Showing 1,641 - 1,660 results of 48,762 for search '"Inform"', query time: 0.13s Refine Results
  1. 1641
  2. 1642
  3. 1643

    THE MODERN METHODS OF COORDINATION IN MANAGEMENT OF UNITED NATIONS COMMUNICATION AND PUBLIC INFORMATION SYSTEM by T. Shchors

    Published 2016-05-01
    “…The article is dedicated to the problems of coordination of United Nations communication and public information system aimed to gain the positive image of the organization throughout the world. …”
    Get full text
    Article
  4. 1644
  5. 1645
  6. 1646
  7. 1647

    Chinese semantic and phonological information-based text proofreading model for speech recognition by Meiyu ZHONG, Peiliang WU, Yan DOU, Yi LIU, Lingfu KONG

    Published 2022-11-01
    “…To study the influence of Chinese Pinyin on detecting and correcting text errors in speech recognition, a text proofreading model based on Chinese semantic and phonological information was proposed.Five Pinyin coding methods were designed to construct the character-Pinyin embedding vector that was employed as the input of the Seq2Seq model based on gated recurrent unit.At the same time, the attention mechanism was adopted to extract the Chinese semantic and phonological information of sentences to correct speech recognition errors.Aiming at the problem of insufficient labeled corpus, a data augmentation method was introduced, which could automatically obtain annotated corpora by exchanging the initials or finals of Chinese Pinyin.The experimental results on AISHELL-3’s public data show that phonological information is conducive to the text proofreading model to detect and correct text errors after speech recognition, and the proposed data augmentation method can improve the error detection performance of the model.…”
    Get full text
    Article
  8. 1648
  9. 1649

    A Multimodal Information Fusion Model for Robot Action Recognition with Time Series by Xiaozhi Zhang, Hongyan Li, Mengjie Qian

    Published 2022-01-01
    “…The current robotics field, led by a new generation of information technology, is moving into a new stage of human-machine collaborative operation. …”
    Get full text
    Article
  10. 1650
  11. 1651

    Geographic Information Systems, spatial analysis, and HIV in Africa: A scoping review. by Danielle C Boyda, Samuel B Holzman, Amanda Berman, M Kathyrn Grabowski, Larry W Chang

    Published 2019-01-01
    “…<h4>Introduction</h4>Geographic Information Systems (GIS) and spatial analysis are emerging tools for global health, but it is unclear to what extent they have been applied to HIV research in Africa. …”
    Get full text
    Article
  12. 1652
  13. 1653
  14. 1654

    Software behavior trust forecast model based on check point scene information by Junfeng TIAN, Yuhui GUO

    Published 2018-09-01
    “…In order to ensure the trustworthiness of software,and evaluate the trusted status of the software after running for a period of time by monitoring software behavior dynamically,a software behavior trust forecast model on checkpoint scene information which was called CBSI-TM was presented.The model set up a number of checkpoints in the software running track,and introduced the time increment of adjacent checkpoints,and the change of CPU utilization rate to define the scene information,and reflected the relationship between adjacent checkpoints scene information.Then the RBF neural network classifier evaluated the status of the current checkpoint to judge the trustworthiness of the software,and the semi weighted Markov model predicted the situation of the next checkpoint to evaluate the trustworthiness of future running trend of the software.The experimental results show that the CBSI-TM model can predict the future trusted status of the software effectively,and verify that the model is more reasonable and effective.…”
    Get full text
    Article
  15. 1655
  16. 1656
  17. 1657
  18. 1658

    Audit Tata Kelola Academic Information System Menggunakan Framework Cobit 2019 by Satriya Dwi Putra, Herman Herman, Anton Yudhana

    Published 2023-07-01
    “…Abstract Good management of Information Technology resources is effective, efficient, and controlled to produce value for an institution. …”
    Get full text
    Article
  19. 1659

    “Ukhta is the Birthplace of the First Russian Oil” as a Brand of University’s Information Policy by O. I. Belyaeva, A. N. Kustyshev

    Published 2018-04-01
    Subjects: “…information policy, corporate positioning, territory brand, brand potential, symbolic event, symbolic capital…”
    Get full text
    Article
  20. 1660

    Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition by Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN

    Published 2023-06-01
    “…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
    Get full text
    Article