Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 3
- Management information systems 3
- systems 2
- Computer-assisted instruction 1
- Data processing 1
- Enterprise application integration (Computer systems) 1
- Geography 1
- Industrial management 1
- Language and languages 1
- Management 1
- Management systems 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- information technology 1
-
1621
Application of public key infrastructure in telecom operators
Published 2020-11-01“…With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.…”
Get full text
Article -
1622
Early warning prediction of external force destruction in transmission lines based on automatic clustering model
Published 2019-03-01“…The external force destruction has become a major threat to the safe and stable operation of overhead transmission lines,bringing difficulties to the defense and early warning work.In order to solve the problem that the traditional clustering center is difficult to accurately determined and susceptible to abnormal points,an automatic clustering method for data analysis work of transmission lines was presented,and external damage data was analyzed from time and space latitude.Firstly,the cluster center was initialized in this method by using Canopy algorithm.Then,the optimized K-means algorithm was used to perform clustering.Finally,the effectiveness of this method was proved by experimental analysis.This method will be applied to the GIS module in the power information system,which can realize the spatio-temporal visualization of the analysis results and provide powerful decision support for finding cause of the external force damage of the transmission line.…”
Get full text
Article -
1623
6G endogenous security:blockchain technology
Published 2020-01-01“…With the development of mobile communication technology towards marginalization and distributed structure,the traditional network security method of external border protection will be faced with more and more challenges.The emerging network security accidents also show that it is necessary to grow self-adaptive,independent and self-growing security capabilities from the information system,that is,endogenous security.Blockchain,as a de-centralized shared ledger and database,has the characteristics of decentralization,immutability,leaving traces throughout,traceability,collective maintenance,openness and transparency,etc.…”
Get full text
Article -
1624
QUANTITATIVE ANALYSIS OF GEOMORPHIC RESPONSES AND TOPSIS APPROACHE ANALYSIS TO ACTIVE TECTONIC PROCESS: A CASE STUDY OF THE NORTHEAST OF THE AURES (TEBESSA)
Published 2024-10-01“…Asymmetry and topographic factors were incorporated into a geographic information system, and the region was classified into four IRAT classes: high, medium, low, and rank. …”
Get full text
Article -
1625
Resolving ambiguity in natural language for enhancement of aspect-based sentiment analysis of hotel reviews
Published 2025-01-01Get full text
Article -
1626
-
1627
-
1628
-
1629
-
1630
Perencanaan Strategis Sistem Informasi Pada Lembaga Amil Zakat Menggunakan Analisis SWOT Berbasis Lima Faktor Seni Perang Sun Tzu Berdasarkan Anita Cassidy
Published 2023-10-01“…Abstract Amil Zakat Institution (LAZ) uses Information System/Information Technology (IS/TI) strategy to improve competitiveness. …”
Get full text
Article -
1631
Pengembangan Sistem Informasi Layanan Dokumen Alumni Politeknik Statistika STIS
Published 2022-02-01“…The information system was built using the System Development Life Cycle (SDLC) Waterfall. …”
Get full text
Article -
1632
-
1633
SOIL FACIES – A GEOGRAPHIC LOCAL-REGIONAL COMPLETING OF SOIL TAXONOMIC UNITS
Published 2012-12-01“…This particularization of the soil entities using soil facies can be carried on to the individualization of each soil area (delineation) in the framework of an information system and database correlated with the cadastral survey.…”
Get full text
Article -
1634
Landslide susceptibility of Rwanda (Central Africa)
Published 2024-12-01“…The susceptibility assessment was performed using an integrated approach based on morphometric analysis in a Geographic Information System (GIS), supported by orthophoto analysis and geomorphological field mapping. …”
Get full text
Article -
1635
A framework for the early detection and prediction of dengue outbreaks in the Republic of Panama
Published 2025-01-01“…This manuscript presents a transdisciplinary vision that encompasses aspects of sample management, vector surveillance, sharing of weather information, and georeferencing of cases in a Geographic Information System and defining data-driven software solutions for prediction of possible outbreaks.…”
Get full text
Article -
1636
INTEGUMENTARY AND VISCERAL EPIDEMIOLOGICAL PROFILE OF LEISHMANIASIS IN MONTES CLAROS COUNTY
Published 2023-09-01“…The data was gathered from the electronic Notifiable Diseases Information System (SINAN - Sistema de Informações de Agravos de Notificação. …”
Get full text
Article -
1637
ArcGIS在野生动物空间分布研究中的应用
Published 2019-01-01“…研究野生动物的空间属性时一般要用到地理信息系统(geographic information system),ArcGIS作为一款功能强大、开放性强、可拓展、可伸缩、多层次的GIS空间分析软件,在野生动物空间分布研究中必不可少。…”
Get full text
Article -
1638
Risk assessment of infrastructure destabilisation due to global warming in the high French Alps
Published 2015-09-01“…To help prevent such risks, an inventory of all the high mountain infrastructures in the French Alps was carried out using a Geographic Information System. This combined several data layers, including the Alpine Permafrost Index Map and glacier inventories since the end of the Little Ice Age. 1,769 infrastructures were identified in areas probably characterised by permafrost and/or possibly affected by glacier shrinkage. …”
Get full text
Article -
1639
Precision Farming Adoption by Florida Citrus Producers: Probit Model Analysis
Published 2005-04-01“…The use of soil sampling; yield monitoring; remote sensing; and variable-rate applications of herbicide, pesticide, and fertilizer, as well as the global positioning system (GPS) and a geographic information system (GIS) can be considered precision agriculture. …”
Get full text
Article -
1640
DETERMINACIÓN DEL RIESGO DE EROSIÓN HÍDRICA DE SUELOS DE LOS DEPARTAMENTOS MINAS Y CHOS MALAL (NEUQUÉN) MEDIANTE LA APLICACIÓN DE LA ECUACIÓN UNIVERSAL DE PÉRDIDA DE SUELO (USLE)...
Published 2012-12-01“…In this paper we estimated the potential loss of soil by water erosion under different land management scenarios, using Universal Soil Loss Equation and a Geographic Information System. The results indicated that 45.6% of the surface presented minor water erosion (<10 tons / ha / year), by 21.5% corresponded to high erosion (50-200 tonnes / ha / year) and 3.6% of the land was affected by current potential erosion loss, greater than 200 tonnes / ha / year.…”
Get full text
Article