Showing 45,861 - 45,880 results of 68,043 for search '"technology"', query time: 0.20s Refine Results
  1. 45861

    Literature Review: Early Childhood Parenting Efforts in Dual Earner Family by Ratna Anjani, Esya Anesty Mashudi, Pepi Nuroniah

    Published 2024-09-01
    “…To address this, a comprehensive strategy involving supportive policies, the role of communities, the utilization of technology, as well as government intervention in providing supportive infrastructure is required. …”
    Get full text
    Article
  2. 45862
  3. 45863
  4. 45864
  5. 45865

    Wafer-scale integration of freestanding photonic devices with color centers in silicon carbide by Sridhar Majety, Victoria A. Norman, Pranta Saha, Alex H. Rubin, Scott Dhuey, Marina Radulaski

    Published 2025-01-01
    “…However, large-scale deployment of this technology has been stifled by a lack of ability to integrate photonic devices at scale while maintaining the properties of quantum emitters. …”
    Get full text
    Article
  6. 45866

    Verifiable attribute-based searchable encryption scheme based on blockchain by Xixi YAN, Xiaohan YUAN, Yongli TANG, Yanli CHEN

    Published 2020-02-01
    “…For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was proposed.The ciphertext policy attribute-based encryption mechanism was used on the shared key to achieve fine-grained access control.Ethereum blockchain technology was combined to solve the problem of incorrect search results returned by the semi-honest and curious cloud server model,so it could prompt both the cloud server and the user to follow the rules of the contract honestly and achieved service-payment fairness between the user and the cloud server in the pay-per-use cloud environment.In addition,based on the irreversible modification of the blockchain,the cloud server was guaranteed to receive the service fee,and the user was assured to obtain the correct retrieval results without additional verification which reduced the computational overhead of the user.The security analysis shows that the scheme satisfies the semantic security against adaptive chosen keyword attack and can protect the privacy of users and the security of data.The performance comparison and experimental results show that the scheme has certain optimizations in security index generation,search token generation,retrieval efficiency and transaction quantity,so it is more suitable for one-to-many search scenarios such as smart medical.…”
    Get full text
    Article
  7. 45867
  8. 45868
  9. 45869

    A Bibliometric Analysis on Federated Learning by Ersin Namlı, Yusuf Sait Türkan, Mesut Ulu, Ömer Algorabi

    Published 2024-12-01
    “…With the rapid advancement of technology and growing concerns about data privacy, federated learning (FL) has attracted considerable attention from the scientific community. …”
    Get full text
    Article
  10. 45870
  11. 45871

    Global bifurcation of positive solutions for a superlinear $p$-Laplacian system by Lijuan Yang, Ruyun Ma

    Published 2024-08-01
    “…We obtain the principal eigenvalue of $(P)$ by using a nonlinear Krein–Rutman theorem and the unbounded branch of positive solutions for $(Q)$ via bifurcation technology.…”
    Get full text
    Article
  12. 45872

    The Advent of the Printing Press and Britain’s Multilingual Textual Culture, 1471–1510 by Jordi Sánchez-Martí

    Published 2023-09-01
    “…This article discusses the effects the new technology of printing had on the rich and multilingual textual culture of late medieval Britain. …”
    Get full text
    Article
  13. 45873
  14. 45874

    A Use of Fuzzy TOPSIS to Improve the Network Selection in Wireless Multiaccess Environments by Mouad Mansouri, Cherkaoui Leghris

    Published 2020-01-01
    “…Users nowadays want to access the best available wireless network, either from 3GPP or IEEE group technologies, wherever they are, without losing their sessions. …”
    Get full text
    Article
  15. 45875

    An Ultra-Low-Power Static Contention-Free 25-Transistor True Single-Phase-Clocked Flip-Flop in 55 nm CMOS by Jiliang Liu, Huidong Zhao, Zhi Li, Kangning Wang, Shushan Qiao

    Published 2024-01-01
    “…The proposed FF is implemented in 55 nm CMOS technology. Post-layout simulation results demonstrate that at a supply voltage of 0.6 V and 10% data activity, the proposed circuit consumes only 0.153 fJ/cycle.…”
    Get full text
    Article
  16. 45876
  17. 45877

    ASSESSMENT OF BETAWI DANCE PRACTICE LEARNING E-ASSESSMENT BASED by Dinny Devi Triana Triana, B. Kristiono Soewardjo, Bambang P Adhi, Agus Budiman, Tatang Taryana

    Published 2023-11-01
    “…“Merdeka Belajar Kampus Merdeka” (MBKM) is a policy that prepares students ready for use in various joints of life, thus demanding the competence of students and educators in using and utilizing technology in learning. One of MBKM's policies is a student exchange that is converted to 20 credits. …”
    Get full text
    Article
  18. 45878

    Sports Big Data: Management, Analysis, Applications, and Challenges by Zhongbo Bai, Xiaomei Bai

    Published 2021-01-01
    “…With the rapid growth of information technology and sports, analyzing sports information has become an increasingly challenging issue. …”
    Get full text
    Article
  19. 45879
  20. 45880