Добірка наукової літератури з теми "Domain message"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Domain message".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Domain message":

1

Wibisono, Gunawan, Tri Waluyo, and Erik Iman Heri Ujianto. "KAJIAN METODE METODE STEGANOGRAFI PADA DOMAIN SPASIAL." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (February 1, 2020): 259–64. http://dx.doi.org/10.33480/jitk.v5i2.1212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper contains a review of the spatial domain steganographic literature. The purpose of this paper is to provide knowledge about techniques or methods that exist in the spatial domain of steganography. Steganography is the science or technique for hiding secret messages in other messages so that the existence of the secret message cannot be accessed by others who do not have authority. There are several popular spatial domains of steganographic techniques, namely LSB (Least Significant Bit), which is mapping secret message bits in the rightmost bit (LSB) of each color pixel and PVD (Pixel Value Differencing) which in this method offers a larger message storage capacity , with better image quality compared to other methods in the spatial domain. Because privacy issues continue to develop along with various digital communication technologies, and increasingly strong security threats, steganography can play a role in society to maintain the confidentiality of both picture, voice and video messages. For this reason it is important for us to be aware of steganographic technology and its implications.
2

El Rezen Purba, Doni, and Desinta Purba. "Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security." Jurnal Info Sains : Informatika dan Sains 11, no. 1 (March 1, 2021): 1–4. http://dx.doi.org/10.54209/infosains.v11i1.18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages into images to keep messages safe, not damaged even if the container image is manipulated, and the hidden message can be extracted again. on this thesis, applied masking method – filtering. Masking-filtering is included in the spatial domain. Message hiding is done by manipulating the luminance value of the image. Its use is applied to color or grayscale images. Masking serves as a tagging place on the picture that can be inserted message. Filtering passes a value to the marked section. the result is a stego image where the news is integrated with the container image, more robust to image processing when compared to methods that are also classified in the spatial domain, such as the least significant bit.
3

Kim, Kee Sung. "New Order-Revealing Encryption with Shorter Ciphertexts." Information 11, no. 10 (September 23, 2020): 457. http://dx.doi.org/10.3390/info11100457.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As data outsourcing services have been becoming common recently, developing skills to search over encrypted data has received a lot of attention. Order-revealing encryption (OREnc) enables performing a range of queries on encrypted data through a publicly computable function that outputs the ordering information of the underlying plaintexts. In 2016, Lewi et al. proposed an OREnc scheme that is more secure than the existing practical (stateless and non-interactive) schemes by constructing an ideally-secure OREnc scheme for small domains and a “domain-extension” scheme for obtaining the final OREnc scheme for large domains. They encoded a large message into small message blocks of equal size to apply them to their small-domain scheme, thus their resulting OREnc scheme reveals the index of the first differing message block. In this work, we introduce a new ideally-secure OREnc scheme for small domains with shorter ciphertexts. We also present an alternative message-block encoding technique. Combining the proposed constructions with the domain-extension scheme of Lewi et al., we can obtain a new large-domain OREnc scheme with shorter ciphertexts or with different leakage information, but longer ciphertexts.
4

Short, Kevin M. "Signal Extraction from Chaotic Communications." International Journal of Bifurcation and Chaos 07, no. 07 (July 1997): 1579–97. http://dx.doi.org/10.1142/s0218127497001230.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper will consider the use of nonlinear dynamic (NLD) forecasting to extract messages from chaotic communication systems. Earlier work has shown that one-step prediction methods have sometimes been able to reveal the presence of hidden messages as well as the frequency content of the hidden messages. However, recovery of the actual hidden message usually involved filtering in the frequency domain. In this paper we show that it may be possible to extract the hidden message signal without filtering in the frequency domain. The approaches which will be discussed involve either the use of multi step predictions or a resumming process on the residuals after one-step prediction. For the multi step methods, two related approaches will be used. The first is primarily applicable to periodic signals, and will use the frequency information from one-step predictions to determine a block size to use for multi step predictions. The second will attempt dynamic detection of message signals using a windowed measure of the prediction error. For the resumming approach, it will be shown that even a lowest-order approximation can lead to faithful extraction of the hidden message signal for a ramping message signal that proved difficult in earlier work. These approaches will be applied to simple examples of communication schemes using signal masking and modulated chaos.
5

Geschke, Daniel, Kai Sassenberg, Georg Ruhrmann, and Denise Sommer. "Behavior Speaks Louder than Traits." Zeitschrift für Psychologie / Journal of Psychology 215, no. 4 (January 2007): 248–54. http://dx.doi.org/10.1027/0044-3409.215.4.248.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The impact of message abstractness on recipients is controversial. Research on person perception suggests that abstract messages are more influential, whereas research on communication and its outcomes suggests that concrete, vivid communication has greater impact. It was predicted that the latter also applies to the domain of person perception if the message contains unexpected (i.e., stereotype inconsistent) information. This prediction was tested experimentally. It was found that a message about a target person with unexpected content exerts more influence when it is concrete than when it is abstract. This effect generalized across different sources of communication (mass media and interpersonal communication). In line with earlier findings, messages from the media had a somewhat stronger effect than interpersonal communication. Implications for optimal message composition for the communication of knowledge about people are discussed.
6

Demircioğlu, Emine Dumlu, and Oya Kalipsiz. "API Message-Driven Regression Testing Framework." Electronics 11, no. 17 (August 26, 2022): 2671. http://dx.doi.org/10.3390/electronics11172671.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the increase in the number of APIs and interconnected applications, API testing has become a critical part of the software testing process. Particularly considering the business-critical systems using API messages, the importance of repetitive API tests increases. Successfully performing repetitive manual API testing for a large number of test scenarios in large business enterprise applications becomes even more difficult due to the fact that human errors may prevent performing thousands of human-written tests with high precision every time. Furthermore, the existing API test automation tools used in the market cannot be integrated into all business domains due to their dependence on applications. These tools generally support web APIs over the HTTP protocol. Hence, this study is motivated by the fact that there is a lack of API message-driven regression testing frameworks in a particular area in which API messages are used in client-server communication. This study has been prepared to close the gap in a specific domain which uses business domain APIs, rather than HTTP, in client-server communication. We propose a novel approach based on the use of network packets for regression testing. We developed a proof-of-concept test automation tool implementing our approach and evaluated it in a financial domain. Unlike prior studies, our approach can provide the use of real data packets in software testing. The use of network packets increases the generalization of the framework. Overall, our study reports remarkable reuse capacity and makes a significant impact on a real-world business-critical system by reducing effort and increasing the automation level of API regression testing.
7

