Showing 2,461 - 2,480 results of 7,349 for search '"platformer"', query time: 0.07s Refine Results
  1. 2461

    The impact of social media marketing efforts on buying intentions within the brewing sector by Lima Ana, Cruz Marco, Pacheco Jorge

    Published 2024-12-01
    “…The survey was administered to a non-probabilistic convenience sample of 202 individuals recruited primarily from social media platforms where SuperBock has an active presence. The convenience sampling method is preferred due to its ease of implementation in research design, cost effectiveness and time efficiency. …”
    Get full text
    Article
  2. 2462

    Key drivers of medical crowdfunding success: a comprehensive analysis of 84,712 projects by Siyuan Zhang, Qing Zhang, Mengning Wang, Xin Tang, Xin Lu, Wei Huang

    Published 2025-02-01
    “…Our research not only contribute to providing a valuable addition to the field of medical crowdfunding, but also provide insightful guidance and practical recommendations for crowdfunding platforms and fundraisers.…”
    Get full text
    Article
  3. 2463

    RESEARCH ON THE LIFETIME CRACK INITIATION AND RELIABILITY OF THE PRESSURE VESSEL WITH OBLIQUE NOZZLES IN GATHERING AND TRANSPORTATION by JIANG Feng, WAN YaPeng, LIANG Rui

    Published 2016-01-01
    “…The research results can provide some referential value in order to formulate and optimize maintenance strategy of the pressure vessel of gathering and transportation in the offshore oil platform.…”
    Get full text
    Article
  4. 2464

    Online Shopping Behaviour of Slovak During the COVID-19 Pandemic

    Published 2025-01-01
    “…With the ongoing pandemic reshaping societal norms, it is unsurprising that consumer behaviour patterns are undergoing a significant shift towards digital platforms to accommodate evolving needs and realities. …”
    Get full text
    Article
  5. 2465

    Distributed Storage Strategy and Visual Analysis for Economic Big Data by Xiangli Chang, Hailang Cui

    Published 2021-01-01
    “…With the increasing popularity of a large number of Internet-based services and a large number of services hosted on cloud platforms, a more powerful back-end storage system is needed to support these services. …”
    Get full text
    Article
  6. 2466

    Exploiting Sharing Join Opportunities in Big Data Multiquery Optimization with Flink by Xiao-Yan Gao, Radhya Sahal, Gui-Xiu Chen, Mohammed H. Khafagy, Fatma A. Omara

    Published 2020-01-01
    “…., in-memory Big Data platforms, Flink) are not considered. To bridge the gap of not considering the optimization of Big Data platforms, an end-to-end multiway join over Flink, which is called Join-MOTH system (J-MOTH), is proposed to exploit sharing data granularity, sharing join granularity, and sharing implicit sorts within multiple join queries. …”
    Get full text
    Article
  7. 2467

    Web-Based File Sharing System: A Case Study of Kabale University. by Akandinda, Abraham

    Published 2023
    “…Security, user - friendly and cross platform capability are the main purposes of the new Web-based File Sharing System. …”
    Get full text
    Thesis
  8. 2468
  9. 2469

    Research on consistency protection mechanism for secure states of virtual domain in cloud environment by Wei-qi DAI, De-qing ZOU, Hai JIN, Yan XIA

    Published 2016-10-01
    “…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
    Get full text
    Article
  10. 2470

    Application of invariant moment method for HAPS ISAR imaging with micro parts by Zhao-qun QI, Xiao-jun JING, Si-qing YOU, Hai-bin SUN

    Published 2013-08-01
    “…To resolve the micromotion in the HAPS(high altitude platform station) ISAR system,the invariant moment method for ISAR imaging with micro parts was proposed.Firstly,invariant moment tool was applied to classify the echoes of different sub-aperture,and then the sub-aperture echoes reducing the quality of image was separated.Finally the remaining echoes were used to do sub-aperture splicing imaging.From the simulation results,the algorithm is proved to be simple and can improve the quality of ISAR image obviously.…”
    Get full text
    Article
  11. 2471

    Research of single sign-on in grid by MENG Fan-rong1, XIE Hong-xia1, WANG Ru-chuan2, XIA Shi-xiong1

    Published 2007-01-01
    “…Grid was a kind of new-type network computing platform following World Wide Web;An infrastructure of sharing different resources including webpage in an all-round way was offered.In order to complete one task,many re-sources were often needed the participants to assort with,so single sign-on to simplify users’ operations was needed.The disadvantages of single sign-on were analyzed,and a solution based on SAML was proposed,the test and the perform-ance evaluation to it had been carried on.…”
    Get full text
    Article
  12. 2472

