Showing 1,461 - 1,480 results of 48,762 for search '"informant"', query time: 0.11s Refine Results
  1. 1461

    Blockchain and credibility function based chain storage method of electronic encrypted information by Ting ZHOU

    Published 2023-07-01
    Subjects: “…electronically encrypted information…”
    Get full text
    Article
  2. 1462
  3. 1463
  4. 1464

    Informal Cross-Border Traders and Food Trade during the Global Pandemic in Zimbabwe by Abel Chikanda

    Published 2025-01-01
    Subjects: “…food trade, informal economy, cross-border traders, COVID-19, digital marketing, Zimbabwe…”
    Get full text
    Article
  5. 1465
  6. 1466
  7. 1467
  8. 1468
  9. 1469
  10. 1470

    An adaptive unscented Kalman filter algorithm for electronic archives information data denoising by Ting ZHOU

    Published 2023-08-01
    “…The adaptive unscented Kalman filter noise reduction algorithm for electronic archives information data was studied to address the issue of data loss during the noise reduction process, as well as the noise covariance and initial value deviation of the data after gross errors.The architecture of electronic archives informatization consisted of the data, business, and user layers.In the data layer, the electronic archives informatization data underwent pretreatment, decision-making, monitoring, and analysis based on user data requests from the user layer.Assumptions were made on the electronic archives informatization data using the Laida criterion to determine the standard deviation probability and establish intervals.Gross errors were eliminated and the noise covariance of the data after gross error removal was estimated using the Sage-Husa filter.This helped to suppress the deviation of the initial value and preserve the original data as much as possible.The traceless Kalman algorithm was utilized to estimate the unknown noise characteristics of electronic archives informatization data in real-time, enabling the noise reduction of electronic archives informatization data.The virtual induction service connected the data, users, and business layer, facilitating the presentation of the required electronic archives information to users in the business layer.Experimental results demonstrate that the algorithm effectively removes various noises from electronic archives information data while retaining the valid data.…”
    Get full text
    Article
  11. 1471
  12. 1472
  13. 1473
  14. 1474
  15. 1475

    Cognitive, linguistic, and methodological considerations in teaching professional vocabulary to information technology (IT) students. by V. Borshchovetska, T. Harbuza, A. Durdas, V. Semidotska

    Published 2024-05-01
    “…A mixed-methods approach was taken for the research: a review of modern approaches to teaching professional vocabulary to IT students; assessment of the effectiveness of the various approaches; use of questionnaires to obtain information from students; and observation of teaching and the learning process by the authors. …”
    Get full text
    Article
  16. 1476
  17. 1477

    Mindfulness Intervention for Health Information Avoidance in Older Adults: Mixed Methods Study by Chenyu Gu, Liquan Qian, Xiaojie Zhuo

    Published 2025-01-01
    “…The complexity of online health information often leads to psychological challenges, such as cyberchondria, exacerbating health information avoidance behaviors. …”
    Get full text
    Article
  18. 1478
  19. 1479

    CAPITAL STRUCTURE AND FINANCIAL PERFORMANCE OF LISTED INFORMATION AND COMMUNICATIONS TECHNOLOGY FIRMS IN NIGERIA by Nasiru Adamu Kanoma, Nurudeen Usman Miko, Augustine Ayuba, Idris Mohammed, Idris Mohammed, Mark G Tagwai

    Published 2024-09-01
    “… This study seeks to examine the effect of capital structure on financial performance of the listed information and communications technology firms in Nigeria. …”
    Get full text
    Article
  20. 1480

    Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA by WU Zhen, CHEN Yun, CHEN Jun, WANG Min

    Published 2010-01-01
    “…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
    Get full text
    Article