Srilakshmi, P., Ch Himabindu, N. Chaitanya, S. V. Muralidhar, M. V. Sumanth, and K. Vinay. "Text embedding using image steganography in spatial domain." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i3.6.14922.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper proposed novel approach of image steganography for text embedding in spatial domain. In the proposed embedding the message is dumped into the image with reference to a random generated key, based on this key the extraction of text is done from the image. So this method is a highly secured from eavesdropping and highly complex to identify the text data in the image and retrieving the text message from the message is also a resilient process. The extraction is only possible when the key is known.
8

Goossen, William T. F., Marcel J. Jonker, Kai U. Heitmann, Irma C. Jongeneel-de Haas, Tom de Jong, Johannes W. van der Slikke, and Bert L. Kabbes. "Electronic patient records: domain message information model perinatology." International Journal of Medical Informatics 70, no. 2-3 (July 2003): 265–76. http://dx.doi.org/10.1016/s1386-5056(03)00054-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Borges, Adilson, and Pierrick Gomez. "How products induce regulatory fit: evidence from the health domain." Journal of Consumer Marketing 32, no. 6 (September 14, 2015): 441–49. http://dx.doi.org/10.1108/jcm-01-2015-1292.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – The purpose of this paper is to test whether the simple exposure to different types of products can trigger different motivational orientation on consumers (prevention vs promotion), which in turn would match message frame and increase persuasion. Design/methodology/approach – Three experiments test whether exposure to product categories can trigger consumer’s regulatory focus orientation. Participants in the pilot study are students, while participants in the two other studies are consumers. Findings – A first pilot study randomly exposed participants to a product that could trigger promotion orientation (e.g. orange juice) versus a product that could trigger prevention orientation (e.g. sunscreen). Participants exposed to promotion (prevention) product suggest more promotion (prevention) strategies to reach a particular goal (preparing for their final exam). Study 2 shows that gain (vs loss)-framed messages using health appeals have better evaluations when featuring promotion (vs prevention) products. Study 3 generalizes these results using another sample and different product categories. Research limitations/implications – The paper uses some product categories and including other categories would increase external validity. Practical implications – The practical implication is to help marketers to choose the right health argument to match the product category they are trying to sell. Originality/value – Theoretically, the results from three studies show that exposure to products can temporarily trigger a consumer’s regulatory focus and that messages using health arguments that are consistent with this regulatory focus are more persuasive than those that are not. Managerially, these results help managers to adapt the right message in function of the product category.
10

Kim, Dongkyun, and Yong-Hwan Kim. "A Network Federation Scheme for Inter-Domain SDN Communications." Webology 19, no. 1 (January 20, 2022): 4515–26. http://dx.doi.org/10.14704/web/v19i1/web19298.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recently, a variety of the integrated service platforms demand the innovative network technologies such as software-defined networking (SDN). However, it is problematic and complicated to provide interconnectivity and reachability between inter-domain SDNs. Thus, this paper proposes a scheme for the inter-SDN federation and communication based on the abstracted network information exchange and automated peer network configuration for the integrated network services. The proposed scheme is implemented and verified over the de-facto wide-area SDN infrastructure (KREONET-S) which is deployed on Korea Research Environment Open Network (KREONET), a representative national research network in Korea. The proposed method is implemented and experimented based on the distributed and layer-2 oriented network architecture by using the abstracted message exchanges between local SDN controllers in order to provide low message overheads and high federation scalability. Our research work contributes to more efficient inter-SDN communications by means of the data modeling abstraction of the local SDN network information and the simplified interactions between individual controllers by the automated configurations through the specific application interfaces. The proposed scheme also contributes to the development of the integrated service platforms which are demanded to provide IoT, Big Data, AI, and cloud services in the tightly coupled manner over the inter-SDN domains.

Дисертації з теми "Domain message":

1

Farrell, Kathleen. "Message framing in the health domain." Thesis, University of Nottingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422745.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Al-Sultany, Ghaidaa Abdalhussein Billal. "Automatic message annotation and semantic interface for context aware mobile computing." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/6564.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this thesis, the concept of mobile messaging awareness has been investigated by designing and implementing a framework which is able to annotate the short text messages with context ontology for semantic reasoning inference and classification purposes. The annotated metadata of text message keywords are identified and annotated with concepts, entities and knowledge that drawn from ontology without the need of learning process and the proposed framework supports semantic reasoning based messages awareness for categorization purposes. The first stage of the research is developing the framework of facilitating mobile communication with short text annotated messages (SAMS), which facilitates annotating short text message with part of speech tags augmented with an internal and external metadata. In the SAMS framework the annotation process is carried out automatically at the time of composing a message. The obtained metadata is collected from the device’s file system and the message header information which is then accumulated with the message’s tagged keywords to form an XML file, simultaneously. The significance of annotation process is to assist the proposed framework during the search and retrieval processes to identify the tagged keywords and The Semantic Web Technologies are utilised to improve the reasoning mechanism. Later, the proposed framework is further improved “Contextual Ontology based Short Text Messages reasoning (SOIM)”. SOIM further enhances the search capabilities of SAMS by adopting short text message annotation and semantic reasoning capabilities with domain ontology as Domain ontology is modeled into set of ontological knowledge modules that capture features of contextual entities and features of particular event or situation. Fundamentally, the framework SOIM relies on the hierarchical semantic distance to compute an approximated match degree of new set of relevant keywords to their corresponding abstract class in the domain ontology. Adopting contextual ontology leverages the framework performance to enhance the text comprehension and message categorization. Fuzzy Sets and Rough Sets theory have been integrated with SOIM to improve the inference capabilities and system efficiency. Since SOIM is based on the degree of similarity to choose the matched pattern to the message, the issue of choosing the best-retrieved pattern has arisen during the stage of decision-making. Fuzzy reasoning classifier based rules that adopt the Fuzzy Set theory for decision making have been applied on top of SOIM framework in order to increase the accuracy of the classification process with clearer decision. The issue of uncertainty in the system has been addressed by utilising the Rough Sets theory, in which the irrelevant and indecisive properties which affect the framework efficiency negatively have been ignored during the matching process.
3

