Showing 841 - 860 results of 124,197 for search '"Research', query time: 0.32s Refine Results
  1. 841

    Research on secure routing algorithm in satellite networks by LI Zhe, LIU Jun

    Published 2006-01-01
    “…The key technologies in satellite networks security were researched.A security routing algorithm was proposed.By static configuration combining together with dynamic adjustment,the algorithm realized dynamic routing.Based on the credence model,the security mechanism was added.When it found there was malicious behavior in the network,it would react actively.It effectively guaranteed the security of satellite networks and protectd the network from kinds of attacks.…”
    Get full text
    Article
  2. 842
  3. 843
  4. 844

    Research on Telecommunication System Business Security Architecture by Hong Li, Kai Qu

    Published 2013-08-01
    “…The concept of service security was thoroughly analyzed,and the generalized and narrow business security was proposed.The generalized business safety system was divided into five layers,and network security and safety requirements were defined,meanwhile the narrow business security was focused on the security of application layer,which was the concentration of the research.The security of application layer mainly includes two aspects:common vulnerabilities and loopholes in the service logic,which are defined and researched intensively.A security architecture against the security problem of the business-oriented system,and the security architecture taken as a better guideline for the design and implementation of business systems were proposed.…”
    Get full text
    Article
  5. 845
  6. 846
  7. 847
  8. 848

    Macrostructures and rhetorical moves in research articles in nanotechnology by Xianqing Luo, Jiajie Ji

    Published 2025-01-01
    “…IntroductionNotwithstanding the fact that extensive studies focused on exploring generic structures in established disciplines, scant attention has been directed to macrostructures and rhetorical moves in RAs in some emerging disciplines.MethodsBased on a self-compiled corpus of 50 research articles (RAs) from five top ranking journals in the field of Nanotechnology, we explored the macrostructures and rhetorical moves in RAs in Nanotechnology.ResultsIt was found that (i) scientists in Nanotechnology have a propensity to employ a merged [R&D] structure to immediately discuss and contribute new knowledge tentatively in the specific contextualised situation after research results were presented, (ii) Even though RAs in Nanotechnology largely follows IMRD structure by abiding writing conventions in the research world, disciplinary variations were found regarding the rhetorical structures, specifically, scientists in Nanotechnology tend to employ more moves and steps in establishing research niche, detailed description of research methods, suggesting future research, but less moves and steps related to promotional strategies (M3S4, M3S5, M3S6).DiscussionThe research results have significant implications for English for Academic Purposes (EAP) instructors to make informed choices by using disciplinary empirical-based decisions to guide novice writers and students at tertiary level to write RAs by following disciplinary conventions of research communities in Nanotechnology so as to avoid overgeneralization.…”
    Get full text
    Article
  9. 849
  10. 850

    Design and Research of S-Box Based on Dynamic Strategy by Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong, Zhulin An

    Published 2015-11-01
    “…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
    Get full text
    Article
  11. 851

    The presentation of the user in reports of information behaviour research by Lynne (E.F.) McKechnie, Jennifer L. Pecoskie, Christopher M. Dixon

    Published 2006-01-01
    Subjects: “…How information behaviour researchers describe research 'participants'.…”
    Get full text
    Article
  12. 852
  13. 853
  14. 854
  15. 855
  16. 856
  17. 857

    Socio-psychological research of value orientations of students by Evgeniia L. Chernyshova, Dmitry V. Ivanov, Ekaterina I. Roschupkina

    Published 2022-01-01
    “…The desire to find ways to resolve this contradiction determined the purpose of the research conducted to investigate the relationship of legal consciousness with individual psychological characteristics and value orientations of Samara students who took part in unauthorized protest actions in January 2021. …”
    Get full text
    Article
  18. 858

    Research of the Efficiency Characteristic of Hydro-mechanical CVT by Zhu Zhen, Gao Xiang, Zhu Yu, Pan Daoyuan, Han Meimei

    Published 2015-01-01
    “…A hydro-mechanical continuously variable transmission(HMCVT) with a single planetary gear is introduced,and the power transfer of the transmission is analyzed.The efficiency characteristic of transmission is researched from different angles through the definition method and the meshing power method,and the main factors which influence the efficiency of transmission are acquired,the theoretical foundation for the optimization of design scheme and increasement of the transmission efficiency is established.A test bench of hydraulic system is designed,and the main factors which influence the efficiency of hydraulic system are analyzed.A test bench of HMCVT is established,the stepless regulation speed characteristic curves and efficiency characteristic curves are acquired,and the test results are analyzed.…”
    Get full text
    Article
  19. 859
  20. 860