Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 3
- Management information systems 3
- systems 2
- Computer-assisted instruction 1
- Data processing 1
- Enterprise application integration (Computer systems) 1
- Geography 1
- Industrial management 1
- Language and languages 1
- Management 1
- Management systems 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- information technology 1
-
1081
Analog Sequential Hippocampal Memory Model for Trajectory Learning and Recalling: A Robustness Analysis Overview
Published 2025-01-01“…The rapid expansion of information systems in all areas of society demands more powerful, efficient, and low‐energy consumption computing systems. …”
Get full text
Article -
1082
Computer data examination: the essence and procedural order
Published 2023-10-01“…Within the framework of the article, the examination of computer data is distinguished from the examination of computer equipment (by the object criterion) and from the removal of information from electronic information systems (by the (non)secrecy criterion). The author emphasises that the procedural order of the analysed procedural action is regulated by Articles 104, 105, 223, 237 of the CPC of Ukraine, as well as the requirements for collection and verification of evidence (Chapter 4 of the CPC of Ukraine), the principles of criminal proceedings (Chapter 2 of the CPC of Ukraine) and other general provisions of criminal procedural legislation. …”
Get full text
Article -
1083
Towards a unified regional surveillance system: the Gulf CDC’s first initiatives
Published 2025-01-01“…The Gulf CDC’s mission includes consolidating the region’s health information systems, crucial for monitoring disease burden and shaping effective public health policies. …”
Get full text
Article -
1084
Sphere of Providing Funeral Services in Ukraine: Current Problems
Published 2021-09-01“…It has been emphasized that among the problems that arise in this area are: 1) the lack of transparent information systems, which significantly complicates the mechanism of choosing a burial place, providing the necessary documents and creates corruption; 2) violation of the requirements of landscaping, the proximity of burial sites to human habitation, the lack of legally regulated options for bioburials, which causes the deterioration of the environmental situation.…”
Get full text
Article -
1085
-
1086
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
Published 2025-01-01Get full text
Article -
1087
An Intelligent Deep Learning Model for CO2 Adsorption Prediction
Published 2022-01-01Get full text
Article -
1088
Innovative Technologies for Studying the Impact of Climate Change on River Basins in the Guba-Khachmaz Region of Azerbaijan
Published 2025-01-01“…As a result of the studies, it was determined that the most effective way to obtain, collect and analyze information on the impacts of climate change in the territory of the Republic of Azerbaijan, including Guba- Khachmaz economic region, is the use of Geographic Information Systems (GIS). The general monitoring framework was applied to analyze changes in climate characteristics in large regions at different time scales. …”
Get full text
Article -
1089
Automatic generation of AppArmor security policies based on large language models
Published 2024-06-01“…Operating system (OS) security has been considered as a critical layer within the comprehensive security framework of computer information systems. Mandatory access control (MAC) mechanisms such as SELinux and AppArmor have been employed to strengthen OS security. …”
Get full text
Article -
1090
Methodology for cognition of digital society
Published 2020-07-01“…Digital sociology is a computational social science that uses modern information systems and technologies, has already formed. …”
Get full text
Article -
1091
THE SANDY HILL LANDSCAPE (CORRIENTES, ARGENTINA) FROM LATE PLEISTOCENE TO THE PRESENT
Published 2018-09-01“…The results were obtained due to the comparisons between the environmental reconstructions of the paleontological studies and the current situation of the region, besides the application of spatial analysis with geographic information systems and the knowledge of their shallow lakes distribution, since they constitute the main natural element of the landscape. …”
Get full text
Article -
1092
Learning digital medical environment as a tool of teaching computer science to medical students
Published 2024-12-01“…A future doctor should possess basic and professional theoretical knowledge, have certain practical medical skills as well as skills in working with information systems and digital programs. It is very important that medical students are prepared to work with the digital healthcare environment if they want to work effectively in modern medical institutions in their future professional activities. …”
Get full text
Article -
1093
-
1094
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01“…The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. …”
Get full text
Article -
1095
-
1096
The reaction of the social security systems of the European Union and the united states of America to financial crises: proposals for using the experience in Russia
Published 2024-11-01“…Finally, this social system can effectively reach the target segment of beneficiaries only if means-testing information systems are of high quality.…”
Get full text
Article -
1097
The Role of Wind Dynamics in Sand Mobility in the Tafilalet Oasis (Southeast Morocco)
Published 2025-01-01“…The methodology is based on an analytical approach, tracking the evolution of various sand accumulation dynamics over a 12-year period using remote sensing techniques, geographic information systems (GIS), and field data. The results reveal notable differences in the mobility of specific dune forms. …”
Get full text
Article -
1098
Modeling, evaluation and metrics performance of the SyncLMKD in distributed kinematics variations
Published 2025-01-01Get full text
Article -
1099
-
1100
Network security of the National Natural Science Foundation of China: today and prospects
Published 2022-12-01“…The National Natural Science Foundation of China (hereinafter referred to as the Natural Science Foundation of China) is responsible for effectively utilizing the National Natural Science Foundation of China, supporting basic research, adhering to free exploration, playing a guiding role, and discovering and cultivating science and technology in accordance with the national guidelines, policies and plans for the promotion of scientific and technological progress and coordinated economic and social development.With the continuous development of new productive forces represented by information technology, the Natural Science Foundation of China has been committed to promoting the informatization and intelligence of fund management.With the increasing complexity of business types, various types of network attacks, such as information leakage attacks, are encountered in the construction of informatization and make network security face severe challenges.The network security construction of the Natural Science Foundation of China was took as the main line and the network security construction of the existing platform was introduced.At present, a network security system structure with the science fund project management as the core has been established to ensure the safe and stable operation of the network system.The main information systems of the Natural Science Foundation of China (Natural Science Foundation Shared Service Network, business department website, email system) and its main threats were analyzed and introduced.Then the thoughts and suggestions in the follow-up informatization and network security construction were given.The Natural Science Foundation of China will start the construction of a new generation of secure network.Under the premise of fully considering the characteristics of science fund review, management, and open sharing, it will achieve the overall goal of “smarter, safer, and better” and carry out network security system construction for relevant units.…”
Get full text
Article