Journal articles on the topic 'Personal computer based management software applications'

To see the other types of publications on this topic, follow the link: Personal computer based management software applications.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Personal computer based management software applications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Xiajin. "Design of Political Online Teaching Based on Artificial Speech Recognition and Deep Learning." Computational Intelligence and Neuroscience 2022 (October 6, 2022): 1–10. http://dx.doi.org/10.1155/2022/3112092.

Full text
Abstract:
With the emergence of the information age, computers have entered the homes of ordinary people and have become essential daily appliances for people. The integration of people and computers has become more popular and in-depth. Based on this situation, how to make computers and humans communicate intelligently and make human-computer interaction more convenient and practical is the main issue of scientific research and discussion on computers. Language recognition is widely used in industry, the economy, commerce, tourism, style, and sports. The BP neural network based on deep learning has supercomputing functions and is very suitable for speech recognition, which promotes the promotion and application of speech recognition technology in many fields. Different types of applications and diverse scenarios enable users to experience different personal experiences. This paper examines the use of application software for ideological and political theory courses in colleges and universities and the application of application software for ideological and political theory courses in colleges and universities in the management of ideological and political theory courses. Analyzed the use of apps in the management of ideological and political theory courses in colleges and universities, analyzed the possibilities and challenges that this brought to the management of ideological and political theory courses in colleges and universities based on the app, and put forward the necessary countermeasures. Including the development and design of ideological and political theory applications, combining deep learning and CTC algorithms to build acoustic models, using server-client interaction, designing an ideological and political theory course app based on speech recognition and deep learning, and forming an offline speech recognition system software platform, the app provides a certain reference for improving the skills of teaching managers.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Jeong Ah, Seung Young Choi, and Rhan Jung. "Agent Based Process Management Environment – Mercury." Journal of Information & Knowledge Management 06, no. 02 (June 2007): 127–37. http://dx.doi.org/10.1142/s0219649207001676.

Full text
Abstract:
In this article, agent based process management model is proposed, which is for the process management of knowledge worker and service workers in order to establish the basis for the new knowledge management system. In this article, we applied several methods from 6-Sigma and personal software process for personal process definition, process execution and process measurement. This study attempts to improve the process execution accuracy through process visualisation and standardisation and to accumulate the base data to improve the process through measuring the process execution. We proposed guidelines and detail procedures for developing three advisor agents for guiding the process definition, process execution and process measurement. We showed the simple case study applied our guidelines.
APA, Harvard, Vancouver, ISO, and other styles
3

Sriskanthan, N., Geok See Ng, Kin Keong Wong, and Keok Kee Lee. "Intelligent Fax Management System." Journal of Information & Knowledge Management 02, no. 03 (September 2003): 279–88. http://dx.doi.org/10.1142/s0219649203000310.

Full text
Abstract:
Fax machines have become a ubiquitous equipment in today's office environment due to its ability to send information around with speed and convenience. Increasingly many personal computers nowadays are able to play the role of a fax machine by adding in a fax card and the relevant software. This paper proposes a Fax Management System employing character recognition technique to enhance the basic capability of a PC-based fax system. The proposed enhancement includes Personal Fax Handling, Automatic Information Retrieval and Order Processing. This enhancement is envisaged to be of significant commercial potential as it addresses certain unfulfilled needs in current PC-based fax systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Qian, and Bowei Feng. "Research on Travel Reimbursement Behavior Management Based on Deep Learning in Financial Sharing Mode." Scientific Programming 2022 (March 22, 2022): 1–12. http://dx.doi.org/10.1155/2022/9769044.

Full text
Abstract:
The standardization, transformation and upgrading of financial management plays an important supporting role in promoting the standardized management and healthy operation of corporate expense reimbursement behaviors. This paper starts with the behavioral portrait of enterprise personnel travel expense reimbursement. Based on the problems of lengthy process and complex financial accounting in most reimbursement behaviors at this stage, an efficient and efficient expense reimbursement processing method is proposed, that is, reimbursement through collection Information images, using the convolutional neural network algorithm under deep learning, to detect target images and identify valid information, and rely on the financial shared service center's screening function of expense reimbursement behavior portraits under big data, the integrity of expense reimbursement data. Compliance is judged, thus forming a complete set of standardized and procedural personal self-service reimbursement model, which optimizes the management of enterprise expense reimbursement behavior, avoids subsequent losses and resource waste caused by human risks, and improves enterprise operation efficiency and expenses. Control has certain value and reference significance.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Maohua. "Risk Management of Prefabricated Building Construction Based on Fuzzy Neural Network." Scientific Programming 2022 (June 3, 2022): 1–10. http://dx.doi.org/10.1155/2022/2420936.

Full text
Abstract:
With the rapid development of society, the risk management of personal health and assets has become an important content that cannot be ignored in all walks of life. With the in-depth advancement of risk management, most of the construction risks of prefabricated buildings adopt qualitative research based on experience and intuitive judgment and quantitative research on quantitative mathematical statistics, but there are few models for risk assessment of prefabricated buildings with dynamic characteristics to adapt to the rapid development of prefabricated buildings and the lack of prefabricated construction in various stages and complex environments, with risk prediction and effective response capabilities. Based on this, this paper attempts to propose a fuzzy neural network risk research method for prefabricated building construction, making full use of the fuzzy neural network’s qualitative knowledge expression and quantitative numerical computing advantages, to establish a set of strong fault tolerance and better adaptive ability: fuzzy neural network evaluation model for extensive prefabricated building construction risk. Through the design of the fuzzy network model structure, the membership vector of the qualitative and quantitative indicators of the fuzzy comprehensive evaluation of the risk of prefabricated building construction is used as the input vector of the neural network, and the evaluation result is used as the output of the neural network. The samples were trained, programmed, and debugged, and it was found that the training results of the samples were in good agreement with the expected output results, which further verified the feasibility and applicability of the fuzzy neural network in the risk assessment process of prefabricated buildings. It is of good guiding significance to conduct continuous observation and formulate effective risk aversion and response plans.
APA, Harvard, Vancouver, ISO, and other styles
6

HEWAGAMAGE, K. PRIYANTHA, MASAHITO HIRAKAWA, and TADAO ICHIKAWA. "SITUATION-DEPENDENT METAPHOR FOR PERSONAL MULTIMEDIA INFORMATION." International Journal of Software Engineering and Knowledge Engineering 09, no. 06 (December 1999): 725–43. http://dx.doi.org/10.1142/s0218194099000383.

Full text
Abstract:
Recently available low-cost personal computers and mechanisms to produce digital data have caused a staggering increase in the amount of multimedia data acquired by the user. Hence, the user's personal information space that consists of a large collection of files, may distribute over a number of computers. Situation-dependent metaphor methodology, described in this paper, provides a novel approach to managing such a collection with respect to the context of user's interactions with data. By considering the mobile computing environment, the physical location, time periods and activities are primarily used in modeling the situation metaphor. Sensors and software agents are used in capturing contextual factors automatically. Situation Space describes the theoretical foundation for the situation metaphor based information organization. We also presents our prototype engineered model, Situated Information Filing and Filtering (SIFF), to demonstrate the situation-dependent data management. The SIFF provides the framework for organizing the personal information and developing applications that require contextual information.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Xuefeng, and Yuan Zong. "Construction and Application Analysis of University Management System Based on Association Rule Mining Algorithm Apriori." Scientific Programming 2022 (March 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/4367267.

Full text
Abstract:
With the rapid development of data mining and dynamic data modeling, this technology has been applied in most groups. In recent years, with the continuous development of the data processing technology, society has entered the digital era. Big data technology is widely used in economics, medicine, computer, and other fields. Based on the development status of the big data technology, an association rule mining algorithm Apriori is proposed to study the characteristics of massive data in a university management system. Combined with the big data discrete dynamic modeling technology, the cloud storage problem in the management system is optimized and improved. Dynamic modeling technology is used to optimize the energy-saving and energy storage functions of the system. Secondly, the Apriori algorithm is used to mine the student achievement data, and the factors affecting the change of student achievement are analyzed. Finally, the running efficiency of the whole university management system is dynamically modeled and analyzed. The results show that the system performance of Apriori algorithm mining has high client compatibility. Association rule algorithm is mainly used in student personality analysis and personal information management, The algorithm used in this paper can optimize the overall performance of the university management system and has certain effectiveness and applicability. It can quickly query the required information under the background of big data and has strong applicability. Dynamic modeling and optimization of the storage system can also improve the utilization of the storage system.
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Wenjuan, Ping Han, and Shaohua Pei. "Mathematical Model Construction of Network Computer Test Automation System for College English Teaching." Scientific Programming 2022 (May 9, 2022): 1–10. http://dx.doi.org/10.1155/2022/4769951.

