Showing 1,601 - 1,620 results of 3,341 for search '"Information Technology"', query time: 0.07s Refine Results
  1. 1601

    A movable technological simulation system for kinematic analysis to provide immediate accurate feedback and predict javelin throw distance by Essam Eldin Hassan

    Published 2015-06-01
    “…The use of information technology (IT) and highly sophisticated devices in learning and evaluating training process is very common in today's sport sciences. …”
    Get full text
    Article
  2. 1602
  3. 1603

    Technological Cooperation Networks at Bio-Manguinhos: the Role of Information and Communication Technologies by Lázaro Pereira de Oliveira, Claudio Pitassi, Antônio Augusto Gonçalves

    Published 2015-01-01
    “…They also show the importance of closer cooperation between the information technology (IT) and R&D areas. A future positioning of Bio-Manguinhos as a technological center focused on discovery and sale of new active ingredients can favor the use of tools that promote greater integration between the partners of technology cooperation networks.…”
    Get full text
    Article
  4. 1604
  5. 1605
  6. 1606

    Research of cloud-network operating system based on ONAP open-source architecture by Dong WANG, Qiong SUN, Honglei XU

    Published 2021-08-01
    “…Cloud-network convergence is an output of the deep convergence of communication technology and information technology.Open network automation platform (ONAP) is an open-source automatic network orchestrator managed by Linux Foundation Networking.It is able to support the operation and orchestration of multiple network applications based on unified open architecture.A systemic solution was proposed to deeply research design-time run-time, closed-loop automation and E2E slicing use case based on ONAP open-source architecture to support the operation and orchestration requirements of cloud-network operating system in the future.This solution focuses on the agile and iterated development of efficient and applicative cloud-network operating system for the requirements of cloud-network convergence operation based on open-source unified architecture.…”
    Get full text
    Article
  7. 1607
  8. 1608

    System detecting network anomaly with visualization techniques by Haocheng ZHANG, Xiaojie WU, Xiang TANG, Runxuan SHU, Tianchen DING, Xiaoju DONG

    Published 2018-02-01
    “…With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.…”
    Get full text
    Article
  9. 1609
  10. 1610

    Subspace-Based Anomaly Detection for Large-Scale Campus Network Traffic by Xiaofeng Zhao, Qiubing Wu

    Published 2023-01-01
    “…With the continuous development of information technology and the continuous progress of traffic bandwidth, the types and methods of network attacks have become more complex, posing a great threat to the large-scale campus network environment. …”
    Get full text
    Article
  11. 1611
  12. 1612
  13. 1613

    Application of Data Mining Technology in Field Verification of Project Cost by Yi Jiang

    Published 2021-01-01
    “…Moreover, this paper makes full use of computer information technology and uses the local area network and network as the basis to transform the vertical transmission of cost information into horizontal, so as to ensure the effective communication and exchange of cost information. …”
    Get full text
    Article
  14. 1614

    Introduction to cyberspace security discipline by Huanguo ZHANG, Ruiying DU

    Published 2019-06-01
    “…With rapidly development of electronic information technology and industry,human society comes into information age.In the information age human lives and works in cyberspace.There for,it is the base requirement for human to ensure cyberspace security in the information age.Now,our country has established whole one-level discipline of cyberspace security.So the top priority for us is that should discuss overall the architecture and base theory of cyberspace security discipline.It include the contents as follows:the concept of cyberspace and cyberspace security,the definition of cyberspace security discipline,main research area and contents of cyberspace security discipline,base theory and method theory of cyberspace security discipline.Consequently,we should correctly understand and know well the architecture and base theory of cyberspace security discipline.It is very important not only for discipline construction end personnel training but also for science research and industry development in our country.…”
    Get full text
    Article
  15. 1615

    Green IoT: how wireless sensor networks are paving the way for sustainable smart environments by Haifa Alqahtani

    Published 2023-06-01
    “…It discusses the future pattern and the next major upheaval unfolding in the realm of information technology. Individuals and objects are linked to everything and anybody, anytime, wherever, and via the use of organization or administration. …”
    Get full text
    Article
  16. 1616
  17. 1617

    A Study on Regional Financial Risks Based on CoCVaR Model by Mingxin Li, Jun Tang

    Published 2021-01-01
    “…There are insignificant CoCVaR for daily consumption, information technology, and health care. The risk spillover to the real economy market in Guangdong Province is smaller when companies in these industries are in crisis.…”
    Get full text
    Article
  18. 1618

    Application of Taiwan’s Human Rights-Themed Cultural Assets and Spatial Information by Shuhui Lin

    Published 2020-01-01
    “…This article uses the National Cultural Assets Network to query Taiwan’s human rights-themed cultural assets, and I apply the spatial information technology of the DocuSky digital humanities academic research platform to draw the maps with GIS and visualization tools. …”
    Get full text
    Article
  19. 1619
  20. 1620