Дисертації з теми "Billing data"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-18 дисертацій для дослідження на тему "Billing data".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Seashore, Jonathan. "The automation of obtaining customer billing data." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/JSeashore2006.pdf.
Повний текст джерелаLukalapu, Sushma. "Billing and receivables database application." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/1618.
Повний текст джерелаChan, Emily. "Evaluating the use of physician billing data for age and setting specific influenza surveillance." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32402.
Повний текст джерелаLa surveillance syndromique a émergé comme une nouvelle approche automatisée pour le contrôle des maladies avec des sources de données pré-diagnostic, mais qui sont souvent non-spécifiques. Pourtant, il y a peu de consensus concernant les meilleures sources de données. En utilisant des factures médicales émises entre 1998 et 2003, et provenant de centres communautaire et de services d'urgence au Québec, Canada, nous avons évalué par tranche d'âge, le cadre des visites, et la saison de la grippe la relation d'avance-décalage entre les visites médicales ambulatoires pour le syndrome d'allure grippale (SAG) et les hospitalisations pour la pneumonie et la grippe. Pour ce faire, nous avons appliqué la méthodologie des modèles d'ARIMA et calculé la fonction de contre-corrélation (CCF) avec les résidus. Les visites communautaires reliée au SAG par des enfants âgés de 5-17 ans ont eu tendance à pourvoir les plus grandes avances (au moins 2 semaines, mais quelques fois jusqu'à 3 semaines) contre des hospitalisations pour la pneumonie et la grippe. Les avances ont varié chaque année, peut-être à cause de la circulation des souches différentes chaque saison. Ces résultats ont des implications importantes pour la surveillance syndromique de la grippe, ainsi que pour des stratégies de lutte contre l'épidémie, comme la vaccination et la fermeture d'écoles.
Pidlaoan, Victorio P. "Use of Billing and Electronic Health Record Data to define an Alternative Payment Model for the Management of Acute Pancreatitis." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1511807834086251.
Повний текст джерелаHandlon, Lauree E. "The Relationship of the Financial Condition of a Healthcare Organization and the Error Rate of Potentially Missed Coding/Billing of Select Outpatient Services." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1204650548.
Повний текст джерелаStrmiska, Roman. "Hotspotový systém pro více operátorů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218144.
Повний текст джерелаD'Elboux, Adriano FogaÃa. "O impacto da autuaÃÃo fiscal no comportamento dos contribuintes do ICMS no Estado do CearÃ." Universidade Federal do CearÃ, 2012. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=9902.
Повний текст джерелаDiante da significativa importÃncia de se aferir a efetividade dos mecanismos de atuaÃÃo das administraÃÃes tributÃrias e o papel da auditoria fiscal no combate a evasÃo fiscal, analisa-se os impactos da AutuaÃÃo Fiscal imposta como puniÃÃo pela Auditoria Fiscal no Ãmbito da FiscalizaÃÃo TributÃria do ICMS sobre o comportamento dos contribuintes no Estado do CearÃ. Modelos com dados em painel com informaÃÃes sobre o grupo de tratamento formado por empresas fiscalizadas e autuadas por irregularidades no cumprimento de suas obrigaÃÃes tributÃrias no perÃodo de Julho de 2006 Ã Dezembro de 2006 foram contrastados com os de um grupo de controle composto por empresas que nÃo foram fiscalizadas e autuadas entre Janeiro de 2005 Ã Dezembro de 2007. Modelos para a elasticidade tributÃria do faturamento do contribuinte foram estimados tambÃm em segmentos de atividade para verificar efeitos setoriais da autuaÃÃo fiscal. Para o total das empresas nos diversos segmentos constatou-se um moderado impacto da autuaÃÃo fiscal sobre a elasticidade tributÃria do faturamento dos contribuintes autuados. Nos subgrupos, apenas o segmento Atacadista mostra o impacto positivo da autuaÃÃo fiscal.
Given the significant importance of measuring the effectiveness of the mechanisms of action of the tax administrations and the role of audit in combating tax evasion, we analyze the impacts of Tax Fine imposed as punishment for Tax Audit under the Tax Inspection of ICMS on behavior of taxpayers in the state of CearÃ. Models with panel data with information about the treatment group consists of companies audited and fined for irregularities in meeting their tax obligations in the period July 2006 to December 2006 were contrasted with a control group composed of companies that do not were audited and fined between January 2005 to December 2007. Models for the tax elasticity of the billing were estimated also in segments of activity to verify effects of sectoral tax fine. For the group of companies in various segments was found a moderate impact of the tax fine on the tax elasticity of billing from taxpayers fined. In subgroups, only the Wholesale segment shows the positive impact of tax fine.
