Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
65481
Simulation-Based Framework for Estimating Crash Modification Factors (CMFs): A Case Study for ITS Countermeasures
Published 2019-01-01“…While researchers are utilizing advanced computing and communication tools to reduce number of crashes on the roadways, there is still an absence of appropriate method to evaluate the safety performances of these advanced technologies in the planning stage. Development of crash modification factors (CMFs) is a standard method to evaluate the safety effect of proposed countermeasures. …”
Get full text
Article -
65482
Deep Learning for Traffic Scene Understanding: A Review
Published 2025-01-01“…By critically analyzing current technologies, the paper identifies limitations in existing research and proposes areas for future exploration. …”
Get full text
Article -
65483
Nighttime Magnetic Perturbation Events Observed in Arctic Canada: 3. Occurrence and Amplitude as Functions of Magnetic Latitude, Local Time, and Magnetic Disturbance Indices
Published 2021-03-01“…Abstract Rapid changes of magnetic fields associated with nighttime magnetic perturbation events (MPEs) with amplitudes |ΔB| of hundreds of nT and 5–10 min duration can induce geomagnetically induced currents (GICs) that can harm technological systems. This study compares the occurrence and amplitude of nighttime MPEs with |dB/dt| ≥ 6 nT/s observed during 2015 and 2017 at five stations in Arctic Canada ranging from 64.7° to 75.2° in corrected geomagnetic latitude (MLAT) as functions of magnetic local time (MLT), the SME (SuperMAG version of AE) and SYM/H magnetic indices, and time delay after substorm onsets. …”
Get full text
Article -
65484
Social networks as a basis for interaction between authorities and non-profit organizations established on the basis of nationality in public communications space
Published 2020-07-01“…The article is devoted to the discussion of the influence of modern information and telecommunication technologies on the process of building bilateral communication of state and municipal administration bodies with non-profit organizations created on the basis of national origin from the point of view of the management of public values and the stakeholder approach. …”
Get full text
Article -
65485
Investigation of Heat and Mass Transfer in the Process of Fuel Preparation from Biomass Particles with High Moisture
Published 2023-08-01“…In addition, the drying stage is extremely energy-consuming, so reliable prediction of its kinetics largely determines the efficiency of the entire technological process. In the course of the study, the following tasks were solved: a numerical method was developed for describing the processes of internal and external heat and mass transfer problems using an explicit difference approximation of differential equations of heat and mass transfer; parametric identification of the proposed one-dimensional mathematical model was performed using empirical dependencies known from literature sources; empirical verification of the proposed mathematical model was carried out by comparing the calculated forecasts obtained with the results of their own field experiments. …”
Get full text
Article -
65486
Mapping urban green structures using object-based analysis of satellite imagery: A review
Published 2025-01-01“…Future directions for UGS mapping include the integration of deep learning algorithms, advancements in satellite data technologies, and the development of standardized classification frameworks. …”
Get full text
Article -
65487
A Comparative Evaluation of Augmented Reality Indoor Navigation versus Conventional Approaches
Published 2025-01-01“…Its integrated use outdoors via GPS and Simultaneous Location and Mapping (SLAM) indoors with a focus on inertial technologies enables precise positioning and efficient navigation in industrial environments. …”
Get full text
Article -
65488
Multimodal Assessment of Changes in Physiological Indicators when Presenting a Video Fragment on Screen (2D) versus a VR (3D) Environment
Published 2022-01-01“…The increasing role of virtual environments in society, especially in the context of the pandemic and evolving metaverse technologies, requires a closer study of the physiological state of humans using virtual reality (VR) for entertainment, work, or learning. …”
Get full text
Article -
65489
Clipping aneurysms via a fully endoscopic transcranial approach
Published 2024-12-01“…With the accumulation of experience and technological progress, the fully endoscopic technique could enable safe and effective clipping of an aneurysm, which provided valuable information for decision-making during surgery and shed a new light on aneurysms clipping.…”
Get full text
Article -
65490
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01“…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
Get full text
Article -
65491
Unveiling Genital Tuberculosis: India’s hidden Infertility Epidemic
Published 2025-02-01“…While antitubercular therapy (ATT) can control infection, restoring fertility often requires surgical intervention or assisted reproductive technologies, which are financially prohibitive for most patients. …”
Get full text
Article -
65492
Multi-Temporal Analysis and Techno-Economic Evaluation of Offshore Wind Energy Integration to the Western Interconnection
