Showing 1,041 - 1,060 results of 1,392 for search 'TechTV~', query time: 2.00s Refine Results
  1. 1041

    Matrix Metalloproteinase‐Responsive Controlled Release of Self‐Assembly Nanoparticles Accelerates Heart Valve Regeneration In Situ by Orchestrating Immunomodulation by Xing Chen, Yunlong Wu, Peng Song, Liandong Feng, Ying Zhou, Jiawei Shi, Nianguo Dong, Weihua Qiao

    Published 2025-01-01
    “…Abstract In situ tissue engineering heart valves (TEHVs) are the most promising way to overcome the defects of existing valve prostheses. …”
    Get full text
    Article
  2. 1042

    SMME readiness framework for smart manufacturing adoption using critical realism: Knowledge and construction phase by Lucas Gumbi, Hossana Twinomurinzi

    Published 2025-03-01
    “…The findings also highlighted stark social and cognitive differences between high-tech SMMEs and non-high-tech SMMEs.…”
    Get full text
    Article
  3. 1043

    Anti-vibration seat of transport vehicle operator by P. D. Balakin, O. S. Dyundik, I. P. Zgonnik, A. V. Krivtsov

    Published 2020-03-01
    “…It is shown that in the systems «jump» in a certain range of achievable effect quasizero stiffness of the support given by the simplest, tech, universal technical solution of the anti-vibration seat of a transport vehicle.…”
    Get full text
    Article
  4. 1044

    GLOBAL MARKET OF SPACE PRODUCTS AND SERVICES: PROBLEMS AND PROSPECTS by S. Bondarev, S. Verigo

    Published 2019-03-01
    “…The main goals and objectives of the largest exporting countries, which present in the international markets of high-tech products manufacturers have been defined. The incentives for the development of space activities in individual countries and the possibility of commercialization in the system of promoting space products and services to international and domestic markets have been investigated. …”
    Get full text
    Article
  5. 1045

    Approach of detecting LDoS attack based on time window statistic by WU Zhi-jun, ZENG Hua-long, YUE Meng

    Published 2010-01-01
    “…Through analysised of normal traffic and attack flow,statistic result showed that the normal traffic throughout had an obviously degrade and attack flow had a short time abnormity pulse with higher amplitude.An approach of de-tecting LDoS attack based on time window statistic was presented.Experiments on different length of sample time were conducted in a test environment established on simulation network.Test results show that the detection probability is more than 96%,false negative and false positive are less than 3%.…”
    Get full text
    Article
  6. 1046

    The Role of Digitalization in the Scientific and Educational Space Integration of the EAEU by C. G. Gospodarik, M. M. Kovalev

    Published 2023-03-01
    “…The article analyzes the modern potential of education and science in the EAEU countries for the rapid and effective implementation of high-tech import substitution, and also builds econometric models of the impact of education and science on GDP growth on two panels and historical data for 1990-2020 for developed and developing countries, with their subsequent application to assess the impact of the unified scientific and educational space of the EAEU on economic growth with the identification of the main factors of such influence, which made it possible to formulate the most promising ways and mechanisms for creating a unified scientific and educational space of the EAEU.…”
    Get full text
    Article
  7. 1047

    Proxémie d’apprentissage by Sofiane Issaadi, Alain Jaillet

    Published 2017-02-01
    “…Specifically, it is a question of studying the impact of certain spatial variables such as positioning, distance or disposition on the behavior of students in the context of university teaching in an experimental classroom: SpaceTech. Filmed observations were made with a device of collecting and then processed, encoded to statistically treat the observable behavior of the 115 students. …”
    Get full text
    Article
  8. 1048

    Concept of university competitiveness: tetrahedron model by A. . Grudzinskiy, A. . Bedny

    Published 2022-09-01
    “…It is shown that innovations are much more successfullyproduced by high-tech corporations, and universities should be primarily focused on raisinginnovators. …”
    Get full text
    Article
  9. 1049

    Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation by Kai-yue LEI, Xing-hua LI, Hai LIU, Zhuo-xiong PEI, Jian-feng MA, Hui LI

    Published 2016-12-01
    “…Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories, thereby pro-tecting the user's trajectory privacy. Furthermore, extensive experiments indicate that the presented scheme not only has the limited computation cost, but also ensures that the generated dummy trajectories are similar to the user's real trajectory.…”
    Get full text
    Article
  10. 1050

