Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
43721
Hygrothermal Design of Connections in Wall Systems Insulated from the Inside in Historic Building
Published 2025-01-01Get full text
Article -
43722
Novel Numerical Scheme for Singularly Perturbed Time Delay Convection-Diffusion Equation
Published 2021-01-01Get full text
Article -
43723
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01“…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
Get full text
Article -
43724
From Material Level to Structural Use of Mineral-Based Composites—An Overview
Published 2010-01-01Get full text
Article -
43725
-
43726
Dynamic Analysis of Traffic State and Congestion Propagation on Bidirectional Grid Network
Published 2013-01-01Get full text
Article -
43727
-
43728
Computational frameworks transform antagonism to synergy in optimizing combination therapies
Published 2025-01-01Get full text
Article -
43729
-
43730
NEW HOLISTIC APPROACH TO CREATIVE TOURISM AND SUSTAINABLE TERRITORIES IN CHI RIVER BASIN, NE THAILAND
Published 2024-08-01Get full text
Article -
43731
Application of the HeWuTong System in the Practice of the “River Chief System”
Published 2020-01-01“…HeWuTong application system is a modern information management platform built on the premise of fully integrating the needs of river management in the practice of “River Chief System” in Shenzhen.Through the system,the circulating water information resource base and multi-level linkage intelligent control platform shared by cities and districts are built with means of “system + responsibility + technology” and technologies of Internet of Things (IOT),GIS,big data,microservices,etc.…”
Get full text
Article -
43732
-
43733
Research on the UAV-aided data collection and trajectory design based on the deep reinforcement learning
Published 2020-09-01“…The Internet of things (IoT) era needs to realize the wide coverage and connections for the IoT nodes.However,the IoT communication technology cannot collect data timely in the remote area.UAV has been widely used in the IoT wireless sensor network for the data collection due to its flexibility and mobility.The trajectory design of the UAV assisted sensor network data acquisition was discussed in the proposed scheme,as well as the UAV charging demand in the data collection process was met.Specifically,based on the hierarchical reinforcement learning with the temporal abstraction,a novel option-DQN (option-deep Q-learning) algorithm targeted for the discrete action was proposed to improve the performance of the data collection and trajectory design,and control the UAV to recharge in time to ensure its normal flight.The simulation results show that the training rewards and speed of the proposed method are much better than the conventional DQN (deep Q-learning) algorithm.Besides,the proposed algorithm can guarantee the sufficient power supply of UAV by controlling it to recharge timely.…”
Get full text
Article -
43734
Numerical simulation of fractal interface effect of mining-caused activation of fault
Published 2002-01-01Get full text
Article -
43735
Experimental Studies on Post-Explosion Lesions in a Model of Human Soft Tissues
Published 2022-12-01Get full text
Article -
43736
Utilizing Statistical Tests for Comparing Machine Learning Algorithms
Published 2021-07-01Get full text
Article -
43737
Improving bandwidth utilization by compressing small-payload traffic for vehicular networks
Published 2019-04-01“…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. However, these solutions cannot be deployed in vehicular networks successfully, due to the limitations on processing capacity and routing scalability. …”
Get full text
Article -
43738
Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms
Published 2023-01-01“…The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages. Blockchain technology is used to achieve decentralised and distributed storage and management of authentication data. …”
Get full text
Article -
43739
Mobile Multi-Agent Evaluation Method for Wireless Sensor Networks-Based Large-Scale Structural Health Monitoring
Published 2012-11-01“…This paper presents a multi-agent cooperation system based on mobile agent technology for wireless sensor network-based structural health monitoring which deals with the evaluation of large-scale structure. …”
Get full text
Article -
43740
A Numerical Study of Linear Two-Points Boundary Value Problems with ODEs of Fourth-Order Using RKM Method
Published 2025-01-01Get full text
Article