Results 1 to 10 of about 275,015 (197)

ARTful Design: Disruptions Within the Dissertation in Practice

open access: yesImpacting Education, 2022
A student within a university’s Ed.D. program is encouraged by her director to narrow her research focus; however, her interests in Curriculum Studies, Arts-Based Educational Research, and Composition Studies led her to design a practitioner action ...
Peaches Hash
doaj   +1 more source

Deep Hashing Using Proxy Loss on Remote Sensing Image Retrieval

open access: yesRemote Sensing, 2021
With the improvement of various space-satellite shooting methods, the sources, scenes, and quantities of remote sensing data are also increasing.
Xue Shan   +4 more
doaj   +1 more source

Blockchain Technology in Advertising Campaigns

open access: yesЦифровая трансформация, 2023
The article is devoted to the peculiarities of blockchain technology in terms of its application in the economy. The emphasis is on the impact of this technology on the advertising market.
A. A. Efremov   +2 more
doaj   +1 more source

Online Hashing [PDF]

open access: yesIEEE Transactions on Neural Networks and Learning Systems, 2018
Although hash function learning algorithms have achieved great success in recent years, most existing hash models are off-line, which are not suitable for processing sequential or online data. To address this problem, this work proposes an online hash model to accommodate data coming in stream for online learning.
Long-Kai Huang   +2 more
openaire   +3 more sources

THE SPEED CALCULATING INCREASING METHOD OF THE MARKOV MODEL NETWORK NODE

open access: yesСучасні інформаційні системи, 2021
The subject of this research is the image classification methods based on a set of key points descriptors. The goal is to increase the performance of classification methods, in particular, to improve the time characteristics of classification by ...
Pavlo Pustovoitov   +3 more
doaj   +1 more source

Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism

open access: yesSensors, 2023
The security of web applications in an enterprise is of paramount importance. To strengthen the security of applications, the identification and mitigation of vulnerabilities through appropriate countermeasures becomes imperative.
Kavita Bhatia   +3 more
doaj   +1 more source

MAC Address Anonymization for Crowd Counting

open access: yesAlgorithms, 2022
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area. In this paper, we discuss a crowd counting system involving WiFi sensors detecting PRs over the air, then ...
Jean-François Determe   +3 more
doaj   +1 more source

Deep Hash Remote Sensing Image Retrieval with Hard Probability Sampling

open access: yesRemote Sensing, 2020
As satellite observation technology improves, the number of remote sensing images significantly and rapidly increases. Therefore, a growing number of studies are focusing on remote sensing image retrieval. However, having a large number of remote sensing
Xue Shan   +4 more
doaj   +1 more source

Blockchain Technology – Support for Collaborative Systems [PDF]

open access: yesInformatică economică, 2020
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj   +1 more source

BlockChain (BC), Technology Notary in Data Driven Marketing (DDM) Contracts [PDF]

open access: yesOvidius University Annals: Economic Sciences Series, 2021
Today, Data Driven Marketing is challenged by the supply of vague data, inconsistencies between them and fraud through advertising in the digital marketing ecosystem.
Ermal Haxhiaj, Bia Çera
doaj  

Home - About - Disclaimer - Privacy