書目名稱Information Technology in Disaster Risk Reduction影響因子(影響力)學科排名
書目名稱Information Technology in Disaster Risk Reduction網(wǎng)絡公開度
書目名稱Information Technology in Disaster Risk Reduction網(wǎng)絡公開度學科排名
書目名稱Information Technology in Disaster Risk Reduction被引頻次
書目名稱Information Technology in Disaster Risk Reduction被引頻次學科排名
書目名稱Information Technology in Disaster Risk Reduction年度引用
書目名稱Information Technology in Disaster Risk Reduction年度引用學科排名
書目名稱Information Technology in Disaster Risk Reduction讀者反饋
書目名稱Information Technology in Disaster Risk Reduction讀者反饋學科排名
作者: 帶來 時間: 2025-3-22 00:12 作者: 自由職業(yè)者 時間: 2025-3-22 03:34 作者: 外貌 時間: 2025-3-22 06:56
Proposal of Evacuation Support System and Evaluation by Multi-agent Simulation in a Regional Disastcase study in a regional area with three evacuation shelters on Yahaba town in Iwate Prefecture, Japan, we confirmed that if we had enough evacuation time, the evacuation support system had an effect to increase the number of the evacuees.作者: myriad 時間: 2025-3-22 10:45 作者: 得體 時間: 2025-3-22 13:54
Conceptual Model of Debris Flow Information System, data, analyses and visualization. A fuzzy logic model for integrated risk assessment of the debris flow due to the multiple natural factors (as rainfall duration, rainfall amount, slope, erosion etc.) is proposed. An example of geoinformation portal is presented.作者: 河潭 時間: 2025-3-22 18:24
Ecological Internet Resource as a Tool for Information Control of the Harmful Effects of Environmenle for the searching systems. The described application collects data on the ecological state of the environment in a specific region in the amount necessary for its analysis and decision-making on environmental issue.作者: 教義 時間: 2025-3-22 21:12
Issues in the Use of the Recovery Watcher for Situation Awareness in Disaster and Inclusive Communithe further possibilities to use the system for the first responders at disaster as well as inclusive support. We look into the original definition of situation awareness as well as trust issues. Finally, we present our plan to use the system in an island for elderly care as well as tourism in future.作者: 向下 時間: 2025-3-23 03:57
Information Technologies for Assessing the Impact of Climate Change and Natural Disasters in Socio-economic approach takes account equally the economic, social and environmental impacts. The paper proposes a universal model to assess the impact of external influences on the system. Considering information technologies that provide a procedure for assessing risks and consequences of natural disasters in socio-economic systems.作者: 積習已深 時間: 2025-3-23 05:53 作者: 古老 時間: 2025-3-23 12:24 作者: anatomical 時間: 2025-3-23 17:14
978-3-030-48941-0IFIP International Federation for Information Processing 2020作者: 時代錯誤 時間: 2025-3-23 20:21 作者: AGATE 時間: 2025-3-23 22:45 作者: nauseate 時間: 2025-3-24 06:20 作者: 我正派 時間: 2025-3-24 09:37 作者: 半球 時間: 2025-3-24 10:50 作者: arthroscopy 時間: 2025-3-24 16:34
Environmental Monitoring and Population Protection from Environmental Factors,gion. Problem statement of choosing optimal environmental protection means is given. A method to receive safety recommendations for general public based on information regarding available protection means, known thresholds of harmful emissions and hazardous substances impact on humans and environmental situation in a given region is considered.作者: Somber 時間: 2025-3-24 21:57 作者: 百靈鳥 時間: 2025-3-25 01:52 作者: 寬度 時間: 2025-3-25 04:49
