Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- information technology 4
- Economic development 3
- Information Technology 3
- Management 3
- Social aspects 3
- Economic aspects 2
- Economic conditions 2
- Economic policy 2
- Globalization 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Management information systems 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Social media 2
- Technological innovations 2
- Bibliotheken 1
- Big data 1
- Business enterprises 1
- Computers 1
- Data processing 1
- Electronic books 1
- Elektronische boeken 1
- Hospitality industry 1
- Industrial management 1
- Information Technology 1
- Information Technology--Moral and ethical aspects 1
-
1601
A movable technological simulation system for kinematic analysis to provide immediate accurate feedback and predict javelin throw distance
Published 2015-06-01“…The use of information technology (IT) and highly sophisticated devices in learning and evaluating training process is very common in today's sport sciences. …”
Get full text
Article -
1602
Internet of Things Optimal Routing based on Markov-Reinforcement Learning Algorithm
Published 2024-09-01Get full text
Article -
1603
Technological Cooperation Networks at Bio-Manguinhos: the Role of Information and Communication Technologies
Published 2015-01-01“…They also show the importance of closer cooperation between the information technology (IT) and R&D areas. A future positioning of Bio-Manguinhos as a technological center focused on discovery and sale of new active ingredients can favor the use of tools that promote greater integration between the partners of technology cooperation networks.…”
Get full text
Article -
1604
-
1605
Optimized CNN-Based Recognition of District Names of Punjab State in Gurmukhi Script
Published 2022-01-01Get full text
Article -
1606
Research of cloud-network operating system based on ONAP open-source architecture
Published 2021-08-01“…Cloud-network convergence is an output of the deep convergence of communication technology and information technology.Open network automation platform (ONAP) is an open-source automatic network orchestrator managed by Linux Foundation Networking.It is able to support the operation and orchestration of multiple network applications based on unified open architecture.A systemic solution was proposed to deeply research design-time run-time, closed-loop automation and E2E slicing use case based on ONAP open-source architecture to support the operation and orchestration requirements of cloud-network operating system in the future.This solution focuses on the agile and iterated development of efficient and applicative cloud-network operating system for the requirements of cloud-network convergence operation based on open-source unified architecture.…”
Get full text
Article -
1607
-
1608
System detecting network anomaly with visualization techniques
Published 2018-02-01“…With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.…”
Get full text
Article -
1609
Local Fractional Z-Transforms with Applications to Signals on Cantor Sets
Published 2014-01-01Get full text
Article -
1610
Subspace-Based Anomaly Detection for Large-Scale Campus Network Traffic
Published 2023-01-01“…With the continuous development of information technology and the continuous progress of traffic bandwidth, the types and methods of network attacks have become more complex, posing a great threat to the large-scale campus network environment. …”
Get full text
Article -
1611
Sharp Lower Bound of Cacti Graph with respect to Zagreb Eccentricity Indices
Published 2024-01-01Get full text
Article -
1612
Repairing the Inconsistent Fuzzy Preference Matrix Using Multiobjective PSO
Published 2015-01-01Get full text
Article -
1613
Application of Data Mining Technology in Field Verification of Project Cost
Published 2021-01-01“…Moreover, this paper makes full use of computer information technology and uses the local area network and network as the basis to transform the vertical transmission of cost information into horizontal, so as to ensure the effective communication and exchange of cost information. …”
Get full text
Article -
1614
Introduction to cyberspace security discipline
Published 2019-06-01“…With rapidly development of electronic information technology and industry,human society comes into information age.In the information age human lives and works in cyberspace.There for,it is the base requirement for human to ensure cyberspace security in the information age.Now,our country has established whole one-level discipline of cyberspace security.So the top priority for us is that should discuss overall the architecture and base theory of cyberspace security discipline.It include the contents as follows:the concept of cyberspace and cyberspace security,the definition of cyberspace security discipline,main research area and contents of cyberspace security discipline,base theory and method theory of cyberspace security discipline.Consequently,we should correctly understand and know well the architecture and base theory of cyberspace security discipline.It is very important not only for discipline construction end personnel training but also for science research and industry development in our country.…”
Get full text
Article -
1615
Green IoT: how wireless sensor networks are paving the way for sustainable smart environments
Published 2023-06-01“…It discusses the future pattern and the next major upheaval unfolding in the realm of information technology. Individuals and objects are linked to everything and anybody, anytime, wherever, and via the use of organization or administration. …”
Get full text
Article -
1616
Robust Estimation-Based Control Strategies for Induction Motors
Published 2020-01-01Get full text
Article -
1617
A Study on Regional Financial Risks Based on CoCVaR Model
Published 2021-01-01“…There are insignificant CoCVaR for daily consumption, information technology, and health care. The risk spillover to the real economy market in Guangdong Province is smaller when companies in these industries are in crisis.…”
Get full text
Article -
1618
Application of Taiwan’s Human Rights-Themed Cultural Assets and Spatial Information
Published 2020-01-01“…This article uses the National Cultural Assets Network to query Taiwan’s human rights-themed cultural assets, and I apply the spatial information technology of the DocuSky digital humanities academic research platform to draw the maps with GIS and visualization tools. …”
Get full text
Article -
1619
-
1620
Utilization of Fuzzy Ontology for the Meaning of Homonymous and Homophones Ambiguous Sentences
Published 2023-11-01Get full text
Article