Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- information technology 4
- Economic development 3
- Information Technology 3
- Management 3
- Social aspects 3
- Economic aspects 2
- Economic conditions 2
- Economic policy 2
- Globalization 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Management information systems 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Social media 2
- Technological innovations 2
- Bibliotheken 1
- Big data 1
- Business enterprises 1
- Computers 1
- Data processing 1
- Electronic books 1
- Elektronische boeken 1
- Hospitality industry 1
- Industrial management 1
- Information Technology 1
- Information Technology--Moral and ethical aspects 1
-
1721
Solving “Antenna Array Thinning Problem” Using Genetic Algorithm
Published 2012-01-01Get full text
Article -
1722
-
1723
Critical realism and information systems research: why bother with philosophy?
Published 2002-01-01“…A recent IFIP conference on Organisational and Social Perspectives on Information technology examines some of the social and organisational issues involved in IS Research (IFIP TC8 WG8.2, 2000). …”
Get full text
Article -
1724
Hopf Bifurcation and Turing Instability Analysis for the Gierer–Meinhardt Model of the Depletion Type
Published 2020-01-01Get full text
Article -
1725
On the return process with refractoriness for a non-homogeneous Ornstein-Uhlenbeck neuronal model
Published 2013-09-01Get full text
Article -
1726
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01“…Nowadays,electric power enterprises have realized the operation and production of information technology,and the importance of network information security evaluation is more and more obvious.Two-level fuzzy comprehensive evaluation method was used to evaluate the security level of network information security system of power enterprises based on PRDD model,and Delphi method was used to determine the weight coefficients of various factors of network security of power enterprises in the evaluation process.Through objective analysis of the evaluation results,the network credit of power enterprises was found out.The prominent problems existing in the informa tion security system should be solved and the corresponding security reinforcement scheme should be formulated.The validation results show that the optimized network information security model is more robust,practicability and operability are significantly improved,which effectively improve the network information security level of power enterprises,and can be used as a favorable reference for the construction of network information security of other power enterprises.…”
Get full text
Article -
1727
Innovative technologies in the educational process: trends, prospects of development
Published 2017-06-01“…Advantages of using this information technology, contributing to a full immersion in the professional environment, are emphasized. …”
Get full text
Article -
1728
PEDAGOGICAL TECHNOLOGIES IN EDUCATIONAL PROCESS OF HIGHER SCHOOL
Published 2016-12-01“…To improve the quality of education and to develop students' competencies stated in the standard it is expedient to use modern educational technologies such as technologies for the revitalization and intensification of students' activities on the basis of schematic and symbolic models, modular system, enlarged didactic units, new information technology training, mind-management, etc. These technologies allow to analyze any volume of information quickly and to make thorough decisions to achieve your goal, to communicate efficiently, and to present the result simply and clearly.…”
Get full text
Article -
1729
The impact of gender differences on learning digital games programming
Published 2024-01-01“…The research involved 44 information technology students at the Faculty of Technical Sciences in Čačak. …”
Get full text
Article -
1730
Research on Enterprise Supply Chain Optimization Model and Algorithm Based on Fuzzy Clustering
Published 2021-01-01“…Using this optimization method to optimize the inventory of enterprise logistics supply chain, the operation is fast, the result is correct and reasonable, and it can provide good decision support for the distribution network of logistics enterprises. Through information technology and modern management technology, we should effectively control and coordinate the logistics, information flow, and capital flow in the production and operation process and organically integrate the internal supply chain with the external supply chain for management, so as to achieve the goal of global optimization.…”
Get full text
Article -
1731
Exploring the Impact of Large Language Models on Disease Diagnosis
Published 2025-01-01Get full text
Article -
1732
Unveiling the Essence of Gastronomy: A Data-Driven Exploration of Culinary Expertise in the Nordic Region
Published 2024-12-01Get full text
Article -
1733
Quality Control of Olive Oils Using Machine Learning and Electronic Nose
Published 2017-01-01Get full text
Article -
1734
Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation
Published 2024-06-01“…The knowledge of information technology does not have a positive and significant effect on the business of Minoo food industry in the economic recession. …”
Get full text
Article -
1735
Dynamic selectout and voting-based federated learning for enhanced medical image analysis
Published 2025-01-01Get full text
Article -
1736
-
1737
Role of Gut and Urinary Microbiome in Children with Urinary Tract Infections: A Systematic Review
Published 2025-01-01Get full text
Article -
1738
-
1739
Sun-simulated-driven production of high-purity methanol from carbon dioxide
Published 2025-01-01Get full text
Article -
1740