Full text
Abstract:
Networked education represents a development direction of educational reform, has become a feature of modern education, and has formed a new impetus to the development of education. The change from paper-and-pencil examinations to computer network-based machine examinations is not only a reform of the content and form of the University English Level 4 and 6 examinations, but also a reflection of the reform of the comprehensive assessment system and teaching philosophy of University English teaching. Promoting the development and construction of online college English examination systems in universities, applying machine examinations to various types of tests and formal examinations for college English teaching, and updating the college English question bank through continuous accumulation of professional teachers will have very high research value and practical value in improving the quality of examinations and promoting the standardization of college English examinations. In order to show the individualized chemistry report simultaneously, it is necessary to further ask relevant subject experts, educational measurement experts, and front-line teachers to expand the question attributes; that is, the question attributes extend to module specific knowledge points, cognitive levels, and information literacy ability levels, while most of the pages are combined with Ajax technology to reduce hardware resource dependency and optimize software performance. The paper analyzes the requirements analysis and overall design of the online college English examination system, including the design objectives, design principles, functional design, core algorithm design, architecture design, database design, and security design. The main functions of the online college English examination system, such as personal information management, question bank information management, test paper grouping management, online examination management, paper marking management, and system setting management, are discussed in detail. The main functions of the system, such as personal information management, question bank information management, test paper grouping management, online test management, mark and approve management, and system setting management, are discussed in detail, and the performance test and some function test of the system are also briefly discussed. The whole research process involves the identification of test questions and their attributes in the construction of the question bank, the construction of the adaptive test system, the comprehensive analysis of the mock test results, and the thinking about the application of the high school adaptive academic level test.
APA, Harvard, Vancouver, ISO, and other styles
9

Tahat, Ashraf A. "Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System." International Journal of Telemedicine and Applications 2009 (2009): 1–7. http://dx.doi.org/10.1155/2009/859232.

Full text
Abstract:
A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Lei, Miltos Ladikas, Guangxi He, Julia Hahn, and Jens Schippl. "A multi-sided market of personal data resource allocation: An empirical study of China’s car-hailing platform." Competition and Regulation in Network Industries 22, no. 3-4 (September 2021): 189–211. http://dx.doi.org/10.1177/17835917211051223.

Full text
Abstract:
The current rapid development of online car-hailing services creates a serious challenge to the existing paradigm of market governance and antitrust policy. However, the debate on the market structure of the car-hailing platform requires more empirical evidence to uncover its functions. This research adopts an interdisciplinary methodology based on computer science and economics, and including software reverse engineering tools applied to the interoperability of the terminal application and resource allocation model, to demonstrate the topological market structure of personal data resources allocation in China’s car-hailing industry. Within the discussion of the hybrid nature of technology and economy, the analysis results clearly show that China’s car-hailing platform services present a multi-sided market structure when seen from the perspective of personal data resource allocation. Personal data resource (PDR), that is considered an essential market resource, is applied as an asset transferred unhindered between platforms via the application programming interface, and thus, creating a new market allocation mechanism. The connection between the car-hailing platforms and social media platforms is an essential aspect of the market competition in the domain. As applications of online platforms increase in the global context, this research offers a new perspective in personal data resource allocation with implications for the governance of the platform economy.
APA, Harvard, Vancouver, ISO, and other styles
11

Wu, Yu En, Kuo Chan Huang, and Chih Lung Shen. "Application of Embedded System in Energy Management System." Advanced Materials Research 875-877 (February 2014): 1949–53. http://dx.doi.org/10.4028/www.scientific.net/amr.875-877.1949.

Full text
Abstract:
In this paper, a custom-made energy management system based on embedded system with a touch panel/LCD/FPGA and microprocessor is implemented, it not only solve the problem of energy waste, control scattered energy supply and saving, but also generate a user-friendly control platform. The life of the proposed system is also longer than an EMS with personal computer. In the proposed embedded EMS, a simulation of FPGA is firstly designed and processed with the control circuit of touch panel, RENESASs micro-processor, and communication panels of ZIGBEE and CAN BUS to constitute the system hardware. Analysis and allocation of energy is then done to complete the software design. Finally, experimental results are used to verify the feasibility and reliability of the proposed EMS.
APA, Harvard, Vancouver, ISO, and other styles
12

Qilin, Wang, and Zhao Yue. "Automation Design and Organization Innovation of Manufacturing Enterprises Based on the Internet of Things." Scientific Programming 2022 (August 16, 2022): 1–12. http://dx.doi.org/10.1155/2022/8729731.

Full text
Abstract:
The Internet of Things manufacturing technology is an important symbol for measuring the level of a country’s scientific and technological development. Enterprises that apply the Internet of Things manufacturing technology represent the level of a country’s industrial development to a large extent. However, the introduction of IoT manufacturing technology will not automatically generate benefits. It needs to be matched with a suitable organizational structure to maximize the advantages of IoT manufacturing technology. The enterprise organization structure has always been the focus of enterprise organization research and management research. From the linear system to the network organization, the innovation of enterprise organizational structure has never stopped. Therefore, the research on the organizational structure innovation of IoT manufacturing technology enterprises has strong theoretical and practical significance. This study conducted an empirical study on the impact of organizational innovation climate and individual innovation behavior on organizational structure innovation in IoT manufacturing technology enterprises in the form of a questionnaire survey. The structural equation model of organizational innovation climate and personal innovation behavior is proposed, the data and questionnaires are statistically and factorially analyzed by software such as SPSS 18.0 and AMOS 7.0, and the hypothesized structural equation model is verified.
APA, Harvard, Vancouver, ISO, and other styles
13

Akinola, Olubunmi Adewale, Sikiru Olatunde Olopade, and Akindele Segun Afolabi. "Development of mobile and desktop applications for a fingerprint-based attendance management system." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 1 (October 1, 2021): 570. http://dx.doi.org/10.11591/ijeecs.v24.i1.pp570-580.

Full text
Abstract:
Mobile application technology has been at the forefront of technological advancement in recent years. This has made life easier, and tasks that were considered herculean have been made easier and executable in a much shorter time than ever. One of such tasks is the process of taking attendance during events (such as lectures and conferences) by scribbling one’s signature and other personal details on a central register. This manual process is cumbersome and inconvenient, especially when a large number of participants are involved. To address this problem, this paper presents an automated solution in which a Java-based mobile application was developed and connected wirelessly to a central database that was created using My structured query language (MySQL) application whose task, among others, was to record attendance information. The database was connected to the backend of the web-based software program which was coded in hypertext pre-processor (PHP) programming language. Authentication was achieved through username, password, and fingerprint information. The system was deployedin a university to log students’ details, time absent, time present and cumulative attendances per month and it was realised that the system was highly effective, efficient and 5 times faster than the conventional paper-based attendance logging technique.
APA, Harvard, Vancouver, ISO, and other styles
14

AKPABIO, Iniobong Aniefiok, Glory Emmanuel EDET, and Joan Ekpo CYRIL. "UNDERLYING FACTORS AFFECTING UTILIZATION OF COMPUTER – BASED INTERNET TECHNOLOGIES BY AGRICULTURAL EXTENSION PERSONNEL IN AKWA IBOM, NIGER DELTA, NIGERIA." International Journal of Research -GRANTHAALAYAH 9, no. 1 (February 13, 2021): 399–50. http://dx.doi.org/10.29121/granthaalayah.v9.i1.2021.3143.

Full text
Abstract:
The study sought to examine factors affecting utilization of Computer Based Internet Technologies (CBIT) by extension personnel in Akwa Ibom State, Nigeria. Relevant data were obtained from 180 respondents, while data analyses were achieved with the aid of descriptive and inferential statistical tools. Findings showed that 57.8 % of the respondents were male, 91.7% were married, with a mean age of 43years, while 62.8% respondents had no formal computer training. It was also revealed that, of the nine surveyed CBIT facilities and applications, only mobile phones were highly utilized, while I-pads/laptops and YouTube were the least utilized. It was also revealed that 62.8% respondents indicated that they had a low level of CBIT utilization, while level of CBIT utilisation was found to be influenced by financial, training, policy/personal barriers, social, technical and management factors. Results of tested hypotheses revealed that CBIT utilisation was not influenced by respondents’ personal characteristics, and no significant difference was observed in terms of level of CBIT utilization between field extension personnel (FEP) and supervisory extension personnel (SEP). It was concluded that extension personnel are constrained from using CBIT due to the prohibitive cost of CBIT software and maintenance, inappropriate infrastructure and lack of access to training opportunities. It is recommended, among others, that policy makers should facilitate the evolution of appropriate CBIT policies to enhance access to appropriate tools by extension personnel.
APA, Harvard, Vancouver, ISO, and other styles
15

Schmalstieg, Dieter, Anton Fuhrmann, Gerd Hesina, Zsolt Szalavári, L. Miguel Encarnação, Michael Gervautz, and Werner Purgathofer. "The Studierstube Augmented Reality Project." Presence: Teleoperators and Virtual Environments 11, no. 1 (February 2002): 33–54. http://dx.doi.org/10.1162/105474602317343640.

Full text
Abstract:
Our starting point for developing the Studierstube system was the belief that augmented reality, the less obtrusive cousin of virtual reality, has a better chance of becoming a viable user interface for applications requiring manipulation of complex three-dimensional information as a daily routine. In essence, we are searching for a 3-D user interface metaphor as powerful as the desktop metaphor for 2-D. At the heart of the Studierstube system, collaborative augmented reality is used to embed computer-generated images into the real work environment. In the first part of this paper, we review the user interface of the initial Studierstube system, in particular the implementation of collaborative augmented reality, and the Personal Interaction Panel, a two-handed interface for interaction with the system. In the second part, an extended Studierstube system based on a heterogeneous distributed architecture is presented. This system allows the user to combine multiple approaches— augmented reality, projection displays, and ubiquitous computing—to the interface as needed. The environment is controlled by the Personal Interaction Panel, a twohanded, pen-and-pad interface that has versatile uses for interacting with the virtual environment. Studierstube also borrows elements from the desktop, such as multitasking and multi-windowing. The resulting software architecture is a user interface management system for complex augmented reality applications. The presentation is complemented by selected application examples.
APA, Harvard, Vancouver, ISO, and other styles
16

Fu, Weiyu, and Lixia Wang. "Software Security Testing through Coverage in Deep Neural Networks." Security and Communication Networks 2022 (August 31, 2022): 1–7. http://dx.doi.org/10.1155/2022/2834982.

Full text
Abstract:
With the continuous progress of society, computer technology and information technology are also experiencing rapid development. Especially in recent years, the application of computer technology has rapidly entered into people's daily life. As people’s lives become richer, these applications have become particularly complex. For some large software, tens of thousands of function points or millions of lines of source code may be triggered to support it when performing related tasks. As a result, the security of such a complicated and excellent software becomes quite essential. The most effective way to ensure software security is to test the security of software products during the development process. A precise and effective security testing process is the basis for ensuring that software is tested for security. Without a detailed scientific software security testing model to guide software development for security testing, software security testing will become very difficult. This not only wastes more time and money but also does not guarantee the security of the software. A great security testing methodology should be able to find security problems that may be hidden deep within the software. In addition, a scientific process management can greatly facilitate the implementation of software security testing. As a result, it is relatively meaningful to establish a complete software security testing process model, generate excellent security test cases, and develop security process management tools for software security testing. At the same time, in recent years, deep learning has gradually entered more and more people's lives. However, the widespread application of deep learning systems can bring convenience to human life but also bring some hidden dangers. Hence, deep neural networks must be adequately tested to eliminate as many security risks as possible in some safety-critical software that involves personal and property safety. As the foundation of deep learning systems, deep neural networks should be adequately tested for security. However, deep learning systems are fundamentally different from traditional software testing, so traditional software testing techniques cannot be directly applied to deep neural network testing. In recent years, many scholars in related fields have proposed coverage guidelines based on deep learning testing, but the usefulness of these guidelines is still debatable. Based on the complexity of the large software development process and the fact that the interrelationship between nodes often constitutes a complex network of collaborative relationships, this study applies coverage-based testing in deep neural networks to test the security of software. To be specific, this research applies metrics such as peak coverage, speed to peak, and computational speed to evaluate coverage criteria and to investigate the feasibility of using coverage to guide test case selection to select solutions for security testing.
APA, Harvard, Vancouver, ISO, and other styles
17

Wali, Muhammad, and Lukman Ahmad. "Computer Assisted Learning (CAL): A Learning Support System Solution." Webology 18, no. 1 (April 29, 2021): 299–314. http://dx.doi.org/10.14704/web/v18i1/web18090.

Full text
Abstract:
This study tries to provide a solution by engineering existing information re-sources, designing it into a support system to facilitate lecturers or teaching staff to create, load and present multimedia teaching materials, both to groups and personal, network-based or stand-alone. The use of HTML language as a basis for web-based applications and the use of local networks can make Computer Assisted Learning more flexible and have unlimited functions on the architecture de-signed by researchers to use the function data methods as a data framework stored by CAL. Broadly speaking, this research is divided into three stages, namely pre-development data collection, development and implementation, and post-development data collection. Pre-development data collection is intended to obtain a preliminary study of the core problems being faced, while the development and implementation phase focuses on modeling software design into diagrams and making programming code to implement the design that has been made. While the stages of post-development data collection are for the improvement of applications made, drawing conclusions, and suggestions for further re-search topics. From the results of this study, several conclusions were obtained, the CAL that was built made it easier for students in learning and CAL was built by utilizing HTML Sheets as a medium for presentation of teaching material because it was very effective for displaying teaching materials in the form of text, images, animation, audio, and video.
APA, Harvard, Vancouver, ISO, and other styles
18

Hölzl, Michael, Endalkachew Asnake, Rene Mayrhofer, and Michael Roland. "A password-authenticated secure channel for App to Java Card applet communication." International Journal of Pervasive Computing and Communications 11, no. 4 (November 2, 2015): 374–97. http://dx.doi.org/10.1108/ijpcc-09-2015-0032.

Full text
Abstract:
Purpose – The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever. Design/methodology/approach – A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications. Findings – To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time. Originality/value – By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.
APA, Harvard, Vancouver, ISO, and other styles
19

Ai, Li. "Artificial Intelligence System for College Students’ Physical Fitness and Health Management Based on Physical Measurement Big Data." Wireless Communications and Mobile Computing 2021 (September 20, 2021): 1–10. http://dx.doi.org/10.1155/2021/4727340.

Full text
Abstract:
Most of the current health management products are used in medical institutions and generally do not pay enough attention to the student population. Based on this, this paper designs a student-oriented and functional autonomous health management system. This paper proposes a personal health management system based on a multidimensional data model based on the main social characteristics of the population with chronic diseases and the actual needs of personal health management for chronic diseases. The value of various health data for health management is deeply analyzed and mined, and a multidimensional model data warehouse is constructed according to relevant national health data standards to create a standard data platform for intelligent health warning and disease risk assessment. This paper researches and designs a closed-loop personal health management method based on the Plan-Do-Check-Action (PDCA) cycle management model, with detailed functional design in four aspects: health data collection and recording, health assessment, health planning, and tracking and execution. This paper researches health data collection, processing, and storage technologies and adopts HDFS data storage technology, html, css, Java Script, java, and other software development technologies, combined with j Query, UEditor, Date Range Picker, and other plug-ins, as well as SMS email generation interface, wireless Bluetooth transmission interface, etc. This system web and mobile application platforms are designed and developed. Relational database is used as the system database, and a snowflake-type multidimensional data model is designed. Finally, the functions and performance of this system were tested, and the development and trial run of the basic version have been completed.
APA, Harvard, Vancouver, ISO, and other styles
20

Ahmed, Zeeshan, Saman Zeeshan, Pauline Fleischmann, Wolfgang Rössler, and Thomas Dandekar. "Ant-App-DB: a smart solution for monitoring arthropods activities, experimental data management and solar calculations without GPS in behavioral field studies." F1000Research 3 (December 19, 2014): 311. http://dx.doi.org/10.12688/f1000research.5931.1.

Full text
Abstract:
Field studies on arthropod ecology and behaviour require simple and robust monitoring tools, preferably with direct access to an integrated database. We have developed and here present a database tool allowing smart-phone based monitoring of arthropods. This smart phone application provides an easy solution to collect, manage and process the data in the field which has been a very difficult task for field biologists using traditional methods. To monitor our example species, the desert ant Cataglyphis fortis, we considered behavior, nest search runs, feeding habits and path segmentations including detailed information on solar position and Azimuth calculation, ant orientation and time of day. For this we established a user friendly database system integrating the Ant-App-DB with a smart phone and tablet application, combining experimental data manipulation with data management and providing solar position and timing estimations without any GPS or GIS system. Moreover, the new desktop application Dataplus allows efficient data extraction and conversion from smart phone application to personal computers, for further ecological data analysis and sharing. All features, software code and database as well as Dataplus application are made available completely free of charge and sufficiently generic to be easily adapted to other field monitoring studies on arthropods or other migratory organisms. The software applications Ant-App-DB and Dataplus described here are developed using the Android SDK, Java, XML, C# and SQLite Database
APA, Harvard, Vancouver, ISO, and other styles
21

Ahmed, Zeeshan, Saman Zeeshan, Pauline Fleischmann, Wolfgang Rössler, and Thomas Dandekar. "Ant-App-DB: a smart solution for monitoring arthropods activities, experimental data management and solar calculations without GPS in behavioral field studies." F1000Research 3 (April 10, 2015): 311. http://dx.doi.org/10.12688/f1000research.5931.2.

