Suggested Topics within your search.
Suggested Topics within your search.
- Foreign economic relations 2
- History 2
- YOUNG ADULT FICTION / Fantasy / Historical 2
- YOUNG ADULT FICTION / Historical / Asia 2
- Buddhism 1
- Chemical weapons 1
- Chinese 1
- Cultural assimilation 1
- Description and travel 1
- Diversity in the workplace 1
- Drawings 1
- Droit 1
- Economic aspects 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Emigration and immigration 1
- Foreign workers, Chinese 1
- Immigrants 1
- Language 1
- Law 1
- Mass media 1
- Medical laws and legislation 1
- Moral and ethical aspects 1
- Murder 1
- Mystery and detective stories 1
- Médecine 1
- Occultism 1
- Painting 1
- Parapsychology 1
-
43961
Application and research prospects of artificial intelligence in breast cancer pathological diagnosis
Published 2024-09-01Get full text
Article -
43962
Nontrivial Periodic Solutions of an -Dimensional Differential System and Its Application
Published 2013-01-01Get full text
Article -
43963
Optimizing Crew Rostering with Multilicense on High-Speed Railway Lines
Published 2014-01-01Get full text
Article -
43964
On the linkage analysis modle of the telecom companies’ investment benefit
Published 2017-09-01Get full text
Article -
43965
-
43966
-
43967
Bifurcation and Nodal Solutions for the Half-Linear Problems with Nonasymptotic Nonlinearity at 0 and ∞
Published 2016-01-01Get full text
Article -
43968
On the Multiplicity of Solutions for the Discrete Boundary Problem Involving the Singular ϕ-Laplacian
Published 2021-01-01Get full text
Article -
43969
-
43970
Les petites villes, de nouveaux centres pour le développement territorial chinois
Published 2014-03-01“…In China, since the economic opening in 1978, more than 15 million people move to cities every year. …”
Get full text
Article -
43971
Review on artificial intelligence chip technology system
Published 2019-04-01“…Artificial intelligence technology is the new focus of current countries.The development of artificial intelligence technology has put forward new requirements for computing chips.Deep learning algorithms require the training of massive data,while traditional computing architectures can’t support the large-scale computing requirements of deep learning algorithms.Therefore,artificial intelligence chips of new architectures emerge one after another.The different technical routes of artificial intelligence chips were analyzed,the characteristics of different routes were compared,the development trend of artificial intelligence chip industry and studied,the opportunities and challenges of artificial intelligence chip development in China were analyzed,and the future development of artificial intelligence chip technology was forecasted.…”
Get full text
Article -
43972
Measurement of Countable Compactness and Lindelöf Property in RL-Fuzzy Topological Spaces
Published 2021-01-01Get full text
Article -
43973
Virtual network embedding algorithm based on consultant guided search
Published 2020-06-01Get full text
Article -
43974
Research on the design and policy of national number portability service plan
Published 2021-11-01“…The 2019 government work report proposed to make the service of number portability officially in effect nationwide.The preparation works had encountered many challenges, such as upgradation of network, changes of rules, and regulations.Firstly, an complete implementation plan from two aspects was proposed: service interaction and system support, including portability procedure, user interface, system structure and service enquiry.Secondly, operational regulations and policies related to number portability was analyzed and researched, and optimized suggestions were put forward.Finally, the present portability development status was summarized and the future development trend was predicted.China Telecom has maintained the leading position, the lowest complaints and system failures in the industry.Proposed policies regarding supervision have been adopted by the industry.…”
Get full text
Article -
43975
Robust Stability Analysis for Uncertain Switched Discrete-Time Systems
Published 2011-01-01Get full text
Article -
43976
Iterative Solutions of a Set of Matrix Equations by Using the Hierarchical Identification Principle
Published 2014-01-01Get full text
Article -
43977
Research on security threat of intelligent connected vehicle
Published 2019-12-01Get full text
Article -
43978
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
43979
An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks
Published 2016-11-01Get full text
Article -
43980
Research on characteristics of industrial IoT wireless channel
Published 2019-12-01Get full text
Article