Showing 62,741 - 62,760 results of 68,043 for search '"technology"', query time: 0.27s Refine Results
  1. 62741

    Using statistical traffic analysis to calculate the confidential means of information transmission by Нух Таха Насіф

    Published 2021-01-01
    “…This combines the advantages of two security technologies. Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. …”
    Get full text
    Article
  2. 62742

    Assessing the Current Limitations of Large Language Models in Advancing Health Care Education by JaeYong Kim, Bathri Narayan Vajravelu

    Published 2025-01-01
    “…This study aims to evaluate the application of state-of-the-art LLMs in health care education, highlighting the following shortcomings as areas requiring significant and urgent improvements: (1) threats to academic integrity, (2) dissemination of misinformation and risks of automation bias, (3) challenges with information completeness and consistency, (4) inequity of access, (5) risks of algorithmic bias, (6) exhibition of moral instability, (7) technological limitations in plugin tools, and (8) lack of regulatory oversight in addressing legal and ethical challenges. …”
    Get full text
    Article
  3. 62743

    Shared services: case study on the performance of the controllership in 13 Latin American countries by Ana Cristina de Faria, Márcio Antonio Gonçalves

    Published 2010-01-01
    “…The limitation was the study of only a multinational organization, but it was found that SS contribute to the decision-making process of managers, because they operate with high level services, stimulate technological investments, generate economies of scale and obtain the satisfaction of its internal customer-partners. …”
    Get full text
    Article
  4. 62744
  5. 62745

    Influence of Personality on Shape-Based Design Activities by Stefano Filippi, Daniela Barattin

    Published 2019-01-01
    “…As the literature demonstrates, designers’ personality influences design activities like different ways to represent environments and/or products, technological advances, etc.. Nevertheless, an exhaustive analysis on the influence of personality on design activities involving different representations is missing. …”
    Get full text
    Article
  6. 62746

    Accurate Dehydrogenation Enthalpies Dataset for Liquid Organic Hydrogen Carriers by Hassan Harb, Sarah N. Elliott, Logan Ward, Ian T. Foster, Stephen J. Klippenstein, Larry A. Curtiss, Rajeev Surendran Assary

    Published 2025-01-01
    “…By utilizing the accurate quantum chemical method G4MP2 we expand the QM9 database and explore new avenues for the exploration of hydrogen storage technologies (electrochemical LOHCs, alkali metal-LOHCs, and mixtures of LOHCs). …”
    Get full text
    Article
  7. 62747

    Digital Twin in Computational Design and Robotic Construction of Wooden Architecture by Ye Zhang, A. Meina, Xuhao Lin, Kun Zhang, Zhen Xu

    Published 2021-01-01
    “…A perception-modeling system to scan the source materials on-site and send their data simultaneously to design software was developed by using physical sensors and computational technologies in an innovative manner. The data was used for architectural programs to generate design outcomes and guide the robotic construction. …”
    Get full text
    Article
  8. 62748

    Electric Aviation Development and Future Prospect by Li Zhoujinpeng

    Published 2025-01-01
    “…The study also analyzes the advantages and disadvantages of current electrified aircraft technologies. Additionally, it considers the policies and investments necessary to stimulate the advancement of electric aviation. …”
    Get full text
    Article
  9. 62749

    Language Teacher Identity in a Non-Native Context: The case of Teachers of English Language in Ghana by Joyce Anku

    Published 2024-06-01
    “…Professionally, subject-matter knowledge, pedagogical knowledge and technological knowledge were found. Lastly, key contextual identity defining factors are curriculum and educational policies, classroom conditions and intrinsic motivation from learners’ success stories. …”
    Get full text
    Article
  10. 62750

    Structural and content characteristics of innovative pedagogical system by Sergey L. Rykov

    Published 2020-12-01
    “…The author of the research defines the main components of the structure of innovative activity of a teacher, the system-forming elements of the pedagogical system, and the list of innovative pedagogical technologies. The analysis of scientific literature and personal pedagogical experience allowed us to establish a historical and pedagogical connection between the factors and conditions of the emergence of an innovative pedagogical system and the direction of its forms, methods and means. …”
    Get full text
    Article
  11. 62751

    Impact of Digital Media on Political Campaigns by Thabiso Muswede

    Published 2022-06-01
    “…Application of the Adaptive structuration and Media richness theories is employed to explicate the role of information technologies in facilitating societal change. The article argues that, disintermediation in political campaigns results from unfettered access to alternative means of information with potential to diminish the power of the “voice”; stimulate new forms of political consciousness; cultivate optimisation of political engagement and yield truism through verification of political information both pre and post elections. …”
    Get full text
    Article
  12. 62752

