Showing 43,881 - 43,900 results of 68,043 for search '"technology"', query time: 0.22s Refine Results
  1. 43881

    The development of children's Web searching skills - a non-linear model by Ann-Britt Enochsson

    Published 2005-01-01
    “…In this case the respondents have also commented upon the result.The students regard six different skills as fundamental: language, knowledge about the technology, knowledge about different ways of information seeking, how search engines work, setting goals and being critical.…”
    Get full text
    Article
  2. 43882

    Critical realism and information systems research: why bother with philosophy? by Philip J. Dobson

    Published 2002-01-01
    “…Garcia and Quek (1997) point out the difficulties in defining the actual object of information systems research - 'Is the object of research in information systems of a technological or social nature? Is it the organization, an information system or a social system?' …”
    Get full text
    Article
  3. 43883
  4. 43884
  5. 43885
  6. 43886
  7. 43887
  8. 43888
  9. 43889

    RANCANG BANGUN SISTEM PENGAWASAN PEMAKAIAN ALAT PELINDUNG DIRI BERBASIS SINGLE BOARD COMPUTER by Pungky Irlan Hidayat, Rahmi Eka Putri, Budi Rahmadya

    Published 2024-04-01
    “…Image Processing is part of Artificial Intelligence and one of the technology developments that can be used in supervising the use of PPE workers, You Only Look Once (YOLO) is a method in image processing that can detect workers' PPE. …”
    Get full text
    Article
  10. 43890

    The Use of Different Image Recognition Techniques in Food Safety: A Study by Rijwan Khan, Santosh Kumar, Niharika Dhingra, Neha Bhati

    Published 2021-01-01
    “…It stresses the critical components of image processing technology and a survey of the most current advances across the food sector. …”
    Get full text
    Article
  11. 43891

    Analysis of College Students’ Physical Health Test Data Based on Big Data and Health Promotion Countermeasures by Ming Li, Fengcai Wang

    Published 2022-01-01
    “…In order to improve the data analysis and health promotion effect of college students' physical health test, this paper combines the big data technology to carry out the analysis and health promotion system of college students’ physical health test data. …”
    Get full text
    Article
  12. 43892
  13. 43893
  14. 43894
  15. 43895
  16. 43896

    Application of BIM+GIS in Water Resources Allocation Project of the Pearl River Delta by DU Canyang, DENG Peng, ZHANG Zhaobo, ZHU Xiaobin

    Published 2022-01-01
    “…The water resources allocation projects in the Pearl River Delta are characterized by multiple points,long lines,complex technology,long construction periods,and difficult coordination. …”
    Get full text
    Article
  17. 43897
  18. 43898

    California’s Senate Bill 596: Spearheading the global transition to sustainable cement by Kenneth C. Johnson

    Published 2025-01-01
    “…The so-called “hard to abate” cement industry is at the cusp of a foundational technology transformation. Emerging technologies could make cement production carbon-neutral or carbon-negative, and could potentially do so profitably. …”
    Get full text
    Article
  19. 43899

    UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database by Tao WEN, Yu-qing ZHANG, Qi-xu LIU, Gang YANG

    Published 2015-10-01
    “…Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.…”
    Get full text
    Article
  20. 43900

    Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises by Daoyuan LIU, Keda SUN, Junliang ZHOU, Haidong FAN

    Published 2020-03-01
    “…Nowadays,electric power enterprises have realized the operation and production of information technology,and the importance of network information security evaluation is more and more obvious.Two-level fuzzy comprehensive evaluation method was used to evaluate the security level of network information security system of power enterprises based on PRDD model,and Delphi method was used to determine the weight coefficients of various factors of network security of power enterprises in the evaluation process.Through objective analysis of the evaluation results,the network credit of power enterprises was found out.The prominent problems existing in the informa tion security system should be solved and the corresponding security reinforcement scheme should be formulated.The validation results show that the optimized network information security model is more robust,practicability and operability are significantly improved,which effectively improve the network information security level of power enterprises,and can be used as a favorable reference for the construction of network information security of other power enterprises.…”
    Get full text
    Article