Showing 52,381 - 52,400 results of 68,043 for search '"technology"', query time: 0.22s Refine Results
  1. 52381
  2. 52382

    UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design by Jin Dai, Yunfei Gao, Chao Cai, Wei Xiong, Manjia Liu

    Published 2025-01-01
    “…Unmanned aerial vehicle (UAV)-enabled inspection is regarded as a promising technology in the electricity system. This paper investigates a UAV-enabled inspection system in an urban environment with no-fly zones (NFZs), where the UAV flies to inspection points to capture images while constrained by limited onboard energy. …”
    Get full text
    Article
  3. 52383

    Proof of storage with corruption identification and recovery for dynamic group users by Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA

    Published 2022-10-01
    “…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
    Get full text
    Article
  4. 52384
  5. 52385

    Designing a prototype trauma registry framework for a tertiary health institution in a low- and middle-income country: A qualitative study. by Helen Adesoba, Adesola Olumide, Kehinde Oluwadiya, Ajibola Oladiran, Kehinde Ojifinni, Oluwafemi Popoola, Carl Bonander

    Published 2025-01-01
    “…Following this scope, the analysis led to the identification of 21 essential components and activities for the TR, which were then organised into six categories: registry personnel, computers and other materials, trainings, technology infrastructure, administrative services, and monitoring and evaluation.…”
    Get full text
    Article
  6. 52386
  7. 52387
  8. 52388
  9. 52389

    Development and Optimization of a Real-Time Monitoring System of Small-Scale Multi-Purpose Juice Extractor by Tae-Hyeon Kim, Jae-Min Jung, Wang-Hee Lee

    Published 2025-01-01
    “…Such technologies are considered economically burdensome and technically challenging for small-scale enterprises to adopt. …”
    Get full text
    Article
  10. 52390

    Nomophobia and University Business Students’ Burnout in Online Learning: Mediating effect of Fear of Missing Out by Gangaram Biswakarma, Basu Dev Lamichhane, Deepika Neupane, Keshav Subedi

    Published 2024-10-01
    “…The study established the psychological impact of technology on student well-being in digital learning, highlighting the connection between Nomophobia, Fear of Missing Out, and Student Burnout, and suggests interventions for positive online engagement. …”
    Get full text
    Article
  11. 52391
  12. 52392
  13. 52393
  14. 52394

    Construction Techniques and Quality Test and Evaluation of Lightweight Cellular Concrete Mixed with Fly Ash as Subgrade Material by Xin Liu, Chengwei Ni, Hong Ji, Shuyan Tan, Baoning Hong

    Published 2019-01-01
    “…Firstly, the construction technology process and technological measures are put forward, according to the site construction conditions and quality requirements. …”
    Get full text
    Article
  15. 52395
  16. 52396
  17. 52397
  18. 52398

    Processing Methods for Digital Image Data Based on the Geographic Information System by Xi Wang, Taizheng Chen, Dongwei Li, Shiqi Yu

    Published 2021-01-01
    “…Therefore, on the basis of summarizing and analyzing previous research works, this paper expounded the research status and significance of processing methods for digital image data, elaborated the development background, current status, and future challenges of the GIS technology, introduced the methods and principles of permutation matrix algorithm and subimage averaging method, constructed the processing model for digital image data based on GIS, analyzed the data structure and its database establishment for digital image, proposed the processing methods for digital image data based on GIS, performed the enhancement processing and calculation classification of digital image data, and finally conducted a case analysis and its result discussion. …”
    Get full text
    Article
  19. 52399
  20. 52400