Tetiana Kovaliuk,Nataliya Kobets,Dmytro Ivashchenko,Valerii Kushnarovspektive zu betrachten...Lesen Sie, auf welche Sicherheitseigenschaften es bei Cyber-Systemen ankommt. So sind Sie mit Hilfe dieses Lehrbuchs in der Lage, die Wirksamkeit von IT-L?sungen mit Blick auf deren Sicherheit zu beurteilen. ..?..Grundlegende Aspekte der Cyber-Sicherheit..Im einführenden Abs作者: BRUNT 時間: 2025-3-25 08:20 作者: instructive 時間: 2025-3-25 15:32 作者: 隨意 時間: 2025-3-25 19:24 作者: 發(fā)生 時間: 2025-3-25 21:17 作者: 半球 時間: 2025-3-26 01:32
Juliana Baptista dos Santos Fran?a,André Viana Tardelli,Raffael Siqueira de Souza,Angélica Fonseca dent as well as find the possible faults in the current circuit. The time taken for the overhead procedure of mapping circuits is shown to be within acceptable limits for a real-time learning experience. Once the circuit is mapped it is re-produced on-screen in a web-page so that students can determi作者: 狂熱語言 時間: 2025-3-26 06:30 作者: 嘲弄 時間: 2025-3-26 10:24
Grethe ?stby,Basel Kattdistribution, electrical power, and sewage systems (Smith 2014). Civil society depends upon such systems to be properly operated, and malicious cybersecurity threats to ICS have the potential to cause great harm. The characteristics of ICS environments add additional considerations and challenges fo作者: 悲觀 時間: 2025-3-26 16:02
S. Kravtsiv,O. Sobol,V. Komyak,O. Danilin,O. Al’boschiys, the relationship between the citizens of India and the state is, thus, fundamentally reconfigured. Moreover, with the focus so firmly on surveillance and control of digital spaces, other aspects of cybersecurity policy, such as cyberdefence, have taken a backseat.作者: 殺死 時間: 2025-3-26 19:51 作者: 光滑 時間: 2025-3-26 23:34
Kemachart Kemavuthanon,Osamu Uchidaf Secured Services, Inc. (OTC: SSVC), and InfoSec (JP), the Executive Committee and Lab Governance Board for the Banking Information Technology Secretariat (BITS) of the Financial Services Roundtable and the Board of Advisors for numerous security start-ups.作者: 命令變成大炮 時間: 2025-3-27 03:40
Osamu Uchida,Sachi Tajima,Yoshitaka Kajita,Keisuke Utsu,Yuji Murakami,Sanetoshi Yamadae applications. The Loma Linda University Medical Center (LLUMC) Advanced Emergency GIS (AEGIS)is used to demonstrate a mashup approach. AEGIS provides a Web-based visualization and decision-support tool to monitor emergencies, track victims and emergency-response personnel, and evaluate factors tha作者: 吸引人的花招 時間: 2025-3-27 08:18
Valentina Nikolova,Plamena Zlateva,Boyko Berov,Asparuh Kamburov,Dimiter Velevuidelines for university-level courses on these topics, in view of the increasing globalization of education and the demand for teleworking, remote services and collaborative working environments.?.978-3-030-23161-3978-3-030-23162-0Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: Muffle 時間: 2025-3-27 09:26
,Building Resilient Community by Public Private Partnership – From Science to Action in Developing Crmation intelligence for efficient and effective responses. “Information intelligence” should be the future guidance on value of outputs by information system which must not just be limited in displaying scientific results, but also readable and actionable suggestions to follow. Within the paper, be作者: homeostasis 時間: 2025-3-27 14:58
,Building Resilient Community Through Plant Back Better Initiative – Guiding Principles and Best Pramitigating vulnerability and facilitating self-sufficiency through disaster-resilient plantation of vegetable and flowers. This research explored the feasible and applicable approaches on engaging key stakeholders to map out a pathway of sustainable and resilient developments through capacity buildi作者: 王得到 時間: 2025-3-27 19:23 作者: Microaneurysm 時間: 2025-3-27 22:52 作者: OASIS 時間: 2025-3-28 05:10 作者: Mendicant 時間: 2025-3-28 07:13 作者: 許可 時間: 2025-3-28 11:11 作者: fixed-joint 時間: 2025-3-28 15:58 作者: 生來 時間: 2025-3-28 19:59
