Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
43741
Design of a CPW-Fed Band-Notched UWB Antenna Using a Feeder-Embedded Slotline Resonator
Published 2008-01-01Get full text
Article -
43742
Controlling the Rejection of Protein During Membrane Filtration by Adding Poly-Vinyl Pyrrolidone (PVP)
Published 2024-12-01Get full text
Article -
43743
ENHANCED PROPERTIES AND MULTIFACETED APPLICATIONS OF POLYMETHYL METHACRYLATE (PMMA) IN MODERN MEDICINE AND DENTISTRY
Published 2024-12-01“…The integration of cutting-edge research and technology in PMMA composites is crucial for developing safer, more effective medical devices and interventions, ultimately leading to better patient outcomes and broader applications in healthcare. …”
Get full text
Article -
43744
Dynamic Characteristics Analysis and Applications of Electromagnetic Environment Based on Group Perception
Published 2022-01-01Get full text
Article -
43745
Research on RTF array overflow vulnerability detection
Published 2017-05-01“…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
Get full text
Article -
43746
A Direct Meshless Method for Solving Two-Dimensional Second-Order Hyperbolic Telegraph Equations
Published 2020-01-01Get full text
Article -
43747
Shaping Single Offset Reflector Antennas Using Local Axis-Displaced Confocal Quadrics
Published 2016-01-01Get full text
Article -
43748
Economic and Environmental Benefits of Grid-Connected PV-Biomass Systems in a Bangladeshi University: A HOMER Pro Approach
Published 2025-01-01“…This study addresses Bangladesh’s urgent power crisis by evaluating a grid-connected PV-Biomass hybrid system at the Pabna University of Science and Technology (PUST). Using the hybrid optimization of multiple energy resources (HOMER) software, the project showcases a cost-effective and environmentally friendly solution. …”
Get full text
Article -
43749
The perspectives of STEM faculty toward undergraduate mentorship - A case study
Published 2025-02-01“…A plethora of research captures undergraduate students' perceptions of faculty mentorship in science, technology, engineering, and mathematics (STEM). However, more research is necessary to capture the perceptions of STEM faculty about the mentor-mentee relationship. …”
Get full text
Article -
43750
-
43751
-
43752
-
43753
Effective self-marketing model
Published 2022-02-01“…Currently, there is no system model of the self-marketing process within the framework of existing concepts, which limits the possibilities of developing scientifically based proposals for its effective technology. The formation of the model consists of three stages. …”
Get full text
Article -
43754
Edge Cloud and Mobile Auxiliary Equipment of Fine Art Painting Course Teaching Auxiliary System Design
Published 2022-01-01“…Due to the development of information technology, the new type of smart campus integrates teaching, scientific research, office services, and many other applications, and online education information resources show a blowout growth. …”
Get full text
Article -
43755
Coexistence in a metapopulation model with explicit local dynamics
Published 2004-02-01Get full text
Article -
43756
Exploratory Field and Laboratory Investigation on the Use of Noncontact Digital Ski Sensor in the South Korea Expressway Network
Published 2023-01-01“…In South Korea, the next-generation asphalt pavement-smoothing technology, known as the noncontact digital ski (NCDS), started to be used in expressway construction in 2018, making this system an essential tool in the paving industry. …”
Get full text
Article -
43757
Research and implementation of network architecture of LSN DCI EVPN VxLAN
Published 2017-06-01“…With the rise of virtualization technology,the architecture of traditional data center is disrupted.There exit a large number of interconnected needs among the data centers,such as data center active-active,data center redundancy,data synchronous backup,data migration,integrated data store,shared virtual resource pool,virtual machine drift and so on.Thereby,a large amount of east-west flow was generated,it is necessary to build a reliable,flexible,secure,and easy to deploy layer-2 and layer-3 network to meet the requirement of DCI (data center interconnection).The network architecture of EVPN VxLAN was analyzed,there hasn’t been successful large-scale business case for implementation of multi-vendor DCI EVPN VxLAN networking.Combined with current status of LSN data center of Shanghai Telecom,the deployment of DCI via existing network was proposed and achieved.…”
Get full text
Article -
43758
Simulation of a Centrifugal Pump by Using the Harmonic Balance Method
Published 2015-01-01Get full text
Article -
43759
Analogous Atomic and Electronic Properties between VN and VNCB Defects in Hexagonal Boron Nitride
Published 2022-01-01Get full text
Article -
43760
Assessing Logistics Industry Efficiency and Identifying Determinants in Shijiazhuang, China – A Comprehensive Analysis
Published 2025-02-01“…The results indicate that Shijiazhuang’s logistics efficiency is high, with leading technology and management levels in the eastern region. …”
Get full text
Article