Results 21 to 30 of about 917,270 (333)
Applications and the future of bitcoin through analysing potential practical applications and prospects in finance in Venezuela [PDF]
With the rise of Bitcoin in 2009, cryptocurrency rapidly transformed to a commonly used tool for transaction and trades between individuals. Being the most used type of cryptocurrency what are some applications of Bitcoin in the real world?
Shen Jayden
doaj +1 more source
Effective Altruism (EA) is both a philosophy and a movement. The main criticism on EA is that by donating to charities EA leaves fundamental moral issues such as global poverty and injustice intact.
Iraklis Ioannidis
doaj +1 more source
The role of contextual materials in object recognition
While scene context is known to facilitate object recognition, little is known about which contextual “ingredients” are at the heart of this phenomenon.
Tim Lauer+2 more
doaj +1 more source
CHAMBER MUSIC EXPLORATION FOR MEDITATION. PART IV – THE PIECES [PDF]
Music aids meditation practices to concentrate, focus, and direct our attention to regulate our mind and body. As music evokes a broad range of feelings, from excitement to relaxation, enjoyment to sadness, fear to relief, and even mixtures of these, it ...
János Zsolt IMRE
doaj +1 more source
Arguably, grammars which associate natural language expressions not only with a syntactic but also with a semantic representation, should do so in a way that capture paraphrasing relations between sentences whose core semantics are equivalent. Yet existing semantic grammars fail to do so.
Gardent, Claire+2 more
openaire +3 more sources
Efficient deep processing of japanese [PDF]
We present a broad coverage Japanese grammar written in the HPSG formalism with MRS semantics. The grammar is created for use in real world applications, such that robustness and performance issues play an important role. It is connected to a POS tagging
Bender, Emily M., Siegel, Melanie
core +2 more sources
Security Evaluation of Wireless Network Access Points
The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given.
Kalniņš Rūdolfs+2 more
doaj +1 more source
ABOUT BLENDED LEARNING ON THE BASIS OF FUNCTIONING OF THE ACTIVITY TRIANGLE
The article considers an actual nowadys problem of Informatization of the educational process in secondary school. In conditions of global Informatization of society and education as a basic social institution, the personal condition of the person ...
Evgeny Konstantinovich Vasin
doaj +1 more source
Central and peripheral fields of view extract information of different quality and serve different roles during visual tasks. Past research has studied this dichotomy on-screen in conditions remote from natural situations where the scene would be ...
Erwan David+2 more
doaj +1 more source
The Serbian Danube region as tourist destination [PDF]
The aim of this paper is to show the advantages and disadvantages of the Serbian Danube Region as a tourist destination. Tasks to be completed in order to achieve the set aim include: determining the position of the Serbian Danube Region from ...
Lukić Dobrila
doaj +1 more source