Approximate string matching (3) | ![]() |
Computation (100) | ![]() |
Computer architecture (25) | ![]() |
Computer programming (826) | ![]() |
Computer science (331) | ![]() |
Distributed computing (29) | ![]() |
Formal language (13) | ![]() |
Theory of computation (3) | ![]() |
1 1. 2. Computer sciences, the Internet and mass media...7 1. 2. 1. Example of applying environmental principles...
Optimization techniques, such as constraint programming, are helpful for route allocation. The choice of aircraft model is made according to the number of passengers or loads.
The invention of the computer and the quick development of computer science has had a very significant impact on our lives. 1. 2. Computer science, the Internet and mass media Computers
Other techniques of knowledge discovery, such as neural networks, genetic algorithms, induction or other multistrategy machine learning hybrid tools PIA 91
Google also developed a machine-learning algorithm (artificial intelligence (AI)) that learns from operational data to model plant performance
computer science, social science, physics, biology, engineering, design, architecture and philosophy. A strong multidisciplinary and collaborative approach is the key requirement for large-scale technology innovation and the development of effective applications8.
The users of Microsoft, Google, Ecosia and others have to set a search language, which will limit the results of search to the chosen language.
and requires collaboration between the future users, computer science and IT as well as from the social sciences. Ambient assisted living involves technologies such as sensors, specific equipment, robotics, user interaction (multimodal interfaces) and simulation platforms.
but their Innovation Landscape and Fields 31 safety remains to be demonstrated (see http://www. batiactu. com/edito/les-nanomateriaux-se-repandent-dans-le-batiment-38128. php).
Most computer science training teaches how to think about âoedataâ (classifying things), whereas artificial intelligence enables us to learn how to think about âoeknowledgeâ (problem-solving).
http://www. europatriates. eu/index. php/en/)Jobs creation remains just a desire without providing the appropriate ecosystem and necessary conditions for the development of existing companies and creation of new companies.
For example, the seeker can design an image processing algorithm to automatically/semiautomatically perform segmentation on stacks of images of the esophagus. 2 https://www. innocentive. com/ar/challenge.
They are in charge of the direction, programming and facilitation of research in their areas of expertise:
A multidisciplinary approach ranging from computer science to molecular biology, integrating knowledge from the East and the West, is applied in this research.
available at http://www. batiactu. com/edito/les-nanomateriaux-se-repandent-dans-le-batiment-38128-p2. php, 2014.
EUR 14 EUROPATRIATES, available at http://www. europatriates. eu/index. php/en/,2014. EVR 14 EVRARD O.,POINTURIER F.,YUICHI O. et al.
example of eco-design processâ, Federated Conference on Computer science and Information systems, Krakow, Poland, 2013. MER 13b MERCIER-LAURENT E.,âoeinnovating corporate management:
, 181 business model, 107 innovation, 62,126, 155 intelligence, 64,72, 113 watch, 79 computer science, 7â 11,21, 26,69, 132 computers, 7, 13,15, 16,52
consequences of global business 1. 2. Computer science, the Internet and mass media 1. 2. 1. Example of applying environmental principles 1. 2. 2. Artificial intelligence 1. 2
Design challenges. 2008 11th IEEE International Symposium on Object and Component-Oriented Real-time Distributed computing (ISORC)( pp. 363â 369.
For example, a difficult âoeinventory problemâ solution can also be looked at as a mixed integer-programming problem.
Or either of these perspectives on the problem might be restated as a dynamic programming or systems dynamics simulation problem.
Computer science-Research and development, 23 (2), 47â 65. Weske, M. 2007. Concepts, languages, architectures (Vol. 14. Berlin:
Driving behaviour parameters were measured by advanced signal-processing algorithms, filtering GPS data combined with sensor fusion from the accelerometer and gyroscope in the smartphone,
Just like computer science emerged as a new discipline from mathematics when computers became abundantly available,
Fortunately, database 2 For example, http://www. win. tue. nl/ieeetfpm/doku. php? idâ shared: process mining case stud ies lists over 20 successful case studies in industry.
Having start and complete events allows for the computation of activity durations. It is recommended to store activity references to be able to relate events belonging to the same activity instance.
Formal methods for web services (Lecture Notes in Computer science, Vol. 5569, pp. 42â 88. Berlin:
In Sixth International Conference on Extending Database Technology (Lecture Notes in Computer science, Vol. 1377, pp. 469â 483.
Proceedings of the 10th International Conference on Fundamental Approaches to Software engineering (FASE 2007)( Lecture Notes in Computer science, Vol. 4422, pp. 245â 259.
International Conference on Business Process Management (BPM 2007)( Lecture Notes in Computer science, Vol. 4714, pp. 375â 383.
A region-based algorithm for discovering petri nets from event logs. In Business Process Management (BPM2008)( pp. 358â 373.
Business Process Management Workshops, Workshop on Business Process Intelligence (BPI 2006)( Lecture Notes in Computer science, Vol. 4103, pp. 81â 92.
) Process mining case studies. Retrieved from http://www. win. tue. nl/ieeetfpm/doku. php? idâ shared:
Business Process Management (BPM 2010)( Lecture Notes in Computer science, Vol. 6336, pp. 211â 226. Berlin:
Applications and Theory of Petri Nets 2010 (Lecture Notes in Computer science, Vol. 6128, pp. 226â 245.
Combining evidence from past sales data, forecasting algorithms as well as observations and evidence from how store managers operate,
M. Dumas(*)â¢F. M. Maggi Institute of Computer science, University of Tartu, J. Liivi 2, Tartu 50409, Estonia e-mail:
Here, a fault detection algorithm (local outlier factor) is used to estimate the probability of a fault occurring.
Acknowledgments This work is supported by ERDF via the Estonian Centre of Excellence in Computer science. References Birukou
Theory and experiments with perceptron algorithms. In Proceedings of the ACL conference on empirical methods in natural language processing (pp. 1â 8). Philadelphia, PA:
However, most of the existing techniques and algorithms only take activities into account. There are several different approaches for the automatic detection of correspondences.
so that the algorithm is able to determine whether a node should be an activity or an event (in case of EPCS).
The Refmod-Mine/NSCM algorithm conducts an n-ary cluster matching, thus, the nodes of all models which should be matched are being compared pairwise,
& Flynn, 1999) cluster algorithms start with clusters of size 1 (activities) and consolidates two activities to a cluster
Finally, the algorithm returns binary simple or complex matches for the nodes of each model pair. 4. 2 Structural Analogies One of the main problems in reference modelling is the identification of correspondences (cf. 4. 1)
In order to match (cf. 4. 1) further elements, it is necessary to use advanced mapping algorithms that are able to identify antonyms like âoeinvoice settledâ and âoepayment receivedâ.
In comparison to the linear time computation of an RPST (Vanhatalo et al. 2009), the calculation of subgraph isomorphism is said to be NP complete (Garey & Johnson, 1979.
The MCC algorithm comprises three main steps: In the first step, a set of candidaterelations is calculated out of the existing nodes and edges in given Fig. 2 Structural analogue process chains Identification of Business Process Models in a Digital World
the algorithm is also able to present a completely integrated model containing all nodes of the underlying process models
JAVA was used as the programming language. The architecture of the tool consists of three layers that are shown in Fig. 4. At the lowest layer, functionalities for loading, storing,
the ARIS Markup language (AML) and EPC Markup language (EPML. The second layer contains concepts and algorithms
which support the analysis of individual enterprise models and the derivation of a reference model.
â¢an application of the inductive method to develop new reference models and â¢the development and application of techniques and algorithms for the corpus development.
An algorithm for suffix stripping. Readings in information retrieval (pp. 313â 316. San francisco, CA: Morgan Kaufmann.
They propose using algorithms to parse labels written by modelers in order to detect grammatical mistakes and to prompt users to fix them. 3. 2 Use a Glossary As naming conventions only refer to standardizing the grammatical part,
An algorithm can then parse his sentence and deconstruct it into its parts. This allows not only a verification of the phrase structure, i e.,
Not only can this help to create more clearly arranged models (provided that the algorithm is good),
These conventions should be codified in the form of a layout algorithm which is the same for each modeler.
rmfl@cin. ufpe. br H. A. Reijers Department of mathematics and Computer science, Eindhoven University of Technology, Den Dolech 2, 5612 AZ Eindhoven, The netherlands e-mail:
Decision-making algorithms can be used to compile and present to the user recommendations about how to perform their job in alignment with the organ-izationâ s priorities.
a decision algorithm is employed automatically to determine the recommended path to be followed by the user.
Then, using all these pieces of information it becomes possible to identify points for integrating concrete control activities into workflows. This can be realized by having automated search algorithms check the actual control parameters against the workflow instance information.
deploy and optimize business processes themselves (i e. without manual programming by software engineers). This third BPM wave initiated by Smith
He has a background in business economics und computer science and has obtained his economic doctorate degree from the Martin-Luther-University Halle-Wittenberg in 2013.
Curricula Vitae 293 Ricardo Massa F. Lima Federal University of Pernambuco, Brazil Ricardo Massa F. Lima received the Ph d. degree in computer science from Federal University
He is the Vice-Coordinator of UFPEÂ s computer science postgraduate program. His main research interests include compiler construction and optimi-zation
and performance evaluation of discrete-event dynamic systems using Petri nets, with projects sponsored by the Brazilian Petroleum Industry (Petrobras), Saëoeo Franciscoâ s Hydroelectric Company (Chesf),
He received a Ph d. in Computer science in 2010 from University of Bari. Curricula Vitae 295 Monika Malinova Vienna University of Economics and Business, Austria Monika Malinova is a teaching
of Pernambuco (Recife, Brazil) in 2008 and his Ph d. degree in computer science from the Center for Informatics, Federal University of Pernambuco (Recife, Brazil), in 2014.
He received a Ph d. in Computer science (2002), A m. Sc. in Computer science (1994), and A m. Sc. in Technology and Society (1994), all from TU/e. Hajo wrote his Ph d. thesis on the topic of BPM for the service industry
Walter studied computer science at the Brandenburg University of Technology (BTU. His research activities include business process management, software development and graph theory.
It is associated typically with software development activities where the source code is released allowing others to build on it.
and withholding access to source code of Apple software) â while Google is â openâ â allowing other developers
such as its search algorithms, and advertising data. 6 And â as we would expect of a dynamic,
With English now the primary language of todayâ s world economy, learning a programming language has arguably become more important than learning a second spoken language.
and computer programming. 3. Introduce a National Register for volunteer entrepreneurs who would be willing to visit schools to engage with students at local level. 2. 3 Encouragement for Under-Represented Groups The majority of the actions being taken by Government are helpful
(Interactive Learning), Changingworlds (Personalisation), Network365 (Mobile Payments), Datalex (Travel Software), Trintech (Online Payments), Baltimore Technologies (Security), Glockenspiel (Compilers), Euristix (Network
and computer programming. 3. Introduce a National Register for volunteer entrepreneurs who would be willing to visit schools to engage with students at local level. 2. 3 Encouragement for Under-Represented Groups 4. As part of an entrepreneurship cultural awareness campaign,
December 17, 2012), http://www. cepr. net/index. php/blogs/cepr-blog/thoughts-on-the-chained-cpi-social-security-and-the-budget. 60.
accessed October 15, 2013), http://farm. ewg. org/regionsummary. php? fips=00000&statename=theunitedstates. 61. Ibid. 62.
In the 2014-2020 programming period, social innovation is going to be mainstreamed. In the new regulation on the European Social Fund
as such, need algorithms to achieve the maximum power point which must be considered in the design of the power electronics interface. 3) Bidirectional power flow:
http://www. ieeeghn. org/wiki/index. php/Pearl street station 7 T. J. Overbye and J. D. Weber, âoevisualizing the electric grid, â IEEE Spectr.
Pathways to a resource-efficient Europe, www. eco-innovation. eu/index. php? option=com content&view=article&id=200&itemid=258 Eco-innovate!
625 m3 per year. www. environmental-savings. com/megtakaritas. php Genan: turning tyres into new products The Danish company Genan is recycling 80%of all Danish tyres.
Eco-Innovation Observatory Annual Report 2011, Closing the eco-innovation gap, an economic opportunity for business, p. 17, www. eco-innovation. eu/index. php?
. eu/index. php? option=com content&view=article&id=514%3aweight-and-energy-efficiency-optimisation-with-flat-glass-syst ems&catid=50%3aaustria&itemid=50 Eco-innovate production processes Quick wins Cost savings
and fire. www. ecococon. lt www. eco-innovation. eu/index. php? option=com content&view=article&id=344%3astraw-panels& catid=65%3alithuania&itemid=65 Eco-innovate production processes Eco-innovate!
ecodesign. lboro. ac. uk/index. php? section=1¤tsection=1& sectionname=Home Learning Resources Figure 7:
 www. environmental-savings. com/megtakaritas. php; Newlife Paints Source:  www. newlifepaints. com p. 27:
and challenges of social innovation measurement, Deliverable of the Project Tepsie, EU 7fp, http://www. tepsie. eu/index. php/publications Epstein
+1) deal with the programming and monitoring of implementation of the centrally managed programmes directly targeting innovation. â¢There are 386 operational programmes under the ERDF
É ë8 A m Ð<È c# 7%g 8 þ r õ Ý 5 U*3 6/;
Ý} K) ç§A's X V l Ø oe%ï õ y ï Ì'c# i m'Ô Ú§ê d
e I z a ì V Õ õ d r Ï ý C# X þ`.o B ñ¸%Ì B'*÷ae À
å c# P`ò R@é r Ä ô>ý &+'ae 0*.û T>Ñ N £ Z J Ñ
å c# P`ò R@é r Ä ô>ý &+'ae 0*.û T>Ñ N £ Z J Ñ
í Ã Y õ Ç k Ä, C# ò?ñ ×} ã i%ê Ý N ý K+ò î ¥ ó þ R P ú W z H L
¸C# %'Ì è')ÿ Ò.)oe Z s 3 ÙT q õ¿À=0 2 Ì;÷
J C# Ý, £ Ç ô 5 h"oe+2 Óüûÿ¿üûÿ üûÿ üûÿ üûÿ üûÿ üûÿ üûÿ üûÿ üûÿ üûÿ üûÿ¥üûÿ¤üûÿ£üûÿ üûÿ üûÿ'üûÿ üûÿ üûÿ üûÿxüûÿwüûÿuüûÿsüûÿrüûÿpüûÿnüûÿiüûÿfüûÿeüûÿcüûÿ9üûÿ3üûÿ2üûÿ+üûÿ*üûÿ
í ø û ê O a ÿ Ç É £ Ò r R*H Õ h C# ',O 3 7 9
##>3 I D#W F#I#K#Z î M#O#R i Á ã V#Z##=c# f#ô i#k#p#w
x ý°##& C# p 1##p##¥#§#D Ñ Î! Ó Ï ý Ð á##c ð 8 J ç o â q###˸#@ae Ú@¤Á ï# Å
##£ D#<G#A i#K#N#P#T#V#X###Á x A j c# Î!
ä`#÷Ï ô Ú A p c# m ä × f#i#k#ù¢m#p#ö v#;"
###B#K#þ O#Ü U#`#c# f#i#{ú"l#o#r#t x u#Ó Ä ä y#f
B z P Â Ð v C Â È r L V U C# ö oe r'G#I#L#È
y h g å E#ñ £ H#ÿ P#S#× Ù 0 U#bp c# ¸5¢+A#Å Z}
å 9#ë{>#C# F#à È d r ì N d ae ý à R#ò í W###b#ï
"ä S i ae â t i ç Ç ç D ì Ó Ë oe C# A x§E#È ò;¸
R É C# L#Ë P#S w#Z#R 4 ë#h#n s#Ô ý g¸w#y##X å
##>£*F Ô C# B D U oe g Ù Ý E#{Q Z O z¿
#ae O V#i¸##Á ê c# g#i#k#ê m#ã Ò þ o#w#¤ó Z ê o v
z p d j ó W`Â C# 0 ó ì J K 2 ñ y $ i} $ ë È¿
ÿ%%%c# %"&%*%Ò $.%Ó 0%4%8%:%%%<ç È É oe G%N%x Q%U%%%õ c%f%j%o%s%x y%Û%!%
ÿ%%%c# %"&%*%Ò $.%Ó 0%4%8%:%%%<ç È É oe G%N%x Q%U%%%õ c%f%j%o%s%x y%Û%!%
À Z (s a ú 1 ã"ÿÿÿÿ D c/C# Gn ÿÿÿÿÿÿÿÿê 1 ß: C¡
G#2v 7685 Computer science G#3v 7686 Approximate string matching 0#4#approximate string matching Approximate string matching G#3v 7687 Computation
G#4v 7688 Computation 0#5#computation Computation G#4v 7689 Parallel computing 0#5#parallel computing Parallel computing
G#3v 7690 Computer architecture G#4v 7691 Computer architecture 0#5#computer architecture Computer architecture G#4v 7692 Virtual machine
0#5#virtual machine Virtual machine G#3v 7693 Computer programming G#4v 7694 Computer programming G#5v 7695 Computer programming
0#6#computer programming Computer programming 0#6#programming Computer programming G#5v 7696 System clock 0#6#system clock System clock
G#5v 7697 System time 0#6#system time System time G#4v 7698 Programming languages G#5v 7699 Algol
0#6#algol Algol G#5v 7700 Assembly language 0#6#assembly language Assembly language G#5v 7701 Basic language
0#6#basic language Basic language G#5v 7702 Binary code 0#6#binary code Binary code G#5v 7703 C language
0#6#c language C language 0#6#c++ C language G#5v 7704 C sharp 0#6#c# C sharp
0#6#c sharp C sharp G#5v 7705 Cobol 0#6#cobol Cobol G#5v 7706 Command language
0#6#command language Command language G#5v 7707 Compiler 0#6#compiler Compiler G#5v 7708 Computer code
0#6#computer code Computer code G#5v 7709 Debugger 0#6#debugger Debugger G#5v 7710 Development environment
G#6v 7711 Development environment 0#7#development environment Development environment G#6v 7712 RAD STUDIO 0#7#rad studio RAD STUDIO