Full text
Abstract:
Field studies on arthropod ecology and behaviour require simple and robust monitoring tools, preferably with direct access to an integrated database. We have developed and here present a database tool allowing smart-phone based monitoring of arthropods. This smart phone application provides an easy solution to collect, manage and process the data in the field which has been a very difficult task for field biologists using traditional methods. To monitor our example species, the desert ant Cataglyphis fortis, we considered behavior, nest search runs, feeding habits and path segmentations including detailed information on solar position and Azimuth calculation, ant orientation and time of day. For this we established a user friendly database system integrating the Ant-App-DB with a smart phone and tablet application, combining experimental data manipulation with data management and providing solar position and timing estimations without any GPS or GIS system. Moreover, the new desktop application Dataplus allows efficient data extraction and conversion from smart phone application to personal computers, for further ecological data analysis and sharing. All features, software code and database as well as Dataplus application are made available completely free of charge and sufficiently generic to be easily adapted to other field monitoring studies on arthropods or other migratory organisms. The software applications Ant-App-DB and Dataplus described here are developed using the Android SDK, Java, XML, C# and SQLite Database.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Hang Wei, and Jian Feng Huang. "Development of Retrieve/Storage Cabinets for Chemical Reagents." Applied Mechanics and Materials 577 (July 2014): 457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.577.457.

Full text
Abstract:
To integrate chemical reagent retrieve/storage (R/S) device with management information system, an intelligent mechatronic system is developed. Three kinds of unit cabinets for reagent bottles are constructed. A Single-chip Microcomputer and a Personal Computer are served as a slave and host control system respectively. A set of special application software is programmed by VC++ and Access to accomplish reagent retrieve/storage, usage reports and surplus warning by short massage based on the Internet of Things. The integration of chemical reagent R/S device with MIS is realized which could make the storage device automation, data visualization and measurement precision.
APA, Harvard, Vancouver, ISO, and other styles
23

Meng, Xiangbin. "Design and Implementation of Electrical Parameter Monitoring System Based on ZigBee Wireless Communication." Mobile Information Systems 2022 (March 19, 2022): 1–12. http://dx.doi.org/10.1155/2022/4189774.

Full text
Abstract:
In order to solve the problems of many lines, troublesome movement and redundant management of traditional electrical parameter monitoring system, a design and implementation of electrical parameter monitoring system based on ZigBee wireless communication is proposed. Taking the monitor as an example, this paper briefly introduces the application status of the monitor monitoring system and electrical safety detection. According to the comparison of wireless communication technology and the analysis of actual demand, this paper expounds the advantages of ZigBee wireless technology. Based on the combination of received signal strength indication (RSSI) ranging algorithm and trilateral positioning algorithm, the wireless positioning of mobile targets is realized. Then, the sparse correlation matrix of signal attenuation coefficient between base stations is established in the upper computer to optimize the positioning by using the look-up table method. The relevant test results show that through the serial port test software 2000 times of data transmission and reception, 1866 times of communication are successful, and the success rate is 93.3%, which basically meets the requirements of data transmission stability; After data transmission time detection, it takes about 1.4 seconds to send data from the monitor to the client for reception. The client sends the module query command, and the time when the command reaches the monitor is 1.6 seconds. The data transmission speed can basically meet the requirements of real-time monitoring. The design and implementation of the monitoring system can not only help to reduce the workload of medical staff in hospital nurse stations and improve their work efficiency, but also provide the possibility of practical significance for developing into an application tool for patient family members or personal health management in the future.
APA, Harvard, Vancouver, ISO, and other styles
24

Magomedov, S. G., P. V. Kolyasnikov, and E. V. Nikulchev. "Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface." Russian Technological Journal 8, no. 6 (December 18, 2020): 34–46. http://dx.doi.org/10.32362/2500-316x-2020-8-6-34-46.

Full text
Abstract:
The paper addresses the development of technology for controlling access to digital portals and platforms based on assessments of personal characteristics of user behavior built into the interface. In distributed digital platforms and portals using personal data, big data is collected and processed using specialized applications using computer networks. In accordance with the law, the data is stored on internal corporate servers and data centers. Special attention is paid to the tasks of differentiation and control of access in modern information systems. Wide availability and mass scale of services should be accompanied by more careful control and user verification. Access control to such systems cannot be ensured only through technologies and information security tools; efficiency can be increased through software and hardware architectural solutions. The paper proposes to expand the currently developing SIEM technology (Security information and event management), which combines the concept of security event management and information security management, with blocks of user behavior analysis. As a characteristic that can be measured without overloading communication channels and is independent of the type of device used, the psychomotor reaction time is proposed, measured as the performance of actions with the interface. A technological solution has been developed for implementation in a wide range of digital platforms: banking, medical, educational, etc. The results of experimental research using a digital platform of mass psychological research are presented. For the research, data from a mass survey were used when answering (in the form of a choice from the available options) to questions about the level of education. Analysis of the reaction time data showed the possibility of standardization and the same indicators of specific users when answering different questions.
APA, Harvard, Vancouver, ISO, and other styles
25

Agrawal, Vinayak, and Shashikala Tapaswi. "Forensic analysis of Google Allo messenger on Android platform." Information & Computer Security 27, no. 1 (March 11, 2019): 62–80. http://dx.doi.org/10.1108/ics-03-2017-0011.

Full text
Abstract:
Purpose The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts. Design/methodology/approach Logical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted. Findings Forensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory. Research limitations/implications As this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications. Practical implications Most of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation. Originality/value This is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Jian Qun, Ji Rong Wu, and Dong Xu. "Design of Embedded Numerical Control Platform for Carton Samplemaker." Advanced Materials Research 139-141 (October 2010): 2234–38. http://dx.doi.org/10.4028/www.scientific.net/amr.139-141.2234.

Full text
Abstract:
As most controllers of the carton samplemaker using Industrial Personal Computer (IPC) architecture, its price is relatively expensive. Aiming at the actual situation of the high cost, low openness and big demand of the carton samplemaker, through the analysis of the control characteristics of it, the embedded Numerical Control (NC) platform based on the Advanced RISC Machines (ARM) and Digital Signal Processor (DSP) hardware architecture for carton samplemaker is designed. The overall framework of the platform and steps of the design are given in this paper. Windows CE embedded real-time operating system is adopted in the software design, and on this basis, the carton samplemaker applications is developed, which is mainly in charge of the motion control of the equipment and tasks management. The platform not only achieves the goals on real-time control, good speed and accuracy, but also has friendly operability. Finally, the introduction of the new dual-core chips gives a revelation on the future development in carton samplemaker.
APA, Harvard, Vancouver, ISO, and other styles
27

Roslan, Nurul Nabilah, Muhammad Nabil Fikri Jamaluddin, Alif Faisal Ibrahim, Shukor Sanim Mohd Fauzi, Tajul Rosli Razak, and Ray Adderley JM Gining. "iNutritionApp: Mobile Application for Nutrition Monitoring using FatSecret API." Journal of Computing Research and Innovation 6, no. 2 (September 1, 2021): 119–27. http://dx.doi.org/10.24191/jcrinn.v6i2.212.

