Suggested Topics within your search.
Suggested Topics within your search.
- Mass media 3
- Moral and ethical aspects 3
- Information technology 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Social media 2
- ART / Film & Video 1
- Camcorders 1
- Communication 1
- Economic policy 1
- Economics 1
- English language 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Industrial policy 1
- Internet marketing 1
- Mass media and technology 1
- Philosophy 1
- Production and direction 1
- Social aspects 1
- Sociology 1
- Study and teaching 1
- Technical English 1
- Technical writing 1
- Technological innovations 1
- Video recordings 1
- Video tape recorders 1
-
2461
The impact of social media marketing efforts on buying intentions within the brewing sector
Published 2024-12-01“…The survey was administered to a non-probabilistic convenience sample of 202 individuals recruited primarily from social media platforms where SuperBock has an active presence. The convenience sampling method is preferred due to its ease of implementation in research design, cost effectiveness and time efficiency. …”
Get full text
Article -
2462
Key drivers of medical crowdfunding success: a comprehensive analysis of 84,712 projects
Published 2025-02-01“…Our research not only contribute to providing a valuable addition to the field of medical crowdfunding, but also provide insightful guidance and practical recommendations for crowdfunding platforms and fundraisers.…”
Get full text
Article -
2463
RESEARCH ON THE LIFETIME CRACK INITIATION AND RELIABILITY OF THE PRESSURE VESSEL WITH OBLIQUE NOZZLES IN GATHERING AND TRANSPORTATION
Published 2016-01-01“…The research results can provide some referential value in order to formulate and optimize maintenance strategy of the pressure vessel of gathering and transportation in the offshore oil platform.…”
Get full text
Article -
2464
Online Shopping Behaviour of Slovak During the COVID-19 Pandemic
Published 2025-01-01“…With the ongoing pandemic reshaping societal norms, it is unsurprising that consumer behaviour patterns are undergoing a significant shift towards digital platforms to accommodate evolving needs and realities. …”
Get full text
Article -
2465
Distributed Storage Strategy and Visual Analysis for Economic Big Data
Published 2021-01-01“…With the increasing popularity of a large number of Internet-based services and a large number of services hosted on cloud platforms, a more powerful back-end storage system is needed to support these services. …”
Get full text
Article -
2466
Exploiting Sharing Join Opportunities in Big Data Multiquery Optimization with Flink
Published 2020-01-01“…., in-memory Big Data platforms, Flink) are not considered. To bridge the gap of not considering the optimization of Big Data platforms, an end-to-end multiway join over Flink, which is called Join-MOTH system (J-MOTH), is proposed to exploit sharing data granularity, sharing join granularity, and sharing implicit sorts within multiple join queries. …”
Get full text
Article -
2467
Web-Based File Sharing System: A Case Study of Kabale University.
Published 2023“…Security, user - friendly and cross platform capability are the main purposes of the new Web-based File Sharing System. …”
Get full text
Thesis -
2468
START—the Swiss tele-assisted rehabilitation and training program to support transition from inpatient to outpatient care in the subacute phase after a stroke: feasibility, safety...