Witt, Celeste Elain. "Reclaiming A Sacred Domain: An Ethnographic Study of Mormon Women Overcoming the Media-Supported Message of Acceptable Birth Practice Through Giving Birth at Home." BYU ScholarsArchive, 2000. https://scholarsarchive.byu.edu/etd/5223.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study ethnographically explores the experiences of 30 American Mormon women who chose to give birth at home, a practice which differs from the culturally expected birth practice supported by most media birth scenes. The dominant birth practice among American Mormon women aligns with the biomedical birth system nearly universally practiced in the United States. Recent research indicates that the biomedical model is supported by most media portrayals of birth (Elson 1997b). Mormon women who had given birth at home with a midwife were located and invited to participate. A semi-structured interview guide was used to frame the research process. Verbatim transcriptions of the interviews provided the raw data for coding and analysis.
4

Qian, Xinhua. "Topographical design of the message domain pharmacophore of the delta opioid agonists using designer amino acids and design of non-peptide ligand for opioid receptors." Diss., The University of Arizona, 1995. http://hdl.handle.net/10150/187062.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A series of highly constrained tyrosine derivatives, 2',6'-dimethyl- β-methyltyrosines (TMTs), was designed and asymmetrically synthesized. Incorporation of the TMT isomers into peptide agonists of δ opioid receptors provide analogues that are highly potent and selectively for δ opioid receptors and have revealed the stereochemical requirements for recognizing opioid δ receptors. Moreover, the combination of conformational studies and pharmacological studies of the peptide analogues provided for the first time the stereochemical requirements for specifically recognizing opioid δ receptor subtypes. The biological active conformation of a highly selective and potent δ opioid agonist, ((2S,3R)-TMT¹) DPDPE, was obtained by NMR studies and computer-assisted modeling. This conformation was then further used for designing novel non-peptide opioid ligands. Thus, this study is another achievement of topographical design of peptide hormones and neurotransmitters. Practically, the results of this study can be used to develop more biological stable pharmaceuticals as strong pain reliever without causing side effects such as physical dependence, respiratory depression, etc.
5

Ntaryamira, Evariste. "Une méthode asynchrone généralisée préservant la qualité des données des systèmes temps réel embarqués : cas de l’autopilote PX4-RT." Thesis, Sorbonne université, 2021. https://tel.archives-ouvertes.fr/tel-03789654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Les systèmes embarqués en temps réel, malgré leurs ressources limitées, évoluent très rapidement. Pour ces systèmes, il est impératif de garantir que les tâches ne manquent pas leurs échéances, mais aussi la bonne qualité des données transmises de tâche en tâche. Il est obligatoire de trouver des compromis entre les contraintes d'ordonnancement du système et celles appliquées aux données. Pour garantir ces propriétés, nous considérons le mécanisme sans attente. L'accès aux ressources partagées suit le principe d'un seul producteur, plusieurs lecteurs. Pour contenir toutes les particularités de communication apportées par le mécanisme de communication uORB, nous avons modélisé les interactions entre les tâches par un graphe biparti que nous avons appelé graphe de communication et qui est composé d'ensembles de messages dits de domaine. Pour améliorer la prévisibilité de la communication inter-tâches, nous étendons le modèle de Liu & Layland avec le paramètre état de communication utilisé pour contrôler les points d'écriture/lecture.Nous avons considéré deux types de contraintes de données : les contraintes locales de données et les contraintes globales de données. Pour vérifier les contraintes locales des données, nous nous appuyons sur le mécanisme de sous-échantillonnage destiné à vérifier les contraintes locales des données. En ce qui concerne les contraintes globales des données, nous avons introduit deux nouveaux mécanismes : le " dernier lecteur de marque" et le " mécanisme de défilement ou d'écrasement ". Ces 2 mécanismes sont en quelque sorte complémentaires. Le premier fonctionne au début du fuseau tandis que le second fonctionne à la fin du fuseau
Real-time embedded systems, despite their limited resources, are evolving very quickly. For such systems, it is not enough to ensure that all jobs do not miss their deadlines, it is also mandatory to ensure the good quality of the data being transmitted from tasks to tasks. Speaking of the data quality constraints, they are expressed by the maintenance of a set of properties that a data sample must exhibit to be considered as relevant. It is mandatory to find trade-offs between the system scheduling constraints and those applied to the data. To ensure such properties, we consider the wait-free mechanism. The size of each communication buffer is based on the lifetime bound method. Access to the shared resources follows the single writer, many readers. To contain all the communication particularities brought by the uORB communication mechanism we modeled the interactions between the tasks by a bipartite graph that we called communication graph which is comprised of sets of so-called domain messages. To enhance the predictability of inter-task communication, we extend Liu and Layland model with the parameter communication state used to control writing/reading points.We considered two types of data constraints: data local constraints and data global constraints. To verify the data local constraints, we rely on the sub-sampling mechanism meant to verify data local constraints. Regarding the data global constraints, we introduced two new mechanism: the last reader tags mechanism and the scroll or overwrite mechanism. These 2 mechanisms are to some extent complementary. The first one works at the beginning of the spindle while the second one works at the end of the spindle
6

Andersson, Håkan. "Can you trust marketing messages? : Challenging a claim in the domain market?" Thesis, Umeå University, Umeå School of Business, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-1267.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

Today, millions of purchased domain sites names are sitting unused with no real web designs or concrete purpose coupled with them. Why would not owners engage a web-hosting domain-parking hotel so they can earn money through eyeballs advertising or click revenue while their sites sits unused? Parking hotels claim access to passive domain monetization through advertising programs tailored to generate revenue via automatic web page generations containing tailored advertisement. When visitors access these web sites, revenue is generated for domain owners. This study sought to investigate if parking hotels’ advertising claim, that you can make money through them, carries substance. Hence, is it possible to generate sufficient revenue using a parking hotel’s advertising revenue model to pay for the cost of domain ownership and, if possible, generate excess revenue? The study’s epistemological approach, trying to distinguish the truth about the hotels’ claims, stems from a ontological discussion around web hosting hotels’ advertising vehicle existence and its ability to generates revenue. The study challenged a parking hotel’s claim through an inductive quantitative approach by watching advertising revenue for 59 domain names over 105 days. Quantitative data concluded, through a statistical approach, that there were insufficient advertising income, approximately a nickel, to cover the annual cost of approximately $6 USD. Therefore, the study concluded that the advertising claims were misleading and recommends that sites are not purchased, or renew, for the purpose of making money through web hotels’ advertising models.

