نتایج جستجو برای: key technology

تعداد نتایج: 980060  

RFID has lots of potential benefits for supply chain management; that`s why it has attracted many industry practitioners all around the world, especially in recent years. RFID is one of the key solutions that information technology has provided for industry. The main issue in implementing and also developing this unique technology in the supply chain management of every industry appears to be t...

Background Traditionally, embryo incubation and assessment daily has been under a light microscope, these observations are inevitably restricted to specific times and considering that the development of the embryo is a dynamic process, several critical stages in between observations may go unnoticed. For this reason, the new technologies, time lapse monitoring, have focused on the research for ...

Journal: :J. Geographic Information System 2010
Zhanya Xu Zhong Xie

With the development of mobile devices and digitalization of information, the GIS system will be more popular than before. For the variable of mobile devices and different system structure, the design of universal embedded GIS system will be more difficult. In this paper, we talked the features of embedded GIS and the key techniques, design a highly portable general embedded GIS platform, and b...

2015
Jeanine M. Williamson John W. Lounsbury Lee D. Han

Focusing on new roles of engineers for technological innovation and internal entrepreneurship, we examined the personality traits of 4876 engineers versus 75,892 non-engineers. Engineers scored higher on Tough-Mindedness and Intrinsic Motivation; but lower on Assertiveness, Conscientiousness, Customer Service Orientation, Emotional Stability, Extraversion, Image Management, Optimism, Visionary ...

1995
Eduardo M. Morgado Nicolau Reinhard Richard T. Watson

The key issues of Information Technology (IT) managers of Brazilian banking, a highly advanced industry, were assessed. The resulting priorities are comparable to those found in developed countries. As well as the usual key issues method of rating, two other methods were used: Q-sort and interpretive structured modeling (ISM). Respondents Q-sorted issues, and a factor analysis on these data ide...

Journal: :Techn. Analysis & Strat. Manag. 2013
Juneseuk Shin Chong Man Kim

This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date...

2014
Jens Kohler

Engine control center Legislators all over the world are specifying in­ creasingly tougher emissions limits for diesel engines. To comply with the requirements, emis­ sions from the drive system are constantly being reduced. As the engine’s brain, the engine man­ agement system (see Figure 1) controls key sys­ tems such as fuel injection, turbocharging and exhaust gas recirculation (EGR) that a...

2011
S. Loglo Sarula

With the development of the Mongolian corpus and website, an increasing number of people have focused their attention on the accurate, complete and fast retrieval of the information that they need. In this paper, such key technological issues in Mongolian full-text retrieval as character shape indexing, drawing the Mongolian verb stem and the automatic recognition of the Mongolian homographic w...

Journal: :journal of computer and robotics 0
mohammad mehdi gilanian sadeghi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید