Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
841
Research on secure routing algorithm in satellite networks
Published 2006-01-01“…The key technologies in satellite networks security were researched.A security routing algorithm was proposed.By static configuration combining together with dynamic adjustment,the algorithm realized dynamic routing.Based on the credence model,the security mechanism was added.When it found there was malicious behavior in the network,it would react actively.It effectively guaranteed the security of satellite networks and protectd the network from kinds of attacks.…”
Get full text
Article -
842
Research of the mathematic model of synthetic range profile
Published 2010-01-01Get full text
Article -
843
-
844
Research on Telecommunication System Business Security Architecture
Published 2013-08-01“…The concept of service security was thoroughly analyzed,and the generalized and narrow business security was proposed.The generalized business safety system was divided into five layers,and network security and safety requirements were defined,meanwhile the narrow business security was focused on the security of application layer,which was the concentration of the research.The security of application layer mainly includes two aspects:common vulnerabilities and loopholes in the service logic,which are defined and researched intensively.A security architecture against the security problem of the business-oriented system,and the security architecture taken as a better guideline for the design and implementation of business systems were proposed.…”
Get full text
Article -
845
-
846
Research on intrusion detection based on an improved GHSOM
Published 2011-01-01Get full text
Article -
847
-
848
Macrostructures and rhetorical moves in research articles in nanotechnology
Published 2025-01-01“…IntroductionNotwithstanding the fact that extensive studies focused on exploring generic structures in established disciplines, scant attention has been directed to macrostructures and rhetorical moves in RAs in some emerging disciplines.MethodsBased on a self-compiled corpus of 50 research articles (RAs) from five top ranking journals in the field of Nanotechnology, we explored the macrostructures and rhetorical moves in RAs in Nanotechnology.ResultsIt was found that (i) scientists in Nanotechnology have a propensity to employ a merged [R&D] structure to immediately discuss and contribute new knowledge tentatively in the specific contextualised situation after research results were presented, (ii) Even though RAs in Nanotechnology largely follows IMRD structure by abiding writing conventions in the research world, disciplinary variations were found regarding the rhetorical structures, specifically, scientists in Nanotechnology tend to employ more moves and steps in establishing research niche, detailed description of research methods, suggesting future research, but less moves and steps related to promotional strategies (M3S4, M3S5, M3S6).DiscussionThe research results have significant implications for English for Academic Purposes (EAP) instructors to make informed choices by using disciplinary empirical-based decisions to guide novice writers and students at tertiary level to write RAs by following disciplinary conventions of research communities in Nanotechnology so as to avoid overgeneralization.…”
Get full text
Article -
849
Research on IoT device identification based on blockchain
Published 2018-06-01Get full text
Article -
850
Design and Research of S-Box Based on Dynamic Strategy
Published 2015-11-01“…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
Get full text
Article -
851
The presentation of the user in reports of information behaviour research
Published 2006-01-01Subjects: “…How information behaviour researchers describe research 'participants'.…”
Get full text
Article -
852
Epidemiological Research Advances in Vascular Calcification in Diabetes
Published 2021-01-01“…Journal of Diabetes Research…”
Get full text
Article -
853
Research and Achievement of Redundancy Elimination of Backbone Network
Published 2013-09-01Get full text
Article -
854
RESEARCH OF POLITICAL COMMUNICATIONS: THE STATE AND SOCIAL MEDIA
Published 2018-06-01Get full text
Article -
855
-
856
-
857
Socio-psychological research of value orientations of students
Published 2022-01-01“…The desire to find ways to resolve this contradiction determined the purpose of the research conducted to investigate the relationship of legal consciousness with individual psychological characteristics and value orientations of Samara students who took part in unauthorized protest actions in January 2021. …”
Get full text
Article -
858
Research of the Efficiency Characteristic of Hydro-mechanical CVT
Published 2015-01-01“…A hydro-mechanical continuously variable transmission(HMCVT) with a single planetary gear is introduced,and the power transfer of the transmission is analyzed.The efficiency characteristic of transmission is researched from different angles through the definition method and the meshing power method,and the main factors which influence the efficiency of transmission are acquired,the theoretical foundation for the optimization of design scheme and increasement of the transmission efficiency is established.A test bench of hydraulic system is designed,and the main factors which influence the efficiency of hydraulic system are analyzed.A test bench of HMCVT is established,the stepless regulation speed characteristic curves and efficiency characteristic curves are acquired,and the test results are analyzed.…”
Get full text
Article -
859
-
860
Krasnoshchyoks’ brothers: experience of historical and biographic research
Published 2019-02-01Get full text
Article