Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
50521
Exploring the Zimbabwean Technical and Vocational Education Journey: Challenges and Prospects
Published 2024-12-01Get full text
Article -
50522
Design Study for a Quasisynchronous CDMA Sensor Data Collection System: An LEO Satellite Uplink Access Technique Based on GPS
Published 2015-09-01“…With the development of the LEO satellite communication technology, highly dependable wireless communication and sensor data collection using LEO satellites have been getting much attention for emergency, marine research, and forest fire disaster in the remote region. …”
Get full text
Article -
50523
The International Energy Agency's Role in Supporting the Sustainability of Renewable Energy Supply in Indonesia
Published 2024-03-01“…The IEA also facilitates international cooperation, technology transfer, and investment in the renewable energy sector. …”
Get full text
Article -
50524
-
50525
Multi-level governance of low-carbon tourism in rural China: policy evolution, implementation pathways, and socio-ecological impacts
Published 2025-01-01“…Our findings reveal a complex policy landscape characterized by evolving national frameworks, varied provincial adoption patterns influenced by economic, environmental, and institutional factors, and three distinct local implementation pathways: technology-driven, community-based, and policy-led. …”
Get full text
Article -
50526
Simulation of water resources in ungauged region- case study in Nam Ou River Basin, Laos
Published 2025-02-01Get full text
Article -
50527
-
50528
Magnetic field based finite element method for magneto-static problems with discontinuous electric potential distributions
Published 2023-04-01“…This work is motivated by our interest in Liquid Metal Batteries (LMBs), a promising technology for storing intermittent renewable sources of energy in large scale energy storage devices. …”
Get full text
Article -
50529
Project portfolio management in an educational organization
Published 2021-07-01“…Scientific relevance is the development of a project portfolio management structure in EО from the standpoint of an integrative approach, expressed in the integration of knowledge related to the management of project teams of teachers, the essence of Scrum project management technology, the use of the Trello electronic service, which provides effective management of a project portfolio, including the online mode. …”
Get full text
Article -
50530
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
50531
First true blood pressure measurement with micropulse detection of arterial opening achieved
Published 2025-01-01Get full text
Article -
50532
Optimization of the heat transfer efficiency of a ground source heat pump heating system via FLUENT numerical simulation with fluid–solid coupling
Published 2025-01-01“…As an energy-saving and environmentally friendly technology, ground source heat pumps (GSHPs) show great potential for use in winter heating and summer cooling. …”
Get full text
Article -
50533
Similarities and differences in waste composition over time and space determined by multivariate distance analyses.
Published 2025-01-01“…The composition of solid waste affects technology choices and policy decisions regarding its management. …”
Get full text
Article -
50534
ANALYSIS AND DESIGN OF ERGONOMIC WORK POSTURE IN CUTTING PART IN PT XYZ USING REBA METHOD
Published 2022-07-01Get full text
Article -
50535
NATURAL RESOURCE ENDOWMENT AND ECONOMIC GROWTH: EVIDENCE FROM SOME SELECTED SUB-SAHARAN AFRICAN COUNTRIES
Published 2024-01-01Get full text
Article -
50536
Research progress on the application of mobile health in weight management of pregnant and postpartum women (移动医疗在孕产妇体质量管理中的应用现状)
Published 2024-01-01“…Mobile health (mHealth) technology has the potential to play a key role in improving the health of patients with chronic diseases. …”
Get full text
Article -
50537
Characterisation of plastic-based sanitary personal protective equipment following supercritical CO₂ sterilisation: A reuse strategy
Published 2025-02-01“…The significant potential of this technology for hospital applications is evident.…”
Get full text
Article -
50538
Taiwan Passengers’ Willingness to Pay for Air Sleeper Seats
Published 2022-01-01Get full text
Article -
50539
-
50540