Showing 61 - 80 results of 232 for search 'shared ability problems', query time: 0.10s Refine Results
  1. 61

    Examining the degree to which paranormal belief and conspiracy endorsement influence meaning in life: sequential mediating effects of creativity and self-esteem by Neil Dagnall, Andrew Denovan, Kenneth Graham Drinkwater

    Published 2025-05-01
    “…Overall, higher scorers in PB, CT, and schizotypy were less driven to search and more likely to possess presence as a function of possessing confidence in their ability to find solutions to problems and self-esteem.…”
    Get full text
    Article
  2. 62

    Life After Invasive Meningococcal Disease: Insights from Survivors and Their Caregivers by Oscar Herrera-Restrepo, Nuzhat Afroz, Eliazar Sabater Cabrera, Matthew Reaney, France Ginchereau Sowell, Ramiya Kumar, Alicia Stillman, Patti Wukovits, Mariana Rodrigues, Sofia B. Pinto, Zeki Kocaata, Obinna Onwude

    Published 2024-10-01
    “…Survivors described extensive physical, neurological, and systemic sequelae, including difficulty walking (11/11), repeat secondary infections (9/11), and numbness (6/11), among others, which were echoed by caregivers. Survivors shared that IMD had negatively impacted their long-term quality of life, citing long-term impacts including emotional impacts (11/11), social impacts (10/11), memory (7/11) and attention (5/11) problems, and difficulty with functional (10/11), self-care (7/11), and physical (6/11) activities. …”
    Get full text
    Article
  3. 63

    African New Towns by Rachel Keeton

    Published 2020-08-01
    “…This is done by addressing four main research questions: (1) What are the spatial problems of African New Towns caused by the application of common planning approaches? …”
    Get full text
    Article
  4. 64

    La gauche uruguayenne et la nécessaire imagination radicale by Gustavo Pereira

    Published 2014-10-01
    “…This seems to be the problem that the Uruguayan left wing shares with other leftist governments in the region, which makes it necessary to restore the ability to represent and imagine substantive changes in society, in absence of which the left will continue losing its historical commitments and will just be assimilated to a prosperous centre-left government. …”
    Get full text
    Article
  5. 65

    Research on Vehicle Target Detection Method Based on Improved YOLOv8 by Mengchen Zhang, Zhenyou Zhang

    Published 2025-05-01
    “…This method improves the feature extraction aggregation network by introducing an Adaptive Downsampling module, which can dynamically adjust the downsampling method, thereby increasing the model’s attention to key features, especially for small objects and occluded objects, while maintaining a lightweight structure, effectively reducing the model complexity while improving detection accuracy. A Lightweight Shared Convolution Detection Head was designed. By designing a shared convolution layer through group normalization, the detection head of the original model was improved, which can reduce redundant calculations and parameters and enhance the ability of global information fusion between feature maps, thereby achieving the purpose of improving computational efficiency. …”
    Get full text
    Article
  6. 66

    Developing a use-inspired school and community-based 6th through 12th-grade research and invention ecosystem leading to STEM careers: an ethnographic study of the Science Coach Pro... by Melinda Z. Kalainoff, Fatiha Bazouche, Stephanie R. Couch, Jill M. Ott

    Published 2025-04-01
    “…This study responds to the need for educational offerings for middle and high school students that develop students’ awareness of STEM degrees and careers and foster positive attitudes, confidence, and students’ ability to see themselves in STEM fields. Theories and methodologies from interactional ethnography guide our examination of ways Science Coach (SC) addresses these needs by educating and supporting 6th–12th-grade science teachers and their students as students identify and solve real problems through authentic research and invention. …”
    Get full text
    Article
  7. 67

    Losing control, learning to fail: leveraging techniques from improvisational theatre for trust and collaboration in transdisciplinary research and education by Marius Korsnes, Sophia Efstathiou, Sven Veine, Martin Loeng, Marianthi Papalexandri Alexandri, Giovanni De Grandis, Giulia Sonetti

    Published 2025-03-01
    “…This approach aims to tackle the inherent challenges of ITD research and thus enhance ITD research groups’ ability to address complex societal ‘Grand Challenges’. …”
    Get full text
    Article
  8. 68

    Correlation learning based multi-task model and its application by XU Wei, LUO Jianping, LI Xia, CAO Wenming

    Published 2023-07-01
    “…Meanwhile, the proposed multi-task learning model is applied as a new agent model to the Bayesian optimization algorithm to solve expensive optimization problems. A CLL is added behind the traditional multi-task learning network, so that the tasks that have completed the preliminary shared learning can be optimized and carry out the advanced sharing in this layer, so that the knowledge learned from multiple tasks can fully interact with each other. …”
    Get full text
    Article
  9. 69

    Multiradar Collaborative Task Scheduling Algorithm Based on Graph Neural Networks with Model Knowledge Embedding by Haoqing LI, Dian YU, Changchun PAN, Wenxian YU, Dongying LI

    Published 2025-04-01
    “…This approach utilizes the spectral features of the random Laplacian matrix from the task’s heterogeneous graph as global features, enhancing the GNN’s ability to extract shared problem features while downplaying individual characteristics. …”
    Get full text
    Article
  10. 70

    Attribute-based encryption scheme supporting attribute revocation in cloud storage environment by Lei SUN, Zhiyuan ZHAO, Jianhua WANG, Zhiqiang ZHU

    Published 2019-05-01
    “…Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.…”
    Get full text
    Article
  11. 71

    Attribute-based encryption scheme supporting attribute revocation in cloud storage environment by Lei SUN, Zhiyuan ZHAO, Jianhua WANG, Zhiqiang ZHU

    Published 2019-05-01
    “…Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.…”
    Get full text
    Article
  12. 72

    SmoothDectector: A Smoothed Dirichlet Multimodal Approach for Combating Fake News on Social Media by Akinlolu Oluwabusayo Ojo, Fatma Najar, Nuha Zamzami, Hanen T. Himdi, Nizar Bouguila

    Published 2025-01-01
    “…These platforms often lack rigorous editorial scrutiny, exacerbating this problem. Although recent studies have explored multimodal fake news detection to learn shared representations of textual and visual information, they often learn discrete latent representations, merely concatenations of multimodal features. …”
    Get full text
    Article
  13. 73

    Comparison of zero-shot approach and retrieval-augmented generation for analyzing the tone of comments in the Ukrainian language by M. Prytula, O. Sinkevych, I. Olenych

    Published 2024-12-01
    “…Therefore, the development of tools for analyzing the tonality of texts can provide the ability to accurately recognize people's emotions, identify problems, and determine ways to solve them. …”
    Get full text
    Article
  14. 74

    Unified Visual-Aware Representations for Data Analytics by Ladislav Peska, Ivana Sixtova, David Hoksza, David Bernhauer, Jakub Lokoc, Tomas Skopal

    Published 2025-01-01
    “…The desired property of the visualizations is the ability to visually encode the semantic features of the original data. …”
    Get full text
    Article
  15. 75

    Automatic construction of global cloud sample database based on Landsat imagery by Tao He, Guihua Huang, Lei Zhang, Daiqiang Wu, Yichuan Ma

    Published 2025-06-01
    “…Moreover, the UAC-CSD sample database was freely shared and could support the training and verification of various machine learning models. …”
    Get full text
    Article
  16. 76

    Collision Tolerance: Improving Channel Utilization with Correlatable Symbol Sequences in Wireless Networks by Jumin Zhao, Shaolei Fan, Deng-ao Li, Baofeng Zhao

    Published 2015-05-01
    “…According to our investigation, however, collision avoidance causes time delay, which also hurts channel utilization, especially in the dense networks or intensive traffic. Discovering the ability to tolerate collisions with the correlatable preamble at the physical layer implementations of wireless networks, we propose CWM in this paper, a MAC protocol that advocates simultaneous accesses from multiple senders to a shared channel, allowing collisions instead of avoiding them. …”
    Get full text
    Article
  17. 77

    Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG

    Published 2020-04-01
    “…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
    Get full text
    Article
  18. 78

    Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG

    Published 2020-04-01
    “…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
    Get full text
    Article
  19. 79

    THE DEVELOPMENT OF TRITICALE PRODUCTION IN TURKEY: THE CASE OF CORUM PROVINCE by Bahri KARLI, Arif ÖZUYGUR, Mevlüt GÜL, Bektas KADAKOGLU

    Published 2021-01-01
    “…In this study, socio-economic structure and producing problems of triticale cultivation farms in Corum province were analysed. …”
    Get full text
    Article
  20. 80

    Competence and competency of high school teacher as the components of his innovative development by I. K. Yarmola

    Published 2013-10-01
    “…Moreover important are ability to creativity, solving of problem’s tasks, ingenuity, flexibility and criticality mind, intuition, originality and self-confidence; ability to formulate and solve non-standard tasks; ability to analyse, synthesis and combination, to share experiences, predictions, etc.. …”
    Get full text
    Article