Showing 44,381 - 44,400 results of 68,043 for search '"technology"', query time: 0.21s Refine Results
  1. 44381

    FORMATION OF CONFLICT MANAGEMENT COMPETENCE OF A UNIVERSITY TEACHER by I. V. NIKULINA, N. V. SOLOVOVA

    Published 2018-02-01
    “…The paper presents the training program “Technology of conflict management in educational institutions” aimed at the formation of the conflict management competence of heads of educational units and a special curriculum of an advanced training “Management of pedagogical conflict”designed for the formation of University teachers’ abilities of pedagogical conflicts constructive resolution.…”
    Get full text
    Article
  2. 44382

    La trilogie des Trois corps de Liu Cixin et le statut de la science-fiction en Chine contemporaine by Gwennaël Gaffric

    Published 2017-06-01
    “…This trilogy tells the story of the future invasion of the Earth by a belligerent extraterrestrial civilization with advanced technology and the way humans try to defend themselves begins with the Chinese Cultural Revolution and ends with the heat death of the universe. …”
    Get full text
    Article
  3. 44383

    Spatial and Temporal Variation Characteristics of Drought in Guizhou Province Based on VCI and Division of Arid Regions by DAI Renli, ZHONG Jiusheng

    Published 2021-01-01
    “…Due to its unique dual hydrological structure of surface water and groundwater and typical karst low mountain and hilly landform area,the agricultural ecological environment of Guizhou Province is extremely fragile,and it is prone to agricultural disasters caused by meteorological factors,leading to reduced agricultural production.This paper calculates the VCI of Guizhou Province from 2001 to 2018 by remote sensing technology,explores the agricultural drought situation in Guizhou Province,divides the spatial distribution of seasonal arid regions in Guizhou Province with ArcGIS spatial overlay analysis,and analyzes the VCI trend characteristics of Guizhou Province through the unary linear trend method.The results show that:①The seasonal and inter-annual VCI in Guizhou Province generally show a downward trend,most obviously in karst areas,followed by non-karst areas;②Guizhou Province's seasonal droughts are mainly spring and winter droughts,and dry karst areas is a drought-prone area;③The drought time characteristics of Guizhou Province are mainly seasonal continuous drought and three-season continuous drought.…”
    Get full text
    Article
  4. 44384

    Calculation of RMS Current Load on DC-Link Capacitors for Multiphase Machine Drives under Carrier-Phase Shift Control by Zhigang Zhang, Pengcheng Zhang, Yang Zhang, Wenjuan Zhang, Mengdi Li, Zichen Xiong

    Published 2023-01-01
    “…In order to optimize the reliability and economy of the multiphase drive system, a Cotes method combined with carrier-phase shifting technology (CPST) for calculating RMS current of the dc-link capacitor is proposed. …”
    Get full text
    Article
  5. 44385

    On the scaling of digital twins by aggregation by Marcelo Pias, Lawrence Bull, Daniel S. Brennan, Mark Girolami, Jon Crowcroft

    Published 2025-01-01
    “…We discuss the emerging technology of digital twins (DTs) and the expected demands as they scale to represent increasingly complex, interconnected systems. …”
    Get full text
    Article
  6. 44386

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  7. 44387
  8. 44388

    Regional Variation in the Carbon Dioxide Emission Efficiency of Construction Industry in China: Based on the Three-Stage DEA Model by Weizhong Zhou, Wenhua Yu

    Published 2021-01-01
    “…In the regions, the Eastern region has the highest technology efficiency value among the three regions, followed by the Middle region and the West region. …”
    Get full text
    Article
  9. 44389
  10. 44390
  11. 44391
  12. 44392
  13. 44393
  14. 44394

    Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration by Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG

    Published 2022-05-01
    “…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
    Get full text
    Article
  15. 44395
  16. 44396
  17. 44397
  18. 44398

    Integration and Differentiation as the Universal Scientific Categories and their Reflection in the Theory and Practice of Natural Science Education by V. A. Ignatova

    Published 2015-02-01
    “…The research findings can be used in pedagogic research methodology, educational process design and modeling, its content, technology and organization.…”
    Get full text
    Article
  19. 44399

    ONLINE TEACHING PREPAREDNESS AND STRESS PROFILE: A COMPARATIVE STUDY OF SECONDARY AND HIGHER EDUCATION FACULTY EXPERIENCES IN THE PHILIPPINES by Jordan Pocaan, Lyndon Bailon, Jean Pauline Pocaan

    Published 2022-12-01
    “…It was concluded that educators at both private public and private institutions can aid teachers in combating the challenges of teaching online, online teaching devices, relevant educational technology tools, and faculty training and workshop on stress management. …”
    Get full text
    Article
  20. 44400

    Social skills and behavior autism spectrum disorder during covid-19 Pandemic by Imam Mujahid

    Published 2022-07-01
    “…Encouraging children's social relations to connect with friends and teachers by utilizing technology media.…”
    Get full text
    Article