-
81
Evaluation of Spatial Spillover Effect of Multidimensional Hybrid Financial Risk Contagion Based on the DAI Spatial Econometric Model
Published 2023-01-01“…Multimedia modeling in Health Cloud biometric authentication and data management systems can be applied to the analysis of financial markets. …”
Get full text
Article -
82
Optimizing The Financial Domain With Robotic Process Automation: Invoice Data Extraction
Published 2025-01-01“…This study, conducted on an Indonesian trading organization, reveals how RPA may be used to streamline financial workflows by automating repetitive, time-consuming procedures, minimizing human error, and enhancing data management processes. Keywords: financial domain, robotic process automation, Design Science Research (DSR), data management, invoice formats…”
Get full text
Article -
83
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01“…Academic research and commercial data handling have been marred by scandals, revealing the brittleness of data management. Data is susceptible to undue disclosures, leaks, losses, manipulation, or fabrication. …”
Get full text
Article -
84
Design and implementation of an intelligent sports management system (ISMS) using wireless sensor networks
Published 2025-01-01“…Our proposed ISMS consists of several layers: user interface, business logic layer, data management layer, integration layer, analytics and AI layer, IoT layer, and security layer. …”
Get full text
Article -
85
Designing a Model for Implementing Digital Banking Policy Based on Using Big Data in Iranian Banking Industry
Published 2024-11-01“…According to this model, Big Data Management serves as the main axis around which 13 other themes revolve, acting as the model's center of gravity. …”
Get full text
Article -
86
-
87
Research on Big Data System of Telecom Based on the Hadoop
Published 2013-03-01“…Te1ecom operators are transforming their business mode1 from“voice+SMS+VAS”to“voice+app1ication+traffic”,and they are choosing the mobi1e traffic operation as their key deve1opment strategy.In this scenario,big data is becoming the next frontier for the te1ecom IT support system.A distributed architecture based on Hadoop to provide big data management and services for traffic operation was described,and with the experimenta1 data,demonstration of the outstanding performance of the p1atform was introduced.…”
Get full text
Article -
88
Géohistoire du territoire forestier de l’Avesnois : observer le présent, connaître le passé pour anticiper le futur (France)
Published 2016-12-01“…Ancient maps were converted into workable data using the SyMoGIH method (Modular System for Historical Data Management). It offers the possibility to work at different scales (territory, landscape, place). …”
Get full text
Article -
89
Intent driven Internet of things
Published 2019-09-01“…Intent driven network (IDN) is an emerging network technology.With its advantages in intent translation,closed-loop verification and automate deployment,it has become another revolutionary network technology after software-defined network (SDN).Aiming at the problem of weak scalability,difficult data management and poor security performance in the current development of the Internet of things,the SDN-based intent driven Internet of things was proposed,and the north-south interface and other key technologies were introduced.Aiming at the consistency problem of multi-intention northbound interface,an intentional-conflict decomposition strategy was proposed,which is proved to be effective by simulation.…”
Get full text
Article -
90
Application of Data Quality Management Platform in Inner Mongolia Power Company
Published 2014-01-01“…The data quality management platform was designed and constructed while the data center was building, which could help to realize scientific and effective data management and quality control. In addition, the trusted data could provide reliable decision support for decision makers. …”
Get full text
Article -
91
Research on Satellite Internet Security Simulation Test Technology
Published 2023-06-01“…Aiming at the challenges of continuous evolution of large-scale systems, massive attack data management and control, and flexible implementation of diversified test tasks, a system architecture and technical structure based on software-defined network and cloud platform were proposed.Key technologies such as high-fidelity large-scale network element simulation, high concurrent traffic generation, and dynamic choreography of security service chain based on SDN were studied in depth, and solutions were proposed.The experimental results showed that these three technologies were innovative and could be applied to the construction of the integrated simulation test platform.…”
Get full text
Article -
92
Fused access control scheme for sensitive data sharing
Published 2014-08-01“…Additionally, the scheme can prevent legal users operating sensitive data illegally and prohibit privilege abuse for domain user.The results of security analysis and efficiency analysis show that fused access control scheme alleviates the administering burdens on data management server and realizes secure storage and distribution for sensitive data.…”
Get full text
Article -
93
IFC and Monitoring Database System Based on Graph Data Models
Published 2021-01-01“…In this paper, we address the problem of integrating monitoring data with building information models through the use of the graph data management system and the IFC standard (Industry Foundation Classes) to support the need for interoperability and collaborative work. …”
Get full text
Article -
94
Scaling Up Kangaroo Mother Care Through a Facility Delivery Model in Rural Districts of Pakistan: Protocol for a Mixed Methods Study
Published 2025-01-01“…Ethical considerations and data management are prioritized, to improve KMC coverage and neonatal health outcomes. …”
Get full text
Article -
95
Research progress of human health IoT based on wearable and implantable techniques
Published 2023-06-01“…Monitoring various physiological parameters in healthy people daily life can provide early warning of abnormalities and diseases, as well as reduce the pressure on national public health and medical resources.Hence, it is necessary to develop human health IoT system based on wearable and implantable sensors.The bioinformatics detection based on body fluids and electrical signals as the entry point was used to divide sensing technologies, and the key technologies such as self-powered and near-end communication for human health IoT were introduced for discussion.Finally, the technological progress and industrial application in the field of health data management and disease diagnosis and prevention were explored, and the concept of human health IoT based on wearable and implantable technologies was attempted to be constructed.…”
Get full text
Article -
96
Un General Data Protection Regulation (GDPR) non molto general
Published 2021-06-01“…Anthropological research and social research in general are facing the restrictions and the new data management procedures established by the new European regulation, established in 2018. …”
Get full text
Article -
97
Archiving ethnography? The impossibility and the necessity
Published 2022-03-01“…To adhere strictly to some data management protocols would result in inhumane and I suggest unethical action. …”
Get full text
Article -
98
Review of threat discovery and forensic analysis based on system provenance graph
Published 2022-07-01“…By investigating works of literature related to provenance graph research, a research framework for network threat discovery and forensic analysis based on system-level provenance graph was proposed.A detailed overview of data collection, data management, data query, and visualization methods based on provenance graphs was provided.The rule-based, anomaly-based, and learning-based threat detection classification methods were proposed.Threats based on threat intelligence or based on strategy, technology, and process-driven threats hunting methods were summarized.Forensic analysis methods based on causality, sequence learning, language query and semantic reconstruction in special fields were summarized.Finally, the future research trends were pointed out.…”
Get full text
Article -
99
Iranian L2 Researchers' Perspectives on Research Ethics
Published 2020-01-01“…Finally, the emerging themes were extracted from the responses which showed plagiarism, data management, participant rights, and authorship rights as the most frequent themes discussed by the respondents. …”
Get full text
Article -
100
Implementation strategy of telecom operators’ data lake technology
Published 2019-02-01“…Firstly,the traditional data architecture of telecom operators was analyzed and the problems such as low quality,lack of real-time,lack of flexibility and mutual constraints of storage and application were identified.Then,the feasibility of introducing data lake technology was discussed,the storage scale and low cost of data lake,the originality of data and ease of use,and the application of on-demand modeling were clarified,which could provide great benefits for telecom operators’ data architecture optimization.Finally,the data lake construction plan of unified storage,unified standards,near-source acquisition,and application separation was proposed,and key points such as data lake data partitioning,deployment,lake entry and application data dynamic loading,and unified data management were clearly stated.…”
Get full text
Article