Showing 43,381 - 43,400 results of 68,043 for search '"technology"', query time: 0.19s Refine Results
  1. 43381
  2. 43382

    Chasing Down Foreigners at the French-Italian Border (Hautes-Alpes) as a Matter of Social and Racial Policing by Sarah Bachellerie

    Published 2020-10-01
    “…The persistence of “police hunts for illegal humans” (Chamayou, 2010) as a control technology helps us, on the whole, to understand how migration control on France’s borders forms part of a “colonial present” (Gregory, 2004).…”
    Get full text
    Article
  3. 43383

    The development of medical networks through ICT in Japan by Tsutomu Nakamura

    Published 2007-12-01
    “…This paper examines how medical networks using Information and Communications Technology (ICT) have been constructed, and what kind of spatial impact they have on the existing medical care provision system. …”
    Get full text
    Article
  4. 43384

    Design and Implementation of Protocols Association Scbeme on Iu-PS Interface in TD-SCDMA Network by Rui Li, Zhizhong Zhang

    Published 2014-09-01
    “…In view of the low processing efficiency of signaling and service monitoring system and inability to associate with both signaling and service data, using the enhanced Hash algorithm and timeout processing technology,a protocols association scheme with synthetic solution of call detail record in both signaling and service plane were designed, which based on a key words association method. …”
    Get full text
    Article
  5. 43385

    A frequency offset compensation method based on all phase FFT amplitude by Yingjie ZHU, Wuxiong ZHANG, Huiyue YI, Hui XU

    Published 2022-06-01
    “…Distance measurement is an important part of the wireless location technology.The ranging accuracy of millimeter wave based distance measurement depends on the frequency estimation accuracy of beat signals from the targets, but the existing frequency estimation algorithms have the shortcomings of either high complexity or low accuracy.In order to improve the ranging accuracy, the frequency compensation value and frequency estimation method based on all phase FFT amplitude was proposed to improve the performance of frequency estimation.Firstly, the signal amplitude was estimated based on the relationship between its all phase FFT and its conventional FFT spectrum.Moreover, using the relationship between the estimated signal amplitude, the signal spectrum amplitude and frequency compensation value, the frequency compensation value was solved by Newton iterative algorithm.Then, the frequency compensation value was used to shift the frequency of the signal, and the frequency compensation value was estimated again to obtain the final estimation value of the signal frequency, from which the distance of the target was calculated.Finally, simulation results were presented to show that the proposed method has higher distance measurement accuracy than the existing methods.…”
    Get full text
    Article
  6. 43386

    Practical application of large language models in educational informatics: specification, framework, and applications by XU Gang, LIU Zhipeng, FENG Qi, SHEN Fuke

    Published 2024-11-01
    “…This provided a reference for promoting the widespread application of artificial intelligence technology in the field of education.…”
    Get full text
    Article
  7. 43387

    Research and Analysis of Facial Recognition Based on FaceNet, DeepFace, and OpenFace by Li Minghan

    Published 2025-01-01
    “…This study provides a comprehensive review of recent advancements in face recognition technology, focusing on deep learning models such as FaceNet, DeepFace, and OpenFace. …”
    Get full text
    Article
  8. 43388

    PERFORMANCE OPTIMIZATION OF TRANSMISSION GEAR BASED ON OPTIMAL MODIFICATION DESIGN by HAN Wei, REN ZhiQun

    Published 2020-01-01
    “…By comparing the results before and after optimization,it can be seen that the three-dimensional gear modification technology can greatly reduce the stress of the gear,reduce the fluctuation amplitude of the transmission error of the gear,optimize the stress distribution of the gear tooth surface,and reduce the vibration noise. …”
    Get full text
    Article
  9. 43389
  10. 43390
  11. 43391

    A Novel Mining Approach for Data Analysis and Processing Using Unmanned Aerial Vehicles by Ali Alenezi, Ahmad Sawalmeh, Hazim Shakhatreh, Muhannad Almutiry, Nasser Aedh Alreshidi

    Published 2022-01-01
    “…In this work, the pathloss models in millimeter-wave technology are considered because they provide massive data rates for line of sight scenarios. …”
    Get full text
    Article
  12. 43392

    Nouvelle économie du développement et essais cliniques randomisés : une mise en perspective d’un outil de preuve et de gouvernement by Agnès Labrousse

    Published 2010-11-01
    “…This article tries to shed some light on the remarkable take-off of randomized controlled experiments in development economics, both as an instrument of proof and as an instrument of government. This technology transfer from clinical studies makes a decisive contribution to mainstream development economics by instilling a welcome concreteness into the core of the analysis, far away from the late Washington consensus. …”
    Get full text
    Article
  13. 43393
  14. 43394
  15. 43395
  16. 43396

    Research on person re-identification algorithm based on multi-task learning by MI Rongxin, YAO Wenwen, WU Binghao

    Published 2024-06-01
    “…It has become a pivotal technology in intelligent video surveillance systems, playing a crucial role in domains like smart security and smart cities. …”
    Get full text
    Article
  17. 43397
  18. 43398
  19. 43399

    Public key searchable encryption scheme in blockchain-enabled multi-user environment by Dong ZHENG, Tianze ZHU, Rui GUO

    Published 2021-10-01
    “…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
    Get full text
    Article
  20. 43400