1,023 research outputs found

    Gaussian integral means of entire functions: logarithmic convexity and concavity

    Full text link
    For 0<p<∞0<p<\infty and α∈(βˆ’βˆž,∞)\alpha\in (-\infty,\infty) we determine when the LpL^p integral mean on {z∈C:∣zβˆ£β‰€r}\{z\in\mathbb C: |z|\le r\} of an entire function with respect to the Gaussian area measure eβˆ’Ξ±βˆ£z∣2 dA(z)e^{-\alpha|z|^2}\,dA(z) is logarithmic convex or logarithmic concave.Comment: 9 page

    Dual-Adoption Behaviors of Social Media in Workplace: The views from UGT and TAM

    Get PDF
    Social media has become an emerging trend in the work of enterprises and organizations, but few studies have explored the specific behavior and its influence mechanism of social media adoption in the workplace. This paper divides the social media use behavior in the work context into two types: reinforced use and varied use. Based on the technology acceptance model, this paper combines TAM and motivation theory to build a research model on the motivation of using social media in work and its influence on the use behavior. Through empirical analysis of questionnaire data in practical work, the research results show that the three motivations positively influence adoption intention through the mediation of perceived usefulness, and the intention is positively correlated with the two behaviors

    Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm

    Get PDF
    Digital watermarking is an effective solution to the problem of copyright protection, thus maintaining the security of digital products in the network. An improved scheme to increase the robustness of embedded information on the basis of discrete cosine transform (DCT) domain is proposed in this study. The embedding process consisted of two main procedures. Firstly, the embedding intensity with support vector machines (SVMs) was adaptively strengthened by training 1600 image blocks which are of different texture and luminance. Secondly, the embedding position with the optimized genetic algorithm (GA) was selected. To optimize GA, the best individual in the first place of each generation directly went into the next generation, and the best individual in the second position participated in the crossover and the mutation process. The transparency reaches 40.5 when GA’s generation number is 200. A case study was conducted on a 256 Γ— 256 standard Lena image with the proposed method. After various attacks (such as cropping, JPEG compression, Gaussian low-pass filtering (3, 0. 5), histogram equalization, and contrast increasing (0.5, 0.6)) on the watermarked image, the extracted watermark was compared with the original one. Results demonstrate that the watermark can be effectively recovered after these attacks. Even though the algorithm is weak against rotation attacks, it provides high quality in imperceptibility and robustness and hence it is a successful candidate for implementing novel image watermarking scheme meeting real timelines
    • …
    corecore