Full text
Abstract:
Mobile application is a software designed to run on smartphones, tablet computers, and other mobile devices. The growing millions of users who are using mobile applications have contributed to an increase in the development of the mobile applications for enterprises, education, the social network and healthcare. Widely used healthcare application nowadays includes general health and wellness, tele-medicine, personal coaching and consultation, medical record tracking, custom reminders and various health management apps. This paper presents a mobile application related to general health and wellness named as iNutritionApp for providing nutrient information, tracking nutrition and calorie intakes with the integration of FatSecret API. The API provides nutritional information based on type of food provided by user. The application was intended to overcome manual calorie intake calculations and assists diet plan. Development methodology of this mobile application utilizes three phases that are system requirements, system design and development, as well as testing. Technology acceptance model with three parts were conducted with 30 respondents by evaluating the developed mobile application through questionnaires. Results of the testing showed that perceived of usefulness (PU) part achieved highest mean score compared to perceived ease of use (PEOU) that include user interface design and navigation parts. Therefore, features and functionality offered by the iNutritionApp is proven to be useful for user in tracking calorie intakes and provide access to nutritional information.
APA, Harvard, Vancouver, ISO, and other styles
28

Lai, Chin-Hui, Duen-Ren Liu, and Cai-Sin Lin. "Novel personal and group-based trust models in collaborative filtering for document recommendation." Information Sciences 239 (August 2013): 31–49. http://dx.doi.org/10.1016/j.ins.2013.03.030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Бождай, Александр, Aleksandr Bozhday, Александр Бершадский, Aleksandr Bershadskiy, Вардан Мкртчан, and Vardan Mkrtchan. "Knowledge management methods in next-generation E/U Learning systems." Russian Journal of Management 3, no. 4 (August 31, 2015): 352–60. http://dx.doi.org/10.12737/13099.

Full text
Abstract:
The article discusses the methods of knowledge management for E/U-Learning systems, which will provide the opportunities for the construction of a unified all-pervasive electronic educational environment. Authors analyze the development of a new phase of e-learning (E-Learning 3.0) in which will play an important role distributed computer systems, cloud computing, mobile personal devices and wireless networks, artificial intelligence and virtual reality tools. Today, there is a fundamental scientific problem of creating a unified interstate intellectual environment for e-education services. This environment should include heterogeneous forms of knowledge representation, interstate standards and forms of learning, international faculty and student teams. The article suggests a possible knowledge management methods and the approach to the construction of an all-pervading intellectual environment for e-learning services. The proposed approach is based on the integration of multiple technologies, such as: service-oriented design, engineering of DSPL (Dynamic Software Product Lines), wireless telecommunications, interaction of intelligent e-learning agents. Structural basis of this approach is interconnected pair of intelligent software agents: student’s and teacher’s software agents. These agents are able to adapt itself: to the current level of student’s knowledge; to the available software, hardware and network equipment; to the current demands of the environment (e.g. labor markets); to the modern educational standards. As a basis of software agents self-adaptation is a mathematical variability model, including the three basic features hierarchy: educational content, interface, software and technical support. Application of such variability model does not require recompilation of the source code (to make changes in the agents properties) and allows to organize a continuous process of e-learning and significantly increase the life cycle of the entire system of distance learning. Moreover, the authors propose a service-oriented scheme for knowledge flows management. The article will be useful for experts in e-learning, developers of service-oriented systems and for managers in the field of socio-economic systems.
APA, Harvard, Vancouver, ISO, and other styles
30

Romansky, Radi, and Irina Noninska. "Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection." International Journal of Human Capital and Information Technology Professionals 7, no. 3 (July 2016): 89–106. http://dx.doi.org/10.4018/ijhcitp.2016070107.

Full text
Abstract:
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.
APA, Harvard, Vancouver, ISO, and other styles
31

Mhawes, Abbas Atwan, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, and Lamees Abdalhasan Salman. "Evaluating the Performance of Engineering’s Students in Mathematic Subject based on Academic Decision-Making Techniques." Webology 18, no. 2 (December 23, 2021): 154–65. http://dx.doi.org/10.14704/web/v18i2/web18313.

Full text
Abstract:
Data mining is characterized as a quest for useful knowledge via large quantities of data. Some basic and most common techniques for data extraction are association rules, grouping, clustering, estimation, sequence modeling. For a wide range of applications, data mining techniques are used. Techniques of data analysis are essential to the preparation and implementation of the administration of the learning system, including behavioral guidance and personal behavior appraisal. The article applies data analytical methods to the role of student classification. Several tests are used for the interpretation of the findings. In keeping with the methodology proposed in the paper, the classification using cognitive skills provides more detailed results than the findings of other study published. Five algorithms were used (J48, Naïve Bayes, Multilayer Perception, K Star and SMO). This essay discusses and measures the application of the various algorithms so that factors affecting the success and failure of students can be identified, student performance can be estimated, and the significant consequences of the mathematics system for the second university year can be identified. However the number of exams can be minimized using data mining techniques. In terms of time and consequences, this shortened analysis plays a key role.
APA, Harvard, Vancouver, ISO, and other styles
32

Tremoulet, Patrice D. "Clinical decision support for intervention reduction in neonatal patients: A usability assessment." DIGITAL HEALTH 8 (January 2022): 205520762211136. http://dx.doi.org/10.1177/20552076221113696.

Full text
Abstract:
Objective This study investigated how effectively simplified cognitive walkthroughs, performed independently by four nonclinical researchers, can be used to assess the usability of clinical decision support software. It also helped illuminate the types of usability issues in clinical decision support software tools that cognitive walkthroughs can identify. Method A human factors professor and three research assistants each conducted an independent cognitive walkthrough of a web-based demonstration version of T3, a physiologic monitoring system featuring a new clinical decision support software tool called MAnagement Application (MAP). They accessed the demo on personal computers in their homes and used it to walk through several pre-specified tasks, answering three standard questions at each step. Then they met to review and prioritize the findings. Results Evaluators acknowledged several positive features including concise, helpful tooltips and an informative column in the patient overview which allows users direct (one-click) access to protocol eligibility and compliance criteria. Recommendations to improve usability include: modify the language to clarify what user actions are possible; visually indicate when eligibility flags are snoozed; and specify which protocol's data is currently being shown. Conclusion Independent, simplified cognitive walkthroughs can help ensure that clinical decision support software tools will appropriately support clinicians. Four researchers used this technique to quickly, inexpensively, and effectively assess T3's new MAP tool, which suggests positive actions, such as removing a patient from a ventilator. Results indicate that, while there is room for usability improvements, the MAP tool may help reduce clinician's cognitive load, facilitating improved care. The study also confirmed that cognitive walkthroughs identify issues that make clinical decision support software hard to learn or remember to use.
APA, Harvard, Vancouver, ISO, and other styles
33

Aleksiyev, Oleg, Volodymyr Aleksiev, and M. Matsiy. "USING WEB TECHNOLOGIES TO IMPROVE THE TRANSPORTATION PROCESS." Bulletin of Kharkov National Automobile and Highway University 1, no. 92 (March 10, 2021): 7. http://dx.doi.org/10.30977/bul.2219-5548.2021.92.1.7.

Full text
Abstract:
Problem. Due to the constant information development of society and its industrial component, new transport systems and machines have reached a high level of information excellence. Accordingly, there is a new contradiction between the rapid development of tools and methods of informatization of complex objects and systems, the development of transport telematics (internal for cars and other vehicles and external internal transport control systems) and the heterogeneous nature of existing subsystems and components of the transport complex. Of Ukraine. The problem of resolving this contradiction will allow at all levels of transport infrastructure to improve services to residents of cities and regions, improve transport processes, avoid existing negative consequences: traffic disruptions, unsatisfactory condition of roads, irrational use of funds for repair, operation and equipment of highways. This will help improve traffic safety, improve the quality of transport services, ensure people’s comfort and save cargo. Goal. The goal of the study is to create software and hardware for virtual management, its intellectualization based on the use of virtual logistics of transportation processes, providing road users, tools of virtual management, a kind of virtual logistics of the transport system of the transport portal KhNADU (ICT KhNADU). The purpose of this article is to study the problem of expressing and proving new rules and concepts for providing knowledge and skills to people who want to work in the IT field of transport applications. The sequence of acquiring knowledge and skills of people who have improved their personal professional level in road transport is determined. Methodology. The idea of computer science as system engineering of successful consecutive creation of computer equipment and software of complex systems by combining their computer and software engineering in the field of motor transport is offered. Practical value. The scope of use of the obtained results is road transport road organizations of Ukraine, residents of cities and regions as individuals or legal entities of users of transport services.
APA, Harvard, Vancouver, ISO, and other styles
34

Baldwin, Claire, Jose Arturo Garza-Reyes, Vikas Kumar, and Luis Rocha-Lona. "Personal development review (PDR) process and engineering staff motivation." Journal of Manufacturing Technology Management 25, no. 6 (July 1, 2014): 827–47. http://dx.doi.org/10.1108/jmtm-01-2013-0001.