    Big data exchange based on information chain by Nan LIU, Jinwu WEI, Lu LIU

    Published 2016-10-01
    “…Based on the block chain technology, a new decentralized data exchange platform was designed, which would secure the legal rights of data providers and realize the goal of safe circulation between the only mutual parties of the data exchange, strengthen the regulation and monitoring of flows data.…”
    Get full text
    Article
  13. 2473

    Development of Optimization System of Two-stage Cylindrical Gear Standard Reducer by Wang Yong, Jiang Jing, Guo Gang, Pan Junyuan, Huang Taohong, Shi Wenjie

    Published 2016-01-01
    “…Based on the platform of Visual Basic 6. 0,Visual Fox Pro 6. 0 and Visual LISP,the optimal design system is developed by establishing mathematical model for optimization design of two- stage cylindrical gear standard reducer and using integer optimal method and visual combination software development technology. …”
    Get full text
    Article
  14. 2474

    Serpentine Locomotion Articulated Chain: ANA II by A. M. Cardona, J. I. Barrero, C. Otálora, C. Parra

    Published 2005-01-01
    “…This project “Serpentine locomotion articulated chain: ANA II” is a self-contained robot built to evaluate the behavior of the platform being capable of serpentine movements, in a modular chain mechanical design, based on a master/slave architecture.…”
    Get full text
    Article
  15. 2475

    Research on Telecom Data Service Open Ability Under the Environment of Big Data by Chun Liu, Haifeng Zou, Yong Xiang

    Published 2014-03-01
    “…On the basis of researching the requirements of data service ability open business under the environment of big data, the data service content was clearly introduced, the construction ideas, system architecture and open mechanism of the data service ability open platform were put forward.…”
    Get full text
    Article
  16. 2476

    Cloud computing forensic model by Yuan-zhao GAO, Xue-juan LI, Bing-long LI, Xi-xi WU

    Published 2017-09-01
    “…Aiming at the main challenges facing cloud forensics,cloud characteristics were analyzed and a cloud forensic model was proposed.In the model,the deployment of persistent forensic readiness service,multi-round identification strategy based on “iteration” and multi-level evidence location method for distributed file system,“data isolation” and “on-demand collection” strategies,and the establishment of comprehensive evidence analysis platform based on cloud resources were presented.Finally,the validity of the model was analyzed combining the forensic scene in the cloud environment.…”
    Get full text
    Article
  17. 2477

    Improvement of equivalent power consumption coding secure against power analysis attacks by WU Zhen, CHEN Yun, WANG Min, CHEN Jun

    Published 2010-01-01
    “…Equivalent power consumption coding algorithm not only could improve algorithm efficiency,but also could be against the power analysis attacks.But it had weaknesses in all-zero exponential segment because of a defect of pseudo-operation design.So a new pseudo-operation was proposed to improve the algorithm’s security.And a rapid im-plementation using Montgomery algorithm was presented too.It could accelerate the operation with no-lower safety.The research’s validity is proved in the real power testing platform.…”
    Get full text
    Article
  18. 2478

    Algorithm of NAF scalar multiplication on ECC against SPA by Min WANG, Zhen WU

    Published 2012-09-01
    “…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
    Get full text
    Article
  19. 2479

    IBEXSec:a universal security framework for industrial internet terminal access by Yuan CHEN, Tieming CHEN, Qijie SONG, Dongjie MA

    Published 2020-03-01
    “…s:With the development and application of the industrial internet platform,the security risks of massive heterogeneous terminals need to be solved urgently.Aiming at the current industrial internet terminal access and data transmission security problems,a universal terminal security service framework called IBEXSec based on the identity public key cryptographic service (IBE-XKMS) was proposed to support security functions such as secure access,authentication agents,cross-domain communications and privacy protection of heterogeneous terminal devices on the industrial internet.…”
    Get full text
    Article
  20. 2480

    Planning and construction for the NFV of core network by Lei SHEN, Lihua WU

    Published 2015-12-01
    “…In September 2015,China Mobile launched a pilot project of NFV network,and applied NFV framework for the construction of“the new call”,“the new message”platform in the converged communications project.NFV is the integration of IT and CT,and combined their characteristics during planning and construction; but due to the fact that this technology is not yet mature,there are some problems gradually exposed in the planning and construction of the current NFV network.Based on the experience of several China Mobile's NFV projects,the key problems in NFV planning and construction were discussed and summarized.…”
    Get full text
    Article