E. Deci, Richard M. Ryan
Hasil untuk "Information theory"
Menampilkan 20 dari ~21749356 hasil · dari DOAJ, arXiv, Semantic Scholar, CrossRef
J. Gibson
Mark S. Granovetter
J. Wheeler
Jim Law
An easy-to-comprehend text for required undergraduate courses in computer theory, this work thoroughly covers the three fundamental areas of computer theory--formal languages, automata theory, and Turing machines. It is an imaginative and pedagogically strong attempt to remove the unnecessary mathematical complications associated with the study of these subjects. The author substitutes graphic representation for symbolic proofs, allowing students with poor mathematical background to easily follow each step. Includes a large selection of well thought out problems at the end of each chapter.
J. Peppard, J. Ward
V. Ivashina
Lefeng CHENG, Tao ZOU, Manqi NI et al.
With the increasing penetration of renewable energy sources, there has been a profound structural transformation in electricity markets, particularly in the operational paradigm where demand-side resources participate in market mechanisms. This evolution underscores the critical role of demand-side flexibility in enhancing grid resilience and accelerating low-carbon transition pathways. The traditional supply-side regulation is gradually shifting towards a multi-agent decision-making model dominated by demand-side management, involving complex interactions among government, electricity suppliers, grid operators, and consumers. Evolutionary game theory (EGT), as an important tool for studying multi-agent dynamic games and strategy evolution, demonstrates unique advantages in analyzing demand-side participation in the electricity market. Unlike traditional game theory, EGT accounts for bounded rationality, incomplete information, and dynamic strategy adaptation, enabling effective analysis of market equilibrium and stability under different incentives and policy frameworks. A comprehensive review of the applications of EGT in the electricity market is provided in this paper, focusing on the strategy evolution and equilibrium mechanisms of demand-side participation. It explores how EGT helps to understand and predict strategy adjustments and the impact of policy incentives on market stability in multi-agent games. The paper also looks forward to future research directions. By organizing and analyzing the existing literature, this review offers a theoretical framework and practical reference for policymakers, market regulators, and researchers to facilitate the collaborative evolution and sustainable development of the electricity market under the context of renewable energy.
Mohammed Sadiq, Bilal Muhammad
Youth engagement in agribusiness is a strategic priority for addressing unemployment and ensuring food security in Nigeria. However, the persistence of high failure rates among youth-led enterprises suggests that conventional support models, predominantly focused on financial provision, are insufficient. Therefore, this study investigates the multidimensional drivers of empowerment and performance among youth agripreneurs in Jigawa State, Nigeria. The study employed a cross-sectional survey design, collecting data from 286 young agribusiness entrepreneurs selected through a multistage sampling technique. The survey was conducted in the year 2025, and it lasted for a period of three months (May-July). An easy-cost-route approach, a well-structured questionnaire complemented with an interview schedule, key informants, and a focus group discussion were the tools used for information synthesis. Furthermore, a structural equation model (SEM) was used to analyse the relationships within four theoretical frameworks: the Agripreneurship Empowerment Dimension Theory (AEDT), the Youth Agency Dimension Theory (YADT), the Youth Agripreneurship Performance Theory (YAPT), and the Agripreneurship Resource Construct (ARC). The results revealed that psychological empowerment and self-efficacy were the strongest and most significant predictors of empowerment, far surpassing the impact of economic factors, which were statistically insignificant. Political empowerment and autonomy also showed significant positive effects. Regarding performance, customer-oriented factors and social resources, such as networks and mentorship, were the most critical drivers, while financial resources alone showed no significant direct effect. The study concludes that empowerment and performance are intrinsically linked to intrinsic psychological assets and social capital rather than purely financial inputs. Consequently, it recommends a paradigm shift in policy and practice towards integrated interventions that prioritise mindset development, leadership training, political inclusion, and the strengthening of social networks to build resilient and empowered youth agripreneurs capable of transforming Jigawa State's agricultural landscape.
P. O. CHEKALKIN, L. O. GRES
DOI: https://doi.org/10.26565/2074-8922-2025-85-18 The aim of the article is to determine the influence of applying internet project design on the formation of professional-pedagogical competence of vocational education teachers and its specific components that are developed through this innovation. A logical-structural analysis of recent literature in the fields of psychology, pedagogy, and cyberpedagogy pertaining to internet project design was conducted as a research method. This facilitated the systematization and generalization of the information gathered. One of the educational technologies of cyber-pedagogy and professional cyber-socialization for candidates of pedagogical education is internet project design. This is understood as the process of constructing, step-by-step creation, and substantive development of an internet resource on a specific topic, intended to solve a given social or professional problem. It is extremely important that candidates for professional-pedagogical education, in the process of internet project design, simultaneously master two roles: 1) the executor, who learns to create internet projects themselves; and 2) the organizer, who understands how to implement internet project design in professional education at its various levels. As a result of mastering internet project design, a vocational training teacher becomes capable of: conducting information search, analysis, and synthesis, as well as applying a systemic approach; defining the scope of tasks within a given goal and selecting optimal methods for their solution; critically analyzing problematic situations and developing a strategy of action; managing a project throughout all stages of its lifecycle; organizing and leading a team's work, developing a team strategy of action to achieve the chosen goal, and so on. In other words, during the process of internet project design, a specific range of ICT-competencies is formed, which a vocational training teacher must possess. An internet project, as a product of the joint activity of a university educator and a student, becomes a connecting link between pedagogical theory and pedagogical practice. Accordingly, this technology is relevant and in demand due to the simultaneous formation and development of several key competencies of a future vocational training educator, which makes its implementation in the practice of vocational pedagogical education promising, taking into account the new realities of the digital space and the digitalization of educational activities. The prospect for further research in this direction could be the development of a methodology for training vocational training educators in the development of internet projects for the purpose of forming and developing the maximum number of their constituent competencies. In cites: Chekalkin P. O., Gres L. O. (2025). Development of educational Internet projects as a component of future vocational education teachers' competence. Problems of Engineering Pedagogic Education, (85), 205-215. https://doi.org/10.26565/2074-8922-2025-85-18 (in Ukrainian)
Gustavo Morales, Gustavo Morales, Augusto Salazar et al.
This study explores the profound effects of information and communication technologies (ICT) on contemporary democracy. Focusing on the 2020 US presidential election, this research investigates how Twitter/X structures online communities with specific socialization patterns and ways to construct the truth. The rise of these platforms has sparked debate with split conclusions over whether they are enhancing or undermining democratic processes. Rather than keep digging within this unsolved discussion, this study moves the focus of inquiring toward how ICT affects the very existence of subjects in democracy. This means transitioning from defining ICT solely by its utility as a separate technology that affects behavior to seeing how subjects are entangled in the virtual world created by ICT. Methodologically, the users’ practices on the web are mapped using computational sciences metrics. This study employed Twitter’s Stream API to assemble a dataset encompassing tweets that featured keywords. The descriptive analytics are executed utilizing the Python programming language. In conducting sentiment analysis, this research employed the Twitter-roBERTa-base model. To develop a comprehensive analysis of large interaction datasets, we propose a novel methodology leveraging large language models to automate the classification process. The analysis reveals how algorithmically driven virtual interactions create a “mixed reality,” where virtual and real-world dynamics intersect, leading to increased polarization and the erosion of democratic deliberation. Trump’s defeat marked a collision between users who took to the streets under the banner of a conspiracy theory, which had gained traction as an alternative virtual truth through acclamation as practice, and citizens who use the practice of deliberation over empirical results of the electoral process. This study not only provides empirical evidence on the impact of ICT on democracy but also introduces innovative computational techniques for analyzing large-scale social media data.
Saar Tarnopolsky, Alejandro Cohen
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC) in the finite blocklength regime that provides Post-Quantum (PQ) security at high communication rates. Recently, hybrid cryptosystems offered PQ security by premixing the data using secure linear coding schemes and encrypting only a small portion of it. The data is assumed to be uniformly distributed, an assumption that is often challenging to enforce. Standard fixed-length lossless source coding and compression schemes guarantee a uniform output in normalized divergence. Yet, this is not sufficient to guarantee security. We consider an efficient compression scheme uniform in non-normalized variational distance for the proposed hybrid cryptosystem, that by utilizing a uniform sub-linear shared seed, guarantees PQ security. Specifically, for the proposed PQ cryptosystem, first, we provide an end-to-end practical coding scheme, NU-HUNCC, for non-uniform messages. Second, we show that NU-HUNCC is information-theoretic individually secured (IS) against an eavesdropper with access to any subset of the links and provide a converse proof against such an eavesdropper. Third, we introduce a modified security definition, individual semantic security under a chosen ciphertext attack (ISS-CCA1), and show that against an all-observing eavesdropper, NU-HUNCC satisfies its conditions. Finally, we provide an analysis of NU-HUNCC's high data rate, low computational complexity, and the negligibility of the shared seed size.
