Results 41 to 50 of about 42,583 (195)

“Time‐Tripping” and Memory‐Making: A Grounded Theory of Grounded Theory

open access: yesSymbolic Interaction, EarlyView.
This paper explores the development of grounded theory methodology through the lens of memory studies, introducing the concept of “time‐tripping” as a key generic social process. The paper identifies several sub‐processes of time‐tripping, including “reclaiming,” “resisting,” “retro‐casting,” and “landscaping,” which shape the methodological “imaginary.
Barry John Gibson   +2 more
wiley   +1 more source

A Reinforcement Learning Agent for Minutiae Extraction from Fingerprints [PDF]

open access: yes, 2001
In this paper we show that reinforcement learning can be used for minutiae detection in fingerprint matching. Minutiae are characteristic features of fingerprints that determine their uniqueness.
Bazen, Asker M.   +3 more
core   +3 more sources

South Asian Bodies at British Borders in the 1970s: From the Ugandan Asian ‘Stateless Husbands’ to ‘Virginity Testing’

open access: yesGender &History, EarlyView.
ABSTRACT This article looks at two critical moments in British immigration – the case of the ‘stateless’ Ugandan Asian husbands, whose wives successfully argued for their entry in Britain in 1973 and the ‘virginity test’ performed on Mrs K at Heathrow Airport in 1979.
Antara Datta, Jinal Parekh
wiley   +1 more source

Cross-Sensor Fingerprint Matching Method Based on Orientation, Gradient, and Gabor-HoG Descriptors With Score Level Fusion

open access: yesIEEE Access, 2018
The fingerprint is one of the oldest and most widely used biometric modality for person identification. Existing automatic fingerprint matching systems perform well when the same sensor is used for both enrollment and verification (regular matching ...
Helala Alshehri   +3 more
doaj   +1 more source

Theorizing Patriarchy Against a Backdrop of Workplace Sexism and Stress in UK Academia

open access: yesGender, Work &Organization, EarlyView.
ABSTRACT Our analysis investigates the distinct relationship between sexism and workplace stress as experienced by women academics in the UK higher education system. We argue that due to the insufficient literature on this issue there is a limited knowledge base of the harmful psychological effects of stress in the workplace upon women academics in the
Andrew Baron, Charlotte Barrow
wiley   +1 more source

From observation to understanding: A multi‐agent framework for smart microscopy

open access: yesJournal of Microscopy, EarlyView.
Abstract Smart microscopy represents a paradigm shift in biological imaging, moving from passive observation tools to active collaborators in scientific inquiry. Enabled by advances in automation, computational power, and artificial intelligence, these systems are now capable of adaptive decision‐making and real‐time experimental control.
P. S. Kesavan, Pontus Nordenfelt
wiley   +1 more source

Is There High-Level Causation? [PDF]

open access: yes, 2013
The discovery of high-level causal relations seems a central activity of the special sciences. Those same sciences are less successful in formulating strict laws. If causation must be underwritten by strict laws, we are faced with a puzzle (first noticed
Glynn, Luke
core  

Perfect Fingerprint Orientation Fields by Locally Adaptive Global Models

open access: yes, 2016
Fingerprint recognition is widely used for verification and identification in many commercial, governmental and forensic applications. The orientation field (OF) plays an important role at various processing stages in fingerprint recognition systems. OFs
Gottschlich, Carsten   +2 more
core   +1 more source

A Selfless Integrator or a Selfish Quasi‐Professional? Relational Tactics for Organizational Professionals’ Durable Influence

open access: yesJournal of Management Studies, EarlyView.
Abstract Our study works towards a ‘sociology of organizational professionals’ by elucidating how they navigate domains dominated by occupational professionals. It shows that relational tactics impact whether organizational professionals remain limited to a periphery, become subservient to occupational professionals, or achieve durable roles.
Giovanni Radaelli   +2 more
wiley   +1 more source

RSA Cryptographic Key Generation Using Fingerprint Minutiae

open access: yesIraqi Journal for Computers and Informatics, 2014
Human users find difficult to remember long cryptographic keys. Therefore, researchers, for a long time period, have been investigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce ...
Mofeed Rashid, Huda Zaki
doaj   +1 more source

Home - About - Disclaimer - Privacy