Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
42441
Novel Optical Fiber Dynamic Light Scattering Measurement System for Nanometer Particle Size
Published 2013-01-01Get full text
Article -
42442
Modeling and verifying based on timed automata of Internet of things gateway security system
Published 2018-03-01“…The Internet of things (IoT) is a multiple heterogeneous network,and its perception layer is often faced with various security threats.As the bridge between the perception layer and the network layer,the IoT gateway should have the security management function to prevent the security issue from spreading to the upper layer.According to the current security deficiencies in IoT gateway,a universal IoT gateway security system was proposed based on the IoT gateway middleware technology.Various security protocols or algorithms can be embedded in IoT gateway security system,and the modeling and analysis can help the design and implementation of IoT gateway.The formal modeling and verification of the IoT gateway security system was performed by timed automata.The results show that the IoT gateway security system satisfies the security properties of confidentiality,availability,authenticity,robustness,integrity and freshness.…”
Get full text
Article -
42443
3D Automatic Segmentation of Brain Tumor Based on Deep Neural Network and Multimodal MRI Images
Published 2022-01-01“…Due to the development of modern technology, it is very valuable to use deep learning (DL) and multimodal MRI images to study brain tumor segmentation. …”
Get full text
Article -
42444
Blanchisseuses du propre, blanchisseurs du pur. Les mutations genrées de l’art du linge à l’âge des révolutions textiles et chimiques (1750-1820)
Published 2019-01-01“…On account of the obstruction, the noise and the pollution they supposedly caused, they were supposed to be replaced by a rational, mechanical, fluid and efficient environment, defined by manufacturing technology. This environment and the rivers would thus increasingly become a male domain. …”
Get full text
Article -
42445
Recent Advances in Molten-Carbonate Membranes for Carbon Dioxide Separation: Focus on Material Selection, Geometry, and Surface Modification
Published 2021-01-01“…Membranes for carbon dioxide permeation have been recognized as potential candidates for CO2 separation technology, particularly in the energy sector. Supported molten-salt membranes provide ionic routes to facilitate carbon dioxide transport across the membrane, permit the use of membrane at higher temperature, and offer selectivity based on ionic affinity of targeted compound. …”
Get full text
Article -
42446
Control research and application of conventional operations without real-time networks
Published 2020-01-01“…On the basis of researching the timing agreement mechanism and mirror synchronization operation to ob-tain keys under the condition of no network,a logic control method was proposed based on cryptography control,non-real-time virtual communication and computing keys according to agreement,which could be well applied to dynamic authentication and switch operation of intelligent locks or switches without real-time communication net-work coverage.By using the intelligent terminal with the ability of agreed operation,a kind of “control network of cryptography” without real-time communication network was established,which could be used as a useful supple-ment to the IoT technology without communication coverage,as well as a remote object in a fixed location to transfer the right of management or use according to the order of calculation.By using the computing power of the terminal instead of the communication power of the remote end,without the need to build a backstage communication network and the communication expenses during the waiting period.…”
Get full text
Article -
42447
Analysis and Dynamic Load Characteristic Modeling of RV Reducer
Published 2016-01-01“…As the characteristics of the complicated structure of RV reducer and the difficulty in theory modeling,based on virtual prototype technology,the dynamics model of RV reducer is established by using Pro / E parametric modeling and ADAMS software. …”
Get full text
Article -
42448
Introduction to cyberspace security discipline
Published 2019-06-01“…With rapidly development of electronic information technology and industry,human society comes into information age.In the information age human lives and works in cyberspace.There for,it is the base requirement for human to ensure cyberspace security in the information age.Now,our country has established whole one-level discipline of cyberspace security.So the top priority for us is that should discuss overall the architecture and base theory of cyberspace security discipline.It include the contents as follows:the concept of cyberspace and cyberspace security,the definition of cyberspace security discipline,main research area and contents of cyberspace security discipline,base theory and method theory of cyberspace security discipline.Consequently,we should correctly understand and know well the architecture and base theory of cyberspace security discipline.It is very important not only for discipline construction end personnel training but also for science research and industry development in our country.…”
Get full text
Article -
42449
Sungai Batu Archaeological Complex (SBAC) in Kedah, Malaysia, as a sustainable heritage tourism product
Published 2025-02-01“…The Living Culture Gallery at the SBAC develops heritage tourism by applying digital technology such as VR, AR, hologram fans, and QR codes. …”
Get full text
Article -
42450
Research on SDN based tactical communication network architecture
Published 2022-10-01“…Tactical communication networks has high dynamic, weak connection, low bandwidth, multi-link backup, SDN (software defined network) technology decouples from hardware and software through traditional network control devices, software the core control functions, get a global view through centralized control policies, so as to realize the flexible scheduling of resources and the efficient utilization of channel resources, promote the development of tactical communication networks more intelligent and flexible adaptive.The development status and advantages of software defined network were firstly introduced, the problems of traditional architecture of tactical communication networks were analyzed, including the application of SDN in the field of foreign military tactical communication.Then, the feasible idea of the application of SDN in the field of military communication was put forward, as well as the application scenarios were conceived.Finally, the feasibility of the application of SDN in military communication was summarized.…”
Get full text
Article -
42451
-
42452
Enhancing the Diagnosis of Lateral Ankle Sprains: The Role of MSK Diagnostic Ultrasound in Evaluating ATFL and CFL
Published 2024-02-01“…This article will highlight its benefits over traditional diagnostic methods and the emerging role of MSK diagnostic ultrasound as a superior tool for accurate, cost-effective, and comprehensive assessment of these injuries. We discuss the technology's ability to provide objective, real-time imagery, facilitating accurate diagnosis, treatment planning, and injury monitoring emphasizing the need for a standardized approach to ultrasound evaluation to improve diagnostic accuracy and patient outcomes.…”
Get full text
Article -
42453
Robust Estimation-Based Control Strategies for Induction Motors
Published 2020-01-01Get full text
Article -
42454
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01“…A guess and determine attack on E<sub>0</sub>was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was made.Futher more,a test equation to reduce the number of the guessed candidates was used.The guess and determine attack on E<sub>0</sub>with time complexity of O(2<sup>76</sup>)required about 988 keystream bit.Compared with long keystream attacks,short keystream attacks were more threatening to E<sub>0</sub>cipher which require less than 2 745 bit.This attack which belongs to short keystream attack was the fastest state recovery attack on E<sub>0</sub>so far compared with any other existed short keystream attacks.…”
Get full text
Article -
42455
Lie Symmetry Analysis for the General Classes of Generalized Modified Kuramoto-Sivashinsky Equation
Published 2021-01-01Get full text
Article -
42456
Application of Taiwan’s Human Rights-Themed Cultural Assets and Spatial Information
Published 2020-01-01“…This article uses the National Cultural Assets Network to query Taiwan’s human rights-themed cultural assets, and I apply the spatial information technology of the DocuSky digital humanities academic research platform to draw the maps with GIS and visualization tools. …”
Get full text
Article -
42457
Research Progress of Worm Gear Material in Worm Drive
Published 2020-04-01“…Worm drive has a large transmission ratio,compact structure and stable transmission,thus,it has been widely used in the field of mechanical manufacturing.Bronze is the most common and widespread worm gear material in the worm drive.In order to solve the problems of poor wear resistance,low fatigue strength and scuffing of bronze worm gear,the research of replacement materials bronze worm gear has attracted increasing attention.The common metal materials of bronze worm gear and the research progress concerning alternative materials of bronze worm gear are reviewed.Steel worm gear,cast iron worm gear,zinc aluminum alloy worm gear,and plastic worm gear in domestic and overseas published literatures are mainly discussed.Finally,expectations about materials,surface engineering technology and coating preparation are proposed in respect of current research.…”
Get full text
Article -
42458
Formation, Energetics, and Electronic Properties of Graphene Monolayer and Bilayer Doped with Heteroatoms
Published 2015-01-01Get full text
Article -
42459
Improving Fertility Treatment Documentation – A Survey
Published 2023-04-01“…Aims: To conduct a survey to understand the information needs of assisted reproductive technology physicians when assessing the reasons affecting treatment outcomes after intrauterine insemination (IUI) and in vitro fertilisation (IVF). …”
Get full text
Article -
42460
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Get full text
Article