Showing 62,761 - 62,780 results of 68,043 for search '"technology"', query time: 0.28s Refine Results
  1. 62761

    Conductive filament formation in the failure of Hf0.5Zr0.5O2 ferroelectric capacitors by Matthew Webb, Tony Chiang, Megan K. Lenox, Jordan Gray, Tao Ma, Jon F. Ihlefeld, John T. Heron

    Published 2025-01-01
    “…Ferroelectric materials provide pathways to higher performance logic and memory technologies, with Hf0.5Zr0.5O2 being the most popular among them. …”
    Get full text
    Article
  2. 62762

    Using Journey Mapping within Extension: A Tool for Supporting Behavior Change Programs by Colby Silvert, Laura A. Sanagorski Warner

    Published 2019-04-01
    “… Extension is an important change agency, and Extension professionals use innovative strategies to help target audiences to adopt research-based practices and technologies. Tools from commercial marketing can be applied to behavior-change campaigns, often through an underused approach known as social marketing. …”
    Get full text
    Article
  3. 62763

    Unravelling the Tangle of Bureaucracy at Russian Universities: Administrative Profiles by T. A. Akuneeva, D. P. Platonova

    Published 2024-12-01
    “…The first cluster is characterized by a high proportion of administrative staff engaged in general management, research, financial issues and information and communication technologies. The second cluster has a high proportion of staff engaged in providing educational activities. …”
    Get full text
    Article
  4. 62764

    Artificial intelligence in rheumatology research: what is it good for? by Diego Benavent, José Miguel Sequí-Sabater

    Published 2025-01-01
    “…It also highlights the challenges posed by these technologies, such as ethical concerns and the need for rigorous validation and regulatory oversight. …”
    Get full text
    Article
  5. 62765

    Russian Spatial Development Strategy: blind spots in regional specialisations by N. S. Kozyr

    Published 2022-03-01
    “…An unambiguous conclusion is the need to create a new structure and content document, taking into account the trends in the world and society technological development.…”
    Get full text
    Article
  6. 62766

    Surface Evaluation by Estimation of Fractal Dimension and Statistical Tools by Vlastimil Hotar, Petr Salac

    Published 2014-01-01
    “…For this reason, samples with structured surfaces produced with different technologies and properties were measured and evaluated with many types of parameters. …”
    Get full text
    Article
  7. 62767

    Simulating quantum circuits using the multi-scale entanglement renormalization ansatz by A. V. Berezutskii, I. A. Luchnikov, A. K. Fedorov

    Published 2025-01-01
    “…Understanding the limiting capabilities of classical methods in simulating complex quantum systems is of paramount importance for quantum technologies. Although many advanced approaches have been proposed and recently used to challenge quantum advantage experiments, novel efficient methods for the approximate simulation of complex quantum systems are still in high demand. …”
    Get full text
    Article
  8. 62768

    Teachers’ perspective on the use of artificial intelligence on remote experimentation by Fiorella Lizano-Sánchez, Ignacio Idoyaga, Pablo Orduña, Luis Rodríguez-Gil, Carlos Arguedas-Matarrita

    Published 2025-02-01
    “…The findings reveal that teachers perceive great potential in the combination of these technologies. Furthermore, the virtual assistant could offer personalised assistance in real time, which ensures accompaniment during the completion of the Remote Laboratory.…”
    Get full text
    Article
  9. 62769

    A survey of cybersecurity for intelligent connected-automated vehicle by Yufeng LI, Xiaoyuan LU, Chenhong CAO, Jiangtao LI, Hongyi ZHU, Nan MENG

    Published 2020-04-01
    “…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
    Get full text
    Article
  10. 62770

    Critical updates on oral insulin drug delivery systems for type 2 diabetes mellitus by Chan Yew Low, Wei Ling Gan, Su Jeat Lai, Rachel Su-May Tam, Jie Fei Tan, Stefanie Dietl, Lay Hong Chuah, Nicolas Voelcker, Athirah Bakhtiar

    Published 2025-01-01
    “…Over the last 20 years, sophisticated pharmaceutical technologies have been utilized to provide insulin through oral formulations. …”
    Get full text
    Article
  11. 62771

    Microfluidics for Positron Emission Tomography Probe Development by Ming-Wei Wang, Wei-Yu Lin, Kan Liu, Michael Masterman-Smith, Clifton Kwang-Fu Shen

