標(biāo)題: Titlebook: Education, Research and Business Technologies; Proceedings of 21st Cristian Ciurea,Paul Pocatilu,Florin Gheorghe Fili Conference proceedin [打印本頁(yè)] 作者: Bunion 時(shí)間: 2025-3-21 16:47
書(shū)目名稱(chēng)Education, Research and Business Technologies影響因子(影響力)
書(shū)目名稱(chēng)Education, Research and Business Technologies影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Education, Research and Business Technologies網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Education, Research and Business Technologies網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Education, Research and Business Technologies被引頻次
書(shū)目名稱(chēng)Education, Research and Business Technologies被引頻次學(xué)科排名
書(shū)目名稱(chēng)Education, Research and Business Technologies年度引用
書(shū)目名稱(chēng)Education, Research and Business Technologies年度引用學(xué)科排名
書(shū)目名稱(chēng)Education, Research and Business Technologies讀者反饋
書(shū)目名稱(chēng)Education, Research and Business Technologies讀者反饋學(xué)科排名
作者: 非秘密 時(shí)間: 2025-3-21 20:13
Smart Innovation, Systems and Technologieshttp://image.papertrans.cn/e/image/302553.jpg作者: 變形詞 時(shí)間: 2025-3-22 02:54
Education, Research and Business Technologies978-981-19-6755-9Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: 使隔離 時(shí)間: 2025-3-22 04:59
History of Criminal Justice Theory, and meet the criteria that classify them as smart cities. Bucharest still has a lot to learn from other European cities, in terms of how the transport takes place inside the city. With the help of data on public transport and the level of satisfaction we can better understand where Bucharest ranks in terms of smart mobility.作者: 大喘氣 時(shí)間: 2025-3-22 11:13 作者: extrovert 時(shí)間: 2025-3-22 13:20 作者: extrovert 時(shí)間: 2025-3-22 18:58 作者: 悲觀 時(shí)間: 2025-3-22 21:35 作者: 只有 時(shí)間: 2025-3-23 05:27
https://doi.org/10.1007/978-0-230-00623-2ices concept, then identifies their key technical characteristics and business benefits they unlock, while proposing a parallel with 12-factor applications. Having these clarified, it answers “Why Now” is the time to adopt Microservice Architecture in terms of business imperatives per industry and t作者: epinephrine 時(shí)間: 2025-3-23 08:44
ll evolve in the future in most cities around the world. Today, most cities around the world are trying to become so-called smart cities. In this paper, we aim to define the concept of a Smart City, how it has evolved, the security that these types of cities bring and the evolution that smart cities作者: 混亂生活 時(shí)間: 2025-3-23 12:57
Contemporary China’s Land Use Policyastructures, and in terms of the techniques and technologies used to carry out modern cyberattacks. In this context, Cyber Range systems can tilt the scales in favor of cybersecurity prevention and preparedness. A cyber range is designed to simulate real-world circumstances for detecting and respond作者: 前面 時(shí)間: 2025-3-23 14:22
s. These have some security breaches that can become vulnerable in the event of external attacks. Identifying these issues in advance increases people’s confidence in using smart systems and moving from a mechanized to an automated way of life. Testing and finding solutions to prevent various types 作者: MOTTO 時(shí)間: 2025-3-23 21:19
ization, and trust issues. The second generation of blockchain appeared in 2013, with the launch of Ethereum and introduced smart contracts, as a way of building applications on top of the blockchain. Nevertheless, smart contracts raise particular security challenges due to their immutability, attac作者: CHURL 時(shí)間: 2025-3-23 22:19 作者: BUST 時(shí)間: 2025-3-24 05:50
Jim Hill M.B.Ch.B., M.Ch., FRCSnt and management. This leads to mismatched and sterile strategy styles in relation to their mandate’s perspective and needs. Pension funds have a long-term perspective which nevertheless could benefit from more adaptive approaches (for example, in seeking to temper the negative effects of the parad作者: Blanch 時(shí)間: 2025-3-24 06:58
Victor D. Didenko,Bernd Silbermanneducation in the process of training students and practitioners. The issues of the necessary competencies are addressed in a broad framework of interaction between different stakeholders in the process of transition to e-government. The methodology includes: a review of secondary sources—strategic a作者: dilute 時(shí)間: 2025-3-24 13:26
History of Criminal Justice Theory, and meet the criteria that classify them as smart cities. Bucharest still has a lot to learn from other European cities, in terms of how the transport takes place inside the city. With the help of data on public transport and the level of satisfaction we can better understand where Bucharest ranks 作者: 使無(wú)效 時(shí)間: 2025-3-24 18:49
https://doi.org/10.1057/9781137350206ndable why the educational system as well had to adapt and move all its activities online. Even though this kind of approach has turned out to have many advantages, there are certainly still things that could be improved and explored. The main objective of this paper is to highlight the importance a作者: 白楊魚(yú) 時(shí)間: 2025-3-24 20:29
https://doi.org/10.1007/978-3-031-44962-8ergraduate education system. This research relies on a study of the solutions provided by the Romanian private companies that dominate the market of the e-learning platforms. The software providers considered for the paper include SIVECO, Ascendia S.A,. Timsoft or InsideMedia. The platforms will be 作者: corpuscle 時(shí)間: 2025-3-25 01:23 作者: 空洞 時(shí)間: 2025-3-25 04:21 作者: 貝雷帽 時(shí)間: 2025-3-25 09:25 作者: 船員 時(shí)間: 2025-3-25 13:48
Contemporary Dental Pharmacologyna. A reliable way to explore these attitudes is to collect short messages shared on the Twitter platform, recognized as tweets. This article aims to conduct a sentiment analysis of the cryptocurrency market and Blockchain technology using a series of 5,000 such messages and a lexicon-based approach作者: 廢止 時(shí)間: 2025-3-25 19:35 作者: 拉開(kāi)這車(chē)床 時(shí)間: 2025-3-25 23:08
Contemporary China’s Land Use Policyange technology stack review may significantly contribute to the design and implementation improvement. The lack of CR implementation standardization causes a significant problem in terms of knowledge sharing between different cybersecurity entities: companies, government institutions, research team作者: 豐滿(mǎn)中國(guó) 時(shí)間: 2025-3-26 01:17 作者: Cardioversion 時(shí)間: 2025-3-26 04:19 作者: 不近人情 時(shí)間: 2025-3-26 12:26 作者: 吝嗇性 時(shí)間: 2025-3-26 16:37 作者: 可轉(zhuǎn)變 時(shí)間: 2025-3-26 16:59 作者: Prophylaxis 時(shí)間: 2025-3-26 22:33 作者: employor 時(shí)間: 2025-3-27 02:43 作者: compose 時(shí)間: 2025-3-27 05:44
Agile Business Systems Development Paradigms—Technological and Human Resource Perspectivesion technology and telecommunications, further increasing the impact of technology on human society. Thus, a significant attribute of contemporary society is the development of scientific interface disciplines, which seeks an answer to the increasing complexity of economic and social realities, whic作者: 迎合 時(shí)間: 2025-3-27 09:55
Identification of Qualitative Weak Signals Coming from Asset Management Working Practices to Feed Foosals. Then a synthesis is made based on a categorization by theme. Thanks to this synthesis, research hypotheses are generated and compared with the scientific literature. The key findings are that talented finance professionals look for weak signals that herald change and they can exploit them suc作者: Eulogy 時(shí)間: 2025-3-27 16:54 作者: 我還要背著他 時(shí)間: 2025-3-27 19:12 作者: 制定法律 時(shí)間: 2025-3-27 22:51 作者: 整體 時(shí)間: 2025-3-28 02:35
Applications that Use Recurrent Neural Networks and Their Impact on People’s Lives. My work is inspired by the recent development in neural translation using the attention mechanism in order to learn long sequences and improve the performance of translation from one language to another. Using this approach, I set out to provide arguments to highlight the effectiveness of implemen作者: 恩惠 時(shí)間: 2025-3-28 09:31 作者: Offset 時(shí)間: 2025-3-28 11:10 作者: 容易做 時(shí)間: 2025-3-28 18:04 作者: 貧窮地活 時(shí)間: 2025-3-28 22:30 作者: Pedagogy 時(shí)間: 2025-3-28 23:53
https://doi.org/10.1057/9781137269881 analyze the 3 top platforms and highlight the advantages and disadvantages encountered, which architecture is used by each model, and which is more reliable for developing smart contracts. We will propose a voting solution that can be used in a university based on an ERC20 token.作者: 細(xì)胞 時(shí)間: 2025-3-29 05:27 作者: Bucket 時(shí)間: 2025-3-29 10:10
Conference proceedings 2023rest, Romania, during May 2022. This book covers research results in business informatics and related computer science topics, such as IoT, mobile-embedded and multimedia solutions, e-society, enterprise and business solutions, databases and big data, artificial intelligence, data mining and machine作者: installment 時(shí)間: 2025-3-29 14:23
An Overview of Security Issues in Smart Contracts on the Blockchainof building applications on top of the blockchain. Nevertheless, smart contracts raise particular security challenges due to their immutability, attack surface, and economic implications. This paper aims to present the most common security vulnerabilities and possible exploits in smart contracts and the best practices for combating them.作者: 大喘氣 時(shí)間: 2025-3-29 16:27 作者: 牛馬之尿 時(shí)間: 2025-3-29 22:24
Using Twitter Data and Lexicon-Based Sentiment Analysis to Study the Attitude Towards Cryptocurrencyconduct a sentiment analysis of the cryptocurrency market and Blockchain technology using a series of 5,000 such messages and a lexicon-based approach. A comparison of the sentiment extracted with the help of three of the most popular lexicons (NRC, Bing and Loughran) will be also exposed.作者: 矛盾 時(shí)間: 2025-3-30 00:28 作者: Inelasticity 時(shí)間: 2025-3-30 04:51
https://doi.org/10.1057/9781137350206nd benefits of online learning tools which could assist students during their educational process, even under normal circumstances. Hence, we will analyse the characteristics of the current eLearning applications and what each one proposes for the automation of computer-assisted learning using the computer science field.作者: left-ventricle 時(shí)間: 2025-3-30 08:29 作者: 有權(quán) 時(shí)間: 2025-3-30 14:56 作者: FUSC 時(shí)間: 2025-3-30 16:54 作者: 享樂(lè)主義者 時(shí)間: 2025-3-30 23:19 作者: 拍下盜公款 時(shí)間: 2025-3-31 03:55 作者: LINE 時(shí)間: 2025-3-31 07:24
General Characteristics of the Assisted E-Learning System in Computer Sciencesnd benefits of online learning tools which could assist students during their educational process, even under normal circumstances. Hence, we will analyse the characteristics of the current eLearning applications and what each one proposes for the automation of computer-assisted learning using the computer science field.作者: 恃強(qiáng)凌弱 時(shí)間: 2025-3-31 12:51
2190-3018 and related computer science topics, such as IoT, mobile-embedded and multimedia solutions, e-society, enterprise and business solutions, databases and big data, artificial intelligence, data mining and machine learning, quantitative economics.978-981-19-6757-3978-981-19-6755-9Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: 鎮(zhèn)痛劑 時(shí)間: 2025-3-31 14:45 作者: Anguish 時(shí)間: 2025-3-31 19:44 作者: CROW 時(shí)間: 2025-3-31 22:45 作者: 煩憂(yōu) 時(shí)間: 2025-4-1 05:31
IoT Security Challenges for Smart Homess. These have some security breaches that can become vulnerable in the event of external attacks. Identifying these issues in advance increases people’s confidence in using smart systems and moving from a mechanized to an automated way of life. Testing and finding solutions to prevent various types 作者: 一加就噴出 時(shí)間: 2025-4-1 09:40
An Overview of Security Issues in Smart Contracts on the Blockchainization, and trust issues. The second generation of blockchain appeared in 2013, with the launch of Ethereum and introduced smart contracts, as a way of building applications on top of the blockchain. Nevertheless, smart contracts raise particular security challenges due to their immutability, attac