Showing 1 - 4 results of 4 for search '"bling"', query time: 0.03s Refine Results
  1. 1

    Lujo y alteridad: el exceso como salvoconducto para evadir/seducir al Otro. Acercamiento a los filmes The Bling Ring (2013) de Sofia Coppola, Les derniers jours du monde (2009) de Arnaud y Jean-Marie Larrieu, y The Great Gatsby (2013) de Baz Luhrmann by Mauricio Díaz Calderón

    Published 2015-04-01
    “…So, it is relevant to recognize how films build their messages and fix in the social imaginary. The The Bling Ring film (2013), by American Sofia Coppola; Les Derniers Jours du monde (2009), by French brothers Arnaud and Jean -Marie Larrieu; and The Great Gatsby (2013), by Australian Baz Luhrmann, have in common the exploration of a luxurious and ostentatious world. …”
    Get full text
    Article
  2. 2

    Dual-Wavelength Confocal Laser Speckle Contrast Imaging Using a Deep Learning Approach by E Du, Haohan Zheng, Honghui He, Shiguo Li, Cong Qiu, Weifeng Zhang, Guoqing Wang, Xingquan Li, Lan Ma, Shuhao Shen, Yuan Zhou

    Published 2024-11-01
    “…Additionally, we proposed a blood flow perfusion imaging method called BlingNet (a blood flow imaging CNN) based on the laser speckle contrast imaging technique and deep learning approach. …”
    Get full text
    Article
  3. 3

    Internet gaming disorder and the alternative five factor personality model: a study in a Spanish community sample by Anton Aluja, Oscar García, Ferran Balada, Neus Aymamí, Luis F. García

    Published 2024-06-01
    “…The unidimensionality of the IGD-20 allows its use in correlational studies to examine the relationship between Internet gam-bling behaviors and personality variables. The implications of these personality profiles are discussed in relation to the psy-chological and clinical mechanisms involved in Internet gaming disorder.…”
    Get full text
    Article
  4. 4

    General secure encryption algorithm for separable reversible data hiding in encrypted domain by Hongli Wan, Minqing Zhang, Yan Ke, Zongbao Jiang, Fuqiang Di

    Published 2024-11-01
    “…However, the commonly used XOR, scram-bling or combination methods fall short in security, especially against known plaintext attack (KPA). …”
    Get full text
    Article