Showing 201 - 220 results of 1,398 for search 'face coding', query time: 0.10s Refine Results
  1. 201

    Neutrality in public service interpreting by Zuzana Balounová

    Published 2021-12-01
    “…Using practical examples, the article analyses some of the existing codes of ethics and professional guidelines, which, as several authors suggest, are insufficient and should be reassessed. …”
    Get full text
    Article
  2. 202

    Smart Real-time Attendance System for Nigerian Universities by Mikailu Habila, Faseki N. Francisca, Luwani Ishaya, Muhammed Kabir Ahmed, Umar A. Muhammad, Haruna P. Charles

    Published 2025-01-01
    “…Key development tools included InsightFace, OpenCV, and Streamlit, with Visual Studio Code as the IDE. …”
    Get full text
    Article
  3. 203

    QoS-Aware Link Adaptation for Beyond 5G Networks: A Deep Reinforcement Learning Approach by Ali Parsa, Neda Moghim, Sachin Shetty

    Published 2025-01-01
    “…Modern wireless communication systems face increasingly complex challenges due to rapidly changing channel conditions and the growing diversity of application-specific Quality of Service (QoS) requirements. …”
    Get full text
    Article
  4. 204

    AAMS: Application-Aware MCS Selection With Mode Switching for QoE-Driven Large-Scale Media Transmission in 6G Mobile Networks by Somin Park, Minji Choi, Jin-Hyun Ahn, Dong Ho Kim, Cheolwoo You

    Published 2025-01-01
    “…Consequently, these approaches face limitations in supporting a wide range of future services with diverse QoE requirements. …”
    Get full text
    Article
  5. 205

    Public administration employees' ethics and its importance for reduction of corruption by Tanjević Nataša

    Published 2016-01-01
    “…Many countries, including the Republic of Serbia, today are faced with the necessity of reforming the public sector, and the need to create more efficient and better public services which would help create not only a more professional efficient administration, but also help prevent possible abuses in this sector. …”
    Get full text
    Article
  6. 206

    The Impact of Learner Ill-Discipline on Teaching and Learning in High Schools of Waterberg District, Limpopo Province by Mashaba Ernest Khalabai, Ntshengedzeni Albert Tshisevhe, Simeon Maile

    Published 2024-10-01
    “…Studies have indicated that lack of discipline among learners in schools is one of the foremost problems facing schools both nationally and internationally. …”
    Get full text
    Article
  7. 207

    DU SYSTÈME DE COUVERTURE SANTÉ UNIVERSELLE. Quel intérêt pour l’assuré salarié malade par rapport aux régimes de maladie des Codes du travail et de la sécurité sociale ? by Martin KONYI CITENGA

    Published 2024-08-01
    “…L’assujettissement des travailleurs régis par le Code du travail à l’assurance maladie obligatoire du système de couverture santé universelle soulève la question de l’intérêt que présente cette assurance pour les concernés quand on sait qu’en tant qu’assurés salariés, les Codes du travail et de la sécurité sociale leur garantissent utilement de soins lorsqu’ils sont malades. …”
    Get full text
    Article
  8. 208

    Application and realization of key technologies in China railway e-ticketing system by Xinghua Shan, Zhiqiang Zhang, Fei Ning, Shida Li, Linlin Dai

    Published 2023-04-01
    “…Focusing on the key technologies and architecture the of existing ticketing system, multiple service resources are expanded and developed such as electronic ticket clusters, PSR clusters, face recognition clusters and electronic ticket identification code clusters. …”
    Get full text
    Article
  9. 209

    Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers by Idham Qrida Nusa, Bambang Sugiri, Yuliati Yuliati, Faizin Sulistio

    Published 2025-06-01
    “…As a case study to show how cyber criminals commit cyber crimes by using computer networks, investigators still face difficulties in conducting searches and seizures to obtain evidence. …”
    Get full text
    Article
  10. 210

    Generation and verification method of trusted signature seal incorporating handwriting features by Li LI, Shang GAO, Peiliang ZUO, Jiazheng XUAN, Han SONG

