Добірка наукової літератури з теми "IDS IMPLEMENTATION"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "IDS IMPLEMENTATION".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "IDS IMPLEMENTATION"

1

Tarkhan, Mahdi, Saeed Bagheri Shouraki, and Seyed Hossein Khasteh. "A novel hardware implementation of IDS method." IEICE Electronics Express 6, no. 23 (2009): 1626–30. http://dx.doi.org/10.1587/elex.6.1626.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Paul, Morgan. "Looking to the Future." Pathfinder: A Canadian Journal for Information Science Students and Early Career Professionals 4, no. 1 (September 8, 2023): 54–67. http://dx.doi.org/10.29173/pathfinder71.

Повний текст джерела
Анотація:
This article explores the concept of Indigenous Data Sovereignty (IDS) in Canada, examining its barriers, resources, implementation, and policy implications. While not an exhaustive list of all IDS-related policies, the article focuses on key definitions, successful implementations, support programs and resources, and outdated policies that hinder IDS and Indigenous governance practices. Through a First Nations lens, the paper highlights the importance of Indigenous People's control over data and knowledge about their communities and lands. It discusses the challenges of implementing IDS within non-Indigenous organizations and communities, including financial constraints and the influence of colonial policies. The article also addresses the impact of IDS on Indigenous self-determination, emphasizing the need for government and educational institutions to support IDS practices. Additionally, it explores the First Nations' principles of Ownership, Control, Access, and Possession (OCAP) as an example of successful IDS implementations. The paper acknowledges the role of data sovereignty in reconciliation frameworks and highlights resources such as the International Work Group for Indigenous Affairs (IWGIA) and the Global Indigenous Data Alliance (GIDA) that advocate for IDS and Indigenous self-governance. The conclusion emphasizes the ongoing need for support, collaboration, and the mobilization of UNDRIP and TRC frameworks to ensure the success of IDS and the amendment of colonial policies.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mizutani, Masayoshi, Shin Shirahata, Masaki Minami, and Jun Murai. "The design and implementation of session-based IDS." Electronics and Communications in Japan (Part I: Communications) 89, no. 3 (March 2006): 46–58. http://dx.doi.org/10.1002/ecja.20251.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bush-Mecenas, Susan, Julie A. Marsh, and Katharine O. Strunk. "Guiding Principals: Middle-Manager Coaching and Human-Capital Reform." Teachers College Record: The Voice of Scholarship in Education 122, no. 10 (October 2020): 1–50. http://dx.doi.org/10.1177/016146812012201004.

Повний текст джерела
Анотація:
Background/Context School leaders are central to state and district human-capital reforms (HCRs), yet they are rarely equipped with the skills to implement new evaluation, professional development, and personnel data systems. Although districts increasingly offer principals coaching and training, there has been limited empirical work on how these supports influence principals’ HCR-related practices. Purpose Drawing on a two-year, mixed-methods study in the Los Angeles Unified School District (LAUSD), this article examines the role of principal supervisors in HCRs. We ask: What role did principal supervisors (Instructional Directors [IDs]) play in the implementation of human-capital reforms? What did high-quality coaching on the part of IDs look like in this context? Research Design Our two-part analysis draws upon survey and interview data. First, we conducted descriptive analyses and significance testing using principal and ID survey data to examine the correlations among principals’ ratings of ID coaching quality, ID coaching practices, and principals’ implementation of HCRs. Second, we conducted in-depth interviews, using a think-aloud protocol, with two sets of IDs—those consistently highly-rated and those with mixed ratings—who were identified using principals’ reports of coaching quality. Following interview coding, we created various case-ordered metamatrix displays to analyze our qualitative data in order to identify patterns in coaching strategy and approach across IDs, content, and contexts. Findings First, our survey data indicate that receiving high-quality coaching from IDs is correlated with stronger principal support for and implementation of HCRs. Our survey findings further illustrate that IDs support a wide range of principals’ HCR activities. Second, our think-aloud interviews with case IDs demonstrate that coaching strategy and approach vary between consistently highly-rated and mixed-rated coaches: Consistently highly-rated IDs emphasize the importance of engaging in, or defining HCR problems as, joint work alongside principals, while mixed-rated IDs often emphasize the use of tools to guide principal improvement. We find that, on the whole, the consistently highly-rated IDs in our sample employ a nondirective approach to coaching more often than mixed-rated coaches. Conclusions These findings contribute to a growing literature on the crucial role of principal supervisors as coaches to improve principals’ instructional leadership and policy implementation. While exploratory, this study offers the first steps toward building greater evidence of the connections between high-quality coaching and policy implementation, and it may have implications for the design and implementation of professional development for principal supervisors and the selection and placement of supervisors with principals.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Merrikh-Bayat, Farnood, Saeed Bagheri Shouraki, and Ali Rohani. "Memristor Crossbar-Based Hardware Implementation of the IDS Method." IEEE Transactions on Fuzzy Systems 19, no. 6 (December 2011): 1083–96. http://dx.doi.org/10.1109/tfuzz.2011.2160024.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ben Charhi, Youssef, Nada Mannane, Elmahdi Bendriss, and Regragui Boubker. "Behavioral Analysis Approach for Likelihood Determination in Cloud IDS: Implementation Architecture." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (January 2018): 36–57. http://dx.doi.org/10.4018/ijmdwtfe.2018010103.

