
Information technology office
-
"Wifi fingerprinting-based indoor positioning with machine learning algorithms" implement and compare the positioning results of three machine learning algorithms such as support vector machine, decision tree, and random forest. The algorithms are applied to a multi-condition WiFi fingerprinting dataset which was conducted in an office room where different environmental conditions are considered.
5p
lieuyeuyeu18
23-12-2022
6
1
Download
-
This paper discussed Vietnam’s opportunities and challenges through patent analysis. Information of granted and applied patents could overview the trends of the technology development. The number of patent applications and patent grants in Vietnam intellectual property office are increased from 2009 to 2018.
9p
vigiselle2711
29-08-2021
5
0
Download
-
Fourth Industrialization phase is flooded by technologies. Information Communication and Technologies (ICTs) has rooted up in every field. Agriculture, considered to be the mainstay of our country has started to deploy ICT’s in every aspects. The quality of information and timeliness of information and reliability of information were the three important aspects that have to be considered seriously to meet their requirements and prospects in the coming years.
8p
chauchaungayxua11
23-03-2021
10
1
Download
-
Global journal of computer science and technology: Information & technology present publisher’s headquarters office; offset typesetting; packaging & continental dispatching; find a correspondence nodal officer near you; pricing (e xcluding air parcel charges).
75p
youtubeandhuuich
17-10-2020
31
0
Download
-
Chapter 9 - Sharing informative and positive messages with appropriate technology. After studying this chapter, you will know: What the purposes of informative and positive messages are, what kinds of newer communication hardware are entering offices, when and how to use common business media effectively, how to organize informative and positive messages, how to compose some of the common varieties of informative and positive messages.
20p
koxih_kothogmih6
23-09-2020
25
0
Download
-
Chapter 12 - Contemporary issues in business ethics and corporate governance. After completing this chapter, students will be able to: Address the broad influence of technology in twenty-first-century corporate governance; introduce a theoretical “cybercompany model” to promote the use of information technology in areas of shareholder communication, electronic commerce, electronic financial reporting, and continuous auditing;...
13p
koxih_kothogmih6
23-09-2020
18
0
Download
-
The present study regarding the Job satisfaction of Agricultural Extension Functionaries (AEFs) for dissemination of information was carried out in three purposively selected Sub-Divisional Agricultural Offices namely Baramulla, Sopore and Rohama in district Baramulla of Jammu & Kashmir.
8p
kethamoi7
26-08-2020
9
0
Download
-
The present study was conducted to investigate the major constraints faced by the chilli growers of Khammam District of Telangana. Data were collected through personal interview from 112 selected respondents of the ten villages with the help of well-structured questionnaire. Frequency and percentage were used to analyse the collected data. The collected information from the chilli growers revealed that major constraints in adoption of recommended Chilli production technologies were high labour charges (91.07%), high cost of agricultural inputs (83.03%), low market price of chilli (100.
6p
quenchua2
15-12-2019
7
1
Download
-
The research study was conducted in northeastern region of Karnataka (NEK) to assess the perception of the stake holders of e-SAP dissemination tool. The ex-post-facto research design was used for the study with 384 stakeholders. e-SAP is an important ICT flat form, which facilitates the access of relevant, technical feasible, economically affordable with socially acceptable information to the decision making system of various stakeholders in agriculture field. e-SAP refers to electronic solutions against agriculture pest.
9p
kethamoi2
15-12-2019
18
0
Download
-
This paper provides a working example of how technology plays an important role in knowledge management for the Malaysia’s federal tax collection agency, Inland Revenue Board of Malaysia (IRBM). The IRBM had successfully gone through a five year organizational transformation process that had resulted in significant performance improvements duly recognized by the Malaysian government. Led by its visionary Chief Executive Officer (CEO), various initiatives had been implemented, including those which placed technology as a key driver in its operations.
13p
kequaidan1
05-11-2019
15
0
Download
-
Public universities in the United States are divided into different levels of type by research agendas. Large public universities (typically known as R1 research oriented universities) are directed to serve the public interest by developing transferrable knowledge (patents and intellectual property) that can leverage the public investment made in these large universities and their research agendas through state and federal funding by enhancing social and commercial goals of the funding entities.
14p
quenchua1
04-11-2019
19
0
Download
-
This paper presents the basic information on the present status of ocean observation and service in Vietnam with focus on the physical oceanography area. Study results show that in recent years, ocean observations of Vietnam have been equipped with a series of modern measured and analyzed instruments, especially at related offices of the Vietnam Academy of Science and Technology (VAST) and Ministry of Natural Resources and Environment (MONRE).
11p
miulovesmile
09-10-2018
29
0
Download
-
Chapter 13 - Managing technology and innovation. After studying this chapter you will be able to: Evaluating the growth in breaches of personal information privacy, understanding where these attacks come from and what their effects are, evaluating initiatives taken by government and business to minimize invasions of privacy, recognizing the emerging role and responsibilities of the organization’s chief information officer,…
17p
luimotbuoc_4
11-11-2016
58
3
Download
-
Module D (Office 2010 Version) - Decision analysis with spreadsheet software. This chapter define a list and a list definition table within the context of spreadsheet software and describe the importance of each, compare and contrast the Filter function and Custom Filter function in spreadsheet software, describe the purpose of using conditional formatting, define a pivot table and describe how you can use it to view summarized information by dimension, describe the purpose of using Goal Seek.
53p
tangtuy17
11-07-2016
47
2
Download
-
Chapter 5 - Organizational structures that support strategic initiatives. The learning objectives for this chapter include: Compare the responsibilities of a chief information officer (CIO), chief technology officer (CTO), chief privacy officer (CPO), chief security officer (CSO), and chief knowledge office (CKO); explain the gap between IT people and business people and the primary reason this gap exists; define the relationship between information security and ethics;...
27p
tangtuy11
20-05-2016
40
2
Download
-
Chapter 3 - Software: Tools for productivity & creativity. The main contents of the dissertation consist: The operating system: what it does; other system software: device drivers & utility programs; common features of the user interface; common operating systems; application software: where to get it, how to use it; data files & program files; word processing software; spreadsheet programs; database software; office suites & integrated packages; specialty application software.
86p
tangtuy11
20-05-2016
71
4
Download
-
This chapter explored the various broadband solutions used by telecommuters and branch office workers; outlined the features and basic infrastructure behind each broadband technology, which enables a network manager to make an informed selection; identified DSL, cable, and broadband wireless options as the various broadband solutions; described basic DSL configuration.
30p
kiepnaybinhyen_02
29-12-2015
60
3
Download
-
The National Institute of Standards and Technology (NIST) developed this guide in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all federal agency operations and assets, but such standards and guidelines shall not apply to national security systems.
49p
thamgiacongdong
02-05-2013
52
3
Download
-
Tham khảo sách 'chief information officers responsibilities and information and technology', kỹ thuật - công nghệ, kĩ thuật viễn thông phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
48p
nt18101
30-04-2013
46
3
Download
-
Electronic communications that are created primarily to communicate information of short-term value, such as messages reminding employees about scheduled meetings or appointments, might fall under the "TRANSITORY MESSAGES" record series. “Transitory” refers to short-term value based upon the content and purpose of the message, not the format or technology used to transmit it.
0p
dacotaikhoan
26-04-2013
50
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
