Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
7321
Measuring Innovation Potential in Ecuadorian ICT Companies: Development and Application of the CRI-IRT Model
Published 2025-02-01“…This study aimed to develop a measurement tool for the Ecuadorian context, utilizing the Capacities, Results, and Impacts (CRI) model questionnaire for data collection and Item Response Theory (IRT) as a processing method. …”
Get full text
Article -
7322
-
7323
Stem-cutting dipping in insecticides and biopesticide application for the control of Bemisia tabaci whitefly in cassava
Published 2025-07-01“…The experimental design for field experiments was a randomized complete block design with four replicates. The data recorded for field experiments were on whitefly and nymph numbers, CMD and CBSD incidence and severity, and root yield.Results and discussionMortality levels caused by EPFs under laboratory conditions were 35%–86% at 14 days after application. …”
Get full text
Article -
7324
Emerging 2D Material‐Based Synaptic Devices: Principles, Mechanisms, Improvements, and Applications
Published 2025-04-01“…ABSTRACT The von Neumann architecture is encountering challenges, including the “memory wall” and “power wall” due to the separation of memory and central processing units, which imposes a major hurdle on today's massive data processing. Neuromorphic computing, which combines data storage and spatiotemporal computation at the hardware level, represents a computing paradigm that surpasses the traditional von Neumann architecture. …”
Get full text
Article -
7325
-
7326
-
7327
-
7328
Computer-Visualized Sound Parameter Analysis Method and Its Application in Vocal Music Teaching
Published 2022-01-01“…Through the simulation data analysis, it can be seen that the computer visualization sound parameter analysis method proposed in this paper has a very good application effect in vocal music teaching and can improve the quality of vocal music teaching.…”
Get full text
Article -
7329
Application of fuzzy weights of evidence method on land suitability evaluation for summer orange region
Published 2011-11-01Get full text
Article -
7330
A High-performance Double Side Cooled IGBT Module for EV/HEV Applications
Published 2021-09-01“…High performance, low cost and high reliability integrated power modules for electric vehicle applications are leading the innovation in power electronic technology. …”
Get full text
Article -
7331
APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE CONTROL OF THE TECHNICAL STATE OF VEHICLES IN A TRANSPORT STREAM
Published 2018-05-01“…The article deals with the specifics of the application of information technologies in the transport sphere. …”
Get full text
Article -
7332
-
7333
APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE CONTROL OF THE TECHNICAL STATE OF VEHICLES IN A TRANSPORT STREAM
Published 2018-05-01“…The article deals with the specifics of the application of information technologies in the transport sphere. …”
Get full text
Article -
7334
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01“…Most existing risk assessments of Android applications directly assign weights to factors according to experience, and calculate security risks by counting the frequency statistics of few factors.A new method for risk assessment of Android applications is proposed, which can provide both quantitative and qualitative assessment.This method integrates multiple risk factors such as system permissions, API calls, the action properties of Intent Filter, and data flow.The risks of factors are assigned based on their risk classification and addition, and the weights of factor subsets are distributed based on hierarchical clustering.Experiments show that the assessment results can effectively reflect the real security risks of Android applications.…”
Get full text
Article -
7335
DL-assisted programmable multilayer network application awareness system for IP-over-EON
Published 2019-11-01“…In order to realize real-time and fine-granularity network monitoring and adjustment,and satisfy the specific QoS demands of various applications,a deep learning (DL) assisted programmable multilayer network application performance awareness system for IP-over-EON was proposed.The distributed network monitoring based on network application performance awareness was combined with centralized network management.The multilayer and fine-grained network monitoring was implemented by distributed network monitoring,and the data analysis through DL was performed.Experimental results indicate that by combining distributed and centralized processing seamlessly,the proposed network monitoring system can not only realize timely and automatic network control and management but also provide superior scalability.…”
Get full text
Article -
7336
-
7337
A Modified DOE-2 Model for Typical Performance of Absorption Chillers and its Application
Published 2007-01-01“…A modified DOE-2 model for double effect steam-driven absorption chillers, as an example, was developed and its reasonability and validity were tested by the product data and the general theoretical model. Application case study confirms the ability of the modified DOE-2 model to fast predict the part-load performances of absorption chillers.…”
Get full text
Article -
7338
-
7339
Application of Online Anomaly Detection Using One-Class Classification to the Z24 Bridge
Published 2024-12-01“…The study is the first to assess the applicability of one-class classification for anomaly detection on the short-term structural health data of the Z24 bridge.…”
Get full text
Article -
7340
The application of text mining and deep learning in identifying the psychological pressure of college students in employment
Published 2025-06-01“…This study provides a technical foundation for data-driven psychological assessment and student support services.…”
Get full text
Article