標(biāo)題: Titlebook: AI, Blockchain and Self-Sovereign Identity in Higher Education; Hamid Jahankhani,Arshad Jamal,Usman J. Butt Book 2023 The Editor(s) (if ap [打印本頁(yè)] 作者: 延展 時(shí)間: 2025-3-21 19:45
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education影響因子(影響力)
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education影響因子(影響力)學(xué)科排名
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education網(wǎng)絡(luò)公開度
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education被引頻次
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education被引頻次學(xué)科排名
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education年度引用
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education年度引用學(xué)科排名
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education讀者反饋
書目名稱AI, Blockchain and Self-Sovereign Identity in Higher Education讀者反饋學(xué)科排名
作者: 極小 時(shí)間: 2025-3-21 23:20 作者: febrile 時(shí)間: 2025-3-22 04:02 作者: foreign 時(shí)間: 2025-3-22 04:42
Song Xi Chen,Wolfgang H?rdle,Torsten Kleinowing and virtual reality. This chapter summarises key findings of a post Covid study to ascertain learner requirements of a virtual learning environment, and how such a learning platform can be best utilised to move from a content repository, to a structured ecosystem which provides learners with a c作者: Hyperlipidemia 時(shí)間: 2025-3-22 09:21 作者: 共同確定為確 時(shí)間: 2025-3-22 16:38 作者: 使更活躍 時(shí)間: 2025-3-22 18:20
Wolfgang Karl H?rdle,N. Hautsch,U. Pigorschdynamic classroom activities. Additionally, cloud-based solutions may provide clients/academic institutions with cost savings and exposure to state-of-the-art computing. In this chapter, some of the most significant security challenges that arise when using e-learning applications in conjunction wit作者: 乞討 時(shí)間: 2025-3-23 01:02 作者: 無(wú)能力 時(shí)間: 2025-3-23 03:59 作者: 制度 時(shí)間: 2025-3-23 06:45 作者: 無(wú)意 時(shí)間: 2025-3-23 09:54 作者: 草率男 時(shí)間: 2025-3-23 15:13
Ransomware Attack on the Educational Sector,ging technologies that are impacting the way in which marketing research is performed. With an instructor’s manual as well as PPT slides covering major topics within the chapters, in addition to numerous cases,978-3-031-54649-5978-3-031-54650-1作者: gratify 時(shí)間: 2025-3-23 19:34 作者: 神圣不可 時(shí)間: 2025-3-24 00:27 作者: 某人 時(shí)間: 2025-3-24 02:52 作者: floaters 時(shí)間: 2025-3-24 08:34
An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecin lung cancer treatment including surgery, chemotherapy, radiotherapy, targeted therapy and immunotherapy. Anatomical resection and systematic lymphadenectomy is the treatment of choice for early stage lung cancer. Neo-adjuvant chemotherapy is utilized for resectable N2 disease or adjuvant chemothe作者: 憲法沒(méi)有 時(shí)間: 2025-3-24 10:44
Strategic Decision-Making for Pedagogical Course Planning Using NLP in Social Media Data,e distinctive results forthat country from the research and the link between the two. Most willbe illustrated by a small case study of a company. Following this isan integrating review of the findings from various countries, thedifferent trajectories followed, and the impact on external variablesand作者: 古董 時(shí)間: 2025-3-24 18:40
,The Use of Virtual Learning Environments in Higher Education—Content, Community and Connectivism—Le by commercial sealers have not missed its mark and have therefore burned themselves into (western) public consciousness. In the 1990s in Germany, where I grew up, it was not uncommon to find ‘Save the Seal’ stickers on cars—also driving through a Drive-Through of McDonald’s, the irony of which cann作者: 創(chuàng)新 時(shí)間: 2025-3-24 22:45
Influence of Artificial Intelligence in Higher Education; Impact, Risk and Counter Measure,us informa- tion on organizations engaged in problems of the exploration and use ofthe sea is given in International Marine Organizations by the well-known Polish scientists Lopuski and Symonides, 1978. Meanwhile the increasing volume of practical work related to the participa- tion of governmental and scient978-94-009-8263-5978-94-009-8261-1作者: Generalize 時(shí)間: 2025-3-24 23:23
Security Framework for Big Data Usage in Cloud-based e-Learning Application,s Communist countries where the attitude to advertising varies from puritan disapproval to virtual acceptance. This chapter also reviews some of the conventional issues and subdivisions in advertising, e.g. as between consumer and industrial products, and considers to what extent these have to be am作者: ALE 時(shí)間: 2025-3-25 04:34 作者: CLAMP 時(shí)間: 2025-3-25 10:55 作者: 客觀 時(shí)間: 2025-3-25 12:33 作者: 清真寺 時(shí)間: 2025-3-25 17:29
Embedding AI in Higher Education: A Call for a Service Design Approach,omprise the vast majority (98%) of colon and rectal cancers; more rare rectal cancers include lymphoma (1.3%), carcinoid (0.4%), and sarcoma (0.3%).The incidence and epidemiology, etiology, pathogenesis, and screening recommendations are common to both colon cancer and rectal cancer..The incidence o作者: 溫和女人 時(shí)間: 2025-3-25 21:06 作者: Commission 時(shí)間: 2025-3-26 03:34
Strategic Decision-Making for Pedagogical Course Planning Using NLP in Social Media Data, global context. This book reviews and addresses theglobal manufacturing strategy area through research in the four majoreconomic areas of the world: Europe, North America, Latin America andAsia. .International Manufacturing Strategies: Context, Contentand. .Change. is the result of a single major r作者: Magnitude 時(shí)間: 2025-3-26 07:10 作者: finite 時(shí)間: 2025-3-26 10:01
Influence of Artificial Intelligence in Higher Education; Impact, Risk and Counter Measure,and marine resources has considerably increased. But the status and activities of intern a- tional organizations related to maritime shipping, fisheries, scientific research in the World Ocean and the protection of the marine environment have not yet, as a whole, been represented in the scientific a作者: intercede 時(shí)間: 2025-3-26 14:25
Security Framework for Big Data Usage in Cloud-based e-Learning Application,markets where legal controls on advertising, tastes and cultural attitudes may be different from those with which the exporter is familiar in his home market. This problem poses a substantial dilemma in some instances, namely whether to standardise advertising and promotional methods in all markets,作者: 遺忘 時(shí)間: 2025-3-26 20:12 作者: 驚奇 時(shí)間: 2025-3-26 21:46
Ransomware Attack on the Educational Sector,treatment of simple and advanced data analysis topics.Tracks.This book provides a practical, detailed, and well-documented guide that takes students and market researchers through all phases of developing and conducting global marketing research. This book not only accounts for the recent developmen作者: 領(lǐng)先 時(shí)間: 2025-3-27 04:16
Hamid Jahankhani,Arshad Jamal,Usman J. ButtCovers the role of technology in future of higher education.Includes relevant case study examples by making use of robust methods to solve real-world problems.Addresses the malicious application of AI作者: 協(xié)迫 時(shí)間: 2025-3-27 09:03 作者: Malfunction 時(shí)間: 2025-3-27 10:14 作者: ALIEN 時(shí)間: 2025-3-27 15:05
978-3-031-33629-4The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: adequate-intake 時(shí)間: 2025-3-27 21:34
AI, Blockchain and Self-Sovereign Identity in Higher Education978-3-031-33627-0Series ISSN 1613-5113 Series E-ISSN 2363-9466 作者: 獨(dú)裁政府 時(shí)間: 2025-3-28 00:24
https://doi.org/10.1007/978-3-540-69179-2ical advancements, the recent demands of educational hybrid learning, and the growing importance attached to individuals’ data and its security. In many ways the pandemic has accelerated the acceptance of remote learning and faster technological advancements but in other ways it has exposed areas of作者: LAVE 時(shí)間: 2025-3-28 03:56
Oliver Jim Blaskowitz,Peter Schmidtessment. There are claims that these tools will make the traditional assessment approaches obsolete and there has been something of a moral panic across the sector, with some universities already threatening students with academic misconduct hearings should they use these tools. However, we can see 作者: elastic 時(shí)間: 2025-3-28 07:15 作者: cauda-equina 時(shí)間: 2025-3-28 10:43
The Analysis of Implied Volatilitieset vulnerable education institutions and carry out State-of-the-Art Cyber Attacks, exploiting flaws in their security systems by using social engineering methods and carrying out sophisticated high-profile ransomware and distributed denial of service (DDoS) campaigns that are propagated through vari作者: Hallmark 時(shí)間: 2025-3-28 15:48
Matthias R. Fengler,Helmut Herwartzf a university has built trust in the industry, it would be more likely to have its graduates to find suitable relevant jobs in the market. As a result, this will have positive feedback to absorb better students to select the desired university as their first choice to study; consequently, the unive作者: CRANK 時(shí)間: 2025-3-28 22:35
Song Xi Chen,Wolfgang H?rdle,Torsten Kleinowre forced to rethink their delivery models as a result of the global Covid pandemic. Campuses closed and learners were channelled into existing remote learning technologies. HEIs who had invested in Virtual Learning Environments (VLEs) were well positioned to deliver high quality on-line education, 作者: agenda 時(shí)間: 2025-3-29 01:08 作者: Ablation 時(shí)間: 2025-3-29 05:35 作者: nonradioactive 時(shí)間: 2025-3-29 07:24
Wolfgang Karl H?rdle,N. Hautsch,U. Pigorsch years. This is due to the fact that cloud computing users are in a brand-new IT business paradigm. It holds the potential of moving away from a paradigm where businesses have to spend extensively on in-house IT resources in favour of one where they can purchase or rent services managed by a cloud p作者: 過(guò)于光澤 時(shí)間: 2025-3-29 11:45
https://doi.org/10.1007/978-3-662-54486-0quipped to defend against distributed denial-of-service (DDoS) threats. Clients and website visitors consequently encounter time delays, captchas, and delayed connectivity. In this chapter, we provide a novel layered solution for cloud-based DDoS defence that makes use of Advanced Malware methods an作者: 手段 時(shí)間: 2025-3-29 16:41 作者: patella 時(shí)間: 2025-3-29 22:27
Oliver Jim Blaskowitz,Peter Schmidtif we consider historical literature, that the same concerns were levelled at the widespread advent of search engines and, even further into history, electronic calculators. Rather than panic or try to ban the inevitable, we propose the approaches will have to adapt, but this is not the end of assessment as some have proposed.作者: Mhc-Molecule 時(shí)間: 2025-3-30 01:42