Full text
Abstract:
Purpose – The academic literature and motivational theory recognise the positive role of motivation on organisational performance and considers personal development as a key motivational factor. In practice, most organisations employ a personal development review (PDR) process to drive and plan the development of their staff. The purpose of this paper is to investigate the interrelation and impact of the PDR process, and its elements, on staff motivation. Design/methodology/approach – The study is based on a case study research approach carried out in two large manufacturing-engineering departments of a world-class manufacturing organisation. A survey questionnaire was designed, validated and distributed to the engineering staff and its results were analysed using descriptive statistics. Findings – The study's results indicate that in most of the cases, a PDR process does not by itself motivate staff. But it argues that a poorly designed and conducted PDR process may make motivation, through personal development, difficult to achieve. Practical implications – This paper provides manufacturing managers with an opportunity to understand whether a common business process (i.e. PDR), and the elements that comprise it, can be employed as a method to aid in the motivation of their staff. Originality/value – This research expands the current knowledge on motivational and manufacturing management theory by performing an initial and exploratory study that establishes the impact of the PDR process on staff motivation. It is among the very first investigations that correlate the PDR process and motivation, especially in the manufacturing industry.
APA, Harvard, Vancouver, ISO, and other styles
35

ZASTROZHNІKOVA, Iryna. "STRATEGIC ORIENTATION OF THE AGRICULTURAL ENTERPRISE AND TASKS OF PERSONNEL MANAGEMENT WITH THE USE OF DIGITAL TECHNOLOGIES." Ukrainian Journal of Applied Economics 5, no. 4 (December 2, 2020): 314–20. http://dx.doi.org/10.36887/2415-8453-2020-4-37.

Full text
Abstract:
The purpose of the presented research is to analyze the tasks of personnel management in the context of digitalization of technologies in the context of the strategic directions implementation of agricultural enterprises development. The interconnection and coordination of the personnel management strategy and the general strategy of the enterprise are considered. The significance of personnel management strategy in the hierarchy of the organization strategy is determined. Thus, the strategy of personnel management is referred to the number of functional strategies, as well as the strategy of personnel development to the operational strategies. The analysis of the general laws of modern development of society allowed to state the fact of the digitalization processes actualization in the social space, based on the widespread use of personal computer technology. The consequence of economic-mathematical methods, means of computer engineering and communication in the system of organizational and managerial structure elements in the management system of the production organization, including personnel management, are shown. The tasks of the personnel management system are structured, for the solution of which special mathematical methods can be used. Trends in the development of information processing procedures in personnel management systems of modern enterprises are revealed. The evolution of personnel management technology is outlined, which has a tendency to change the functionality of information systems on the basis of their expansion. The classification of software products used in the practice of personnel management services of domestic agricultural enterprises is presented. The conditions of successful realization of personnel management tasks at the agricultural enterprise with application of digital technologies are allocated. Potential areas for improving the efficiency of personnel management system based on the use of economic and mathematical methods, modern digital technologies, namely the optimization of management processes, document management, rationalization of quantitative parameters of management staff based on reducing the complexity of processes, improving the reliability of information flows, quality management are represented. Keywords: agricultural enterprise, strategic orientation, personnel management, digital technologies, digitalization.
APA, Harvard, Vancouver, ISO, and other styles
36

Konstantinidis, George, Adriane Chapman, Mark J. Weal, Ahmed Alzubaidi, Lisa M. Ballard, and Anneke M. Lucassen. "The Need for Machine-Processable Agreements in Health Data Management." Algorithms 13, no. 4 (April 7, 2020): 87. http://dx.doi.org/10.3390/a13040087.

Full text
Abstract:
Data processing agreements in health data management are laid out by organisations in monolithic “Terms and Conditions” documents written in natural legal language. These top-down policies usually protect the interest of the service providers, rather than the data owners. They are coarse-grained and do not allow for more than a few opt-in or opt-out options for individuals to express their consent on personal data processing, and these options often do not transfer to software as they were intended to. In this paper, we study the problem of health data sharing and we advocate the need for individuals to describe their personal contract of data usage in a formal, machine-processable language. We develop an application for sharing patient genomic information and test results, and use interactions with patients and clinicians in order to identify the particular peculiarities a privacy/policy/consent language should offer in this complicated domain. We present how Semantic Web technologies can have a central role in this approach by providing the formal tools and features required in such a language. We present our ongoing approach to construct an ontology-based framework and a policy language that allows patients and clinicians to express fine-grained consent, preferences or suggestions on sharing medical information. Our language offers unique features such as multi-party ownership of data or data sharing dependencies. We evaluate the landscape of policy languages from different areas, and show how they are lacking major requirements needed in health data management. In addition to enabling patients, our approach helps organisations increase technological capabilities, abide by legal requirements, and save resources.
APA, Harvard, Vancouver, ISO, and other styles
37

Golovko, G., and M. Tolochyn. "USING THE AES ENCRYPTION METHOD IN PRACTICE." Системи управління, навігації та зв’язку. Збірник наукових праць 4, no. 70 (November 29, 2022): 71–74. http://dx.doi.org/10.26906/sunz.2022.4.071.

Full text
Abstract:
Analysis of recent research and publications shows that Encryption methods vary by how much data they can handle at once and what kind of key it needs for its decryption. Some encryption is more easily hacked than others. While some companies or individuals choose encryption type according to standards dictated by legal or industrial regulations, others may simply choose their type based on personal preference. It matters to you because it’s your data that’s being protected. You will want the best encryption type for the data you are storing or transmitting. This article tells about the practical application of such a data encryption method as AES in a tractor enterprise, which includes more than 50 personal computers with data that must be protected. Therefore, the article considers the method AES, a symmetric block cipher chosen by the U.S. government to protect classified information to be the best for company. AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection. Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible.
APA, Harvard, Vancouver, ISO, and other styles
38

Aldini, Alessandro, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, and Jonathan Guislain. "Design and validation of a trust-based opportunity-enabled risk management system." Information & Computer Security 25, no. 1 (March 13, 2017): 2–25. http://dx.doi.org/10.1108/ics-05-2016-0037.

Full text
Abstract:
Purpose The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets. Design/methodology/approach OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets. Findings As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events. Originality/value The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework.
APA, Harvard, Vancouver, ISO, and other styles
39

Zhou, Congcong, Chunlong Tu, Jian Tian, Jingjie Feng, Yun Gao, and Xuesong Ye. "A low power miniaturized monitoring system of six human physiological parameters based on wearable body sensor network." Sensor Review 35, no. 2 (March 16, 2015): 210–18. http://dx.doi.org/10.1108/sr-08-2014-687.

Full text
Abstract:
Purpose – The purpose of this paper is to design a low-power human physiological parameters monitoring system which can monitor six vital parameters simultaneously based on wearable body sensor network. Design/methodology/approach – This paper presents a low-power multiple physiological parameters monitoring system (MPMS) which comprises four subsystems. These are: electrocardiogram (ECG)/respiration (RESP) parameters monitoring subsystem with embedded algorithms; blood oxygen (SpO2)/pulse rate (PR)/body temperature (BT)/blood pressure (BP) parameters monitoring subsystem with embedded algorithms; main control subsystem which is in charge of system-level power management, communication and interaction design; and upper computer software subsystem which manipulates system function and analyzes data. Findings – Results have successfully demonstrated monitoring human ECG, RESP, PR, SpO2, BP and BT simultaneously using the MPMS device. In addition, the power reduction technique developed in this work at the physical/hardware level is effective. Reliability of algorithms developed for monitoring these parameters is assessed by Fluke Prosim8 Vital Signs Simulators (produced by Fluke Corp. USA). Practical implications – The MPMS device provides long-term health monitoring without interference from normal personal activities, which potentially allows applications in real-time daily healthcare monitoring, chronic diseases monitoring, elderly monitoring, human emotions recognization and so on. Originality/value – First, a power reduction technique at the physical/hardware level is designed to realize low power consumption. Second, the proposed MPMS device enables simultaneously monitoring six key parameters. Third, unlike most monitoring systems in bulk size, the proposed system is much smaller (118 × 58 × 18.5 mm3, 140 g total weight). In addition, a comfortable smart shirt is fabricated to accommodate the portable device, offering reliable measurements.
APA, Harvard, Vancouver, ISO, and other styles
40

Gibson, Ian. "The changing face of additive manufacturing." Journal of Manufacturing Technology Management 28, no. 1 (February 6, 2017): 10–17. http://dx.doi.org/10.1108/jmtm-12-2016-0182.

