Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- information technology 4
- Economic development 3
- Information Technology 3
- Management 3
- Social aspects 3
- Economic aspects 2
- Economic conditions 2
- Economic policy 2
- Globalization 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Management information systems 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Social media 2
- Technological innovations 2
- Bibliotheken 1
- Big data 1
- Business enterprises 1
- Computers 1
- Data processing 1
- Electronic books 1
- Elektronische boeken 1
- Hospitality industry 1
- Industrial management 1
- Information Technology 1
- Information Technology--Moral and ethical aspects 1
-
1701
Study on Announcement Effect of Stock Repurchase from the Perspective of Configuration Analysis
Published 2021-01-01Get full text
Article -
1702
CaRo 2.0: An Interactive System for Expressive Music Rendering
Published 2015-01-01“…Understanding and modeling expressive content communication is important for many engineering applications in information technology (e.g., Music Information Retrieval, as well as several applications in the affective computing field). …”
Get full text
Article -
1703
Iris Recognition Using Image Moments and k-Means Algorithm
Published 2014-01-01Get full text
Article -
1704
Reflections on Three Decades of Building Information Modeling
Published 2025-01-01“…The entire field of construction information technology research has enthusiastically embraced building information modeling (BIM) as a method for creating an ever more detailed and ever more complex model of the product, which is produced through an increasingly complex process. …”
Get full text
Article -
1705
IMPORTANCE OF BUSINESS SOLUTIONS BASED ON BLOCKCHAIN TECHNOLOGY
Published 2020-12-01“…In addition, the most important advantages of blockchain technology in relation to existing information technology (IT) systems have been specified. The article describes organizational barriers hindering investments in blockchain technology and its actual applications in companies. …”
Get full text
Article -
1706
Plant and Pest Diagnosis and Identification through DDIS
Published 2018-03-01“…Extension county faculty, state specialists, and faculty of the UF/IFAS Office of Information Technology developed the Distance Diagnostic and Identification System (DDIS), which allows users to submit digital images obtained in the field or after delivery to a local Extension office for rapid diagnosis and identification of pest insects, weeds, diseases, and animals. …”
Get full text
Article -
1707
Adaptability to Clouds of Change: Study of Engineering Students Pursuing Technical Education in Online Mode
Published 2024-12-01Get full text
Article -
1708
DIGITALIZATION OF KEY PROCESSES IN THE WOOD PROCESSING COMPANIES
Published 2023-11-01“… The wood processing industry is not immune to the ripple effects of information technology's constant and rapid growth. Companies from that industry are under more pressure than ever to use digital innovation to adapt to rapidly shifting markets, lead the charge in the energy transition, and speed up the implementation of Industry 4.0. …”
Get full text
Article -
1709
-
1710
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01“…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
Get full text
Article -
1711
AI, big data, and robots for the evolution of biotechnology
Published 2019-11-01“…Technologies that can be experienced in daily life, such as autonomous navigation, real-time translators, and voice recognition services, are already being commercialized in the field of information technology. In the biosciences field in Korea, such technologies have become known to the local public with the introduction of the AI doctor Watson in large number of hospitals. …”
Get full text
Article -
1712
Utilizing Statistical Tests for Comparing Machine Learning Algorithms
Published 2021-07-01Get full text
Article -
1713
A Numerical Study of Linear Two-Points Boundary Value Problems with ODEs of Fourth-Order Using RKM Method
Published 2025-01-01Get full text
Article -
1714
Design of a CPW-Fed Band-Notched UWB Antenna Using a Feeder-Embedded Slotline Resonator
Published 2008-01-01Get full text
Article -
1715
Edge Cloud and Mobile Auxiliary Equipment of Fine Art Painting Course Teaching Auxiliary System Design
Published 2022-01-01“…Due to the development of information technology, the new type of smart campus integrates teaching, scientific research, office services, and many other applications, and online education information resources show a blowout growth. …”
Get full text
Article -
1716
Design of a Compact UWB Antenna with Triple Band-Notched Characteristics
Published 2014-01-01Get full text
Article -
1717
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Published 2025-01-01Get full text
Article -
1718
Almost Sure Stability of Stochastic Neural Networks with Time Delays in the Leakage Terms
Published 2016-01-01Get full text
Article -
1719
Synchronous Reluctance Motor: Dynamical Analysis, Chaos Suppression, and Electronic Implementation
Published 2022-01-01Get full text
Article -
1720
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01“…With the rapid development of information technology, Internet of Things (IoT) is profoundly impacting various fields of the socio-economic landscape, driving the transformation of traditional industries towards intelligence. …”
Get full text
Article