نتایج جستجو برای: or identity

تعداد نتایج: 3625205  

2014
Min Zhou Shenggang Li Muhammad Akram

The present study investigates some novel categorical properties of soft sets. By combining categorical theory with soft set theory, a categorical framework of soft set theory is established. It is proved that the category SFun of soft sets and soft functions has equalizers, finite products, pullbacks, and exponential properties. It is worth mentioning that we find that SFun is both a topologic...

2005
HYUNG-KEUN JEE YUN-SU CHUNG JANG-HEE YOO

This paper describes the integration of face and fingerprint data to improve the performance of a person identity verification system. In the conetxt of multi-modal person authentication, a set of experts give their opinion as a scalar number, called score, about the identity of an individual. A fusion module receiving as input the scores has to take a binary decision: accept or reject the clai...

2014
Milorad Milinković

The rapid development of biometric hardware and software, and the increased use of biometrics in identity management led to the appearance of the problem of interoperability of biometric systems as well as security of biometric information that is transmitted over the network. This paper analyzes the solution to the problem of security of biometric data transactions via network by implementing ...

Journal: :جامعه شناسی هنر و ادبیات 0
نادیا معقولی استادیار موسسه غیرانتفاعی نیما علی شیخ مهدی دانشیار دانشکده علوم انسانی دانشگاه تربیت مدرس حسینعلی قبادی استادیار دانشکده هنر دانشگاه تربیت مدرس

in the case of the crisis of identity, one of the obvious emblems of the objecting new wave in cinema before the islamic revolution is to express the national identity. in this study the problem is to recognize the components of national identity in bahram beyzaie works. introducing the concept of identity ,it’s dimensions and components the ingredients of identity is searched in three main fil...

2012
Jean-Paul Carvalho Michael Caldara David Myatt Tom Norman Michael Sacks Stergios Skaperdas Christopher Wallace

Culture constrains individual choice, rendering certain actions impermissible or taboo. While cultural constraints may regulate behavior within a group, they can have a pernicious effect in multicultural societies, inhibiting the emergence of unified social conventions. We analyze interactions between members of two cultural groups who are matched to play a coordination game with an arbitrary n...

Journal: :Information Polity 2010
Malcolm Crompton

There are many drivers for strengthening identity management (IdM) in the digital environment. They include: countering identity fraud, identity theft or identity takeover, border control and traveler identification; individual convenience; or better customer service for individuals. A range of approaches are being considered in the public and private sector. Experience is showing that IdM succ...

Journal: :Journal of the experimental analysis of behavior 2011
Peter J Urcuioli

This research investigated the source of an ostensible reflexivity effect in pigeons reported by Sweeney and Urcuioli (2010). In Experiment 1, pigeons learned two symmetrically reinforced symbolic successive matching tasks (hue-form and form-hue) using red-green and triangle-horizontal line stimuli. They differed in their third concurrently trained baseline task: form-form matching with stimuli...

ژورنال: مدیریت شهری 2016
arghan, Abbas, Rafieian, Mojtaba, Rezaei, Solmaz,

The purpose of current article is to study the effect of sense of place on creating the urban identity in new cities. In order to fulfill the mentioned purpose, the key concepts of research and the theories related to the issue were studied. According to it, in order to collect the data, library method and note taking tool were used. The studies indicated the presence of human in the environmen...

Journal: :مدیریت شهری 0
solmaz rezaei mojtaba rafieian arghan abbas abbas

the purpose of current article is to study the effect of sense of place on creating the urban identity in new cities. in order to fulfill the mentioned purpose, the key concepts of research and the theories related to the issue were studied. according to it, in order to collect the data, library method and note taking tool were used. the studies indicated the presence of human in the environmen...

2015
Jongho Moon Younsung Choi Jaewook Jung Dongho Won Yongtang Shi

In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication sch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید