Showing 1,221 - 1,240 results of 2,197 for search '"information systems"', query time: 0.12s Refine Results
  1. 1221
  2. 1222
  3. 1223

    Data-Driven Technologies for Energy Optimization in Smart Buildings: A Scoping Review by Joy Dalmacio Billanes, Zheng Grace Ma, Bo Nørregaard Jørgensen

    Published 2025-01-01
    “…The key technologies identified included big data analytics, Artificial Intelligence, Machine Learning, the Internet of Things, Wireless Sensor Networks, Edge and Cloud Computing, Blockchain, Digital Twins, and Geographic Information Systems. Energy optimization is further achieved through integrating renewable energy resources and advanced energy management systems, such as Home Energy Management Systems and Building Energy Management Systems. …”
    Get full text
    Article
  4. 1224

    Estimation of Soil Erosion Caused by Flash Floods Using MUSLE Method: The Case of Igneada (Kırklareli) Flash Flood (5.9.2023) by Emre Özşahin, Mikayil Öztürk

    Published 2025-01-01
    “…The model was applied using ArcGIS soil erosion tool based on Geographic Information Systems (GIS). As a result, it was determined that soil erosion caused by flash floods in the Degirmen river basin is mostly in the river valleys in the upper basin where the increase in slope and precipitation is significant, and its effect is in the areas close to the valley floor in the lower basin where deposition increases in the rivers. …”
    Get full text
    Article
  5. 1225
  6. 1226

    High-Performance Computational Early Warning Analysis of Agricultural Economy Relying on Binary Fuzzy Cluster Analysis Algorithm by Fang Tang

    Published 2021-01-01
    “…Finally, the implementation and maintenance of the cloud-based science and technology agricultural service information system are deployed, and the operational effects of its information system-related functions are demonstrated using prototype design. …”
    Get full text
    Article
  7. 1227
  8. 1228

    Implementing an intrahospital transport preparation (IHT) and management project for critically ill patients: identification of barriers and facilitators using consolidated framewo... by Jing Wang, Li Ma, Ying Lu, Baohua Li, Xiaotian Zhang, Rui Xie, Guifen Li, Man Cui, Lanfang Du

    Published 2025-01-01
    “…These barriers include inadequate training and mobilisation, insufficient information systems, unclear reward and punishment policies, a shortage of labour and material resources and the absence of established reward and punishment laws.Conclusion This study identified the factors influencing the emergency department’s intrahospital transport planning and management project implementation. …”
    Get full text
    Article
  9. 1229
  10. 1230

    Comparative Analysis of Different Interpolation Methods in Modeling Spatial Distribution of Monthly Precipitation by Yılmaz İçağa, Emin Taş

    Published 2018-05-01
    “…It is the main objective of the study that Geographic Information Systems (GIS) techniques are used to compare widely preferred interpolation methods and to model the spatial distribution of monthly precipitation values for prediction in ungauged areas in Akarcay Sinanpasa and Suhut sub-basins, Turkey. …”
    Get full text
    Article
  11. 1231

    “Arming half-baked people with weapons!” Information enclaving among professionals and the need for a care-centred model for antibiotic use information in Uganda, Tanzania and Mala... by Susan Nayiga, Eleanor E MacPherson, John Mankhomwa, Fortunata Nasuwa, Raymond Pongolani, Rita Kabuleta, Mike Kesby, Russell Dacombe, Shona Hilton, Delia Grace, Nicholas Feasey, Clare I.R. Chandler

    Published 2024-12-01
    “…We carried out extensive documentary and literature reviews to characterise antibiotic information systems in each setting. Results Participants reported that the general public had been provided information on medicine use in all three countries by national drug authorities, health care providers and in package inserts. …”
    Get full text
    Article
  12. 1232

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  13. 1233

    Drought monitoring of large lakes in Iraq using remote sensing images and normalized difference water index (NDWI) by Mohammed R. Mahmood, Baydaa Ismail Abrahem, Huda J. Jumaah, Hayder A. Alalwan, Malik M. Mohammed

    Published 2025-03-01
    “…The analysis was based on the Geographic Information Systems (GIS) spatial analyst tool and Landsat images by building and executing a single map algebra expression of NDWI based on Python syntax. …”
    Get full text
    Article
  14. 1234
  15. 1235
  16. 1236
  17. 1237
  18. 1238
  19. 1239

    Assessing Seismic Vulnerability and Pollution Risks of Wastewater Treatment Plants by Spyridon K. Golfinopoulos, Ploutarchos N. Kerpelis, Dimitrios E. Alexakis

    Published 2024-12-01
    “…It was distributed to a representative sample of 116 operators over seven (7) months (April–November 2021). Geographical Information Systems (GISs) were employed to visualize the spatial distribution of the seismic vulnerability of WWTPs. …”
    Get full text
    Article
  20. 1240