Showing 42,281 - 42,300 results of 68,043 for search '"technology"', query time: 0.29s Refine Results
  1. 42281
  2. 42282

    Preparation, performances and application of carbon-ceramic brake discs by Tan Hong, Shen Fuqiang, Li Hulin

    Published 2024-12-01
    “…Made from carbon fibres and silicon carbide, these discs undergo complex manufacturing processes like carbonization and silicification, leading to excellent friction performance, wear resistance and thermal shock resilience. As manufacturing technology progresses and costs decrease, their use is expected to expand significantly. …”
    Get full text
    Article
  3. 42283
  4. 42284
  5. 42285

    6G oriented blockchain based Internet of things data sharing and storage mechanism by Yu’na JIANG, Xiaohu GE, Yang YANG, Chengxiang WANG, Jie LI

    Published 2020-10-01
    “…Considering the heterogeneity of various IoT system and the single point failure of centralized data-processing platform,a decentralized IoT data sharing and storage method based on blockchain technology was proposed.The block consensus and decentralized storage of shared data were realized through the PoS consensus mechanism.A block layered propagation mechanism between consensus node and verified node was proposed based on the Gossip protocol.The block propagation delay model and decentralization evaluation model of blockchain networks were derived.The trade-off between the block propagation delay and the decentralization degree of networks was analyzed.The simulation results demonstrate that the block propagation delay and degree of network decentralization decrease with the increase of minimal capabilities of consensus nodes.As an application example,in the trajectory data sharing scenario of confirmed patients,the data sharing smart contract is implemented and tested based on the Ethereum development platform.…”
    Get full text
    Article
  6. 42286
  7. 42287

    Container escape detection method based on heterogeneous observation chain by Yuntao ZHANG, Binxing FANG, Chunlai DU, Zhongru WANG, Zhijian CUI, Shouyou SONG

    Published 2023-01-01
    “…Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.…”
    Get full text
    Article
  8. 42288

    Recent Status on Lactate Monitoring in Sweat Using Biosensors: Can This Approach Be an Alternative to Blood Detection? by Leonardo Messina, Maria Teresa Giardi

    Published 2024-12-01
    “…From this commentary analysis, we can conclude that the correlation between lactate concentrations in sweat and blood is not yet clear, and studies are needed to clarify some key issues essential for the future application of this technology.…”
    Get full text
    Article
  9. 42289
  10. 42290
  11. 42291
  12. 42292

    Research on DV-Hop location algorithm based on range correction and improved gray wolf optimizer by Xiaoqiang ZHAO, Shuai WU, Chuanyi GAO, Ning LI, Bodong LI, Xiaoyong YANG

    Published 2021-12-01
    “…Node location is an important problem in wireless sensor network.Although the location algorithm based on distance measurement has small positioning error, it has many limitations when applied to outdoor environments.Therefore, based on the original distance vector-hop (DV-Hop) algorithm, received signal strength indication (RSSI) technology and the minimum mean square error (MMSE) criterion to modify the algorithm’s ranging process were introduced, and the improved gray wolf optimizer was used to optimize the process of determining the coordinates of unknown nodes.Simulation results show that, compared with the original DV-Hop algorithm and IPDV-Hop algorithm, the average location error rate of the IGDV-Hop algorithm under the initial parameters was reduced by 28% and 17% respectively, and the location effect was significantly improved.…”
    Get full text
    Article
  13. 42293
  14. 42294

    Preparation of High-Refractive-Index Flexible Nanoparticle Laser Engraving Materials and Micro-Nano Sculpture Art by Zhilei Guo, Liling Huang, Li Tian

    Published 2022-01-01
    “…In the field of microengraving, people usually use two-photon engraving technology, but not every particle conforms to the engraving process. …”
    Get full text
    Article
  15. 42295
  16. 42296

    OVERALL DESIGN OF WHEELED MOBILE SHIP LOADER AND SIMULATION ANALYSIS OF BOOM STRUCTURE by LIAO GuanFu, HU JiQuan

    Published 2019-01-01
    “…Finally, the boom structure was optimized by using ANSYS software and optimization design technology. Under the condition of meeting the design requirements, the economy and reliability of the boom are realized. …”
    Get full text
    Article
  17. 42297
  18. 42298
  19. 42299

    Error Analysis and Processing Experiment of End Face Tooth Surface of the Flange York of Automobile Axle by Chuang Jiang, Jianxin Su, Weiguo Wen, Zhengyang Han, Jing Deng

    Published 2020-11-01
    “…The calculation and processing technology of end face tooth surface of the flange york are researched. …”
    Get full text
    Article
  20. 42300

    Digital media representation under complex number base and its application on information hiding by Wei CHEN, Ya-nan CHEN, IUYuan L

    Published 2016-12-01
    “…With the rapid development and wide application of the digital media technology,the information security problem is becoming more and more highly attention.Because of the various kinds of medias,previous research works have focused on a specific digital media from,such as text,image,audio and video.As a fact that all the objects were expressed in digital forms under the environment of computer and network,a unified form for all kinds of digital media under the complex number base system was proposed.The algorithm of the digital media signal and the complex number intercom version were given,so the relationship among the digital media could be converted to the corresponding geometric relationship on the complex plane.In the experiments,the proposed method was applied to the application of the digital media information hiding.…”
    Get full text
    Article