Повний текст джерела
Анотація:
Cyberattacks present a ubiquitous threat to an enterprise's information in Cloud Computing assets and must be properly controlled. The use of the current generation of IDS have various limitations on their performance making them not effective for cloud computing security and could generate a huge number of false-positive alarms. Analyzing intrusion based on attack patterns and risk assessment has demonstrated its efficiency in reducing the number of false alarms and optimizing the IDS performances. However, the use of the same value of likelihood makes the approach lack a real risk value determination. This article intends to present a new probabilistic and behavioral approach for likelihood determination to quantify attacks in cloud environment. With the main task to increase the efficiency of IDS and decrease the number of alarms. Experimental results show that the approach is superior to the state-of-the-art approach for intrusion detection in the cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bouchet, Flavien, Vincent Le Moing, Delphine Dirand, François Cros, Alexi Lienard, Jacques Reynes, Laurent Giraudon, and David Morquin. "Effectiveness and Acceptance of Multimodal Antibiotic Stewardship Program: Considering Progressive Implementation and Complementary Strategies." Antibiotics 9, no. 12 (November 27, 2020): 848. http://dx.doi.org/10.3390/antibiotics9120848.

Повний текст джерела
Анотація:
Multiple modes of interventions are available when implementing an antibiotic stewardship program (ASP), however, their complementarity has not yet been assessed. In a 938-bed hospital, we sequentially implemented four combined modes of interventions over one year, centralized by one infectious diseases specialist (IDS): (1) on-request infectious diseases specialist consulting service (IDSCS), (2) participation in intensive care unit meetings, (3) IDS intervention triggered by microbiological laboratory meetings, and (4) IDS intervention triggered by pharmacist alert. We assessed the complementarity of the different cumulative actions through quantitative and qualitative analysis of all interventions traced in the electronic medical record. We observed a quantitative and qualitative complementarity between interventions directly correlating to a decrease in antibiotic use. Quantitatively, the number of interventions has doubled after implementation of IDS intervention triggered by pharmacist alert. Qualitatively, these kinds of interventions led mainly to de-escalation or stopping of antibiotic therapy (63%) as opposed to on-request IDSCS (32%). An overall decrease of 14.6% in antibiotic use was observed (p = 0.03). Progressive implementation of the different interventions showed a concrete complementarity of these actions. Combined actions in ASPs could lead to a significant decrease in antibiotic use, especially regarding critical antibiotic prescriptions, while being well accepted by prescribers.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (March 31, 2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.

Повний текст джерела
Анотація:
The internet is essential for ongoing contact in the modern world, yet its effectiveness might lessen the effect known as intrusions. Any action that negatively affects the targeted system is considered an intrusion. Network security has grown to be a major issue as a result of the Internet's rapid expansion. The Network Intrusion Detection System (IDS), which is widely used, is the primary security defensive mechanism against such hostile assaults. Data mining and machine learning technologies have been extensively employed in network intrusion detection and prevention systems to extract user behaviour patterns from network traffic data. Association rules and sequence rules are the main foundations of data mining used for intrusion detection. Given the Auto encoder algorithm's traditional method's bottleneck of frequent itemsets mining, we provide a Length-Decreasing Support to Identify Intrusion based on Data Mining, which is an upgraded Data Mining Techniques based on Machine Learning for IDS. Based on test results, it appears that the suggested strategy is successful
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kim, Song-Mok, and Seungyoung Park. "Real-Time Implementation of Bi-directional GPT-based CAN IDS Using Jetson Nano." Journal of Digital Contents Society 24, no. 11 (November 30, 2023): 2871–79. http://dx.doi.org/10.9728/dcs.2023.24.11.2871.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Silva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.

