Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
62761
Conductive filament formation in the failure of Hf0.5Zr0.5O2 ferroelectric capacitors
Published 2025-01-01“…Ferroelectric materials provide pathways to higher performance logic and memory technologies, with Hf0.5Zr0.5O2 being the most popular among them. …”
Get full text
Article -
62762
Using Journey Mapping within Extension: A Tool for Supporting Behavior Change Programs
Published 2019-04-01“… Extension is an important change agency, and Extension professionals use innovative strategies to help target audiences to adopt research-based practices and technologies. Tools from commercial marketing can be applied to behavior-change campaigns, often through an underused approach known as social marketing. …”
Get full text
Article -
62763
Unravelling the Tangle of Bureaucracy at Russian Universities: Administrative Profiles
Published 2024-12-01“…The first cluster is characterized by a high proportion of administrative staff engaged in general management, research, financial issues and information and communication technologies. The second cluster has a high proportion of staff engaged in providing educational activities. …”
Get full text
Article -
62764
Artificial intelligence in rheumatology research: what is it good for?
Published 2025-01-01“…It also highlights the challenges posed by these technologies, such as ethical concerns and the need for rigorous validation and regulatory oversight. …”
Get full text
Article -
62765
Russian Spatial Development Strategy: blind spots in regional specialisations
Published 2022-03-01“…An unambiguous conclusion is the need to create a new structure and content document, taking into account the trends in the world and society technological development.…”
Get full text
Article -
62766
Surface Evaluation by Estimation of Fractal Dimension and Statistical Tools
Published 2014-01-01“…For this reason, samples with structured surfaces produced with different technologies and properties were measured and evaluated with many types of parameters. …”
Get full text
Article -
62767
Simulating quantum circuits using the multi-scale entanglement renormalization ansatz
Published 2025-01-01“…Understanding the limiting capabilities of classical methods in simulating complex quantum systems is of paramount importance for quantum technologies. Although many advanced approaches have been proposed and recently used to challenge quantum advantage experiments, novel efficient methods for the approximate simulation of complex quantum systems are still in high demand. …”
Get full text
Article -
62768
Teachers’ perspective on the use of artificial intelligence on remote experimentation
Published 2025-02-01“…The findings reveal that teachers perceive great potential in the combination of these technologies. Furthermore, the virtual assistant could offer personalised assistance in real time, which ensures accompaniment during the completion of the Remote Laboratory.…”
Get full text
Article -
62769
A survey of cybersecurity for intelligent connected-automated vehicle
Published 2020-04-01“…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
Get full text
Article -
62770
Critical updates on oral insulin drug delivery systems for type 2 diabetes mellitus
Published 2025-01-01“…Over the last 20 years, sophisticated pharmaceutical technologies have been utilized to provide insulin through oral formulations. …”
Get full text
Article -
62771
Microfluidics for Positron Emission Tomography Probe Development
Published 2010-07-01“…Owing to increased needs for positron emission tomography (PET), high demands for a wide variety of radiolabeled compounds will have to be met by exploiting novel radiochemistry and engineering technologies to improve the production and development of PET probes. …”
Get full text
Article -
62772
Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection
Published 2025-01-01“…With the advancement of computer technologies, various data models and algorithms have been integrated into industrial processes, significantly improving the efficiency of anomaly detection in datasets while reducing time and energy consumption. …”
Get full text
Article -
62773
Estrategias narrativas en las plataformas de streaming en el Perú
Published 2024-11-01“…The first Peruvian content that entered some of these platforms were cultural documentaries and fiction feature films, inscribing themselves in the dynamics of local-global tension, distinctive of these technologies. Titles produced years before they were bought were added to the catalogs of these platforms.This article aims to think about the narrative and industry strategies that are set into play in the dynamics of the entry of our audiovisual cultural products into global platforms. …”
Get full text
Article -
62774
An Evaluation and Criticism of the Revised BA Program in English Translator Training
Published 2021-12-01“…The findings revealed that in their opinion, while the program has been considerably improved regarding some factors such as integrating up-to-date courses, paying attention to applied and local needs, attending to the Persian language, paying attention to new technologies and introducing various new references, it suffers from some weaknesses with regard to some courses, their syllabi, the proposed sources, and the prerequisites. …”
Get full text
Article -
62775
Magnetic Resonance Imaging Techniques for Post-Treatment Evaluation After External Beam Radiation Therapy of Prostate Cancer: Narrative Review
Published 2024-12-01“…<b>Conclusions</b>: The integration of advanced MRI technologies into clinical routine marks the beginning of a new era of BCR with accuracy.…”
Get full text
Article -
62776
Results of analyzing the passport database ‘Spring bread wheat landraces in the VIR collection’
Published 2019-06-01“…Attention paid to landraces is also associated with the introduction of GIS technologies into PGR studies. The N. I. Vavilov All-Russian Institute of Plant Genetic Resources (VIR) holds a unique collection of spring bread wheat landraces. …”
Get full text
Article -
62777
Henryka Skolimowskiego krytyka cywilizacji zachodniej w kontekście kryzysu ekologicznego
Published 2014-06-01“…In the opinion of a Polish ecophilosopher, the latter is a symptom of the failure of a scientific-technological civilization, which Skolimowski often contemptuously calls plastic. …”
Get full text
Article -
62778
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
Published 2022-04-01“…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
Get full text
Article -
62779
Planning approach of survivable fiber-wireless broadband access network
Published 2016-05-01“…The emerging fiber-wireless(FiWi)broadband access network provides not only the new technological references for flexible broadband access anywhere and anytime,but also the research opportunities for the cost-efficient design of survivable broadband access network.The study of survivable FiWi access network planning was focused on,and an approach of survivable network planning based on wireless-rerouting protection was proposed.When any fiber link cuts,the failed optical network unit(ONU)can transfer its traffic into other normal ONUs.Solving the joint optimization problem of wireless routers placement,backup radios configuration and ONU capacity allocation was put more importance on,aiming to fully protect all traffic with the minimum deployment cost.The method of integer linear programming was employed to obtain the optimal solution for small-scale network planning.The heuristic algorithm was also proposed for the large-scale network planning.Simulation results demonstrate the effectiveness of the proposed approach in reducing network deployment cost.…”
Get full text
Article -
62780
CALCULATION OF 3-D SURFACE CRACK STRESS INTENSITY FACTOR BASED ON APDL AND UIDL
Published 2020-01-01“…This paper adopts APDL and UIDL technologies for secondary development of ANSYS software,establishes a complete model of semi-elliptical surface crack by simple interface operation with the method of model block processing. …”
Get full text
Article