An OpenCL-based parallel acceleration of aSobel edge detection algorithm Using IntelFPGA technology
This paper examines the feasibility of using commercial out-of-the-box Reconfigurable Field Programmable Gate Array (FPGA) technology and the OpenCL framework to create efficient Sobel edge-detection implementation, which is considered a fundamental part
Abedalmuhdi Almomany +4 more
doaj +1 more source
Analyzing policy capturing data using structural equation modeling for within-subject experiments (SEMWISE) [PDF]
We present the SEMWISE (structural equation modeling for within-subject experiments) approach for analyzing policy capturing data. Policy capturing entails estimating the weights (or utilities) of experimentally manipulated attributes in predicting a ...
Baumgartner, Hans, Weijters, Bert
core +1 more source
(a) to analyse the effect of age on physical fitness (PF) and on-duty task (ODT) performance of male police officers (PO); (b) to analyse the relationship between PF and ODT performance of male PO; and (c) to identify the set of PF attributes which ...
João Teixeira +4 more
doaj +1 more source
A conceptual framework for studying collective reactions to events in location-based social media [PDF]
Events are a core concept of spatial information, but location-based social media (LBSM) provide information on reactions to events. Individuals have varied degrees of agency in initiating, reacting to or modifying the course of events, and reactions ...
Alexander Dunkel +18 more
core +2 more sources
Optimization of Management Mode of Small- and Medium-Sized Enterprises Based on Decision Tree Model
Decision tree algorithm is a common classification algorithm in data mining technology, and its results are usually expressed in the form of if-then rules.
Yuzhu Diao, Qing Zhang
doaj +1 more source
Review of Formal Specification and Verification for Operating Systems [PDF]
Operating Systems (OSs), which form a critical infrastructure in the information age, are widely used in core fields such as medical care, industries, and the military.
WANG Zi, WANG Hongqiang, YANG Xiaoyi, LAN Yuqing
doaj +1 more source
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [PDF]
Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or ...
C Olston +6 more
core +3 more sources
Learning to Generate Posters of Scientific Papers
Researchers often summarize their work in the form of posters. Posters provide a coherent and efficient way to convey core ideas from scientific papers.
Fu, Yanwei +4 more
core +1 more source
What factors are critical to attracting NHS foundation doctors into specialty or core training?:A discrete choice experiment [PDF]
Our thanks to all those who participated in developing and piloting the DCE and completing the survey. With thanks to NHS Education for Scotland for merging the DCE onto the destination survey. Funding: NHS Education for Scotland funded this programme of
Arthur +11 more
core +3 more sources
Understanding the mechanisms behind the sexualized-body inversion hypothesis: The role of asymmetry and attention biases. [PDF]
A controversial hypothesis, named the Sexualized Body Inversion Hypothesis (SBIH), claims similar visual processing of sexually objectified women (i.e., with a focus on the sexual body parts) and inanimate objects as indicated by an absence of the ...
Carlotta Cogoni +5 more
doaj +1 more source

