Results 61 to 70 of about 341,079 (230)
Substitution-based approach for linguistic steganography using antonym [PDF]
Steganography has been a part of information technology security since a long time ago. The study of steganography is getting attention from researchers because it helps to strengthen the security in protecting content message during this era of ...
Mansor, Fawwaz Zamir
core
ABSTRACT This study investigates the impact of perceived destination sustainability on memory and place attachment, mediated by tourism experience and value co‐creation, within the framework of Signaling Theory and the resource‐based view. Data from 390 Americans who visited Brazil in the last 12 months were collected through an online survey.
William Quezado F. Cavalcante+2 more
wiley +1 more source
Itinerant curriculum theory: People's theory against the field's epistemicidal ethos
Abstract The field of curriculum studies suffers from a glaring theoretical impasse. Much of this impasse has been rightly attributed to the triumphalism of the neoliberal wave that has massacred the educational hemisphere with policies and practices that reduce pedagogy to an instrumentalist praxis directly associated with the thirsty desires and ...
João M. Paraskeva
wiley +1 more source
Investigating the Sources of the French Grammar (1724) by Ivan Gorlitsky
The article is dedicated to the grammar of the French language, which is kept in the manuscript department of the Library of the Academy of Sciences (RO BAN, P I B, №106). The authorship of the manual is attributed to Ivan Gorlitsky (1690–1777).
N. Kareva
semanticscholar +1 more source
A grammar formalism based upon CHR is proposed analogously to the way Definite Clause Grammars are defined and implemented on top of Prolog. These grammars execute as robust bottom-up parsers with an inherent treatment of ambiguity and a high flexibility
Christiansen, Henning
core
ABSTRACT Humans are hardwired to seek out social connections, as well as monitor for warning signs that their belonging may be at risk. Social identities provide a mechanism through which to monitor belonging, shaping how people understand and see themselves, as well as how they are perceived by others. This large qualitative study (n = 203) presents a
Veronica M. Lamarche+2 more
wiley +1 more source
Simple Method for Transforming Liquid Silicone Oils Into High‐Quality Solid Silicone Resins
A cost‐effective, sustainable method for synthesizing highly crosslinked silicone resins from silicone oil (linear polyorganylsiloxanes) was developed. The process achieved up to 80% yield of resins with silicone oligomers as a byproduct. Solid‐state NMR and EPR spectroscopy confirmed resin structure and pointed towards a radical reaction mechanism ...
Shamna Salahudeen+5 more
wiley +1 more source
ABSTRACT As more organizations move to remote hiring assessments, important questions emerge as to the effects on scores, racioethnic, and gender subgroup differences, and candidate reactions. We compare scores of candidates assessed remotely under proctored conditions (N = 902) versus onsite (N = 891) in an actual selection context in the same ...
Emily D. Campion+2 more
wiley +1 more source
Learning Pose Grammar to Encode Human Body Configuration for 3D Pose Estimation
In this paper, we propose a pose grammar to tackle the problem of 3D human pose estimation. Our model directly takes 2D pose as input and learns a generalized 2D-3D mapping function.
Fang, Haoshu+4 more
core +1 more source
Employer Responsiveness to Online Reviews: A Signal of Caring About Employees
ABSTRACT Employer reviews (i.e., online workplace ratings authored by employees) attract broad interest and shape the opinions of potential employees. Thus, companies face the challenge of dealing with these workplace judgments that are outside their direct control.
Christoph E. Höllig+2 more
wiley +1 more source