7

Scutenaire, Jérémy. "Caractérisation fonctionnelle de la protéine ECT2 comme lecteur de la modification N6-méthyladénosine des ARN messagers chez la plante Arabidopsis thaliana." Thesis, Perpignan, 2017. http://www.theses.fr/2017PERP0033/document.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Le contrôle de l’expression des gènes est un processus crucial pour le développement, la reproduction ou les mécanismes d’acclimatation aux stress environnementaux et met en jeu des voies de régulation post-transcriptionnelles agissant sur les ARN messagers (ARNm). Ces molécules portent des modifications chimiques dont l’une des plus abondantes est la N6-méthyladénosine ou m6A. Cette modification permet notamment d’attirer des protéines spécifiques qualifiées de « lecteurs » qui, chez les mammifères, agissent principalement pour favoriser la dégradation et/ou la traduction des ARNm. Mes travaux de thèse ont eu pour objectif de caractériser les fonctions d’un de ces lecteurs, nommé ECT2, chez la plante modèle Arabidopsis thaliana. Dans un premier temps, sa fonction de liaison aux ARNm méthylés ainsi que son rôle dans le développement de la plante ont été démontrés. Au niveau moléculaire, une approche de protéomique a permis d’identifier de nombreux partenaires d’ECT2 dont la majorité est impliquée dans le métabolisme des ARNm parmi lesquels des facteurs inhibiteurs de traduction. Les résultats d’une analyse de translatomique permettent de proposer un modèle où ECT2 jouerait un rôle de répresseur de la traduction d’ARNm en coopération avec ses partenaires LARP1 et DCP5, deux facteurs évolutivement conservés qui agissent dans le contrôle de la traduction des ARNm. Enfin, j’ai également découvert que la protéine ECT2 est dynamiquement modifiée via des phosphorylations en réponse à un stress thermique, ce qui semble notamment affecter sa capacité à reconnaitre les résidus m6A. Ces travaux suggèrent pour la première fois que l’activité d’un lecteur peut être régulée par des phosphorylations en réponse à des variations environnementales
Control of gene expression is a crucial process for development, reproduction or acclimation to environmental stresses and involves post-transcriptional regulatory pathways acting on messenger RNAs (mRNAs). These molecules carry chemical modifications of which N6-methyladenosine (m6A) is one of the most abundant. This modification allows notably the recruitment of specific proteins qualified as “readers” which, in mammals, mostly act to promote decay and/or translation of mRNAs. My thesis aimed to characterize the functions of one of these readers, named ECT2, in the model plant Arabidopsis thaliana. First, its binding function to methylated mRNAs and its role in plant development was demonstrated. At the molecular level, a proteomic approach identified numerous ECT2’s protein partners, mainly involved in mRNA metabolism including translation inhibition factors. Results obtained from a translatome analysis suggest a model where ECT2 could play a repressive role on the translation of methylated mRNAs cooperatively with its partners LARP1 and DCP5, two evolutionarily conserved factors acting in translational control of mRNAs. Finally, I also discovered that ECT2 is dynamically modified with phosphorylations in response to heat stress affecting especially its ability to recognize m6A residues. These works suggests for the first time that the activity of an m6A reader could be regulated by phosphorylations in response to environmental changes
8

