Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
41941
Properties and Bounds of Jensen-Type Functionals via Harmonic Convex Functions
Published 2021-01-01Get full text
Article -
41942
CRF combined with ShapeBM shape priors for image labeling
Published 2017-01-01“…Conditional random field (CRF) is a powerful model for image labeling,it is particularly well-suited to model local interactions among adjacent regions (e.g.superpixels).However,CRF doesn't consider the global constraint of objects.The overall shape of the object is used as a global constraint,the ShapeBM can be taken advantage of modeling the global shape of object,and then a new labeling model that combined the above two types of models was presented.The combination of CRF and ShapeBM was based on the superpixels,through the pooling technology was wed to establish the corresponding relationship between the CRF superpixel layer and the ShapeBM input layer.It enhanced the effectiveness of the combination of CRF and ShapeBM and improved the accuracy of the labeling.The experiments on the Penn-Fudan Pedestrians dataset and Caltech-UCSD Birds 200 dataset demonstrate that the model is more effective and efficient than others.…”
Get full text
Article -
41943
-
41944
Evaluating End-to-End Delay in Road-Based Routing Protocols for VANETs with Snake Optimization
Published 2024-06-01Get full text
Article -
41945
Socio-Cultural Dynamics of Education in the Context of the Post-Non-Classical Science
Published 2015-02-01“…The author emphasizes its inevitably rising priority due to sustained development of civilization bringing about the new environmentally-oriented meta-culture.The obtained results can be used in pedagogic research methodology, designing and modeling the educational process, its content, technology and organization.…”
Get full text
Article -
41946
Synthesis of Photochromic AgCl-Urethane Resin Composite Films
Published 2012-01-01Get full text
Article -
41947
The Impacts of Roads on Florida’s Threatened and Endangered Wildlife: An Overview
Published 2023-02-01“…Potential mitigation options include road configuration, signage, speed limits, habitat protection, improved technology, wildlife fencing, and wildlife crossing structures. …”
Get full text
Article -
41948
Observational Study of Pedestrian Behavior at Signalized Crosswalks
Published 2025-01-01Get full text
Article -
41949
Editorial: Immunology of food-borne parasites: recent progress and future advances
Published 2025-01-01Get full text
Article -
41950
A System of Generalized Variational-Hemivariational Inequalities with Set-Valued Mappings
Published 2013-01-01Get full text
Article -
41951
L’alternative monétaire Bitcoin : une perspective institutionnaliste
Published 2015-12-01“…Much more than a pure technology, money is a social institution. Therefore it builds a trade space that must be thought in articulation with a socioeconomic order. …”
Get full text
Article -
41952
The Shear Strength and Dilatancy Behavior of Wheat Stored in Silos
Published 2019-01-01Get full text
Article -
41953
In-house Shrines in Japanese Corporations and their Background
Published 2024-12-01Get full text
Article -
41954
A general way to assign IPv6 trusted address under portal authentication
Published 2019-12-01“…As the network scale grows,it is especially important to fine-tune the network.In the next-generation Internet,embedding the user's trusted identity into the IPv6 address suffix to assign trusted addresses can further improve the traceability of network behavior.At present,many studies have attempted to embed the user’s identity information into IPv6 addresses based on portal authentication and DHCPv6,but the modification of DHCPv6 makes it not transparent to the terminal.A mechanism for trusted address assignment in IPv6 networks based on portal authentication was proposed.The collaboration between servers and software-defined networking (SDN) technology was used to realize the indirect assignment of IPv6 trusted addresses.Finally,a prototype system was implemented and its feasibility and performance were evaluated in the network of Nanjing Telecom in Jiangsu.The results show that the mechanism only brings little overhead and it is transparent to the terminal.…”
Get full text
Article -
41955
Comparative Study of Antenna Designs for RF Energy Harvesting
Published 2013-01-01Get full text
Article -
41956
A posterior probability approach for gene regulatory network inference in genetic perturbation data
Published 2016-07-01Get full text
Article -
41957
Design of Meander-Line Antennas for Radio Frequency Identification Based on Multiobjective Optimization
Published 2012-01-01Get full text
Article -
41958
An exploratory study on the perception of the over-the-top (OTT) industry among film and media production major university students: Utilizing the Q methodology.
Published 2025-01-01“…However, the study demonstrated that they need perceptions from a macroscopic viewpoint in areas related to OTT industry technology, education, and systems.…”
Get full text
Article -
41959
Block-based fair payment scheme under delegation computation
Published 2020-03-01“…In the traditional delegation computation,due to the self-interested behavior of both participants,there were some problems such as the denial of the principal and the dishonest calculation by the computing party.In the payment phase,a third party was required to ensure the fairness of the payment,which led to extra costs and risks of disclosure of participants' privacy.Game theory was used to analyze the Nash equilibrium solution between the two parties in the payment process,and a fair payment protocol based on time commitment of bitcoin was proposed.Firstly,the bitcoin time commitment technology was used to ensure the fairness of payment.Secondly,the decentralized feature of block chain was used to replace the third-party service to protect the privacy of all parties and realize the source of responsibility.Finally,the scheme was analyzed from the perspective of security and correctness,which proved that the participants choose behavioral strategies honestly in the payment process.The scheme proposed in this paper not only solved the problem of fair payment in traditional delegation computation,but also protected the privacy of participants.…”
Get full text
Article -
41960
Perceptions de finissants en ÉPS au regard de l’insertion professionnelle
Published 2013-06-01“…The results indicate that competencies relating to designing and monitoring teaching activities are the most significant competencies at the beginning of their career, whereas the one related to use of technology is considered less important. Also questioned on their level of mastery, they consider being most comfortable in communicating clearly with the students and acting ethically. …”
Get full text
Article