Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
43501
-
43502
KOMPETENSI PEDAGOGIK GURU DALAM PEMBELAJARAN PAI SESUAI KURIKULUM 2013 PADA KEGIATAN PLPG DI FITK UIN SUNAN KALIJAGA YOGYAKARTA
Published 2016-12-01“…The necessary solutions are, among others, continuous teaching profession development programs, especially on learning strategies, utilization of information technology, and education of teaching profession (PPG) in occupation. …”
Get full text
Article -
43503
Evaluation des instituts universitaires de technologie et de leurs départements : retour sur 15 années d’expérience
Published 2015-12-01“…In the early 2000s, the French Ministry of Education decided to generalize the evaluation to all of the university institutes of technology (UIT). The preferred plan is the result of a co-construction between its departments and the main actors of the UITs national network. …”
Get full text
Article -
43504
-
43505
-
43506
-
43507
Effects of Flow Rate and Viscosity on Slip Factor of Centrifugal Pump Handling Viscous Oils
Published 2013-01-01Get full text
Article -
43508
Optimal Topology Configuration Design of Contoured-Beam Mesh Reflectors
Published 2022-01-01“…Then, based on the multifrequency optimization model, an iterative design technology is proposed to obtain the optimal topology configuration of the mesh-shaped reflector. …”
Get full text
Article -
43509
Narrowing the semantic gap in virtual machine introspection
Published 2015-08-01“…Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap restoration,a method called ModSG was proposed to bridge the semantic gap.ModSG was a modularity system,it divided semantic restoration into two parts.One was online phase that interact directly with user to construct semantic views,the other was offline phase that only interact with operating system to parse high-level semantic knowledge.Both were implemented via independent module,and the latter provided the former with necessary kernel information during semantic view construction.Experiments on different virtual machine states and different kernel versions show that the ModSG is accurate and efficient in narrowing semantic gap.The modular design and deployment also make ModSG easily to be extended to other operating systems and virtualization platforms.…”
Get full text
Article -
43510
-
43511
The effect of fintech M&As on short-term stock return in the context of macroeconomic environment
Published 2025-01-01“…Abstract Mergers and acquisitions (M&A) with financial technology (fintech) companies can be an effective way for firms to obtain new technologies and capabilities. …”
Get full text
Article -
43512
-
43513
Calculated characterisation of a sensitive gas sensor based on PEDOT:PSS
Published 2022-09-01Get full text
Article -
43514
Stabilizing a Rotary Inverted Pendulum Based on Logarithmic Lyapunov Function
Published 2017-01-01Get full text
Article -
43515
Controller Design of Multiinput Multioutput Time-Delay Large-Scale System
Published 2013-01-01Get full text
Article -
43516
Research on LEO Satellite Network Routing Security
Published 2023-06-01“…The design of secure mechanisms and failure recovery mechanisms for inter-satellite routing has become pivotal in maintaining dependable communication within the LEO satellite network.To address the potential security threats faced by satellite networks, the impact of different routing attack behaviors on a typical inter-satellite routing protocol was analyzed and differentiated packet security authentication mechanisms and link failure recovery mechanisms were designed.Additionally, a satellite network emulation platform based on virtualization technology was constructed, enabled the verification of the effectiveness of the designed inter-satellite routing security mechanisms through the emulation of various routing attack scenarios.Furthermore, performance metrics such as CPU utilization and packet processing time were also evaluated before and after the introduction of security mechanisms.Experimental results demonstrated that the proposed inter-satellite routing security mechanism effectively mitigated multiple security threats in the space network environment while reduced communication latency caused by sudden link failures, thereby ensured secure and reliable communication within the LEO satellite network.…”
Get full text
Article -
43517
The Credit Asset of Enterprise Accounts Receivable Pricing Model
Published 2018-01-01“…The model is also utilized with the optimal control management Technology (T) to maximize the intrinsic value of the credit asset. …”
Get full text
Article -
43518
-
43519
Terahertz wave propagation and channel characterization
Published 2022-01-01“…Firstly, the different characteristics of terahertz waves compared to lower frequency bands were summarized, including the influence of meteorological factors and rough surfaces of materials on THz waves.Next, it was proposed to use ray-tracing (RT) technology to calibrate the three-dimensional (3D) environment model and electromagnetic parameters of materials in the target scenarios through very limited channel measurement data.Then, the reversed parameters were utilized to perform in a similar but more general scenario, instead of a large amount of channel measurement data.Finally, the channel characteristics were analyzed by extraction of the channel key parameters, such as path loss, shadow fading, Rician K-factor, delay spread, angular spread, and doppler parameters in a mobile scenario.Representing two ends of 6G THz use cases from indoor scenario to outdoor scenario, case studies were made for wireless connections on a desktop and vehicular communications, respectively.As for the outdoor scenario, the influences of meteorological factors were additionally considered.The work is of great significance for the design and evaluation of the THz communication system.…”
Get full text
Article -
43520
What drives the profitability of banking sectors in the European Union? The machine learning approach
Published 2024-09-01Get full text
Article