Information technology knowledge management in business
Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.
Подобные документы
This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.
статья, добавлен 16.01.2024The cognitive simulation of AstroDatabank records by using the artificial intelligence system with the neuron-net training and recognition. Structure of the analytical system. Studying the technology of simulation. Discussing the mostly important results.
статья, добавлен 26.04.2017- 78. Онтология CYC
Cyc и онтологии. Предикаты: типы аргументов. Переменные формулы и термы. Атомные формулы: примеры. CycL: квантификаторы. ASK операция. Продукты компании Cyc Knowledge Server Cyc Answers. Разрешение референции. Организация top ontology. Имена констант.
презентация, добавлен 01.09.2013 Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.
статья, добавлен 07.04.2021Понятие процесса КДД (knowledge discovery in databases - обнаружение знаний в базах данных) и его основные этапы. Анализ данных как инструмент искусственного интеллекта, перспективы его развития. Технология КДД в медико-биологических исследованиях.
статья, добавлен 17.10.2014The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
статья, добавлен 22.02.2023Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014Використання веб-сервісів і фреймворків для розробки шаблонів з великих об’ємів просторових даних. Розробка алгоритмів розподілу, ієрархії та кластеризації геопросторових об’єктів. Переваги технології Knowledge Mining. Утиліти управління сховищем.
статья, добавлен 12.08.2022Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.
презентация, добавлен 19.02.2014- 86. Cognitive models
Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.
лекция, добавлен 28.12.2013 Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012Requirements for users support. Approaches to user modeling. Problems of adaptive help. Techniques for knowledge representation. Implementation of advisory strategies. Demands for effective presentation. The need for system-oriented documentation.
презентация, добавлен 28.12.2013Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
статья, добавлен 01.12.2017Freedom of access to the global network. Ease of use compared with the library. The Internet is a cost-effective source of research and self-knowledge and confidence. Language tools that have the potential to translate pages. Disadvantages of the network.
презентация, добавлен 13.06.2015Определение понятия интеллектуального анализа данных. История появления систем Data Mining и Knowledge Discoveryin Databases. Стадии и методы анализа, классификации и характеристика технологий. Их применение в страховых компаниях и фондовых биржах.
презентация, добавлен 22.05.2014Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.
реферат, добавлен 26.12.2014The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
статья, добавлен 27.07.2016The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.
статья, добавлен 21.04.2020This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.
статья, добавлен 26.10.2020Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.
статья, добавлен 01.02.2019The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.
статья, добавлен 21.01.2022Стадии предпроектного обследования. Методология Business Process Management. Характеристика, элементы и свойства сети Петри, правила срабатывания переходов. Понятие конфликта и его разрешения. Пример параллельной работы и построения дерева достижимости.
презентация, добавлен 06.09.2015