deflate 发表于 2025-3-21 17:19:18

书目名称Applied Informatics and Cybernetics in Intelligent Systems影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0159879<br><br>        <br><br>书目名称Applied Informatics and Cybernetics in Intelligent Systems读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0159879<br><br>        <br><br>

管理员 发表于 2025-3-21 22:15:19

Entrepreneurial Music Educationterize the success of an organization. These two inputs, along with information gathered to understand implemented process improvements, were the basis for conducting the research..Results show a successful organization, with a high maturity level according to the BPM OMG maturity model, that has be

压舱物 发表于 2025-3-22 00:29:38

http://reply.papertrans.cn/16/1599/159879/159879_3.png

Spartan 发表于 2025-3-22 06:37:36

https://doi.org/10.1007/978-3-8350-5572-8ologies to extract knowledge regarding infectious diseases, their symptoms, or poor environment conditions what promote the propagation of these diseases. Finally, all the compiled evidence is available to health-professionals in real-time through a configurable dashboard. The validation of Collabor

怒目而视 发表于 2025-3-22 09:14:43

Conceptual Model and Hypotheses,o analyze trends and make predictions of the values of the variables in question at different time intervals with fairly high accuracy. Experiments with the developed models will allow us to quantify the effect of various factors on the growth or decrease in crime in the field of computer informatio

Gobble 发表于 2025-3-22 16:47:50

Entrepreneurial Orientation in Academiand the nature of the transition process - with the safety of the equipment. The nature of the transition process depends on the dynamic loads determined by the gap in the tooth zone of the rotation mechanism at the initial moments of rotation. Computer visualization of the weighting factor selection

Decibel 发表于 2025-3-22 19:17:39

Theoretical Framework and Literature Review,y was conducted, where the research used searches for phrases with ‘Cyber Safety Awareness’, ‘Education’, ‘Schools’, ‘Policies’ and ‘Frameworks’. The aim of this research is to determine what policies, procedures and measures a school needs to have in place to enhance cyber safety awareness of the s

JUST 发表于 2025-3-22 23:24:17

A Framework to Enhance ICT Security Through Education, Training & Awareness (ETA) Programmes in Souprofitable and sustainable. Many small organizations (SMMEs) have been victims of ICT-related crime in South Africa. Most of these crimes happen in these institutions because they do not necessarily have the resources to protect themselves. In some cases, these crimes occur because, due to issues su

伪书 发表于 2025-3-23 02:04:21

http://reply.papertrans.cn/16/1599/159879/159879_9.png

sinoatrial-node 发表于 2025-3-23 07:00:17

Performance Evaluation of RISC-Based Memory-Centric Processor Architecture,ory and provide direct access to it, without using registers and cache memory. Furthermore, the execution of several algorithms with different arithmetical intensity is evaluated and the achieved improvements are discussed.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Applied Informatics and Cybernetics in Intelligent Systems; Proceedings of the 9 Radek Silhavy Conference proceedings 2020 Springer Nature