Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
52381
مروری بر عملکرد پوشش های آلی مختلف در حفاظت از سازه های بتنی در برابر حمله ی عوامل مخرب
Published 2012-02-01Get full text
Article -
52382
UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design
Published 2025-01-01“…Unmanned aerial vehicle (UAV)-enabled inspection is regarded as a promising technology in the electricity system. This paper investigates a UAV-enabled inspection system in an urban environment with no-fly zones (NFZs), where the UAV flies to inspection points to capture images while constrained by limited onboard energy. …”
Get full text
Article -
52383
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
Get full text
Article -
52384
Energy-Dominated Local Carbon Emissions in Beijing 2007: Inventory and Input-Output Analysis
Published 2012-01-01Get full text
Article -
52385
Designing a prototype trauma registry framework for a tertiary health institution in a low- and middle-income country: A qualitative study.
Published 2025-01-01“…Following this scope, the analysis led to the identification of 21 essential components and activities for the TR, which were then organised into six categories: registry personnel, computers and other materials, trainings, technology infrastructure, administrative services, and monitoring and evaluation.…”
Get full text
Article -
52386
Advanced Control for Shipboard Cranes with Asymmetric Output Constraints
Published 2025-01-01Get full text
Article -
52387
Kinetics and Thermodynamics of Oil Extraction from Jatropha curcas L. Using Ethanol as a Solvent
Published 2015-01-01Get full text
Article -
52388
ارزیابی اثر حضور نانو رسها بر روی خواص فیزیکی و مکانیکی پوششهای نانوکامپوزیت پلیمری
Published 2015-06-01Get full text
Article -
52389
Development and Optimization of a Real-Time Monitoring System of Small-Scale Multi-Purpose Juice Extractor
Published 2025-01-01“…Such technologies are considered economically burdensome and technically challenging for small-scale enterprises to adopt. …”
Get full text
Article -
52390
Nomophobia and University Business Students’ Burnout in Online Learning: Mediating effect of Fear of Missing Out
Published 2024-10-01“…The study established the psychological impact of technology on student well-being in digital learning, highlighting the connection between Nomophobia, Fear of Missing Out, and Student Burnout, and suggests interventions for positive online engagement. …”
Get full text
Article -
52391
-
52392
-
52393
Potential Impact of GNSS Positioning Errors on the Satellite‐Navigation‐Based Air Traffic Management
Published 2022-07-01Get full text
Article -
52394
Construction Techniques and Quality Test and Evaluation of Lightweight Cellular Concrete Mixed with Fly Ash as Subgrade Material
Published 2019-01-01“…Firstly, the construction technology process and technological measures are put forward, according to the site construction conditions and quality requirements. …”
Get full text
Article -
52395
-
52396
Performance Enhancement of Indium Zinc Oxide Thin-Film Transistors Through Process Optimizations
Published 2024-01-01Get full text
Article -
52397
Probabilistic stability assessment of slope considering soft soil and silty clay foundations
Published 2025-01-01Get full text
Article -
52398
Processing Methods for Digital Image Data Based on the Geographic Information System
Published 2021-01-01“…Therefore, on the basis of summarizing and analyzing previous research works, this paper expounded the research status and significance of processing methods for digital image data, elaborated the development background, current status, and future challenges of the GIS technology, introduced the methods and principles of permutation matrix algorithm and subimage averaging method, constructed the processing model for digital image data based on GIS, analyzed the data structure and its database establishment for digital image, proposed the processing methods for digital image data based on GIS, performed the enhancement processing and calculation classification of digital image data, and finally conducted a case analysis and its result discussion. …”
Get full text
Article -
52399
Copper strontium phosphate glasses with high antimicrobial efficacy
Published 2025-02-01Get full text
Article -
52400
Comparative Analysis of Vanilla CNN and Transfer Learning Models for Glaucoma Detection
Published 2024-01-01Get full text
Article