    Design of security verification platform for the integrated space-ground network by Zhi-chao QIN, Ping ZHANG, Xin-xin FAN, Zhou LU

    Published 2016-08-01
    “…The integrated space and terrestrial network is complex,having diversified technical specifications which involves all aspects of the system of security technology,so it is difficult to achieve system level verification and evaluation through individual technology test.It is necessary to construct a certain scale of network authentication system to verify the effectiveness of safety technology architecture.Based on the concept of general opening and reconstruction,a scheme of integrated network security verification system was presented to validate security tech-nologies such as key management,secure routing,secure handoff,security isolation and secure transmission.…”
    Get full text
    Article
  11. 1051

    Questions of Research of Digitalization in Various Fields of Activity by N. O. Yakushev

    Published 2024-09-01
    “…The ability to implement strategic priorities of digital development and intensify the activities of various stakeholders (government, science, business, enterprises) in high-tech sectors are necessary conditions for the successful development of the country and solving economic problems. …”
    Get full text
    Article
  12. 1052

    ФІНАНСУВАННЯ ДІДЖИТАЛІЗАЦІЇ ТА ІННОВАЦІЙ В АГРАРНОМУ СЕКТОРІ КИТАЮ ДЛЯ ДОСЯГНЕННЯ СТІЙКОГО РОЗВИТКУ... by Галина Матвієнко, Володимир Мирошниченко

    Published 2024-11-01
    “…Зазначено, що Китай є один із лідерів в розвитку та інвестиціях в AgriTech і FoodTech технологій та отриманні патентів за цими напрямками. …”
    Get full text
    Article
  13. 1053

    Coding Readiness Assessment: A Measure of Computational Thinking for Preschoolers by Emily Relkin, Christopher Doss, Victoria L. Jones, John F. Pane

    Published 2024-12-01
    “…We created the Coding Readiness Assessment (CRA) from a subset of nine TechCheck-PreK items and twelve new items that assess additional CT and coding readiness constructs. …”
    Get full text
    Article
  14. 1054
  15. 1055

    Research and application of DRM technology in IPTV UHD video by Jingxin SHEN

    Published 2018-11-01
    “…The characteristics and differences of different DRM standards such as OMA,Microsoft,Intertrust,and ChinaDRM were compared.The requirements of DRM applications were presented.The key technologies of DRM were analyzed.Based on the high-tech set-top box commonly used in the industry,the architecture of DRM protection in IPTV high-definition video was designed.The hardware trust root of high security set-top box,remote download terminal key,double-encrypted content key and other mechanisms was put forward innovatively.Finally,the business process of decrypting DRM content was formulated and an implementation case was given.…”
    Get full text
    Article
  16. 1056

    RESEARCH-AND-PRODUCTION ASSOCIATION: SPECIFICITY OF EFFECTS OF INTEGRATION by A. Voit

    Published 2016-05-01
    “…The aim of the work is the formalization of the basic directions of manifestations of effects from the integration of high-tech enterprises in the research-and-production association. …”
    Get full text
    Article
  17. 1057

    Considerations on the cost analysis of Pediatric Intensive Care Units in Italy. by D. Galante

    Published 2021-12-01
    “…The healthcare system in Italy is known for its universal coverage and high-quality medical services, with pediat- ric intensive care units (PICUs) being a crucial compo- nent in the care of critically ill children. As medical tech- nologies advance and the number of children requiring intensive care continues to grow, understanding the costs associated with providing these services becomes in- creasingly important. …”
    Get full text
    Article
  18. 1058

    Model of runtime memory leak detection based on the virtual machine introspection by Ru-liang XIAO, Jun JIANG, You-cong NI, Xin DU, Guo-qing XIE, Sheng-zhen CAI

    Published 2013-08-01
    “…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. A model of runtime memory leak detection based on the virtual machine introspection and an approach to predication on memory leak were proposed. …”
    Get full text
    Article
  19. 1059
  20. 1060

    Automated class student counting through image processing by Agyan Panda, Azadeh Shemshad

    Published 2021-03-01
    “…These systems are obtrusive by nature and necessitate high-tech equipment. Our proposed solution eliminates redundancy in human records and makes maintaining attendance a simple chore.…”
    Get full text
    Article