Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
62221
Design and Kinematics Simulation of Adhesive Tape Fixing Devices of Self-walking Winding Packaging Robots Based on Adams
Published 2023-05-01“…The development of a self-propelled winding and packaging robot can significantly push up the technological progress of the industry, and the key to the development of this robot is the design of the packaging film fixing device. …”
Get full text
Article -
62222
Nonlinear Pulse Shaping in Fibres for Pulse Generation and Optical Processing
Published 2012-01-01“…The development of new all-optical technologies for data processing and signal manipulation is a field of growing importance with a strong potential for numerous applications in diverse areas of modern science. …”
Get full text
Article -
62223
Strategic Antecedents and Consequents for the Performance of E-Business Companies
Published 2017-01-01“…The research is supported theoretically by the Technological, Organizational and Environmental framework (TOE), derived from the Diffusion of Innovation Theory (DIT), for the Strategic Background (IFINEDO, 2011), by the Business Model theory (OSTERWALDER; PIGNEUR; 2010; SOUZA; BATISTA, 2014) and by the business performance literature (RAMANUJAN; VENKATRAMAN, 1987). …”
Get full text
Article -
62224
Modern approaches to treatment of acute anaerobic paraproctitis
Published 2011-05-01“…Ways of improvement of treatment results at AP – perfection of tactical and technological level of surgical interventions, improvement of preoperative preparation, methods of anaestesia, prevention of acute cardiopulmonary failure. …”
Get full text
Article -
62225
Generalized Aggressive Periodontitis and Its Treatment Options: Case Reports and Review of the Literature
Published 2012-01-01“…However, with the exponential rate of developments in periodontal research, regenerative therapy, tissue engineering, and genetic technologies, the future seems promising in regard to options at managing the disease. …”
Get full text
Article -
62226
Recent research on chemically modifying the surface of zero-valent iron: A mini review
Published 2025-03-01“…Furthermore, the article discusses the prospects and challenges associated with modified ZVI, offering valuable insights for future research and the application of environmental remediation technologies.…”
Get full text
Article -
62227
Research progress of trusted sensor-cloud based on fog computing
Published 2019-03-01“…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
Get full text
Article -
62228
Advances in personalized gastroenterology and hepatology 2016
Published 2016-08-01“…On the other hand, using high throughput array and other technologies, it is possible to simultaneously analyze thousands of genes (DNA) or gene products (RNA and proteins), resulting in an individual gene or gene expression profile (‘signature’) or to characterize the individual microbiome and its pathogenetic potential. …”
Get full text
Article -
62229
Experimental Study on Quick‐Locking Reinforcement Model for Local Defects in Pipelines in the Rich Water Area
Published 2025-01-01“…This study contributes to improving the reliability and effectiveness of pipeline repair technologies, offering practical solutions for addressing pipeline leakage and instability in challenging environments.…”
Get full text
Article -
62230
Resilience and strategic management: ways to ensure economic and social security of Ukrainian enterprises during long-term warfare
Published 2024-12-01“…The documentary sources consulted underline the importance of international cooperation, technological innovation, and the development of a favorable regulatory framework to foster business resilience and ensure operational continuity in a context of uncertainty and risk. …”
Get full text
Article -
62231
Maximizing the Rate of IRS-Assisted Downlink NOMA Systems
Published 2022-01-01“…Nonorthogonal multiple access (NOMA) techniques and intelligent reflecting surface (IRS) are being explored as potential essential technologies for future wireless communications. Accordingly, this paper provides a network framework for IRS-aided downlink NOMA transmission, in which IRS is employed to improve the NOMA system’s transmission performance, and optimization problems are raised to maximize the achievable rate. …”
Get full text
Article -
62232
Perspectives of Integrative Cancer Genomics in Next Generation Sequencing Era
Published 2012-06-01“…The explosive development of genomics technologies including microarrays and next generation sequencing (NGS) has provided comprehensive maps of cancer genomes, including the expression of mRNAs and microRNAs, DNA copy numbers, sequence variations, and epigenetic changes. …”
Get full text
Article -
62233
A NB-IoT access scheme based on Beta distribution
Published 2021-09-01“…As one of the emerging technologies of low-power wide-area Internet of things, narrow band Internet of things (NB-IoT) faces the pressure and challenge of massive connections of terminals.Aiming at practical application scenarios, a preamble allocation scheme based on Beta distribution was proposed.In this scheme, the energy consumption of each time slot device was firstly calculated.The equipment was divided into high energy consumption according to two grouping methods: average energy consumption and cumulative energy consumption.The preamble was assigned to the high-energy-consuming device group first, and the remaining preamble and the conflicting preamble of the high-energy-consuming device group were assigned to the low-energy-consuming device group.The simulation results show that compared with the traditional random allocation scheme, the proposed scheme can effectively improve the average access success rate and average throughput of the NB-IoT system, and can effectively reduce the back off time.…”
Get full text
Article -
62234
Doctoral training at the University of Medical Sciences of Cienfuegos using distance learning methods, in the days of COVID-19
Published 2020-05-01“…<br /><strong>Results:</strong> it was evidenced that distant learning methods used originate a wide range of possibilities in the teaching / learning processes as technological artifacts of scientific production with high communicative and interactive potential.…”
Get full text
Article -
62235
Semantic communications for future: basic principle and implementation methodology
Published 2023-05-01“…The basic principle of semantic communications and the associated implementation methodology were introduced.First, the systematic model of semantic communications was proposed and basic concepts and terminology were deduced by comparing the fundamental differences between classic communications and semantic communications.Thus, the technological advantages of semantic communications were concluded.Then, the development of semantic information theory was retrospected and the measurement system of semantic information was established.Furthermore, the normalized conditional complexity (NCC) was proposed to evaluate the limit of semantic compression and the property of semantic typical sequence coding was discussed so as to reveal the corresponding asymptotic performance.In addition, the semantic coding transmission methods were classified into two typical schemes, that is, direct coding and transform coding, and the basic principles of these schemes were presented.For the text, speech, and image sources, the superior performance of the semantic coding techniques were demonstrated.Finally, the difficulty and open issues of the semantic communications were further concluded and further research directions were pointed out.…”
Get full text
Article -
62236
Laser Process for Selective Emitter Silicon Solar Cells
Published 2012-01-01“…However current approaches need many technological steps and alignment procedures. This paper reports on a preliminary attempt to reduce the number of processing steps and therefore the cost of selective emitter cells. …”
Get full text
Article -
62237
Bibliometric analysis on current ergonomic trends in the international labor context
Published 2024-11-01“…It is concluded that the emerging trends in Ergonomics reveal the current interest in bringing automation, artificial intelligence and new technologies to all areas of the human life. …”
Get full text
Article -
62238
Survey on network security based on blockchain
Published 2018-03-01“…With the development of the mobile internet and IoT (internet of things),mass data are stored in the cyberspace.The network security and privacy are of great significance.The blockchain-based network security mechanism has the properties of decentralization,tamper-resistance,traceability,high availability and credibility,and can be applied to improve network security.The application of blockchain in the network security was explored.The main technologies and the future research direction of the blockchain-based network security mechanism were analyzed.Firstly,the blockchain-based data protection scheme was analyzed,which applied the tamper-resistance of the blockchain to improve the authenticity and reliability of data.Secondly,the blockchain-based IoT device management scheme was analyzed,which applied the blockchain to record and execute the device control instruction and improve the authority and communication of the IoT devices.Lastly,the blockchain-based domain name system was analyzed,which applied the decentralization of the blockchain to resist distributed denial of service effectively.…”
Get full text
Article -
62239
Recreational resources – the basis of human active recreation
Published 2022-06-01“…Theoretical aspects of the recreational resources of Ukraine, their classification and scoring (biomedical, psychological, technological) are presented. A particular difficulty in assessing recreational resources lies in the fact that they should be considered from the perspective of recreation organizers and vacationers. …”
Get full text
Article -
62240
Knowledge Graphs as a source of trust for LLM-powered enterprise question answering
Published 2025-05-01“…It is tempting to think that Generative AI has made other knowledge-based technologies obsolete; that anything we wanted to do with knowledge-based systems, Knowledge Graphs or even expert systems can instead be done with Generative AI. …”
Get full text
Article