نتایج جستجو برای: identity features of researcher
تعداد نتایج: 21193986 فیلتر نتایج به سال:
Background: Whistleblowing as a control tool should be encouraged in organizations to deter organizational illegal and immoral wrongdoings that finally are harmful to the society. Personality traits of people are influential factors on their intention to disclose the wrongdoings. This study aimed to assess the relationship between four personality traits (internal locus of control, ethical iden...
This study examines a method of generating comprehensive profiling information for a researcher analysis service. In addition to basic and performance-based information about researchers necessary to generate profiling information, we introduce researcher performance index models for researcher analysis service. The models can that measure qualitative and quantitative performance, researcher in...
There are two qualitative and quantitative research paradigms in the methodological debates. Phenomenological approach is one of the most important methods in the qualitative researches. ‎Depending on researcher’s view on study phenomenon, this approach is divided into two main ‎methods of descriptive and interpretive. Despite the many similarities between the two methods, ‎th...
چکیده: این پژوهش با عنوان بررسی نقش جامعه ی شبکه ای به روی هویت اجتماعی جوانان شهر اصفهان، در مرحله اول، به شناخت پیامدهای جامعه ی شبکه ای برروی مقوله هویت اجتماعی ومولفه های آن به صورت کلان اقدام شدو در مرحله بعدی به بررسی فرضیه های ارائه شده در طول تحقیق، و درک وجود پیامدهای این پدیده بر روی ابعاد مختلف هویت اجتماعی پرداختیم. در این پژوهش از 2 روش پیمایشی وروش اسناد ومدارک علمی استفاده ده ا...
In this paper we present a unique approach to personal identification which utilized finger surface features as a biometric identifier. Finger surface features are extracted from dense range images of an individual’s hand. The shape index (a curvature-based surface representation) is used to represent the surfaces of the index, middle, and ring fingers of an individual. This representation is u...
A pictured object can be readily detected in an RSVP sequence when the target is specified by a superordinate category name such as animal or vehicle. Are category features the initial basis for detection, with identification of the specific object occurring in a second stage (Evans & Treisman, 2005), or is identification of the object the basis for detection? When two targets in the same super...
In this paper we propose the discrete cosine transform (DCT) mod 2 feature set, which utilizes polynomial coe2cients derived from 2D DCT coe2cients obtained from spatially neighboring blocks. Face veri%cation results on the multi-session VidTIMIT database suggest that the DCT-mod 2 feature set is superior (in terms of robustness to illumination direction changes and discrimination ability) to f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید