Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
42541
Digital economy and coal consumption in emerging Asian economies
Published 2025-02-01“…Additionally, encouraging investments in renewable energy sources and clean technology can promote sustainable economic growth and reduce coal dependence.…”
Get full text
Article -
42542
An Exploration of a Social Robot as a Digital Shield for Law Enforcement Interviews: Designing a Prototype.
Published 2024-06-01“…We underscore the potential for social robots and innovative technologies to enhance the support provided to survivors within the criminal justice system.…”
Get full text
Article -
42543
PRODUCTIVITY ANALYSIS OF SPLIT STONE PRODUCTION USING OBJECTIVE MATRIX (OMAX) METHOD (A Case Study)
Published 2022-07-01Get full text
Article -
42544
On a Novel Fourth-Order Algorithm for Solving Systems of Nonlinear Equations
Published 2012-01-01Get full text
Article -
42545
Food Processing: The Meat We Eat
Published 2013-01-01“…Meat processing technology is used to produce many of the foods we enjoy, such as hot dogs, hamburgers, and chicken nuggets. …”
Get full text
Article -
42546
Completeness of b∼Metric Spaces and the Fixed Points of Generalized Multivalued Quasicontractions
Published 2020-01-01Get full text
Article -
42547
Wireless Radio Frequency Automation of Intelligent Optical Fiber Transmission System Based on the Differential Evolution Method
Published 2021-01-01“…With the continuous development and improvement of science and technology, optical fiber transmission has been transformed from traditional manual transmission to automatic transmission, and the transmission efficiency is constantly improving. …”
Get full text
Article -
42548
-
42549
OBTURATOR FABRICATION WITH MAGNET ATTACHMENT
Published 2019-09-01“…Background: Development of science and technology led to people having birth defects (congenital), trauma or because of there sected tumor can be made of a prosthesis. …”
Get full text
Article -
42550
-
42551
Utilising Generative AI in the Classics classroom
Get full text
Article -
42552
DIRECT AND INDIRECT EFFECT OF BRAND CREDIBILITY, BRAND COMMITMENT AND LOYALTY INTENTIONS ON BRAND EQUITY
Published 2012-11-01Get full text
Article -
42553
Accurate range-based distributed localization of wireless sensor nodes using grey wolf optimizer
Published 2023-06-01Get full text
Article -
42554
-
42555
Design and Analysis of Remote Tourism Teaching and Training System Based on Adaptive Virtual Queue Algorithm
Published 2022-01-01“…During the design of the remote tourism teaching and training system, the adaptive virtual queue algorithm can be used to collect business data information with network technology and sensors and other equipment. The data information is stored in the constructed remote tourism teaching and training system. …”
Get full text
Article -
42556
Endovascular Repair of Aortobronchial Fistula due to Saccular Aneurysm of Thoracic Aorta
Published 2017-01-01“…Recent advances in endovascular technology have made thoracic endovascular aortic repair (TEVAR) the treatment of choice. …”
Get full text
Article -
42557
Russian regions’ formation and the problems of their balanced development under sanctions
Published 2023-11-01Get full text
Article -
42558
EAEBHCM:an extended attribute encryption based hidden credentials model
Published 2012-12-01“…The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model.…”
Get full text
Article -
42559
-
42560
Data-Driven Approximated Optimal Control for Chemical Processes with State and Input Constraints
Published 2019-01-01Get full text
Article