Повний текст джерела
Анотація:
Databases are widely used by organizations to store business-critical information, which makes them one of the most attractive targets for security attacks. SQL Injection is the most common attack to webpages with dynamic content. To mitigate it, organizations use Intrusion Detection Systems (IDS) as part of the security infrastructure, to detect this type of attack. However, the authors observe a gap between the comprehensive state-of-the-art in detecting SQL Injection attacks and the state-of-practice regarding existing tools capable of detecting such attacks. The majority of IDS implementations provide little or no protection against SQL Injection attacks, with exceptions like the tools Bro and ModSecurity. In this article, the authors compare these tools using the CSIC dataset in order to examine the state-of-practice in database protection from SQL Injection attacks, identifying the main characteristics and implementation details needed for IDSs to successfully detect such attacks. The experiments indicate that signature-based IDS provide the greatest coverage against SQL Injection.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "IDS IMPLEMENTATION"

1

Fors, Markus, and Christian Grahn. "An implementation of a DNS-based malware detection system." Thesis, Karlstad University, Karlstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-6036.

Повний текст джерела
Анотація:

Today’s wide usage of the Internet makes malicious software (malware) and botnets a big problem. While anti-virus software is commonplace today, malware is constantly evolving to remain undetected. Passively monitoring DNS traffic on a network can present a platform for detecting malware on multiple computers at a low cost and low complexity. To explore this avenue for detecting malware we decided it was necessary to design an extensible system where the framework was separate from the actual detection methods. We wanted to divide the system into three parts, one for logging, one for handling modules for detection and one for taking action against suspect traffic. The system we implemented in C collects DNS traffic and processes it with modules that are compiled separately and can be plugged in or out during runtime. Two proof of concept modules have been implemented. One based on a blacklist and one based on geolocation of requested servers. The system is complete to the point of being ready for field testing and implementation of more advanced detection modules.

Стилі APA, Harvard, Vancouver, ISO та ін.
2

Tong, Jizhou. "Design and Implementation Security Testbed (HANSim) and Intrusion Detection System (IDS) for the Home Area Network in the Smart Grid." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501856291735261.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Nykvist, Carl, and Martin Larsson. "Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple." Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157481.

Повний текст джерела
Анотація:
The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). The LPIDS was implemented and tested on the hardware platforms Wi-Fi Pineapple and Raspberry Pi. To evaluate and test the LPIDS as well as the algorithms, performance metrics such as throughput, response time and power consumption are considered. The experimental results reveal that Aho-Corasick performed better than KMP throughout the majority of the process, but KMP was typically faster in the beginning with fewer rules. Similarly, Raspberry Pi shows remarkably higher performance than Wi-Fi Pineapple in all of the measurements. Moreover, we compared the throughput between LPIDS and Snort. It was concluded that the throughput was significantly higher for LPIDS when most of the rules do not include content parameters. This thesis concludes that due to computational complexity and slow hardware processing capabilities of Wi-Fi Pineapple, it could not become suitable IDS in the presence of different pattern matching strategies. Finally, we propose a modification of Snort to increase the throughput of the system.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Fu, Yulong. "Sécurité Vérification d’implémentation de protocole." Thesis, Pau, 2014. http://www.theses.fr/2014PAUU3003/document.