G#6v 7713 Visual studio 0#7#visual studio Visual studio G#5v 7714 Dot net 0#6#dot net Dot net
G#5v 7715 Flash 0#6#flash Flash G#5v 7716 Fortran 0#6#fortran Fortran
G#5v 7717 Java language 0#6#java Java language 0#6#java language Java language G#5v 7718 Lisp language
0#6#lisp language Lisp language G#5v 7719 Machine code 0#6#machine code Machine code G#5v 7720 Machine language
0#6#machine language Machine language G#5v 7721 Markup language 0#6#markup language Markup language G#5v 7722 Metalanguage
0#6#metalanguage Metalanguage G#5v 7723 Microcode 0#6#microcode Microcode G#5v 7724 Modula 2
0#6#modula 2 Modula 2 G#5v 7725 Pascal language 0#6#pascal language Pascal language G#5v 7726 Perl language
0#6#perl language Perl language G#5v 7727 PHP 0#6#php PHP G#5v 7728 Programming interface
0#6#application programming interface Programming interface 0#6#programming interface Programming interface G#5v 7729 Programming language 0#6#programming language Programming language
G#5v 7730 Pseudocode 0#6#pseudocode Pseudocode G#5v 7731 Python language 0#6#python language Python language
G#5v 7732 Run-time library 0#6#run-time library Run-time library G#5v 7733 Script language G#6v 7734 Javascript
0#7#javascript Javascript G#6v 7735 Script language 0#7#script language Script language G#6v 7736 VBSCRIPT
0#7#vbscript VBSCRIPT G#5v 7737 Search language G#6v 7738 Query language 0#7#query language Query language
G#6v 7739 Search language 0#7#search language Search language G#6v 7740 Sparql 0#7#sparql Sparql
G#6v 7741 SQL 0#7#sql SQL G#5v 7742 Shell language 0#6#shell language Shell language
G#5v 7743 Smalltalk 0#6#smalltalk Smalltalk G#5v 7744 Source code 0#6#source code Source code
G#3v 7745 Computer science G#4v 7746 Algorithm G#5v 7747 Algorithm 0#6#algorithm Algorithm
G#5v 7748 Genetic algorithm 0#6#genetic algorithm Genetic algorithm G#5v 7749 Optimization algorithm 0#6#optimization algorithm Optimization algorithm
G#4v 7750 Computer science 0#5#computer science Computer science G#4v 7751 Speech recognition 0#5#speech recognition Speech recognition
G#3v 7752 Distributed computing 0#4#distributed computing Distributed computing 0#4#distributed systems Distributed computing G#3v 7753 Formal language
0#4#formal language Formal language G#3v 7754 Theory of computation 0#4#theory of computation Theory of computation G#2v 7755 Computing
G#3v 7756 Booting 0#4#booting Booting 0#4#booting up Booting G#3v 7757 Bus mastering
0#4#bus mastering Bus mastering G#3v 7758 Computing 0#4#computing Computing G#3v 7759 Docking station
0#4#docking station Docking station G#3v 7760 Upgrade 0#4#upgrade Upgrade G#2v 7761 Information system
0#3#information system Information system G#2v 7762 Information technology 0#3#information technology Information technology G#2v 7763 Software engineering
0#3#software engineering Software engineering G#1v 6925 Crowdsourcing 0#2#crowdsource Crowdsourcing 0#2#crowdsourcing Crowdsourcing
G#1v 6926 Cryptography 0#2#cryptographer Cryptography 0#2#cryptography Cryptography G#1v 6927 Cryptology
G#2v 6928 Cryptology 0#3#cryptographic key Cryptology 0#3#cryptologist Cryptology 0#3#cryptology Cryptology
G#2v 6929 Homomorphic encryption 0#3#homomorphic encryption Homomorphic encryption G#1v 7764 Data G#2v 7765 Backup
0#3#backup Backup G#2v 7766 Big data G#3v 7767 Big data 0#4#big data Big data
