Showing 43,181 - 43,200 results of 68,043 for search '"technology"', query time: 0.25s Refine Results
  1. 43181
  2. 43182
  3. 43183
  4. 43184

    An Empirical Study Evaluating the Symbiotic Efficiency of China’s Provinces and the Innovation Ecosystem in the High-Tech Industry by Jianzhao Yang

    Published 2022-01-01
    “…Based on the evaluation of symbiotic efficiency of innovation ecosystem of high-tech industry and the consideration of influencing factors such as policy, economy, society, and technology, this paper puts forward the countermeasures of high-tech industry supporting regional economy.…”
    Get full text
    Article
  5. 43185
  6. 43186

    Possibilities of implementing smart contracts in the rent-a-car sector by Tošić Violeta, Radulović Zoran, Borković Milana, Tošić Teodora

    Published 2024-01-01
    “…The paper presents the possibilities of applying blockchain technology and smart contracts in the rent-a-car sector of tourism. …”
    Get full text
    Article
  7. 43187

    Screening for Stereopsis of Children Using an Autostereoscopic Smartphone by Yanhui Yang, Huang Wu

    Published 2019-01-01
    “…The purpose of this study was to evaluate whether this technology could be utilized to detect stereoacuity. …”
    Get full text
    Article
  8. 43188

    Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM by Shuangxi CHEN, Ruoyan ZHAO, Hui LIU, Chunming WU, Wei RUAN

    Published 2021-07-01
    “…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
    Get full text
    Article
  9. 43189

    Review of Passive Electromagnetic Devices for Vibration Damping and Isolation by Efren Diez-Jimenez, Rocco Rizzo, Maria-Jesus Gómez-García, Eduardo Corral-Abad

    Published 2019-01-01
    “…In this work, a state-of-the-art review has been done highlighting advantages and drawbacks, application fields, and technology readiness level of most recent developments. …”
    Get full text
    Article
  10. 43190
  11. 43191
  12. 43192
  13. 43193
  14. 43194

    Research and application of 5G lightweight hardware encryption module for power terminals by Chen ZHANG, Hongkai WANG, Dong MAO, Sichen PAN, Shuai ZHAO

    Published 2023-06-01
    “…With the accelerated deployment of 5G new infrastructure, terminal application business has been gradually extended to various vertical industries.Although 5G technology can also adapt to the differentiated communication requirement for power industry, the power industry currently lacks a kind of 5G module that not only meets the security access requirement for power grid, but also has the advantage of low hardware upgrade cost, flexibility and scalability.Therefore, a 5G lightweight hardware encryption module for power terminals was designed and developed.The module is connected with the power terminal in the form of pluggable interface, and the capability of 5G communication and encryption authentication could be quickly realized just by terminal software upgrade.The test results show that the module has chip-level security authentication capability, and can take into account 5G communication and security mechanism, which not only improves the security of terminal access to the power intranet, but also reduces the difficulty of terminal transformation and 5G communication hardware upgrade cost.…”
    Get full text
    Article
  15. 43195
  16. 43196

    Robust deepfake detection method based on siamese network by LIN Shanhe

    Published 2024-04-01
    “…The proliferation of deepfake (DF) technology for generating manipulated facial expressions in synthetic images has raised concerns due to its potential negative impacts on individuals and society. …”
    Get full text
    Article
  17. 43197
  18. 43198

    Effect of Permanent Magnet Made by Blocking Magnetization on Magnetic Density and Eddy Current Loss of Permanent Magnet Transmission by Wei Lijun, Wang Jinzhong, Lu Yanghui, Wu Xianfeng, Luo Shuai

    Published 2024-01-01
    “…Compared with the traditional preparation process, blocking magnetization technology can significantly improve the performance of large permanent magnets. …”
    Get full text
    Article
  19. 43199
  20. 43200

    RESEARCH ON BENDING STRESS OF COMPOSITE MATERIALS COMPONENT WITH EMBEDDED CABLE by ZHUANG GongWei, WU ZhaoHua, XU HuiYu, LIU YaTao, CHEN XiaoYong

    Published 2020-01-01
    “…The research conclusion provides a theoretical basis for the cable embedded composite technology.…”
    Get full text
    Article