Showing 43,221 - 43,240 results of 68,043 for search '"technology"', query time: 0.27s Refine Results
  1. 43221

    High Efficiency Gaseous Tracking Detector for Cosmic Muon Radiography by Dezső Varga, Gábor Nyitrai, Gergő Hamar, László Oláh

    Published 2016-01-01
    “…A tracking detector system has been constructed with an innovative approach to the classical multiwire proportional chamber concept, using contemporary technologies. The detectors, covering an area of 0.58 square meters each, are optimized for the application of muon radiography. …”
    Get full text
    Article
  2. 43222

    Fatigue Damage Evolution and Monitoring of Carbon Fiber Reinforced Polymer Bridge Cable by Acoustic Emission Technique by Dongsheng Li, Qian Hu, Jinping Ou

    Published 2012-10-01
    “…We adopt acoustic emission (AE) technology to monitor fatigue damage and failure of CFRP bridge cables. …”
    Get full text
    Article
  3. 43223

    Building ethical virtual classrooms: Confucian perspectives on avatars and VR by Chi-Ming Lam

    Published 2025-06-01
    “…Ultimately, fostering a culture of virtue, respect, and inclusivity can lead to a more ethical and harmonious educational landscape with the responsible use of educational technology.…”
    Get full text
    Article
  4. 43224

    Research on incremental deployment mechanism of network modality for polymorphic network environment by Jiong LI, Yuxiang HU, Pengshuai CUI, Le TIAN, Yongji DONG

    Published 2023-06-01
    “…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
    Get full text
    Article
  5. 43225

    Electrical Impedance Dermography: Background, Current State, and Emerging Clinical Opportunities by Elise K. Brunsgaard, Benjamin Sanchez, Douglas Grossman

    Published 2024-01-01
    “…This review highlights ongoing efforts to improve mechanistic understanding of skin electrical changes, study of EID in a variety of clinical contexts, and further refine the technology to find greater clinical use in dermatology and dermatologic research.…”
    Get full text
    Article
  6. 43226
  7. 43227

    Fabric-based patchwork on shoes through ultrasonic welding by Rahima Hussain, Muhammad Anwaar Nazeer

    Published 2025-02-01
    “…There has been a surge in textile and shoe product design innovation, introducing new products that merge design and technology in various domains. Decorative or functional patches on shoes are typically attached using stitching or adhesives, both of which present challenges: stitches often fail due to wear and tear, while adhesives involve toxic materials that are environmentally harmful. …”
    Get full text
    Article
  8. 43228
  9. 43229
  10. 43230
  11. 43231
  12. 43232
  13. 43233
  14. 43234
  15. 43235
  16. 43236

    PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN by Gilang Surya Pratama, Agus Munandar

    Published 2025-01-01
    “…The analysis results show significant improvements in forecasting accuracy using AI technology, with Machine Learning achieving 78% accuracy in revenue forecasting, Deep Learning 85% in financial trend prediction, and Natural Language Processing 89% in sentiment analysis. …”
    Get full text
    Article
  17. 43237
  18. 43238
  19. 43239

    Analysis of Factors Influencing Viu Application User Satisfaction using the End User Computing Satisfaction (EUCS) and DeLone & McLean by Dea Fitri Sabrina, Dwi Rosa Indah, Mgs Afriyan Firdaus, Naretha Kawadha Pasema Gumay

    Published 2024-11-01
    “…One area of telecommunications technology that is also undergoing development in the context of entertainment is that of video streaming. …”
    Get full text
    Article
  20. 43240

    Provably secure rational delegation computation protocol by Youliang TIAN, Qiuxian LI, Duo ZHANG, Linjie WANG

    Published 2019-07-01
    “…A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.…”
    Get full text
    Article