Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
15881
Massive Acquisition of Ultraviolet Color Excess Information from GALEX and UVOT Bands
Published 2025-01-01Get full text
Article -
15882
The act of minor significance and genuine remorse in the criminal code
Published 2014-01-01Get full text
Article -
15883
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01“…Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. …”
Get full text
Article -
15884
Smart Tools for Smart Learning: IoT-Based Landslide Early Warning System with TILT Sensors and Apps
Published 2025-01-01“…These sensors are connected to the BLINK application, which serves as an easy-to-use interface for data visualization and real-time alerting. …”
Get full text
Article -
15885
Industrial robots reduce carbon emissions in manufacturing through global value chains
Published 2025-07-01“…This paper, from the perspective of the manufacturing industry’s embeddedness in the global value chain, utilizes world input-output tables and data related to the application of industrial robots to conduct an empirical analysis of the impact and mechanisms by which industrial robot application affects carbon emissions in the global manufacturing sector. …”
Get full text
Article -
15886
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01“…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
Get full text
Article -
15887
A trusted IoT architecture model
Published 2017-10-01“…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
Get full text
Article -
15888
Overview of smart sensors based on machine learning
Published 2025-03-01“…With the rapid development of machine learning, intelligent models created by machine learning algorithms are gradually becoming the core part of new sensor data analysis. The paper firstly introduces the background of intelligent sensors that support machine learning, briefly describes the construction of intelligent models and the generation, verification and testing process of data sets, then lists the application of intelligent sensors based on machine learning, finally points out the current problems and challenges of intelligent sensors based on machine learning and puts forward feasible solutions to provide valuable academic reference for relevant researchers.…”
Get full text
Article -
15889
Penerapan Maksim Grice dalam Iklan Jual Beli Gadget pada Komunitas r/AppleSwap: Analisis Pragmatik dan Wacana
Published 2025-05-01“…The data were then analyzed qualitatively to examine the application of maxims and quantitatively to calculate the frequency of violations. …”
Get full text
Article -
15890
Fault Diagnosis of Wind-turbine Gearboxes based on Fourier Decomposition Method
Published 2018-01-01“…For this reason,EMD in practical application is confronted by many problems,which make EMD hard to extract fault features from vibration data of complex wind-turbine gearboxes. …”
Get full text
Article -
15891
Mapping Your World with Community Analyst: An Easy to Use Tool to Map the Characteristics of U.S. Communities
Published 2014-02-01“…This article presents Community Analyst, a web application that provides access to thousands of business, demographic, economic, education, and health data variables for the United States. …”
Get full text
Article -
15892
Design and Implementation of One Map of Watershed Water Conservancy
Published 2021-01-01“…Given the needs of watershed water conservancy management and the requirements of intelligent water conservancy construction,this study adopts the construction and operation mode of “joint construction,shared use,business update and intensive maintenance”,to build One Map of watershed water conservancy that is “dynamic,vivid,three-dimensional,intelligent,safe and reliable” based on the national water conservancy map.Through technological innovation in the fields of data,model,platform and application,this study aims to guide the construction practice of One Map of Pearl River water conservancy,so as to build One Map big data center,One Map service cloud platform,One Map intelligent application,One Map normative system,etc.for Pearl River Basin.This study supports multi-dimensional information query and analysis,rapid construction of special applications,construction of professional systems based on unified maps,and full aggregation display of business achievements,promoting the construction of digital twin watershed.…”
Get full text
Article -
15893
-
15894
-
15895
Game Edukasi Pengenalan Sistem Isyarat Bahasa Indonesia (SIBI) Menggunakan Myo Armband pada Arsitektur Client Server
Published 2022-06-01“…Platform tersebut memiliki kemampuan untuk mengenal gerakan tangan yang diperoleh dari data sensor Myo Armband. Aplikasi yang berada sisi frontend dapat menggunakan fitur platform melalui Application Programming Interface (API) yang disediakan. …”
Get full text
Article -
15896
On developing a module for the stressFOAM solver of the OpenFOAM environment
Published 2025-01-01“…The purpose of the stressFOAM solver and its basic application field are described. A stack of technologies to implement a graphical, software component of the application, data storage system is defined. …”
Get full text
Article -
15897
Fractal Enterprise Model in Intangible Resource Analysis: Double-Hierarchy Method
Published 2025-04-01Get full text
Article -
15898
-
15899
A physical state prediction method based on reduce order model and deep learning applied in virtual reality
Published 2025-08-01“…The application of virtual reality (VR) in industrial training and safety emergency needs to reflect realistic changes in physical object properties. …”
Get full text
Article -
15900
GSD-YOLO: A Lightweight Decoupled Wheat Scab Spore Detection Network Based on Yolov7-Tiny
Published 2024-12-01“…In addition, we utilize an improved Spore–Copy data augmentation strategy to improve the detection performance and generalization ability of the algorithm to fit the large numbers, morphology, and variety of wheat disease spores in the actual field and to improve the efficiency of constructing a large data set of diverse spores. …”
Get full text
Article