Information technology knowledge management in business
Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.
Подобные документы
The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
статья, добавлен 27.07.2016The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.
статья, добавлен 21.04.2020Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.
статья, добавлен 01.02.2019The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.
статья, добавлен 26.10.2020Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.
статья, добавлен 21.01.2022Стадии предпроектного обследования. Методология Business Process Management. Характеристика, элементы и свойства сети Петри, правила срабатывания переходов. Понятие конфликта и его разрешения. Пример параллельной работы и построения дерева достижимости.
презентация, добавлен 06.09.2015Пакет бізнес-застосувань Oracle E-Business Suite. Основні можливості функціональних блоків. Аналітичні застосування рішення mySAP ВІ. Надійність системи Sike. Захист від несанкціонованого доступу. Система управління підприємством Business Control.
доклад, добавлен 28.07.2017Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
статья, добавлен 28.02.2016The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
статья, добавлен 25.12.2016Extracting meaningful features from speech signals and classifying them into male or female categories. Implementation of gender recognition system using Python programming. Potential of using machine learning techniques for gender recognition of voice.
статья, добавлен 24.02.2024Исторический аспект ведения электронного бизнеса посредством сети Интернет. Общая характеристика системы Business-to-Customer как основной модели предпринимательской деятельности в электронной экономике. Процесс организации и работы Internet-магазина.
реферат, добавлен 16.06.2009The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".
статья, добавлен 25.06.2024The conclusions of our previous and other ongoing experiments to create a knowledge base on a given topic. Development of remote control system for home automation, forming a wireless connection for remote control of the position of the servomotor.
статья, добавлен 26.08.2020A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
книга, добавлен 08.03.2014Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.
статья, добавлен 26.06.2018Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
книга, добавлен 09.04.2013- 121. Relational Databases
One of the important functions of science is the organization of information storage for searching some data. The basic principle of the database and Relational Database Management System. The SQL Language, Web-page, Macros and Integrity Constraints.
презентация, добавлен 07.03.2018 - 122. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
статья, добавлен 18.11.2018 - 123. Information Hiding
Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
курс лекций, добавлен 08.03.2014 Conducting a comprehensive study of tools intended for modeling and digitization of business processes. Proving the importance of using infographics for better visualization and perception by specialists of individual details of the business process.
статья, добавлен 08.01.2024The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
статья, добавлен 14.02.2022