    Published 2010-07-01
    “…Owing to increased needs for positron emission tomography (PET), high demands for a wide variety of radiolabeled compounds will have to be met by exploiting novel radiochemistry and engineering technologies to improve the production and development of PET probes. …”
    Get full text
    Article
  12. 62772

    Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection by Lu Haowen

    Published 2025-01-01
    “…With the advancement of computer technologies, various data models and algorithms have been integrated into industrial processes, significantly improving the efficiency of anomaly detection in datasets while reducing time and energy consumption. …”
    Get full text
    Article
  13. 62773

    Estrategias narrativas en las plataformas de streaming en el Perú by Giuliana Cassano, James A. Dettleff, Guillermo Vásquez

    Published 2024-11-01
    “…The first Peruvian content that entered some of these platforms were cultural documentaries and fiction feature films, inscribing themselves in the dynamics of local-global tension, distinctive of these technologies. Titles produced years before they were bought were added to the catalogs of these platforms.This article aims to think about the narrative and industry strategies that are set into play in the dynamics of the entry of our audiovisual cultural products into global platforms. …”
    Get full text
    Article
  14. 62774

    An Evaluation and Criticism of the Revised BA Program in English Translator Training by Hossein Davari, Saeed Nourzadeh, Ailin Firoozian Pouresfahani, Ghodrat Hassani

    Published 2021-12-01
    “…The findings revealed that in their opinion, while the program has been considerably improved regarding some factors such as integrating up-to-date courses, paying attention to applied and local needs, attending to the Persian language, paying attention to new technologies and introducing various new references, it suffers from some weaknesses with regard to some courses, their syllabi, the proposed sources, and the prerequisites. …”
    Get full text
    Article
  15. 62775

    Magnetic Resonance Imaging Techniques for Post-Treatment Evaluation After External Beam Radiation Therapy of Prostate Cancer: Narrative Review by Eleni Bekou, Admir Mulita, Ioannis Seimenis, Athanasia Kotini, Nikolaos Courcoutsakis, Michael I. Koukourakis, Francesk Mulita, Efstratios Karavasilis

    Published 2024-12-01
    “…<b>Conclusions</b>: The integration of advanced MRI technologies into clinical routine marks the beginning of a new era of BCR with accuracy.…”
    Get full text
    Article
  16. 62776

    Results of analyzing the passport database ‘Spring bread wheat landraces in the VIR collection’ by E. V. Zuev, A. N. Brykova, E. Yu. Kudryavtseva

    Published 2019-06-01
    “…Attention paid to landraces is also associated with the introduction of GIS technologies into PGR studies. The N. I. Vavilov All-Russian Institute of Plant Genetic Resources (VIR) holds a unique collection of spring bread wheat landraces. …”
    Get full text
    Article
  17. 62777

    Henryka Skolimowskiego krytyka cywilizacji zachodniej w kontekście kryzysu ekologicznego by Rafał Czekalski

    Published 2014-06-01
    “…In the opinion of a Polish ecophilosopher, the latter is a symptom of the failure of a scientific-technological civilization, which Skolimowski often contemptuously calls plastic. …”
    Get full text
    Article
  18. 62778

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  19. 62779

    Planning approach of survivable fiber-wireless broadband access network by Hongjun TAN, Yamin XIE, Yejun LIU

    Published 2016-05-01
    “…The emerging fiber-wireless(FiWi)broadband access network provides not only the new technological references for flexible broadband access anywhere and anytime,but also the research opportunities for the cost-efficient design of survivable broadband access network.The study of survivable FiWi access network planning was focused on,and an approach of survivable network planning based on wireless-rerouting protection was proposed.When any fiber link cuts,the failed optical network unit(ONU)can transfer its traffic into other normal ONUs.Solving the joint optimization problem of wireless routers placement,backup radios configuration and ONU capacity allocation was put more importance on,aiming to fully protect all traffic with the minimum deployment cost.The method of integer linear programming was employed to obtain the optimal solution for small-scale network planning.The heuristic algorithm was also proposed for the large-scale network planning.Simulation results demonstrate the effectiveness of the proposed approach in reducing network deployment cost.…”
    Get full text
    Article
  20. 62780

    CALCULATION OF 3-D SURFACE CRACK STRESS INTENSITY FACTOR BASED ON APDL AND UIDL by CHE FuYan, GENG LiMing

    Published 2020-01-01
    “…This paper adopts APDL and UIDL technologies for secondary development of ANSYS software,establishes a complete model of semi-elliptical surface crack by simple interface operation with the method of model block processing. …”
    Get full text
    Article