Results 41 to 50 of about 518,478 (263)
In today’s information age, how to accurately identify a person’s identity and protect information security has become a hot topic of people from all walks of life.
Yang Wang, Dekai Shi, Weibin Zhou
doaj +1 more source
Polynomial fusion rings of W-extended logarithmic minimal models
The countably infinite number of Virasoro representations of the logarithmic minimal model LM(p,p') can be reorganized into a finite number of W-representations with respect to the extended Virasoro algebra symmetry W.
Rasmussen, Jorgen
core +1 more source
Cognitive Inflexibility Predicts Extremist Attitudes
Research into the roots of ideological extremism has traditionally focused on the social, economic, and demographic factors that make people vulnerable to adopting hostile attitudes toward outgroups.
Leor Zmigrod +4 more
doaj +1 more source
Generating De-identification facial images based on the attention models and adversarial examples
In response to the problem that facial features are likely to cause privacy leakage and identity theft of the user, this paper presents a method for generating De-identification facial images based on attention models and adversarial examples. The method
Jingjing Yang +4 more
doaj +1 more source
Band of mothers: Childbirth as a female bonding experience.
Does the experience of childbirth create social bonds among first-time mothers? Previous research suggests that sharing emotionally intense or painful experiences with others leads to "identity fusion," a visceral feeling of oneness with a group that ...
Tara Tasuji +3 more
doaj +1 more source
Admiration for Islamist groups encourages self-sacrifice through identity fusion
The psychological mechanisms that lead terrorists to make costly sacrifices for their ideological convictions are of great theoretical and practical importance.
Á. Gómez +6 more
doaj +1 more source
Fusion of irreducible modules in WLM(p,p')
Based on symmetry principles, we derive a fusion algebra generated from repeated fusions of the irreducible modules appearing in the W-extended logarithmic minimal model WLM(p,p').
Rasmussen, Jorgen
core +1 more source
IDENTITY FUSION AND REMEMEMBRANCE PROCESSES
Purpose: From the assumption that identity fusion will influence the processes of remembrance, this works propose that individuals classified as fused will remembermore in detail certain events of their countries, and the influence of these events will be greater in their identities than the influence in individuals classified as not fused.Method: In a
openaire +2 more sources
Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley +1 more source
Cross-social Network User Identity Matching Based on Fusion Representation Learning [PDF]
Aiming at the problems that the existing cross-social network user identity matching algorithm has low accuracy and difficult data acquisition,a new cross-social network user identity matching algorithm is proposed.Using the known matching account nodes ...
YANG Yizhuo,YU Hongtao,HUANG Ruiyang,LIU Zhengming
doaj +1 more source

