Showing 42,541 - 42,560 results of 68,043 for search '"technology"', query time: 0.21s Refine Results
  1. 42541

    Digital economy and coal consumption in emerging Asian economies by Minjing Zhu, Lei Zhu

    Published 2025-02-01
    “…Additionally, encouraging investments in renewable energy sources and clean technology can promote sustainable economic growth and reduce coal dependence.…”
    Get full text
    Article
  2. 42542

    An Exploration of a Social Robot as a Digital Shield for Law Enforcement Interviews: Designing a Prototype. by Cryston Sahae, Shuyue Gu, Lige Yang, Elin A. Björling, Nichelle Song

    Published 2024-06-01
    “…We underscore the potential for social robots and innovative technologies to enhance the support provided to survivors within the criminal justice system.…”
    Get full text
    Article
  3. 42543
  4. 42544
  5. 42545

    Food Processing: The Meat We Eat by Erica L. Bub, Keith Schneider, Chad Carr, Matt Hersom

    Published 2013-01-01
    “…Meat processing technology is used to produce many of the foods we enjoy, such as hot dogs, hamburgers, and chicken nuggets. …”
    Get full text
    Article
  6. 42546
  7. 42547

    Wireless Radio Frequency Automation of Intelligent Optical Fiber Transmission System Based on the Differential Evolution Method by Lei Jin, Jinghong Zhao, Xing Huang, Bin Lu

    Published 2021-01-01
    “…With the continuous development and improvement of science and technology, optical fiber transmission has been transformed from traditional manual transmission to automatic transmission, and the transmission efficiency is constantly improving. …”
    Get full text
    Article
  8. 42548
  9. 42549

    OBTURATOR FABRICATION WITH MAGNET ATTACHMENT by Mia Laksmi Lita Rosa

    Published 2019-09-01
    “…Background: Development of science and technology led to people having birth defects (congenital), trauma or because of there sected tumor can be made of a prosthesis. …”
    Get full text
    Article
  10. 42550
  11. 42551

    Utilising Generative AI in the Classics classroom by David Peddar

    “…The following paper explores a proactive approach to utilising Gen AI technology and programs within a Latin classroom NESA Stage 4-5/ MYP Years 1-3 in Australia (ages 11-16) (NESA: New South Wales Education Standards Authority. …”
    Get full text
    Article
  12. 42552
  13. 42553
  14. 42554
  15. 42555

    Design and Analysis of Remote Tourism Teaching and Training System Based on Adaptive Virtual Queue Algorithm by Jian Wang

    Published 2022-01-01
    “…During the design of the remote tourism teaching and training system, the adaptive virtual queue algorithm can be used to collect business data information with network technology and sensors and other equipment. The data information is stored in the constructed remote tourism teaching and training system. …”
    Get full text
    Article
  16. 42556

    Endovascular Repair of Aortobronchial Fistula due to Saccular Aneurysm of Thoracic Aorta by Konstantinos Tigkiropoulos, Kyriakos Stavridis, Ioannis Lazaridis, Nikolaos Saratzis

    Published 2017-01-01
    “…Recent advances in endovascular technology have made thoracic endovascular aortic repair (TEVAR) the treatment of choice. …”
    Get full text
    Article
  17. 42557
  18. 42558

    EAEBHCM:an extended attribute encryption based hidden credentials model by Wei-jin GE, Xiao-hui HU

    Published 2012-12-01
    “…The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model.…”
    Get full text
    Article
  19. 42559
  20. 42560