Ericsson, Yvonne. "E-fakturans inverkan på integritetskänslig vårdinformation." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-170.
Повний текст джерелаDenna uppsats handlar om integritetskänslig vårdinformation på fakturor, ett ämne som aktualiserats under mitt arbete på landstingets kansli i Jönköping. När en person får vård i annat län än hemlandstinget så skickas en faktura till hemlandstinget och innan dessa fakturor betalas måste de granskas och attesteras. Hanteringen kring detta upplevdes som tidsödande och ineffektiv, vilket ledde mig in på funderingar kring elektronisk fakturering (e-fakturering). Eftersom fakturorna innehåller integritetskänslig information, som personuppgifter och vissa uppgifter som går att koppla till diagnos och behandling, är det inte bara viktigt att hanteringen blir effektiv utan också att sekretessen kan upprätthållas under hela faktureringsprocessen.
I denna undersökning studeras hur hanteringen av integritetskänslig vårdinformation påverkas om fakturahanteringen digitaliseras. Syftet är att göra en jämförelse avseende hantering av sekretess mellan pappersfakturor och digitala e-fakturor. Undersökningen genomfördes med en kvalitativ ansats där en organisation, Jönköpings läns landsting, studerades mer ingående och för datainsamlingen valdes litteraturstudier och intervjuer.
Resultatet visade att sekretessen kring pappersfakturor är en känslig faktor då hanteringen av dessa inte går att spåra och att fakturor lätt kan försvinna inom organisationen. För e-fakturor finns däremot stor möjlighet till spårbarhet och kontroll över händelserna kring hanteringen. Det finns olika typer av e-fakturering och om ett system som till exempel EDI-fakturering väljs kan många uppgifter automatiseras vilket minskar risken för såväl avsiktliga som oavsiktliga sekretessbrott. Om vissa personuppgifter kan döljas innebär det dessutom en än större säkerhet för patienterna. Tekniskt sett finns det alltså många bra lösningar som kan förbättra sekretessen, men mycket av detta är dock endast en efterkontroll över att lagar och regler följs, till exempel sparade uppgifter om vad som har hänt en specifik faktura.
Det största hotet mot sekretess är dock den så kallade mänskliga faktorn. Det går inte att bygga ett informationssystem så att det inte finns den minsta risk för läckor, eftersom det alltid är de personer som hanterar de känsliga uppgifterna som gör att tanken blir till handling. Vissa typer av misstag eller slarv kan förebyggas med teknik, men personalens inställning till sitt eget arbete och det ansvar som det innebär är en grundläggande faktor såväl med pappers- som e-fakturor.
This thesis deals with integrity sensitive healthcare information on invoices, a subject that arose during my work at county council secretariat in Jönköping. When a person gets treatment in another county than the home county the invoice are sent to the home county, but before these invoices are paid, they have to be checked and attested. This handling was experienced as time consuming and ineffective which led me in to some thoughts around electronic billing (e-billing). The invoice contains integrity sensitive information, like personal code numbers and other kind of information, which is possible to connect with diagnosis and treatments. Therefore it is important that the handling becomes effective and that the secrecy can be maintained during the whole billing process.
In this study I discuss how the handling of integrity sensitive healthcare information is influenced if the invoice handling is digitalised. The purpose was to do a comparison the handling of secrecy between paper invoices and digital e-billing. The study was accomplished by a qualitative approach where one organisation, Jönköpings county council, was examined more thorough and for the data collection literature studies and interviews were chosen.
The result showed that the secrecy around paper invoices is a sensitive factor. It is not able to trace the handlings around these documents and an invoice could easily disappear within an organisation. On the contrary, for e-bills there is a large possibility to trace and control the handlings. There are different kinds of e-billing and if a system like for example EDI-billing is chosen, a lot of tasks could be automatized. That will decrease the risk for intentional as well as unintentional secrecy crimes. Furthermore, if some personal information could be hidden, it would mean a better safety for the patients. Technically there are a lot of good solutions that is able to improve the secrecy, but a lot of these are only a recheck that laws and rules are followed, for example saved information about what have happened with a specific invoice.
The biggest threat though is the so called human element. It is impossible to build an information system that contains no leaks, because it is always the persons that are handling the delicate information that makes the thoughts into actions. Some kind of mistakes or carelessness could be prevented by technical solutions, but the staffs’ attitude of their work and the responsibility is a fundamental factor with papers- as well as e-bills.
Тимчук, Микола Іванович, та Mykola Tymchuk. "Методи та засоби побудови білінгових систем з відмовостійкою архітектурою". Master's thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2020. http://elartu.tntu.edu.ua/handle/lib/33328.
Повний текст джерелаThesis deals with the study of methods and means of constractimg a fault-tolerant architecture for billing systems. A comparative analysis of existing software environments and technologies to solve the problem was carried out. As a result, Oralce Golden Gate was selected. Features of installation of Oralce Golden Gate with a configuration of initial and target databases are resulted. The software mechanisms of database replication are described in detail, the procedure for creating an instance of the Oracle database is given. There are also ways to resolve issues and conflicts that may arise when using the development were proposed. Pre-configured Active-Active replication was done. This research work covers a number of important aspects, such as high availability and maximum data protection, fault tolerance, productivity, reduced deployment costs, management and system maintenance.
ЗМІСТ ПЕРЕЛІК УМОВНИХ ПОЗНАЧЕНЬ, СИМВОЛІВ, ОДИНИЦЬ СКОРОЧЕНЬ І ТЕРМІНІВ 6 ВСТУП 9 РОЗДІЛ 1. АНАЛІТИЧНА ЧАСТИНА 12 1.1. Роль білінгу в ІС. 12 1.2. Аналіз основних понять досліджуваної області 16 1.3. Огляд існуючих технологій 20 1.4. Висновки до розділу 23 РОЗДІЛ 2. ТЕОРЕТИЧНА ЧАСТИНА 24 2.1. Характеристика середовища OGG 24 2.1.1. Ключові можливості і технологічні відмінності 25 2.1.2. Використовувані топології 25 2.1.3. Проміжне ПЗ Oracle для BI і ODI 26 2.1.4. Застосування для сховищ даних в режимі РЧ 27 2.1.5. Використання для СУБД Oracle 28 2.1.6. Відмовостійкість 29 2.1.7. Вимоги до системи 30 2.2. Огляд архітектури OGG 30 2.2.1. OGG Capture 32 2.2.2. OGG Trail Files 32 2.2.3. OGG Delivery 33 2.2.4. OGG Manager 34 2.3. Встановлення OGG 35 2.4. Конфігурація вихідної і цільової Oracle БД 37 2.5. Висновки до розділу 38 РОЗДІЛ 3. ПРАКТИЧНА РЕАЛІЗАЦІЯ. 39 3.1. Архітектура БД БС 39 3.2. Захоплення змін та реплікація 40 3.3. Створення OGG екземпляру 47 3.4. Вирішення проблем 51 3.5. Попереднє налаштування Active-Active реплікації 54 3.6. Висновки до розділу 56 РОЗДІЛ 4. ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ 57 4.1. Охорона праці 57 4.2. Комп’ютерне забезпечення процесу оцінки радіаційної та хімічної обстановки 60 4.3. Висновки до розділу 62 ВИСНОВКИ 63 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ 65 ДОДАТОК А. Тези конференції
Feuchte, Beate. "Billig Nähen für den Weltmarkt - Lebens- und Arbeitsbedingungen der Beschäftigten der bangladeschischen Bekleidungsindustrie eine sozialgeographische Studie." Berlin wvb, Wiss. Verl, 2007. http://www.wvberlin.de/data/inhalt/feuchte.html.
Повний текст джерелаJang, Jiyong. "Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code." Research Showcase @ CMU, 2013. http://repository.cmu.edu/dissertations/306.
Повний текст джерелаGalicia, Auyón Jorge Armando. "Revisiting Data Partitioning for Scalable RDF Graph Processing Combining Graph Exploration and Fragmentation for RDF Processing Query Optimization for Large Scale Clustered RDF Data RDFPart- Suite: Bridging Physical and Logical RDF Partitioning. Reverse Partitioning for SPARQL Queries: Principles and Performance Analysis. ShouldWe Be Afraid of Querying Billions of Triples in a Graph-Based Centralized System? EXGRAF: Exploration et Fragmentation de Graphes au Service du Traitement Scalable de Requˆetes RDF". Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2021. http://www.theses.fr/2021ESMA0001.
Повний текст джерелаThe Resource Description Framework (RDF) and SPARQL are very popular graph-based standards initially designed to represent and query information on the Web. The flexibility offered by RDF motivated its use in other domains and today RDF datasets are great information sources. They gather billions of triples in Knowledge Graphs that must be stored and efficiently exploited. The first generation of RDF systems was built on top of traditional relational databases. Unfortunately, the performance in these systems degrades rapidly as the relational model is not suitable for handling RDF data inherently represented as a graph. Native and distributed RDF systems seek to overcome this limitation. The former mainly use indexing as an optimization strategy to speed up queries. Distributed and parallel RDF systems resorts to data partitioning. The logical representation of the database is crucial to design data partitions in the relational model. The logical layer defining the explicit schema of the database provides a degree of comfort to database designers. It lets them choose manually or automatically (through advisors) the tables and attributes to be partitioned. Besides, it allows the partitioning core concepts to remain constant regardless of the database management system. This design scheme is no longer valid for RDF databases. Essentially, because the RDF model does not explicitly enforce a schema since RDF data is mostly implicitly structured. Thus, the logical layer is inexistent and data partitioning depends strongly on the physical implementations of the triples on disk. This situation contributes to have different partitioning logics depending on the target system, which is quite different from the relational model’s perspective. In this thesis, we promote the novel idea of performing data partitioning at the logical level in RDF databases. Thereby, we first process the RDF data graph to support logical entity-based partitioning. After this preparation, we present a partitioning framework built upon these logical structures. This framework is accompanied by data fragmentation, allocation, and distribution procedures. This framework was incorporated to a centralized (RDF_QDAG) and a distributed (gStoreD) triple store. We conducted several experiments that confirmed the feasibility of integrating our framework to existent systems improving their performances for certain queries. Finally, we design a set of RDF data partitioning management tools including a data definition language (DDL) and an automatic partitioning wizard
McNamara, Kathryn. "Defense Data Network: usage sensitive billing." Thesis, 1986. http://hdl.handle.net/10945/21764.
Повний текст джерелаChien, Se-Fen, and 簡瑟芬. "Mining on the Convergent Billing Services Data for Telecommunication Business." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/26852064036354613323.
Повний текст джерела國立雲林科技大學
資訊管理系碩士班
91
As deregulation opens up the telecommunications industry, the telecommunications market has increased more converging communications services. According to investigation, suppliers of telecommunication services are facing heavy competition due to the ever increasing needs from customers for more and better converging communication services, the suppliers consider to deliver these services must become more suitable and creative. The study attempts to acquire hidden knowledge by means of the technology of data mining from the huge data stored in a telecommunication billing database, which is used to support large customers’ convergence billing services activity. Through this study, we discover two kinds of customer behavioral information: characterization of convergence service and behavior of purchasing. The characterization of convergence service enables us to better understand customers for increasing customer satisfaction and royalty. The behavior of association purchasing will support enterprise for marketing strategic. The mining methodology adopted is based on some of techniques taken from artificial intelligence, such as: decision tree, neural networks of classification, and association analysis, have been widely adopted to acquire customer knowledge patterns. Beside the pattern extraction, we make this knowledge explicit by rules and visualization link chart resulting in an actionable format to business managers, who understand customers’ needs and patterns and design proper relationship strategies based on discovered informative characteristics.
Kan, Kevin, and 甘永勝. "Using Data Mining Technique to improve billing system performance in semiconductor Industry." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/09701949595597951307.
Повний текст джерела國立交通大學
管理學院碩士在職專班資訊管理組
95
In today's dynamic and changing environment, companies need to be responsive and closer to the customers, and deliver value-added products and services as quickly as possible. Companies also need to be able to support organizational information faster and better than their competitors. In semiconductor testing, beside emphasize fast reaction result in testing changed and result, billing’s real time and accurate provide data that is important also or too to provide the enterprise’s strategy guiding principal and satisfied customer requirement. To build the new intelligent billing system for this purpose, It major make use the Data Warehousing integration concept to consolidate these billing data and Decision Tree of Data Mining method to configured the billing rule. Both of data warehousing and data mining methods are to make up the intelligent billing system. The result of this paper is to design the new intelligent billing system. Speed up the implementation new billing system of customers, and improve the billing performance. Especially; the company have already existed many customers that didn’t stilled to implement the billing system. And finally this new intelligent billing system is to provide the accurate the almost real time revenue data that can view by customer, tester machine, and provide the real time revenue of enterprise to integrate the EIS , DSS or BI, let the enterprise to make a right strategic timely.
Firmino, Bruno Manuel Paias. "Smart Monetization - Telecom Revenue Management beyond the traditional invoice." Master's thesis, 2019. http://hdl.handle.net/10362/113609.
Повний текст джерелаDe, Wet Dawid Pieter. "A scalable business model for mass customization of broadband services in the emerging Africa market / Dawid Pieter de Wet." Thesis, 2012. http://hdl.handle.net/10394/15176.
Повний текст джерелаPhD (Electronic Engineering), North-West University, Potchefstroom Campus, 2013
Ahmed, Aly. "Complex graph algorithms using relational database." Thesis, 2021. http://hdl.handle.net/1828/13306.
Повний текст джерелаGraduate