653 research outputs found

    Embedded System for Biometric Identification

    Get PDF

    UNO Website NSFP 2016 Orientation Guide

    Get PDF
    An illustrated overview of the resources offered by UNO to students in the academic year 2016-2017. UNO has cracked the code to being successful in college, and with so many caring and supportive faculty, staff, and other students committed to your success, there are only three simple things you need to do: Connect. Take Care. Get Help

    Unveiling the frontiers of deep learning: innovations shaping diverse domains

    Full text link
    Deep learning (DL) enables the development of computer models that are capable of learning, visualizing, optimizing, refining, and predicting data. In recent years, DL has been applied in a range of fields, including audio-visual data processing, agriculture, transportation prediction, natural language, biomedicine, disaster management, bioinformatics, drug design, genomics, face recognition, and ecology. To explore the current state of deep learning, it is necessary to investigate the latest developments and applications of deep learning in these disciplines. However, the literature is lacking in exploring the applications of deep learning in all potential sectors. This paper thus extensively investigates the potential applications of deep learning across all major fields of study as well as the associated benefits and challenges. As evidenced in the literature, DL exhibits accuracy in prediction and analysis, makes it a powerful computational tool, and has the ability to articulate itself and optimize, making it effective in processing data with no prior training. Given its independence from training data, deep learning necessitates massive amounts of data for effective analysis and processing, much like data volume. To handle the challenge of compiling huge amounts of medical, scientific, healthcare, and environmental data for use in deep learning, gated architectures like LSTMs and GRUs can be utilized. For multimodal learning, shared neurons in the neural network for all activities and specialized neurons for particular tasks are necessary.Comment: 64 pages, 3 figures, 3 table

    Chaotic Encryption and Privilege Based Visual Secret Sharing Model for Color Images

    Get PDF
    In the Privilege-based Visual Secret Sharing Model (PVSSM), each share has a unique privilege and a higher-privilege share contributes with more privilege to reveal the secret image. However, in PVSSM, when several shares with the higher priority are stacked, the secret image can be visibly displayed. This security problem is solved by applying a two-dimensional Logistic-Adjusted Sine Map (2D-LASM) to each share. This method is called Chaotic Encryption-based PVSSM. In this paper, we aim to present how Chaotic Encryption-based PVSSM is applied to color images. In order to assess the efficiency of this method, histogram analysis, data loss attack, salt-pepper noise attack, differential attack, chi-square analysis and correlation analysis tests were applied. The performance of this method has been evaluated according to NCPR, UACI, PSNR, SSIM and CQM. The proposed method achieved a good test values and showed better results compared to similar studies in literature

    The role of technology in maritime security : a survey of its development, application, and adequacy

    Get PDF

    CONTRACTUAL GOVERNANCE OF ONLINE COMMUNITIES – (PROPERTY) RIGHTS DISPUTES IN VIRTUAL WORLDS

    Get PDF
    Considering law’s difficult ride on the coattails of societal and technological progress, this thesis discusses property rights disputes in virtual worlds, the origin and foundation of (property) rights in characters, objects and items (virtual assets), and the possibility of contractual governance. Investing considerable time, effort and money to create, develop and accumulate virtual assets to gain prestige or competitive advantage, or simply to have more fun playing, users often build strong emotional connections to their characters and place a high value on accumulated operator, third user and user-generated content. But the user’s experience of virtual assets as property, contrasts starkly with most in-world property models where first property rights belong to the operator, subsequent rights are delineated by contract, and emerging property rights are transferred to the operator or waived by the user. Noting the ‘technologically inaccurate portrayal of software’ in legislation, jurisprudence and legal debate, that ignores its ‘physical properties of mass and volume’, and the influence of client/server system architecture on the allocation of personal property rights, this thesis shows that physical and intellectual rights cannot resolve the newly emerging property rights disputes in virtual worlds. Instead of making another helpless attempt to justify a new virtual property right that still cannot overcome an enforceable transfer/waiver of (future) (property) rights clause in the contract, this author questions common concepts of property and proposes a new quasi-property right. Originated in the contractual obligation of the operator to grant the user a right to use, to exclude other users from and to transfer virtual assets, the rules of conduct included in the multiple-separate user contract complete its quasi-absolute effect. This quasi-property right does not only complement the quasi-tort, quasi-criminal and quasi-constitutional system already established by the (virtual social) contract but supports the identification of the contract (terms) as new default legal rules for VWs and similar online communities

    1989-1990 Bulletin

    Get PDF
    Volume C, Number 4. Scanned from the copy held in the Registrar\u27s Office.https://ecommons.udayton.edu/bulletin/1034/thumbnail.jp

    Appraisal of Cashless Policy on the Nigerian Financial System

    Get PDF
    The Central Bank of Nigeria (CBN) has been active in the inauguration of policies and schemes to foster the implementation of the cashless policy in Nigeria. However the current transition to cashless economy raises a lot of concerns with no substantial evidence yet to justify its implementation. This study was carried out in order to appraise the implementation of the cashless policy since its introduction into the Nigerian financial system in 2012 and also to examine the persistent challenges facing its implementation. In view of the above stated objective, primary data were collected with the aid of the questionnaire, which was randomly administered to 120 respondents ranging from First Bank, Zenith Bank and United Bank for Africa. The banks were selected based on their total assets and the information collected covered the activities of the CBN and that of these banks towards implementation of the cashless policy from 2012 till date.The data collected were presented and analyzed with the aid of the Statistical Package for Social Sciences (SPSS) using descriptive statistics and one-sample t-test. The results led to the conclusion that despite the need to operate cashless transactions dominating the modern Nigerian economy, the cashless policy will have the desired impact only if a lot is done to ensure the implementation of an effective cashless system

    General Catalog 2007-2009

    Get PDF
    Contains course descriptions, University college calendar, and college administrationhttps://digitalcommons.usu.edu/universitycatalogs/1127/thumbnail.jp

    General Catalog 2009-2010

    Get PDF
    Contains course descriptions, University college calendar, and college administrationhttps://digitalcommons.usu.edu/universitycatalogs/1128/thumbnail.jp
    • …
    corecore