Suggested Topics within your search.
Showing 321 - 340 results of 541 for search 'Selfiee~', query time: 3.80s Refine Results
  1. 321

    Examining Trait Anger and Anger Expression Styles of Pro-Licensed Football Coaches by Alparslan Ünveren, Cemal Polat

    Published 2020-12-01
    “…Coaches dealing with football sport encounter multidimensional stimulates in an intense competition environment that will cause anger both in and out of the field.These stimuli affect the emotional worlds and selfies of the coaches positively or negatively.Trait anger and unconrollable external and internal expression style ,as well as legal exposures ,harm the coach’s personality, Professional career and corporate identity.It is thought that the data obtained by this study will shed light on the effects of trait anger ,anger control,anger inward and anger outward situations of football coaches who have the highest degree (pro licence)in our country ;help to develop strategies in anger control and contribute to more research in this field.…”
    Get full text
    Article
  2. 322
  3. 323
  4. 324

    A Cooperative Dual to the Nash Equilibrium for Two-Person Prescriptive Games by H. W. Corley, Phantipa Kwain

    Published 2014-01-01
    “…It is based on the assumption that players are completely selfish. However, NEs are often not played in practice, so we present a cooperative dual as an alternative solution concept by which an arbiter can assign the players' actions. …”
    Get full text
    Article
  5. 325

    An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks by Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li

    Published 2019-06-01
    “…In the proposed scheme, reputation model is used to assess authentication efforts of vehicles, which enhances initiative for cooperative message authentication and inhabits selfish behavior; sequence optimization algorithm solves messages overflowing on condition limited computation of onboard unit and improves the speed of message authentication at the premise of ensuring the reliability of message authentication. …”
    Get full text
    Article
  6. 326
  7. 327
  8. 328
  9. 329

    Auction based bandwidth allocation mechanism for P2P content distribution networks by Yun-he ZHANG, Yan-qin ZHU, Qi-jin JI

    Published 2013-04-01
    “…Unreasonable allocation of originally scarce bandwidth was a severe problem in the P2P content distribution networks.To solve the problem and suppress the node's selfishness,an auction-based bandwidth allocation mechanism for P2P networks was proposed.Through the effective bandwidth payment scheme,the selfish nodes had no incentives to lie and provided the real bandwidth requirements.Also the “tragedy of the commons” could be avoided by the nodes' healthy bandwidth competition.To adapt to the distributed nature of the P2P networks,the algorithm was implemented in parallel at resource providing nodes and request nodes.Simulation results show that the scheme not only suppresses riding nodes efficiently in the system,but also shortens the average completion time for content distribution and decreases the ratio of data uploaded by the source server.…”
    Get full text
    Article
  10. 330

    Prisoner's Dilemma on real social networks: Revisited by Sharon M. Cameron, Ariel Cintrón-Arias

    Published 2013-07-01
    “…Thistheoretical game is important in understanding why a seemingly selfish strategy does persist and spread throughout apopulation that is mixing homogeneously at random. …”
    Get full text
    Article
  11. 331

    A Socialist Feminist Reading of Thatcherite Women in British Feminist Plays by Berna Ayça Ülker Erkan

    Published 2019-12-01
    “…Socialist/materialist feminism is applied to the plays both to criticize selfish Thatcherite powerful women figures and to express the lack of collaboration among women to improve their position.…”
    Get full text
    Article
  12. 332
  13. 333

    Follow me y dame like: Hábitos de uso de Instagram de los futuros maestros by José María ROMERO RODRÍGUEZ, María Natalia CAMPOS SOTO, Gerardo Gómez García

    Published 2019-01-01
    “…Además, la finalidad principal de utilizar Instagram es el entretenimiento, y el tipo de contenido con mayor publicaciones son los selfies. Finalmente, algunos de los hábitos de uso de los futuros maestros se vinculan a prácticas de riesgo y a un uso abusivo de Internet. …”
    Get full text
    Article
  14. 334

    Various scenarios of measurements using a smartphone with a LiDAR sensor in the context of integration with the TLS point cloud by Janicka Joanna, Błaszczak-Bąk Wioleta

    Published 2025-06-01
    “…The research consisted of comparing various scenarios of measuring using a smartphone with a LiDAR sensor (a smartphone held in hand, a smartphone on a selfie stick, and a smartphone mounted on a gimbal), two acquisition strategies (one direction and zigzag) and two registration methods (point to point and cloud to cloud). …”
    Get full text
    Article
  15. 335

    KARAKTER CITRA ARSITEKTURAL DAN DESKRIPSI TEMPAT WISATA BERBASIS PERSEPSI SWAFOTO by Alvin Try Dandy, Hanson Endra Kusuma, Allis Nurdini, Ofita Purwani

    Published 2023-06-01
    “… Abstrak_ Tempat wisata swafoto (selfie) mulai menarik perhatian wisatawan dan media massa sejak tahun 2015. …”
    Get full text
    Article
  16. 336

    The current problems of the digital reflection of social reality: rethinking scientific concepts by M. Kibakin, S. Grishaeva

    Published 2019-05-01
    “…From positions of the concept of Richard Mark Emerson emergence of new dependences of users of Internet network on special category of subjects socially of interaction – moderators, administrators, owners of resources, the controlling public authorities and also manipulators of people’s attention has been explained; the specific motivation, which reveals itself in such phenomena as hypertrophied aspiration to the self-presentation (“selfie”, etc.); representation of the distorted virtual image for communications, hyperactivity in the appeal to various resources (“Internet surfing”) and also prevalence of motivators and estimated means – anonymous comments, “likes”, posts, reposts, symbolical encouragement and awards. …”
    Get full text
    Article
  17. 337

    The reasoning agent: agency in the capability approach and some implications for development research and practice by Pablo Garcés

    Published 2020-11-01
    “…Contrary to the dominant approach, rational choice theory, which proposes a selfish, calculative, atomistic chooser, the CA proposes a multi-motivated, multidimensional, plural, and reflective chooser. …”
    Get full text
    Article
  18. 338

    Communication performance analysis of secondary users in cognitive radio networks under primary user emulation attacks by Shan-shan WANG, Xing-guo LUO, Peng LI

    Published 2012-11-01
    “…Cognitive radio network(CRN)is an effective technology and a hot research direction which could solve the problem of deficient resource and revolutionize utilization.And its safety technology attracted more and more researches.Primary user emulation(PUE)is a typically easily and largely affecting attack.PUE attacked come from both malicious misbehavior secondary users(MMU)and selfish misbehavior secondary users(SMU).The former was studied much more deeply than the later one.Distinguishing MMU and SMU,a four dimensional continuous time markov chain model to analyze the communication performance of normal secondary users under PUE attacks,and typically affected by SMUs was proposed.Furthermore,several PUE detection technologies were compared.The emulation results indicate that the SMU detection mechanism is essential for the PUE attack detection technology,which can improve the detection effects largely.…”
    Get full text
    Article
  19. 339
  20. 340