نتایج جستجو برای: but weaken
تعداد نتایج: 2057277 فیلتر نتایج به سال:
Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken ...
The mechanisms of acupuncture remain poorly understood, but it is generally assumed that measuring the electrical conductivity at various meridians provides data representing various meridian energies. In the past, noninvasive methods have been used to stimulate the acupuncture points at meridians, such as heat, electricity, magnets, and lasers. Photoluminescent bioceramic (PLB) material has be...
The gravitational back-reaction is calculated for the conformally invariant scalar field within a black cosmic string interior with cosmological constant. Using the perturbed metric, the gravitational effects of the quantum field are calculated. It is found that the perturbations initially weaken the singularity. This effect differs from the case of spherical symmetry (without cosmological cons...
We present a regularity lemma for Boolean functions f : {−1, 1}n → {−1, 1} based on noisy influence, a measure of how locally correlated f is with each input bit. We provide an application of the regularity lemma to weaken the conditions on the Majority is Stablest Theorem. We also prove a “homogenized” version stating that there is a set of input bits so that most restrictions of f on those bi...
The strategic human capital literature indicates the importance of human capital to work unit performance. However, we argue that human capital only aids performance when it is translated into actions beneficial to the unit. We examine a set of common human capital leveraging characteristics (including the use of extended shifts, night shifts, shift flexibility, norms for work as a priority ove...
Decision makers have been found to bias their interpretation of incoming information to support an emerging judgment (predecisional information distortion). This is a robust finding in human judgment, and was recently also established and measured in physicians’ diagnostic judgments (Kostopoulou et al. 2012). The two studies reported here extend this work by addressing the constituent modes of ...
In downside, trend could weaken immunity and complicate vaccine formulation.
A key goal of invasion biology is to identify the factors that favor species invasions. One potential indicator of invasiveness is the phylogenetic distance between a nonnative species and species in the recipient community. However, predicting invasiveness using phylogenetic information relies on an untested assumption: that both biotic resistance and facilitation weaken with increasing phylog...
Belief polarization occurs when 2 people with opposing prior beliefs both strengthen their beliefs after observing the same data. Many authors have cited belief polarization as evidence of irrational behavior. We show, however, that some instances of polarization are consistent with a normative account of belief revision. Our analysis uses Bayesian networks to characterize different kinds of re...
Tunnel vault subsidence is a very complex nonlinear dynamic system whose feature is difficult to describe accurately by traditional methods. In this paper, the moving average model of time series and the adaptive BP neural network are adopted to build the model, which use smoothing method of time series to curb and weaken the error in field surveying data, in an effort to reduce the numerical f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید