Showing 52,601 - 52,620 results of 68,043 for search '"technology"', query time: 0.25s Refine Results
  1. 52601
  2. 52602

    Resilience in virtual education: Designing and validating a scale in higher education by Ghanizadeh Afsaneh, Yazdi Maryam Majidi

    Published 2023-12-01
    “…The emergence of COVID-19 influenced different aspects of human life including education. Thanks to technology, especially ICT, Virtual Education (VE) provides the opportunity to continue education in such crises. …”
    Get full text
    Article
  3. 52603

    Effect of Storage and Processing Methods on the Aroma of Edible Flowers: A Review (Chinese and English versions) by LIANG Zi-jian, YANG Jing-wen, FANG Zhong-xiang

    Published 2025-01-01
    “…Additionally, the total volatile content of edible flowers could be enhanced using various drying technologies. Compared with freeze-drying, hot air drying technologies could generate more volatiles, especially aldehydes. …”
    Get full text
    Article
  4. 52604
  5. 52605

    Artificial molecular communication network based on DNA nanostructures recognition by Junke Wang, Mo Xie, Lilin Ouyang, Jinggang Li, Lianhui Wang, Chunhai Fan, Jie Chao

    Published 2025-01-01
    “…The developed DR-AMCN enhances our understanding of signal transduction mechanisms, dynamic processes, and regulatory networks in organisms, contributing to the solution of informatics and computational problems, as well as having potential in computer science, biomedical engineering, information technology and other related fields.…”
    Get full text
    Article
  6. 52606
  7. 52607
  8. 52608

    Ethical aspects of educational activity in the digital environment: future teachers’ views by Ol'ga A. Katushenko

    Published 2023-12-01
    “…As research methods, the authors used formal logic, inductive and deductive analysis, study and generalization of the experience of future generations as part of the analysis of the products of their pedagogical activities (case technology), as well as questionnaires and pedagogical observation. …”
    Get full text
    Article
  9. 52609

    Cardiac cycle: an observational/interventional study protocol to characterise cardiopulmonary function and evaluate a home-based cycling program in children and adolescents born ex... by Jeanie L Y Cheong, Michael M H Cheung, Melanie M Clarke, Jonathan P Mynard, Claire E Willis

    Published 2022-07-01
    “…The intervention will consist of a 10-week stationary cycling programme, utilising Zwift technology.Ethics and dissemination The study is approved by the Ethics Committee of the Royal Children’s Hospital Melbourne under HREC2019.053. …”
    Get full text
    Article
  10. 52610
  11. 52611
  12. 52612

    Features of conducting a forensic commodity examination of furniture products by M. V. Hаrbuz, L. Yu. Ulybіnа

    Published 2023-09-01
    “…The main identification tasks of a commodity expertise are to determine the type, name and assortment group of the product; what materials and components were used in its manufacture; what technology was used to manufacture the furniture product; whether the design parameters and consumer properties of the product under investigation correspond to those stated in the regulatory and technical documentation. …”
    Get full text
    Article
  13. 52613
  14. 52614
  15. 52615
  16. 52616

    Path Planning Optimization of Smart Vehicle With Fast Converging Distance-Dependent PSO Algorithm by Muhammad Haris, Haewoon Nam

    Published 2024-01-01
    “…Path planning is a crucial technology and challenge in various fields, including robotics, autonomous systems, and intelligent transportation systems. …”
    Get full text
    Article
  17. 52617
  18. 52618

    Integrating spatial-temporal risk maps with candidate trajectory trees for explainable autonomous driving planning by Qiyuan Liu, Jiawei Zhang, Jingwei Ge, Cheng Chang, Zhiheng Li, Shen Li, Li Li

    Published 2025-12-01
    “…With increasing public concern about autonomous vehicles, there is a growing demand for developing explainable autonomous driving planning technology. Traditional risk field methods use handcrafted potential field models to explain driving risks in a scenario. …”
    Get full text
    Article
  19. 52619

    Lightweight mobile Ad Hoc network authentication scheme based on blockchain by Xu ZHANG, Xin MA

    Published 2020-08-01
    “…In order to solve the problem that the existing authentication method can’t track the vulnerable of malicious nodes and depends on the centralized authentication center,based on the de-centralization,tamper-proof and traceable characteristics of blockchain technology,a distributed lightweight mobile Ad Hoc network authentication scheme was proposed.It included the establishment of peer-to-peer network,the design of certification ledger and the choice of consensus mechanism.Then the role of smart contracts was analyzed and discussed.In this scenario,when the maximum transmission delay τ<sub>max</sub> between a pair of peers is given,the relationship between node authentication timeδand network size <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msubsup> <mi>N</mi> <mi>t</mi> <mrow> <mtext>all</mtext></mrow> </msubsup></math></inline-formula>is satisfied with<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mfrac> <mrow> <msubsup> <mi>N</mi> <mi>t</mi> <mrow> <mtext>all</mtext></mrow> </msubsup> </mrow> <mn>3</mn> </mfrac> <mo>+</mo><mn>7</mn></mrow> <mo>)</mo></mrow><msub> <mi>τ</mi> <mrow> <mtext>max</mtext></mrow> </msub> <mo>≤</mo><mi>δ</mi><mo>≤</mo><mn>3</mn><mo stretchy="false">(</mo><msubsup> <mi>N</mi> <mi>t</mi> <mrow> <mtext>all</mtext></mrow> </msubsup> <mo>+</mo><mn>1</mn><mo stretchy="false">)</mo><msub> <mi>τ</mi> <mrow> <mtext>max</mtext></mrow> </msub></math></inline-formula> .…”
    Get full text
    Article
  20. 52620