Hazra, Ditipriya. "Insights into the control of mRNA decay by YTH proteins during the transition from meiosis to mitosis in yeasts." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLX041.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Aperçu du contrôle de la dégradation des ARNm par les protéines YTHpendant la transition de la méiose à la mitose chez les levures.Le cycle cellulaire est contrôlé par des processus complexes et interconnectés. Un gène est transcrit en ARNm qui est traduit en protéines mais de nombreux processus de régulation travaillent pour contrôler chaque étape de ce processus apparemment simple. Parmi ces points de contrôle, la régulation post-transcriptionnelle est importante, et la formation d'un complexe protéine-ARN peut diriger le destin cellulaire. Parmi ces protéines de liaison à l'ARN, les protéines contenant des domaines YTH n’ont été découvertes qu’à la fin des années 90. Les protéines contenant des domaines YTH sont abondantes chez les eucaryotes et absentes chez les procaryotes. Elles constituent la majorité des protéines « readers » capables de reconnaître spécifiquement la modification m6A. L’Homme possède cinq protéines YTH, YTHDF1-3, YTHDC1,2 (Hazra, D., C. Chapat, et Graille, M. (2019). Destin de l'ARNm de m6A : enchaînés au rythme par les protéines contenant de la YTH. , 10 (1), 49.). Bien qu'il soit évident que ces protéines contrôlent le destin cellulaire, la fonction de chaque protéine et son réseau d’interaction restent à élucider. Chez les levures, une seule protéine YTH est présente: Pho92 chez Saccharomyces cerevisiae et Mmi1 chez Schizosaccharomyces pombe. Hormis le domaine YTH, il n'y a pas d'homologie de séquence entre ces deux protéines mais leur fonction cellulaire est similaire.Il est bien établi que Mmi1 est responsable de la dégradation des transcrits spécifiques de la méiose au cours de la croissance végétative des cellules chez la levure S. pombe. Mmi1 forme un complexe stable avec une petite protéine, Erh1 (complexe Erh1-Mmi1 ou EMC). Le complexe EMC peut physiquement interagir avec la sous-unité Not1 du complexe CCR4-Not et la recruter pour la dégradation des ARNm contenant des motifs DSR (déterminant de l'élimination sélective). L'action de Mmi1 est à son tour régulée par une protéine possédant un domaine RRM, Mei2. Au cours de la méiose, Mei2, avec l’aide d’un lncRNA meiRNA, séquestre Mmi1 dans un point nucléaire, le rendant inactif et assurant la continuité de la méiose. Ces trois protéines, Mmi1-Erh1-Mei2, jouent un rôle clé dans la transition de la mitose vers la méiose.Chez S. cerevisiae, Pho92 est impliquée dans la dégradation des transcrits de PHO4, contribuant à la voie du métabolisme du phosphate, pendant la privation en phosphate et participe également à la dégradation des ARNm contenant les marques épitranscriptomiques de N6-méthyladénosine (m6A). Comme pour S. pombe Mmi1, Pho92 recrute le complexe CCR4-Not via une interaction physique avec Not1.Au cours de ma thèse, j'ai tenté d'élucider le rôle de ces deux protéines du domaine YTH de deux organismes modèles, S. cerevisiae et S. pombe, dans la dégradation de l'ARNm et la régulation du cycle cellulaire par des approches biochimiques et structurales.Pho92 de S. cerevisiae interagit physiquement avec Not1 du complexe CCR4-Not, nous avons pu déterminer les limites des domaines impliqués dans cette interaction. L’interaction entre ces deux protéines a été étudiée par anisotropie de fluorescence. Le complexe protéique a été purifié avec succès et des essais de cristallisation sont en cours.Chez S. pombe, la structure de Mei2-RRM3 a été résolue avec et sans ARN. Les propriétés de liaison à l'ARN de Mei2-RRM3 ont été étudiées par ITC. La structure de Erh1 a également été résolue révélant une organisation en homodimere. Nous avons montré que la formation de cet homodimere est important pour la fonction biologique de Mmi1. Des essais de co-cristallisation ont été réalisés avec de l'ARN et les protéines Mmi1 et Mei2, mais sans succès et nous avons obtenu des cristaux de Mmi1
Insights into the control of mRNA decay by YTH proteinsduring the transition from meiosis to mitosis in yeasts.Keywords: Epitranscriptomics, mRNA decay, meiosis, multi-protein complexes, YTH domainCell cycle is controlled by multi-layered processes. A gene is transcribed in mRNA which is translated in proteins but innumerable regulation processes are working to control every step of this apparently simple process. Among these regulatory check points, post-transcriptional regulation is an important one, where formation of a protein-RNA complex may direct the cellular fate. Among these RNA binding proteins, YTH domain proteins are most novel, discovered in late 90s. YTH domain proteins are abundant in eukaryotes and absent in prokaryotes. YTH domain proteins constitute the majority of reader proteins that can specifically identify m6A modification. Human beings have five YTH domain proteins YTHDF1-3, YTHDC1-2 (Hazra, D., Chapat, C., & Graille, M. (2019). m6A mRNA Destiny: Chained to the rhYTHm by the YTH-Containing Proteins. Genes, 10(1), 49.). Although it is evident that these proteins are controlling cellular fate, the function of each protein and their network is yet to be elucidated. In yeast, there is only one YTH domain protein present: Pho92 in Saccharomyces cerevisiae and Mmi1 in Schizosaccharomyces pombe. Apart from the YTH domain there is no sequence homology between these two proteins but their cellular function is similar.It is well established that Mmi1 is responsible for degradation of meiosis specific transcripts during vegetative growth of the cell. Mmi1 forms a tight complex with a small protein, Erh1 (Erh1-Mmi1 complex or EMC). EMC can physically interact with Not1 of CCR4-Not complex and recruit it for degradation of DSR (determinant of selective removal) containing RNAs. The action of Mmi1 is in turn regulated by an RRM domain protein, Mei2. During meiosis, Mei2, along with a lncRNA meiRNA sequesters Mmi1 in a nuclear dot, rendering it inactive and ensuring smooth continuance of meiosis. These three proteins, Mmi1-Erh1-Mei2 play a key role in mitosis to meiosis switch.In S. cerevisiae, Pho92 is involved in the degradation of PHO4 transcripts contributing to phosphate metabolism pathway, during phosphate starvation and also participates in the degradation of mRNAs containing the N6-methyladenosine (m6A) epitranscriptomics marks. Similarly, to S. pombe Mmi1, Pho92 recruits CCR4-Not complex by physical interaction with Not1.During my PhD, I have tried to elucidate the role of these two YTH domain proteins from two model organisms, S. cerevisiae and S. pombe, in mRNA degradation and cell cycle regulation using biochemical and structural approaches.Pho92 of S. cerevisiae physically interacts with Not1 of CCR4-Not complex, we were able to determine the boundaries of this interaction. The interaction between these two proteins was studied by Fluorescence anisotropy. The protein complex was successfully purified and crystallization trials are ongoing.From S. pombe, structure of Mei2-RRM3 was solved with and without an RNA. RNA binding properties of Mei2-RRM3 was studied by ITC. The structure of Erh1 was also solved and we tried to elucidate its importance for biological function of Mmi1. A co-crystallization trial was performed with Mmi1-Mei2-RNA but it was unsuccessful and we ended up with Mmi1 crystals
9

