Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
43221
High Efficiency Gaseous Tracking Detector for Cosmic Muon Radiography
Published 2016-01-01“…A tracking detector system has been constructed with an innovative approach to the classical multiwire proportional chamber concept, using contemporary technologies. The detectors, covering an area of 0.58 square meters each, are optimized for the application of muon radiography. …”
Get full text
Article -
43222
Fatigue Damage Evolution and Monitoring of Carbon Fiber Reinforced Polymer Bridge Cable by Acoustic Emission Technique
Published 2012-10-01“…We adopt acoustic emission (AE) technology to monitor fatigue damage and failure of CFRP bridge cables. …”
Get full text
Article -
43223
Building ethical virtual classrooms: Confucian perspectives on avatars and VR
Published 2025-06-01“…Ultimately, fostering a culture of virtue, respect, and inclusivity can lead to a more ethical and harmonious educational landscape with the responsible use of educational technology.…”
Get full text
Article -
43224
Research on incremental deployment mechanism of network modality for polymorphic network environment
Published 2023-06-01“…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
Get full text
Article -
43225
Electrical Impedance Dermography: Background, Current State, and Emerging Clinical Opportunities
Published 2024-01-01“…This review highlights ongoing efforts to improve mechanistic understanding of skin electrical changes, study of EID in a variety of clinical contexts, and further refine the technology to find greater clinical use in dermatology and dermatologic research.…”
Get full text
Article -
43226
Diffusion of heavy quarks in the early stage of high-energy nuclear collisions
Published 2025-01-01Get full text
Article -
43227
Fabric-based patchwork on shoes through ultrasonic welding
Published 2025-02-01“…There has been a surge in textile and shoe product design innovation, introducing new products that merge design and technology in various domains. Decorative or functional patches on shoes are typically attached using stitching or adhesives, both of which present challenges: stitches often fail due to wear and tear, while adhesives involve toxic materials that are environmentally harmful. …”
Get full text
Article -
43228
-
43229
Spatial audio signal processing for augmented telepresence applications
Published 2025-03-01Get full text
Article -
43230
-
43231
IMPROVEMENT OF QUALITY MANAGEMENT SYSTEM IN THE ENTERPRISE – CASE STUDY
Published 2024-12-01Get full text
Article -
43232
Improving Heat Exchange Performance of Massive Concrete Using Annular Finned Cooling Pipes
Published 2021-01-01Get full text
Article -
43233
Use of Rice Husk-Bark Ash in Producing Self-Compacting Concrete
Published 2014-01-01Get full text
Article -
43234
Pricing American Options by a Fourier Transform Multinomial Tree in a Conic Market
Published 2022-01-01Get full text
Article -
43235
Some Results on Iterative Proximal Convergence and Chebyshev Center
Published 2021-01-01Get full text
Article -
43236
PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN
Published 2025-01-01“…The analysis results show significant improvements in forecasting accuracy using AI technology, with Machine Learning achieving 78% accuracy in revenue forecasting, Deep Learning 85% in financial trend prediction, and Natural Language Processing 89% in sentiment analysis. …”
Get full text
Article -
43237
Power Xgamma distribution: properties, estimation, regression, simulation and applications
Published 2024-03-01Get full text
Article -
43238
Global Bifurcation from Intervals for the Monge-Ampère Equations and Its Applications
Published 2018-01-01Get full text
Article -
43239
Analysis of Factors Influencing Viu Application User Satisfaction using the End User Computing Satisfaction (EUCS) and DeLone & McLean
Published 2024-11-01“…One area of telecommunications technology that is also undergoing development in the context of entertainment is that of video streaming. …”
Get full text
Article -
43240
Provably secure rational delegation computation protocol
Published 2019-07-01“…A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.…”
Get full text
Article