Full text
Abstract:
Purpose The purpose of this paper is to discuss the current state-of-the-art in additive manufacturing, more commonly known as 3D printing, from the business perspectives. The primary drivers behind the development of the associated technologies are considered along with features that limit growth. Design/methodology/approach The approach is a personal perspective, based on approximately 25-years study of the development of the associated technologies and applications. Findings The discussion has found that the technology is still growing healthily, but with an understanding that there are numerous application areas that should be considered separately. Some areas are significantly more mature than others and success in some areas does not guarantee success in others. Originality/value This viewpoint has been prepared for the current state-of-the-art and can be compared with earlier viewpoints to see how things may have changed in the past. This should be of value to those interested to explore how the technology has developed in recent times and how it may move into the future.
APA, Harvard, Vancouver, ISO, and other styles
41

Sharma, Vijay Kumar, pankaj Chandana, and Arvind Bhardwaj. "Critical factors analysis and its ranking for implementation of GSCM in Indian dairy industry." Journal of Manufacturing Technology Management 26, no. 6 (July 6, 2015): 911–22. http://dx.doi.org/10.1108/jmtm-03-2014-0023.

Full text
Abstract:
Purpose – Sustainability in food sector is the need of the hour. It has been revealed that Green supply chain management (GSCM) is an emerging new and effective approach to improve the productivity, efficiency of any enterprises and to achieve sustainability. The purpose of this paper is to rank the key performance indicators which are responsible for implementation of GSCM in Indian dairy sector. Ranking is done by giving weightage to them based on survey reports. The study includes literature review, personal interviews and surveys using the detailed questionnaire. Since food processing industry, e.g. dairy industry is the major energy user and directly affecting the health of public is being chosen for implementing GSCM practices. The approach is to form an effective framework for successful implementation of GSCM in dairy sector. Grouping of key performance indicators has been done using factor analysis and thereafter Analytic hierarchy process (AHP) method has been applied to determine the suitable framework based on relative importance of critical factors. Design/methodology/approach – The first step was to identify critical factors through extensive literature review, personal interviews, etc. The personal interviews has been carried out by contacting executives, managers, professionals of various dairy industries. Data has also been collected by interviewing auditors of ISO 14001 which was responsible for implementation of Environmental management system. Questionnaire used for collecting data has been formulated based on critical factors. It is also used to study minute details of the process being used in dairy industry. After collection of sufficient data SPSS is used for grouping of data through factor analysis. Thereafter AHP method has been used to identify the relative importance of these factors by ranking it which can be used by the managers in developing model/framework for implementing GSCM. Findings – The work aims to examine the critical factors of GSCM and its ranking so as to implement GSCM practices in dairy industry in Indian context. Detailed questionnaire based on 79 parameters has been used for survey in dairy industry in northern India. Grouping of these parameters has been done using factor analysis. The ranking of these identified critical factors has been used by using AHP which is used to see the relative importance of these eight factors. These ranked factors would be used by the managers of the dairy industry to implement GSCM. The work is limited to Indian dairy industry but it can be extended to other industry also after identification of critical factors. Originality/value – It is certified that this research work is original and has never been submitted or published in any journal.
APA, Harvard, Vancouver, ISO, and other styles
42

Fodor, Ádám, László Kopácsi, Zoltán Ádám Milacski, and András Lőrincz. "Speech De-identification with Deep Neural Networks." Acta Cybernetica 25, no. 2 (December 7, 2021): 257–69. http://dx.doi.org/10.14232/actacyb.288282.

Full text
Abstract:
Cloud-based speech services are powerful practical tools but the privacy of the speakers raises important legal concerns when exposed to the Internet. We propose a deep neural network solution that removes personal characteristics from human speech by converting it to the voice of a Text-to-Speech (TTS) system before sending the utterance to the cloud. The network learns to transcode sequences of vocoder parameters, delta and delta-delta features of human speech to those of the TTS engine. We evaluated several TTS systems, vocoders and audio alignment techniques. We measured the performance of our method by (i) comparing the result of speech recognition on the de-identified utterances with the original texts, (ii) computing the Mel-Cepstral Distortion of the aligned TTS and the transcoded sequences, and (iii) questioning human participants in A-not-B, 2AFC and 6AFC tasks. Our approach achieves the level required by diverse applications.
APA, Harvard, Vancouver, ISO, and other styles
43

Cruz, Aldine do Socorro Corrêa, Edgar Bisset Alvarez, and Luciane Paula Vital. "Web application for data collection in marketing strategies: an approach from the perspective of Digital Humanities." ICST Transactions on Scalable Information Systems 9, no. 5 (August 24, 2022): e10. http://dx.doi.org/10.4108/eetsis.v9i5.2611.

Full text
Abstract:
INTRODUCTION: Web applications and information systems are predominantly constituted as platforms for acquiring data and services over the Internet. Such applications integrate a technological context filled with intelligent devices interactive amongst themselves, connected to the network, hardware, and software, and accessible to the most varied social segments. OBJECTIVES: This article aims to present a digital mechanism based on product marketing for the acquisition of personal data used by a company in the cosmetics industry; to characterize privacy and data protection in view of the regulatory acts prevailing in Brazil; as well as to discuss how such scenarios affect the consumer. METHODS: We performed a bibliographic survey with a qualitative approach to the information collected, and used a digital platform for commercial operation as object to analysis. RESULTS: We confirmed the use of a digital platform, accessible by different electronic devices, to spread commercial content reaching a considerable volume of users, which then propagated it. We verified an indirect relationship of supply of goods through the transfer of identification, communication and location data. We identified users being directed to the Terms of Promotion and User Privacy Policy, as well as different media resources aiding their understanding. CONCLUSION: The customer's vulnerability in consumer relations stands out, something increasingly frequent in digital environments, which enables a directly proportional flow of information between market and consumer. Finally, we observed that Digital Humanities constitute a broad field of research under an extensive methodological domain, due to its interdisciplinary character, for the digital study of cultural phenomena, and promote critical reflection on the effects that computational methods have on society.
APA, Harvard, Vancouver, ISO, and other styles
44

Aljanabi, Mohammad, Shams N. Abd-Alwahab, RD Rohmat Saedudin, Hind Raad Ebraheem, Defni, Ronal Hadi, and Mohd Arfian Ismail. "Cloud Computing Issues, Challenges, and Needs: A Survey." JOIV : International Journal on Informatics Visualization 5, no. 3 (September 23, 2021): 298. http://dx.doi.org/10.30630/joiv.5.3.671.

Full text
Abstract:
Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks. This kind of computing includes three distinguished kinds of services provided remotely for clients that can be accessed by using the Internet. Typically, clients work on paying annual or monthly service fees for suppliers, in order to gain access to systems that work on delivering infrastructure as a service, platforms as a service, and software as a service for any subscriber. In this paper, the usefulness and the abuse of the cloud computing are briefly discussed and presented by highlighting the influences of cloud computing in different areas. Moreover, this paper also presents the kinds and services of cloud. In addition, the security issues that cover the cloud security solution requirements, and the cloud security issues, which is one of the biggest issues in recent years in cloud computing were presented in this paper. The security requirement that needs by the cloud computing covers privacy, lack of user control, unauthorized secondary usage, and finally data proliferation and data flow. Meanwhile, the security issues cover including ownership of device, the trust issue and legel aspects. To overcome the security issues, this paper also presents the solution at the end of this paper.
APA, Harvard, Vancouver, ISO, and other styles
45

Fernandez-Urien, Ignacio, Simon Panter, Cristina Carretero, Carolyn Davison, Xavier Dray, Evgeny Fedorov, Richard Makins, et al. "International core curriculum for capsule endoscopy training courses." Endoscopy International Open 05, no. 06 (June 2017): E526—E538. http://dx.doi.org/10.1055/s-0043-106181.

Full text
Abstract:
AbstractCapsule endoscopy (CE) has become a first-line noninvasive tool for visualisation of the small bowel (SB) and is being increasingly used for investigation of the colon. The European Society of Gastrointestinal Endoscopy (ESGE) guidelines have specified requirements for the clinical applications of CE. However, there are no standardized recommendations yet for CE training courses in Europe. The following suggestions in this curriculum are based on the experience of European CE training courses directors. It is suggested that 12 hours be dedicated for either a small bowel capsule endoscopy (SBCE) or a colon capsule endoscopy (CCE) course with 4 hours for an introductory CCE course delivered in conjunction with SBCE courses. SBCE courses should include state-of-the-art lectures on indications, contraindications, complications, patient management and hardware and software use. Procedural issues require approximately 2 hours. For CCE courses 2.5 hours for theoretical lessons and 3.5 hours for procedural issued are considered appropriate. Hands-on training on reading and interpretation of CE cases using a personal computer (PC) for 1 or 2 delegates is recommended for both SBCE and CCE courses. A total of 6 hours hands-on session- time should be allocated. Cases in a SBCE course should cover SB bleeding, inflammatory bowel diseases (IBD), tumors and variants of normal and cases with various types of polyps covered in CCE courses. Standardization of the description of findings and generation of high-quality reports should be essential parts of the training. Courses should be followed by an assessment of traineesʼ skills in order to certify readers’ competency.
APA, Harvard, Vancouver, ISO, and other styles
46

Mohd Razali, Muhamad Hasbullah, Muhammad Farhan Muhammad, and Balkiah Moktar. "Hellinger Distance Decision Tree (HDDT) Classification of Gender with Imbalance Statistical Face Features." Journal of Computing Research and Innovation 3, no. 4 (November 18, 2018): 39–44. http://dx.doi.org/10.24191/jcrinn.v3i4.75.

