Showing 1,701 - 1,720 results of 7,448 for search '"technology"', query time: 0.06s Refine Results
  1. 1701
  2. 1702

    Nano theranostics involved in bladder cancer treatment by Kunpeng Liu, Qixi Mo, Zhenshan Ding, Shicong Lai, Jian Ren, Qingsong Yu

    Published 2023-04-01
    “…Theranostics, the integration of diagnostic and therapeutic technologies, has emerged as a promising strategy to address these challenges. …”
    Get full text
    Article
  3. 1703

    Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
    Get full text
    Article
  4. 1704
  5. 1705
  6. 1706
  7. 1707
  8. 1708

    Experimental investigation on flow pattern and void fraction for two-phase gas-liquid upflow in a vertical helically coiled micro-channel by Sira Saisorn, Phakkhanan Benjawun, Adirek Suriyawong, Somchai Wongwises

    Published 2025-03-01
    “…To contribute toward state-of-the-art microfluidic technology, our experiments were conducted to study gas-liquid adiabatic upflow phenomena in a helical micro-channel having a channel diameter of 0.87 mm, a coil diameter of 50 mm, and a helical pitch of 20 mm. …”
    Get full text
    Article
  9. 1709
  10. 1710
  11. 1711
  12. 1712

    Self-Capacitance Sensor for Smart Diaper by Jiun-Hung Lin, Chun-Hao Lu, Shih-Tsang Tang

    Published 2025-01-01
    “…This technology addresses essential needs in healthcare settings by improving caregiving efficiency and reducing workload.…”
    Get full text
    Article
  13. 1713
  14. 1714
  15. 1715

    An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) by Kisakye Diana Michelle, Ocen Gilbert Gilibrays, Odongtoo Godfrey

    Published 2024-12-01
    “…However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. …”
    Get full text
    Article
  16. 1716

    Effect of deformation temperature on microstructure and corrosion properties of hot-compressed 347H stainless steel by Qiushuang Wang, Ruidong Li, Junchen Li

    Published 2025-02-01
    “…This study has important reference value for the development of hot deformation technology and the improvement of corrosion resistance of 347H stainless steel.…”
    Get full text
    Article
  17. 1717
  18. 1718
  19. 1719

    A A Fingerprint-Based Attendance System for Improved Efficiency by Olayiwola Charles Adesoba, Israel Mojolaoluwa Joseph

    Published 2025-01-01
    “…This research contributes to the development of efficient and reliable attendance monitoring solutions, providing valuable insights for educational institutions seeking to adopt biometric technology. …”
    Get full text
    Article
  20. 1720