines open-distance learning in Nigeria and the role it plays in personal, community, and national development. Following consultation with existing literature, a qualitative survey was conducted using questionnaires, interviews, and participatory experience. Although particular emphasis was paid to the Nigerian context, the findings in this article may be regarded as reflective distance education experiences elsewhere in Africa. Clearly, education is the key to human development and progress. It is essential to bring about changes in attitudes, values, and behaviour. Used ethically, distance education may enable people to make informed choices about their present life and future. Moreover, these assertions have been credited to many scholars and institutions at one time or the other. The question here, however, is: To what extent are these assertions true of education, and more especially of those individuals benefiting from open and distance learning in Nigeria? This and more incisive issues constitute the substance of this article.
The Role of Rural Banks in Providing Mobile Money Services to Rural Poor Communities: An effective integration approach of Rural Banks and existing mobile communications infrastructure
Quist-Aphetsi Kester
Computer Science , 2013,
Abstract: The rapid spread of mobile phones means that the number of mobile users may already exceed the number of banked people in many low income countries. Mobile phones can also offer a communications channel for initiating and executing on-line financial transactions. This channel may not only reduce the cost of financial transactions for provider and customer, but also allow new entrants to the financial sector, and new relationships to be formed for distributing services. These changes hold the prospect of accelerating access to financial services on the back of the mobile infrastructure. Mobile telephony offers tremendous promise to facilitate the flow of money among rural and poor families at much lower transaction costs, bringing the bank to those currently unbanked. Realizing this promise will require close collaboration among all stakeholders. But most rural banks do not have mobile banking services for their customers. This made it difficult for the full potential and benefits of mobile money financial services to be realized. Most telecommunication service providers run mobile money service solely for their subscribers without an integrated approach of incorporating and integrating rural banking systems into their existing services this makes it difficult for a full fledge exploitation of the mobile financial market. This paper looks at the existing mobile money services and takes critical look at the positive advantages of effective integration approach of Rural Banks and existing mobile communications infrastructure as well as proposing a model for such integration.
A Visual Cryptographic Encryption Technique for Securing Medical Images
Quist-Aphetsi Kester
Computer Science , 2013, DOI: 10.5120/16500-5752
Abstract: The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized personnel with patient. This paper presented a visual cryptographic technique for encrypting of medical images before transmission or storage of them. This will make such images inaccessible by unauthorized personnel and also ensures confidentiality. The process made use of an encryption technique that is based on pixel shuffling and a secret key generated from the image.
Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis
Quist-Aphetsi Kester
Computer Science , 2013,
Abstract: In this world of terrorism, it is very important to know the network of individual suspects. It is also important to analyze the attributes of members of a network and the relationships that exist between them either directly or indirectly. This will make it easy for concepts to be built in aiding criminal investigations. However traditional approaches cannot be used to visualize and analyze data collected on individuals. With this current day where information systems play critical role in everyday life of every individual, it is easier to depend on digital information in fighting crime.Effective computer tools and intelligent systems that are automated to analyze and interpret criminal data in real time effectively and efficiently are needed in fighting crime. These current computer systems should have the capability of providing intelligence from raw data and creating a visual graph which will make it easy for new concepts to be built and generated from crime data in order to solve understand and analyze crime patterns easily. This paper proposes a new method of computer aided investigation by visualizing and analyzing data of mobile communication devices using Formal Concept Analysis, or Galois Lattices, a data analysis technique grounded on Lattice Theory and Propositional Calculus. This method considered the set of common and distinct attributes of data in such a way that categorizations are done based on related data with respect to time and events. This will help in building a more defined and conceptual systems for analysis of crime data that can easily be visualized and intelligently analyzed by computer systems.
第1页/共90条
每页显示


Home
Copyright © 2008-2020 Open Access Library. All rights reserved.