intended destination
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 11)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 15 (1-2) ◽  
pp. 70-85
Author(s):  
David Seal

Abstract Scholars acknowledge that most ancient people experienced the written text of Hebrews by hearing it read out loud. Several studies also recognize the book’s emphasis on divine speech. However, research has not examined how the occurrences of divine speech in Hebrews would have been spoken by the person reading the text once it arrived at its intended destination or how the speech would have been perceived by the communities that heard it recited. The oral cultural context from which Hebrews originated decisively shaped the form and delivery of the written divine speech and must be considered in any analysis. In this study I will address this gap by examining how the divine word from Psalm 95 cited in Hebrews 3:7–11 might have been vocalized in its original context and examine the kinds of rhetorical appeals the author made to the audience.


Author(s):  
Marcelo Urquia ◽  
Randy Walld ◽  
Susitha Wanigaratne ◽  
Nkiruka Eze ◽  
Mahmoud Azimaee ◽  
...  

BackgroundCanadian health data repositories link datasets at the provincial level, based on their residents’ registrations to provincial health insurance plans. Linking national datasets with provincial health care registries poses several challenges that may result in misclassification and impact the estimation of linkage rates. A recent linkage of a federal immigration database in the province of Manitoba illustrates these challenges. Objectivesa) To describe the linkage of the federal Immigration, Refugees and Citizenship Canada Permanent Resident (IRCC-PR) database with the Manitoba healthcare registry and b) compare data linkage methods and rates between four Canadian provinces accounting for interprovincial mobility of immigrants. MethodsWe compared linkage rates by immigrant’s province of intended destination (province vs. rest of Canada). We used external nationwide immigrant tax filing records to approximate actual settlement and obtain linkage rates corrected for interprovincial mobility. ResultsThe immigrant linkage rates in Manitoba before and after accounting for interprovincial mobility were 84.8% and 96.1, respectively. Linkage rates did not substantially differ according to immigrants’ characteristics, with a few exceptions. Observed linkage rates across the four provinces ranged from 74.0% to 86.7%. After correction for interprovincial mobility, the estimated linkage rates increased >10 percentage points for the provinces that stratified by intended destination (British Columbia and Manitoba) and decreased up to 18 percentage points for provinces that could not use immigration records of those who did not intend to settle in the province (New Brunswick and Ontario). ConclusionsDespite variations in methodology, provincial linkage rates were relatively high. The use of a national immigration dataset for linkage to provincial repositories allows a more comprehensive linkage than that of province-specific subsets. Observed linkage rates can be biased downwards by interprovincial migration, and methods that use external data sources can contribute to assessing potential selection bias and misclassification.


2020 ◽  
Vol 11 (2) ◽  
pp. 41-54
Author(s):  
Vladislav Yordanov

The author describes the application of the transactional analysis model of Sailship Success (Hay, 2017) within a functional analysis case study in a Fintech company based in Bulgaria but with locations in several other countries. Details are given of the way in which the consultancy project was established, its objectives and the methods that were used. Although the design and results of a questionnaire are also described, the focus is on how the Sailship Success was introduced as a metaphor during interviews with managers, leading to identification of significantly different perspectives about whether the organisation was more like a peaceful ship or one going into battle. Other issues highlighted included there being no clear idea of the intended destination of the ship, a lack of awareness of potential threats such as competitors, and lack of any consciousness of being a part of a fleet of companies.


2020 ◽  
Vol 4 (3) ◽  
pp. 525-530
Author(s):  
Loneli Costaner ◽  
Bayu Febriadi ◽  
Guntoro

Today's technology continues to grow rapidly which can be used to facilitate and support human activities, starting from the homework, business, marketing and office processes. So it takes knowledge to use technology-based facilities to improve human resources that are efficient for life independence. With the development of the world of digitalization technology is becoming evident before humans of this era, where in the past people for shopping and learning must come to the intended destination, but now people only stay at home or anywhere they can do their activities with just the touch of a finger. The ease of this facility is inseparable from the many Android-based applications to market products to be sold, both changing services, goods, and personnel. The condition of changing activities hard to soft activities is because the development of the digital era is very important for students to understand the development and training of Android-based applications in order to gain skills in designing Android-based applications open souce namely with an inventor app that can be used free of charge, its form visuals that make it easier for students to design and create android-based applications.


2020 ◽  
pp. 199-216
Author(s):  
Joe Moffett

There is in Charles Wright’s work a complicated spiritual quest that frequently turns to Gerard Manley Hopkins. Wright’s reappearing “pilgrim” persona, who, unlike Chaucer’s pilgrims, never arrives at his intended destination, persists in a stubborn search for divine insight. Wright uses Hopkins as a sounding board, both in the sense of testing his own spiritu- ality against Hopkins’s and the sense of experimenting with Hopkins’s very sounds. Wright marvels at his predecessor’s ability to combine world, word, and Word; he often attempts, and fails, to do the same, coming to believe that language has become severed from its spiritual origins, but in exploring that rift, which Wright often does in Hopkinsian terms, the poet “burrows deep into the core of the human condition” and achieves a gravity unlike that of any other contemporary poet.