Published 2025-01-01“…Telerehabilitation, delivered via digital platforms, represents a promising approach for intensive continuation of stroke rehabilitation after discharge. …”
Get full text
Article -
2469
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01“…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
Get full text
Article -
2470
Application of invariant moment method for HAPS ISAR imaging with micro parts
Published 2013-08-01“…To resolve the micromotion in the HAPS(high altitude platform station) ISAR system,the invariant moment method for ISAR imaging with micro parts was proposed.Firstly,invariant moment tool was applied to classify the echoes of different sub-aperture,and then the sub-aperture echoes reducing the quality of image was separated.Finally the remaining echoes were used to do sub-aperture splicing imaging.From the simulation results,the algorithm is proved to be simple and can improve the quality of ISAR image obviously.…”
Get full text
Article -
2471
Research of single sign-on in grid
Published 2007-01-01“…Grid was a kind of new-type network computing platform following World Wide Web;An infrastructure of sharing different resources including webpage in an all-round way was offered.In order to complete one task,many re-sources were often needed the participants to assort with,so single sign-on to simplify users’ operations was needed.The disadvantages of single sign-on were analyzed,and a solution based on SAML was proposed,the test and the perform-ance evaluation to it had been carried on.…”
Get full text
Article -
2472
Big data exchange based on information chain
Published 2016-10-01“…Based on the block chain technology, a new decentralized data exchange platform was designed, which would secure the legal rights of data providers and realize the goal of safe circulation between the only mutual parties of the data exchange, strengthen the regulation and monitoring of flows data.…”
Get full text
Article -
2473
Development of Optimization System of Two-stage Cylindrical Gear Standard Reducer
Published 2016-01-01“…Based on the platform of Visual Basic 6. 0,Visual Fox Pro 6. 0 and Visual LISP,the optimal design system is developed by establishing mathematical model for optimization design of two- stage cylindrical gear standard reducer and using integer optimal method and visual combination software development technology. …”
Get full text
Article -
2474
Serpentine Locomotion Articulated Chain: ANA II
Published 2005-01-01“…This project “Serpentine locomotion articulated chain: ANA II” is a self-contained robot built to evaluate the behavior of the platform being capable of serpentine movements, in a modular chain mechanical design, based on a master/slave architecture.…”
Get full text
Article -
2475
Research on Telecom Data Service Open Ability Under the Environment of Big Data
Published 2014-03-01“…On the basis of researching the requirements of data service ability open business under the environment of big data, the data service content was clearly introduced, the construction ideas, system architecture and open mechanism of the data service ability open platform were put forward.…”
Get full text
Article -
2476
Cloud computing forensic model
Published 2017-09-01“…Aiming at the main challenges facing cloud forensics,cloud characteristics were analyzed and a cloud forensic model was proposed.In the model,the deployment of persistent forensic readiness service,multi-round identification strategy based on “iteration” and multi-level evidence location method for distributed file system,“data isolation” and “on-demand collection” strategies,and the establishment of comprehensive evidence analysis platform based on cloud resources were presented.Finally,the validity of the model was analyzed combining the forensic scene in the cloud environment.…”
Get full text
Article -
2477
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01“…Equivalent power consumption coding algorithm not only could improve algorithm efficiency,but also could be against the power analysis attacks.But it had weaknesses in all-zero exponential segment because of a defect of pseudo-operation design.So a new pseudo-operation was proposed to improve the algorithm’s security.And a rapid im-plementation using Montgomery algorithm was presented too.It could accelerate the operation with no-lower safety.The research’s validity is proved in the real power testing platform.…”
Get full text
Article -
2478
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01“…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
Get full text
Article -
2479
IBEXSec:a universal security framework for industrial internet terminal access
Published 2020-03-01“…s:With the development and application of the industrial internet platform,the security risks of massive heterogeneous terminals need to be solved urgently.Aiming at the current industrial internet terminal access and data transmission security problems,a universal terminal security service framework called IBEXSec based on the identity public key cryptographic service (IBE-XKMS) was proposed to support security functions such as secure access,authentication agents,cross-domain communications and privacy protection of heterogeneous terminal devices on the industrial internet.…”
Get full text
Article -
2480
Planning and construction for the NFV of core network
Published 2015-12-01“…In September 2015,China Mobile launched a pilot project of NFV network,and applied NFV framework for the construction of“the new call”,“the new message”platform in the converged communications project.NFV is the integration of IT and CT,and combined their characteristics during planning and construction; but due to the fact that this technology is not yet mature,there are some problems gradually exposed in the planning and construction of the current NFV network.Based on the experience of several China Mobile's NFV projects,the key problems in NFV planning and construction were discussed and summarized.…”
Get full text
Article