    Published 2024-02-01
    “…With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic document signing is evident through practices such as online signature collection, remote signature confirmation, and electronic signature authentication.However, the signing and verification processes face challenges related to authenticity, integrity, and more.Instances of unlawful entities intercepting, copying, and forging signature images using low-cost methods to sign documents with false identities, as well as tampering with and forging signature files, are common.The application of electronic signature systems also encounters obstacles such as high costs, limited deployment, lack of universality, and complexities in real-time and consistent verification.To address these risks and challenges and ensure reliable verification in personal document signing processes, a credible method for generating and verifying signature seals that integrate handwriting features was proposed.This method primarily utilized the facial recognition and identity information matching functions of a trusted identity authentication platform.It integrated signature handwriting features and uniquely bound them to the signer's identity for reliable authentication.Accordingly, a signature seal with integrated handwriting features, a verification link for the signed document, and a digital signature QR code were generated.Analysis indicates that the signature seal produced by the proposed method not only serves the purpose of identity verification but also enables the discernment of the authenticity of the signed document.The verification link embedded in the QR code can directly validate the signer's identity, handwriting, and the authenticity and consistency of the signed document through online channels, providing a convenient means for the verification of both electronic and paper documents.The proposed method holds broad application prospects in the fields of electronic document circulation and the verification of the authenticity of electronic and paper documents.…”
    Get full text
    Article
  11. 211

    Multimodal Cancellable Biometric Template Protection and Person Verification in Transformed Domain by Devendra Reddy Rachapalli, Venkatesulu Dondeti, Hemantha Kumar Kalluri

    Published 2024-01-01
    “…It extracts biometric features from a person’s face, iris, and palmprint. Combining biometric features increases system reliability, safety, and user privacy. …”
    Get full text
    Article
  12. 212
  13. 213

    The Regulatory Role of LncRNAs in Modulating Autophagy and Drug Resistance in Non-Small-Cell Lung Cancer: Focus on Targeted Therapeutic Approaches by Shuncai Dai, Yuxin Zhong, Jianfu Lu, Linjiang Song

    Published 2025-07-01
    “…Despite its high prevalence, the underlying mechanisms of NSCLC have not been completely clarified, and current therapeutic strategies face significant limitations. Recent research has revealed the important role of long non-coding RNAs (lncRNAs) in NSCLC, particularly in regulating processes such as autophagy and drug resistance. …”
    Get full text
    Article
  14. 214

    Jointly Optimizing Resource Allocation, User Scheduling, and Grouping in SBMA Networks: A PSO Approach by Jianjian Wu, Chanzi Liu, Xindi Wang, Chi-Tsun Cheng, Qingfeng Zhou

    Published 2025-06-01
    “…Blind Interference Alignment (BIA) and Sparse Code Multiple Access (SCMA) offer the potential for massive connectivity but face limitations. …”
    Get full text
    Article
  15. 215

    Regulating professional ethics in a context of technological change by Tracey L. Adams, Kathleen Leslie, Sophia Myles, Bruna Moraes

    Published 2024-11-01
    “…This study seeks to identify the challenges that health professionals face in the context of technological change, and whether regulators’ codes of ethics and guidance are sufficient to help workers navigate these changes. …”
    Get full text
    Article
  16. 216
  17. 217

    Generating political priority for breastfeeding and the adoption of Kenya’s 2012 BMS act: the importance of women’s leadership by Maryanne Wamahiu, Phillip Baker, Tim Dorlach

    Published 2025-05-01
    “…The issue re-emerged on the political agenda in the 2000s but faced opposition from the transnational formula milk industry. …”
    Get full text
    Article
  18. 218

    Influence of Goaf Location on Deformation of High-steep Hard Rock Slope by JI Lan, ZHAO Jianjun, WAN Xun, LI Qingmiao, WU Enge

    Published 2022-01-01
    “…Underground mining is one of the factors affecting slope deformation,and goaf location affects the degree of such deformation.In this paper,we summarize the structural characteristics of three mining slopes and corresponding goaf location,take the Yongsheng coal mine as the research object,and simulate the formation of the goaf during two times of mining with Particle Flow Code (PFC<sup>2D</sup>) to study the influence of the distance D (negative toward the inside of the slope) from the right boundary of the goaf to the slope shoulder on the deformation of high-steep hard rock slopes.The following observations can be drawn from the results:The settlement curve of the overburden rock in the goaf assumes an approximate “U” shape.The settlement range first remains unchanged and then expands as D increases.The lateral deformation of the overburden rock towards the free face is more obvious,and the disturbed range of the overburden rock gradually increases; as the second time of mining proceeds,the rock body in the steep cliff area rapidly deforms,and its deformation at D&gt; -50 m is much larger than that at D≤-50 m.This study proposes that subsequent mining of the Yongsheng coal mine should meet D&lt; -50 m.It also provides a reference for the mining interval in the case of such high-steep hard rock slopes.…”
    Get full text
    Article
  19. 219

    DEGNN: A Deep Learning-Based Method for Unmanned Aerial Vehicle Software Security Analysis by Jiang Du, Qiang Wei, Yisen Wang, Xingyu Bai

    Published 2025-02-01
    “…With the increasing utilization of drones, the cyber security threats they face have become more prominent. Code reuse in the software development of drone systems has led to vulnerabilities in drones. …”
    Get full text
    Article
  20. 220