Showing 41,821 - 41,840 results of 68,043 for search '"technology"', query time: 0.24s Refine Results
  1. 41821
  2. 41822

    Study of Protein Biomarkers of Diabetes Mellitus Type 2 and Therapy with Vitamin B1 by Samreen Riaz

    Published 2015-01-01
    “…In the present research work, the levels of protein biomarkers specific to diabetes mellitus type 2 in the Pakistani population using proteomic technology have been identified and characterized and effect of high dose thiamine has been seen on the levels of these marker proteins. …”
    Get full text
    Article
  3. 41823

    Optimistic Mix-net protocol based on bilinear pairings by Long-hai LI, Shao-feng FU, Rui-dan SU

    Published 2013-11-01
    “…Integrity of messages during mix-ing is partially guaranteed by using dummy messages tracing technology resulting in a simpler construction for proofs“ ”of correctness. …”
    Get full text
    Article
  4. 41824

    Toward a reinterpretation of sacramental theology in the context of pandemics: The case of the Methodist Church in Zimbabwe by M. Mujinga

    Published 2023-12-01
    “…Mainline churches that used to shun the technologisation of religion were forced to embrace technology in order to be relevant. Unfortunately, sacraments that demanded face to face administration remained a theological dilemma. …”
    Get full text
    Article
  5. 41825
  6. 41826

    L’humain et l’écran, à l’écran : The Cat, the Reverend and the Slave d’Alain Della Negra et Kaori Kinoshita (2010) by Anaïs Guilet

    Published 2021-10-01
    “…It offers a tragicomic view of these dual beings, these distributed-selves and questions how digital technology reconfigures our modes of presence to ourselves, to others, and to the world. …”
    Get full text
    Article
  7. 41827

    Application of reconfigurable intelligent surface in beamforming and information modulation by Qiang CHENG, Junyan DAI, Junchen KE, Jingcheng LIANG, Siran WANG

    Published 2021-09-01
    “…In modern mobile communications, the randomness, uncertainty, and uncontrollability of wireless channels are the pivotalfactors that affect the communication quality, which often leads to the deterioration of the signal quality at the receiving terminal, and thereby limiting the rate and range of information transmission.In the emerging study of 6G technology, reconfigurable intelligent surface is one of the research directions under active discussions, which is an ultra-thin artificial surface composed of sub-wavelength structures with field programmability and spatiotemporal information modulation capabilities.The reconfigurable intelligent surface can manipulate electromagnetic waves accurately and efficiently, thus providing the possibility for reshaping the wireless propagation environment.In this review, the concept of the reconfigurable intelligent surface, the beam forming method based on spatiotemporal modulation, the wireless relay and the communication system based on the reconfigurable intelligent surface were reviewed and discussed.It demonstrates the great potential of reconfigurable intelligent surface in assisting mobile communication, and provides new ideas for the development of 6G.…”
    Get full text
    Article
  8. 41828
  9. 41829
  10. 41830

    E-invoice authenticity verification scheme based on signature verification by Rongna XIE, Weihua MAO, Guozhen SHI

    Published 2019-12-01
    “…With the rapid development of network and information technology,paperless and electronic have become the development trend of today's economic life.As a consumption certificate,electronic invoices have become more and more demanding in e-commerce.The existing electronic invoice verification method is to inquire the invoice information in the national electronic account base according to the invoice number,invoice code,billing date,and amount,and realize the function of comparison inquiry,and can not detect the fraudulent behavior of issuing invoices by non-issuing institutions,and cannot guarantee the full legality and authenticity of electronic invoices.Aiming at the above problems,a verification scheme for electronic invoice authenticity based on signature authentication was proposed.By verifying the signature of the tax agency,the legality verification of the blank electronic invoice is verified,and the digital signature of the seller is verified to determine the authenticity of the invoiced content.Ensure that the electronic invoices passed for verification are true and reliable.…”
    Get full text
    Article
  11. 41831
  12. 41832

    Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud by Wei ZENG, Hongchao HU, Lingshu LI, Shumin HUO

    Published 2021-06-01
    “…Container technology promotes the rapid development of cloud computing with its flexible and efficient features, but it also introduces security threats such as co-resident attacks, escape attacks, and common mode attacks.In response to these security threats, a dynamic heterogeneous scheduling method based on Stackelberg game in the container cloud was proposed.First, a heterogeneous mirrored resource pool is constructed to suppress the spread of attacks based on common-mode vulnerabilities on the cloud.Then, the offensive and defense interaction process is modeled as a Stackelberg game model.Finally, the offensive and defensive model is analyzed, and the system scheduling problem is modeled as a mixed integer non-linear programming problem to solve the system's optimal scheduling strategy.Experiments show that the proposed method can improve the defense effect of the cloud platform and reduce the system defense overhead.…”
    Get full text
    Article
  13. 41833
  14. 41834
  15. 41835

    Extension Partnerships for Innovative Programming: A Community-based Training on Artificial Intelligence for Workforce Development by Paul A. Hill, Lendel K. Narine, Jordan L. Rushton, Clint J. Reid

    Published 2024-12-01
    “…The training provided community members with an overview of the capabilities and advantages of GenAI and assisted them in making informed technology adoption decisions. Utah State University Extension partnered with Dixie Technical College and Zonos, a software company, to evaluate the effectiveness of the learning experience based on anticipated outcomes. …”
    Get full text
    Article
  16. 41836

    Automatic exchange of financial information from the perspective of tax fairness and transparency by Isnaini Isnaini, Joni Emirzon, Ridwan Ridwan

    Published 2024-11-01
    “…Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. AEOI reflects countries' vision for tax fairness and transparency that supports social welfare and economic stability.…”
    Get full text
    Article
  17. 41837
  18. 41838
  19. 41839
  20. 41840

    Selective Extraction of Entangled Textures via Adaptive PDE Transform by Yang Wang, Guo-Wei Wei, Siyang Yang

    Published 2012-01-01
    “…Texture and feature extraction is an important research area with a wide range of applications in science and technology. Selective extraction of entangled textures is a challenging task due to spatial entanglement, orientation mixing, and high-frequency overlapping. …”
    Get full text
    Article