Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
42941
-
42942
-
42943
-
42944
Study of the anomaly detection on rail by a tachometer generator of a train
Published 2024-12-01Get full text
Article -
42945
Joint Pricing and Purchasing Decisions for the Dual-Channel Newsvendor Model with Partial Information
Published 2014-01-01Get full text
Article -
42946
Multiuser cyclic shift keying spread spectrum underwater acoustic communication
Published 2017-07-01“…Aiming at the problem of low data rate and high receiver complexity of existing direct sequence spread spectrum code division multiple access (DS-CDMA),a novel code division multiple access (CDMA) using cyclic shift keying (CSK) signaling,namely CSK-CDMA,was proposed for multiuser underwater acoustic communication.The proposed method used the cyclic correlation characteristic of spread spectrum signals with M-ary modulation to provide a higher data rate than conventional.Passive time reversal technology was employed to suppress inter-code interference between users and the co-channel interference.The quasi-orthogonality of spread spectrum code was used to improve the processing gain.Multiuser communications are demonstrated with lake experimental recorded data under the condition of 5.27 km distance and complex multipath interference.The data rate is 39 bit/s/user for 6 users with bit error rate around 10<sup>-2</sup>~10<sup>-4</sup>.…”
Get full text
Article -
42947
Archimedean Spiral Antenna Calibration Procedures to Increase the Downrange Resolution of a SFCW Radar
Published 2008-01-01Get full text
Article -
42948
Face Recognition using Deep Learning and TensorFlow framework
Published 2023-12-01Get full text
Article -
42949
A Critique on the Book Everyday Life of the Urban Precariat
Published 2022-03-01Get full text
Article -
42950
Research and Prospect of Reservoir Landslide Mechanism and Risk Evaluation
Published 2024-08-01“…Over the years, landslide disasters in mountainous reservoirs have caused multiple casualties and heavy economic losses worldwide, making it a key and difficult scientific and technological breakthrough in the prevention and control of geological disasters in reservoir areas. …”
Get full text
Article -
42951
Syntheses and Antibacterial Studies of Some 1-Phenyl-3-(4-(2-ethanoloxy) phenyl)-5-aryl-1H-pyrazoles
Published 2013-01-01Get full text
Article -
42952
-
42953
Endogenous Security for the Space-Integrated-Ground Information Network in 6G
Published 2023-06-01“…The space-integrated-ground information network in 6G is facing security challenges due to its characteristics, such as the high exposure of the network, high-speed movement of nodes, limited computing resources.Moreover, new security issues are certainly introduced in the development of new architectures, new applications, new technologies and so on.It is urgent to propose new universal security theories to overcome safety and security threats by the integrated solutions.For this purpose, this paper first expounded the cyberspace endogenous security and proposed its endogenous security architecture.Then, under the guidance of the cyberspace endogenous security theory, the relevant security theory and practice norms were respectively discussed for onboard systems, 6G ground mobile networks, and satellite-ground links.Finally, the authentication and encryption mechanism of the communication and security integration from the aspects of security authentication and high security communication encryption, and the integration of traditional security technology and endogenous security were analyzed.…”
Get full text
Article -
42954
Safety and efficacy of praziquantel in pregnant women infected with Schistosoma haematobium
Published 2025-04-01Get full text
Article -
42955
-
42956
Quasilinear Schrödinger equations with general sublinear conditions
Published 2024-12-01Get full text
Article -
42957
Research on the Traffic Flow Control of Urban Occasional Congestion Based on Catastrophe Theory
Published 2021-01-01Get full text
Article -
42958
Biblioscope and the Variety of Disability Media: The Construction and Institutionalisation of a Swedish Reading Device for People with Physical Impairments, 1954–1966
Published 2024-12-01“…By analysing this now largely forgotten technology, the article makes several contributions to the field of disability media studies. …”
Get full text
Article -
42959
New Stabilization Results for Semi-Markov Chaotic Systems with Fuzzy Sampled-Data Control
Published 2019-01-01Get full text
Article -
42960