Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
52081
مروری بر پوشش های بر پایه سل-ژل مورد استفاده جهت حفاظت زیرآیندهای فلزی در برابر خوردگی
Published 2015-09-01Get full text
Article -
52082
Image double fragile watermarking algorithm based on block neighborhood
Published 2023-06-01“…To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborhood was proposed.The image was divided into non-overlapping blocks of size 4×4 and block truncation coding was used to generate the recovery watermark based on the image block.For each image block, a neighborhood of a proper size was specified and two mapping blocks were randomly selected from the regions within and outside the neighborhood.Then the recovery watermark was embedded into the two mapping blocks simultaneously.The image block neighborhood setting mechanism of the algorithm ensured that the image block maintains a certain distance from its corresponding mapping block.Additionally, the selection mechanism of mapping blocks inside and outside the image block neighborhood ensured a certain distance between the two mapping blocks, thereby guaranteeing the security of the watermark.In the case of continuous region tampering, the relationship between the tampered region and the neighborhood of the image block was analyzed theoretically.The analysis showed that a suitable image block neighborhood can improve the average recovery rate of the tampered area compared with the random mapping embedding algorithm.Besides, the distribution trend of the average recovery rate of the tampered area and the recovery rate of each image block in the tampered area were given by numerical calculation.It was found that the tampered area image block can be recovered 100%, some image blocks in the center of the tampered area can be recovered 100%, and the recovery rate of image blocks in tampered area will be reduced.The experimental results verify the rationality and effectiveness of the theoretical analysis.Moreover, when the neighborhood parameters are large, the proposed algorithm achieves a higher average recovery rate of the tampered region than the random mapping embedding algorithm in the case of continuous region tampering.…”
Get full text
Article -
52083
SWOT Analysis for Marketing Strategies of Fajar Margiyono's Bag and Luggage Business in Surakarta
Published 2025-01-01“…Product innovation includes introducing eco-friendly and multifunctional luggage designs tailored to specific customer segments, such as travelers and professionals. Adopting digital technology entails creating an e-commerce platform, enhancing social media marketing, and utilizing customer relationship management (CRM) software to improve customer interactions. …”
Get full text
Article -
52084
UX-MAPPER: An automated approach to analyze app store reviews with a focus on UX
Published 2025-01-01Get full text
Article -
52085
مروری بر روشهای بهبود نانولولههای TiO2 برای استفاده در تجزیه فوتوکاتالیستی مواد رنگزا
Published 2019-08-01Get full text
Article -
52086
Research on strong robustness watermarking algorithm based on dynamic difference expansion
Published 2023-10-01“…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
Get full text
Article -
52087
-
52088
Performance Study of Ultraviolet AlGaN/GaN Light-Emitting Diodes Based on Superlattice Tunneling Junction
Published 2024-12-01Get full text
Article -
52089
A Decomposed-Ensemble Prediction Framework for Gate-In Operations at Container Terminals
Published 2024-12-01Get full text
Article -
52090
-
52091
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01“…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
Get full text
Article -
52092
مروری بر روشهای سنتز نانوداتهای کربن و بررسی خصوصیات نشری آنها
Published 2016-02-01Get full text
Article -
52093
Sharp needle reconstructs peripheral outflow for patients with malfunctional arteriovenous fistula
Published 2024-12-01“…The immediate patency rate for the internal fistulas was 100%, with 3-month, 6-month, and 12-month patency rates at 91.3%, 78.3%, and 43.5%, respectively.Conclusion Sharp needle technology merged with PTA presents an effective and secure minimally invasive method for reconstructing the outflow tract, offering a new solution for recanalizing high-pressure or occluded fistulas.…”
Get full text
Article -
52094
Islam and survivals of pre-islamic beliefs in the Golden Horde on the materials of architectural funeral structures
Published 2023-12-01“…Results and scientific novelty: On the basis of building technology in the Golden Horde, two areas of architecture are distinguished – building from brick (fired and raw) and building from stone. …”
Get full text
Article -
52095
Distribution Design of Bottled Mineral Water ‘Airku’ with Distribution Requirement Planning Method (DRP)
Published 2023-02-01Get full text
Article -
52096
Design, development, and performance study of a PWM based thermostat system for viscosity measurement
Published 2025-03-01“…It comprises sensors and microcontroller-based technology to automatically regulate the temperature of bath liquid in a precise way. …”
Get full text
Article -
52097
Influencing Factors of Shear Instability Characteristics of Rock Joints: Experimental and Theoretical Study
Published 2025-01-01Get full text
Article -
52098
-
52099
Determining the Thermal Conductivity of Clay during the Freezing Process by Artificial Neural Network
Published 2021-01-01“…By measuring the thermal conductivity of clay using a transient hot-wire method in the laboratory, the influential factors of the thermal conductivity of soils during the freezing process were analyzed, and a predictive model of thermal conductivity was developed with an artificial neural network (ANN) technology. The results show that the variation of thermal conductivity can be divided into three stages with decreasing temperature, positive temperature stage, transition stage, and negative temperature stage. …”
Get full text
Article -
52100
AI AS A CREATIVE PARTNER: HOW ARTIFICIAL INTELLIGENCE IMPACTS STUDENT CREATIVITY AND INNOVATION: CASE STUDY OF STUDENTS FROM LATVIA, UKRAINE AND SPAIN
Published 2024-12-01“…This study explores students' perceptions of Artificial Intelligence (AI) in the educational process, focusing specifically on creativity and confidence. As AI technology becomes increasingly integrated into higher education, understanding its impact on students' creative development and their confidence in using AI tools is crucial for shaping effective educational practices. …”
Get full text
Article