-
181
Some considerations on professional ethics in information and bibliotecology
Published 2011-04-01“…Thus the paper defines the application of the ethical principles in the development the functions, decision taking, actions, prestige and competence in the social environment of the services of the Health Information Management. Ethics is analyzed from the standpoint of behavior, which is an essential aspect for the optimum practice of the profession in any institution of information in which the professionals of this field work. …”
Get full text
Article -
182
Spatial and Temporal Dynamics of a Viral Infection Model with Two Nonlocal Effects
Published 2019-01-01Get full text
Article -
183
Model Value of Taiji Curve Algorithm in Economic Geographic and Natural Game Management Information System
Published 2022-01-01“…In order to study the role of tai chi curve algorithm in economic geography and natural ecological management and explore the application value of tai chi curve algorithm and its model, this study discusses the principle of Chinese tai chi diagram, using mathematical model construction method by the previous tai chi map and Pythagoras theorem clever results, produced the tai chi graph s curve algorithm, and discusses the application value of tai chi curve algorithm and its model from different angles; this study takes Zhangye geography as an example, which provides an applied research direction for the future scientific research of Chinese economic geography and also provides a clever connection with ecological correlation and nature; finally, it is found that the Taiji graph s curve algorithm can calculate the corresponding Yin and Yang values according to the balance point and relative deviation amount of the attribute state, and the results have an extraordinary influence in economic geography, information management system, natural ecology, and other aspects.…”
Get full text
Article -
184
-
185
-
186
Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload
Published 2014-01-01Get full text
Article -
187
Leveraging public AI tools to explore systems biology resources in mathematical modeling
Published 2025-02-01“…Abstract Predictive mathematical modeling is an essential part of systems biology and is interconnected with information management. Systems biology information is often stored in specialized formats to facilitate data storage and analysis. …”
Get full text
Article -
188
-
189
-
190
-
191
Kinetics for Reduction of Iron Ore Based on the Phase Space Reconstruction
Published 2014-01-01Get full text
Article -
192
-
193
Influence Factors and Policy Analysis of Small and Microenterprises’ Sustainable Development: Empirical from Zhejiang
Published 2022-01-01“…We find that fixed assets, information management level, and the overall quality of employees have the best driving force, reaching 0.132, 0.195, and 0.874, respectively. …”
Get full text
Article -
194
A Blind Reversible Robust Watermarking Scheme for Relational Databases
Published 2013-01-01Get full text
Article -
195
-
196
Delay-Sensitive Multi-Sensor Routing Scheduling Method for Underground IoT in Mines
Published 2025-01-01Get full text
Article -
197
Research on the Effect of DPSO in Team Selection Optimization under the Background of Big Data
Published 2018-01-01“…Taking strategic equilibrium matching and dynamic gain as association constraints and maximizing revenue as the optimization goal, the Hadoop enterprise information management platform is constructed to discover the external environment, organizational culture, and strategic objectives of the enterprise and to discover the potential of the customer. …”
Get full text
Article -
198
Media and information literacy of young people: guidelines for public policy
Published 2025-01-01“…As part of the preparation of the youth public policy, we need to develop and implement strategic approaches to ensuring the institutional architecture of information management for the younger generation.…”
Get full text
Article -
199
Information Spread of Emergency Events: Path Searching on Social Networks
Published 2014-01-01Get full text
Article -
200
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Published 2014-01-01Get full text
Article