Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- information technology 4
- Economic development 3
- Information Technology 3
- Management 3
- Social aspects 3
- Economic aspects 2
- Economic conditions 2
- Economic policy 2
- Globalization 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Management information systems 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Social media 2
- Technological innovations 2
- Bibliotheken 1
- Big data 1
- Business enterprises 1
- Computers 1
- Data processing 1
- Electronic books 1
- Elektronische boeken 1
- Hospitality industry 1
- Industrial management 1
- Information Technology 1
- Information Technology--Moral and ethical aspects 1
-
2121
-
2122
A Composite Recognition Method Based on Multimode Mutual Attention Fusion Network
Published 2025-12-01Get full text
Article -
2123
Knowledge Graph Analysis of Digital Emergency Management Research Based on CiteSpace Visualisation: Comparative Analysis of WOS and CNKI Databases
Published 2022-01-01“…The former are information technology, artificial intelligence, and machine learning, whereas the latter are emergency decision making, scenario analysis, and public health.…”
Get full text
Article -
2124
DEVELOPMENT OF IT OUTSOURCING IN UKRAINE: A PROSPECT OF THE BRAIN DRAIN REDUCTION
Published 2019-11-01“…Despite this, Ukraine is one of the leading software development centers in Central and Eastern Europe and ranks fourth in the export of information technology (IT) products and services in the world nowadays. …”
Get full text
Article -
2125
Intelligent On/Off Dynamic Link Management for On-Chip Networks
Published 2012-01-01Get full text
Article -
2126
MAJOR TRENDS OF BIG INTERNATIONAL COMPANIES DEVELOPMENT IN A CHANGING WORLD
Published 2016-02-01“…The rapid development of information technology radically changes the very essence of the creation of new value. …”
Get full text
Article -
2127
A novel approach for detecting the presence of a lymphatic rosary in the iris using a 3-stage algorithm
Published 2024-11-01Get full text
Article -
2128
Review on security risks of key components in industrial control system
Published 2022-06-01“…With the rapid development of modern information technology and communication technology, industrial control system has become an important part of national key infrastructure, whose security is related to national strategic security and social stability.The close connection between modern industrial control system and Internet promotes the rapid progress of industrial control technology, meanwhile it brings serious security risks.Since the“Stuxnet” virus incident, attacks on industrial control systems have occurred frequently, which causes huge economic losses to global production enterprises.Besides, it also poses significant impact on the social stability and security to many countries and regions, which has aroused people’s great concern about the security of industrial control systems.Due to the wide variety of automation equipment and proprietary protocols, complex data flow and rapid development in modern industrial control system, it is very difficult to summarize the safety of key components of industrial control.There are few literatures related to this area, and most of them are old and incomplete.To solve the above problems, the mainstream architecture and related components of the current industrial control system were introduced.Then the security vulnerabilities and potential threats in the key industrial control components were analyzed.The attack methods of SCADA control center, programmable logic controller and field equipment were summarized.Furthermore, the preconditions, objects, steps and hazards of the attack in the literature in recent years were also analyzed.The attacks against industrial control network were classified from the perspective of integrity and confidentiality.Finally, the possible development trend of industrial control system attack was given.…”
Get full text
Article -
2129
Criticism and Genealogy of Failure at Different Stages of the Organization's Life Cycle
Published 2021-05-01Get full text
Article -
2130
-
2131
Preparation of Politechnic Sultan Mizan Zainal Abidin (PSMZA) Lecturers in Facing The Industrial Revolution Flow 4.0
Published 2018-11-01“…The PSMZA lecturer is advised to increase knowledge in information technology, further reading and training remain competent in the current Industrial Revolution 4.0.…”
Get full text
Article -
2132
Cyber Security Intrusion Detection Using a Deep Learning Method
Published 2025-01-01“…The World is moving towards information technology dependence, the cornerstone of which is information security. …”
Get full text
Article -
2133
-
2134
-
2135
-
2136
An Improved Strong Tracking Kalman Filter Algorithm for the Initial Alignment of the Shearer
Published 2019-01-01Get full text
Article -
2137
An Adaptive Denoising Method for Photon-Counting LiDAR Point Clouds: Application in Intertidal Zones
Published 2024-12-01Get full text
Article -
2138
Development of a Geodemographic System for Attica, Greece
Published 2022-10-01“…Geodemographic systems take advantage of information technology to analyze these types of data for a better understanding of the consumer characteristics and improved performing of marketing strategies. …”
Get full text
Article -
2139
Advanced Malware Detection: Integrating Convolutional Neural Networks with LSTM RNNs for Enhanced Security
Published 2024-12-01Get full text
Article -
2140