Showing 1,661 - 1,680 results of 72,530 for search 'IXFORM~', query time: 4.73s Refine Results
  1. 1661
  2. 1662
  3. 1663
  4. 1664
  5. 1665

    Cognitive, linguistic, and methodological considerations in teaching professional vocabulary to information technology (IT) students. by V. Borshchovetska, T. Harbuza, A. Durdas, V. Semidotska

    Published 2024-05-01
    “…A mixed-methods approach was taken for the research: a review of modern approaches to teaching professional vocabulary to IT students; assessment of the effectiveness of the various approaches; use of questionnaires to obtain information from students; and observation of teaching and the learning process by the authors. …”
    Get full text
    Article
  6. 1666
  7. 1667

    Mindfulness Intervention for Health Information Avoidance in Older Adults: Mixed Methods Study by Chenyu Gu, Liquan Qian, Xiaojie Zhuo

    Published 2025-01-01
    “…The complexity of online health information often leads to psychological challenges, such as cyberchondria, exacerbating health information avoidance behaviors. …”
    Get full text
    Article
  8. 1668
  9. 1669

    CAPITAL STRUCTURE AND FINANCIAL PERFORMANCE OF LISTED INFORMATION AND COMMUNICATIONS TECHNOLOGY FIRMS IN NIGERIA by Nasiru Adamu Kanoma, Nurudeen Usman Miko, Augustine Ayuba, Idris Mohammed, Idris Mohammed, Mark G Tagwai

    Published 2024-09-01
    “… This study seeks to examine the effect of capital structure on financial performance of the listed information and communications technology firms in Nigeria. …”
    Get full text
    Article
  10. 1670

    Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA by WU Zhen, CHEN Yun, CHEN Jun, WANG Min

    Published 2010-01-01
    “…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
    Get full text
    Article
  11. 1671

    Robust beamforming algorithm for RIS-MIMO system based on train prior information by ZHANG Zepeng, LI Cuiran, WU Hao, XIE Jianli, XU Qiong

    Published 2024-05-01
    “…Firstly, with incomplete train position information, the statistical characteristics of the line of sight (LOS) angle estimation error between RIS and mobile relay node (MRN) were estimated and derived. …”
    Get full text
    Article
  12. 1672
  13. 1673

    Fault Diagnosis Method Based on Information Entropy and Relative Principal Component Analysis by Xiaoming Xu, Chenglin Wen

    Published 2017-01-01
    “…Firstly, the algorithm calculates the information entropy for each characteristic variable in the original dataset based on the information gain algorithm. …”
    Get full text
    Article
  14. 1674
  15. 1675
  16. 1676
  17. 1677

    Development of Empirical Fragility Curves in Earthquake Engineering considering Nonspecific Damage Information by Jung J. Kim

    Published 2018-01-01
    “…Considering that the damage states for fragility curves are generally nested to each other, the possibility theory, a special form of the evidence theory for nested intervals, is applied to generate fragility information from seismic damage data. …”
    Get full text
    Article
  18. 1678

    A Fatigue Driving Detection Algorithm Based on Facial Motion Information Entropy by Feng You, Yunbo Gong, Haiqing Tu, Jianzhong Liang, Haiwei Wang

    Published 2020-01-01
    “…We propose a real-time detection algorithm involved in information entropy. Particularly, this algorithm relies on the analysis of sufficient consecutive video frames. …”
    Get full text
    Article
  19. 1679
  20. 1680