Showing 3,621 - 3,640 results of 7,164 for search 'NET information', query time: 0.14s Refine Results
  1. 3621
  2. 3622
  3. 3623

    ANALYSIS OF THE EXTENSION OF A BUSINESS IN THE FIELD OF PUBLIC FOOD by Daniela SIMTION

    Published 2018-01-01
    “…Assessing the performance and financial position of a company calculated on the basis of the information provided by the companies in the financial statements reveals a certain trend of the company. …”
    Get full text
    Article
  4. 3624

    Cookie based online tracing method for cyberlockers resource by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2016-12-01
    “…Cyberlockers have recently become an Internet-based agent of information dissemination. In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. …”
    Get full text
    Article
  5. 3625

    THE PROGRAM COMPLEX «ARTHRON», INTENDED FOR THE QUANTITATIVE ASSESSMENT OF ARTICULAR SYNDROME IN RHEUMATIC DISEASES by V. V. Danilevich, V. E. Yagur, N. YU. Dostanko, Yu. M. Dosin

    Published 2019-06-01
    “…It is implemented using object-oriented C # language, interactive development environment MS Visual Studio development and NET 4.0. The program complex «Arthron» can operate under the control of OS Windows XP (SP3) or later. …”
    Get full text
    Article
  6. 3626

    Do as the Swedes do? Internet policy and regulation in Sweden – a snapshot by Merlin Münch

    Published 2013-05-01
    “…When it comes to information technology Sweden is considered to be at the forefront both in terms of technological innovation, as well as in progressive policy-making, regulation and internet freedom. …”
    Get full text
    Article
  7. 3627
  8. 3628
  9. 3629

    Cookie based online tracing method for cyberlockers resource by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2016-12-01
    “…Cyberlockers have recently become an Internet-based agent of information dissemination. In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. …”
    Get full text
    Article
  10. 3630
  11. 3631
  12. 3632

    Human Behavior Recognition Method Based on Edge Intelligence by Yongxia Sun, Weijin Jiang

    Published 2022-01-01
    “…Then the cloud trains the spatial-temporal graph ConvNet model and deploys it to the edge nodes N1∼Nm. …”
    Get full text
    Article
  13. 3633
  14. 3634
  15. 3635
  16. 3636
  17. 3637
  18. 3638
  19. 3639

    INVENTORY OF CRANES AND THEIR MODERN STATE ON THE TERRITORY OF DAGESTAN by Ye. V. Vilkov

    Published 2014-11-01
    “…An analysis of information from literary sources for the last 132 years together with the data of the author's records and interviews show presence of three crane species on the territory of Dagestan: the Siberian crane, the common crane and the demoiselle crane. …”
    Get full text
    Article
  20. 3640