Showing 50,521 - 50,540 results of 68,043 for search '"technology"', query time: 0.24s Refine Results
  1. 50521
  2. 50522

    Design Study for a Quasisynchronous CDMA Sensor Data Collection System: An LEO Satellite Uplink Access Technique Based on GPS by Yijun Chen, Sheng Ding, Zhouchen Xie, Zhuangping Qi, Xuwen Liang

    Published 2015-09-01
    “…With the development of the LEO satellite communication technology, highly dependable wireless communication and sensor data collection using LEO satellites have been getting much attention for emergency, marine research, and forest fire disaster in the remote region. …”
    Get full text
    Article
  3. 50523

    The International Energy Agency's Role in Supporting the Sustainability of Renewable Energy Supply in Indonesia by Nurmasari Situmeang, Sindy Yulia Putri, Shafa Qisisina Desbrantoro, Yosua Saut Marulitua Gultom, Syifa Aprilia Putri

    Published 2024-03-01
    “…The IEA also facilitates international cooperation, technology transfer, and investment in the renewable energy sector. …”
    Get full text
    Article
  4. 50524
  5. 50525

    Multi-level governance of low-carbon tourism in rural China: policy evolution, implementation pathways, and socio-ecological impacts by Yi Guo, Shengchao Li

    Published 2025-01-01
    “…Our findings reveal a complex policy landscape characterized by evolving national frameworks, varied provincial adoption patterns influenced by economic, environmental, and institutional factors, and three distinct local implementation pathways: technology-driven, community-based, and policy-led. …”
    Get full text
    Article
  6. 50526
  7. 50527
  8. 50528

    Magnetic field based finite element method for magneto-static problems with discontinuous electric potential distributions by Bénard, Sabrina, Cappanera, Loic, Herreman, Wietze, Nore, Caroline

    Published 2023-04-01
    “…This work is motivated by our interest in Liquid Metal Batteries (LMBs), a promising technology for storing intermittent renewable sources of energy in large scale energy storage devices. …”
    Get full text
    Article
  9. 50529

    Project portfolio management in an educational organization by Vera M. Zhurakovskaya, Olga A. Olicheva

    Published 2021-07-01
    “…Scientific relevance is the development of a project portfolio management structure in EО from the standpoint of an integrative approach, expressed in the integration of knowledge related to the management of project teams of teachers, the essence of Scrum project management technology, the use of the Trello electronic service, which provides effective management of a project portfolio, including the online mode. …”
    Get full text
    Article
  10. 50530

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  11. 50531
  12. 50532

    Optimization of the heat transfer efficiency of a ground source heat pump heating system via FLUENT numerical simulation with fluid–solid coupling by Wei Wei

    Published 2025-01-01
    “…As an energy-saving and environmentally friendly technology, ground source heat pumps (GSHPs) show great potential for use in winter heating and summer cooling. …”
    Get full text
    Article
  13. 50533
  14. 50534
  15. 50535
  16. 50536

    Research progress on the application of mobile health in weight management of pregnant and postpartum women (移动医疗在孕产妇体质量管理中的应用现状) by ZHANG Jiayu (张佳宇), TAO Yuexian (陶月仙), ZHOU Qi (周琪), ZHANG Na (张娜)

    Published 2024-01-01
    “…Mobile health (mHealth) technology has the potential to play a key role in improving the health of patients with chronic diseases. …”
    Get full text
    Article
  17. 50537
  18. 50538
  19. 50539
  20. 50540