G#3v 7768 Big data analytics 0#4#big data analytics Big data analytics G#3v 7769 Hadoop 0#4#hadoop Hadoop
G#3v 7770 Massive data 0#4#massive data Massive data G#2v 7771 Computer data storage G#3v 7772 Computer data storage
0#4#computer data storage Computer data storage G#3v 7773 Data storage 0#4#data storage Data storage G#3v 7774 Memory
G#4v 7775 Memory chip 0#5#memory chip Memory chip G#4v 7776 Memory device 0#5#memory device Memory device
G#4v 7777 Memory-access 0#5#memory access Memory-access G#4v 7778 Quantum memory 0#5#quantum memory Quantum memory
G#2v 7779 Data 0#3#data Data G#2v 7780 Data center 0#3#data center Data center
G#2v 7781 Data compression 0#3#data compression Data compression G#2v 7782 Data format 0#3#data format Data format
G#2v 7783 Data mining G#3v 7784 Clustering G#4v 7785 Cluster analysis 0#5#cluster analysis Cluster analysis
G#4v 7786 Clustering 0#5#clustering Clustering G#3v 7787 Data mining 0#4#data mining Data mining
G#3v 7788 Information mining 0#4#information mining Information mining G#3v 7789 Text mining 0#4#text mining Text mining
G#3v 7790 Web mining 0#4#web mining Web mining G#2v 7791 Data recovery 0#3#data recovery Data recovery
G#3v 7792 Uflysoft data recovery 0#4#uflysoft data recovery Uflysoft data recovery G#2v 7793 Data sharing 0#3#data sharing Data sharing
G#3v 7794 File sharing 0#4#file sharing File sharing G#2v 7795 Data storage devices G#3v 7796 Data storage device
0#4#data storage device Data storage device G#3v 7797 Sim G#4v 7798 Micro sim 0#5#micro sim Micro sim
G#4v 7799 Sim 0#5#sim Sim G#4v 7800 Sim card 0#5#sim card Sim card
G#2v 7801 Data stream 0#3#data stream Data stream G#2v 7802 Data structure 0#3#data structure Data structure
G#2v 7803 Data transmission 0#3#data transmission Data transmission 0#3#digital communication Data transmission 0#3#digital transmission Data transmission
G#2v 7804 Data type 0#3#data type Data type G#2v 7805 Data warehouse 0#3#data centre Data warehouse
0#3#data repository Data warehouse 0#3#data warehouse Data warehouse G#3v 7806 Information center 0#4#information center Information center
G#2v 7807 Database G#3v 7808 Database 0#4#data base Database 0#4#database Database
G#3v 7809 Database management system 0#4#database management system Database management system G#3v 7810 Database systems G#4v 7811 Adabas
0#5#adabas Adabas G#4v 7812 Db2 0#5#db2 Db2 G#4v 7813 Filemaker
0#5#filemaker Filemaker G#4v 7814 Microsoft access 0#5#microsoft access Microsoft access G#4v 7815 Mysql
0#5#mysql Mysql G#4v 7816 Postgresql 0#5#postgresql Postgresql G#4v 7817 Sql server
0#5#sql server Sql server G#2v 7818 Digital data G#3v 7819 Digital data 0#4#digital data Digital data
0#4#digital information Digital data G#3v 7820 Digital economy 0#4#digital economy Digital economy G#3v 7821 Digital information units
G#4v 7822 Byte 0#5#byte Byte G#4v 7823 Gigabyte 0#5#gigabit Gigabyte
0#5#gigabyte Gigabyte G#4v 7824 Megabyte 0#5#megabit Megabyte 0#5#megabyte Megabyte
G#4v 7825 Terabyte 0#5#terabit Terabyte 0#5#terabyte Terabyte G#3v 7826 Digital mapping
0#4#digital mapping Digital mapping G#3v 7827 Digital signal processing 0#4#digital signal processing Digital signal processing G#3v 7828 Digitization
G#4v 7829 Digital image G#5v 7830 4k resolution 0#6#4k resolution 4k resolution G#5v 7831 Digital image
0#6#digital image Digital image G#5v 7832 Hdtv 0#6#hdtv Hdtv 0#6#high definition television Hdtv
G#5v 7833 Megapixel 0#6#megapixel Megapixel G#5v 7834 Pixel 0#6#pixel Pixel
G#4v 7835 Digitization 0#5#digitisation Digitization 0#5#digitization Digitization 0#5#digitizing Digitization
G#2v 7836 Input data 0#3#input data Input data G#2v 7837 Satellite data 0#3#satellite data Satellite data
G#1v 6930 Data analysis 0#2#data analysis Data analysis G#1v 6931 Data privacy 0#2#confidential information Data privacy
0#2#data privacy Data privacy 0#2#data protection Data privacy 0#2#personal data Data privacy G#1v 6932 Data processing
0#2#data processing Data processing G#1v 6933 Data science 0#2#data science Data science G#1v 6934 Data visualization
0#2#data visualisation Data visualization 0#2#data visualization Data visualization G#1v 6935 Digital culture 0#2#digital culture Digital culture
G#1v 6936 Digital divide 0#2#digital divide Digital divide G#1v 6937 Drone G#2v 6938 Military drone
0#3#military drone Military drone G#2v 6939 Pocket drone 0#3#pocket drone Pocket drone G#2v 6940 Quadricopter
0#3#quadcopter Quadricopter 0#3#quadricopter Quadricopter 0#3#quadrocopter Quadricopter 0#3#quadrotor Quadricopter
0#3#quadrotor helicopter Quadricopter G#1v 6941 E-commerce G#2v 6942 Business to business 0#3#business to business Business to business
G#2v 6943 Business to consumer 0#3#business to consumer Business to consumer 0#2#e commerce E-commerce 0#2#ecommerce E-commerce
G#1v 6944 Electronic signature 0#2#electronic signature Electronic signature G#1v 7882 Evolutionary computation 0#2#evolutionary computation Evolutionary computation
G#1v 7838 File formats G#2v 7839 Docx 0#3#docx Docx G#2v 7840 Epub
0#3#epub Epub G#2v 7841 Html 0#3#html Html G#2v 7842 Pdf
0#3#pdf Pdf G#2v 7843 Xhtml 0#3#xhtml Xhtml G#1v 6945 Fingerprint reader
0#2#fingerprint reader Fingerprint reader G#1v 6946 Gadget 0#2#gadget Gadget G#1v 6947 High-tech
0#2#high tech High-tech G#1v 7844 Human computer interaction G#2v 7845 Human computer 0#3#human computer Human computer
G#2v 7846 Human computer interaction 0#3#human computer interaction Human computer interaction G#2v 7847 Human computer interface 0#3#human computer interface Human computer interface
G#1v 6948 Image processing G#2v 6949 Face recognition 0#3#face recognition Face recognition 0#3#facial recognition Face recognition
G#2v 6950 Image analysis 0#3#image analysis Image analysis G#2v 6951 Image processing 0#3#image processing Image processing
G#2v 6952 Machine vision 0#3#machine vision Machine vision G#1v 7848 Informatics 0#2#informatics Informatics
G#1v 6953 Information theory 0#2#information theory Information theory G#1v 7883 Internet of things 0#2#internet of things Internet of things
0#2#iot Internet of things G#1v 7884 Ipv6 0#2#ipv6 Ipv6 G#1v 7885 Machine to machine
0#2#m2m Machine to machine 0#2#machine to machine Machine to machine G#1v 6954 Mathematics G#2v 6955 Boolean algebra
0#3#boolean algebra Boolean algebra G#2v 6956 Boundary condition 0#3#boundary condition Boundary condition G#2v 6957 Graph theory
0#3#graph theory Graph theory G#2v 6958 Mathematics 0#3#mathematics Mathematics G#1v 7849 Multimedia
G#2v 7850 Multimedia 0#3#multimedia Multimedia G#2v 7851 Multimedia terms G#3v 7852 Adobe flash
0#4#adobe flash Adobe flash 0#4#flash player Adobe flash 0#4#macromedia flash Adobe flash G#3v 7853 Directshow
0#4#directshow Directshow G#3v 7854 Directx 0#4#direct x Directx G#3v 7855 Hypermedia
0#4#hypermedia Hypermedia G#3v 7856 Hypertext 0#4#hypertext Hypertext G#3v 7857 Itunes
0#4#itunes Itunes G#3v 7858 Quicktime 0#4#quicktime Quicktime G#3v 7859 Windows media
0#4#windows media Windows media G#1v 6959 Network theory 0#2#network theory Network theory G#1v 6960 Optimization theory
0#2#optimization theory Optimization theory G#1v 7860 Overclocking 0#2#overclocking Overclocking G#1v 7861 Peopleware
0#2#peopleware Peopleware G#1v 7886 Quantum computing G#2v 7887 Quantum bit 0#3#quantum bit Quantum bit
0#3#qubit Quantum bit G#2v 7888 Quantum computer 0#3#quantum computer Quantum computer G#2v 7889 Quantum computing
0#3#quantum computing Quantum computing G#1v 6961 Smart card 0#2#smart card Smart card G#1v 6962 Smart home
0#2#smart home Smart home G#1v 6963 Telematics 0#2#telematics Telematics G#1v 6964 Tv
G#2v 6965 Digital tv 0#3#digital tv Digital tv G#2v 6966 Television 0#3#television Television
G#2v 6967 Tv 0#3#tv Tv G#2v 6968 Usb tv 0#3#usb tv Usb tv
G#1v 7890 Ubiquitous computing 0#2#ubiquitous computing Ubiquitous computing G#1v 7862 User G#2v 7863 End user
0#3#end user End user G#2v 7864 User 0#3#user User G#2v 7865 User friendly
0#3#user friendly User friendly G#2v 7866 User interface G#3v 7867 Avatar 0#4#avatar Avatar
G#3v 7868 Graphical user interface 0#4#graphical user interface Graphical user interface G#3v 7869 User interface 0#4#user interface User interface
G#3v 7870 Wysiwyg 0#4#wysiwyg Wysiwyg G#1v 7891 Wearable computing 0#2#body borne computer Wearable computing
0#2#wearable computer Wearable computing 0#2#wearable computing Wearable computing 0#2#wearable devices Wearable computing G#0v 8461 MINING
G#1v 9713 Asteroid mining 0#2#asteroid miner Asteroid mining 0#2#asteroid mining Asteroid mining G#1v 9714 Atmospheric mining
0#2#atmospheric mining Atmospheric mining G#1v 9715 Automated mining 0#2#automated mining Automated mining G#1v 8463 Bioleaching
0#2#bioleaching Bioleaching G#1v 9716 Biomining 0#2#biomining Biomining G#1v 8468 Coal
G#2v 8469 Anthracite 0#3#anthracite Anthracite G#2v 8470 Bituminous coal 0#3#bituminous coal Bituminous coal
0#3#black coal Bituminous coal G#2v 8471 Burning coal 0#3#burning coal Burning coal G#2v 8472 Coal
0#3#coal Coal G#2v 8473 Coal fired G#3v 8474 Coal fired 0#4#coal fired Coal fired
G#3v 8475 Coal fired power 0#4#coal fired power Coal fired power G#3v 8476 Coal fired power plant 0#4#coal fired power plant Coal fired power plant
G#3v 8477 Coal fired power stations 0#4#coal fired power stations Coal fired power stations G#3v 8478 Coal fired electricity 0#4#coal fired electricity Coal fired electricity
G#2v 8479 Coal industry 0#3#coal industry Coal industry G#2v 8480 Coal plant 0#3#coal plant Coal plant
G#2v 8481 Lignite 0#3#lignite Lignite G#2v 8482 Subbituminous coal 0#3#subbituminous coal Subbituminous coal
G#2v 8483 Wood coal 0#3#wood coal Wood coal G#1v 9717 Deep sea mining 0#2#deep sea mining Deep sea mining
G#1v 8484 Extractive metallurgy G#2v 8485 Extractive metallurgy 0#3#extractive metallurgy Extractive metallurgy G#2v 8486 Mineral dressing
0#3#mineral dressing Mineral dressing 0#3#ore dressing Mineral dressing G#2v 8487 Mineral engineering 0#3#mineral engineering Mineral engineering
G#2v 8488 Mineral extraction 0#3#mineral extraction Mineral extraction G#2v 8489 Mineral processing 0#3#mineral processing Mineral processing
< Back - Next >
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011