Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
43381
Response of Fractionally Damped Beams with General Boundary Conditions Subjected to Moving Loads
Published 2012-01-01Get full text
Article -
43382
Chasing Down Foreigners at the French-Italian Border (Hautes-Alpes) as a Matter of Social and Racial Policing
Published 2020-10-01“…The persistence of “police hunts for illegal humans” (Chamayou, 2010) as a control technology helps us, on the whole, to understand how migration control on France’s borders forms part of a “colonial present” (Gregory, 2004).…”
Get full text
Article -
43383
The development of medical networks through ICT in Japan
Published 2007-12-01“…This paper examines how medical networks using Information and Communications Technology (ICT) have been constructed, and what kind of spatial impact they have on the existing medical care provision system. …”
Get full text
Article -
43384
Design and Implementation of Protocols Association Scbeme on Iu-PS Interface in TD-SCDMA Network
Published 2014-09-01“…In view of the low processing efficiency of signaling and service monitoring system and inability to associate with both signaling and service data, using the enhanced Hash algorithm and timeout processing technology,a protocols association scheme with synthetic solution of call detail record in both signaling and service plane were designed, which based on a key words association method. …”
Get full text
Article -
43385
A frequency offset compensation method based on all phase FFT amplitude
Published 2022-06-01“…Distance measurement is an important part of the wireless location technology.The ranging accuracy of millimeter wave based distance measurement depends on the frequency estimation accuracy of beat signals from the targets, but the existing frequency estimation algorithms have the shortcomings of either high complexity or low accuracy.In order to improve the ranging accuracy, the frequency compensation value and frequency estimation method based on all phase FFT amplitude was proposed to improve the performance of frequency estimation.Firstly, the signal amplitude was estimated based on the relationship between its all phase FFT and its conventional FFT spectrum.Moreover, using the relationship between the estimated signal amplitude, the signal spectrum amplitude and frequency compensation value, the frequency compensation value was solved by Newton iterative algorithm.Then, the frequency compensation value was used to shift the frequency of the signal, and the frequency compensation value was estimated again to obtain the final estimation value of the signal frequency, from which the distance of the target was calculated.Finally, simulation results were presented to show that the proposed method has higher distance measurement accuracy than the existing methods.…”
Get full text
Article -
43386
Practical application of large language models in educational informatics: specification, framework, and applications
Published 2024-11-01“…This provided a reference for promoting the widespread application of artificial intelligence technology in the field of education.…”
Get full text
Article -
43387
Research and Analysis of Facial Recognition Based on FaceNet, DeepFace, and OpenFace
Published 2025-01-01“…This study provides a comprehensive review of recent advancements in face recognition technology, focusing on deep learning models such as FaceNet, DeepFace, and OpenFace. …”
Get full text
Article -
43388
PERFORMANCE OPTIMIZATION OF TRANSMISSION GEAR BASED ON OPTIMAL MODIFICATION DESIGN
Published 2020-01-01“…By comparing the results before and after optimization,it can be seen that the three-dimensional gear modification technology can greatly reduce the stress of the gear,reduce the fluctuation amplitude of the transmission error of the gear,optimize the stress distribution of the gear tooth surface,and reduce the vibration noise. …”
Get full text
Article -
43389
-
43390
Hybrid Chebyshev-Type Methods for Solving Nonlinear Equations
Published 2024-12-01Get full text
Article -
43391
A Novel Mining Approach for Data Analysis and Processing Using Unmanned Aerial Vehicles
Published 2022-01-01“…In this work, the pathloss models in millimeter-wave technology are considered because they provide massive data rates for line of sight scenarios. …”
Get full text
Article -
43392
Nouvelle économie du développement et essais cliniques randomisés : une mise en perspective d’un outil de preuve et de gouvernement
Published 2010-11-01“…This article tries to shed some light on the remarkable take-off of randomized controlled experiments in development economics, both as an instrument of proof and as an instrument of government. This technology transfer from clinical studies makes a decisive contribution to mainstream development economics by instilling a welcome concreteness into the core of the analysis, far away from the late Washington consensus. …”
Get full text
Article -
43393
Cognitive mechanisms and emergent grammatical features in Internet memes
Published 2018-12-01Get full text
Article -
43394
-
43395
-
43396
Research on person re-identification algorithm based on multi-task learning
Published 2024-06-01“…It has become a pivotal technology in intelligent video surveillance systems, playing a crucial role in domains like smart security and smart cities. …”
Get full text
Article -
43397
Analysis of Physical Human–Robot Interaction for Motor Learning with Physical Help
Published 2008-01-01Get full text
Article -
43398
Processing Agroindustry By-Products for Obtaining Value-Added Products and Reducing Environmental Impact
Published 2022-01-01Get full text
Article -
43399
Public key searchable encryption scheme in blockchain-enabled multi-user environment
Published 2021-10-01“…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
Get full text
Article -
43400
Analysis of Boeing Aircraft’s Fuel Consumption B737-800 NG for Yogyakarta-Singapore-Jakarta Route
Published 2020-06-01Get full text
Article