Results 1 to 10 of about 275,015 (197)
ARTful Design: Disruptions Within the Dissertation in Practice
A student within a university’s Ed.D. program is encouraged by her director to narrow her research focus; however, her interests in Curriculum Studies, Arts-Based Educational Research, and Composition Studies led her to design a practitioner action ...
Peaches Hash
doaj +1 more source
Deep Hashing Using Proxy Loss on Remote Sensing Image Retrieval
With the improvement of various space-satellite shooting methods, the sources, scenes, and quantities of remote sensing data are also increasing.
Xue Shan +4 more
doaj +1 more source
Blockchain Technology in Advertising Campaigns
The article is devoted to the peculiarities of blockchain technology in terms of its application in the economy. The emphasis is on the impact of this technology on the advertising market.
A. A. Efremov +2 more
doaj +1 more source
Although hash function learning algorithms have achieved great success in recent years, most existing hash models are off-line, which are not suitable for processing sequential or online data. To address this problem, this work proposes an online hash model to accommodate data coming in stream for online learning.
Long-Kai Huang +2 more
openaire +3 more sources
THE SPEED CALCULATING INCREASING METHOD OF THE MARKOV MODEL NETWORK NODE
The subject of this research is the image classification methods based on a set of key points descriptors. The goal is to increase the performance of classification methods, in particular, to improve the time characteristics of classification by ...
Pavlo Pustovoitov +3 more
doaj +1 more source
Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism
The security of web applications in an enterprise is of paramount importance. To strengthen the security of applications, the identification and mitigation of vulnerabilities through appropriate countermeasures becomes imperative.
Kavita Bhatia +3 more
doaj +1 more source
MAC Address Anonymization for Crowd Counting
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area. In this paper, we discuss a crowd counting system involving WiFi sensors detecting PRs over the air, then ...
Jean-François Determe +3 more
doaj +1 more source
Deep Hash Remote Sensing Image Retrieval with Hard Probability Sampling
As satellite observation technology improves, the number of remote sensing images significantly and rapidly increases. Therefore, a growing number of studies are focusing on remote sensing image retrieval. However, having a large number of remote sensing
Xue Shan +4 more
doaj +1 more source
Blockchain Technology – Support for Collaborative Systems [PDF]
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj +1 more source
BlockChain (BC), Technology Notary in Data Driven Marketing (DDM) Contracts [PDF]
Today, Data Driven Marketing is challenged by the supply of vague data, inconsistencies between them and fraud through advertising in the digital marketing ecosystem.
Ermal Haxhiaj, Bia Çera
doaj