S.P. Gao, M. Xia, S.J. Zhang
Unmanned Aerial Vehicle (UAV) remote sensing is a commonly used technical means in modern science and technology, but currently, remote sensing images captured by UAVs need to be spliced to obtain more comprehensive information. However, current image stitching techniques generally have shortcomings such as a small number of extracted features, low matching accuracy, and poor stability. To address the above issues, this study proposes an improved remote sensing image mosaic model on the bias of the Scale Invariant Feature Transform (SIFT) algorithm. Firstly, in this study, aiming at the problem that traditional SIFT cannot meet the requirements of feature extraction and matching for unconventional remote sensing images and special texture images, normalized cross correlation (NCC) and Forstner operator are introduced to optimize it, namely, a SIFT-NCC model is constructed. On this basis, for remote sensing images with high resolution and a wide range, this study further proposes a remote sensing image automatic mosaic model that combines point features and line features. That is, a linear segment detector (LSD) is introduced to extract the line features of remote sensing images. The experimental verification results of the final SIFT-NCC-LSD show that the matching accuracy for remote sensing images with different characteristics can reach over 95 %. Therefore, SIFT-NCC-LSD has good applicability.
Sergey V. Skryl, Anastasiya A. Itskova, Kirill E. Ushakov
The article develops a functional model of unauthorized access (UA) protection mechanisms at information infrastructure objects (IIOs). It defines the content of protection measures, techniques used, and stages of their implementation. It substantiates the order of execution of individual functional components of the structural representation of the objective function "Protection of information of IIOs from UA". The sequence of implementation of these components is illustrated as a change in the states of the Markov process for constructing such a model. A table is provided of the correspondence between the list of procedures performed by an intruder in the process of implementing an UA threat to information of an IIOs and the procedures for protecting information, and it demonstrates the possibility of transition from the description of information protection measures from UA at IIOs in terms of functional modeling to the mathematical representation of the time characteristics of the functional components of the objective function of protection. The corresponding analytical expressions are provided for various options for representing the order of the functional components performed.
Ding Qin, Liu Mengzhi
Visual media have dominated sensory communications for decades, and the resulting “visual hegemony” leads to the call for the “auditory return” in order to achieve a holistic balance in cultural acceptance. Romance of the Three Kingdoms, a classic literary work in China, has received significant attention and promotion from leading audio platforms. However, the commercialization of digital audio publishing faces unprecedented challenges due to the mismatch between the dissemination of long-form content on digital audio platforms and the current trend of short and fast information reception. Drawing on the Business Model Canvas Theory and taking Romance of the Three Kingdoms as the main focus of analysis, this paper argues that the construction of a business model for the audio publishing of classical books should start from three aspects: the user evaluation of digital audio platforms, the establishment of value propositions based on the “creative transformation and innovative development” principle, and the improvement of the audio publishing infrastructure to ensure the healthy operation and development of the digital audio platforms and consequently improve their current state of development and expand the boundaries of cultural heritage.
Marwah Alaofi, Negar Arabzadeh, Charles L. A. Clarke et al.
In this chapter, we consider generative information retrieval evaluation from two distinct but interrelated perspectives. First, large language models (LLMs) themselves are rapidly becoming tools for evaluation, with current research indicating that LLMs may be superior to crowdsource workers and other paid assessors on basic relevance judgement tasks. We review past and ongoing related research, including speculation on the future of shared task initiatives, such as TREC, and a discussion on the continuing need for human assessments. Second, we consider the evaluation of emerging LLM-based generative information retrieval (GenIR) systems, including retrieval augmented generation (RAG) systems. We consider approaches that focus both on the end-to-end evaluation of GenIR systems and on the evaluation of a retrieval component as an element in a RAG system. Going forward, we expect the evaluation of GenIR systems to be at least partially based on LLM-based assessment, creating an apparent circularity, with a system seemingly evaluating its own output. We resolve this apparent circularity in two ways: 1) by viewing LLM-based assessment as a form of "slow search", where a slower IR system is used for evaluation and training of a faster production IR system; and 2) by recognizing a continuing need to ground evaluation in human assessment, even if the characteristics of that human assessment must change.
Annemaree Lloyd
Halaman 36 dari 1087468