Showing 45,301 - 45,320 results of 68,043 for search '"technology"', query time: 0.20s Refine Results
  1. 45301
  2. 45302
  3. 45303

    Nonuniform Corrosion in the Vertical Direction of Q345 Steel in a Real Ocean Environment by Jiezhen Hu, Huan Huang, Xin Hu, Peichang Deng, Guo Zheng, Jiahong Chen, Zhiwen Tu

    Published 2025-01-01
    “…First, a metal corrosion monitoring system was designed and applied based on the coulometer principle and array electrode technology. Then, through coulometer testing, weightlessness analysis, electrochemical testing, and surface morphology observation, the corrosion behavior of Q345 steel used in an offshore wind turbine in Zhanjiang Bay in the South China Sea was studied. …”
    Get full text
    Article
  4. 45304

    Compliant actuation based on dielectric elastomers for a force-feedback device: modeling and experimental evaluation by R. Vertechy, M. Bergamasco, G. Berselli, V. Parenti Castelli, G. Vassura

    Published 2013-01-01
    “…Thanks to their large power densities, low costs and shock-insensitivity, Dielectric Elastomers (DE) seem to be a promising technology for the implementation of light and compact force-feedback devices such as, for instance, haptic interfaces. …”
    Get full text
    Article
  5. 45305

    Research on the Performance of Electric Vehicles in Peak Load Shifting by Qingshan Xu, Yujun Liu, Maosheng Ding, Pingliang Zeng, Wei Pan

    Published 2014-01-01
    “…Electric vehicles (EVs) are developing remarkably fast these years which makes the technology of vehicle-to-grid (V2G) easier to implement. …”
    Get full text
    Article
  6. 45306
  7. 45307
  8. 45308
  9. 45309

    Application of Autofluorescence Endoscopy for Colorectal Cancer Screening: Rationale and an Update by Hiroyuki Aihara, Hisao Tajiri, Takeshi Suzuki

    Published 2012-01-01
    “…CRC screening using the latest AFE technology could, therefore, lead to future reductions in CRC mortality.…”
    Get full text
    Article
  10. 45310
  11. 45311

    Energy Efficient Waveband Translucent Optical Burst Switching Network by Mohammed J. Sadiq, Mohammed J. Zaiter, Raad F. Chisab

    Published 2022-12-01
    “… The fast development of translucent Optical Burst Switching (OBS) technology, which employs multiple wavelengths per fiber, increases the size (i.e., the number of ports) as well as the cost and power consumption of Optic Cross-Connects (OXCs). …”
    Get full text
    Article
  12. 45312
  13. 45313
  14. 45314

    ABAC access control policy generation technique based on deep learning by Aodi LIU, Xuehui DU, Na WANG, Rui QIAO

    Published 2020-12-01
    “…To solve the problem of automatic generation of access control policies, an access control policy generation framework based on deep learning was proposed.Access control policy based on attributes could be generated from natural language texts.This technology could significantly reduce the time cost of access control policy generation and provide effective support for the implementation of access control.The policy generation problem was decomposed into two core tasks, identification of access control policy sentence and access control attribute mining.Neural network models such as BiGRU-CNN-Attention and AM-BiLSTM-CRF were designed respectively to realize identification of access control policy sentence and access control attribute mining, so as to generate readable and executable access control policies.Experimental results show that the proposed method has better performance than the benchmark method.In particular, the average F1-score index can reach 0.941 in the identification task of access control policy sentence, which is 4.1% better than the current state-of-the-art method.…”
    Get full text
    Article
  15. 45315
  16. 45316

    Destination resilience and transformations in the tourism sector: new tendencies in destination development and management by Sahil Sharma, Jeet Dogra, Sonia Khan

    Published 2024-10-01
    “…The findings contribute to research and policy-making and culminate in identifying six dimensions, namely technology and digitalisation, business model innovation, partnerships and coordination, tourist behaviour, domestic tourism, and sustainability, that illuminate innovative and transformative tendencies in tourism resilience. …”
    Get full text
    Article
  17. 45317
  18. 45318

    Application of Color Sensor in the Determination of Tomato Fruit Ripeness (Solanum Lycopersicum, L) in Gravitation Type Fruit Sorting Tool (Gravitation Type) by Fadliansyah Putra, Taufik Rizaldi

    Published 2019-04-01
    “…Therefore, design of fruit sortationtool using gravitation type and technology to determine fruit ripeness is needed. This study aimed to design and fabricate fruit sorting tool based on the fruit size that could help farmers in sorting fruit. …”
    Get full text
    Article
  19. 45319

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  20. 45320