Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
41961
-
41962
Application of Fuzzy Immune Algorithm and Soft Computing in the Design of 2-DOF PID Controller
Published 2022-01-01Get full text
Article -
41963
-
41964
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
Published 2013-11-01“…As the important means of network security, intrusion detection and prevention technology have seen some preliminary applications in the traditional wired network environment. …”
Get full text
Article -
41965
Three new Carex nothospecies (Cyperaceae) discovered in the Czech Republic
Published 2024-05-01Get full text
Article -
41966
Intelligent correlation method of typical business data in power communication operation management
Published 2021-02-01“…In the process of power communication operation management, various independent business data, such as trouble tickets, duty logs, maintenance tickets, and inspection records, are generated and stored.These business data provide important support for the operation management of the power communication network.At present, the statistical process of most business data is relatively independent, and there is less manual correlation in the later stage.Two typical business data of duty log and trouble ticket in power communication operation management were selected, text mining technology was used to build a machine learning model combining unsupervised recall and supervised classification, and the intelligent association method between duty log and trouble ticket was proposed.Besides, the relevant historical business data in the electric power communication operation management system was used to do the experimental verification of the intelligent association method.The results show that it can achieve positive effect.…”
Get full text
Article -
41967
Voltage Controlled Intertwined Spiral Arrays for Reconfigurable Metasurfaces
Published 2014-01-01Get full text
Article -
41968
-
41969
Regularities of the theory of quasi-geodesic mappings of special parabolic spaces
Published 2024-12-01Get full text
Article -
41970
A Study on the Working Performance of Dimming Methods for Single- and Multichip Power LEDs
Published 2012-01-01“…Power LEDs have increasingly been used for general lighting via multichip module technology. The output of power LEDs should be controlled to obtain life and illuminance values in catalog. …”
Get full text
Article -
41971
Reachable Set Estimation of Discrete Singular Systems with Time-Varying Delays and Bounded Peak Inputs
Published 2024-12-01Get full text
Article -
41972
Distributed storage causal consistency model with trusted constraint
Published 2021-06-01“…At present, there are few mature solutions to consider security risks in the research field of distributed storage causal consistency.On the basis of hybrid logic clock and HashGraph, combined with trusted cloud alliance technology in trusted cloud platform, a distributed storage causal consistency model (CCT model) with trust constraints was proposed.The CCT model designed identity authentication and consistent data trust verification mechanism on the client side and the server side respectively, and imposed security constraints on the process of data synchronization between data replicas in the cloud storage cluster.Through the simulation experiment, CCT model can identify and verify the identity signature forgery, illegal third party and other security risks in the client and server, and provide the trusted constraint for the system on the premise of causing small performance cost.…”
Get full text
Article -
41973
Recurrence Relations and Hilbert Series of the Monoid Associated with Star Topology
Published 2020-01-01Get full text
Article -
41974
Co-Creating Knowledge Online: Approaches for Community Artists
Published 2013-12-01Get full text
Article -
41975
A New Memristor-Based 5D Chaotic System and Circuit Implementation
Published 2018-01-01Get full text
Article -
41976
Simulation Study of the Grinding Machining Deformation of Large Gear Ring
Published 2018-01-01“…Large gear ring forming grinding is the key technology to ensure the quality of ring gear processing. …”
Get full text
Article -
41977
Common Fixed Point Theorems in Modified Intuitionistic Fuzzy Metric Spaces
Published 2013-01-01Get full text
Article -
41978
The Israeli–Palestinian Separation Wall and the Assemblage Theory: The Case of the Weekly Rosary at the Icon of Our Lady of the Wall
Published 2017-06-01“…Although the Wall has been widely described as a technology of occupation on one side and as a device to ensure security on the other, through Latour’s concept of assemblages I unearth its agency in developing a Christian shrine. …”
Get full text
Article -
41979
-
41980
A Truthful Bilateral Multiunit Auction for Heterogeneous Cognitive Radio Networks
Published 2011-10-01“…Dynamic spectrum access technology has attracted much attention for its capability of improving spectrum efficiency. …”
Get full text
Article