Suggested Topics within your search.
Suggested Topics within your search.
- Mass media 3
- Moral and ethical aspects 3
- Information technology 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Social media 2
- ART / Film & Video 1
- Camcorders 1
- Communication 1
- Economic policy 1
- Economics 1
- English language 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Industrial policy 1
- Internet marketing 1
- Mass media and technology 1
- Philosophy 1
- Production and direction 1
- Social aspects 1
- Sociology 1
- Study and teaching 1
- Technical English 1
- Technical writing 1
- Technological innovations 1
- Video recordings 1
- Video tape recorders 1
-
1761
Engineering Safety Management System Based on Robot Intelligent Monitoring
Published 2022-01-01“…At the same time, this paper detects the sample material on the detection test platform, obtains the digital pulse signal, and selects different filtering algorithms and filtering parameters. …”
Get full text
Article -
1762
Cartographie régionale de la susceptibilité aux laves torrentielles dans les Alpes du Sud
Published 2017-01-01“…The map of susceptibility to the occurrence of debris flow has been integrated into the RhyTMME project’s Web platform. This platform also offers a visualisation of the rainfall’s spatial distribution (from meteorological radar data), enabling automatic real-time detection of the triggering of debris flow at the regional scale.…”
Get full text
Article -
1763
Regional Scale Mapping of Debris-Flow Susceptibility in the Southern French Alps
Published 2017-01-01“…The map of susceptibility to the occurrence of debris flow has been integrated into the RhyTMME project’s Web platform. This platform also offers a visualisation of the rainfall’s spatial distribution (from meteorological radar data), enabling automatic real-time detection of the triggering of debris flow at the regional scale.…”
Get full text
Article -
1764
Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA
Published 2010-01-01“…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
Get full text
Article -
1765
How are brands associated by users in short videos-A study on the mechanism of user associations with brand placements in short videos based on signal theory.
Published 2025-01-01“…The emergence of short video platforms has opened new avenues and opportunities for brand marketing. …”
Get full text
Article -
1766
Ce que le livestream fait au live
Published 2022-12-01“…With livestream, whose development has accelerated sharply with the Covid19 pandemic, live music is created and broadcast online, via ad hoc technical solutions, but above all via social content sharing platforms. Put into perspective by an analysis of the practices observed during the year 2020, the positioning of the Twitch livestream platform leads to an interest in the methods of content creation, the interactions that take place around it, as well as the economic models that emerge.…”
Get full text
Article -
1767
Potential and methods of wireless communications for Internet of things based on UAV
Published 2019-03-01“…In the absence of terrestrial infrastructure for Internet of things (IoT),an effective low-cost wireless connection can be provided by an unmanned aerial vehicle (UAV) based wireless communication platform.Compared with the terrestrial IoT communication platform,the low-altitude UAV wireless communication system enjoys the advantage of rapid deployment,low cost,on-demand deployment,flexible configuration and better communication channel quality due to short-range line-of-sight links.On the other hand,several new challenges must be overcome due to the high mobility and energy consumption limitations of UAV.An overview of UAV enabled IoT wireless communication was provided,including the air-to-ground channel model,the power consumption model,as well as the applications in UAV based data dissemination/collection and relay,with particular reference to the new opportunities and solutions in these application areas.…”
Get full text
Article -
1768
Kinematic Analysis and Trajectory Planning of Redundant Mobile Manipulators
Published 2024-09-01“…The kinematic analysis was carried out by considering the manipulator and the mobile platform as an integrated system, a generalized form of the geometric Jacobi matrix and its pseudo-inverse were derived. …”
Get full text
Article -
1769
Ideas of enterprise informationization based on user experience
Published 2016-03-01“…On the purpose of solving the problems of the traditional modes,such as difficult to realize the user personalized design,tough to fuse data,and unable to respond to the user demand,some ideas of construction mode for experience informationization based on user experience were presented.Extending from the traditional enterprise informatization,the new mode based on the massive amounts of data.The new mode uses the data asset-like management for guarantee,and uses the service-oriented data processing method for support,to achieve the user experience application,which is form an end user perspective.In the end,a typical application scenario including data trading platform,data asset-like management,high-speed computing service,and public platform,was put forward.…”
