Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- information technology 4
- Economic development 3
- Information Technology 3
- Management 3
- Social aspects 3
- Economic aspects 2
- Economic conditions 2
- Economic policy 2
- Globalization 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Management information systems 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Social media 2
- Technological innovations 2
- Bibliotheken 1
- Big data 1
- Business enterprises 1
- Computers 1
- Data processing 1
- Electronic books 1
- Elektronische boeken 1
- Hospitality industry 1
- Industrial management 1
- Information Technology 1
- Information Technology--Moral and ethical aspects 1
-
1561
Wu’s Characteristic Set Method for SystemVerilog Assertions Verification
Published 2013-01-01Get full text
Article -
1562
-
1563
E-invoice authenticity verification scheme based on signature verification
Published 2019-12-01“…With the rapid development of network and information technology,paperless and electronic have become the development trend of today's economic life.As a consumption certificate,electronic invoices have become more and more demanding in e-commerce.The existing electronic invoice verification method is to inquire the invoice information in the national electronic account base according to the invoice number,invoice code,billing date,and amount,and realize the function of comparison inquiry,and can not detect the fraudulent behavior of issuing invoices by non-issuing institutions,and cannot guarantee the full legality and authenticity of electronic invoices.Aiming at the above problems,a verification scheme for electronic invoice authenticity based on signature authentication was proposed.By verifying the signature of the tax agency,the legality verification of the blank electronic invoice is verified,and the digital signature of the seller is verified to determine the authenticity of the invoiced content.Ensure that the electronic invoices passed for verification are true and reliable.…”
Get full text
Article -
1564
Network optimization and reconstruction for 5G
Published 2020-02-01“…In June 2019,the Ministry of Industry and Information Technology officially issued a 5G commercial license,which accelerated the deployment of telecom operator’s network of 5G.NSA networking is a good choice to deploy 5G networks in the early stage,and SA networking is the target architecture of 5G networks.Based on the network existing,how to smooth evolution to 5G is a problem to be considered.The architecture of 4G networks was introduced briefly,the return bearer network was optimized to meet the bandwidth requirement in the early stage of 5G development,Through NFV technology the EPC was reconstructed based on CUPS architecture to support network evolution better.Finally,the inter working architecture of 4G/5G was introduced,the deployment and evolution scheme for SA network was analyzed,which provides reference for the construction of 5G core network.…”
Get full text
Article -
1565
-
1566
Communication internationale, média diasporique en ligne et espace public en Afrique
Published 2019-03-01“…In recent years, research in international communication has undergone some evolution that makes it a less focused field of communication for development and more exploded, dealing with several objects (media coverage, information technology and communication cultural diversity, etc.) and different geographical areas. …”
Get full text
Article -
1567
Providing the Entrepreneurship Development Model Women with a sustainable rural development appriach in Gulistan e Jauhar
Published 2019-09-01“…Abstract in the late 20th century, it has been a tremendous change in all spheres of business, such as globalization of enhancing competitiveness of information technology development competition attention to the quality of customer and such as these are the administration in the public sector with these serious challenges one of the most important approaches to address these challenges is to address the entrepreneurial debate in society as well as women play an important role in promoting employement and improving the economic situation of the community and it is an important factor in shaping social affairs. …”
Get full text
Article -
1568
-
1569
A hierarchical access control scheme based on Lagrange interpolation for mobile agents
Published 2018-07-01Get full text
Article -
1570
-
1571
Instrumenty wsparcia edukacji dla zrównoważonego rozwoju
Published 2010-06-01“…He also highlights the potential of information technology in the realization of educational activities for sustainable development.…”
Get full text
Article -
1572
Evaluating End-to-End Delay in Road-Based Routing Protocols for VANETs with Snake Optimization
Published 2024-06-01Get full text
Article -
1573
Voltage Controlled Intertwined Spiral Arrays for Reconfigurable Metasurfaces
Published 2014-01-01Get full text
Article -
1574
Key technologies and application of artificial intelligence in telecom real-name system
Published 2019-05-01“…According to the real-name system requirements of the State Council and the Ministry of Industry and Information Technology, combined with the needs of telecom operators’ business transformation, an online identity authentication solution based on artificial intelligence technologies was proposed. …”
Get full text
Article -
1575
Individual Educational Ways of Independent Engineering Graphics Training in Technical Higher School
Published 2015-03-01“…Nowadays there is a growing demand for qualified engineers, researchers and developers with the information technology competence, and ability in self-development, self-perfection and self-knowledge; and thevariative higher education is needed for training such specialists. …”
Get full text
Article -
1576
-
1577
Ensuring competitiveness in the twenty-first century: features of human resource management
Published 2021-06-01Get full text
Article -
1578
Research on the Popularity Prediction of Multimedia Network Information Based on Fast K Neighbor Algorithm
Published 2022-01-01Get full text
Article -
1579
-
1580
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Get full text
Article