نتایج جستجو برای: based one

تعداد نتایج: 4412705  

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده ادبیات و زبانهای خارجی 1393

abstract this mixed method study examines whether there is any relationship among the variables of the study (job satisfaction, social capital and motivation). the researcher considered job satisfaction and social capital as independent variables; motivation is the dependent variable of the study. the researcher applied a questionnaire to assess each variable. to measure efl teachers’ job sati...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1391

nowadays enhancing critical thinking in learners is considered one of the foreign language teachers’ tasks due to its high position in foreign language classrooms. when it comes to selecting materials for language classrooms, there are obviously some criteria that teachers should apply. the present study aimed at a critical thinking based analysis of ten picture story books and ten folktales th...

Journal: :IEEE transactions on artificial intelligence 2023

Voice conversion (VC) emerged as a significant domain of research in the field speech synthesis recent years due to its emerging application voice-assistive technologies, such automated movie dubbing speech-to-singing conversion, name few. VC deals with vocal style one speaker another while keeping linguistic contents unchanged. Nowadays, generative adversarial network (GAN) models are widely u...

2008
Philip Hoyer

This paper will analyze the current landscape of One Time Password (OTP) and Challenge-Response algorithms. It will detail the technical and security differences between algorithms such as the OATH algorithms (HOTP, OCRA, HOTP time based), EMV CAP and the proprietary algorithms from ActivIdentity. The paper describes the most common use cases and applicability as important tools for identity as...

2016
David R. Mortensen Patrick Littell Akash Bharadwaj Kartik Goyal Chris Dyer Lori S. Levin

This paper contributes to a growing body of evidence that—when coupled with appropriate machine-learning techniques—linguistically motivated, information-rich representations can outperform one-hot encodings of linguistic data. In particular, we show that phonological features outperform character-based models using the PanPhon resource. PanPhon is a database relating over 5,000 IPA segments to...

2004
Xiaojun Qi

An efficient local fuzzy color and global color-texture descriptor is proposed for content-based image retrieval. In our retrieval system, an image is represented by a set of color-clustering-based segmented regions and global color-texture descriptors. Each segmented region corresponds to an object or parts of an object and is represented by a fuzzified color feature. A fuzzy region matching s...

2010
Mauricio Salgado Elio Marchione Alastair Gill

We report the results of an agent-based model to study the strategies that policy makers can apply to prevent the escalation of deviant behaviour in the aftermath of a disaster. Three policies are tested, namely: a reinforcement of the police power; an increase of the information available to the affected population and a combination of both policies. We test the effect of time in the implement...

2001
Eli Dwek

The extragalactic background light (EBL), exclusive of the cosmic microwave background, consists of the cumulative radiative output from all energy sources in the universe since the epoch of recombination. Most of this energy is released at ultraviolet and optical wavelengths. However, observations show that a significant fraction of the EBL falls in the 10 to 1000 μm wavelength regime. This pr...

2016
H. Dawid P. Harting M. Neugart H. Dawid P. Harting

In the aftermath of the financial crisis, with periphery countries in the European Union even more falling behind the core countries economically, there have been quests for various kind of fiscal policies in order to revert divergence. How these policies would unfold and perform comparatively is largely unknown. We analyze four such stylized policies in an agent-based macroeconomic model and s...

Journal: :IACR Cryptology ePrint Archive 2007
Sunder Lal Priyam Sharma

This paper analyzes the security of an IBE scheme proposed by Wang in 2007. It is shown that under BDHP (which is polynomially time equivalent to BIDHP) assumption the scheme is secure in random oracle model. Key-Words: Public Key Encryption, Identity-Based Encryption (IBE), One-Way Encryption (OWE), One-Way Identity-Based Encryption (ID-OWE).

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید