Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
43881
The development of children's Web searching skills - a non-linear model
Published 2005-01-01“…In this case the respondents have also commented upon the result.The students regard six different skills as fundamental: language, knowledge about the technology, knowledge about different ways of information seeking, how search engines work, setting goals and being critical.…”
Get full text
Article -
43882
Critical realism and information systems research: why bother with philosophy?
Published 2002-01-01“…Garcia and Quek (1997) point out the difficulties in defining the actual object of information systems research - 'Is the object of research in information systems of a technological or social nature? Is it the organization, an information system or a social system?' …”
Get full text
Article -
43883
Airborne Microplastics from Waste as a Transmission Vector for COVID-19
Published 2020-10-01Get full text
Article -
43884
Hopf Bifurcation and Turing Instability Analysis for the Gierer–Meinhardt Model of the Depletion Type
Published 2020-01-01Get full text
Article -
43885
Application of Local Fractional Series Expansion Method to Solve Klein-Gordon Equations on Cantor Sets
Published 2014-01-01Get full text
Article -
43886
Seismic Performance Analysis of Steel Truss Coal Conveying Trestle Based on Multisensor Data Fusion
Published 2022-01-01Get full text
Article -
43887
Harnessing stakeholder sentiment on social networking sites
Published 2022-10-01Get full text
Article -
43888
On the return process with refractoriness for a non-homogeneous Ornstein-Uhlenbeck neuronal model
Published 2013-09-01Get full text
Article -
43889
RANCANG BANGUN SISTEM PENGAWASAN PEMAKAIAN ALAT PELINDUNG DIRI BERBASIS SINGLE BOARD COMPUTER
Published 2024-04-01“…Image Processing is part of Artificial Intelligence and one of the technology developments that can be used in supervising the use of PPE workers, You Only Look Once (YOLO) is a method in image processing that can detect workers' PPE. …”
Get full text
Article -
43890
The Use of Different Image Recognition Techniques in Food Safety: A Study
Published 2021-01-01“…It stresses the critical components of image processing technology and a survey of the most current advances across the food sector. …”
Get full text
Article -
43891
Analysis of College Students’ Physical Health Test Data Based on Big Data and Health Promotion Countermeasures
Published 2022-01-01“…In order to improve the data analysis and health promotion effect of college students' physical health test, this paper combines the big data technology to carry out the analysis and health promotion system of college students’ physical health test data. …”
Get full text
Article -
43892
Design of Reverse Curves Adapted to the Satellite Measurements
Published 2016-01-01Get full text
Article -
43893
Carcinoma cuniculatum of the mandible: A case report of a less explored entity
Published 2024-03-01Get full text
Article -
43894
Normal Form for High-Dimensional Nonlinear System and Its Application to a Viscoelastic Moving Belt
Published 2014-01-01Get full text
Article -
43895
-
43896
Application of BIM+GIS in Water Resources Allocation Project of the Pearl River Delta
Published 2022-01-01“…The water resources allocation projects in the Pearl River Delta are characterized by multiple points,long lines,complex technology,long construction periods,and difficult coordination. …”
Get full text
Article -
43897
Qualitative Analysis of a Pest Management Gompertz Model with Interval State Feedback Impulsive Control
Published 2016-01-01Get full text
Article -
43898
California’s Senate Bill 596: Spearheading the global transition to sustainable cement
Published 2025-01-01“…The so-called “hard to abate” cement industry is at the cusp of a foundational technology transformation. Emerging technologies could make cement production carbon-neutral or carbon-negative, and could potentially do so profitably. …”
Get full text
Article -
43899
UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database
Published 2015-10-01“…Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.…”
Get full text
Article -
43900
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01“…Nowadays,electric power enterprises have realized the operation and production of information technology,and the importance of network information security evaluation is more and more obvious.Two-level fuzzy comprehensive evaluation method was used to evaluate the security level of network information security system of power enterprises based on PRDD model,and Delphi method was used to determine the weight coefficients of various factors of network security of power enterprises in the evaluation process.Through objective analysis of the evaluation results,the network credit of power enterprises was found out.The prominent problems existing in the informa tion security system should be solved and the corresponding security reinforcement scheme should be formulated.The validation results show that the optimized network information security model is more robust,practicability and operability are significantly improved,which effectively improve the network information security level of power enterprises,and can be used as a favorable reference for the construction of network information security of other power enterprises.…”
Get full text
Article