Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 14
- Economic development 7
- Entrepreneurship 6
- Psychological tests 6
- Research 6
- Economic policy 5
- English language 5
- History 5
- Study and teaching 5
- Business enterprises 4
- Industrial management 4
- Information Science 4
- Language 4
- Law 4
- Social aspects 4
- Statistics 4
- information technology 4
- Biochemistry 3
- Computer security 3
- Design 3
- Economic conditions 3
- Globalization 3
- Grammar 3
- Information Technology 3
- Information theory 3
- Internet 3
- Management information systems 3
- Mass media 3
- Methodology 3
-
1161
PERSPECTIVES OF USING OF SYSTEM OF THE ENTERPRISE INFORMATIONAL SPACE CONSOLIDATION AT RUP «BMZ»
Published 2008-11-01“…Perspectives of application of system SAFER as a system of consolidation of information area of RUP «BMZ» are shown.…”
Get full text
Article -
1162
Caring for people living with dementia and their informal caregivers: Current perspectives in Malaysia
Published 2024-12-01“…The lack of dementia-focused community services and public education further compounds issues for peopleliving with dementia (PLWD) and their informal caregivers (ICs). Consequently, ICs suffer mentally from caregiving demands, yet evidence-based psychosocial services to support them are scarce in Malaysia. …”
Get full text
Article -
1163
The information needs of female Police Officers involved in undercover prostitution work
Published 2004-01-01Subjects: Get full text
Article -
1164
Feasibility of creation and use of specialized search systems for scientific and technical information
Published 2022-01-01Subjects: “…scientific and technical information…”
Get full text
Article -
1165
Information transmission mechanism of Blockchain technology based on named-data networking
Published 2018-01-01Subjects: Get full text
Article -
1166
Security risk analysis and evaluation techniques in power information system cloud
Published 2018-02-01“…Combining the power industry with cloud computing technology,a systematic study on safety analysis and evaluation methods of the power cloud was carried out.A comprehensive combing on functional entities and business processes of the power information system under the cloud environment was conducted.Through the combination of static STRIDE threat modeling and dynamic attack chain algorithm,the main risks of cloud platform were classified and quantified.A security protection architecture of power cloud system was put forward to promote the popularization and application of cloud computing in the power industry,and to provide a strong support for the safety and control of power information system.…”
Get full text
Article -
1167
Analysis of Russian Federation Foreign Policy in the Field of International Information Security
Published 2014-12-01Subjects: Get full text
Article -
1168
Evaluating vehicle trafficability on soft ground using wheel force information
Published 2025-02-01“…In this paper, a novel approach of evaluating the vehicle trafficability on soft ground using wheel force information is proposed. As parts of the proposed approach, the methods of obtaining wheel force information, identification of soil mechanical characteristics parameters and integated method of trafficability evaluation, are discussed in detail. …”
Get full text
Article -
1169
Using printed texts to communicate information in the South African development context
Published 2022-10-01Subjects: Get full text
Article -
1170
Information support of CAD of technological processes of structurally complex product prototypes
Published 2022-12-01Subjects: “…information support…”
Get full text
Article -
1171
Controlling the Stochastic Sensitivity in Nonlinear Discrete-Time Systems with Incomplete Information
Published 2015-01-01“…For stochastic nonlinear discrete-time system with incomplete information, a problem of the stabilization of equilibrium is considered. …”
Get full text
Article -
1172
Effectiveness of the voluntary disclosure of corporate information and its commitment to climate change
Published 2023-10-01Get full text
Article -
1173
MODELLING OF THE PREPARATION OF MASTERS OF PROFESSIONAL EDUCATION FOR ACTIVITIES IN THE INFORMATION AND DIGITAL ENVIRONMENT
Published 2023-09-01Subjects: Get full text
Article -
1174
CAPABILITIES OF APPLYING VISIBLE LIGHT RAYS IN THE SYSTEMS OF HIDDEN INFORMATION TRANSMITTING
Published 2018-06-01Subjects: “…hidden transmitting of information…”
Get full text
Article -
1175
Exploring the informational elements of opinion answers: the case of the Russo-Ukrainian war
Published 2023-06-01Subjects: “…Information sharing…”
Get full text
Article -
1176
Performance comparison of different algorithms to secure the information for Wireless sensor Network
Published 2024-01-01Get full text
Article -
1177
More than twenty years of European policy for the development of the information society
Published 2007-03-01Subjects: “…information society…”
Get full text
Article -
1178
Recognizing Boundaries in Wireless Sensor Networks Based on Local Connectivity Information
Published 2014-07-01“…This paper develops an efficient and distributed boundary detection algorithm to precisely recognize wireless sensor network (WSN) boundaries using only local connectivity information. Specifically, given any node in a WSN, the proposed algorithm constructs its 2-hop isocontour and locally makes a rough decision on whether this node is suspected to be on boundaries of the WSN by examining the associated 2-hop isocontour. …”
Get full text
Article -
1179
Physical Layer Security Schemes in Space-Integrated-Ground Information Network
Published 2020-12-01Subjects: “…space-integrated-ground information network…”
Get full text
Article -
1180
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
Published 2025-01-01Subjects: Get full text
Article