Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
861
-
862
Research on packet scheduling in input-queued switches
Published 2005-01-01“…The packet scheduling in electronic-optical switches was also discussed. Finally the future research work and directions were explored from the view of switch architecture and scheduling algorithm, respectively.…”
Get full text
Article -
863
Friendship Creates Intercontinental Cooperation in Aerosol Research
Published 2023-01-01“…Aerosol and Air Quality Research…”
Get full text
Article -
864
Research on security defense of mobile edge computing
Published 2021-02-01“…Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.…”
Get full text
Article -
865
Review of Research on Upper Limb Assisted Exoskeletons
Published 2023-03-01“…The existing problems in the current research are summarized and the future development trend of upper limb assisted exoskeletons is prospected.…”
Get full text
Article -
866
Research of embedding algorithm for wireless network virtualization
Published 2017-01-01Get full text
Article -
867
Research on safety methods of airborne embedded software
Published 2015-11-01“…By analyzed the process of development and running of airborne software with the standards of airworthiness and information security,the factors and threats related with airborne software safety were presented,and the security protected mechanisms based on embedded TMP and MILS software architecture were provided,which all support the research on safety of embedded software on aircrafts.…”
Get full text
Article -
868
Revealing the Benefits of Checklists for Preparing Projects and Research
Published 2019-02-01Get full text
Article -
869
Getting Engaged: “Public” Engagement Practices for Researchers
Published 2017-05-01“…AEC610/WC272: Getting Engaged: “Public,” Stakeholder, and Community Engagement Practices for Researchers (ufl.edu) …”
Get full text
Article -
870
-
871
Review and prospect on the research of dynamic spectrum sharing
Published 2016-02-01Get full text
Article -
872
Analytic transparency is key for reproducibility of agricultural research
Published 2023-03-01Subjects: Get full text
Article -
873
Research on models of network security evaluation and analysis
Published 2018-04-01“…Network security assessment helps to grasp the current and future risks of the network information system clearly,and gives corresponding security suggestions and countermeasures.Model of network security assessment and analysis is an important research direction and content,for which there is no review to give a comprehensive summary or analysis.A review of common network security evaluation and analysis model was given.The model that focus on attack was introduced,such as the attack tree,attack graph and kill chain,then the model that focus on network defense or offensive and defensive interaction was explained,such as attack surface,cyber epidemic model,Petri nets and automation machine,giving introduction to the basic concept,application field,modeling analysis process,advantages and disadvantages of the models.Then,typical examples were given to illustrate the application of the models in network defense technology evaluation and analysis.…”
Get full text
Article -
874
Research on full-field optical coherence tomography
Published 2017-12-01“…Full-field optical coherence tomography(FFOCT)was used for imaging the interior part of an object.Firstly,the mathematical modeling and performance analysis of the FFOCT system mounted was provided.Secondly,images of several different human tissues were obtained by FFOCT system,including esophagus,uterus,etc.The images of different depths of the same tissue were shown and compared.It was the first time in China that FFOCT was used for generating depth images on human esophagus and uterus;high-resolution images had been obtained for different depths without cutting the tissue sample,in which intercellular substance and myofibril structure could be clearly identified.As the in-depth structure could be imaged without the process needed for frozen and paraffin sectioning methods,the technology could been highly valuable for early cancer diagnosis and pathological analysis in tumor research.…”
Get full text
Article -
875
Financial development, research in finance, and economic growth
Published 2025-12-01Subjects: Get full text
Article -
876
The narrative inquiry, an Emerging Theme in Qualitative Research
Published 2020-12-01Get full text
Article -
877
Research on neuromorphic vision sensor and its applications
Published 2019-12-01“…Neuromorphic vision sensor is a biologically inspired artificial neural system that mimics algorithmic behavior of biological vision systems,which has numerous advantages over standard vision sensors,such as high temporal resolution,low latency,low power,high dynamic range,etc.At first,a brief introduction to neuromorphic engineering,neuromorphic chips,and vision sensors was given.Then the main computing methods for neuromorphic vision were reviewed,including probability and statistics,spiking neural network and deep neural network.Finally,several kinds of applications based on neuromorphic vision sensors were given,such as simultaneous localization and mapping (SLAM),image reconstruction (IR),etc.A review of hardware,computing methods and applications for neuromorphic vision sensors was given,which provided a comprehensive reference for researchers.…”
Get full text
Article -
878
Research progress on location privacy-preserving techniques
Published 2016-12-01“…While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. …”
Get full text
Article -
879
-
880
Questions of Research of Digitalization in Various Fields of Activity
Published 2024-09-01“…Based on the analysis of scientific literature, those accents (availability of digital technologies, impact on managerial and institutional spheres, sectoral and territorial features, applied significance) on which researchers focus their attention, are identified. The directions are systematized depending on the digitalization of individual objects, including the necessary elements of digitalization.…”
Get full text
Article