Published 2024-01-01“…To address these challenges, it becomes increasingly crucial to incorporate geographic and technological diversity into the energy mix. This diversity can be facilitated by transmission planning that takes into account operational considerations like frequency response, regulation, ramping capabilities, and contingency reserves, while also quantifying the broader system-wide advantages and drawbacks. …”
Get full text
Article -
65493
Epitaxial growth of transition metal nitrides by reactive sputtering
Published 2025-01-01“…This represents a simple and technologically scalable approach for N-polar GaN-based layers on Si substrates.…”
Get full text
Article -
65494
Review on Applications of System Dynamics Method in Regional Water Demand Prediction
Published 2022-01-01“…Water resources are the most important basic natural resources for the sustainable development of the social economy,the controlling element of the ecological environment,and strategic economic resources.With the growth in population and economic development,regional water consumption is increasing,and the imbalance between the supply and demand of water resources has become the “bottleneck” restricting regional economic development.Water demand prediction is an important basis for the planning,management,and sustainable utilization of regional water resources,which involves complex factors such as economic,hydrological,meteorological,social,engineering,and technological factors as well as the industrial structure and industrial and agricultural development.The system dynamics method based on the feedback control theory has significant advantages in the dynamic change,causal mechanism analysis,quantitative analysis and simulation of a multi-factor coupled complex giant system.It has been widely used in the prediction of regional water demand.The system dynamics model of regional water demand prediction can decompose a complex social water use system into multiple interconnected and mutually constrained subsystems.It can clearly show the dynamic change process of water demand of each water use subsystem and obtain accurate prediction results of water demand.In this paper,firstly,the characteristics of the system dynamics method are briefly introduced.Then,the applications of this method in regional water demand are summarized and analyzed from four aspects,i.e.…”
Get full text
Article -
65495
Female Farmers’ Agricultural Information Needs and Food Production: A Case Study of Imbulpe ds Division in Sri Lanka
Published 2021-06-01“…In addition, female farmers reported that they moderately need information on application of agrochemicals, improved market systems and modern farming technologies. Extension agents and other female farmers act as their major sources of agricultural information and ICT equipment acts as the least important agricultural information source in this area. …”
Get full text
Article -
65496
Two-dimensional flood model for risk exposure analysis of land use/land cover in a watershed
Published 2021-04-01“…METHODS: The approach consisted of applying hydrologic and hydraulic numerical flood models and the suite of advanced geographic information systems and remote sensing technologies. The process involved utilizing a high-resolution digital elevation model and a set of high-precision instruments such as the real-time kinematic-global position system receiver, digital flow meter, deep gauge, and automatic weather station in collecting the respective data on bathymetry, river discharge, river depth, and rainfall intensity during a particular climatic event, needed for the model development, calibration and validation. …”
Get full text
Article -
65497
The relationship between parental emotional abuse and interpersonal competence and digital game addiction: A path analysis
Published 2023-01-01“…Background: Digital game addiction is a negative effect of the technological developments that have taken place and has been reported in literature as a serious mental health problem for children and adolescents in the developmental period. …”
Get full text
Article -
65498
As Aplicações e Oportunidades do Metaverso Digital nos Ambientes Acadêmico e Profissional
Published 2024-11-01“… No atual objeto de estudo, foi realizada a resenha do artigo científico: The Metaverse Digital Environments: a scoping review of the techniques, technologies, and applications, dos autores Muhammad Tukur, Jens Schneider, Mowafa Househ, Ahmed Haruna Dokoro, Usman Idris Ismail, Muhammad Dawaki e Marco Agus, publicado em 2024, no periódico científico internacional Journal of King Saud University - Computer and Information Sciences. …”
Get full text
Article -
65499
Promoting the Patriotic Agenda on Social Media among Russian Students
Published 2024-01-01“…Russian universities face a significant challenge in implementing patriotic education for the youth due to their technological and ideological detachment from students who are immersed in the digital communication environment. …”
Get full text
Article -
65500
Self-organized criticality and urban development
Published 1999-01-01“…Our implied speculation is: how long will this kind of urban form be maintained in the face of seemingly unstoppable technological change?…”
Get full text
Article