Showing 41,961 - 41,980 results of 68,043 for search '"technology"', query time: 0.23s Refine Results
  1. 41961
  2. 41962
  3. 41963
  4. 41964

    Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN by Guanlin Chen, Zebing Wang, Yong Zhang

    Published 2013-11-01
    “…As the important means of network security, intrusion detection and prevention technology have seen some preliminary applications in the traditional wired network environment. …”
    Get full text
    Article
  5. 41965
  6. 41966

    Intelligent correlation method of typical business data in power communication operation management by Guilong WU, Zhimin YANG, Yu HUANG

    Published 2021-02-01
    “…In the process of power communication operation management, various independent business data, such as trouble tickets, duty logs, maintenance tickets, and inspection records, are generated and stored.These business data provide important support for the operation management of the power communication network.At present, the statistical process of most business data is relatively independent, and there is less manual correlation in the later stage.Two typical business data of duty log and trouble ticket in power communication operation management were selected, text mining technology was used to build a machine learning model combining unsupervised recall and supervised classification, and the intelligent association method between duty log and trouble ticket was proposed.Besides, the relevant historical business data in the electric power communication operation management system was used to do the experimental verification of the intelligent association method.The results show that it can achieve positive effect.…”
    Get full text
    Article
  7. 41967
  8. 41968
  9. 41969
  10. 41970

    A Study on the Working Performance of Dimming Methods for Single- and Multichip Power LEDs by İsmail Kıyak

    Published 2012-01-01
    “…Power LEDs have increasingly been used for general lighting via multichip module technology. The output of power LEDs should be controlled to obtain life and illuminance values in catalog. …”
    Get full text
    Article
  11. 41971
  12. 41972

    Distributed storage causal consistency model with trusted constraint by Junfeng TIAN, Juntao ZHANG, Yanbiao WANG

    Published 2021-06-01
    “…At present, there are few mature solutions to consider security risks in the research field of distributed storage causal consistency.On the basis of hybrid logic clock and HashGraph, combined with trusted cloud alliance technology in trusted cloud platform, a distributed storage causal consistency model (CCT model) with trust constraints was proposed.The CCT model designed identity authentication and consistent data trust verification mechanism on the client side and the server side respectively, and imposed security constraints on the process of data synchronization between data replicas in the cloud storage cluster.Through the simulation experiment, CCT model can identify and verify the identity signature forgery, illegal third party and other security risks in the client and server, and provide the trusted constraint for the system on the premise of causing small performance cost.…”
    Get full text
    Article
  13. 41973
  14. 41974
  15. 41975
  16. 41976

    Simulation Study of the Grinding Machining Deformation of Large Gear Ring by Liu Linhui, Yang Long, Zhang Jian, Chen Xiao, An Wendi

    Published 2018-01-01
    “…Large gear ring forming grinding is the key technology to ensure the quality of ring gear processing. …”
    Get full text
    Article
  17. 41977
  18. 41978

    The Israeli–Palestinian Separation Wall and the Assemblage Theory: The Case of the Weekly Rosary at the Icon of Our Lady of the Wall by Elisa Farinacci

    Published 2017-06-01
    “…Although the Wall has been widely described as a technology of occupation on one side and as a device to ensure security on the other, through Latour’s concept of assemblages I unearth its agency in developing a Christian shrine. …”
    Get full text
    Article
  19. 41979
  20. 41980

    A Truthful Bilateral Multiunit Auction for Heterogeneous Cognitive Radio Networks by Jinzhao Su, Jianfei Wang, Wei Wu

    Published 2011-10-01
    “…Dynamic spectrum access technology has attracted much attention for its capability of improving spectrum efficiency. …”
    Get full text
    Article