2020 ◽  
Vol 8 (6) ◽  
pp. 3689-3692

In today’s era most of the people prefer dinner in the restaurant. The use of robots as waiters in restaurants is an increasing trend in the service industry. The Waiter-robot is an exceptional autonomous robot which has the ability to follow a designated path by measuring the distance and reach its intended destination. It reducing effort, time, error, etc and increasing quality, capacity and efficiency in the delivering the food. This robotic application using a Raspberry-pi based kit mounted with ultrasonic sensors for mapping and localization of destination table.


2019 ◽  
Vol 3 (2) ◽  
pp. 169
Author(s):  
Oris Krianto Sulaiman

Abstrak - The acceleration of data communication in the world of information technology is developing very fast, more than millions of digital messages are exchanging every day in cyberspace. These digital messages are freely communicating on internet networks or public networks that result in anyone being able to access these digital messages. Because the openness of the internet network that involves many people can take digital messages, the protection for the messages should be good. Digital message protection is used so that digital messages are directed to their intended destination, for this reason, a method is needed to maintain the confidentiality of the digital message. Cryptogafi is the study of encoding. By using cryptography digital messages can be changed into passwords so that the confidentiality of digital messages is maintained. Many algorithms can be used to change the original message (plaintext) into a password (ciphertext), one of which is the XOR cipher that utilizes the binary of each character. XOR cipher has a security hole that can be used by cryptanalysts such as using known-plaintext attack, ciphertext-only attack, and flip bit attack. Therefore, to increase the confidentiality of the message, the binary plaintext generated by the XOR cipher will be encrypted again using the Merkle-Hellman Knapsack. The results of this hybrid cryptosystem add a high level of digital message security because the binary ciphertext will re-form the ciphertext with Merkle-Hellman Knapsack, thus forming twice the protection.Keywords - Digital Message, Hybrid Cryptosystem, XOR Cipher and Merkle–Hellman Knapsack Abstract – Percepatan komunikasi data dalam dunia teknologi informasi berkembang sangat cepat, lebih dari jutaan pesan-pesan digital setiap harinya saling bertukar didunia maya. Pertukan pesan digital ini secara bebas berkomunikasi di jejaring internet atau jaringan umum yang mengakibatkan setiap orang dapat mengakses pesan digital tersebut. Sebab keterbukaan jaringan internet yang melibatkan banyak orang bisa mengambil pesan digital tersebut maka sudah seharusnya perlindungan untuk pesan tersebut harus baik. Perlindungan pesan digital tersebut digunakan agar pesan digital tertuju ke tujuan yang semestinya, untuk itu perlu adanya metode untuk menjaga kerahasiaan pesan digital tersebut. Kriptogafi merupakan ilmu yang mempelajari tentang penyandian. Dengan menggunakan kriptografi pesan digital dapat diubah menjadi sandi sehingga kerahasiaan pesan digital terjaga. Ada banyak algoritma yang dapat digunakan untuk merubah pesan asli (plaintext) menjadi sandi (ciphertext) salah satunya XOR cipher yang memanfaatkan binary dari setiap karakter. XOR cipher mempunyai celah keamanan yang dapat dimanfaatkan kriptanalis seperti menggunakan known-plaintext attack, ciphertext-only attack dan flip bit attack. Oleh sebab itu untuk meningkatkan kerahasiaan pesan maka binary plaintext yang dihasilkan oleh XOR cipher akan enkripsi lagi menggunakan Merkle–Hellman Knapsack. Hasil dari hybrid cryptosystem ini menambahkan tinggat keamanan pesan digital karena pada binary ciphertex akan membentuk ciphertext kembali dengan Merkle–Hellman Knapsack, sehingga membentuk dua kali perlindungan.Kata kunci – Pesan digital, Hybrid Cryptosystem, XOR Cipher dan Merkle–Hellman Knapsack


Author(s):  
H. Kent Baker ◽  
Greg Filbeck ◽  
John R. Nofsinger

Historically, those traveling the financial highway were taught to follow a single route. Travelers were told that as long as everyone faithfully followed directions and weather conditions were ideal, the road would be their best choice and they would get to their intended destination....


Author(s):  
James Appell

The chapter analyses the character and impact of the mass migration which transformed the Jewish community in the late Victorian period. It is shown that despite family stories which asserted that people arrived in Leeds by accident, there were clear geographic connections which made Leeds the intended destination for most immigrants. Leeds Jews came predominantly from the western part of the Russian Pale, from Lithuanian and the province of Kovno. The new arrivals soon made their presence felt in local affairs such as strikes. The 1917 anti-Semitic riots were a low point in attempts to integrate into Yorkshire society.


Sign in / Sign up

Export Citation Format

Share Document