Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
44381
FORMATION OF CONFLICT MANAGEMENT COMPETENCE OF A UNIVERSITY TEACHER
Published 2018-02-01“…The paper presents the training program “Technology of conflict management in educational institutions” aimed at the formation of the conflict management competence of heads of educational units and a special curriculum of an advanced training “Management of pedagogical conflict”designed for the formation of University teachers’ abilities of pedagogical conflicts constructive resolution.…”
Get full text
Article -
44382
La trilogie des Trois corps de Liu Cixin et le statut de la science-fiction en Chine contemporaine
Published 2017-06-01“…This trilogy tells the story of the future invasion of the Earth by a belligerent extraterrestrial civilization with advanced technology and the way humans try to defend themselves begins with the Chinese Cultural Revolution and ends with the heat death of the universe. …”
Get full text
Article -
44383
Spatial and Temporal Variation Characteristics of Drought in Guizhou Province Based on VCI and Division of Arid Regions
Published 2021-01-01“…Due to its unique dual hydrological structure of surface water and groundwater and typical karst low mountain and hilly landform area,the agricultural ecological environment of Guizhou Province is extremely fragile,and it is prone to agricultural disasters caused by meteorological factors,leading to reduced agricultural production.This paper calculates the VCI of Guizhou Province from 2001 to 2018 by remote sensing technology,explores the agricultural drought situation in Guizhou Province,divides the spatial distribution of seasonal arid regions in Guizhou Province with ArcGIS spatial overlay analysis,and analyzes the VCI trend characteristics of Guizhou Province through the unary linear trend method.The results show that:①The seasonal and inter-annual VCI in Guizhou Province generally show a downward trend,most obviously in karst areas,followed by non-karst areas;②Guizhou Province's seasonal droughts are mainly spring and winter droughts,and dry karst areas is a drought-prone area;③The drought time characteristics of Guizhou Province are mainly seasonal continuous drought and three-season continuous drought.…”
Get full text
Article -
44384
Calculation of RMS Current Load on DC-Link Capacitors for Multiphase Machine Drives under Carrier-Phase Shift Control
Published 2023-01-01“…In order to optimize the reliability and economy of the multiphase drive system, a Cotes method combined with carrier-phase shifting technology (CPST) for calculating RMS current of the dc-link capacitor is proposed. …”
Get full text
Article -
44385
On the scaling of digital twins by aggregation
Published 2025-01-01“…We discuss the emerging technology of digital twins (DTs) and the expected demands as they scale to represent increasingly complex, interconnected systems. …”
Get full text
Article -
44386
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01“…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
Get full text
Article -
44387
On Fixed Point of Quasi Contraction with Application to Integral Equation
Published 2024-07-01Get full text
Article -
44388
Regional Variation in the Carbon Dioxide Emission Efficiency of Construction Industry in China: Based on the Three-Stage DEA Model
Published 2021-01-01“…In the regions, the Eastern region has the highest technology efficiency value among the three regions, followed by the Middle region and the West region. …”
Get full text
Article -
44389
Buckling Instability of Flexible Joint under High Pressure in Solid Rocket Motor
Published 2020-01-01Get full text
Article -
44390
-
44391
Big Data Oriented Novel Background Subtraction Algorithm for Urban Surveillance Systems
Published 2018-06-01Get full text
Article -
44392
A New Method for Determining Optimal Regularization Parameter in Near-Field Acoustic Holography
Published 2018-01-01Get full text
Article -
44393
Sentiment Analysis of PeduliLindungi User Using Naïve Bayes Classifier Algorithm and Support Vector Machine
Published 2024-08-01Get full text
Article -
44394
Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration
Published 2022-05-01“…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
Get full text
Article -
44395
-
44396
Topological Study of Zeolite Socony Mobil-5 via Degree-Based Topological Indices
Published 2021-01-01Get full text
Article -
44397
HOUSING DELIVERY THROUGH PUBLIC PRIVATE PARTNERSHIP IN NIGERIA AND THE CASE FOR BENEFICIARIES’ INVOLVEMENT
Published 2011-12-01Get full text
Article -
44398
Integration and Differentiation as the Universal Scientific Categories and their Reflection in the Theory and Practice of Natural Science Education
Published 2015-02-01“…The research findings can be used in pedagogic research methodology, educational process design and modeling, its content, technology and organization.…”
Get full text
Article -
44399
ONLINE TEACHING PREPAREDNESS AND STRESS PROFILE: A COMPARATIVE STUDY OF SECONDARY AND HIGHER EDUCATION FACULTY EXPERIENCES IN THE PHILIPPINES
Published 2022-12-01“…It was concluded that educators at both private public and private institutions can aid teachers in combating the challenges of teaching online, online teaching devices, relevant educational technology tools, and faculty training and workshop on stress management. …”
Get full text
Article -
44400
Social skills and behavior autism spectrum disorder during covid-19 Pandemic
Published 2022-07-01“…Encouraging children's social relations to connect with friends and teachers by utilizing technology media.…”
Get full text
Article