Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
45301
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01Get full text
Article -
45302
Effect of Friction Coefficient on Relative Slippage of Fuel Cell Stack under Mechanical Impact Condition
Published 2018-01-01Get full text
Article -
45303
Nonuniform Corrosion in the Vertical Direction of Q345 Steel in a Real Ocean Environment
Published 2025-01-01“…First, a metal corrosion monitoring system was designed and applied based on the coulometer principle and array electrode technology. Then, through coulometer testing, weightlessness analysis, electrochemical testing, and surface morphology observation, the corrosion behavior of Q345 steel used in an offshore wind turbine in Zhanjiang Bay in the South China Sea was studied. …”
Get full text
Article -
45304
Compliant actuation based on dielectric elastomers for a force-feedback device: modeling and experimental evaluation
Published 2013-01-01“…Thanks to their large power densities, low costs and shock-insensitivity, Dielectric Elastomers (DE) seem to be a promising technology for the implementation of light and compact force-feedback devices such as, for instance, haptic interfaces. …”
Get full text
Article -
45305
Research on the Performance of Electric Vehicles in Peak Load Shifting
Published 2014-01-01“…Electric vehicles (EVs) are developing remarkably fast these years which makes the technology of vehicle-to-grid (V2G) easier to implement. …”
Get full text
Article -
45306
Almost Periodic Solutions of a Discrete Mutualism Model with Variable Delays
Published 2012-01-01Get full text
Article -
45307
Doctoral education in the UK (Brunel University experience)
Published 2019-06-01Get full text
Article -
45308
Estimation and Control for Industrial Products Reliability under Failure Trials
Published 2020-01-01Get full text
Article -
45309
Application of Autofluorescence Endoscopy for Colorectal Cancer Screening: Rationale and an Update
Published 2012-01-01“…CRC screening using the latest AFE technology could, therefore, lead to future reductions in CRC mortality.…”
Get full text
Article -
45310
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01Get full text
Article -
45311
Energy Efficient Waveband Translucent Optical Burst Switching Network
Published 2022-12-01“… The fast development of translucent Optical Burst Switching (OBS) technology, which employs multiple wavelengths per fiber, increases the size (i.e., the number of ports) as well as the cost and power consumption of Optic Cross-Connects (OXCs). …”
Get full text
Article -
45312
-
45313
Force-bearing phagocytic adhesion rings mediate the phagocytosis of surface-bound particles
Published 2025-01-01Get full text
Article -
45314
ABAC access control policy generation technique based on deep learning
Published 2020-12-01“…To solve the problem of automatic generation of access control policies, an access control policy generation framework based on deep learning was proposed.Access control policy based on attributes could be generated from natural language texts.This technology could significantly reduce the time cost of access control policy generation and provide effective support for the implementation of access control.The policy generation problem was decomposed into two core tasks, identification of access control policy sentence and access control attribute mining.Neural network models such as BiGRU-CNN-Attention and AM-BiLSTM-CRF were designed respectively to realize identification of access control policy sentence and access control attribute mining, so as to generate readable and executable access control policies.Experimental results show that the proposed method has better performance than the benchmark method.In particular, the average F1-score index can reach 0.941 in the identification task of access control policy sentence, which is 4.1% better than the current state-of-the-art method.…”
Get full text
Article -
45315
Surfactant Modified/Mediated Thin-Layer Chromatographic Systems for the Analysis of Amino Acids
Published 2013-01-01Get full text
Article -
45316
Destination resilience and transformations in the tourism sector: new tendencies in destination development and management
Published 2024-10-01“…The findings contribute to research and policy-making and culminate in identifying six dimensions, namely technology and digitalisation, business model innovation, partnerships and coordination, tourist behaviour, domestic tourism, and sustainability, that illuminate innovative and transformative tendencies in tourism resilience. …”
Get full text
Article -
45317
-
45318
Application of Color Sensor in the Determination of Tomato Fruit Ripeness (Solanum Lycopersicum, L) in Gravitation Type Fruit Sorting Tool (Gravitation Type)
Published 2019-04-01“…Therefore, design of fruit sortationtool using gravitation type and technology to determine fruit ripeness is needed. This study aimed to design and fabricate fruit sorting tool based on the fruit size that could help farmers in sorting fruit. …”
Get full text
Article -
45319
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
45320
Shrinkage and Mechanical Properties of Fibre-Reinforced Blast Furnace Slag-Steel Slag-Based Geopolymer
Published 2022-01-01Get full text
Article