Journal articles on the topic 'NETWORK REPORTING SYSTEM'

To see the other types of publications on this topic, follow the link: NETWORK REPORTING SYSTEM.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'NETWORK REPORTING SYSTEM.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Huang, Li-Shing, Tsang-Long Pao, and Jian-Bo Chen. "Network Service Availability Detecting and Reporting System." Advanced Science Letters 9, no. 1 (April 30, 2012): 567–72. http://dx.doi.org/10.1166/asl.2012.2548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mollica, Michelle, Brenda Adjei, Renea Duffin, Elissa Peters, Marguerite Thomas, Thomas Asfeldt, and Kathleen Castro. "Influencing Quality Reporting: Using the Rapid Quality Reporting System in a Community Network." Clinical Journal of Oncology Nursing 21, no. 5 (October 1, 2017): 561–66. http://dx.doi.org/10.1188/17.cjon.561-566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, J. H., G. Z. Nie, and X. Xu. "A digital social network for rapid collection of earthquake disaster information." Natural Hazards and Earth System Sciences 13, no. 2 (February 15, 2013): 385–94. http://dx.doi.org/10.5194/nhess-13-385-2013.

Full text
Abstract:
Abstract. Acquiring disaster information quickly after an earthquake is crucial for disaster and emergency rescue management. This study examines a digital social network – an earthquake disaster information reporting network – for rapid collection of earthquake disaster information. Based on the network, the disaster information rapid collection method is expounded in this paper. The structure and components of the reporting network are introduced. Then the work principles of the reporting network are discussed, in which the rapid collection of disaster information is realised by using Global System for Mobile Communications (GSM) messages to report the disaster information and Geographic information system (GIS) to analyse and extract useful disaster information. This study introduces some key technologies for the work principles, including the methods of mass sending and receiving of SMS for disaster management, the reporting network grouping management method, brief disaster information codes, and the GIS modelling of the reporting network. Finally, a city earthquake disaster information quick reporting system is developed and with the support of this system the reporting network obtained good results in a real earthquake and earthquake drills. This method is a semi-real time disaster information collection method which extends current SMS based method and meets the need of small and some moderate earthquakes.
APA, Harvard, Vancouver, ISO, and other styles
4

Sonkamble, Dr Sulochana, Arnav Kadu, Prithviraj Ghorpade, Om Ingule, and Vineet Dhage. "Criminal Records and Reporting System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6736–43. http://dx.doi.org/10.22214/ijraset.2023.53243.

Full text
Abstract:
Abstract: Long with other technologies, Blockchain has been used in order to produce felonious data record operations in another system. The conception of the exploration is grounded on the confidentiality of felonious data and conservation from the original Police Officers’ perspective. The study aims to contribute to the security protocol of felonious record data through Blockchain. The work focuses on the security protocols and the system armature from both the stoner and device sides. Felonious records are largely sensitive public records. By incorporating felonious records in a blockchain, the authenticity and severity of records can be maintained; which also helps to keep the data safe from adversaries. adding crime rates directly obstruct the growth of any nation thus it's and has always been a primary concern of every nation around the globe to control or maybe have an upper hand on ongoing as well as unborn felonious conditioning. A peer-to-peer pall network enables the decentralization of data. It helps help unlawful changes in the data. This paper introduces a felonious record storehouse system by enforcing blockchain technology to store the data, which helps to attain integrity and security. Low-position culprits, who do the legwork in a felonious association are the most likely to be arrested, whereas the high-position bones tend to avoid attention.
APA, Harvard, Vancouver, ISO, and other styles
5

Frey, Seth D., Mary Frances McAleer, Gary Walker, Rachel Bissonnett Natter, Timothy Edwards, Albert Koong, Joseph M. Herman, et al. "Standardized approach to incident management across a radiation oncology network." Journal of Clinical Oncology 36, no. 30_suppl (October 20, 2018): 235. http://dx.doi.org/10.1200/jco.2018.36.30_suppl.235.

Full text
Abstract:
235 Background: Quality and safety reporting is one of the most important aspects of creating a culture of safety. As part of a multidisciplinary Cancer Network, the Radiation Oncology Division at the lead institution devised an electronic incident reporting system that was implemented at the Network partners to define, standardize, quantify, and trend incidents in the radiation oncology treatment and care process. The purpose of this study is to assess robustness of the system, initial trends seen, and potential to improve quality and safety of the Network practice. Methods: Beginning in January 2017, the incident reporting system at the lead institution was configured to provide inclusion of 13 partnering radiation oncology facilities. Over one year, the organizations were on-boarded and trained on the use of the application. Descriptive analyses of the data from the use of this new reporting system were used in this study. Results: From January 1, 2017 to April 30 2018, a total of 832 incident reports were submitted by 13 different facilities. The average number of days from event submission to resolution was reduced to 10.25 days, compared with up to 60 days before implementation of the new central reporting system. The change in reporting rate was variable across the partner sites following implementation of the new system. The most frequent event types reported included ineffective communication (13%), planning-related problems (5%), incomplete or missing simulation orders (5%), and scheduling error or conflict (4%). Conclusions: Implementation of a centralized reporting system across a network of partner sites has greatly improved the overall reporting process, with reduced event resolution time and increased capability of tracking and trending incidents. By standardizing incident reporting across institutions, there are multiple opportunities to augment a strong culture of safety.
APA, Harvard, Vancouver, ISO, and other styles
6

Botsis, T., R. Ball, and J. Scott. "Simulating adverse event spontaneous reporting systems as preferential attachment networks." Applied Clinical Informatics 05, no. 01 (2014): 206–18. http://dx.doi.org/10.4338/aci-2013-11-ra-0097.

Full text
Abstract:
SummaryBackground: Spontaneous Reporting Systems [SRS] are critical tools in the post-licensure evaluation of medical product safety. Regulatory authorities use a variety of data mining techniques to detect potential safety signals in SRS databases. Assessing the performance of such signal detection procedures requires simulated SRS databases, but simulation strategies proposed to date each have limitations.Objective: We sought to develop a novel SRS simulation strategy based on plausible mechanisms for the growth of databases over time.Methods: We developed a simulation strategy based on the network principle of preferential attachment. We demonstrated how this strategy can be used to create simulations based on specific databases of interest, and provided an example of using such simulations to compare signal detection thresholds for a popular data mining algorithm.Results: The preferential attachment simulations were generally structurally similar to our targeted SRS database, although they had fewer nodes of very high degree. The approach was able to generate signal-free SRS simulations, as well as mimicking specific known true signals. Explorations of different reporting thresholds for the FDA Vaccine Adverse Event Reporting System suggested that using proportional reporting ratio [PRR] > 3.0 may yield better signal detection operating characteristics than the more commonly used PRR > 2.0 threshold.Discussion: The network analytic approach to SRS simulation based on the principle of preferential attachment provides an attractive framework for exploring the performance of safety signal detection algorithms. This approach is potentially more principled and versatile than existing simulation approaches.Conclusion: The utility of network-based SRS simulations needs to be further explored by evaluating other types of simulated signals with a broader range of data mining approaches, and comparing network-based simulations with other simulation strategies where applicable.Citation: Scott J, Botsis T, Ball R. Simulating adverse event spontaneous reporting systems as preferential attachment networks: Application to the Vaccine Adverse Event Reporting System. Appl Clin Inf 2014; 5: 206–218 http://dx.doi.org/10.4338/ACI-2013-11-RA-0097
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Peng, Chi Yun Xu, and Jing Yang. "A Prediction Algorithm of Neural Network Applied in AMC Based on LTE System." Applied Mechanics and Materials 543-547 (March 2014): 2825–27. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2825.