Повний текст джерела
Анотація:
En ce qui concerne le développement des technologies informatique, les systèmes et les réseaux informatiques sont intensément utilisés dans la vie quotidienne. Ces systèmes sont responsables de nombreuses tâches essentielles pour notre communauté sociale (par exemple, système de traitement médical, E-Commerce, Système d'avion, système de vaisseau spatial, etc.). Quand ces systèmes cessent de fonctionner ou sont corrompus, les pertes économiques peuvent atteindre des sommes inacceptables. Pour éviter ces situations, les systèmes doivent être sécurisés avant leur installation. Alors que la plupart de ces systèmes sont mis en œuvre à partir de spécifications des protocoles, les problèmes de vérification de la sécurité de systèmes concrets renvient à vérifier la sécurité de l'implémentation de ces protocoles. Dans cette thèse, nous nous concentrons sur les méthodes de vérification de la sécurité des implémentations des protocoles et nous sommes intéressés à deux principaux types d'attaques sur les réseaux : Déni de service (DoS) et attaque de Protocol d’authentification. Nous étudions les caractéristiques de ces attaques et les méthodes de vérification formelles. Puis nous proposons modèle étendu de IOLTS et les algorithmes correspondants à la génération de les cas de test pour la vérification de sécurité automatique. Afin d'éviter les explosions d'état possibles, nous formalisons également les expériences de sécurité du testeur comme le « Objectif de Sécurité » pour contrôler la génération de test sur la volée. Parallèlement, une méthode d'analyse basée sur le modèle pour la Systèmes de Détection d'intrusion Anomalie (Anomaly IDS) est également proposée dans cette thèse, ce qui peut améliorer les capacités de détecter des anomalies de l'IDS. Ces méthodes de vérification proposées sont mises en évidence par l'étude de RADIUS protocole et un outil intégré de graphique est également proposé pour facilement les opérations de la génération de test
Regarding the development of computer technologies, computer systems have been deeply used in our daily life. Those systems have become the foundation of our modern information society. Some of them even take responsibilities for many essential and sensitive tasks (e.g., Medical Treatment System, E-Commerce, Airplane System, Spaceship System, etc.). Once those systems are executed with problems, the loss on the economy may reach an unacceptable number. In order to avoid these disappointing situations, the security of the current systems needs to be verified before their installations. While, most of the systems are implemented from protocol specifications, the problems of verifying the security of concrete system can be transformed to verify the security of protocol implementation. In this thesis, we focus on the security verification methods of protocol implementations and we are interested with two main types of network attacks: Denis-of-Services (DoS) attacks and Protocol Authentication attacks. We investigate the features of these attacks and the existed formal verification methods and propose two extended models of IOLTS and the corresponding algorithms to generate the security verification test cases automatically. In order to avoid the possible state explosions, we also formalize the security experiences of the tester as Security Objective to control the test generation on-the-fly. Meanwhile, a modeled based Anomaly Intrusion Detection Systems (IDS) analysis method is also proposed in this thesis, which can enhance the detect abilities of Anomaly IDS. These proposed verification methods are demonstrated with the case study of RADIUS protocol and an integrated GUI tool is also proposed to simply the operations of test generation
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Olsson, Jenny, Veronica Karlsson, and Maria Muravskaya. "Swedbank's implementation process of IFRS." Thesis, Jönköping University, JIBS, Business Administration, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-895.

Повний текст джерела
Анотація:

Sammanfattning

Bakgrund: En ökad handel över nationsgränserna har skapat en efterfrågan på ett internationellt redovisningsspråk. IASB har därför skapat ett set med högkvalitativa internationella redovisningsstandarder. Från och med 2005 kräver EU att alla företag som är listade på en reglerad marknad inom EU ska an-vända sig av IASBs standarder IFRS.

Problem: Genomförandet av implementeringen av IFRS är olika i olika företag. Vi vill därför undersöka hur implementeringsprocessen var genomförd i Sveriges största bank, Swedbank.

Syfte: Syftet med den här rapporten är att beskriva samt förklara hur förändringen till IFRS genomfördes i Swedbank samt att beskriva de eventuella problem och hinder som implementeringen av dessa standarder kan ha medfört.

Metod: Vi har valt att göra en fallstudie genom att intervjua anställda i Swedbank som har varit delaktiga i implementeringsprocessen. Vi har också intervjuat Deloitte för att få deras syn på en implementeringsprocess av IFRS.

Analys: Vår analys är baserad på empirisk data i jämförelse med ett teoretiskt underlag. Vad vi har kommit fram till är att Swedbank har inkluderat de flesta av de steg som tas upp i teorin angående en implementering av IFRS; de har förberett sig bra samt använt rätt resurser. De har dock avvikit genom att inte utvärdera processen när den var klar.

Slutsats: Swedbank satte ihop en central projekt grupp som skötte implementering-en. De identifierade de ändringar som skulle göras och genomförde dessa. De problem som uppstod i processen har sitt ursprung i FVO och IAS 39.


Abstract

Background: An increase in cross-border trade has created a need for a common international accounting language. IASB therefore created a single set of high quality international accounting standards. As of 2005 all companies listed on a regulated market within the EU are mandated to use IASB’s standard IFRSs.

Problem: The process of implementing IFRS is different in different companies. We therefore want to look at the implementation process in Swedbank, the largest bank in Sweden.

Purpose: The purpose of this study is to describe and explain how the process of the change to IFRSs was done within Swedbank and to outline the problems and obstacles that might have occurred when implementing these new standards.

Method: We have done a case study by interviewing people in Swedbank that took part in the implementation process. We have also done an interview with Deloitte to get their views on a IFRSs implementation process.

Analysis: Our analysis is based on our empirical findings in comparison with our theoretical framework. We found that Swedbank did most of the steps described in the theoretical framework regarding the implementation process; they prepared themselves well and choose the right resources to do so. The deviating step is that no evaluation was done afterwards.

Conclusion: Swedbank used a project group to handle the implementation process. They identified the changes that had to be done and did the change to IFRS. The problems and obstacles that occurred were due to FVO and IAS 39.

Стилі APA, Harvard, Vancouver, ISO та ін.
6

Vidal, Sandoval Jesus Enrique. "Implicit IDA-PBC Design and Implementation for a Portal Crane System." Master's thesis, Pontificia Universidad Católica del Perú, 2019. http://hdl.handle.net/20.500.12404/15353.

Повний текст джерела
Анотація:
Interconnection and damping assignment passivity-based control (IDA-PBC) is a wellknown technique which regulates the behavior of nonlinear systems, assigning a target port-Hamiltonian (pH) structure to the closed-loop. In underactuated mechanical systems (UMSs) its application requires the satisfaction of matching conditions, which in many cases demands to solve partial differential equations (PDEs). Only recently, the IDA-PBC has been extended to UMSs modeled implicitly, where the system dynamics in pH representation are described by a set of differential-algebraic equations (DAEs). In some system classes this implicit approach allows to circumvent the PDE problem and also to design an output-feedback law. The present thesis deals with the design and implementation of the total energy shaping implicit IDA-PBC on a portal crane system located at the laboratory of the Control Engineering Group at TU-Ilmenau. The implicit controller is additionally compared with a simplified (explicit) IDA-PBC [1]. This algorithm shapes the total energy and avoids the PDE problem. However, this thesis reveales a significant implementation flaw in the algorithm, which then could be solved.
Interconnection and damping assignment passivity-based control (IDA-PBC) ist eine wohlbekannte Methode zur Regelung von nichtlinearen Systemen, die im geschlossenen Regelkreis eine gewünschte Port-Hamiltonian-Struktur (pH) haben. Die Anwendung auf unteraktuierte mechanische Systeme (UMS) erfordert die Erfüllung von sogenannten Matching Conditions, die meistens die Lösung partieller Differentialgleichungen (PDE) benötigt. Erst kürzlich wurde die IDA-PBC auf implizit modellierte UMS erweitert, bei denen die Systemdynamik in pH-Darstellungen durch Differentialalgebraische Gleichungen (DAE) beschrieben wird. Dieser implizite Ansatz ermöglicht bei einigen Systemklassen, das PDE-Problem zu umgehen und auch eine Ausgangsrückführung zu entwerfen. Die vorliegende Masterarbeit beschäftigt sich mit dem Entwurf und der Implementierung des impliziten IDA-PBC zur Gesamtenergievorgabe auf einem Portalkransystem im Labor des Fachgebiets Regelungstechnik der TU-Ilmenau. Der implizite Regler wird mit einem vereinfachten (expliziten) IDA-PBC verglichen [1]. Dieser Algorithmus gibt ebenso die Gesamtenergie vor und vermeidet das PDE-Problem. In der Masterarbeit wird in diesem Algorithmus ein wesentlicher Implementierungsfehler offengelegt und behoben.
Tesis
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Aronsson, Robert, and Martin Högberg. "IAS 40 : The effects of the implementation of IAS 40 for listed investment property companies within the European Union." Thesis, Jönköping University, JIBS, Accounting and Finance, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-7767.

Повний текст джерела
Анотація:

Background: The increased globalization and trade over domestic borders within the European Union (EU) has lead to the implementation of new international accounting standards. This is necessary to create an effective capital market, where comparisons between companies located in different countries can be made, due to a more harmonized accounting. Obstacles to overcome when establish a more harmonized accounting in the EU is for example different accounting backgrounds and valuation methods.

Purpose: The purpose of the thesis is to as far possible study whether the establishment of IAS 40 contributes to an increased harmonization and more comparable accounting of investment property for listed companies within the EU.

Method: This thesis involves both a quantitative –and a qualitative research method. We have used primary data in forms of interviews, and secondary data in forms of annual reports, regulations, literature and articles in the thesis. Using both primary –and secondary data results in a higher reliability and validity.

Frame of reference: There are two alternative valuations methods according to IAS 40, the cost –and the fair value model. The cost model means a valuation to historical cost minus depreciation. Valuation in compliance to the fair value model on the other hand means that the investment property shall be valuated to market value. When using the cost model a note of the fair value shall be included in the financial statement. A company has according to IAS 40 the possibility to choose between internal –or external valuation when estimating the fair value.

Empirical results and analysis: Our empirical result is presented mainly through annual reports from listed investment property companies in Sweden, England and Germany. We found that the fair value model was used by all the analysed companies in Sweden and England in 2005, the year of the implementation of IAS 40 in the EU. By analysing the annul reports from the investment property companies we found indications that the fair value model also tends to become the generally excepted valuation model in Germany. Furthermore, our empirical result shows that a majority of the Swedish investment property companies regularly used internal valuation, but there is a pattern of external valuation as a complement to the internal valuation. In England and Germany all investment property companies used external valuation and there was no use of internal valuation even as a complement to the external valuation.

Conclusions: Based on our empirical results we draw the conclusion that the accounting for listed investment property companies within the EU is more harmonized and comparable today than before the implementation of IAS 40 in 2005. However, IAS 40 gives the companies the possibility to decide weather to use the cost –or the fair value model and the use of external valuation is optional. This can be viewed as obstacles to achieve a total harmonization of the accounting within the EU for listed investment property companies. From our empirical findings we draw the conclusion that the fair value model tends to become the generally excepted valuation model within the EU. Also, we do not perceive the use of the cost model as a barrier to the harmonization process because the fair value still has to be left in a not in the financial statement. However, we believe that in order to achieve a more harmonized and more comparable accounting for listed investment property companies within in the EU a directive about a minimum of external valuation must be included in IAS 40. This in order to avoid companies to use only internal valuation of the properties as this may effect the result.

Стилі APA, Harvard, Vancouver, ISO та ін.
8

ABDULLAEV, ZAFAR. "The IAS 41 "Agriculture" and Accounting Regulatory Policies in Uzbekistan, Possible Implementation." Doctoral thesis, Università degli studi di Genova, 2018. http://hdl.handle.net/11567/930835.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Görgin, Robert, and Sergejs Gogolis. "Implementation of IAS 36 by Swedish Banks : Interest Rate Swaps in Hedging Applications." Thesis, Jönköping University, JIBS, Business Administration, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.

Повний текст джерела
Анотація:

In 2005, all groups listed on European stock exchanges are required to prepare their consolidated financial statements according to International Financial Reporting Standards (IFRS). IFRS are different from local regulations across Europe in many aspects, and observers expect the transition process thorny and resource-draining for the companies that undertake it.

The study explores transition difficulties by Swedish bank groups on the way of implementing IAS 39, Financial Instruments: Recognition and Measurement. Deemed the most controversial and challenging standard for adoption by the financial sector, it indeed poses new demandson classification, recognition and measurment of financial instruments, and sets out new hedge accounting rules, previously unseen in Swedish practice. Additionaly, the structure of bank's balance sheets makes IAS 39 also the central one among all other standards in terms of numbers of balance sheet items it impacts.

The study uses qualitative method to explore whether transition to IAS 39 is likely to improve transparency in reporting derivatives. Focus is on use of interest rate swaps as hedging instruments in mitigation of interest rate risk.

It is concluded that differences between two reporting frameworks have been well understood by the banks early in the implementation process. A negative feature of the standard is increased volatility in earnings as a result of more wide-spread reliance on fair value measurement method. This accounting volatility impedes comparability of performance results, as well as conceals true efficiency of economic hedge relationships. To some degree, the volatility can be minimized by the application of hedge accounting. However, a bank must methodically follow a set of rigourous if hegde accounting is to be adopted. Fair value is a more straightforward alternative to hedge accounting , but it brings in additional concerns, and has not yet been endorsed in the EU.

It is additionally argued that recognition of all derivatives on BS and measurement at fair value are two important features of IAS 39 that indeed increases reporting transparency by minimizing risk of undisclosed hidden losses.

Стилі APA, Harvard, Vancouver, ISO та ін.
10

Görgin, Robert, and Sergejs Gogolis. "Implementation of IAS 39 by Swedish Banks : Interest Rate Swaps in Hedging Applications." Thesis, Jönköping University, IHH, Företagsekonomi, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.

Повний текст джерела
Анотація:
In 2005, all groups listed on European stock exchanges are required to prepare their consolidated financial statements according to International Financial Reporting Standards (IFRS). IFRS are different from local regulations across Europe in many aspects, and observers expect the transition process thorny and resource-draining for the companies that undertake it. The study explores transition difficulties by Swedish bank groups on the way of implementing IAS 39, Financial Instruments: Recognition and Measurement. Deemed the most controversial and challenging standard for adoption by the financial sector, it indeed poses new demandson classification, recognition and measurment of financial instruments, and sets out new hedge accounting rules, previously unseen in Swedish practice. Additionaly, the structure of bank's balance sheets makes IAS 39 also the central one among all other standards in terms of numbers of balance sheet items it impacts. The study uses qualitative method to explore whether transition to IAS 39 is likely to improve transparency in reporting derivatives. Focus is on use of interest rate swaps as hedging instruments in mitigation of interest rate risk. It is concluded that differences between two reporting frameworks have been well understood by the banks early in the implementation process. A negative feature of the standard is increased volatility in earnings as a result of more wide-spread reliance on fair value measurement method. This accounting volatility impedes comparability of performance results, as well as conceals true efficiency of economic hedge relationships. To some degree, the volatility can be minimized by the application of hedge accounting. However, a bank must methodically follow a set of rigourous if hegde accounting is to be adopted. Fair value is a more straightforward alternative to hedge accounting , but it brings in additional concerns, and has not yet been endorsed in the EU. It is additionally argued that recognition of all derivatives on BS and measurement at fair value are two important features of IAS 39 that indeed increases reporting transparency by minimizing risk of undisclosed hidden losses.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "IDS IMPLEMENTATION"

1

R, Nestor John, ed. IDL: The language and its implementation. Englewood Cliffs, N.J: Prentice Hall, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

R, Nestor John, ed. IDL: The language and its implementation. Englewood Cliffs, N.J: Prentice Hall, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

McElreath, T. Jack. IMS design & implementation techniques. 2nd ed. Wellesley, Mass: QED Information Sciences, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

International Business Machines Corporation. International Technical Support Organization, ed. IBM IMS version 10 implementation guide: A technical overview. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bahgat, Ahmad. International accounting standards--IAS 39 accounting for financial instruments: Implementation issues and decision-making dilemma. Abidjan, Côte d'Ivoire: African Development Bank, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lipski, Stanislav, Aleksandr Sizov, and Yuriy Cypkin. Implementation of cadastral relations. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1866814.

Повний текст джерела
Анотація:
The textbook examines how the development of cadastral relations took place in our country and abroad, which related cadastres and registers interacting with the unified state Register of Real estate (EGRN) are currently being conducted, how these relations are regulated in the norms of current legislation, what is the status, structure and principles of maintaining the EGRN, how its information is provided and how it is corrected errors in his records. The issues related to the cadastral registration of real estate objects and the registration of rights to them, the system of bodies and persons entrusted with their implementation, the status of cadastral engineers and the specifics of their work, the cadastral assessment, as well as liability for offenses in this area are disclosed. The study of the material presented in the manual will allow you to master the competencies provided for by the relevant federal state educational standards of secondary vocational education of the last generation, and will ensure the formation of a systematic perception of cadastral relations among students. For college students studying in the specialty 21.02.05 "Land and property relations".
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Polischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.

Повний текст джерела
Анотація:
The tutorial is devoted to the implementation of relational databases. Its purpose is to master the basic principles of design, implementation, maintenance and information security of databases. The manual includes tasks for laboratory work, control questions and tests for self-examination. Meets the requirements of the Federal state educational standards of higher education of the last generation. For students of higher educational institutions of all specialties and areas of training, interested in the design, implementation and security of databases.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

World Bank. Africa--South Central & Indian Ocean Department. Human Development 1. Implementation completion report (IDA-31360) on a credit in the amount of US$66 million to the Republic of Malawi for a second social action fund project. Washington, D.C?]: Human Development 1, Country Dept. 3, Africa Region, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mironova, Svetlana. The doctrine of the financial and legal status of municipalities in the Russian Federation and its implementation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1819040.

Повний текст джерела
Анотація:
The monograph forms the doctrine of the financial and legal status of municipalities and identifies the features of its implementation in the Russian Federation at the present stage. The structure of the financial and legal status of the municipality as a whole is comprehensively presented, its elements are defined, their detailed characteristics are given; the features of the implementation of the financial and legal status of certain types of municipalities (urban and municipal districts, municipal districts, urban and rural settlements, etc.), those of them that have a special legal status (single-industry towns, BUT, science towns) or are located on the territory with a special economic status (territories of advanced socio-economic development, the free port of Vladivostok), as well as within the framework of inter-municipal cooperation and the development of urban agglomerations are indicated; a system of guarantees for the implementation by municipalities is established its financial and legal status. Particular attention is paid to the disclosure of the social block of the financial and legal status of municipalities, represented by the mechanism of citizens' participation in the financial activities of municipalities, including the involvement of citizens in the budget process at the municipal level and the implementation of public financial control over local finances. For researchers, teachers, postgraduates and law students, employees of public authorities and local self-government.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Andrichenko, Lyudmila, A. Postnikov, L. Vasil'eva, Zh Gaunova, E. Nikitina, and Inna Plyugina. Reform of the organization of public power: the main directions of implementation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1839416.