Full text
Abstract:
Face recognition is one of the technologies used for assets protection. Face recognition also presents a challenging problem in the field of image and computer vision and has been used for the application such as face tracking and personal identification. It also frequently used in a security system such as a security camera in airport, banks, and offices. Practically, there are problems in improving face recognition performance, particularly for gender identification. It is very difficult to differentiate the person based on face appearance from different poses, lighting, expressions, aging and illumination. Sometimes it is also difficult to identify the shape of human faces because different people have a different structure of faces. This study used image retrieved from Student Information Management Systems (SIMS)from 10 male and 43 female students who're taking MAT530. The image was then generated 12 geometric landmarks using TI nspire software. The main goal of this research is to classify the gender through the images of faces and to resolve for imbalance data using Hellinger Distance Decision Tree (HDDT) classifier. This classifier was proposed as an alternative to decision tree technique which used Hellinger Distance as the splitting criteria. The result from the validation split shows that percentage split at 40% produced the highest value of accuracy rate at 77.2727% and has the most significant value of sensitivity and specificity.
APA, Harvard, Vancouver, ISO, and other styles
47

Sivaraman, Shobana, and Punit Soni. "Leveraging Technology for Optimization of Health Survey Research." Journal of Health Management 21, no. 4 (November 25, 2019): 571–81. http://dx.doi.org/10.1177/0972063419884444.

Full text
Abstract:
Public health deals with promotion of health, prevention and treatment of communicable and non-communicable diseases by designing appropriate health interventions and services to deliver through the health systems. There is a need for robust database on the magnitude of disease burden, socio-demographic characteristics and associated risk factors for evidence-based effective planning and developing appropriate strategies, their implementation, monitoring and evaluation. Although India has vast information available through various large-scale surveys and research studies, it still lacks a reliable health information management system. The available data are seldom analysed to draw meaningful conclusions, to develop evidence for policies and strategies and to measure effectiveness of health programmes. The challenges faced in the survey research are multifaceted, from data collection in the field to its rapid transmission of data to central data servers. There is an increasing trend in using technology, especially computer-assisted personal interviews (CAPI) which is not only expensive but also requires extensive training and information management for transmission of data and its storage. This article examines the application of technology in survey research for efficient data management and to improve data quality. A software called Open Data Kit (ODK) was used for data collection and real-time monitoring of interviewers in field to improve the quality of data collection, achieve desired response rate (RR) and for better field operations’ management. The data collection and field reporting forms designed using ODK act as a significant tool to demonstrate how technology can be used to articulate research expectations at various levels with lower cost and higher efficiency. The research article examines all possible aspects of using technology in Health Survey Research. It aims to introduce further discussion of using technology for field data collection and monitoring.
APA, Harvard, Vancouver, ISO, and other styles
48

Guru, Ramratan, Palaniyandi Thennarasu, Satyanarayan Panigrahi, and Rohit Kumar. "Study on the Traditional Handloom Textiles in India." Textile & Leather Review 5 (August 10, 2022): 392–413. http://dx.doi.org/10.31881/tlr.2022.34.

Full text
Abstract:
The Indian subcontinent is known in the sector for its diversity in art and its cultural history. It's a very labour-intensive cottage-based decentralized industry, portraying the Indian way of existence that is fond of aesthetics, lifestyle, and sculpture. In India, the textile industry provides direct and indirect employment to millions of people, after the agriculture sector. At the time of determining aesthetic features of fashion products, the motifs, being an integral part of design, play a crucial role. Motif is the most primary unit of a design pattern or the smallest unit. Motifs are repeated in numerous ways to create styles; those patterns are repeated to create a layout. In a pattern or layout, the motif has its personal awesome identity. Generally, every motif is formed from simple layout elements that create various forms of designs, which include geometrical, summary, naturalistic and so forth. The choice of motifs may be inspired through diverse resources, which include nature, and also are intently related to the triumphing natural, cultural, religious and socio-monetary factors in any society. A contemporary look focuses on exploring numerous traditional textile motifs used throughout the Indian subcontinent. Furthermore, a number of famous and maximum commonplace motifs have been advanced through the use of computer-aided designing software programs. In this research article we have presented an overview of the traditional handloom textile application in India.
APA, Harvard, Vancouver, ISO, and other styles
49

Dvoryatkina, Svetlana N., Larisa V. Zhuk, Eugeny I. Smirnov, and Sergey V. Shcherbatykh. "Didactic model of development of research activities of schoolchildren in a hybrid intellectual learning environment." Perspectives of Science and Education 50, no. 2 (May 1, 2021): 278–92. http://dx.doi.org/10.32744/pse.2021.2.19.

Full text
Abstract:
Introduction. The problem of developing and implementing intelligent digital technologies in the system of teaching subject areas of knowledge for the purpose of self-organization of the individual, understanding and comprehending complex mathematical knowledge as a principle of personal development based on individualization of learning, establishing personalized and computerized feedback of cognitive and evaluative processes is relevant and far from solved. In this problem field, the issues of organizing the research activities of students in the process of adapting modern achievements in science to school mathematics through intellectual management are updated. Materials and methods. To identify new trends in the development of the concept of "research activity", methods of theoretical and methodological analysis (comparative, retrospective, modeling), analysis of mathematical, psychological, pedagogical, technical literature, methods of systematization of existing experience on the research problem were used. The possibilities of methods of intelligent management, design of a hybrid intellectual learning environment for creating a model of research activity are studied. The results of the study. A didactic model of research activity is developed based on the use of hybrid intelligent systems in the course of adapting modern scientific achievements with the manifestation of the effects of self-organization of the individual. The author's concept of intelligent management of the educational process in a hybrid intellectual learning environment was the structure-forming module of the model construction. The system of principles considered in the context of the unity and mutual influence of the three components of the structure of the information and educational space is formulated and justified: a set of digital educational platforms and technologies; digital interaction infrastructure in the context of the interactive triad "teacher-computer-student" of the educational process; digital information and educational content. In the course of mastering complex knowledge through historiogenesis and the range of its applications, technological constructs of clusters of foundation components of the generalized structure are built in the direction of building individual educational trajectories of schoolchildren using hybrid neural networks that make up the content component of the research activity development model. Conclusion. The results of the study are of practical value, as they serve as a methodological basis for creating a software package that implements the functionality of a hybrid intelligent system for developing students' research activities based on the developed principles and structural components using expert systems and fuzzy modeling.
APA, Harvard, Vancouver, ISO, and other styles
50

Bokrantz, Jon, Anders Skoogh, Torbjörn Ylipää, and Johan Stahre. "Handling of production disturbances in the manufacturing industry." Journal of Manufacturing Technology Management 27, no. 8 (October 3, 2016): 1054–75. http://dx.doi.org/10.1108/jmtm-02-2016-0023.

Full text
Abstract:
Purpose A common understanding of what events to regard as production disturbances (PD) are essential for effective handling of PDs. Therefore, the purpose of this paper is to answer the two questions: how are individuals with production or maintenance management positions in industry classifying different PD factors? Which factors are being measured and registered as PDs in the companies monitoring systems? Design/methodology/approach A longitudinal approach using a repeated cross-sectional survey design was adopted. Empirical data were collected from 80 companies in 2001 using a paper-based questionnaire, and from 71 companies in 2014 using a web-based questionnaire. Findings A diverging view of 21 proposed PD factors is found between respondents in manufacturing industry, and there is also a lack of correspondence with existing literature. In particular, planned events are not classified and registered to the same extent as downtime losses. Moreover, the respondents are often prone to classify factors as PDs compared to what is actually registered. This diverging view has been consistent for over a decade, and hinders companies to develop systematic and effective strategies for handling of PDs. Originality/value There has been no in-depth investigation, especially not from a longitudinal perspective, of the personal interpretation of PDs from people who play a central role in achieving high reliability of production systems.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography