-
1041
Matrix Metalloproteinase‐Responsive Controlled Release of Self‐Assembly Nanoparticles Accelerates Heart Valve Regeneration In Situ by Orchestrating Immunomodulation
Published 2025-01-01“…Abstract In situ tissue engineering heart valves (TEHVs) are the most promising way to overcome the defects of existing valve prostheses. …”
Get full text
Article -
1042
SMME readiness framework for smart manufacturing adoption using critical realism: Knowledge and construction phase
Published 2025-03-01“…The findings also highlighted stark social and cognitive differences between high-tech SMMEs and non-high-tech SMMEs.…”
Get full text
Article -
1043
Anti-vibration seat of transport vehicle operator
Published 2020-03-01“…It is shown that in the systems «jump» in a certain range of achievable effect quasizero stiffness of the support given by the simplest, tech, universal technical solution of the anti-vibration seat of a transport vehicle.…”
Get full text
Article -
1044
GLOBAL MARKET OF SPACE PRODUCTS AND SERVICES: PROBLEMS AND PROSPECTS
Published 2019-03-01“…The main goals and objectives of the largest exporting countries, which present in the international markets of high-tech products manufacturers have been defined. The incentives for the development of space activities in individual countries and the possibility of commercialization in the system of promoting space products and services to international and domestic markets have been investigated. …”
Get full text
Article -
1045
Approach of detecting LDoS attack based on time window statistic
Published 2010-01-01“…Through analysised of normal traffic and attack flow,statistic result showed that the normal traffic throughout had an obviously degrade and attack flow had a short time abnormity pulse with higher amplitude.An approach of de-tecting LDoS attack based on time window statistic was presented.Experiments on different length of sample time were conducted in a test environment established on simulation network.Test results show that the detection probability is more than 96%,false negative and false positive are less than 3%.…”
Get full text
Article -
1046
The Role of Digitalization in the Scientific and Educational Space Integration of the EAEU
Published 2023-03-01“…The article analyzes the modern potential of education and science in the EAEU countries for the rapid and effective implementation of high-tech import substitution, and also builds econometric models of the impact of education and science on GDP growth on two panels and historical data for 1990-2020 for developed and developing countries, with their subsequent application to assess the impact of the unified scientific and educational space of the EAEU on economic growth with the identification of the main factors of such influence, which made it possible to formulate the most promising ways and mechanisms for creating a unified scientific and educational space of the EAEU.…”
Get full text
Article -
1047
Proxémie d’apprentissage
Published 2017-02-01“…Specifically, it is a question of studying the impact of certain spatial variables such as positioning, distance or disposition on the behavior of students in the context of university teaching in an experimental classroom: SpaceTech. Filmed observations were made with a device of collecting and then processed, encoded to statistically treat the observable behavior of the 115 students. …”
Get full text
Article -
1048
Concept of university competitiveness: tetrahedron model
Published 2022-09-01“…It is shown that innovations are much more successfullyproduced by high-tech corporations, and universities should be primarily focused on raisinginnovators. …”
Get full text
Article -
1049
Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
Published 2016-12-01“…Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories, thereby pro-tecting the user's trajectory privacy. Furthermore, extensive experiments indicate that the presented scheme not only has the limited computation cost, but also ensures that the generated dummy trajectories are similar to the user's real trajectory.…”
Get full text
Article -
1050
Design of security verification platform for the integrated space-ground network
Published 2016-08-01“…The integrated space and terrestrial network is complex,having diversified technical specifications which involves all aspects of the system of security technology,so it is difficult to achieve system level verification and evaluation through individual technology test.It is necessary to construct a certain scale of network authentication system to verify the effectiveness of safety technology architecture.Based on the concept of general opening and reconstruction,a scheme of integrated network security verification system was presented to validate security tech-nologies such as key management,secure routing,secure handoff,security isolation and secure transmission.…”
Get full text
Article -
1051
Questions of Research of Digitalization in Various Fields of Activity
Published 2024-09-01“…The ability to implement strategic priorities of digital development and intensify the activities of various stakeholders (government, science, business, enterprises) in high-tech sectors are necessary conditions for the successful development of the country and solving economic problems. …”
Get full text
Article -
1052
ФІНАНСУВАННЯ ДІДЖИТАЛІЗАЦІЇ ТА ІННОВАЦІЙ В АГРАРНОМУ СЕКТОРІ КИТАЮ ДЛЯ ДОСЯГНЕННЯ СТІЙКОГО РОЗВИТКУ...
Published 2024-11-01“…Зазначено, що Китай є один із лідерів в розвитку та інвестиціях в AgriTech і FoodTech технологій та отриманні патентів за цими напрямками. …”
Get full text
Article -
1053
Coding Readiness Assessment: A Measure of Computational Thinking for Preschoolers
Published 2024-12-01“…We created the Coding Readiness Assessment (CRA) from a subset of nine TechCheck-PreK items and twelve new items that assess additional CT and coding readiness constructs. …”
Get full text
Article -
1054
Ionospheric TEC Prediction Based on Ensemble Learning Models
Published 2024-03-01Get full text
Article -
1055
Research and application of DRM technology in IPTV UHD video
Published 2018-11-01“…The characteristics and differences of different DRM standards such as OMA,Microsoft,Intertrust,and ChinaDRM were compared.The requirements of DRM applications were presented.The key technologies of DRM were analyzed.Based on the high-tech set-top box commonly used in the industry,the architecture of DRM protection in IPTV high-definition video was designed.The hardware trust root of high security set-top box,remote download terminal key,double-encrypted content key and other mechanisms was put forward innovatively.Finally,the business process of decrypting DRM content was formulated and an implementation case was given.…”
Get full text
Article -
1056
RESEARCH-AND-PRODUCTION ASSOCIATION: SPECIFICITY OF EFFECTS OF INTEGRATION
Published 2016-05-01“…The aim of the work is the formalization of the basic directions of manifestations of effects from the integration of high-tech enterprises in the research-and-production association. …”
Get full text
Article -
1057
Considerations on the cost analysis of Pediatric Intensive Care Units in Italy.
Published 2021-12-01“…The healthcare system in Italy is known for its universal coverage and high-quality medical services, with pediat- ric intensive care units (PICUs) being a crucial compo- nent in the care of critically ill children. As medical tech- nologies advance and the number of children requiring intensive care continues to grow, understanding the costs associated with providing these services becomes in- creasingly important. …”
Get full text
Article -
1058
Model of runtime memory leak detection based on the virtual machine introspection
Published 2013-08-01“…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. A model of runtime memory leak detection based on the virtual machine introspection and an approach to predication on memory leak were proposed. …”
Get full text
Article -
1059
Inquiring in the Science Classroom by PBL: A Design-Based Research Study
Published 2025-01-01Get full text
Article -
1060
Automated class student counting through image processing
Published 2021-03-01“…These systems are obtrusive by nature and necessitate high-tech equipment. Our proposed solution eliminates redundancy in human records and makes maintaining attendance a simple chore.…”
Get full text
Article