Showing 1,521 - 1,540 results of 14,865 for search 'Operational data analysis', query time: 0.26s Refine Results
  1. 1521

    Implementasi Program Operasional Penyelenggaraan Bimbingan dan Konseling (POP BK) dalam Membentuk Perilaku Moral Religius Siswa SMK NU Ma’arif Kudus by Ana Faiqoh

    Published 2020-12-01
    “…Data analysis techniques use the steps of data reduction, data presentation, data reporting and data verification. …”
    Get full text
    Article
  2. 1522
  3. 1523

    AI Adoption in Business: Opportunities and Challenges for Start-ups by Dede Irman, Deva Putra

    Published 2025-02-01
    “…The research method used is a qualitative and quantitative approach by collecting data through surveys, interviews, and literature studies. …”
    Get full text
    Article
  4. 1524

    Research on the security governance system for the circulation of government data facing the risk of illegal export by WANG Yue, Mo Lijuan, SU Na

    Published 2024-11-01
    “…Furthermore, it clarifies six typical data circulation methods that require special attention: front-end functional export, front-end interface export, back-end synchronized export, back-end operational export, shared data export, and operational data export. …”
    Get full text
    Article
  5. 1525
  6. 1526

    Fused access control scheme for sensitive data sharing by Xi-xi YAN, Tao GENG

    Published 2014-08-01
    “…Additionally, the scheme can prevent legal users operating sensitive data illegally and prohibit privilege abuse for domain user.The results of security analysis and efficiency analysis show that fused access control scheme alleviates the administering burdens on data management server and realizes secure storage and distribution for sensitive data.…”
    Get full text
    Article
  7. 1527

    ANALYTICS AND DATA SCIENCE APPLIED TO THE TRAJECTORY OUTLIER DETECTION by Alexis J. LOPEZ, Perfecto M. QUINTERO, Ana K. HERNANDEZ

    Published 2020-06-01
    “…This paper aims to develop a module that allows the processing, analysis and deployment of satellite information oriented to the pattern analysis, to find anomalies in the paths of the operators by implementing the algorithm TODS, to be able to help in the decision making. …”
    Get full text
    Article
  8. 1528

    Caractériser les marges de manœuvre offertes aux aides-soignantes en vue de prévenir les troubles musculosquelettiques dans les établissements pour personnes âgées dépendantes... by Sandra Poncet, Sandrine Caroly, Julie Bodin, Yves Roquelaure

    Published 2024-09-01
    “…The quantitative approach, based on data from a questionnaire aimed at characterising the perceived offered leeway, partly predicts the actual offered leeway. …”
    Get full text
    Article
  9. 1529

    An Intelligent Self-Validated Sensor System Using Neural Network Technologies and Fuzzy Logic Under Operating Implementation Conditions by Serhii Vladov, Victoria Vysotska, Valerii Sokurenko, Oleksandr Muzychuk, Lyubomyr Chyrun

    Published 2024-12-01
    “…This article presents an intelligent self-validated sensor system developed for dynamic objects and based on the intelligent sensor concept, which ensures autonomous data collection and real-time analysis while adapting to changing conditions and compensating for errors. …”
    Get full text
    Article
  10. 1530

    Designing a model of effective marketing capabilities based on communication by Yoones Banisaeed, Ghanbar Amirnejad, Morteza mousakhani, Leila Andervazh

    Published 2025-02-01
    “…Coding was used in the data analysis of the qualitative part, and SPSS and Lisrel software were used in the quantitative part. …”
    Get full text
    Article
  11. 1531
  12. 1532

    Competition and distress in banks in India: An application of panel data by Jagjeevan Kanoujiya, Shailesh Rastogi, Venkata Mrudula Bhimavarapu

    Published 2022-12-01
    “…Lerner’s index of the banks is developed for the competition measurement. A panel data analysis is further performed for regression analysis. …”
    Get full text
    Article
  13. 1533

    Study on Data Modeling and Collection in OSS Based on Hadoop by Lei Lei, Jingwen Li, Dapeng Gong, Rui Wang, Lei Su, Ningjiang Chen

    Published 2015-01-01
    “…According to the data acquisition and the modeling problem of telecom operators facing in the construction of EDC, the data status and data characteristics in the OSS was analyzed, a modeling method of hierarchical classification of combing theory and data model management idea were proposed, the unification of OSS data collection, sharing the modeling and data concentration were realized. …”
    Get full text
    Article
  14. 1534

    Presentation video analytics systems data in the form of heatmaps by S. G. Dobrodey, A. V. Borodulya

    Published 2019-12-01
    “…Describes the method of presentation video analytics data collected for continues time in the form of heatmaps for analysis of the movement of human flows in accumulation sites. …”
    Get full text
    Article
  15. 1535
  16. 1536

    THE PRACTICAL CYBERATTACK ON THE DATA TRANSMISSION CHANNEL OF THE DIGITAL SUBSTATION by T. Strebkova, D. Tuchina, P. Zvada

    Published 2022-02-01
    “…In order to assess the impact of different types of cyber-attacks on the stability of the digital substation, in this work two experimental attacks were made on the simulated data transmission channel. The features of the operation of electrical substations of the new generation, the technology of testing electrical substations with modern software product EDScout from OMICRON, allowing not only to evaluate data streams from technological devices, but also to emit them are shown. …”
    Get full text
    Article
  17. 1537

    A gate driver for IGBT with data acquisition function by YANG Lele, CHEN Yanping, DOU Zechun, QI Yu, XIE Shunmeng, WE Haishan

    Published 2023-03-01
    “…The paper presents a new type of gate driver for IGBT, which has the function of acquiring the operation state data in addition to traditional gate drive and short-circuit protection functions. …”
    Get full text
    Article
  18. 1538

    Assessing Police Technical Efficiency and the COVID-19 Technological Change from the Pact for Life Perspective by Isloana Karla de França Barros, Thyago Celso Cavalcante Nepomuceno, Fernando Henrique Taques

    Published 2024-09-01
    “…This study employs variable returns to scale data envelopment analysis (DEA) and Malmquist productivity index (MPI) models to measure police efficiency and technology changes from 2019 to 2020. …”
    Get full text
    Article
  19. 1539
  20. 1540

    Aggregated privacy-preserving auditing for cloud data integrity by Kai HE, Chuan-he HUANG, Xiao-mao WANG, Jing WANG, Jiao-li SHI

    Published 2015-10-01
    “…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
    Get full text
    Article