Showing 42,341 - 42,360 results of 68,043 for search '"technology"', query time: 0.25s Refine Results
  1. 42341
  2. 42342

    Faster-than-Nyquist signaling: value and challenges of 6G-oriented applications by Xin SU, Sen WANG, Hongwen YANG, Jing JIN, Qixing WANG

    Published 2021-09-01
    “…The faster-than-Nyquist (FTN) signaling technology overlaps multiple streams of data within a symbol period by compressing the transmit symbol time/frequency-domain interval, thus breaking the orthogonality of the Nyquist pulse waveform and achieving the purpose of transmitting more data in a limited bandwidth.A relatively comprehensive explanation of the technical principles of FTN was elaborated, its development status was sorted out, and the related key questions——the relationship between FTN capacity and Shannon capacity, and the intrinsic connection of related technologies were answered.Finally, The possibility of FTN application in 6G was discussed, and its value and challenges in 6G were presented.That is, FTN is a highly spectrally efficient transmission scheme that approximates Shannon's capacity, but excessive receiver complexity may be a key impediment to its use in 6G applications.…”
    Get full text
    Article
  3. 42343

    Analysis of software defined security model and architecture by Chunmei GUO, Jun MA, Hao GUO, Xueyao BI, Ruhui ZHANG, Shaomin ZHU, Congyi YANG

    Published 2017-06-01
    “…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
    Get full text
    Article
  4. 42344

    25 Gbit/s transmission performance using duo-binary detection with 10 Gbit/s-PON receiver by Yongjia YIN, Yong GUO, Zhuang MA

    Published 2018-02-01
    “…IEEE has formed the 100 Gbit/s-EPON Task Force to develop next 100 Gbit/s-PON standards,and the duo-binary(DB) detection is one of the baseband technology options.25 Gbit/s DB detection transmission performance with 10 Gbit/s-PON receiver was been experimentally demonstrated.Because the bandwidth of 10 Gbit/s- PON receiver is obviously limited,the 25 Gbit/s DB output signal from 10 Gbit/s-PON receiver will be affected by the inter-symbol interference(ISI).The experiment results show that the system receiving sensitivity based on direct decision method is only -22 dBm.However,the system receiving sensitivity can be up to -24.5 dBm by using the most simplified maximum likelihood sequence estimation(MLSE) soft decision method.…”
    Get full text
    Article
  5. 42345

    EDUCATION: REAL AND DUE ОБРАЗОВАНИЕ: СУЩЕЕ И ДОЛЖНОЕ ОСВІТА: СУЩЕ ТА НАЛЕЖНЕ by V. V. Khmel

    Published 2012-12-01
    “…The current context of information society is characterized by the growing role and importance of educational technology. To the fore the question of what should be a process of education
 in the postmodern situation and on the basis of the Bologna concept. …”
    Get full text
    Article
  6. 42346

    Multinational Corporations and the Socio-Economic Unrest in the Niger-Delta Region of Nigeria by Adekunle Alaye

    Published 2023-06-01
    “…In the oil sector for example, which of course is the economic mainstay in Nigeria, these corporations perpetrate heinous activities such as pollution of the environment, inadequate technology transfer, violation of human rights, blunt refusal to discharge their social responsibilities, gas flaring which destroys wildlife, seafood’s and farmland especially in the Niger-Delta region without adequate compensation. …”
    Get full text
    Article
  7. 42347
  8. 42348

    Research on Prediction Model of Earth-rockfill Dam Deformation Based on BP Neural Network by LIN Zhiyan

    Published 2020-01-01
    “…Dam deformation is a result of the combined action of multiple loads at the same time. Itis a key technology for prediction and diagnosis of deformation by exploring the potential laws anddevelopment trends of displacement monitoring data. …”
    Get full text
    Article
  9. 42349
  10. 42350
  11. 42351

    Lewis Hine et le National Child Labor Committee: vérité documentaire et rhétorique visuelle et textuelle by Anne Lesme

    Published 2015-02-01
    “…Convinced of the ability of photography to serve the cause of objectivity, the photographer commits himself to a conception of the truth that is at once political and moral, resultant of his engagement with Progressism, as well as his commitment to science and technology—founded on his confidence in the inherent qualities of the medium. …”
    Get full text
    Article
  12. 42352

    NEW WAYS OF PEER REVIEWING IN JOURNALS: OPEN REVIEW by Andrea Mora-Campos

    Published 2015-07-01
    “…Technology has helped improve many aspects of the quality of publications: more visibility, greater access to sources of information and option to verify those sources, among others. …”
    Get full text
    Article
  13. 42353

    Multimodality Fusion with MRI, CT, and Ultrasound Contrast for Ablation of Renal Cell Carcinoma by Hayet Amalou, Bradford J. Wood

    Published 2012-01-01
    “…Fusion technology with electromagnetic (EM) tracking enables navigation with multimodality feedback that lets the operator use different modalities during different parts of the image-guided procedure. …”
    Get full text
    Article
  14. 42354

    Strategic planning for smart cities: a case study of Maribor's transformation based on existing strategies by Vito Bobek, Boštjan Štuhec, Lea-Marija Colarič-Jakše, Tatjana Horvat

    Published 2024-11-01
    “…Background: Maribor faces challenges in transitioning to a smart city, requiring strategic planning that integrates technology and sustainability. Objectives: To develop a comprehensive strategic framework for Maribor's smart city transformation. …”
    Get full text
    Article
  15. 42355
  16. 42356
  17. 42357

    System detecting network anomaly with visualization techniques by Haocheng ZHANG, Xiaojie WU, Xiang TANG, Runxuan SHU, Tianchen DING, Xiaoju DONG

    Published 2018-02-01
    “…With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.…”
    Get full text
    Article
  18. 42358
  19. 42359
  20. 42360

    Survey of identity resolution system in industrial Internet of things by Yuzheng REN, Renchao XIE, Shiqin ZENG, Haoran ZHAO, Jiayi YU, Ru HUO, Tao HUANG, Yunjie LIU

    Published 2019-11-01
    “…With the development of the internet of things (IoT),5G and industrial technology,industrial IoT has become a new research field.Due to the specific requirements of delay,security and stability in industrial production,the traditional DNS has limitations to meet the needs of industrial IoT because of its single identity object,rigid resolution results,and weak security.In this context,how to provide efficient,flexible and secure resolution services for universal objects has become a hot area worldwide.Firstly,we discussed the design principles and key supporting technologies of the identity resolution system in industrial IoT.Then summarized and compared the existing identity resolution systems in detail.Next,the new identity resolution schemes in academic research were introduced.Finally,the core problems and the future research trend in this field were discussed.…”
    Get full text
    Article