Finoux, Anne-Laure. "Etude des facteurs impliqués dans la dégradation des ARNm chez la levure saccharomyces cerevisiae par fusion de domaines fonctionnels et études in vitro." Paris 11, 2006. http://www.theses.fr/2006PA112346.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Au cours de cette thèse, j’ai entrepris différents projets ayant pour objectif une meilleure compréhension des mécanismes de dégradation des ARNm eucaryotes ches Saccharomyces cereviseae. Dans un premier temps, nous nous sommes intéressés à la régulation de la déadénylation qui représente l’étape limitante des deux voies majeures de dégradation. Nous avons construit un outil permettant de cibler des protéines sur des ARNm rapporteurs. Grâce à ce système, nous avons pu démontrer que le recrutement du complexe Pop/Crr4 était suffisant pour induire une dégradation du messager ciblé. L’activation est spécifique du complexe de déadénylation puisque le ciblage d’autres facteurs protéiques n’affecte pas la demi-vie de l’ARNm. L’analyse fine de la dégradation du messager nous a permis d’identifier de nouveaux intermédiaires de dégradation générés par une digestion 3’-5’ de l’ARNm. De façon intéressante, l’apparition de ces intermédiaires n’est pas le résultat de l’activité de l’exosome mais de la déadénylase Pop2/Ccr4 elle-même. En parallèle de ce projet, nous avons également étudié le mécanisme de NMD (Nonsense-Mediated- Decay) in vivo et nous avons plus particulièrement recherché de nouvelles protéines pouvant être impliquées dans ce processus. Nous avons utilisé différents outils analytiques tels que la purification TAP (Tandem Affinity Purification) permettant d’identifier des complexes protéiques ou encore le système de ciblage de facteurs sur desARNm que nous avons validé par les résultats obtenus avec la déadénylase. Nous avons finalement entrepris un projet de reconstitution des mécanismes de dégradation in vitro. Nous avons en premier lieu mis au point un extrait cellulaire de levure capable de traduire des ARNm exogènes en raison des liens qui existent entre traduction et dégradation. Nous avons également construit différentes séries de plasmides permettant de transcrire in vitro des ARNm rapporteurs afin d’étudier différentes voies de dégradation.
10

Oyede, Lucien Marc. "Dynamique sédimentaire actuelle et messages enregistrés dans les séquences quaternaires et néogènes du domaine margino-littoral du Bénin (Afrique de l'Ouest)." Dijon, 1991. http://www.theses.fr/1991DIJOS041.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Après avoir inventorié les facteurs inducteurs de la sédimentation, l'étude a porté sur la dynamique des milieux estuariens, deltaïques et lagunaires qui constituent le domaine margino-littoral du Bénin, en zone tropicale humide. On peut distinguer, à diverses échelles, des facteurs qui produisent la sédimentation normale et continue ou bruit de fond et ceux qui sont à l'origine des ruptures d'équilibre engendrant des discontinuités majeures enregistrées par les environnements sédimentaires et paléobiologiques sous forme de messages. Ceux-ci sont, ensuite, étudiés dans des sondages atteignant 214 m, où les marqueurs biostratigraphiques indiquent un âge éocène moyen pour les faciès les plus profonds. L’analyse des séquences a, notamment, permis de retracer les fluctuations marines dans le milieu et de localiser précisément, dans le temps, la discordance dite oligocène, connue dans la plupart des bassins sédimentaires côtiers ouest-africains.

Книги з теми "Domain message":

1

United States. President (1993-2001 : Clinton). Veto of H.R. 2909: Message from the President of the United States transmitting his veto of H.R. 2909, entitled the "Silvio O. Conte National Fish and Wildlife Refuge Eminent Domain Preservation Act.". Washington: U.S. G.P.O., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Clinton), United States President (1993-2001 :. Veto of H.R. 2909: Message from the President of the United States transmitting his veto of H.R. 2909, entitled the "Silvio O. Conte National Fish and Wildlife Refuge Eminent Domain Preservation Act.". Washington: U.S. G.P.O., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

United States. President (1993-2001 : Clinton). Veto of H.R. 2909: Message from the President of the United States transmitting his veto of H.R. 2909, entitled the "Silvio O. Conte National Fish and Wildlife Refuge Eminent Domain Preservation Act.". Washington: U.S. G.P.O., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

United States. President (1993-2001 : Clinton). Veto of H.R. 2909: Message from the President of the United States transmitting his veto of H.R. 2909, entitled the "Silvio O. Conte National Fish and Wildlife Refuge Eminent Domain Preservation Act.". Washington: U.S. G.P.O., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

United States. President (1993-2001 : Clinton). Veto of H.R. 2909: Message from the President of the United States transmitting his veto of H.R. 2909, entitled the "Silvio O. Conte National Fish and Wildlife Refuge Eminent Domain Preservation Act.". Washington: U.S. G.P.O., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Clinton), United States President (1993-2001 :. Veto of H.R. 2909: Message from the President of the United States transmitting his veto of H.R. 2909, entitled the "Silvio O. Conte National Fish and Wildlife Refuge Eminent Domain Preservation Act.". Washington: U.S. G.P.O., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Balasubramanian, Siva K. Beyond advertising and publicity: The domain of hybrid messages. Cambridge, Mass: Marketing Science Institute, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Allen, Michael P., and Dominic J. Tildesley. Parallel simulation. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198803195.003.0007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Parallelization is essential for the effective use of modern high-performance computing facilities. This chapter summarizes some of the basic approaches that are commonly used in molecular simulation programs. The underlying shared-memory and distributed-memory architectures are explained. The concept of program threads and their use in parallelizing nested loops on a shared memory machine is described. Parallel tempering using message passing on a distributed memory machine is discussed and illustrated with an example code. Domain decomposition, and the implementation of constraints on parallel computers, are also explained.
9

Zerubavel, Eviatar. Generally Speaking. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197519271.001.0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Defying the conventional split between “theory” and “methodology,” this book introduces a yet unarticulated and thus far never systematized method of theorizing designed to reveal abstract social patterns. Insisting that such methodology can actually be taught, it tries to make the mental processes underlying the practice of a “concept-driven sociology” more explicit. Many sociologists tend to study the specific, often at the expense of also studying the generic. To correct this imbalance, the book examines the theoretico-methodological process by which we can “distill” generic social patterns from the culturally, historically, and situationally specific contexts in which we encounter them. It thus champions a “generic sociology” that is pronouncedly transcontextual (transcultural, transhistorical, transsituational, and translevel) in its scope. In order to uncover generic, transcontextual social patterns, data need to be collected in a wide range of social contexts. Such contextual diversity is manifested multi-culturally, multihistorically, multisituationally, as well as at multiple levels of social aggregation. True to its message, the book illustrates generic social patterns by drawing on numerous examples from diverse cultural contexts and historical periods and a wide range of diverse social domains, as well as by disregarding scale. Emphasizing cross-contextual commonality, generic sociology tries to reveal formal “parallels” across seemingly disparate contexts. This book features the four main types of cross-contextual analogies generic sociologists tend to use (cross-cultural, cross-historical, cross-domain, and cross-level), disregarding conventionally noted substantive differences in order to note conventionally disregarded formal equivalences.
10

