Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
1361
STRENGTHENING THE RESEARCH OF KEY ENABLING TECHNOLOGIES FOR NEW INNOVATIONS
Published 2019-11-01Subjects: Get full text
Article -
1362
RESEARCH ON EXCAVATION RESISTANCE FUNCTION OF AUTOMATIC EXCAVATOR (MT)
Published 2023-01-01“…The research on the excavation resistance function of excavator is the key step to realize automatic excavation. …”
Get full text
Article -
1363
Research of worm-propagation prediction based on stochastic experiment
Published 2007-01-01Get full text
Article -
1364
Creando Pensamus: scientific research is future’s driving force
Published 2018-06-01“…Living in a knowledge and innovation society, require the re-imagining of University, its research and its link to the territory, to train scholars and professionals capable of tangible actions in the new and increasingly dynamic scenario, in which traditional methods and instruments might be obsolete.…”
Get full text
Article -
1365
Research and Experiment on Energy-Conservation Cooling Technique in IDC
Published 2014-08-01Get full text
Article -
1366
Research on multi-granularity password analysis based on LLM
Published 2024-02-01“…Password-based authentication has been widely used as the primary authentication mechanism.However, occasional large-scale password leaks have highlighted the vulnerability of passwords to risks such as guessing or theft.In recent years, research on password analysis using natural language processing techniques has progressed, treating passwords as a special form of natural language.Nevertheless, limited studies have investigated the impact of password text segmentation granularity on the effectiveness of password analysis with large language models.A multi-granularity password-analyzing framework was proposed based on a large language model, which follows the pre-training paradigm and autonomously learns prior knowledge of password distribution from large unlabelled datasets.The framework comprised three modules: the synchronization network, backbone network, and tail network.The synchronization network module implemented char-level, template-level, and chunk-level password segmentation, extracting knowledge on character distribution, structure, word chunk composition, and other password features.The backbone network module constructed a generic password model to learn the rules governing password composition.The tail network module generated candidate passwords for guessing and analyzing target databases.Experimental evaluations were conducted on eight password databases including Tianya and Twitter, analyzing and summarizing the effectiveness of the proposed framework under different language environments and word segmentation granularities.The results indicate that in Chinese user scenarios, the performance of the password-analyzing framework based on char-level and chunk-level segmentation is comparable, and significantly superior to the framework based on template-level segmentation.In English user scenarios, the framework based on chunk-level segmentation demonstrates the best password-analyzing performance.…”
Get full text
Article -
1367
Research of location privacy protection in wireless sensor network
Published 2017-11-01“…For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.…”
Get full text
Article -
1368
RESEARCH ON UNDERWATER COMMUNICATION AND SIMULATED ASSESSMENT OF MAIN PARAMETERS
Published 2018-07-01“…Underwater communication and its applications is a research field that has been developing rapidly, extending in many fields such as remote control in the offshore oil industry, calculating environmental pollution, transmitting voices between frogmen, drawing the ocean floor to find new resources, communication between underground devices, etc. …”
Get full text
Article -
1369
African Indigenous Research to Decolonisation of African Universities’ Curricula
Published 2024-02-01Subjects: “…African indigenous research…”
Get full text
Article -
1370
SOME RESULTS AND PROSPECTS OF NATIONAL RESEARCH UNIVERSITIES’ ACTIVITIES
Published 2022-05-01Subjects: Get full text
Article -
1371
Research on IQ Imbalance Error of Orthogonal Alternating Sampling
Published 2022-01-01Get full text
Article -
1372
Progress and Analysis of Research on Phosphorus Collectors and their Interaction Mechanisms
Published 2024-12-01Subjects: Get full text
Article -
1373
Research on Submarine Magnetic Field Simulation with Energized Coil
Published 2024-12-01“…It is necessary to conduct in-depth research on the distribution characteristics of the submarine magnetic field simulator with energized coil, so as to better guide its design. …”
Get full text
Article -
1374
CONTINUOUS TRAINING OF ENGINEERS FOR INNOVATIVE ECOMONY IN THE RESEARCH UNIVERSITY
Published 2017-06-01Subjects: Get full text
Article -
1375
Research Ethics: Ideas and Practices of Russian Young Scientists
Published 2024-08-01Subjects: “…research ethics…”
Get full text
Article -
1376
Applying a reproducible research approach to distance education
Published 2022-07-01Subjects: “…reproducible research…”
Get full text
Article -
1377
Canadian Association of Gastroenterology Research Committee Report 2009
Published 2010-01-01Get full text
Article -
1378
Physical, digital, virtual, intangible. Research experiences in Museums
Published 2021-12-01“…Using consolidated taxonomies and redefining the digital tools to be innovatively applied to Cultural Assets, the essay describes some research experiences carried out over the last years. …”
Get full text
Article -
1379
Research of the S Curve Optimization Method of the Robot Acceleration and Deceleration
Published 2015-01-01Get full text
Article -
1380
Research on Database Deployment Technology in Cloud Computing Environment
Published 2015-07-01“…Cloud computing virtualization technology has the characteristics of elastic scalability,automatic migration (high availability),automatic recovery (high stability).Because of the natural complexity of database systems,it makes a big challenge to deploy database systems in cloud computing virtualization environment.On the basis of research and analyzing models of deploying database systems in private cloud environment,the TPC-C benchmark test with database instances running in cloud computing virtual machines was applied.Compared with performance results of same test with database instances running in physical machines,the feasibility of deploying database systems in cloud computing virtualization environment was verified.…”
Get full text
Article