Showing 50,741 - 50,760 results of 68,043 for search '"technology"', query time: 0.23s Refine Results
  1. 50741
  2. 50742

    Optical Coherence Tomography (Angiography) Biomarkers in the Assessment and Monitoring of Diabetic Macular Edema by Corina-Iuliana Suciu, Vlad-Ioan Suciu, Simona-Delia Nicoara

    Published 2020-01-01
    “…Significant progress has been made in recent years in optical coherence tomography and angiography technology. At the same time, various parameters have been attributed the role of biomarkers creating the frame for new monitoring and treatment strategies and offering new insights into the pathogenesis of diabetic retinopathy and diabetic macular edema. …”
    Get full text
    Article
  3. 50743

    Innovative design and experimental verification of cam shedding for high-speed looms by Haifei Qiu, Ming Chen, Feiyang Li, Yifan Zhang

    Published 2025-01-01
    “…Furthermore, an experimental proportional model was produced using 3D printing technology and tested for motion performance at varying rotational speeds, verifying the design's theoretical accuracy and practical feasibility, indicating that this mechanism runs smoothly and reliably in lifting and returning the heald frame by cam; meanwhile, the yarn deformation and shed characteristics are apparent, meeting the requirements of the shedding weaving process of plain fabric. …”
    Get full text
    Article
  4. 50744

    Intelligent Traffic Management System Based on the Internet of Vehicles (IoV) by Samir A. Elsagheer Mohamed, Khaled A. AlShalfan

    Published 2021-01-01
    “…The present era is marked by rapid improvement and advances in technology. One of the most essential areas that demand improvement is the traffic signal, as it constitutes the core of the traffic system. …”
    Get full text
    Article
  5. 50745

    3D Face Modeling Algorithm for Film and Television Animation Based on Lightweight Convolutional Neural Network by Cheng Di, Jing Peng, Yihua Di, Siwei Wu

    Published 2021-01-01
    “…Through the analysis of facial feature extraction technology, this paper designs a lightweight convolutional neural network (LW-CNN). …”
    Get full text
    Article
  6. 50746

    In situ minimally invasive 3D printing for bone and cartilage regeneration - a scoping review by Maintz Michaela, Tomooka Yukiko, Eugster Manuela, Gerig Nicolas, Sharma Neha, Thieringer Florian M., Rauter Georg

    Published 2024-09-01
    “…In this scoping review, we provide an overview of the current state of in situ minimally invasive 3D printing technology for bone and cartilage regeneration and discuss its advantages and current challenges.…”
    Get full text
    Article
  7. 50747

    How does agricultural insurance influence grain production scale? An income-mediated perspective by Dainan Hou, Xin Wang, Xin Wang

    Published 2025-01-01
    “…This study applies the von Neumann-Morgenstern expected utility model, coupled with theories on economies of scale, technology diffusion, and rational choice, to examine the theoretical links between agricultural insurance, farmers’ income, and grain production scale.ResultsUsing panel data from 27 Chinese provinces between 2011 and 2021, analyzed through fixed-effects and mediation models, the study finds that agricultural insurance positively, albeit moderately, impacts the scale of grain production, with farmers’ income serving as a partial mediating factor.DiscussionBased on these findings, we recommend expanding agricultural insurance coverage, developing a multi-level insurance framework, and enhancing insurance protection levels to bolster sustainable agricultural development and food security in China.…”
    Get full text
    Article
  8. 50748

    Outcomes of antibiotic therapy and transvaginal ultrasound-guided efficacy of transvaginal ultrasound-guided drainage in treating tubo-ovarian abscesses: Three case reports by Zahra Heidar, Tayebeh Esfidani, Atefeh Moridi, Mahtab Anvari

    Published 2025-01-01
    “…Conclusion: Patients who have ovarian endometrioma and undergo an assisted reproductive technology cycle, as well as ovum pick up, increase the possibility of TOA occurrence in them. …”
    Get full text
    Article
  9. 50749
  10. 50750
  11. 50751
  12. 50752

    The Relationship between Turkish Middle School Students’ 21st Century Skills and STEM Career Interest: Gender Effect by Nejla Atabey, Mustafa Sami Topcu

    Published 2021-02-01
    “…Several conceptual and theoretical studies on the importance of science-technology-engineering-mathematics (STEM) careers and the 21st century skills required for these careers have been carried out; because they have been accepted as important for the improvement of society and maintenance of economic growth. …”
    Get full text
    Article
  13. 50753

    The Impact of Climate Change on India-Russia Relations by Uma Purushothaman, Reinhart Philip

    Published 2023-05-01
    “…This paper examines the potential effects on livelihoods, agriculture, and trade, and investigates whether India and Russia can find areas of cooperation despite their differing roles as fossil fuel exporters and consumers.Despite their reliance on Western technology transfer, India and Russia have the opportunity to collaborate and develop new technologies together. …”
    Get full text
    Article
  14. 50754
  15. 50755
  16. 50756
  17. 50757
  18. 50758
  19. 50759

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  20. 50760