-
1521
Implementasi Program Operasional Penyelenggaraan Bimbingan dan Konseling (POP BK) dalam Membentuk Perilaku Moral Religius Siswa SMK NU Ma’arif Kudus
Published 2020-12-01“…Data analysis techniques use the steps of data reduction, data presentation, data reporting and data verification. …”
Get full text
Article -
1522
-
1523
AI Adoption in Business: Opportunities and Challenges for Start-ups
Published 2025-02-01“…The research method used is a qualitative and quantitative approach by collecting data through surveys, interviews, and literature studies. …”
Get full text
Article -
1524
Research on the security governance system for the circulation of government data facing the risk of illegal export
Published 2024-11-01“…Furthermore, it clarifies six typical data circulation methods that require special attention: front-end functional export, front-end interface export, back-end synchronized export, back-end operational export, shared data export, and operational data export. …”
Get full text
Article -
1525
-
1526
Fused access control scheme for sensitive data sharing
Published 2014-08-01“…Additionally, the scheme can prevent legal users operating sensitive data illegally and prohibit privilege abuse for domain user.The results of security analysis and efficiency analysis show that fused access control scheme alleviates the administering burdens on data management server and realizes secure storage and distribution for sensitive data.…”
Get full text
Article -
1527
ANALYTICS AND DATA SCIENCE APPLIED TO THE TRAJECTORY OUTLIER DETECTION
Published 2020-06-01“…This paper aims to develop a module that allows the processing, analysis and deployment of satellite information oriented to the pattern analysis, to find anomalies in the paths of the operators by implementing the algorithm TODS, to be able to help in the decision making. …”
Get full text
Article -
1528
Caractériser les marges de manœuvre offertes aux aides-soignantes en vue de prévenir les troubles musculosquelettiques dans les établissements pour personnes âgées dépendantes...
Published 2024-09-01“…The quantitative approach, based on data from a questionnaire aimed at characterising the perceived offered leeway, partly predicts the actual offered leeway. …”
Get full text
Article -
1529
An Intelligent Self-Validated Sensor System Using Neural Network Technologies and Fuzzy Logic Under Operating Implementation Conditions
Published 2024-12-01“…This article presents an intelligent self-validated sensor system developed for dynamic objects and based on the intelligent sensor concept, which ensures autonomous data collection and real-time analysis while adapting to changing conditions and compensating for errors. …”
Get full text
Article -
1530
Designing a model of effective marketing capabilities based on communication
Published 2025-02-01“…Coding was used in the data analysis of the qualitative part, and SPSS and Lisrel software were used in the quantitative part. …”
Get full text
Article -
1531
-
1532
Competition and distress in banks in India: An application of panel data
Published 2022-12-01“…Lerner’s index of the banks is developed for the competition measurement. A panel data analysis is further performed for regression analysis. …”
Get full text
Article -
1533
Study on Data Modeling and Collection in OSS Based on Hadoop
Published 2015-01-01“…According to the data acquisition and the modeling problem of telecom operators facing in the construction of EDC, the data status and data characteristics in the OSS was analyzed, a modeling method of hierarchical classification of combing theory and data model management idea were proposed, the unification of OSS data collection, sharing the modeling and data concentration were realized. …”
Get full text
Article -
1534
Presentation video analytics systems data in the form of heatmaps
Published 2019-12-01“…Describes the method of presentation video analytics data collected for continues time in the form of heatmaps for analysis of the movement of human flows in accumulation sites. …”
Get full text
Article -
1535
-
1536
THE PRACTICAL CYBERATTACK ON THE DATA TRANSMISSION CHANNEL OF THE DIGITAL SUBSTATION
Published 2022-02-01“…In order to assess the impact of different types of cyber-attacks on the stability of the digital substation, in this work two experimental attacks were made on the simulated data transmission channel. The features of the operation of electrical substations of the new generation, the technology of testing electrical substations with modern software product EDScout from OMICRON, allowing not only to evaluate data streams from technological devices, but also to emit them are shown. …”
Get full text
Article -
1537
A gate driver for IGBT with data acquisition function
Published 2023-03-01“…The paper presents a new type of gate driver for IGBT, which has the function of acquiring the operation state data in addition to traditional gate drive and short-circuit protection functions. …”
Get full text
Article -
1538
Assessing Police Technical Efficiency and the COVID-19 Technological Change from the Pact for Life Perspective
Published 2024-09-01“…This study employs variable returns to scale data envelopment analysis (DEA) and Malmquist productivity index (MPI) models to measure police efficiency and technology changes from 2019 to 2020. …”
Get full text
Article -
1539
-
1540
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article