نتایج جستجو برای: namely identity
تعداد نتایج: 280440 فیلتر نتایج به سال:
Despite ample explorations the nature of neural mechanisms underlying human expertise in face perception is still undetermined. Here we examined the response of two electrophysiological signals, the N170 ERP and induced gamma-band activity (>20 Hz), to face orientation and familiarity across two blocks, one in which the face identity was task-relevant and one in which it was not. N170 amplitude...
This paper has a two-fold purpose. First, by considering a reformulation of a deep theorem of Göllnitz, we obtain a new weighted partition identity involving the Rogers-Ramanujan partitions, namely, partitions into parts differing by at least two. Consequences of this include Jacobi’s celebrated triple product identity for theta functions, Sylvester’s famous refinement of Euler’s theorem, as we...
Macbeath gave a formula for the number of xed points for each non-identity element of a cyclic group of automorphisms of a compact Riemann surface in terms of the universal covering transformation group of the cyclic group. We observe that this formula generalizes to determine the xed-point set of each non-identity element of a cyclic group of automorphisms acting on a closed non-orientable sur...
The purpose of this qualitative research study is to gauge the current state of the academic developments in Educational Technology in order to identify pivotal issues and offer suggestions for future planning in Canada. This article explores the professional literature and the views of 25 senior faculty members from the twelve Canadian universities which offer or offered graduate degree progra...
This work will try to join two axis of research which concepts are in vogue. The first concerns the federated identity. The studies in this topic will allow the interconnection of information systems, access to different resources and, above all, a secure and controlled sharing data. The implementation of such architectures required several exchanges of requests and responses which can be costl...
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we describe and give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdropping-based...
This paper is an exercise in the design of contracts within aworld of two persons, namely a landlord and a tenant, restricted tosharecropping. The landlord sets the shares according to the profit-maximizing "golden rule" ([4]), which depends on certain characteris-tics of the tenant. The tenant declares these characteristics, and isthus allowed to pretend to be someone else,...
Macbeath gave a formula for the number of fixed points for each non-identity element of a cyclic group of automorphisms of a compact Riemann surface in terms of the universal covering transformation group of the cyclic group. We observe that this formula generalizes to determine the fixed-point set of each non-identity element of a cyclic group of automorphisms acting on a closed non-orientable...
The present study is aimed at assessing the state of national identity among female students of Ahwaz Islamic Azad University and explores the social factors affecting upon it. The statistical society consisted of 8532 students at the three levels of associate diploma undergraduate and master degrees. The research method in this study is a “survey” and collection of data has been carried out by...
The use of biometric data for automated identity verification, is one of the major challenges in secure access control systems. In this paper, several issues related to the application of active vision techniques for identity verification, using facial images, are discussed and a practical system (developed within an European research project), encompassing the active vision paradigm, is descri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید