Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 3
- Management information systems 3
- systems 2
- Computer-assisted instruction 1
- Data processing 1
- Enterprise application integration (Computer systems) 1
- Geography 1
- Industrial management 1
- Language and languages 1
- Management 1
- Management systems 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- information technology 1
-
1221
A Three-Echelon Healthcare Supply Chain Model for Blood Distribution During Crisis Times
Published 2024-12-01Get full text
Article -
1222
-
1223
Data-Driven Technologies for Energy Optimization in Smart Buildings: A Scoping Review
Published 2025-01-01“…The key technologies identified included big data analytics, Artificial Intelligence, Machine Learning, the Internet of Things, Wireless Sensor Networks, Edge and Cloud Computing, Blockchain, Digital Twins, and Geographic Information Systems. Energy optimization is further achieved through integrating renewable energy resources and advanced energy management systems, such as Home Energy Management Systems and Building Energy Management Systems. …”
Get full text
Article -
1224
Estimation of Soil Erosion Caused by Flash Floods Using MUSLE Method: The Case of Igneada (Kırklareli) Flash Flood (5.9.2023)
Published 2025-01-01“…The model was applied using ArcGIS soil erosion tool based on Geographic Information Systems (GIS). As a result, it was determined that soil erosion caused by flash floods in the Degirmen river basin is mostly in the river valleys in the upper basin where the increase in slope and precipitation is significant, and its effect is in the areas close to the valley floor in the lower basin where deposition increases in the rivers. …”
Get full text
Article -
1225
Interval-Aware Scheduling of Surveillance Drones: Exact and Heuristic Approaches
Published 2025-01-01Get full text
Article -
1226
High-Performance Computational Early Warning Analysis of Agricultural Economy Relying on Binary Fuzzy Cluster Analysis Algorithm
Published 2021-01-01“…Finally, the implementation and maintenance of the cloud-based science and technology agricultural service information system are deployed, and the operational effects of its information system-related functions are demonstrated using prototype design. …”
Get full text
Article -
1227
Susceptibility modeling of hydro-morphological processes considered river topology
Published 2024-12-01Get full text
Article -
1228
Implementing an intrahospital transport preparation (IHT) and management project for critically ill patients: identification of barriers and facilitators using consolidated framewo...
Published 2025-01-01“…These barriers include inadequate training and mobilisation, insufficient information systems, unclear reward and punishment policies, a shortage of labour and material resources and the absence of established reward and punishment laws.Conclusion This study identified the factors influencing the emergency department’s intrahospital transport planning and management project implementation. …”
Get full text
Article -
1229
-
1230
Comparative Analysis of Different Interpolation Methods in Modeling Spatial Distribution of Monthly Precipitation
Published 2018-05-01“…It is the main objective of the study that Geographic Information Systems (GIS) techniques are used to compare widely preferred interpolation methods and to model the spatial distribution of monthly precipitation values for prediction in ungauged areas in Akarcay Sinanpasa and Suhut sub-basins, Turkey. …”
Get full text
Article -
1231
“Arming half-baked people with weapons!” Information enclaving among professionals and the need for a care-centred model for antibiotic use information in Uganda, Tanzania and Mala...
Published 2024-12-01“…We carried out extensive documentary and literature reviews to characterise antibiotic information systems in each setting. Results Participants reported that the general public had been provided information on medicine use in all three countries by national drug authorities, health care providers and in package inserts. …”
Get full text
Article -
1232
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
1233
Drought monitoring of large lakes in Iraq using remote sensing images and normalized difference water index (NDWI)
Published 2025-03-01“…The analysis was based on the Geographic Information Systems (GIS) spatial analyst tool and Landsat images by building and executing a single map algebra expression of NDWI based on Python syntax. …”
Get full text
Article -
1234
Creating Intangible Value through a Corporate Employee Portal
Published 2017-01-01Get full text
Article -
1235
-
1236
Health system barriers to hypertension care in Peru: Rapid assessment to inform organizational-level change.
Published 2024-01-01“…Multiple incompatible health information systems, complicated referral systems, and geographic barriers additionally hinder continuity of care and care seeking. …”
Get full text
Article -
1237
-
1238
-
1239
Assessing Seismic Vulnerability and Pollution Risks of Wastewater Treatment Plants
Published 2024-12-01“…It was distributed to a representative sample of 116 operators over seven (7) months (April–November 2021). Geographical Information Systems (GISs) were employed to visualize the spatial distribution of the seismic vulnerability of WWTPs. …”
Get full text
Article -
1240