محصولات
Ahmet Suayb Gundogdu Food Security, Affordable Housing, and Poverty - Original PDF
Ahmet Suayb Gundogdu Food Security, Affordable Housing, and Poverty - Original PDF
نویسندگان: An Islamic Finance Perspective خلاصه: CHAPTER 1 Affordable Housing and Poverty “The root causes of the problem in accessing affordable housing” In Islam, paying Zakat, avoiding Riba, and spending to avoid hoarding have much more value than abstaining from fornication, theft, and drinking. The hoarding issue has not been appropriately preached since Al-Ahbari has been hoarding.1 The importance, as well as the proper imposition of Zakat, is also ignored. Case Box 1.1 showcases the clari- fication from Muhammad ( ).
Beginner's Guide to JUNGIAN PSYCHOLOGY - Original PDF
Beginner's Guide to JUNGIAN PSYCHOLOGY - Original PDF
نویسندگان: Robin Robertson خلاصه: The Jung on the Hudson Book Series was instituted by The New York Center for Jungian Studies in 1997. This ongoing series is designed to present books that will be of interest to individuals of all field s, as well as mental health professionals, who are interested in exploring the relevance of the psychology and ideas of C. G. J ung to their personal lives and professional activitie
Regulating the Metaverse By Ignas Kalpokas, Julija Kalpokienė - Original PDF
Regulating the Metaverse By Ignas Kalpokas, Julija Kalpokienė - Original PDF
نویسندگان: Ignas Kalpokas, Julija Kalpokienė خلاصه: A Critical Assessment
HCI International 2022 – Late Breaking Posters - Original PDF
HCI International 2022 – Late Breaking Posters - Original PDF
نویسندگان: Constantine Stephanidis, Margherita Antona, Stavroula Ntoa, Gavriel Salvendy خلاصه: 4 P. Asghari et al. 1 Introduction Eye tracking (ET) is frequently used, for example, in behavioral research and human-computer interaction. Eye movement patterns can reveal detailed infor- mation about the user’s cognitive processes, their attention level, or decision- making processes [3,12]. Applications and research based on ET require reliable and robust data [9]. Traditionally, this requires dedicated hardware with high- resolution cameras and infrared illumination to detect corneal reflections [7]. However, dedicated hardware is expensive and thus limits the pervasive use in real-world applications. This situation may change since, propelled by recent advances in deep learning, appearance-based gaze estimation methods that deliver promising results based on low-cost consumer-grade camera inputs start to emerge [2,10,11,21]. These approaches learn to estimate gazes from a video stream based on large-scale data sets and provide 3D gaze vectors or correspond- ing 2D gaze locations on a screen. Furthermore, they do not require any specific external devices and can be used with standalone computers, laptop built-in webcams, or mobile device consumer-grade cameras. This opens up the possi- bility of developing affordable automated intelligent ET solutions for research, commerce, and the general public. On the way to realize this ambition, webcam ET (wcET) has to address several challenges including gaze estimation accu- racy, gaze estimator prediction time, and that gaze estimation quality can be affected by user movements [11]. This paper aims to contribute to the first step toward utilizing wcET as a low-cost pervasive technology by validating the data quality of a state-of-the-art wcET approach in comparison to the performance of an established, commercially available dedicated eye tracking (dhET) system. Accordingly, we address the following research question in our work: How does the gaze estimates of wcET differ from dhET in practical settings regarding accu- racy, precision, and sampling rate? We will further discuss how the limitations of the data quality may affect the performance of wcET applications
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) - Original PDF
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) - Original PDF
نویسندگان: Nadia Nedjah, Gregorio Martínez Pérez, B. B. Gupta خلاصه: Presents research works in the field of cyber security, privacy, and networking Provides results of ICSPN 2021, organized during September 09–11, 2022, in Thailand in online mode Serves as a reference for researchers and practitioners in academia and industry
Blockchain Technology and Emerging Technologies - Original PDF
Blockchain Technology and Emerging Technologies - Original PDF
نویسندگان: Weizhi Meng, Wenjuan Li خلاصه: ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract Ilya Grishkov1, Roland Kromes1(B), Thanassis Giannetsos2, and Kaitai Liang1 1 Cyber Security Group, Delft University of Technology, Delft, The Netherlands I.Grishkov-1@student.tudelft.nl, {R.G.Kromes,Kaitai.Liang}@tudelft.nl 2 Ubitech Ltd., Digital Security and Trusted Computing Group, Athens, Greece agiannetsos@ubitech.eu Abstract. This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryp- tion scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A new extension to the self- encryption scheme was deployed by integrating data owner’s identity into the encryption process. Such integration allows to permanently pre- serve ownership of the original file and link it to the person/entity who originally uploaded it. Moreover, self-encryption provides strong security guarantees that decryption of a file is computationally not feasible under the condition that the encrypted file and the key are safely stored. Keywords: Blockchain · IPFS · Self-Encryption · Security · Hyperledger Fabric 1 Introduction The modern world is increasingly adopting blockchain technology. The first major market adoption of blockchain happened in 2009 when Bitcoin was introduced [12]. Interest in blockchain solutions grew over the years and lead to the invention of Ethereum - Bitcoin peer but with support for smart contracts which are digital codes enabling the description of complete business logic [1]. The introduction of smart contracts leads to further development in the field of blockchain and cre- ated demand for more industry-friendly solutions that allow to identify users of the system (Know-Your-Customer, Anti-Money-Laundering). Hyperledger Fab- ric was then introduced as a highly modular permissioned blockchain that allows great customization to suit particular industrial needs [3]. Given its customizabil- ity and modularity, Hyperledger Fabric (HLF) is a perfect platform for extending it with various trust and privacy preservation solutions
Roger Lee Editor Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing - Original PDF
Roger Lee Editor Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing - Original PDF
نویسندگان: Roger Lee خلاصه: Presents recent research on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Provides edited outcome of the 23rd SNPD 2022 conference Written by experts in the field
Regulation of Cryptocurrencies and Blockchain Technologies National and International Perspectives Second Edition - Original PDF
Regulation of Cryptocurrencies and Blockchain Technologies National and International Perspectives Second Edition - Original PDF
نویسندگان: Rosario Girasa خلاصه: Uncovers the key actors in digital technology while showcasing the benefits and risks of digital currencies Takes a critical look at the most up-to-date federal, state, and international regulation of virtual currency Explores the creation of stablecoins and governments issuance of their own versions of digital currencies
50 Literacy Strategies Step by Step Fourth Edition - Original PDF
50 Literacy Strategies Step by Step Fourth Edition - Original PDF
نویسندگان: Gail E. Tompkins خلاصه: Young children write “All About . . .” books on familiar topics (Tompkins, 2012). They put together a booklet with four or five pages, write a sentence or two on each page, and add illustrations to elaborate the information presented in the text. Stu- dents read the book to the teacher, who helps them elaborate ideas and correct mechani- cal errors before they share from the author’s chair (see p. 10). As they gain experience writing books with one or two sentences per page, students can expand and elaborate the information they share on each page, gradually increasing the length to a paragraph
AN INTRODUCTION TO PERFORMANCE ANALYSIS OF SPORT - Original PDF
AN INTRODUCTION TO PERFORMANCE ANALYSIS OF SPORT - Original PDF
نویسندگان: PETER O’DONOGHUE خلاصه: This introductory chapter introduces sports performance analysis by asking the following questions: What? Why? Who? Where? When? and How? What is sports performance analysis? What are sports performance data and information? Why do we analyse sports performance? Who analyses sports performance? Where is sports performance analysis done? When is sports performance analysis done? How is sports perform- ance analysis done? The answers to these questions are not independent. The reason why sports performance analysis is done and who requires the information can dictate what information is required. The informa- tion required can in turn influence when it is needed and thus when sports performances should be analysed. The time at which information is needed and economic constraints dictate the methods and locations of sports performance analysis tasks. These questions will be answered in turn but readers can expect some necessary overlap between the answers.

آیا کتاب مورد نظر هنوز بر روی سایت قرار نگرفته است؟ جای نگرانی نیست! کافی است بر روی گزینه سفارش کتاب کلیک کرده و درخواست خود را ثبت کنید. در کمتر از چند ساعت کتاب شما را آماده خواهیم کرد.