نتایج جستجو برای: authenticity
تعداد نتایج: 6831 فیلتر نتایج به سال:
Members of virtual teams lack many of the visual or auditory cues that are usually used as the basis for impressions about fellow team members. We focus on the effects of the impressions formed in this context, and use social exchange theory to understand how these impressions affect team performance. Our pilot study, using content analysis (n = 191 students), suggested that most individuals be...
The five experiments reported here demonstrate that authenticity is directly linked to morality. We found that experiencing inauthenticity, compared with authenticity, consistently led participants to feel more immoral and impure. This link from inauthenticity to feeling immoral produced an increased desire among participants to cleanse themselves and to engage in moral compensation by behaving...
To train and evaluate fog/haze removal models, it is highly desired but burdensome to collect a large-scale dataset comprising well-aligned foggy/hazy images with their fog-free/haze-free versions. In this paper, we propose a framework, namely Foggy and Hazy Images Simulator (FoHIS for short), to simulate more realistic fog and haze effects at any elevation in images. What’s more, no former stu...
The issue of the integrity of edible oils and fats can be considered in three main areas of safety, authenticity and quality in accordance with the standardization approach. Safety is the most essential part of the food, including edible oils, due to effects on health of consumers. Authenticity equivalent to purity is also an important aspect of this approach. The nature and prevention of fraud...
The paper explores the usage of complaint registration system in India. In many cases, people want to file a complaint or be whistleblower but fear consequences from disclosure of identity. On the other hand, authorities though focused on authenticity of the complaint and not identity of complainant yet it is difficult to establish authenticity of the complaint registered in case of anonymous o...
We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calculus is equipped with a system of types and effects providing static guarantees of secrecy and authenticity in the presence of a Dolev-Yao intruder. The novelty with respect to existing type systems for security is in the struc...
The rapid growth in information and communication technologies has advances the medical data management systems immensely. In this regard, many different techniques and also the advanced equipment like Magnetic Resonance Imaging (MRI) Scanner, Computer Tomography (CT) scanner, Positron Emission of Tomography (PET), mammography, ultrasound, radiography etc. are used. Nowadays there is a rise of ...
ion. The only restriction is that the field names of the dependees must be specified in the depends clauses. 5.1.2.2. Locality Rule. The locality rule is fairly natural: Usually, abstractions of dynamic components abstract from the states of their interface and representation objects. As long as these objects are reachable from an interface object via read-write references, such abstractions me...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید