Course Construction of Logistics Information Technology Based on OBE
نویسندگان
چکیده
منابع مشابه
Construction and Operation of Regional Logistics Public Information Platform Based on Cloud Computing
In order to realize the social logistics resource integration and provide customized logistics services to the customers, this paper presents a regional logistics public information platform construction scheme based on analyzing the conception and characteristics of cloud computing. A system configuration model of regional logistics public information platform is advanced on the basis of analy...
متن کاملConstruction of Agricultural Products Logistics Information System Based on .Net and Wap
Functions and construction of agricultural products logistics system based on .NET and WAP technology are introduced in detail. The problems encountered during the process of system development and corresponding solutions are also illustrated. The Windows 2003 Server and SQL Server 2005 serve as the platform and background database server respectively, and windows are designed using the ASP.NET...
متن کاملThe impact of information technology on health
Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...
متن کاملA Bayesian Based Search and Classification System for Product Information of Agricultural Logistics Information Technology
In order to meet the needs of users who search agricultural products logistics information technology, this paper introduces a search and classification system of agricultural products logistics information technology search and classification. Firstly, the dictionary of field concept word was built based on analyzing the characteristics of agricultural products logistics information technology...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Social Science, Education and Human Science
سال: 2019
ISSN: 2475-0042
DOI: 10.12783/dtssehs/emse2018/27256