Ž. Jovanović, Vladimir. FUNCTIONAL ENGLISH. Filozofski fakultet Niš, 2021. http://dx.doi.org/10.46630/fen.2021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The book Functional English can be viewed as an introductory reading in the domain of functional language, or language used in order to perform certain communicative purposes. Functional language is a concept normally connected with foreign language learners of lower levels and with problems in achieving the designated standards in terms of the four basic language skills. The book is meant to provide a description of the subject matter of Functional English by establishing the basics, as well as the main features and elements of this linguistic domain. The overall objective of the book is to help with the understanding of existing language features sometimes taken for granted, and which may cause communication difficulties. Simultaneously, its ambition is to enable all the interested parties to reaffirm the foundations and build on the existing language repository, in an attempt to achieve a higher level of competence in English used to perform different communicative functions. The term practical language skills within Functional English entails the ability to formulate or articulate one’s communicative message, as well as the ability to interpret correctly or relay clearly to other parties any verbal material relevant to the process of communication. Moreover, being competent in Functional English means being able to select the adequate communication channel or method, where the key factors are the linguistic devices employed, the correlation between the language used and the intended goal, as well as the context of situation and its relation to the audience or the participants in the verbal interaction.

Частини книг з теми "Domain message":

1

Otero, Beatriz, José M. Cela, Rosa M. Badia, and Jesús Labarta. "A Domain Decomposition Strategy for GRID Environments." In Recent Advances in Parallel Virtual Machine and Message Passing Interface, 353–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30218-6_49.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Shtelma, Michael, Mario Cartsburg, and Nikola Milanovic. "Executable Domain Specific Language for Message-Based System Integration." In Model Driven Engineering Languages and Systems, 622–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04425-0_48.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kim, KyoEun, DongBum Seo, You-Boo Jeon, Seong-Soo Han, Doo-Soon Park, and Chang-Sung Jeong. "Real Time Message Process Framework for Efficient Multi Business Domain Routing." In Advances in Computer Science and Ubiquitous Computing, 271–78. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9341-9_47.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Baiardi, Fabrizio, Paolo Mori, and Laura Ricci. "Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain." In Recent Advances in Parallel Virtual Machine and Message Passing Interface, 304–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45417-9_42.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Basu, A., S. Srinivas, K. G. Kumar, and A. Paulraj. "A model for performance prediction of message passing multiprocessors achieving concurrency by domain decomposition." In CONPAR 90 — VAPP IV, 75–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/3-540-53065-7_89.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Picone, D., P. Amodeo, O. Crescenzi, P. A. Temussi, S. Salvadori, G. Cavicchioni, L. H. Lazarus, and T. Tancredi. "Conformational analysis of deltorphin I analogs containing alpha disubstituted residues in the message domain." In Peptides 1994, 630–31. Dordrecht: Springer Netherlands, 1995. http://dx.doi.org/10.1007/978-94-011-1468-4_287.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Ramadan, Omar, Oyku Akaydin, Muhammed Salamah, and Abdullah Y. Oztoprak. "Parallel Implementation of the Wave-Equation Finite-Difference Time-Domain Method Using the Message Passing Interface." In Lecture Notes in Computer Science, 810–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30182-0_81.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Schrijvers, Erik, Corien Prins, and Reijer Passchier. "Conclusions and Recommendations." In Research for Policy, 59–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77838-5_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractOn 24 June 2019, an hour-long outage hit the Dutch emergency number 112 and 0900–8844, the national police telephone line. It was also impossible to contact hospitals, municipalities, and companies for some time. The primary system of KPN – the telecom provider – was out of action while three back-up systems failed. The incident, which according to KPN was probably due to software error, once again revealed the vulnerability of facilities in the physical world to digital failures. It also underlined the report’s central message: the need to be better prepared for incidents involving a digital dimension. These incidents are all the more critical when they are not limited to the digital domain, but have potentially disruptive consequences in the physical world and for confidence in the core institutions of society.
9

Athaiya, Snigdha, Raghavan Komondoor, and K. Narayan Kumar. "Data Flow Analysis of Asynchronous Systems using Infinite Abstract Domains." In Programming Languages and Systems, 30–58. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72019-3_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractAsynchronous message-passing systems are employed frequently to implement distributed mechanisms, protocols, and processes. This paper addresses the problem of precise data flow analysis for such systems. To obtain good precision, data flow analysis needs to somehow skip execution paths that read more messages than the number of messages sent so far in the path, as such paths are infeasible at run time. Existing data flow analysis techniques do elide a subset of such infeasible paths, but have the restriction that they admit only finite abstract analysis domains. In this paper we propose a generalization of these approaches to admit infinite abstract analysis domains, as such domains are commonly used in practice to obtain high precision. We have implemented our approach, and have analyzed its performance on a set of 14 benchmarks. On these benchmarks our tool obtains significantly higher precision compared to a baseline approach that does not elide any infeasible paths and to another baseline that elides infeasible paths but admits only finite abstract domains.
10

Qian, Xin-Hua, Katalin E. Kövér, Mark D. Shenderovich, Edward J. Bilsky, Robert N. Bernstein, Bih-Show Lou, Robert Horváth, et al. "Topographical design of message domain pharmacophores of δ opioid agonists provide insights into the stereochemical requirements for recognizing δ opioid receptor subtypes." In Peptides, 144–48. Dordrecht: Springer Netherlands, 1995. http://dx.doi.org/10.1007/978-94-010-9069-8_37.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Domain message":

