Showing 63,721 - 63,740 results of 68,043 for search '"technology"', query time: 0.30s Refine Results
  1. 63721

    Survey of network-layer anonymous communication protocols by Liangmin WANG, Xiaoling NI, Hui ZHAO

    Published 2020-02-01
    “…An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding,content encryption,and traffic obfuscation to hide communication relationships between entities and forwarded contents.However,there is a deficiency in the balance between performance and security as an anonymous communication system operating over an overlay network.With the advance of the future internet architectures,it is possible to build an infrastructure-based anonymous communication system.Such anonymous communication systems design anonymity as network infrastructure services and provide encryption operations for routers,which can solve the part problem of scalability and performance limitations of anonymous network.They can also be called network-layer anonymous communication protocols.The existing network-layer anonymous communication protocols (LAP,Dovetail,Hornet,PHI and Taranet) were studied.The classification standard of network-layer anonymous communication protocols were introduced.Its innovation point and specific encryption ideas were briefly described,and how to keep balance between security and performance was analyzed.The shortcomings and advantages of these kinds of network anonymous communication protocols were also pointed out.Finally,the challenges faced in the development of anonymous communication systems and the problems that need to be studied in depth were proposed.…”
    Get full text
    Article
  2. 63722

    Inovasi PRO GALO untuk Meningkatkan Kompetensi dan Pembelajaran Pemeliharaan Pakaian Pelindung by Anton Abdullah, Yeti Komalasari, Wildan Nugraha, Zusnita Hermala, Direstu Amalia, Muhammad Bayu El Firdaus, Indah Nur Rahmawaty, M. Fadli

    Published 2024-12-01
    “…The implications for ARFF operations and the Aviation Fire and Rescue Study Program stress the importance of integrating advanced cleaning technologies to prepare future professionals better. …”
    Get full text
    Article
  3. 63723

    Vers une modernisation énergétique : territorialisation conflictuelle et gouvernement de la critique des nouvelles infrastructures énergétiques en moyenne montagne by Jimmy Grimault

    Published 2022-01-01
    “…Opponents to infrastructure which symbolises ecology for the sake of ecology are picking back up the gauntlet of environmental protest and proposing new, competing technological trajectories (Fressoz, 2012). To ensure the smooth deployment of energy infrastructure, eco-modernisers therefore need to rethink their acceptability strategies (Oiry, 2017). …”
    Get full text
    Article
  4. 63724

    Nutritional Qualities and Valorization Trends of Vegetable and Fruit Byproducts: A Comprehensive Review by Zenebe Tadesse Tsegay, Sarah Tewolde-Berhan Gebreegziabher, Guesh Mulaw

    Published 2024-01-01
    “…There are limitations in valorizing technologies of vegetable and fruit byproducts. Hence, further studies are vital to develop novel processing techniques for each of these byproducts. …”
    Get full text
    Article
  5. 63725

    Bioremediation of Polycyclic Aromatic Hydrocarbons in Contaminated Soils Using Vermicompost by Fazel Mohammadi-Moghadam, Ramazan Khodadadi, Morteza Sedehi, Mohsen Arbabi

    Published 2022-01-01
    “…This study provides clear evidence on the biodegradation of PHE and PYR, paving the way for the development of bioremediation technologies for the recovery of polluted ecosystems.…”
    Get full text
    Article
  6. 63726

    Students’ Experiences of Online Cooperative Learning for Economics post-Covid-19: A Case of one University in the Eastern Cape Province, South Africa by Qoyi Motsi, Mpiti Pretty Thandiswa, Makena Bulelwa

    Published 2024-12-01
    “…The findings revealed that students demonstrate academic improvement, flexibility, convenience, and exposure to technological tools. It was concluded that the use of online cooperative learning provides more benefits than setbacks. …”
    Get full text
    Article
  7. 63727

    Conceptualising Information Production in the Context of the SDHSS Ontology Ecosystem by Francesco Beretta