Full text
Abstract:
AMC technology has been widely applied in the LTE system due to its advantages , but the majority methods of AMC algorithm of CQI reporting ignores the influence of time delay error currently. This article first explores the delay effect of the error of CQI reporting and block error rate of the system through the simulation. Aiming at the influence of time delay error, a CQI reporting mechanism based on neural network is presented in this paper and we found this algorithm effectively solves the problems of the existence of time delay error through simulation on the improved basis.
APA, Harvard, Vancouver, ISO, and other styles
8

Daneshgar, Farzad, Kaveh Farokhi Sadabadi, and Ali Haghani. "A Conflation Methodology for Two GIS Roadway Networks and Its Application in Performance Measurements." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 45 (August 24, 2018): 284–93. http://dx.doi.org/10.1177/0361198118793000.

Full text
Abstract:
In the current environment, in which private sector organizations play an ever increasing role in providing traffic data and tend to report data based on proprietary maps, it is inevitable that public sector agencies will want to adapt the spatial data and to use it in their legacy systems. Thus, for the same transportation infrastructures, a variety of GIS roadway datasets based on different highway reference location systems and segmentations are developed. This paper presents a method and a workflow to conflate such networks. The matching process usually involves projecting one network onto another. The first step in this process is to match the typically proprietary private sector network with the public sector legacy network. Different public and private entities may use different location referencing systems for analysis and reporting of data. So, in most cases, it is necessary to transform the spatial data from one location referencing system to another. Geographic information systems (GIS) offer a powerful tool for this purpose. GIS uses standard referencing systems to locate the features in a transportation network. This study proposes a methodology that takes advantage of GIS capabilities in the projection of transportation networks. A workflow is introduced based on the proposed methodology. A tool is created to perform the projection in the ESRI ArcGIS environment. Sanity checks and some reporting options are presented. Results are reported on projecting a subset of the Highway Performance Measurement System (HPMS) used by Maryland State Highway Administration onto the Traffic Message Channel (TMC) network in Maryland.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Ruohao, Jean-Philippe Condomines, and Emmanuel Lochin. "A Multifractal Analysis and Machine Learning Based Intrusion Detection System with an Application in a UAS/RADAR System." Drones 6, no. 1 (January 12, 2022): 21. http://dx.doi.org/10.3390/drones6010021.

Full text
Abstract:
The rapid development of Internet of Things (IoT) technology, together with mobile network technology, has created a never-before-seen world of interconnection, evoking research on how to make it vaster, faster, and safer. To support the ongoing fight against the malicious misuse of networks, in this paper we propose a novel algorithm called AMDES (unmanned aerial system multifractal analysis intrusion detection system) for spoofing attack detection. This novel algorithm is based on both wavelet leader multifractal analysis (WLM) and machine learning (ML) principles. In earlier research on unmanned aerial systems (UAS), intrusion detection systems (IDS) based on multifractal (MF) spectral analysis have been used to provide accurate MF spectrum estimations of network traffic. Such an estimation is then used to detect and characterize flooding anomalies that can be observed in an unmanned aerial vehicle (UAV) network. However, the previous contributions have lacked the consideration of other types of network intrusions commonly observed in UAS networks, such as the man in the middle attack (MITM). In this work, this promising methodology has been accommodated to detect a spoofing attack within a UAS. This methodology highlights a robust approach in terms of false positive performance in detecting intrusions in a UAS location reporting system.
APA, Harvard, Vancouver, ISO, and other styles
10

Castello, Paolo, Carlo Muscas, Paolo Attilio Pegoraro, and Sara Sulis. "Monitoring System Based on Phasor Measurement Units with Variable Reporting Rates." ACTA IMEKO 7, no. 4 (January 9, 2019): 62. http://dx.doi.org/10.21014/acta_imeko.v7i4.585.

Full text
Abstract:
Classical Wide-Area Monitoring Systems (WAMS) are characterized by a hierarchical architecture composed of Phasor Measurement Units (PMUs) and different levels of Phasor Data Concentrators (PDCs). The WAMS, based on synchrophasor technology, was originally designed for transmission systems; nevertheless, with the development of the smart grid paradigm, the benefits of this technology are being extended to the distribution network. Normally, PMUs send measurement data at a high and constant reporting rate to guarantee the monitoring of dynamic events in an electric transmission network. However, the typical communication systems expected to be used by distribution system operators will be generally shared and/or public and, in this case, the bandwidth available among PMUs and PDCs, or among the PDCs and the control centre, is strictly dependent on the type of communication channel used and on the level of network traffic. In this context, a new transmission logic for the transfer of data between PMUs and PDCs, based on the knowledge of the ongoing conditions of the electric grid, can be implemented. The strategy proposed in this paper is to increase the measurement reporting rate only when the electric system changes from a steady-state condition to a dynamic and potentially unsafe one, without modifying the overall accuracy of the PMU measurement process. The risk of losing important information related to a dynamic event is mitigated by sending to the PDC, after the event detection, also measurements relating to pre-trigger time interval in a burst of data packets that allow an insight on the signal evolution.
APA, Harvard, Vancouver, ISO, and other styles
11

Recioui, AEM, Yasser Mokhbi, and Aymen Mecheri. "Wide-Area Network State Monitoring System Based On LoRa Communication." Algerian Journal of Signals and Systems 6, no. 4 (December 31, 2021): 214–19. http://dx.doi.org/10.51485/ajss.v6i4.144.

Full text
Abstract:
To meet the requirements of long range, small amount of data transmission, better data correctnessand less delay,a wide-Area Network State Monitoring System approach based on LoRa communication is discussed in our Project. The objective is to study and test the performance of Two communication techniques used in wide area monitoring system, a single input single output (SISO) system and a multiple input multiple output system (MIMO) in terms ofBit Error Rate(BER) with varying the signal to noise Ratio(SNR).In addition, we study the Wide Area Monitoring system based on LoRa communication. The IEEE 14-bus power system with Phasor Measurement Units(PMUs) placed at selected buses is considered. The simulation results demonstrate that the MIMO system outperform the SISO system in terms of Bit Error Rate. Furthermore, the value of the reporting rate has been varied for both systems in MATLAB to see the effect on the data correctness and the results show that the Bit Error Rate value decreases with the increase of reporting rate.Finally, we dealt with a modified LoRa MATLAB code emulator to investigate the data error and delay. The results show that LoRa Technology has better performance in terms of delay and error.
APA, Harvard, Vancouver, ISO, and other styles
12

Wong, Zoie Shui-Yee, HY So, Belinda SC Kwok, Mavis WS Lai, and David TF Sun. "Medication-rights detection using incident reports: A natural language processing and deep neural network approach." Health Informatics Journal 26, no. 3 (December 10, 2019): 1777–94. http://dx.doi.org/10.1177/1460458219889798.

Full text
Abstract:
Medication errors often occurred due to the breach of medication rights that are the right patient, the right drug, the right time, the right dose and the right route. The aim of this study was to develop a medication-rights detection system using natural language processing and deep neural networks to automate medication-incident identification using free-text incident reports. We assessed the performance of deep neural network models in classifying the Advanced Incident Reporting System reports and compared the models’ performance with that of other common classification methods (including logistic regression, support vector machines and the decision-tree method). We also evaluated the effects on prediction outcomes of several deep neural network model settings, including number of layers, number of neurons and activation regularisation functions. The accuracy of the models was measured at 0.9 or above across model settings and algorithms. The average values obtained for accuracy and area under the curve were 0.940 (standard deviation: 0.011) and 0.911 (standard deviation: 0.019), respectively. It is shown that deep neural network models were more accurate than the other classifiers across all of the tested class labels (including wrong patient, wrong drug, wrong time, wrong dose and wrong route). The deep neural network method outperformed other binary classifiers and our default base case model, and parameter arguments setting generally performed well for the five medication-rights datasets. The medication-rights detection system developed in this study successfully uses a natural language processing and deep-learning approach to classify patient-safety incidents using the Advanced Incident Reporting System reports, which may be transferable to other mandatory and voluntary incident reporting systems worldwide.
APA, Harvard, Vancouver, ISO, and other styles
13

STRUCHEN, R., D. HADORN, F. WOHLFENDER, S. BALMER, S. SÜPTITZ, J. ZINSSTAG, and F. VIAL. "Experiences with a voluntary surveillance system for early detection of equine diseases in Switzerland." Epidemiology and Infection 144, no. 9 (February 5, 2016): 1830–36. http://dx.doi.org/10.1017/s0950268816000091.

Full text
Abstract:
SUMMARYClinical observations made by practitioners and reported using web- and mobile-based technologies may benefit disease surveillance by improving the timeliness of outbreak detection. Equinella is a voluntary electronic reporting and information system established for the early detection of infectious equine diseases in Switzerland. Sentinel veterinary practitioners have been able to report cases of non-notifiable diseases and clinical symptoms to an internet-based platform since November 2013. Telephone interviews were carried out during the first year to understand the motivating and constraining factors affecting voluntary reporting and the use of mobile devices in a sentinel network. We found that non-monetary incentives attract sentinel practitioners; however, insufficient understanding of the reporting system and of its relevance, as well as concerns over the electronic dissemination of health data were identified as potential challenges to sustainable reporting. Many practitioners are not yet aware of the advantages of mobile-based surveillance and may require some time to become accustomed to novel reporting methods. Finally, our study highlights the need for continued information feedback loops within voluntary sentinel networks.
APA, Harvard, Vancouver, ISO, and other styles
14

TAKEOKA, HIDEKI. "The drilling reporting & data base deposit system computer network in japex." Journal of the Japanese Association for Petroleum Technology 54, no. 5 (1989): 401–7. http://dx.doi.org/10.3720/japt.54.401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chu, Po-Ching, Hwan-Ran Fuh, Jiin-Chyuan Luo, Chung-Li Du, Hung-Yi Chuang, How-Ran Guo, Chiu-Shong Liu, et al. "The impact of occupational health service network and reporting system in Taiwan." International Journal of Occupational and Environmental Health 19, no. 4 (October 2013): 352–62. http://dx.doi.org/10.1179/2049396713y.0000000043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Khan, Rafiullah, and Sarmad Ullah Khan. "Design and implementation of an automated network monitoring and reporting back system." Journal of Industrial Information Integration 9 (March 2018): 24–34. http://dx.doi.org/10.1016/j.jii.2017.11.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

K, Saravanan, and V. Mathivananr. "Fibre Optic Infrastructure for Network Deployment Using Application System." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (February 1, 2018): 311. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp311-315.

Full text
Abstract:
Fiber optic has an imperative part in the improvement of media communications framework in Indonesia. Better system execution and nature of the speed that offered by fiber optic can bolster the information prerequisite which keeps on expanding each year. In Indonesia, Fiber Optics is utilized as the essential system foundation Backbone and Access and still keep on developing the fiber optic system in Indonesia. Therefore, the process of reporting, controlling and monitoring are imperative for network deployment of fiber optic network by using an application system to be more efficient and accelerate the decision making process. In this study FOMApps is made, an android based application that facilitates the requirements of monitoring, controlling and reporting the fiber optic project between the Government and fiber optic deployment provider. Specifically, FOMApps incorporate distinctive announcing positions for each sort of employment. The test aftereffects of detailing framework Optical Fiber Cable (Outside Plant) has a speed in conveying the report added up to 257.516 seconds. So from the outcomes that are acquired, the application is plausible for use in detailing the arrangement of Outside Plant Fiber Optic. With the presence of this application, we expect the way toward controlling and checking between the Government and fiber optic organizations suppliers are accomplished.
APA, Harvard, Vancouver, ISO, and other styles
18

KHASHMAN, ADNAN. "BLOOD CELL IDENTIFICATION USING A SIMPLE NEURAL NETWORK." International Journal of Neural Systems 18, no. 05 (October 2008): 453–58. http://dx.doi.org/10.1142/s0129065708001713.

Full text
Abstract:
Classification of blood cell types can be time consuming and susceptible to error due to the different morphological features of the cells. This paper presents a blood cell identification system that simulates a human visual inspection and identification of the three blood cell types. The proposed system uses global pattern averaging to extract cell features, and a neural network to classify the cell type. Two neural networks are investigated and a comparison between these networks is drawn. Experimental results suggest that the proposed system provides fast, simple and efficient identification which can be used in automating laboratory reporting.
APA, Harvard, Vancouver, ISO, and other styles
19

To, Teresa, Susan M. Tarlo, Susan McLimont, Ted Haines, D. Linn Holness, M. Diane Lougheed, Gary M. Liss, and Lisa Cicutto. "Feasibility of a Provincial Voluntary Reporting System for Work-Related Asthma in Ontario." Canadian Respiratory Journal 18, no. 5 (2011): 275–77. http://dx.doi.org/10.1155/2011/541680.

Full text
Abstract:
OBJECTIVE The Ontario Work-Related Asthma Surveillance System: Physician Reporting (OWRAS) Network was established in 2007 to estimate the prevalence of work-related asthma (WRA) in Ontario, and to test the feasibility of collecting data for cases of WRA from physicians voluntarily.METHODS: More than 300 respirologists, occupational medicine physicians, allergists and primary care providers in Ontario were invited to participate in monthly reporting of WRA cases by telephone, postal service or e-mail.RESULTS: Since 2007, 49 physicians have registered with the OWRAS Network and, to date, have reported 34 cases of occupational asthma and 49 cases of work-exacerbated asthma. Highly reactive chemicals were the most frequently reported suspected causative agent of the 108 suspected exposures reported.CONCLUSION: Despite the challenge of enlisting a representative sample of physicians in Ontario willing to report, the OWRAS Network has shown that it is feasible to implement a voluntary reporting system for WRA; however, its long-term sustainability is currently unknown.
APA, Harvard, Vancouver, ISO, and other styles
20

Yu, Yang. "Encryption Technology for Computer Network Data Security Protection." Security and Communication Networks 2022 (August 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/1789222.

Full text
Abstract:
In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect.
APA, Harvard, Vancouver, ISO, and other styles
21

Turner, Claude, Dwight Richards, Ruth Agada, Jie Yan, Rolston Jeremiah, and Thomas Chapman. "LUCID Network Monitoring and Visualization Application." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 8. http://dx.doi.org/10.53735/cisse.v9i1.151.

Full text
Abstract:
This work presents LUCID Network Monitoring and Visualization Application (LNMVA), a comprehensive visualization software application for cyber security visualization. The application consists of five component types: components for monitoring network traffic, components for reporting various network messages, data storage components plus a visualization component and an automated animation reporting component. LNMVA can serve as an aid in teaching complex concepts in cybersecurity or to visually demonstrate active security events on a network to an audience or participants in the classroom or cyber defense competitions at near real-time speed. Its flexibility enables it to visualize different kinds of cybersecurity concepts, protocols and ideas. LNMVA is a sub-system of LUCID, a visualization and broadcasting system that aims to improve understanding and sense-making to participants or an audience. The system is targeted to intermediary or expert users engaged in cyber security exercises. Preliminary results from subject testing show that LNMVA with embodied virtual commentator provided an engaging environment to improve participants’ understanding and sense-making in active security events.
APA, Harvard, Vancouver, ISO, and other styles
22

Saeed, Bilal, Khalil Shahid, and Zeeshan Khan. "Development and Simulation of Next Generation SDH Network Management System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 3 (January 9, 2014): 3361–65. http://dx.doi.org/10.24297/ijct.v12i3.3246.

Full text
Abstract:
In present scenario Network Management System of Next Generation SDH is not performing Offline reporting, offline analysis of alarms, offline performance management and Configurations of network like real time. Any offline configuration of a network when implemented on a real time environment leaves some shortcomings and wrong configuration attributes due to non-availability of Alarms and Performance Management in the presently available offline utility. A simulated platform is developed for implementation of a traffic matrix in an offline environment before implementing over a real time NG SDH Transmission network to reduce the chance of faults or any network disaster.
APA, Harvard, Vancouver, ISO, and other styles
23

Dewan, Shameem A., and Roger E. Smith. "Modifying Local Agency Pavement Management System to Support Governmental Accounting Standards Board 34 Requirements." Transportation Research Record: Journal of the Transportation Research Board 1819, no. 1 (January 2003): 15–23. http://dx.doi.org/10.3141/1819a-04.

Full text
Abstract:
The Metropolitan Transportation Commission pavement management system (MTC PMS) has been used by many cities and counties in the United States for more than 15 years. MTC PMS was evaluated to determine the extent to which the software can support the Governmental Accounting Standards Board (GASB) 34 reporting requirements, established in 1999. A local agency PMS can take information from a pavement network database to produce useful reports, which can be utilized jointly with the information from other assets managed by an agency to support the requirements for a comprehensive asset management system and other reporting requirements. The objective of this study was to elaborate GASB 34 requirements for reporting infrastructure assets, examine the capabilities of MTC PMS in supporting those standard requirements, and recommend any modifications of MTC PMS needed to better support GASB 34. It is evident from the study that MTC PMS has the capability, to some extent, of supporting GASB 34 for reporting on a pavement network according to both the GASB 34 reporting methods: the depreciation method and the modified approach. It partially supports the prerequisites for using the modified approach, which require that the managing agency have an asset management system with certain designated characteristics. Some modifications of MTC PMS software were proposed to make this management system more effective as a tool supporting an asset management system and overall GASB 34 requirements.
APA, Harvard, Vancouver, ISO, and other styles
24

Jalloh, Mohamed F., Paul Sengeh, Nyuma James, Saiku Bah, Mohammad B. Jalloh, Katharine Owen, Samuel Abu Pratt, et al. "Integrated digital system for community engagement and community-based surveillance during the 2014–2016 Ebola outbreak in Sierra Leone: lessons for future health emergencies." BMJ Global Health 5, no. 12 (December 2020): e003936. http://dx.doi.org/10.1136/bmjgh-2020-003936.

Full text
Abstract:
Community engagement and community-based surveillance are essential components of responding to infectious disease outbreaks, but real-time data reporting remains a challenge. In the 2014–2016 Ebola outbreak in Sierra Leone, the Social Mobilisation Action Consortium was formed to scale-up structured, data-driven community engagement. The consortium became operational across all 14 districts and supported an expansive network of 2500 community mobilisers, 6000 faith leaders and 42 partner radio stations. The benefit of a more agile digital reporting system became apparent within few months of implementing paper-based reporting given the need to rapidly use the data to inform the fast-evolving epidemic. In this paper, we aim to document the design, deployment and implementation of a digital reporting system used in six high transmission districts. We highlight lessons learnt from our experience in scaling up the digital reporting system during an unprecedented public health crisis. The lessons learnt from our experience in Sierra Leone have important implications for designing and implementing similar digital reporting systems for community engagement and community-based surveillance during public health emergencies.
APA, Harvard, Vancouver, ISO, and other styles
25

Srivastava, Harshit, Ehsan Sheybani, and Ravi Sankar. "Social Network Anomaly Detection for Optimized Decision Development." International Journal of Interdisciplinary Telecommunications and Networking 14, no. 1 (January 1, 2022): 1–8. http://dx.doi.org/10.4018/ijitn.309697.

Full text
Abstract:
The paper presents the development of systems for improved source selection in a process that creates real-time categorization of events using only posts collected through various sensing applications that use social networks (such as Twitter or other mass dissemination networks) for reporting. The system recognizes critical instances in applications and simply views essential information from users (either by explicit user action or by default, as on Twitter) within the event and provides a textual description. As a result, social networks open up unprecedented possibilities for creating sensing applications by representing a set of tweets generated in a limited timeframe as a weighted network for influence concerning users. Obtaining data from a network of social site users substantiates the quality and dependability of data. It collects many users' dynamic behavior to construct and disseminate related information across the channel. The goal is to find a link between various data sources for event abnormalities.
APA, Harvard, Vancouver, ISO, and other styles
26

Yao, Shuang Liang, and Shuang Tong Wang. "The Research of the Second Class Credit in the Credit System." Advanced Materials Research 989-994 (July 2014): 5209–12. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.5209.

Full text
Abstract:
In order to solve the problem of the second class credit reporting in manual states, we use the system flow diagrams and case diagrams to analysis the needs of users, and use ER diagrams to introduce the SQL database。This article designs the system of the second class credit reporting based on the campus network. The system uses C # as the development language, SQL Server database as a background and Microsoft Visual Studio 2010 as the development environment, with high security and stability.
APA, Harvard, Vancouver, ISO, and other styles
27

Maghfiroh, Sufi Aulia, and Ratna Dwi Wulandari. "EVALUATION OF POSYANDU INFORMATION SYSTEMS USING THE HEALTH METRIC NETWORK MODEL." Indonesian Journal of Public Health 17, no. 3 (November 4, 2022): 439–50. http://dx.doi.org/10.20473/ijph.v17i3.2022.439-450.

Full text
Abstract:
Introduction: Posyandu has an important role in disseminating health information and monitoring the growth and development of infants and toddlers. The information generated serves as a material for consideration of decision-making. In order for the decision-making to be right on target, it is necessary to evaluate the Posyandu recording and reporting system. The purpose of this study is to assess the implementation of the Putra Bangsa Posyandu recording and reporting system in Bojonegoro which is more commonly referred as Posyandu Information System (PIS). Methods: used in this study is a qualitative approach that is presented descriptively using in-depth interviews and observation methods without making any intervention on the target. The Posyandu Information System Assessment uses Health Metrics Network components which are grouped into 3 parts, namely input, process, and output. Result: of the evaluation of the implementation of the Posyandu Information System at Putra Posyandu show that in terms of input the implementation of the Posyandu Information System is not in accordance with the guidelines for implementing the Posyandu Information System. From the aspect of the process it was found that data collection had been carried out routinely, but there was one format that was not yet routine. In terms of output it shows that the data generated are quite complete but not timely. Conclusion: Human Resources (HR) is one of the most dominant factors causing Posyandu Information Systems not to run optimally. The results of this study can help Health Information Management in improving the Posyandu Information System.
APA, Harvard, Vancouver, ISO, and other styles
28

A. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.

Full text
Abstract:
Intrusion detection systems are used for monitoring the network data, analyze them and find the intrusions if any. The major issues with these systems are the time taken for analysis, transfer of bulk data from one part of the network to another, high false positives and adaptability to the future threats. These issues are addressed here by devising a framework for intrusion detection. Here, various types of co-operating agents are distributed in the network for monitoring, analyzing, detecting and reporting. Analysis and detection agents are the mobile agents which are the primary detection modules for detecting intrusions. Their mobility eliminates the transfer of bulk data for processing. An algorithm named territory is proposed to avoid interference of one analysis agent with another one. A communication layout of the analysis and detection module with other modules is depicted. The inter-agent communication reduces the false positives significantly. It also facilitates the identification of distributed types of attacks. The co-ordinator agents log various events and summarize the activities in its network. It also communicates with co-ordinator agents of other networks. The system is highly scalable by increasing the number of various agents if needed. Centralized processing is avoided here to evade single point of failure. We created a prototype and the experiments done gave very promising results showing the effectiveness of the system.
APA, Harvard, Vancouver, ISO, and other styles
29

Gavrylenko, S., O. Babenko, and E. Ignatova. "Development of the disable software reporting system on the basis of the neural network." Journal of Physics: Conference Series 998 (April 2018): 012009. http://dx.doi.org/10.1088/1742-6596/998/1/012009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Subekti, Zaenal Mutaqin, Kresno Murti Prabowo, and Budi . "SISTEM TIKET HELPDESK PADA STMIK BANI SALEH." Jurnal Informasi dan Komputer 10, no. 1 (April 9, 2022): 138–44. http://dx.doi.org/10.35959/jik.v10i1.301.

Full text
Abstract:
reporting problems related to personal computer (PC) damage, intranet or internet network troubles, requesting data on databases, and developing information systems. reporting of problems is still conventional by using the telephone for complaints or coming directly to the puskom/ukisi unit (main computer unit and information system) to provide information on problems or problems, if there is no urgent work, the carving team can immediately solve the problem, so there is no recording of damage or trouble reporting or data requests. The helpdesk ticket system for the stmik Bani Saleh uses method stages starting from requirements, design, implementation, and testing. It is hoped that the implementation of the helpdesk ticket system can make it easier to recap reports on repair work that has been carried out by the carving team, and can be analyzed for damage or problems that often occur
APA, Harvard, Vancouver, ISO, and other styles
31

Ouyang, Chen, Emiko Hatsugai, and Ikuko Shimizu. "Tomato Disease Monitoring System Using Modular Extendable Mobile Robot for Greenhouses: Automatically Reporting Locations of Diseased Tomatoes." Agronomy 12, no. 12 (December 13, 2022): 3160. http://dx.doi.org/10.3390/agronomy12123160.

Full text
Abstract:
Based on the appearance of tomatoes, it is possible to determine whether they are diseased. Detecting diseases early can help the yield losses of tomatoes through timely treatment. However, human visual inspection is expensive in terms of the time and labor required. This paper presents an automatic tomato disease monitoring system using modular and extendable mobile robot we developed in a greenhouse. Our system automatically monitors whether tomatoes are diseased and conveys the specific locations of diseased tomatoes to users based on the location information of the image data collected by the robot, such that users can adopt timely treatment. This system consists of two main parts: a modular, extendable mobile robot that we developed and a server that runs a tomato disease detection program. Our robot is designed to be configured and extended according to the actual height of the tomato vines, thus ensuring that the monitoring range covers most tomatoes. It runs autonomously between two rows of tomato plants and collects the image data. In addition to storing the image data of tomatoes, the data server runs a program for detecting diseases. This program contains a two-level disease detection model: a detection network for detecting diseased tomatoes and a validation network for verifying the detection results. The validation network verifies the results of the detection network by classifying the outputs of the detection network, thus reducing the false positive rate of the proposed system. Experimentally, this work focuses on the blossom-end rot of tomatoes. In this paper, YOLOv5, YOLOv7, Faster R-CNN, and RetinaNet are trained and compared on datasets divided by different conditions. YOLOv5l showed the best results on the randomly divided dataset: the mAP@0.5 reached 90.4%, and the recall reached 85.2%. Through the trained YOLOv5l, a dataset was created for training the classification networks: ResNet, MobileNet, and DenseNet. MobileNetv2 achieved the best overall performance with a 96.7% accuracy and a size of 8.8 MB. The final deployment to the system included YOLOv5l and MobileNetv2. When the confidence threshold of YOLOv5l was set to 0.1, the two-level model’s false positive and false negative rates were 13.3% and 15.2%, respectively. Compared to using YOLOv5l alone, the false positive rate decreased by 5.7% and the false negative rate increased by only 2.3%. The results of the actual operation of the proposed system reveal that the system can inform the user of the locations of diseased tomatoes with a low rate of false positives and false negatives, and that it is an effective and promotable approach.
APA, Harvard, Vancouver, ISO, and other styles
32

Williams, H. R., R. S. Trask, A. C. Knights, E. R. Williams, and I. P. Bond. "Biomimetic reliability strategies for self-healing vascular networks in engineering materials." Journal of The Royal Society Interface 5, no. 24 (November 13, 2007): 735–47. http://dx.doi.org/10.1098/rsif.2007.1251.

Full text
Abstract:
Self-healing via a vascular network is an active research topic, with several recent publications reporting the application and optimization of these systems. This work represents the first consideration of the probable failure modes of a self-healing system as a driver for network design. The critical failure modes of a proposed self-healing system based on a vascular network were identified via a failure modes, effects and criticality analysis and compared to those of the human circulatory system. A range of engineering and biomimetic design concepts to address these critical failure modes is suggested with minimum system mass the overall design driver for high-performance systems. Plant vasculature has been mimicked to propose a segregated network to address the risk of fluid leakage. This approach could allow a network to be segregated into six separate paths with a system mass penalty of only approximately 25%. Fluid flow interconnections that mimic the anastomoses of animal vasculatures can be used within a segregated network to balance the risk of failure by leakage and blockage. These biomimetic approaches define a design space that considers the existing published literature in the context of system reliability.
APA, Harvard, Vancouver, ISO, and other styles
33

Day, Gary E., and Linda South. "Improving the Health System with Performance Reporting – Real Gains or Unnecessary Work?" Asia Pacific Journal of Health Management 11, no. 1 (March 16, 2016): 8–13. http://dx.doi.org/10.24083/apjhm.v11i1.229.

Full text
Abstract:
Aim: This paper will discuss current approaches to performance reporting and whether there are real benefits to healthcare organisations or whether it is a time consuming activity that adds little to improving quality healthcare and organisational performance. Most importantly, this paper will argue that performance reporting will not prevent another major healthcare scandal, such as that seen at Bundaberg Hospital or NHS Mid Staffordshire Trust. The paper will also outline learnings for Australia from other health systems where performance reporting is part of management practice. Approach: While performance reporting is largely designed to increase the efficiency and effectiveness of healthcare organisations, this paper will explore the approach from a practical managerial perspective. Context: This paper explores performance reporting across a range of Australian healthcare organisational settings to highlight differing approaches to improving performance. Main findings: Performance reporting can be an effective tool to improve organisational performance. For performance reporting to be successful, managers and clinicians need to work collaboratively to identify areas for performance improvement and useful measures to address these. Additionally, organisations must choose a meaningful suite of measurements that can help drive performance improvement. Real time performance reporting, such as through performance dashboards, provides managers with the opportunity to make timely, incremental improvements. Finally, performance reporting must be done in a way that does not detract from providing safe, quality patient care. Conclusions: Performance reporting can be a useful management tool for healthcare organisations, however organisations must consider timeliness of performance reporting and select a number of measurements that have impact for their given facilities and avoid the wholesale analysis of data that has little opportunity to improve practice or performance. Abbreviations: LHN – Local Health Network; NEAT – National Emergency Access Targets; NHPA – National Health Performance Authority.
APA, Harvard, Vancouver, ISO, and other styles
34

Simpson, Amy L., Gonzalo R. J. Rada, Beth Visintine, and Jonathan Groeger. "Sampling to Evaluate Performance on the Interstate Highway System." Transportation Research Record: Journal of the Transportation Research Board 2639, no. 1 (January 2017): 20–27. http://dx.doi.org/10.3141/2639-03.

Full text
Abstract:
The Moving Ahead for Progress in the 21st Century Act highlighted the need to monitor the performance of pavement sections over time. An important aspect of performance monitoring is collecting a statistically significant sample of the network so conclusions can be made about changes in performance and types of maintenance and rehabilitation needed for maintaining these assets. This paper reviews the sampling requirements on the Interstate highway system to draw accurate conclusions about the network. Specifically, the paper answers the following questions: Is two-way data collection necessary? Do data have to be collected in more than one lane in a direction? What is the optimum reporting length? For what percentage of the network should data be collected? Should data be collected annually?
APA, Harvard, Vancouver, ISO, and other styles
35

Tong, En, Fei Ding, Zhi Wen Pan, and Xiao Hu You. "Implement an End-to-End User Perception Improved Monitoring and Analyzing System." Applied Mechanics and Materials 644-650 (September 2014): 1023–26. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1023.

Full text
Abstract:
This paper proposes an end-to-end user perception integrated monitoring and analyzing system, the multi-network user perception data by using standard SDK (Software Development Kit), completely solve the terminal abnormal events and the user perception problems. At the same time, in the network layer, integrating and analyzing module to realize the signal filtering and ordering, completely solve the problem of large amount of data and high investment cost of signaling monitoring. The user perception client intelligent analyzed network abnormal event and reported can realize the whole process analysis, and resolve problems of difficult to obtaining customer perception and data reporting in the network management. The monitoring module and making unified analysis of gathered data in background, can realize real-time monitoring of real-time and comprehensive experience of network users, thus get means of improving users' network experience fundamentally.
APA, Harvard, Vancouver, ISO, and other styles
36

Yan, Lian Long, and Sheng Hua Xu. "The Design and Implementation Based on Embedded Tcp/Ip with CAN Protocol Conversion System." Advanced Materials Research 403-408 (November 2011): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2134.

Full text
Abstract:
This paper first analyzed embedded protocol converter system, then the system involved in the TCP/IP data structure ,data reporting format and frame format of CAN protocol was designed, protocol conversion was achieved by defining network interface data structure.
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.

Full text
Abstract:
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Yi Bin, Wei Hu, Ji Xiang Zhang, Zhi Yan Liu, and Wen Ya Liu. "Research on the Investment Evaluation System of Grid Main Network Based on Development Strategy." Applied Mechanics and Materials 556-562 (May 2014): 6391–94. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6391.

Full text
Abstract:
With the increasing investment of power grid enterprise, grid infrastructure projects, especially the main network project investment, has begun to play an increasingly important role. This paper studies the whole life cycle of the main network investment projects, from pre-evaluation, interim evaluation and post-evaluation of the project to set up a complete technical and economic evaluation index system for the investment of the main network projects and achieve the overall project evaluation, making the main grid network investment have a more reasonable basis and get rid of the previous single and imperfect evaluation system of main network investment. Simultaneously, establishing a scientific evaluation system and a database of evaluation index can help to track the main network project investment to achieve more reasonable assessment reporting projects.
APA, Harvard, Vancouver, ISO, and other styles
39

Hsieh, Yung-Hsien, Fang-Rong Hsu, Seng-Tong Dai, Hsin-Ya Huang, Dar-Ren Chen, and Wei-Chung Shia. "Incorporating the Breast Imaging Reporting and Data System Lexicon with a Fully Convolutional Network for Malignancy Detection on Breast Ultrasound." Diagnostics 12, no. 1 (December 28, 2021): 66. http://dx.doi.org/10.3390/diagnostics12010066.

Full text
Abstract:
In this study, we applied semantic segmentation using a fully convolutional deep learning network to identify characteristics of the Breast Imaging Reporting and Data System (BI-RADS) lexicon from breast ultrasound images to facilitate clinical malignancy tumor classification. Among 378 images (204 benign and 174 malignant images) from 189 patients (102 benign breast tumor patients and 87 malignant patients), we identified seven malignant characteristics related to the BI-RADS lexicon in breast ultrasound. The mean accuracy and mean IU of the semantic segmentation were 32.82% and 28.88, respectively. The weighted intersection over union was 85.35%, and the area under the curve was 89.47%, showing better performance than similar semantic segmentation networks, SegNet and U-Net, in the same dataset. Our results suggest that the utilization of a deep learning network in combination with the BI-RADS lexicon can be an important supplemental tool when using ultrasound to diagnose breast malignancy.
APA, Harvard, Vancouver, ISO, and other styles
40

Almasoud, Abdullah M. "UAV-Based Intelligent Transportation System for Emergency Reporting in Coverage Holes of Wireless Networks." Sensors 21, no. 19 (September 24, 2021): 6371. http://dx.doi.org/10.3390/s21196371.

Full text
Abstract:
During critical moments, disaster and accident victims may not be able to request help from the emergency response center. This may happen when the victim’s vehicle is located within a coverage hole in a wireless network. In this paper, we adopt an unmanned aerial vehicle (UAV) to work as an automatic emergency dispatcher for a user in a vehicle facing a critical condition. Given that the UAV is located within a coverage hole and a predetermined critical condition is detected, the UAV becomes airborne and dispatches distress messages to a communication network. We propose to use a path loss map for UAV trajectory design, and we formulate our problem mathematically as an Integer Linear Program (ILP). Our goals are to minimize the distress messages delivery time and the UAV’s mission completion time. Due to the difficulty of obtaining the optimal solution when the scale of the problem is large, we proposed an efficient algorithm that reduces the computational time significantly. We simulate our problem under different scenarios and settings, and study the performance of our proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
41

Wu, Wei, Wei Chen, Yelin Fu, Yishuo Jiang, and George Q. Huang. "Unsupervised neural network-enabled spatial-temporal analytics for data authenticity under environmental smart reporting system." Computers in Industry 141 (October 2022): 103700. http://dx.doi.org/10.1016/j.compind.2022.103700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Teekaraman, Yuvaraja, Hariprasath Manoharan, Ramya Kuppusamy, Shabana Urooj, and Fadwa Alrowais. "Energy efficient multi-hop routing protocol for smart vehicle monitoring using intelligent sensor networks." International Journal of Distributed Sensor Networks 17, no. 12 (December 2021): 155014772110391. http://dx.doi.org/10.1177/15501477211039134.

Full text
Abstract:
This article focuses on intensifying in-vehicle biological wireless sensor networks for the persistence of monitoring the information on a precise vehicle. The wireless sensor networks will have enormous amount of nodules which are interrelated with each other. Therefore, these wireless sensor networks can be installed on a vehicle not only for monitoring perseverance but also for corroborating security with the support of a Global Positioning System expedient. In addition, the projected work focuses on reliable communiqué which is defined in terms of network reliability with discrepancy in reporting rate at each base station. To validate the efficiency of the proposed scheme, the simulation has been abetted using network simulator (NS2) and the outcomes indicate that when the sensors are installed, a robust system can be obtained with improved data transfer between the base stations. Moreover, a fortified in-vehicular sensor can be fixed in each vehicle with minimized path loss.
APA, Harvard, Vancouver, ISO, and other styles
43

Wahyuni, Ullya Mega, and Fitrilina Fitrilina. "Implementasi Client-Server Pada Sistem Informasi Pengolahan Nilai Siswa Menggunakan Object-Oriented Programming." JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER 10, no. 1 (May 30, 2020): 26–32. http://dx.doi.org/10.33369/jamplifier.v10i1.15171.

Full text
Abstract:
ABSTRACTThe use of information technology in educational institutions be necessary for work to be efficient and flexible. The process of reporting student data and assessment results at SMA Negeri 1 Dharmasraya is still manual using paper (paper-based), and there is no specific storage for the database. To make reports on student learning outcomes and share resources easier then an information system was built on a client-server network using object-oriented programming with a centralized database so that the stored data can be organized. The build systems using the System Development Life Cycle waterfall model, which starts from the analysis, design, coding, testing, and maintenance. The results of this study are the establishment of a multiuser system that implements the use of client-server computer networks to process student grades.Key Words: Client-Server, Information Systems, OOP
APA, Harvard, Vancouver, ISO, and other styles
44

Sperry, Megan M., Qawi K. Telesford, Florian Klimm, and Danielle S. Bassett. "Rentian scaling for the measurement of optimal embedding of complex networks into physical space." Journal of Complex Networks 5, no. 2 (August 4, 2016): 199–218. http://dx.doi.org/10.1093/comnet/cnw010.

Full text
Abstract:
The London Underground is one of the largest, oldest and most widely used systems of public transit in the world. Transportation in London is constantly challenged to expand and adapt its system to meet the changing requirements of London’s populace while maintaining a cost-effective and efficient network. Previous studies have described this system using concepts from graph theory, reporting network diagnostics and core–periphery architecture. These studies provide information about the basic structure and efficiency of this network; however, the question of system optimization in the context of evolving demands is seldom investigated. In this paper we examined the cost effectiveness of the topological–physical embedding of the Tube using estimations of the topological dimension, wiring length and Rentian scaling, an isometric scaling relationship between the number of elements and connections in a system. We measured these properties in both two- and three-dimensional embeddings of the networks into Euclidean space, as well as between two time points, and across the densely interconnected core and sparsely interconnected periphery. While the two- and three-dimensional representations of the present-day Tube exhibit Rentian scaling relationships between nodes and edges of the system, the overall network is approximately cost-efficiently embedded into its physical environment in two dimensions, but not in three. We further investigated a notable disparity in the topology of the network’s local core versus its more extended periphery, suggesting an underlying relationship between meso-scale structure and physical embedding. The collective findings from this study, including changes in Rentian scaling over time, provide evidence for differential embedding efficiency in planned versus self-organized networks. These findings suggest that concepts of optimal physical embedding can be applied more broadly to other physical systems whose links are embedded in a well-defined space, and whose topology is constrained by a cost function that minimizes link lengths within that space.
APA, Harvard, Vancouver, ISO, and other styles
45

Zikrillayev, N., K. Ayupov, Z. Mamarajabova, I. Yuldoshev, E. Saitov, and I. Sabitova. "Adaptation and optimization of a photovoltaic system for a country house." E3S Web of Conferences 383 (2023): 04054. http://dx.doi.org/10.1051/e3sconf/202338304054.

Full text
Abstract:
This chapter provides the rationale for monitoring photovoltaic (photovoltaic) systems, its purpose, the need for proper measurement, and the frequency required to obtain meaningful results. The need for system monitoring falls into three groups: user feedback, performance review, and system evaluation. Each group is briefly summarized; other related topics include calibration, data storage, and data transfer. The text covers various monitoring modes such as performance testing, system evaluation, data collection and storage, as well as data analysis and reporting. The evaluation standards given by the International Electrotechnical Commission (IEC) are noted in the Data Analysis and Reporting section. The figures are provided to illustrate several types of displays that are an integral part of monitoring. Optimized modes of operation of the power part of a household photovoltaic system consisting of photovoltaic panels, an MRRT controller, an inverter and an electric energy storage unit, with Autonomous and network connection of the load. To build an optimal and cost-effective energy management strategy, it is necessary to take into account the energy profile of the resident, the characteristics of electricity production based on photovoltaic cells, and the electricity tariff for utilities. A photovoltaic system can be connected to the grid in order to receive energy from the grid or enter it into the network to eliminate the discrepancy between the generated, consumed and stored energy.
APA, Harvard, Vancouver, ISO, and other styles
46

Nurjanah, Yayuk, Pingky Dezar Zulkarnain, Suci Sri Utami Sutjipto, and Shania Gracia. "Pendampingan Pelaporan Pajak Menggunakan E- Filing." Jurnal Abdimas Dedikasi Kesatuan 1, no. 1 (July 27, 2020): 77–84. http://dx.doi.org/10.37641/jadkes.v1i1.1300.

Full text
Abstract:
Ciawi Pratama Tax Service Office (KPP) is an office engaged in taxation for public services with the aim of obtaining revenue in conducting tax reporting activities. The DJPOnline system is an application system built on a web-based basis which was developed as a means where taxpayers can register and report their tax obligations online and can be accessed anywhere. This application is connected in real time with the tax information system that is already running at the Ciawi Pratama Tax Service Office. The purpose of the discussion is to find out tax reporting services andtax reporting procedures online using e-Filing. The purpose oftax reporting online using e-Filing is to assist taxpayers in reporting in real time and can be done anywhere without the need to go to the Tax Service Office.The results of the discussion show that the online tax reporting procedure uses e-Filing to help taxpayers to be able to report their taxes in real time and can be done anywhere without the need to go to the Tax Service Office, with a connected internet network and an active email in the DJPOnline account. . Keywords ; Procedure, Tax Reporting, e-Filing
APA, Harvard, Vancouver, ISO, and other styles
47

Kousar, Shaheen, Nazir Ahmad Zafar, Tariq Ali, Eman H. Alkhammash, and Myriam Hadjouni. "Formal Modeling of IoT-Based Distribution Management System for Smart Grids." Sustainability 14, no. 8 (April 10, 2022): 4499. http://dx.doi.org/10.3390/su14084499.

Full text
Abstract:
The smart grid is characterized as a power system that integrates real-time measurements, bi-directional communication, a two-way flow of electricity, and evolutionary computation. The power distribution system is a fundamental aspect of the electric power system in order to deliver safe, efficient, reliable, and resilient power to consumers. A distribution management system (DMS) begins with the extension of the Supervisory Control and Data Acquisition (SCADA) system through a transmission network beyond the distribution network. These transmission networks oversee the distribution of energy generated at power plants to consumers via a complex system of transformers, substations, transmission lines, and distribution lines. The major challenges that existing distribution management systems are facing, maintaining constant power loads, user profiles, centralized communication, and the malfunctioning of system equipment and monitoring huge amounts of data of millions of micro-transactions, need to be addressed. Substation feeder protection abruptly shuts down power on the whole feeder in the event of a distribution network malfunction, causing service disruption to numerous end-user clients, including industrial, hospital, commercial, and residential users. Although there are already many traditional systems with the integration of smart things at present, there are few studies of those systems reporting runtime errors during their implementation and real-time use. This paper presents the systematic model of a distribution management system comprised of substations, distribution lines, and smart meters with the integration of Internet-of-Things (IoT), Nondeterministic Finite Automata (NFA), Unified Modeling Language (UML), and formal modeling approaches. Non-deterministic finite automata are used for automating the system procedures. UML is used to represent the actors involved in the distribution management system. Formal methods from the perspective of the Vienna Development Method-Specification Language (VDM-SL) are used for modeling the system. The model will be analyzed using the facilities available in the VDM-SL toolbox.
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Jie, and Fang Yi Xia. "Research on the Construction of Financial Accounting Information Systems." Advanced Materials Research 225-226 (April 2011): 628–31. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.628.

Full text
Abstract:
The rapid development of network technology and the increasing maturity of e-commerce technology have integrated the financial accounting information system, originally a single closed system of value stream, into a unified enterprise information management system of logistics and value stream. This paper presents suggestions on how to construct the financial accounting information system: exploring new management mode and implementing management reform; standardizing business processes and establishing a standardized management system; addressing the interface issues between various operation systems to achieve resource sharing; building new financial software systems to achieve real-time reporting of accounting information; establishing financial accounting information management systems to improve the accuracy and reliability of accounting information.
APA, Harvard, Vancouver, ISO, and other styles
49

Yuuki, Okada, Jiangkun Wang, Ogbodo Mark Ikechukwu, and Abderazek Ben Abdallah. "Hardware Acceleration of Convolution Neural Network for AI-Enabled Realtime Biomedical System." SHS Web of Conferences 102 (2021): 04019. http://dx.doi.org/10.1051/shsconf/202110204019.

Full text
Abstract:
COVID-19 is currently on the rage all over the world and has become a pandemic. To efficiently handle it, accurate diagnosis and prompt reporting are essential. The AI-Enabled Real-time Biomedical System (AIRBiS) research project aims to develop a system that handles diagnosis using chest X-ray images. The project is divided into UI, network, software and hardware. This work focuses on the hardware, which uses CNN technology to create a model that determines the presence of pneumonia. This CNN model is designed on an FPGA to speed up diagnostic results. The FPGA increases the flexibility of circuit design, allowing us to optimize the computational processing during data transfer and CNN implementation, reducing the diagnostic measurement time for a single image.
APA, Harvard, Vancouver, ISO, and other styles
50

Kovačić, Barbara, Morana Pavičić, Nikica Mirošević Skvrce, and Siniša Tomić. "The readiness of the spontaneous reporting system for COVID-19 vaccines safety monitoring in Croatia." Acta Pharmaceutica 73, no. 2 (June 1, 2023): 293–310. http://dx.doi.org/10.2478/acph-2023-0029.

Full text
Abstract:
Abstract We aimed to identify whether a spontaneous reporting system (SRS) in Croatia could timely identify and confirm signals for COVID-19 vaccines. Post-marketing spontaneous reports of adverse drug reactions (ADRs) following COVID-19 immunisation reported to the Agency for Medicinal Products and Medical Devices of Croatia (HALMED) were extracted and analysed. 6624 cases reporting 30 655 ADRs following COVID-19 immunisation were received from 27th December 2020 to 31st December 2021. Available data in those cases were compared with data available to the EU network at the time when signals were confirmed and minimisation measures were implemented. 5032 cases, reporting 22 524 ADRs, were assessed as non-serious, and 1,592 cases, reporting 8,131 ADRs as serious. The most reported serious ADRs, which were listed in the MedDRA Important medical events terms list, were syncope (n = 58), arrhythmia (n = 48), pulmonary embolism (n = 45), loss of consciousness (n = 43), and deep vein thrombosis (n = 36). The highest reporting rate had Vaxzevria (0.003), followed by Spikevax and Jcovden (0.002), and Comirnaty (0.001). Potential signals were identified, however, they couldn’t be timely confirmed solely on cases retrieved by SRS. In order to overcome the limitations of SRS, active surveillance and post-authorisation safety studies of vaccines should be implemented in Croatia.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography