Showing 5,261 - 5,280 results of 124,197 for search '"Research"', query time: 0.19s Refine Results
  1. 5261
  2. 5262
  3. 5263

    Research Progress on the Application of Elemental Fingerprinting in Tea Origin Traceability and the Influencing Factors Thereof by LI Yanlong, QIAN Lili, CHEN Mingming, SONG Yan, LIU Yi, WANG Yongsheng, LIU Hongyan

    Published 2024-12-01
    “…This article summarizes the progress on elemental fingerprinting in tracing the origin of tea and influencing factors thereof, introduces the domestic and international progress that has been made over the past decade in the application of stable isotopes and mineral elemental fingerprinting in tea origin tracing, discusses the impacts of geographical environment, tea tree varieties and processing techniques on tea elemental fingerprints, and proposes future research directions for tea traceability technology, aiming to provide references for achieving more accurate traceability of tea origin.…”
    Get full text
    Article
  4. 5264
  5. 5265

    Application Research on Wireless Communication Private Network of Distrbution Power Grid for Special Areas by Zhihua Guo, Xiaohui Xue, Na Li, Jiangfei Wan, Ping Chen, Xi Lin, Qinfeng Jing

    Published 2015-05-01
    “…The research in wireless communication network construction and application for power grid distribution and consumption were focused on. …”
    Get full text
    Article
  6. 5266
  7. 5267
  8. 5268
  9. 5269
  10. 5270
  11. 5271
  12. 5272
  13. 5273
  14. 5274

    Research on the relationship between key risk factors of university emergencies based on ISM-MICMAC. by Yufei Li, Xiaoyun Liu, Nanyan Hu, Xuexue Li

    Published 2025-01-01
    “…Thirdly, combined with the matrix impacts cross-reference multiplication applied to a classification (MICMAC), the driving force and dependence force of each risk factor of university emergencies were obtained, and the risk factors of university emergencies were divided into spontaneous factors, independent factors, dependent factors, linkage factors, etc. 4 categories, and targeted governance and prevention measures were proposed for different types of risk factors. Finally, the research results will help universities to accurately identify, warn and manage the key risks of emergencies, and provide a reference for the management of emergencies in universities.…”
    Get full text
    Article
  15. 5275
  16. 5276
  17. 5277
  18. 5278
  19. 5279

    Design and Research of the Walkling Mechanism of the Stair Climbing Robot based on the Deformable Wheel Structure by Yang Ping, Liu Yuankai, Zhao Meixiang

    Published 2016-01-01
    “…Secondly,through the simulation research,the rationality of the designed structure for deformable wheel is analyzed. …”
    Get full text
    Article
  20. 5280

    Research review of network defense decision-making methods based on attack and defense game by Xiaohu LIU, Hengwei ZHANG, Junqiang MA, Yuchen ZHANG, Jinglei TAN

    Published 2022-02-01
    “…Game theory studies the optimal decision-making problem under the condition of conflict confrontation.It is one of the basic theories of cyberspace security, and can provide a theoretical basis for solving the problem of network defense decision-making.The six game characteristics of network attack and defense were defined, such as goal opposition, strategy dependence, non-cooperative relationship, incomplete information, dynamic evolution and interest drive.Based on the hypothesis of rational player and limited resources, a 5-tuple network attack and defense game model was formally defined by using player, attack and defense strategy set, attack and defense action set, attack and defense information set and attack and defense income.The existing conditions of game equilibrium were analyzed, and the general process of network defense decision-making based on attack and defense game model was summarized.The applicable scenarios of network defense decision-making methods based on eight different types of game models were analyzed, such as complete information static game, complete information dynamic game, incomplete information static game, incomplete information dynamic game, evolutionary game, differential game, time game and random game, and summarizes their research ideas.The advantages and disadvantages of network defense decision-making methods based on different types of game models were given.The development process of network defense decision-making method based on attack defense game was summarized, and the advantages and characteristics of defense decision-making method was explained.It were pointed out that there were three problems in the research process, such as the relationship between the number of factors considered in game modeling and the complexity of the model, the dependence of game reasoning on information and data, and the generalization and migration of game model.It also looked forward to the next research direction from the description mechanism of normative strategy, the calculation method of optimizing revenue and the integration with other network security technologies.And the problems that should be solved were explained.…”
    Get full text
    Article