Workshop Program on Disaster Prevention and Mitigation for Young Generation Utilizing Disaster Info results of the workshops for disaster prevention and mitigation using this program at several junior high and high schools. The results of the post-questionnaire show that many participants of the workshops had a positive impression on the disaster prevention and mitigation workshops using DITS/DIM作者: 物質(zhì) 時間: 2025-3-29 00:57 作者: Monotonous 時間: 2025-3-29 05:54
Yuko Murayama,Kayoko Yamamototy, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanc978-3-030-46910-8978-3-030-46908-5Series ISSN 1613-5113 Series E-ISSN 2363-9466 作者: 冷淡一切 時間: 2025-3-29 08:12 作者: 無法解釋 時間: 2025-3-29 13:13
Makoto Kitsuya,Jun Sasakihen Erst-Auflage wurden die bestehenden Kapitel erg?nzt und aktualisiert sowie zus?tzlich für neue Themen weitere Kapitel hinzugefügt. Aber auch Lehrmaterialien, wie 19 komp978-3-658-36242-3978-3-658-36243-0作者: 嚴厲譴責 時間: 2025-3-29 16:42 作者: 縮短 時間: 2025-3-29 19:55 作者: 等級的上升 時間: 2025-3-30 03:22
Yuko Murayama,Kayoko Yamamotoand requires only a very basic understanding of mathematics..This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift 作者: 憎惡 時間: 2025-3-30 07:23
Igor Grebennik,Ata Ovezgeldyyev,Yevhen Hubarenko,Maryna Hubarenko contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally作者: 切掉 時間: 2025-3-30 10:48 作者: Canary 時間: 2025-3-30 13:40 作者: Pessary 時間: 2025-3-30 18:11
Makoto Kitsuya,Jun Sasakiern den Wissenstransfer.Dieses Lehrbuch gibt Ihnen einen überblick über die Themen der IT-Sicherheit .Die digitale Transformation er?ffnet viele neue M?glichkeiten, den dadurch lassen sich Gesch?ftsmodelle und Verwaltungsprozesse radikal ver?ndern. Aber mit fortschreitender Digitalisierung nimmt jed作者: Panther 時間: 2025-3-30 21:19 作者: metropolitan 時間: 2025-3-31 04:47
Tetiana Kovaliuk,Nataliya Kobets,Olena Chaikovska,Dmytro Ivashchenkol ver?ndert. Dadurch er?ffnet der digitale Wandel auf der einen Seite viele neue M?glichkeiten. Auf der anderen Seite haben Hacker jüngst mit Cyber-Angriffen für Aufsehen gesorgt. So gesehen birgt die fortschreitende Digitalisierung auch Gefahren. Für eine erfolgreiche Zukunft unserer Gesellschaft i作者: 褻瀆 時間: 2025-3-31 06:09
Wei-Sen Li,Yanling Lee,Yi-Chung Liu,Ke-Hui Chen,Chi-Ling Changl ver?ndert. Dadurch er?ffnet der digitale Wandel auf der einen Seite viele neue M?glichkeiten. Auf der anderen Seite haben Hacker jüngst mit Cyber-Angriffen für Aufsehen gesorgt. So gesehen birgt die fortschreitende Digitalisierung auch Gefahren. Für eine erfolgreiche Zukunft unserer Gesellschaft i作者: 曲解 時間: 2025-3-31 12:14 作者: overbearing 時間: 2025-3-31 13:58 作者: 好開玩笑 時間: 2025-3-31 18:54
Juliana Baptista dos Santos Fran?a,André Viana Tardelli,Raffael Siqueira de Souza,Angélica Fonseca d algebra model or computing components. Such activities include setting up basic gates such as AND OR, NOT etc. followed by complex circuits e.g. Adder, Flip-Flops, Registers. These activities involve substantial amount of wiring between specific ports or end-points of components. Students often con作者: 愛得痛了 時間: 2025-3-31 21:54
Oleksii Kovalenko,Dimiter Velevrform real experiments, which need some flexibility of interaction with the hardware platform. The hardware platform is composed of raspberry pi as lab server, a switches matrix, a practical work circuit, and some measurement instruments. The switches matrix is used to make configuration of experime