Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
44681
Effects of Variable Humidity on the Creep Behavior of Concrete and the Long-Term Deflection of RC Beams
Published 2018-01-01Get full text
Article -
44682
A Bayesian regularization intelligent computing scheme for the fractional dengue virus model
Published 2025-03-01Get full text
Article -
44683
IVAG: An Integrative Visualization Application for Various Types of Genomic Data Based on R-Shiny and the Docker Platform
Published 2017-12-01“…Next-generation sequencing (NGS) technology has become a trend in the genomics research area. …”
Get full text
Article -
44684
The Effect of the Financial Crisis on Investment Projects Case Study: Kurdistan Region of Iraq
Published 2021-12-01“…Domestic and international investments are critical for a country's economic growth since they facilitate the transfer of technology, job creation, increase the exports of goods, and services. …”
Get full text
Article -
44685
Smart governance as a new strategy on Jambi city policy innovations
Published 2023-09-01“…The goal of the smart governance concept is modern urban management using state-of-the-art technologies, considering the applicable ecological standards while saving resources and achieving the expected results. …”
Get full text
Article -
44686
Multi‐omics analysis of pyroptosis‐related genes for prognosis and immune landscape in head and neck cancer
Published 2024-12-01Get full text
Article -
44687
A systematic review of the use of WeChat in teaching Chinese as a foreign language
Published 2024-01-01“…It is hoped that the insights provided here will inform the design and implementation of future courses that use WeChat or other technology-assisted applications for language teaching.…”
Get full text
Article -
44688
-
44689
Improved Sparse Channel Estimation for Cooperative Communication Systems
Published 2012-01-01Get full text
Article -
44690
Practical exploration on the construction of data asset management system
Published 2019-02-01“…With the change of policy environment and the upgrading of information technology,the big data strategy has officially risen to the national strategy.Digital China construction is accelerating in all directions,and data asset management has received unprecedented attention.The construction of data asset management system has become an inevitable choice and inevitable trend for enterprises to cope with the requirements of the era of big data.Data value mining needs to provide protection through data asset management system.Focusing on the problems existing in the big data management and control of State Grid Xinyuan Co.…”
Get full text
Article -
44691
A Middleware Approach to Achieving Fault Tolerance of Kahn Process Networks on Networks on Chips
Published 2011-01-01Get full text
Article -
44692
The external sector of the Serbian economy
Published 2016-01-01“…Unfavorable structure of the sectors, departments and the product groups affected the deepening of external imbalances and high foreign trade deficit. Exports of technology of predominantly low intensity, resources, and labor-intensive products, common for Serbian economy, represent no guarantee of economic growth in the long term. …”
Get full text
Article -
44693
TESTING THE RELATIONSHIPS BETWEEN ENERGY PRICES AND THE BORSA ISTANBUL INDICES
Published 2021-03-01“…The development of technology and population increase makes these energy sources important for financial markets and the overall economy. …”
Get full text
Article -
44694
Artificial Intelligence and the Financial Security of the State on the Example of Poland
Published 2024-12-01“…These modern technologies identified with artificial intelligence technology (hereinafter referred to as AI – artificial intelligence) have been, to an increasing extent, also used in the area related to the financial aspects of the functioning of Poland. …”
Get full text
Article -
44695
افضل الممارسات لادارة وثائق الجهات الحکومیة على شبکات التواصل الاجتماعى
Published 2018-04-01“…Most governments around the world tend to introduce e-government, thatis, the use of internet technology as a platform for exchanging information,providing services and transacting with citizens, businesses, and otherStakeholders of government. …”
Get full text
Article -
44696
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01“…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
Get full text
Article -
44697
Online Intelligent Identification of Modal Parameters for Large Cable-Stayed Bridges
Published 2020-01-01Get full text
Article -
44698
La science au sommet : Une exploration du tourisme scientifique au prisme des ascensions alpines du xviiie siècle
Published 2022-04-01“…Our historical case study indicates how contemporary scientific tourism could rely on a model of public engagement with science informed by the history of science and technology.…”
Get full text
Article -
44699
Birth Defects in Singleton versus Multiple ART Births in Japan (2004–2008)
Published 2011-01-01“…The purpose of the present study was to evaluate the relative risk (RR) of multiple births for birth defects after assisted reproductive technology (ART) using Japanese nationwide data from 2004 to 2008 with singletons as the reference group. …”
Get full text
Article -
44700