Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
41821
-
41822
Study of Protein Biomarkers of Diabetes Mellitus Type 2 and Therapy with Vitamin B1
Published 2015-01-01“…In the present research work, the levels of protein biomarkers specific to diabetes mellitus type 2 in the Pakistani population using proteomic technology have been identified and characterized and effect of high dose thiamine has been seen on the levels of these marker proteins. …”
Get full text
Article -
41823
Optimistic Mix-net protocol based on bilinear pairings
Published 2013-11-01“…Integrity of messages during mix-ing is partially guaranteed by using dummy messages tracing technology resulting in a simpler construction for proofs“ ”of correctness. …”
Get full text
Article -
41824
Toward a reinterpretation of sacramental theology in the context of pandemics: The case of the Methodist Church in Zimbabwe
Published 2023-12-01“…Mainline churches that used to shun the technologisation of religion were forced to embrace technology in order to be relevant. Unfortunately, sacraments that demanded face to face administration remained a theological dilemma. …”
Get full text
Article -
41825
Robust Bayesian Regularized Estimation Based on t Regression Model
Published 2015-01-01Get full text
Article -
41826
L’humain et l’écran, à l’écran : The Cat, the Reverend and the Slave d’Alain Della Negra et Kaori Kinoshita (2010)
Published 2021-10-01“…It offers a tragicomic view of these dual beings, these distributed-selves and questions how digital technology reconfigures our modes of presence to ourselves, to others, and to the world. …”
Get full text
Article -
41827
Application of reconfigurable intelligent surface in beamforming and information modulation
Published 2021-09-01“…In modern mobile communications, the randomness, uncertainty, and uncontrollability of wireless channels are the pivotalfactors that affect the communication quality, which often leads to the deterioration of the signal quality at the receiving terminal, and thereby limiting the rate and range of information transmission.In the emerging study of 6G technology, reconfigurable intelligent surface is one of the research directions under active discussions, which is an ultra-thin artificial surface composed of sub-wavelength structures with field programmability and spatiotemporal information modulation capabilities.The reconfigurable intelligent surface can manipulate electromagnetic waves accurately and efficiently, thus providing the possibility for reshaping the wireless propagation environment.In this review, the concept of the reconfigurable intelligent surface, the beam forming method based on spatiotemporal modulation, the wireless relay and the communication system based on the reconfigurable intelligent surface were reviewed and discussed.It demonstrates the great potential of reconfigurable intelligent surface in assisting mobile communication, and provides new ideas for the development of 6G.…”
Get full text
Article -
41828
-
41829
Aspects of a novel nonlinear electrodynamics in flat spacetime and in a gravity-coupled scenario
Published 2024-12-01Get full text
Article -
41830
E-invoice authenticity verification scheme based on signature verification
Published 2019-12-01“…With the rapid development of network and information technology,paperless and electronic have become the development trend of today's economic life.As a consumption certificate,electronic invoices have become more and more demanding in e-commerce.The existing electronic invoice verification method is to inquire the invoice information in the national electronic account base according to the invoice number,invoice code,billing date,and amount,and realize the function of comparison inquiry,and can not detect the fraudulent behavior of issuing invoices by non-issuing institutions,and cannot guarantee the full legality and authenticity of electronic invoices.Aiming at the above problems,a verification scheme for electronic invoice authenticity based on signature authentication was proposed.By verifying the signature of the tax agency,the legality verification of the blank electronic invoice is verified,and the digital signature of the seller is verified to determine the authenticity of the invoiced content.Ensure that the electronic invoices passed for verification are true and reliable.…”
Get full text
Article -
41831
Late-Age Properties of Concrete with Different Binders Cured under 45°C at Early Ages
Published 2017-01-01Get full text
Article -
41832
Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud
Published 2021-06-01“…Container technology promotes the rapid development of cloud computing with its flexible and efficient features, but it also introduces security threats such as co-resident attacks, escape attacks, and common mode attacks.In response to these security threats, a dynamic heterogeneous scheduling method based on Stackelberg game in the container cloud was proposed.First, a heterogeneous mirrored resource pool is constructed to suppress the spread of attacks based on common-mode vulnerabilities on the cloud.Then, the offensive and defense interaction process is modeled as a Stackelberg game model.Finally, the offensive and defensive model is analyzed, and the system scheduling problem is modeled as a mixed integer non-linear programming problem to solve the system's optimal scheduling strategy.Experiments show that the proposed method can improve the defense effect of the cloud platform and reduce the system defense overhead.…”
Get full text
Article -
41833
Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels
Published 2022-01-01Get full text
Article -
41834
Fixed Point Theorems for Generalized Kannan-Type Mappings in a New Type of Fuzzy Metric Space
Published 2020-01-01Get full text
Article -
41835
Extension Partnerships for Innovative Programming: A Community-based Training on Artificial Intelligence for Workforce Development
Published 2024-12-01“…The training provided community members with an overview of the capabilities and advantages of GenAI and assisted them in making informed technology adoption decisions. Utah State University Extension partnered with Dixie Technical College and Zonos, a software company, to evaluate the effectiveness of the learning experience based on anticipated outcomes. …”
Get full text
Article -
41836
Automatic exchange of financial information from the perspective of tax fairness and transparency
Published 2024-11-01“…Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. AEOI reflects countries' vision for tax fairness and transparency that supports social welfare and economic stability.…”
Get full text
Article -
41837
Adaptive Barrier Control for Nonlinear Servomechanisms with Friction Compensation
Published 2018-01-01Get full text
Article -
41838
Functions of Fasciculation and Elongation Protein Zeta-1 (FEZ1) in the Brain
Published 2010-01-01Get full text
Article -
41839
-
41840
Selective Extraction of Entangled Textures via Adaptive PDE Transform
Published 2012-01-01“…Texture and feature extraction is an important research area with a wide range of applications in science and technology. Selective extraction of entangled textures is a challenging task due to spatial entanglement, orientation mixing, and high-frequency overlapping. …”
Get full text
Article