Get full text
Article -
1770
Mode Analysis of Degree of Freedom of a New Bifurcation Parallel Mechanism
Published 2020-04-01“…A new bifurcated single-loop closed-chain configuration URRC is proposed.This single-loop closed-chain has two degrees of freedom modes.A bifurcated parallel mechanism is obtained by combining series branch PRRP with bifurcated single-loop closed chain to form a hybrid branch chain and connecting the moving platform and fixed platform with three parallel branches.Through the combination of different modes of single-loop closed-chain,the parallel mechanisms of 3T3R,3T,2R1TⅠ,2R1TⅡ and 1R2T with five DOF modes are obtained.The correctness of the five DOF modes of the bifurcated parallel mechanism and the rationality of driving selection are proved by screw theory analysis.…”
Get full text
Article -
1771
CSRouter:router architecture for service extensibility
Published 2012-07-01“…The development of network applications ,network end-end“channel”for data transmission impeded applications,network“platform”integrating computing and storing resource with routers is a considerable efficient means to enhance the efficiency of the network transport.System area network of routers based on high performance unified switching technology is introduced to connect forwarding elements,computing elements and storing elements.The prototype were designed and implemented based on the NetMagic platform of network innovation and the IEF switch system.The testing of packets caching proves that system area network provides high performance and high reliability network bandwidths between forwarding elements and computing elements,and the novel router architecture based on system area network could utilize additional computing and storing resources to process IP packet in depth to accelerate network applications.…”
Get full text
Article -
1772
Getting the Most out of Social Media: What Is Social Media?
Published 2015-10-01“…The series also discusses the various social media platforms and how to use social media strategically and wisely. …”
Get full text
Article -
1773
Comparative analysis of the availability of popular social networking sites
Published 2024-09-01“… In the era of growing number of Internet users and the importance of social media, ensuring the accessibility of these platforms for all audiences has become a crucial aspect of digital inclusion. …”
Get full text
Article -
1774
Optimal Allocation of Shared Manufacturing Resources Based on Bilevel Programming
Published 2021-01-01“…In the shared manufacturing environment, on the basis of in-depth analysis of the shared manufacturing process and the allocation process of manufacturing resources, a bilevel programming model for the optimal allocation of manufacturing resources considering the benefits of the shared manufacturing platform and the rights of consumers is established. …”
Get full text
Article -
1775
Design and application of wireless network optimal data sharing architecture
Published 2016-04-01“…Moreover,the sharing platform is able to support interoperability between software of computer and applications of telephone,which provides convenience for network optimization,consequently increase efficiency and quality of network optimization.…”
Get full text
Article -
1776
La création d’une nouvelle filière dans le cadre de la requalification de friches industrielles à grande échelle : les paysages productifs
Published 2022-12-01“…An industrial platform located in the south of the Lyons metropolis, La vallée chimique (Chemical Valley) is a singular landscape at the entrance to the city. …”
Get full text
Article -
1777
Openstack authentication protocol based on digital certificate
Published 2019-02-01“…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
Get full text
Article -
1778
A visual walkthrough of robotic partial mesorectal excision using the Versius surgical system
Published 2024-01-01“…Study objective: To demonstrate a step-by-step surgical technique for partial mesorectal excision using the Versius robotic platform. Design: Stepwise demonstration with narrated video footage. …”
Get full text
Article -
1779
STRUCTURE AND DISPLACEMENT ANALYSIS FOR COMPLIANT PARALLEL ROBERTS MECHANISM AND MICRO-POSITIONING STAGE
Published 2015-01-01“…The symmetrical compliant Roberts mechanism was applied on micro-motion platform,a new structure of 3- PRR micro-motion platform is proposed. …”
Get full text
Article -
1780
3D Interactions between Virtual Worlds and Real Life in an E-Learning Community
Published 2011-01-01“…In particular, the number of educational providers that see a potential for E-Learning in such new platforms increases. Unfortunately, most of the environments and processes implemented up to now do not exceed a virtual modelling of real-world scenarios. …”
Get full text
Article