Results 31 to 40 of about 471,112 (353)
Pop stars and idolatry: an investigation of the worship of popular music icons, and the music and cult of Prince. [PDF]
Prince is an artist who integrates elements from the sacred into his work. He uses popular iconography to present himself as an icon of consumer culture, as a deified ‘rock god’ worshipped by his fans, and as a preacher leading his audience like a ...
Baty S. Paige +23 more
core +1 more source
ICON in Climate Limited-area Mode (ICON release version 2.6.1): a new regional climate model [PDF]
For the first time, the Limited-Area Mode of the new ICON (Icosahedral Nonhydrostatic) weather and climate model has been used for a continuous long-term regional climate simulation over Europe.
T. V. Pham +8 more
doaj +1 more source
“ Alles oder Nichts ” ? The outer boundaries of the German citizenship debate [PDF]
In this article we explore how constitutionally enshrined and historically conditioned conceptions of membership in Germany have continued to frame citizenship debates over the last two decades.
Horváth, Enikö, Rubio-Marín, Ruth
core +1 more source
Bow-Tie Microstrip Antenna Design [PDF]
In this paper, the bow-tie microstrip antennas have been designed with two different angles of 40° and 80°. An investigaton on the effect of the angle to the return loss and radiation patterns had been carried out.
Abdul Aziz, M. Z. A. +2 more
core +1 more source
Real-World Patient Experience on the Path to Diagnosis of Ankylosing Spondylitis
Introduction We describe the journey to diagnosis of ankylosing spondylitis (AS) from the patient perspective and examine differences in this journey by sex.
Alexis Ogdie +9 more
doaj +1 more source
International consensus (ICON) on treatment of Ménière's disease [PDF]
Objective: To present the international consensus for recommendations for Ménière's disease (MD) treatment. Methods: Based on a literature review and report of 4 experts from 4 continents, the recommendations have been presented during the 21st IFOS ...
Barbara M +5 more
core +1 more source
Escalating The War On SPAM Through Practical POW Exchange [PDF]
Proof-of-work (POW) schemes have been proposed in the past. One prominent system is HASHCASH (Back, 2002) which uses cryptographic puzzles . However, work by Laurie and Clayton (2004) has shown that for a uniform proof-of-work scheme on email to have an ...
Gardner-Stephen, Paul
core +2 more sources
Improving Malware Detection Accuracy by Extracting Icon Information
Detecting PE malware files is now commonly approached using statistical and machine learning models. While these models commonly use features extracted from the structure of PE files, we propose that icons from these files can also help better predict ...
Akhavan-Masouleh, Sepehr +2 more
core +1 more source
Generalized Kruithof approach for traffic matrix estimation [PDF]
[Abstract]: In this paper, the traffic matrix estimation problem is formulated as an nonlinear optimization problem based on the generalized Kruithof approach which uses the Kullback distance to measure the probabilistic distance between two traffic ...
Eum, Suyong +2 more
core +1 more source
Short‐term memory in vision is typically thought to divide into at least two memory stores: a short, fragile, high‐capacity store known as iconic memory, and a longer, durable, capacity‐limited store known as visual working memory (VWM). This paper argues that iconic memory stores icons, i.e., image‐like perceptual representations.
openaire +1 more source

