Showing 41 - 60 results of 109 for search 'technology’s lifecycle', query time: 0.06s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47

    A Review of Successful Construction Project Managers’ Competencies and Leadership Profile by Ali Ghorbani

    Published 2023-02-01
    “…The nature of projects is always dynamic, uncertainty and different from each other. Project lifecycle is along with risk, changes and even sometimes failing happened. …”
    Get full text
    Article
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52

    Research on architecture of novel programmable networks for 6G by Xuliang WANG, Shuo QUAN, Zengyi LIU, Jun ZHANG

    Published 2021-12-01
    “…Starting from the industry’s various business scenarios for 6G networks, and the dynamic network capability adjustment requirements for 6G network equipment were deeply analyzed.A programmable network platform architecture with the characteristics of closed-loop self-optimization based on network state management was proposed.Through this architecture design, the existing technology systems related to SDN, NFV, and network AI can be maximized and network administrators can perform network lifecycle management based on network status statements.This platform can provide a new technical realization idea and method for the digital twin network and on-demand network in the future.…”
    Get full text
    Article
  13. 53

    Conception of digital nuclear power station by Yingrong WANG, Xiuliang XU, Shuyuan CAO

    Published 2016-04-01
    “…Adopting advanced information technology,an intelligent or digital nuclear power station would be constructed to achieve resource sharing across platforms for structured data and unstructured data. …”
    Get full text
    Article
  14. 54
  15. 55
  16. 56
  17. 57

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…Regarding multi-party privacy computing, technologies such as full lifecycle privacy protection, privacy information flow control, and secure exchange of sensitive data were introduced. …”
    Get full text
    Article
  18. 58
  19. 59
  20. 60