Showing 44,321 - 44,340 results of 68,043 for search '"technology"', query time: 0.19s Refine Results
  1. 44321
  2. 44322
  3. 44323
  4. 44324
  5. 44325
  6. 44326
  7. 44327

    TV is the Devil, the Devil is on TV:Wild Religion and Wild Media in South Africa by Lee-Shae S.Scharnick-Udemans

    Published 2018-07-01
    “…In light of its recent history of apartheid and transition into democracy in the middle1990s,when paradigmatic constitutional and political changes took place in which the relationship between religion and the media wasreconstituted, the South African context, in particular, is ripe for exploring media technology and practices in relation tothe political economy of the sacred. …”
    Get full text
    Article
  8. 44328

    The Social Construction of Transgenic Corn: Relevant Social Actors in Chihuahua by Marco Antonio Fernández Nava

    Published 2016-01-01
    “…According to the socio-technical perspective, the meaning of a technological artefact does not lie within the artefact itself. …”
    Get full text
    Article
  9. 44329
  10. 44330
  11. 44331
  12. 44332

    Research on Underwater Sound Source Localization Based on NLM-EEMD and FCM-Generalized Quadratic Correlation by Shizhe Wang, Zongji Li, Pingbo Wang, Yuchen Sun

    Published 2022-01-01
    “…In order to meet the needs of high-precision underwater positioning, this article studies a time delay estimation method based on nonlocal mean-enforced mean empirical mode decomposition (NLM-EEMD) autocorrelation denoising preprocessing and fuzzy C-means clustering (FCM)-generalized quadratic for underwater sound source localization technology. The theories such as NLM, EEMD, FCM, and generalized quadratic correlation delay estimation are studied in detail, and the speech signal of the test library in the TIMIT standard library is selected for simulation analysis, which verifies the correctness of the delay estimation method. …”
    Get full text
    Article
  13. 44333

    VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms by UZhi-jun W, UIYi C, UEMeng Y

    Published 2015-01-01
    “…Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence,the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP,the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore,the virtual nodes have the ability of resilience,which can complete the seamless switching between being attacked nodes in cloud computing platform,and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters,such as the number of being attacked nodes in hash secure access path (HSAP),and the switching time and the handoff delay between nodes,are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach,and enhances the security of cloud computing platform.…”
    Get full text
    Article
  14. 44334

    Predicting Spread Probability of Learning-Effect Computer Virus by Wei-Chang Yeh, Edward Lin, Chia-Ling Huang

    Published 2021-01-01
    “…With the rapid development of network technology, computer viruses have developed at a fast pace. …”
    Get full text
    Article
  15. 44335
  16. 44336

    Parties in the digital jungle by I. A. Lavrov

    Published 2022-02-01
    “…The development of digital technology, Internet communications and social media affects all areas of public life. …”
    Get full text
    Article
  17. 44337
  18. 44338
  19. 44339

    Establishment of the Virtual Prototyping of Angular Transmission Error of RV Reducer based on Multi-body Dynamics Simulation by Chang Anquan, Zhang Yinghui, He Weidong, Wang Xiaoyu

    Published 2018-01-01
    “…In order to study the influence of modification of cycloid gear and bearing clearance on angular transmission error of RV reducer,based on the multi-body dynamics simulation technology,multi-body contact between gears is established by combining with the most advanced mixed contact checking algorithm rely on relative coordinate contact configuration space method and boundary box method,furthermore the spring force element is used to eliminate the redundant constraints in the dynamic simulation model,at the same time the bearing clearance is introduced,at last the dynamic simulation model of RV reducer containing the cycloid gear modification and bearing clearance is established. …”
    Get full text
    Article
  20. 44340

    The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea by Liivi Aarma

    Published 2024-08-01
    “…The idea can be further developed if we claim that the maze of the realm of books can be solved by technological means of bibliography. Every new step in technology could be described as an annual ring of tree growth, as concentricity. …”
    Get full text
    Article