    Published 2024-11-01
    “…In this paper, we challenge the vision of creating a giant knowledge graph of reusable research data from multiple projects and platforms, based on Semantic Web technologies and a shared conceptualisation in the form of a commonly used ontology ecosystem, promoted by the Semantic Data for Humanities and Social Sciences project (SDHSS). …”
    Get full text
    Article
  8. 63728

    Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System by Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju

    Published 2018-01-01
    “…With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. …”
    Get full text
    Article
  9. 63729

    A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices by Chorng-Shiuh Koong, Tzu-I Yang, Chien-Chao Tseng

    Published 2014-01-01
    “…Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. …”
    Get full text
    Article
  10. 63730

    North-Arctic Specificity of the Subject of Economic Research (Methodological Aspects) by Vitaliy N. Lazhentsev

    Published 2024-12-01
    “…At present, this is supplemented by the ambiguity of the reaction of the northern regions to the emergence of new circumstances that significantly affect the national economy, such as the need to urgently ensure the technological sovereignty of our country and strengthen its military-industrial complex. …”
    Get full text
    Article
  11. 63731

    The impact of parameter variation in the quantification of forensic genetic evidence by Camila Costa, Carolina Figueiredo, Sandra Costa, Paulo Miguel Ferreira, António Amorim, Lourdes Prieto, Nádia Pinto

    Published 2025-01-01
    “…Abstract Technological advancements have allowed the detection of increasingly complex forensic genetics samples, as minimum amounts of DNA can now be detected in crime scenes or other settings of interest. …”
    Get full text
    Article
  12. 63732

    Socio-cultural resource of management strategy of modern China by L. V. Filindash

    Published 2024-08-01
    “…The author concludes that the management strategy resources have a multi-vector character, which is manifested in economic and cultural, scientific and technological, political and ideological spheres.…”
    Get full text
    Article
  13. 63733

    Multi-User Detection Algorithm for Asynchronous Non-Orthogonal Multiple Access Based on Gaussian Approximation by Peisen WANG, Yueneng WANG, Boming CHENG, Yue YANG, Neng YE

    Published 2023-03-01
    “…Code domain non-orthogonal multiple access (NOMA) is one of the potential technologies to realize ubiquitous access in the future satellite internet.Considering that satellite-to-ground transmission has the characteristics of large propagation delay and high channel dynamics, strict timing synchronization between ground devices will lead to unbearable time resource overhead.Loosed synchronization relationship are required to achieve multi-user access in satellite internet.However, most of the existing multi-user detection algorithms in code domain NOMA are based on the assumption of synchronous transmission, which cannot accurately model and eff ectively alleviate the complex interference introduced by asynchronous multi-user transmission.Therefore, a novel multi-layer factor graph model by introduced the relative delay among users into the traditional two-part factor graph was constructed, and a low-complexity asynchronous multi-user detection algorithm based on gaussian approximation was proposed.The proposed algorithm iterated between each user's estimates and propagated the estimated information between users to improved the approximation.Simulation results showed that in high SNR region, the performance of the asynchronous code-domain NOMA with the proposed algorithm even outperforms its synchronous counterpart.…”
    Get full text
    Article
  14. 63734

    A Novel System for Measuring Optical Properties in Arterial Blood of Man by A. Castañeda-Miranda, L. D. L. Vizcaya

    Published 2006-01-01
    “…Health is one of the aspects that has generated more interest in recent years. The optical technologies are new technical tools that are being implemented for medical diagnosis and for describing various processes occurring within human blood. …”
    Get full text
    Article
  15. 63735

    Use of gamification to increasing motivation in learning by Ayesha Zafar, Bagia Maulana Patah, Syelma Nuraida Fatya

    Published 2022-06-01
    “…In the field of education, era 4.0 made the old way of learning must be improved along with technological developments. One of them is gamification, a learning approach that uses several elements in games that aim to motivate students in the learning process so that they feel comfortable and have fun. …”
    Get full text
    Article
  16. 63736

    Physicochemical and Microstructural Characterization of Injectable Load-Bearing Calcium Phosphate Scaffold by Mazen Alshaaer, Mohammed H. Kailani, Hanan Jafar, Nidaa Ababneh, Abdalla Awidi

    Published 2013-01-01
    “…The proposed process for preparing porous injectable scaffolds is as quick and versatile as conventional technologies. Using this method, porous CDHA-based calcium phosphate scaffolds with macropores sizes ranging from 70 to 300 μm, micropores ranging from 5 to 30 μm, and 30% open macroporosity were prepared. …”
    Get full text
    Article
  17. 63737

    The Merits and Pitfalls of Participatory Action Research: Navigating Tokenism and Inclusion with Lived Experience Members by Tracy Smith-Carrier, Rana Van Tuyl

    Published 2024-04-01
    “…., whose perspectives are advanced), and structural barriers (e.g., time, technological connectivity, etc.) are discussed using concrete examples. …”
    Get full text
    Article
  18. 63738

    Indoor wireless signal coverage and enhancement based on passive reconfigurable intelligent metasurface by Haixia LIU, Hao YI, Xiangjin MA, Shuyao YUE, Xudong KONG, Pei MA, Yuxin ZENG, Long LI

    Published 2022-12-01
    “…Reconfigurable intelligent metasurface (RIS) is a new type of artificial electromagnetic metamaterial, which can control the frequency, amplitude, phase, polarization, propagation direction and wave type of electromagnetic wave flexibly.In the field of wireless communication, RIS can be used to reconstruct the wireless communication channel to achieve blind coverage of wireless signals and improve the communication quality.First, the development and research status of RIS, the key technologies and application scenarios of RIS were summarized and analyzed.Then, a new passive RIS was proposed to realize the characteristics of the aperture reconfiguration and beam reconfiguration through passive coding and splicing principle, which had the advantages of low cost, low power consumption and low complexity.Finally, the blind area coverage enhancement experiment of indoor wireless signal based on passive reflection metasurface was carried out.The effectiveness of passive splicing metasurface in wireless communication blind coverage scenarios was proved by comparison between simulation and field measurement.In addition, for 5G/6G millimeter wave communication, the passive RIS with double-layer cross dipole elements was designed and applied to typical indoor L-shaped corridor scene to verify the enhancement effect of indoor wireless signal coverage.…”
    Get full text
    Article
  19. 63739

    Ecological Sensitivity Analysis of Beihai City Based on GIS and RS by LI Xiaorong, XIE Yuting, LIU Ping

    Published 2023-01-01
    “…In this paper,five factors influencing ecological sensitivity were selected by using GIS and RS technologies,including land use/cover change (LUCC),normalized difference vegetation index (NDVI),elevation,aspect,and water buffer in land area of Beihai City,and the ecological sensitivity evaluation of single factor in the study area was carried out by using the ecological factor scoring method.The weighted superposition method was used to comprehensively evaluate the ecological sensitivity,and the study area was divided into the non-sensitive area,slightly sensitive area,moderately sensitive area,and highly sensitive area.The results show that the ecological sensitivity of the study area decreases from east to west and from north to south.The sum of the non-sensitive area and the slightly sensitive area is 64.30%,and the two areas are mainly distributed in the southwest,with an elevation below 30 m and relatively underdeveloped river networks.The moderately sensitive area accounts for 29.88% and is mainly distributed in Hepu County;the highly sensitive area accounts for 5.82% and is mainly distributed in the northeast mountainous area.The research results can provide a theoretical basis for ecological environment protection,green development,and rational land use planning in Beihai City.…”
    Get full text
    Article
  20. 63740

    Méditations sur le « Paradoxe Pulp » : Pal, la Paramount et les pulps de SF by Jay P. Telotte

    Published 2023-12-01
    “…The articles, however, would reveal a level of irony in this industry strategy, for while they initially sought to stress the scientific and technological accuracy to be found in these films, they—in concert with the films themselves and other marketing strategies—would also increasingly suggest a kind of pulpiness in the films. …”
    Get full text
    Article