1

Wang, Jianping, Zhen He, Liangjie Tang, and Xianyu Du. "A Mixed Message Distribution Inter-domain Signaling Protocol." In 2012 4th International Conference on Multimedia Information Networking and Security (MINES). IEEE, 2012. http://dx.doi.org/10.1109/mines.2012.29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Guo, Lei, Li Tang, Tong Chen, Lei Zhu, Quoc Viet Hung Nguyen, and Hongzhi Yin. "DA-GCN: A Domain-aware Attentive Graph Convolution Network for Shared-account Cross-domain Sequential Recommendation." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/342.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Shared-account Cross-domain Sequential Recommendation (SCSR) is the task of recommending the next item based on a sequence of recorded user behaviors, where multiple users share a single account, and their behaviours are available in multiple domains. Existing work on solving SCSR mainly relies on mining sequential patterns via RNN-based models, which are not expressive enough to capture the relationships among multiple entities. Moreover, all existing algorithms try to bridge two domains via knowledge transfer in the latent space, and the explicit cross-domain graph structure is unexploited. In this work, we propose a novel graph-based solution, namely DA-GCN, to address the above challenges. Specifically, we first link users and items in each domain as a graph. Then, we devise a domain-aware graph convolution network to learn user-specific node representations. To fully account for users' domain-specific preferences on items, two novel attention mechanisms are further developed to selectively guide the message passing process. Extensive experiments on two real-world datasets are conducted to demonstrate the superiority of our DA-GCN method.
3

Agrawal, Neha, and Anubha Gupta. "DCT Domain Message Embedding in Spread-Spectrum Steganography System." In 2009 Data Compression Conference (DCC). IEEE, 2009. http://dx.doi.org/10.1109/dcc.2009.86.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nwe, San San, and Nang Saing Moon Kham. "Semi-supervised Event Message Identification System for Targeted Domain." In 2018 IEEE 18th International Conference on Communication Technology (ICCT). IEEE, 2018. http://dx.doi.org/10.1109/icct.2018.8600123.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cancelli, G., M. Barni, and G. Menegaz. "MPsteg: hiding a message in the Matching Pursuit domain." In Electronic Imaging 2006, edited by Edward J. Delp III and Ping Wah Wong. SPIE, 2006. http://dx.doi.org/10.1117/12.644545.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "A simple construction of encryption for a tiny domain message." In 2017 51st Annual Conference on Information Sciences and Systems (CISS). IEEE, 2017. http://dx.doi.org/10.1109/ciss.2017.7926080.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Al-khassaweneh, Mahmood, and Selin Aviyente. "Embedding Multi-Bit Message in the Joint Time-Frequency Domain." In 2006 IEEE International Conference on Electro/Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/eit.2006.252196.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Raj, Ashok, Anish P. Varghese, and Azmin Khadeeja. "Message dependent algorithm for concealing image and video, inside video, both in wavlet domain and space domain." In 2012 Annual IEEE India Conference (INDICON). IEEE, 2012. http://dx.doi.org/10.1109/indcon.2012.6420610.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zalmai, Nour, Clement Luneau, Carina Stritt, and Hans-Andrea Loeliger. "Tomographic reconstruction using a new voxel-domain prior and Gaussian message passing." In 2016 24th European Signal Processing Conference (EUSIPCO). IEEE, 2016. http://dx.doi.org/10.1109/eusipco.2016.7760658.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Fridrich, Jessica, and Miroslav Goljan. "On estimation of secret message length in LSB steganography in spatial domain." In Electronic Imaging 2004, edited by Edward J. Delp III and Ping W. Wong. SPIE, 2004. http://dx.doi.org/10.1117/12.521350.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Domain message":

1

Kucherawy, M., and E. Zwicky, eds. Domain-based Message Authentication, Reporting, and Conformance (DMARC). RFC Editor, March 2015. http://dx.doi.org/10.17487/rfc7489.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kitterman, S. Experimental Domain-Based Message Authentication, Reporting, and Conformance (DMARC) Extension for Public Suffix Domains. Edited by T. Wicinski. RFC Editor, July 2021. http://dx.doi.org/10.17487/rfc9091.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Weis, B., U. Mangla, T. Karl, and N. Maheshwari. Group Domain of Interpretation (GDOI) GROUPKEY-PUSH Acknowledgement Message. RFC Editor, November 2017. http://dx.doi.org/10.17487/rfc8263.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Draegen., T. Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows. Edited by F. Martin, E. Lear, E. Zwicky, and K. Andersen. RFC Editor, September 2016. http://dx.doi.org/10.17487/rfc7960.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Simpson, W. ICMP Domain Name Messages. RFC Editor, April 1995. http://dx.doi.org/10.17487/rfc1788.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wauchope, Kenneth. Structural Domain Modeling for Understanding Equipment Failure Messages. Fort Belvoir, VA: Defense Technical Information Center, May 1995. http://dx.doi.org/10.21236/ada294035.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mateo Díaz, Mercedes, Laura Becerra Luna, Juan Manuel Hernández-Agramonte, Florencia López, Marcelo Pérez Alfaro, and Alejandro Vasquez Echeverria. Nudging Parents to Improve Preschool Attendance in Uruguay. Inter-American Development Bank, November 2020. http://dx.doi.org/10.18235/0002901.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Uruguay has increased it preschool enrollment, reaching almost universal coverage among four- and five-year-olds. However, more than a third of children enrolled in preschool programs have insufficient attendance, with absenteeism higher in schools in lower socioeconomic areas and among younger preschool children. This paper presents the results of a behavioral intervention to increase preschool attendance nationwide. Most previous experiments using behavioral sciences have looked at the impact of nudging parents on attendance and learning for school-age children; this is the first experiment looking at both attendance and child development for preschool children. It is also the first behavioral intervention to use a government mobile app to send messages to parents of preschool children. The intervention had no average treatment effect on attendance, but results ranged widely across groups. Attendance by children in the 25th 75th percentiles of absenteeism rose by 0.320.68 days over the course of the 13-week intervention, and attendance among children in remote areas increased by 1.48 days. Among all children in the study, the intervention also increased language development by 0.10 standard deviations, an impact similar to that of very labor-intensive programs, such as home visits. The intervention had stronger effects on children in the remote provinces of Uruguay, increasing various domains of child development by about 0.33 to 0.37 standard deviations. Behavioral interventions seeking to reduce absenteeism and raise test scores usually nudge parents on both the importance of attendance and ways to improve child development. In this experiment, the nudges focused only on absenteeism but had an effect on both.

До бібліографії