Showing 42,021 - 42,040 results of 68,043 for search '"technology"', query time: 0.20s Refine Results
  1. 42021

    استخدام تقنیة الأنفوجرافیک فى تدریس وحدة بمقرر البرمجیات بقسم المکتبات جامعة المنیا : دراسة تجریبیة... by د.یارة ماهر قناوى Maher Qenawy

    Published 2019-07-01
    “…The Research Deals with the Definition and the Possibility of Infographic'sRecruitment in the Teaching Module in Software Course to Students Departmentof Libraries, Where it has an Important and Effective Role in the Transmission ofInformation , Data , and knowledge clearly and attract attention , and this is donethrough the representation of data and information visually .the study aimed to measuring the effectiveness of the use of InfographicTechnology in Teaching Module in the Software Course to Fourth Year Studentsof the Department of Libraries , The study was based on the ExperimentalMethod and the Design of Tribal and Remote Measurement of Two Groups ,One Teaching in the Traditional Way and The Other Teaching the Infographic .The study Reached Several Results the Most Important there are noStatistically Significant Differences between the Average Degree of Tribal andRemote Application in the Research Sample on their variable of the SoftwareCourse.…”
    Get full text
    Article
  2. 42022
  3. 42023

    Novel opportunistic cooperative multicast scheme for NOMA by Yin LU, Jirong CHEN, Haowei BIAN, Hongbo ZHU

    Published 2020-11-01
    “…The cognitive radio technology was applied to non-orthogonal multiple access (NOMA) cooperative multicast system,the feasibility of using users as relays was studied,and a two-level cooperative transmission scheme with parameterized multicast candidate sets was proposed.Specifically,the scheme first selected the candidate set according to the cardinality q,and then selected the best forwarding node based on the channel gain between the primary users and the candidate secondary users.Simulation results show that,through the reasonable selection of the cardinality q,the proposed scheme can greatly reduce the diversity gain of the secondary users while simultaneously increasing the diversity gain of the primary users.In NOMA cooperative multicast scenario composed of N multicast users,the proposed scheme can increase the diversity gain of the primary users from 2 to min(N-q+2,q+1) to meet their reliability requirements.…”
    Get full text
    Article
  4. 42024

    Dynamic defense decision method for network real-time confrontation by Qiang LENG, Yingjie YANG, Dexian CHANG, Ruixuan PAN, Ying CAI, Hao HU

    Published 2019-12-01
    “…How to implement defense decision based on network external threat is the core problem of building network information defense system.Especially for the dynamic threat brought by real-time attack,scientific and effective defense decision is the key to construct network dynamic emergency defense system.Aiming at the problem of dynamic defense decision-making,firstly a network survivability game model based on attribute attack graph theory is designed.The attack and defense matrix is used to represent the attack and defense strategy and path,and the attack and defense strength and network survivability quantification method are given.Secondly,the single step and the multi-step attack and defense strategy payoff calculation method is proposed,and the defense decision is based on the attack and defensive strategy payoff.Finally,the effectiveness of the defense decision technology is verified through experiments.…”
    Get full text
    Article
  5. 42025

    Dynamic Effects of Embedded Macro-Fiber Composite Actuators on Ultra-Light Flexible Structures of Repeated Pattern- a Homogenization Approach by A. Salehian, T.M. Seigler

    Published 2012-01-01
    “…Motivated by deployable satellite technology, this article presents a homogenization model of an inflatable, rigidized lattice structure with distributed macro-fiber composite (MFC) actuation. …”
    Get full text
    Article
  6. 42026

    Transforming Backward by Grant Leyton Simpson, Dot Porter

    Published 2012-02-01
    “…With either method we implicitly recognize that TEI, even coupled with CSS, is not designed as a presentation technology. Many born-digital documents, however, are encoded in formats that are, such as HTML. …”
    Get full text
    Article
  7. 42027

    A Lightweight Design Method for Aviation Gear Web based on OptiStruct-Abaqus by Yandong Wang, Siyu Chen, Jinyuan Tang

    Published 2019-07-01
    “…The flow chart and key technology of lightweight design of the web structure are given. …”
    Get full text
    Article
  8. 42028
  9. 42029
  10. 42030

    DYNAMIC SIMULATION AND EXPERIMENTAL STUDY ON RIGID-FLEXIBLE COUPLING OF SHEARER by ZHANG DongSheng, LI Yan, SONG QiuShuang

    Published 2019-01-01
    “…In order to solve the problem of large deformation of the rocker arm, the virtual prototyping technology is used to soften the front and rear rocker arm, and the dynamic and mechanical model of the shearer is established. …”
    Get full text
    Article
  11. 42031
  12. 42032
  13. 42033
  14. 42034

    ANTHROPOGENIC POLLUTION OF SOIL WITH COPPER AND THE PHYTOREMEDIATION POTENTIAL OF DIFFERENT AGRICULTURAL CROPS by S. G. Veliksar, S. S. Lisnik, D. N. Bratco, S. I. Toma

    Published 2018-06-01
    “…Using the Cu-accumulating plants - alfalfa, clover, rape, and calendula - is one of the most promising elements of the technology of Cu phytoextraction from the soil. Two soybean varieties more tolerant to copper excess in the environment have been identified - ‘Dorintsa’ and ‘Horbovyanka’. …”
    Get full text
    Article
  15. 42035

    Paging and Location Management in IEEE 802.16j Multihop Relay Network by Kuan-Po Lin, Hung-Yu Wei

    Published 2010-01-01
    “…IEEE 802.16j is an emerging wireless broadband networking standard that integrates infrastructure base stations with multihop relay technology. Based on the idle mode operation in IEEE 802.16j, we propose a novel location management and paging scheme. …”
    Get full text
    Article
  16. 42036

    Android application privacy protection mechanism based on virtual machine bytecode injection by Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU

    Published 2021-06-01
    “…To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was generated according to the user’s security requirement and usage scenario, and injected into the coding unit of Android application that involves dangerous permission request and sensitive data access, to realize dynamic application behavior control.Tests on applications crawled from four mainstream domestic App stores show that the method can effectively intercept sensitive API calls and dangerous permission requests of legitimate App programs and implement control according to pre-specified security policies.Also, after injecting virtual machine bytecode, most of the App program operation is not affected by the injected code, and the robustness is guaranteed.The proposed method has a good universality.…”
    Get full text
    Article
  17. 42037
  18. 42038
  19. 42039
  20. 42040