Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 3
- Management information systems 3
- systems 2
- Computer-assisted instruction 1
- Data processing 1
- Enterprise application integration (Computer systems) 1
- Geography 1
- Industrial management 1
- Language and languages 1
- Management 1
- Management systems 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- information technology 1
-
821
Au-delà de la Smart City : Imaginaires , infrastructures, dynamiques urbaines et promesses du monde d’après
Published 2024-10-01“…Perceived as a symbol of performance, the Smart City model seems to promote a digitized and automated future, promising potential improvement of urban planning and infrastructure, services, and information systems, through urban continuous and almost instantaneous flows’ prediction and monitoring, consequently influencing urban dynamics, particularly in the context of health crisis around the pandemic. …”
Get full text
Article -
822
-
823
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
Published 2021-03-01“…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
Get full text
Article -
824
Means of Question-Answer Interaction for Collaborative Development Activity
Published 2009-01-01Get full text
Article -
825
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
Get full text
Article -
826
FLEXIBLE LEARNING IN TRADITIONAL EDUCATIONAL PROCESS
Published 2017-06-01“…The author highlights the experience of flexible learning organization in the learning process of the students of the educational programs “Applied Informatics” (bachelor level) and “Information Systems and Technology” (bachelor level) by using web resources for practical training. …”
Get full text
Article -
827
SOME PROPERTIES OF INDUCED COVER FROM FAMILY OF COVERING ROUGH SETS
Published 2017-09-01“…Rough set theory is an efficient and essential tool for dealing with vagueness and granularity in information systems. Covering based rough set theory is proposed as a significant generalization of classical rough sets. …”
Get full text
Article -
828
Personal anticipated information need
Published 2005-01-01“…It is suggested that personal information collections are created in anticipation of some future need for that information-<em>personal, anticipated information need</em>, which also underlies the design of formal information systems. Elaboration. Examination of the literature of information needs and information seeking behaviour leads to the formulation of five propositions that elaborate the concept of personal, anticipated information need. …”
Get full text
Article -
829
FORMATION OF SYSTEMICALLY INTEGRATED ACCOUNTING AND THE MECHANISM OF ITS IMPLEMENTATION IN THE SYSTEM OF QUALITY MANAGEMENT OF BUSINESS PROCESSES
Published 2018-07-01“…It is determined that for efficient business management systems not only need to have highly qualified managers and technical base (expensive operating system), but also two information systems that interact on the basis of the principle of convergence and economic viability (growth strategy of the business value) of accounting and analytical control-regulatory system for business management purposes. …”
Get full text
Article -
830
Author Correction: IoT-based automated system for water-related disease prediction
Published 2025-01-01Get full text
Article -
831
Analyzing the Reliability of a Pumping System through the Application of Copula Analysis
Published 2024-01-01Get full text
Article -
832
Les observatoires de la mer et du littoral : du suivi des interactions hommes-milieux à la coordination des acteurs
Published 2022-03-01“…The development of integrated management policies in the coastal and maritime environment involves renewing the information systems in support of these policies. New indicators have been proposed for which it is necessary to study not only the methods of construction but also their legitimacy and the nature of the needs they meet. …”
Get full text
Article -
833
-
834
-
835
Pengukuran Tingkat Kapabilitas Sistem Tata Kelola TI Menggunakan Cobit 5 dengan ISO 38500
Published 2020-05-01“…Abstract The usage of information systems and information technology in an organization is essential since information system is very important in supporting the performance of an organization. …”
Get full text
Article -
836
-
837
Informational Aspects of Telepathology in Routine Surgical Pathology
Published 2000-01-01“…Complete data integration, fast access patients' data to usage of diagnosis thesaurus labeled with standardized codes and free text supplements, complex inquiry of the data contents, data exchange via teleconsultation and multilevel data protection are required functions of an integrated information system. Increasing requirement for teleconsultation transferring a large amount of multimedia data among different pathology information systems raises new questions in telepathology. …”
Get full text
Article -
838
A VLSI Implementation of Rank-Order Searching Circuit Employing a Time-Domain Technique
Published 2013-01-01Get full text
Article -
839
Computer 3D Scene Simulation of Ecological Landscape Layout Planning
Published 2022-01-01“…Virtual reality, virtual plants and geographic information systems, and other technologies are used. Based on parameterized method in constructing 3D landscape scene, the main elements of the landscape were, respectively, constructed and rendered in 3D model, and a complete 3D landscape scene construction model was formed. …”
Get full text
Article -
840
The Extended Inverse Weibull Distribution: Properties and Applications
Published 2020-01-01Get full text
Article