    BENEFITS RESULTING FROM DEVELOPING LASTING RELATIONSHIPS WITH CUSTOMERS IN COMPANIES RENDERING SERVICES by Dorota Grego-Planer, Katarzyna Liczmańska, Joanna Petrykowska

    Published 2013-12-01
    “…The examples of such trends include intensification of competitiveness, market saturation, growing consumer demands, consumers’ increased access to modern technologies resulting in free use of information, which also means a possibility of comparing various market offers. …”
    Get full text
    Article
  13. 62753

    Dynamic Search Mechanism with Threat Prediction in a GNSS Receiver by Fang Liu, Meng Liu

    Published 2017-01-01
    “…In view of the limitations and nonadaptability of the current search technologies as well as on the basis of the proportionality peak judgment mechanism, a dynamic search mechanism with threat prediction (DSM-TP) is proposed in this paper, in which we define a series of preset coefficients and a threat index to optimize the decision mechanism. …”
    Get full text
    Article
  14. 62754

    Synthesis of Specifically Modified Oligonucleotides for Application in Structural and Functional Analysis of RNA by Nico Rublack, Hien Nguyen, Bettina Appel, Danilo Springstubbe, Denise Strohbach, Sabine Müller

    Published 2011-01-01
    “…Beyond synthetic RNAs for antisense, aptamer, ribozyme, and siRNA technologies, oligoribonucleotides carrying site-specific modifications for structure and function studies are needed. …”
    Get full text
    Article
  15. 62755

    Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA

    Published 2014-11-01
    “…There is no doubt that mobile payment is the spotlight in Internet finance now.Although users can enjoy quick and convenient services,they have to face with more severe security problems at the same time:the attack incidents,such as cellphone Trojan and privacy leaks emerge endlessly.Lots of viruses which are designed for attacking financial payments can steal users’ personal information including account,password and verification code in the proceedings of remote payment and near field communication.Security issues have already seriously impeded the further development of the mobile payment market.To solve the above problems,discusses the security issues in mobile terminals,payments,network and interactive logic of banking business from financial institutions’ perspective was discussed systematically.In addition,current status of relevant security key technologies are summarized from academic research community and industry fields.Finally,based on related research achievements,the design of system architecture and suggestions for mobile payment security are proposed,which can guide the future development of commercial bank.…”
    Get full text
    Article
  16. 62756

    Water Management in Wheat Farming in Romania: Simulating the Irrigation Requirements with the CROPWAT Model by Dana Maria (Oprea) Constantin, Florentina Iuliana Mincu, Daniel Constantin Diaconu, Cristina Doina Burada, Elena Băltățeanu

    Published 2024-12-01
    “…The methodology used was able to highlight this fact, as major changes are needed in future technological processes in the current context of climate change. …”
    Get full text
    Article
  17. 62757

    Experimental Analysis of Deformation Mechanics and Stability of a Shallow-Buried Large-Span Hard Rock Metro Station by Wei Li, Jiwen Bai, Kexian Li, Shijie Zhang

    Published 2020-01-01
    “…Based on a certain Qingdao metro station, a large-scale three-dimensional model test has been carried out to investigate the stability of the surrounding rock masses (hard rock) and a large-span metro station under different excavation methods and technologies. The model test includes an entire section excavation, an arch-cover excavation, and a primary support arch-cover excavation. …”
    Get full text
    Article
  18. 62758

    Evidence-Based Cerebral Vasospasm Surveillance by Heather Kistka, Michael C. Dewan, J. Mocco

    Published 2013-01-01
    “…In this paper, the authors review the various surveillance technologies available to detect cerebral vasospasm in the days following aSAH. …”
    Get full text
    Article
  19. 62759

    Low-loss on-chip superconducting microwave circulator assisted by shunting capacitors by N. Pradeep Kumar, Dat Thanh Le, Prasanna Pakkiam, Thomas M. Stace, Arkady Fedorov

    Published 2025-01-01
    “…Ferrite-free circulators that are passive and readily integratable on a chip are highly sought-after in quantum technologies based on superconducting circuits. In our previous work, we implemented such a circulator using a three-Josephson-junction loop that exhibited unambiguous nonreciprocity and signal circulation, but required junction energies to be within 1% of design values. …”
    Get full text
    Article
  20. 62760

    The Centrifugal State: In Search of an Explanation of Why Countries Decentralise by Rodríguez-Pose Andrés

    Published 2024-12-01
    “…Through the dual lenses of the efficiency-based decentralisation theorem and political economy analysis, I discuss how globalisation, technological upheaval, and innovations in governance have fundamentally reshaped the relationship between political centres and periphery within countries. …”
    Get full text
    Article