Showing 41,801 - 41,820 results of 68,043 for search '"technology"', query time: 0.24s Refine Results
  1. 41801
  2. 41802
  3. 41803
  4. 41804

    Assessing quality of life in German, French, Italian and Polish smart cities: Identifying the need for further development by Brian F. G. FABRÈGUE, Andrea BOGONI

    Published 2024-01-01
    “… The concept of smart cities has gained significant attention in recent years, as urban areas worldwide seek to leverage technology and innovation to enhance their residents' quality of life. …”
    Get full text
    Article
  5. 41805
  6. 41806
  7. 41807
  8. 41808

    Current status and prospects of minimally invasive hepatobiliary surgery by Jie Li, Ping Chen

    Published 2024-01-01
    “…In the future, the continuous integration of artificial intelligence, robotic technology, virtual reality and augmented reality technologies, and remote technologies with medicine will further promote the development of minimally invasive surgery. …”
    Get full text
    Article
  9. 41809

    Assembly and disassembly – The module as a compositional element for a ‘new’ sustainability – The Spanish case by Claudia Pirina, Giovanni Comi, Anna Frangipane

    Published 2023-12-01
    “…These works are offered as emblematic, in a logic of interaction and ‘synthesis’ between technology and design in relation to the contemporary global challenges of sustainability and energy transition. …”
    Get full text
    Article
  10. 41810
  11. 41811
  12. 41812

    Wide-Band High-Gain DGS Antenna System for Indoor Robot Positioning by Lu Bai, Chenglie Du

    Published 2019-01-01
    “…Based on multisource wireless signal fusion technology, the autonomous positioning systems of robots have been widely employed. …”
    Get full text
    Article
  13. 41813

    Research of the Flexible Modeling and Its Application of Mechanical Drive System by Qiu Haifei

    Published 2016-01-01
    “…In view of the error influence of rigid structure,the flexible modeling technology is applied to drive system design of reducer. …”
    Get full text
    Article
  14. 41814
  15. 41815
  16. 41816

    Method of diversity software protection based on fusion compilation by Xiaobing XIONG, Hui SHU, Fei KANG

    Published 2020-12-01
    “…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
    Get full text
    Article
  17. 41817

    EXPERIMENT AND SIMULATION ON MECHANICAL PROPERTIES OF OSTEOPOROTIC MOUSE BONE (MT) by ZHAO Qing, YIN ZiYang, ZHOU Wen, REN GuanLin, KUANG ChunMei, HU Cong, ZHOU ChangJiang

    Published 2023-01-01
    “…The three-dimensional digital model of mouse tibia was obtained by reconstruction technology, and trabecular bone shape and density were analyzed. …”
    Get full text
    Article
  18. 41818
  19. 41819

    Internet cross-domain end-to-end quality monitoring and trouble location scheme by Yongming YAN, Bing CHEN, Wenjie XU

    Published 2018-08-01
    “…With the rapid development of internet,the internet content providers needmuch better quality of internet.They usually need to deploy their applications in the internet data centers all oveRthe country due to their business requirements.Users usually cross domain to access in their data centers.So internet content providers have high level of requirements for cross-domain internet quality.It is very important for internet service providers to establish amonitoring system which couldmonitor end-to-end cross-domain internet quality and locate the troubles of network out of autonomous systems rapidly.The commonly used networkmonitoring technology and the hash algorithm in equal-costmultipath routing were analyzed.A solution of using Hash algorithm to realize full traversal of network paths andmonitor end-to-end cross-domain internet quality,was presented.Some suggestions were also given foRtrouble location scheme.…”
    Get full text
    Article
  20. 41820