Showing 3,701 - 3,720 results of 124,197 for search '"Research"', query time: 0.17s Refine Results
  1. 3701
  2. 3702
  3. 3703
  4. 3704
  5. 3705
  6. 3706
  7. 3707
  8. 3708
  9. 3709
  10. 3710
  11. 3711
  12. 3712
  13. 3713

    Research hotspots and frontiers in metakaolin-based geopolymer studies: a bibliometric analysis by Peng Wang, Mingquan Ma, Fei Wang

    Published 2025-01-01
    “…Through a multidimensional analysis, this study systematically organizes the knowledge structure and development trends in metakaolin-based geopolymer research. It offers macro-level insights for related researchers and provides directions and ideas for future research.…”
    Get full text
    Article
  14. 3714

    Research Progress and Prospect of Multi-robot Collaborative SLAM in Complex Agricultural Scenarios by MA Nan, CAO Shanshan, BAI Tao, KONG Fantao, SUN Wei

    Published 2024-11-01
    “…[Conclusions and Prospects]To enhance the applicability and efficiency of multi-robot SLAM in complex agricultural scenarios, future research needs to focus on solving these critical technological issues. …”
    Get full text
    Article
  15. 3715
  16. 3716
  17. 3717

    Entrepreneurship as a dynamic field of study: a bibliometric analysis of research output by Luis Javier Cabeza Ramírez, Sandra Mª Sánchez Cañizares, Fernando J. Fuentes García

    Published 2017-07-01
    “…To this end, the relevant papers published in indexed international journals were selected from both databases. The most-cited research was identified by setting a standardised threshold number of citations based on the Hindex called ‘H-Classics’, which is sensitive to the particular characteristics of each research area. …”
    Get full text
    Article
  18. 3718

    Research and practice of network security threat intelligence management system for power enterprise by Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG

    Published 2022-07-01
    “…Network security is an important part of the national security, and network security threat intelligence work has become an important part of the network security protection.Aiming at the problems of power enterprise carrying out network security threat intelligence, such as many sources, many types, wide range, many vulnerability risks, many subordinate departments and personnel, the network security threat intelligence work plan of power enterprise was put forward.The scheme includes five aspects: information source, information research and judgment, information disposal, information platform and information performance.The evaluation method of network security vulnerabilities, information emergency disposal process and information performance evaluation method were puts forward.The preliminary application results show that the proposed scheme has important reference value for power enterprise to improve the emergency response ability of network security information and the level of network security protection ability.…”
    Get full text
    Article
  19. 3719
  20. 3720

    Identifying stakeholder priorities in use of wearable cameras for researching parent-child interactions by Andy Skinner, Andy Skinner, Ilaria Costantini, Ilaria Costantini, Chris Stone, Chris Stone, James Darios, Mike Gray, Iryna Culpin, Iryna Culpin, Rebecca M. Pearson, Rebecca M. Pearson

    Published 2023-06-01
    “…Wearable Cameras (WCs) enable researchers to capture objective descriptions of what participants see and experience as they go about their normal lives. …”
    Get full text
    Article