Information technology knowledge management in business

Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.

Подобные документы

  • Пакет бізнес-застосувань Oracle E-Business Suite. Основні можливості функціональних блоків. Аналітичні застосування рішення mySAP ВІ. Надійність системи Sike. Захист від несанкціонованого доступу. Система управління підприємством Business Control.

    доклад, добавлен 28.07.2017

  • Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.

    статья, добавлен 28.02.2016

  • The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.

    статья, добавлен 25.12.2016

  • Исторический аспект ведения электронного бизнеса посредством сети Интернет. Общая характеристика системы Business-to-Customer как основной модели предпринимательской деятельности в электронной экономике. Процесс организации и работы Internet-магазина.

    реферат, добавлен 16.06.2009

  • Extracting meaningful features from speech signals and classifying them into male or female categories. Implementation of gender recognition system using Python programming. Potential of using machine learning techniques for gender recognition of voice.

    статья, добавлен 24.02.2024

  • The conclusions of our previous and other ongoing experiments to create a knowledge base on a given topic. Development of remote control system for home automation, forming a wireless connection for remote control of the position of the servomotor.

    статья, добавлен 26.08.2020

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    книга, добавлен 08.03.2014

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    книга, добавлен 08.03.2014

  • The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.

    статья, добавлен 26.06.2018

  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья, добавлен 27.10.2020

  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    книга, добавлен 09.04.2013

  • One of the important functions of science is the organization of information storage for searching some data. The basic principle of the database and Relational Database Management System. The SQL Language, Web-page, Macros and Integrity Constraints.

    презентация, добавлен 07.03.2018

  • Conducting a comprehensive study of tools intended for modeling and digitization of business processes. Proving the importance of using infographics for better visualization and perception by specialists of individual details of the business process.

    статья, добавлен 08.01.2024

  • Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.

    курс лекций, добавлен 08.03.2014

  • Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.

    статья, добавлен 18.11.2018

  • The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.

    статья, добавлен 14.02.2022

  • Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.

    статья, добавлен 29.07.2017

  • Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.

    статья, добавлен 11.03.2019

  • Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.

    книга, добавлен 08.03.2014

  • Анализ языков моделирования, характеристика программного обеспечения Business Process Management System. Процесс построения имитационной модели бизнес-процесса "Перевод студента". Разработка и реализация модели бизнес-процесса в системе "Runa WFE".

    магистерская работа, добавлен 11.08.2017

  • Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.

    статья, добавлен 18.02.2015

  • The role of information technology in human life. The use of personal computers, television monitors, slide projectors, videodisc players, multimedia systems and the Internet. Office furniture. Communication in organizations. As for color harmony.

    контрольная работа, добавлен 04.03.2016

  • Основные тенденции в управлении бизнес-процессами в корпорациях. Внедрение концепции Business Process Management на российский рынок. Применение инновационных информационных технологий для разработки и реализации бизнес-проектов в условиях глобализации.

    статья, добавлен 19.12.2017

  • The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.

    статья, добавлен 14.09.2022

  • Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    статья, добавлен 22.12.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.