Showing 821 - 840 results of 2,197 for search '"information systems"', query time: 0.09s Refine Results
  1. 821

    Au-delà de la Smart City : Imaginaires , infrastructures, dynamiques urbaines et promesses du monde d’après by Meryam Benabdeljelil

    Published 2024-10-01
    “…Perceived as a symbol of performance, the Smart City model seems to promote a digitized and automated future, promising potential improvement of urban planning and infrastructure, services, and information systems, through urban continuous and almost instantaneous flows’ prediction and monitoring, consequently influencing urban dynamics, particularly in the context of health crisis around the pandemic. …”
    Get full text
    Article
  2. 822
  3. 823

    Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints by Ruyun ZHANG, Heyuan LI, Shunbin LI

    Published 2021-03-01
    “…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
    Get full text
    Article
  4. 824
  5. 825

    Research on system log anomaly detection based on deep learning by Yidong WANG, Peishun LIU, Gbin WAN

    Published 2019-10-01
    “…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
    Get full text
    Article
  6. 826

    FLEXIBLE LEARNING IN TRADITIONAL EDUCATIONAL PROCESS by I. N. GOLITSYNA

    Published 2017-06-01
    “…The author highlights the experience of flexible learning organization in the learning process of the students of the educational programs “Applied Informatics” (bachelor level) and “Information Systems and Technology” (bachelor level) by using web resources for practical training. …”
    Get full text
    Article
  7. 827

    SOME PROPERTIES OF INDUCED COVER FROM FAMILY OF COVERING ROUGH SETS by Nguyễn Đức Thuần

    Published 2017-09-01
    “…Rough set theory is an efficient and essential tool for dealing with vagueness and granularity in information systems. Covering based rough set theory is proposed as a significant generalization of classical rough sets. …”
    Get full text
    Article
  8. 828

    Personal anticipated information need by H. Bruce

    Published 2005-01-01
    “…It is suggested that personal information collections are created in anticipation of some future need for that information-<em>personal, anticipated information need</em>, which also underlies the design of formal information systems. Elaboration. Examination of the literature of information needs and information seeking behaviour leads to the formulation of five propositions that elaborate the concept of personal, anticipated information need. …”
    Get full text
    Article
  9. 829

    FORMATION OF SYSTEMICALLY INTEGRATED ACCOUNTING AND THE MECHANISM OF ITS IMPLEMENTATION IN THE SYSTEM OF QUALITY MANAGEMENT OF BUSINESS PROCESSES by S. Ponomareva

    Published 2018-07-01
    “…It is determined that for efficient business management systems not only need to have highly qualified managers and technical base (expensive operating system), but also two information systems that interact on the basis of the principle of convergence and economic viability (growth strategy of the business value) of accounting and analytical control-regulatory system for business management purposes. …”
    Get full text
    Article
  10. 830
  11. 831
  12. 832

    Les observatoires de la mer et du littoral : du suivi des interactions hommes-milieux à la coordination des acteurs by Jean-Michel Salles, Hélène Rey Valette, Rémi Mongruel

    Published 2022-03-01
    “…The development of integrated management policies in the coastal and maritime environment involves renewing the information systems in support of these policies. New indicators have been proposed for which it is necessary to study not only the methods of construction but also their legitimacy and the nature of the needs they meet. …”
    Get full text
    Article
  13. 833
  14. 834
  15. 835

    Pengukuran Tingkat Kapabilitas Sistem Tata Kelola TI Menggunakan Cobit 5 dengan ISO 38500 by Muhammad Basyier Ardima, Rahmat Gernowo, Vincencius Gunawan Slamet

    Published 2020-05-01
    “…Abstract  The usage of information systems and information technology in an organization is essential since information system is very important in supporting the performance of an organization. …”
    Get full text
    Article
  16. 836
  17. 837

    Informational Aspects of Telepathology in Routine Surgical Pathology by Peter Gombas

    Published 2000-01-01
    “…Complete data integration, fast access patients' data to usage of diagnosis thesaurus labeled with standardized codes and free text supplements, complex inquiry of the data contents, data exchange via teleconsultation and multilevel data protection are required functions of an integrated information system. Increasing requirement for teleconsultation transferring a large amount of multimedia data among different pathology information systems raises new questions in telepathology. …”
    Get full text
    Article
  18. 838
  19. 839

    Computer 3D Scene Simulation of Ecological Landscape Layout Planning by Tong Ling, Yun Ma

    Published 2022-01-01
    “…Virtual reality, virtual plants and geographic information systems, and other technologies are used. Based on parameterized method in constructing 3D landscape scene, the main elements of the landscape were, respectively, constructed and rendered in 3D model, and a complete 3D landscape scene construction model was formed. …”
    Get full text
    Article
  20. 840