Results 61 to 70 of about 37,740 (264)

How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?

open access: yesEducational Theory, EarlyView.
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley   +1 more source

THE METHODICAL APPROACH TO THE ORGANIZATIONAL TECHNICAL STRUCTURE SUBSTANTIATION OF THE MILITARY COMMUNICATIONS SYSTEM WITH THE AIM OF INCREASING THE EFFICIENCY OF ITS FUNCTIONING

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
The article describes a methodical approach to the solution of actual problem of substantiation of composition and structure of multifunctional organizational-technical systems military purposes on the basis of a formalized description of a problem ...
Mykola O. Masesov   +3 more
doaj  

Coordination of agricultural informatization and agricultural economy development: A panel data analysis from Shandong Province, China

open access: yesPLoS ONE, 2022
With the continuous development of the world economy, science, and technology, the era of intelligence and information is upon us. Through the implementation of the digital rural construction project in China, agriculture is developing rapidly in the ...
Yu Sun, Zhe Zhao, Mingquan Li
semanticscholar   +1 more source

The Role of Information in the Street‐Level Bureaucrat–Client Relationship: Open‐Book Services and the Case of the Swedish Patient Accessible Electronic Health Record

open access: yesSocial Policy &Administration, EarlyView.
ABSTRACT This paper focuses on how street‐level bureaucrats understand and manage information in their interactions with clients in the context of so‐called open‐book services, where digital tools make it possible for clients to easily access documentation conventionally viewed as internal work material for professionals' eyes only.
Jesper Petersson, Christel Backman
wiley   +1 more source

КОНЦЕПТУАЛЬНИЙ ПІДХІД ДО ПОБУДОВИ СИСТЕМИ КІБЕРНЕТИЧНОЇ БЕЗПЕКИ СТАЦІОНАРНИХ ІНФОРМАЦІЙНО-ТЕЛЕКОМУНІКАЦІЙНИХ ВУЗЛІВ УКРАЇНИ НА ПРИНЦИПАХ МАСШТАБУВАННЯ ТА ДОПОВНЕННЯ

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
Авторами на основі існуючих ідей обґрунтовано концептуальний підхід до побудови системи кібернетичної безпеки стаціонарних інформаційно-телекомунікаційних вузлів України на принципах масштабування та доповнення.
Igor M. Kozubtsov   +3 more
doaj  

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

МЕТОДЫ АНАЛИЗА СИСТЕМНЫХ СТРАТЕГИЙ В РАДИОЭЛЕКТРОННОМ КОНФЛИКТЕ НА ОСНОВЕ ТЕОРИИ ИГР

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
В статье изложен методический подход к решению актуальной задачи обоснования состава и структуры радиоэлектронной защиты радиосредств, функционирующих в условиях внутрисистемных помех и воздействия радиоэлектронного подавления противника.
Kostiantyn V. Andrieiev   +3 more
doaj  

Risk Factors for Pressure Injury in ICU Patients

open access: yesNursing Open, Volume 13, Issue 2, February 2026.
ABSTRACT Aim To investigate the specific risk factors associated with the development of hospital‐acquired pressure injuries in critically ill patients. Design A retrospective case–control study. Methods Using evidence‐based and Delphi methods, 36 potential risk factors for HAPI in critically ill patients were identified.
Yang Chaonan   +4 more
wiley   +1 more source

Police Cloud: Functional modularity in China's cloud public security infrastructure

open access: yesRegulation &Governance, Volume 20, Issue 1, Page 90-104, January 2026.
Abstract Globally, China's Ministry of Public Security has one of the largest appetites and regulatory scopes for new technology use in policing. Using the case study of Police Cloud—a cloud infrastructure project, this paper examines a national wave of cloud migration initiated in Shandong in 2013.
Ausma Bernot
wiley   +1 more source

METHOD OF EVALUATION OF THE EFFICIENCY OF TELECOMMUNICATION NETWORK MANAGEMENT SYSTEM

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2018
The article analyzes existing approaches and methods for assessing the efficiency of a telecommunication network and its management system. The concept of efficiency, classification and existing approaches to its evaluation are considered.
Eduard N. Bovda   +2 more
doaj  

Home - About - Disclaimer - Privacy