Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 14
- Economic development 7
- Entrepreneurship 6
- Psychological tests 6
- Research 6
- Economic policy 5
- English language 5
- History 5
- Study and teaching 5
- Business enterprises 4
- Industrial management 4
- Information Science 4
- Language 4
- Law 4
- Social aspects 4
- Statistics 4
- information technology 4
- Biochemistry 3
- Computer security 3
- Design 3
- Economic conditions 3
- Globalization 3
- Grammar 3
- Information Technology 3
- Information theory 3
- Internet 3
- Management information systems 3
- Mass media 3
- Methodology 3
-
1641
Secure authentication enhancement scheme for seamless handover and roaming in space information network
Published 2019-06-01Subjects: “…space information network…”
Get full text
Article -
1642
Training of future primary school and computer science teachers in the structure of information systems
Published 2024-06-01Subjects: “…information and communication competence…”
Get full text
Article -
1643
THE MODERN METHODS OF COORDINATION IN MANAGEMENT OF UNITED NATIONS COMMUNICATION AND PUBLIC INFORMATION SYSTEM
Published 2016-05-01“…The article is dedicated to the problems of coordination of United Nations communication and public information system aimed to gain the positive image of the organization throughout the world. …”
Get full text
Article -
1644
Evaluation of The Effect of Pre-Operative Informed Consent Form on Pre-Operative Anxiety
Published 2024-12-01Subjects: Get full text
Article -
1645
-
1646
Age of information-oriented sampling and power control in vehicular status update networks
Published 2024-03-01Subjects: Get full text
Article -
1647
Chinese semantic and phonological information-based text proofreading model for speech recognition
Published 2022-11-01“…To study the influence of Chinese Pinyin on detecting and correcting text errors in speech recognition, a text proofreading model based on Chinese semantic and phonological information was proposed.Five Pinyin coding methods were designed to construct the character-Pinyin embedding vector that was employed as the input of the Seq2Seq model based on gated recurrent unit.At the same time, the attention mechanism was adopted to extract the Chinese semantic and phonological information of sentences to correct speech recognition errors.Aiming at the problem of insufficient labeled corpus, a data augmentation method was introduced, which could automatically obtain annotated corpora by exchanging the initials or finals of Chinese Pinyin.The experimental results on AISHELL-3’s public data show that phonological information is conducive to the text proofreading model to detect and correct text errors after speech recognition, and the proposed data augmentation method can improve the error detection performance of the model.…”
Get full text
Article -
1648
Integrating urban building information modeling and circular economy framework for green sustainability
Published 2024-07-01Subjects: “…building information modeling…”
Get full text
Article -
1649
A Multimodal Information Fusion Model for Robot Action Recognition with Time Series
Published 2022-01-01“…The current robotics field, led by a new generation of information technology, is moving into a new stage of human-machine collaborative operation. …”
Get full text
Article -
1650
Estimation of the probability of informed trading models via an expectation-conditional maximization algorithm
Published 2025-01-01Subjects: “…Multilayer probability of informed trading…”
Get full text
Article -
1651
Geographic Information Systems, spatial analysis, and HIV in Africa: A scoping review.
Published 2019-01-01“…<h4>Introduction</h4>Geographic Information Systems (GIS) and spatial analysis are emerging tools for global health, but it is unclear to what extent they have been applied to HIV research in Africa. …”
Get full text
Article -
1652
Study and Application of Information Management System for In-Service Inspection of Nuclear Power Plant
Published 2014-02-01Subjects: Get full text
Article -
1653
Value engineering and its impact on construction projects using building information modeling
Published 2021-06-01Subjects: “…building information modeling…”
Get full text
Article -
1654
Software behavior trust forecast model based on check point scene information
Published 2018-09-01“…In order to ensure the trustworthiness of software,and evaluate the trusted status of the software after running for a period of time by monitoring software behavior dynamically,a software behavior trust forecast model on checkpoint scene information which was called CBSI-TM was presented.The model set up a number of checkpoints in the software running track,and introduced the time increment of adjacent checkpoints,and the change of CPU utilization rate to define the scene information,and reflected the relationship between adjacent checkpoints scene information.Then the RBF neural network classifier evaluated the status of the current checkpoint to judge the trustworthiness of the software,and the semi weighted Markov model predicted the situation of the next checkpoint to evaluate the trustworthiness of future running trend of the software.The experimental results show that the CBSI-TM model can predict the future trusted status of the software effectively,and verify that the model is more reasonable and effective.…”
Get full text
Article -
1655
USING DIGITAL BUSINESS SIMULATORS IN ECONOMIC AND MANAGERIAL DEVELOPMENT OF MASTER’S IN INFORMATION TECHNOLOGIES
Published 2023-04-01Subjects: Get full text
Article -
1656
Informe sobre la disparidad en las emisiones de 2019. Resumen
Published 2020-01-01Get full text
Article -
1657
Some New Information on the Ethnic and Cultural Processes in the Neolithic Upper Volga Region
Published 2024-08-01Get full text
Article -
1658
Audit Tata Kelola Academic Information System Menggunakan Framework Cobit 2019
Published 2023-07-01“…Abstract Good management of Information Technology resources is effective, efficient, and controlled to produce value for an institution. …”
Get full text
Article -
1659
“Ukhta is the Birthplace of the First Russian Oil” as a Brand of University’s Information Policy
Published 2018-04-01Subjects: “…information policy, corporate positioning, territory brand, brand potential, symbolic event, symbolic capital…”
Get full text
Article -
1660
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
Get full text
Article