Повний текст джерела
Анотація:
The monograph examines topical issues of reforming the organization of public power in our country in connection with the adoption in 2020 of the Law on Amendments to the Constitution of the Russian Federation. The logic of changes in the organization of public power and the directions of concretization of constitutional values, taking into account the laws of the development of the constitutional system of Russia, are revealed. The most significant characteristics of the updated model of interaction of federal public authorities in accordance with the principle of separation of powers are identified, the trends of constitutional transformations in the spheres of federal relations and local self-government, ensuring the fulfillment by public authorities of international obligations of the Russian Federation are investigated. Particular attention is paid to the development of the legal mechanism of interaction between public authorities and civil society. The authors of the book take into account the results of legislative support for the reform of public power in 2020-2021, a forecast assessment of the implementation of the relevant constitutional and legislative novelties is given, including taking into account the existing legal risks. Solutions are proposed to a number of legal issues of legislative regulation of public power, which can increase the efficiency of its functioning. For researchers, teachers, students and postgraduates, deputies of representative authorities, state and municipal employees, as well as anyone interested in constitutional law issues.
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "IDS IMPLEMENTATION"

1

Prinz, Wolfgang, Thomas Rose, and Nils Urbach. "Blockchain Technology and International Data Spaces." In Designing Data Spaces, 165–80. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_10.

Повний текст джерела
Анотація:
AbstractThe core objective of the concept of International Data Spaces (IDS) is to enable controlled exchange and sharing of data between organizations, regardless of the type of data. Sharing of data will generate services that become an asset while data providers maintain their sovereignty. IDS furnish a technology enabler for implementing data economies to exchange data and knowledge, which are according to usage policies. Thus, data turns into an economic asset. However, once data have been provided toward IDS, sovereignty of data owners is of pivotal importance, as well as the question of its use and the transfer of incentives to providers. At this point, blockchain technology enters the ballpark. It is instrumental for the implementation and operation of clearing houses as trading platform for data provision and knowledge utilization. The aim of this chapter is to examine and discuss the role of blockchain for IDS. Next to general blockchain foundations and potentials, blockchain’s specific potential for IDS is discussed and its application is demonstrated by four compelling use cases.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jingang, Li, Liu Shibin, and Liu Wei. "The Design and Implementation of the IDS Catalogue Data Archive System." In Advances in Intelligent and Soft Computing, 837–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27334-6_99.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Pampus, Julia, Brian-Frederik Jahnke, and Ronja Quensel. "Evolving Data Space Technologies: Lessons Learned from an IDS Connector Reference Implementation." In Lecture Notes in Computer Science, 366–81. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

O’Brien, Martin A., David Mohally, Götz P. Brasche, and Andrea G. Sanfilippo. "Huawei and International Data Spaces." In Designing Data Spaces, 451–69. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_27.

Повний текст джерела
Анотація:
AbstractIn a digitalized and deeply interconnected industrial ecosystem, it is of paramount importance to create mechanisms that seamlessly guarantee standardization and verifiability, interoperability (including regional legislation), transparency, and trustworthiness, in particular in the intermediation of all businesses and stakeholders, including SMEs. In this respect, the International Data Spaces and GAIA-X initiatives pave the way to a framework for collaboration that use secure and trusted data services to safeguard digital sovereignty.Huawei is a leading ICT provider, operating in more than 170 countries, and an active member of more than 600 standardization bodies and industry associations, among them IDS and GAIA-X. With their international footprint, IDS and GAIA-X are of the utmost importance for Huawei in Germany, Europe, and globally. Here, we provide a brief overview of our understanding of the data ecosystem’s inherent issues, and how regulations address them, followed by more specific examples of how IDS and GAIA-X objectives can be supported by Huawei, with emphasis on validating concepts in the manufacturing domain as a prominent reference example for an important European market vertical. We illustrate the use case of an evolved implementation of Industry 4.0 that integrates machines and cloud services. 5G connectivity for trusted networked production is added to the example. We finally highlight the use of GAIA-X compliant federated AI for control, maintenance, and match-making of demand and supply actors.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Raja, K., and M. Lilly Florence. "Implementation of IDS Within a Crew Using ID3Algorithm in Wireless Sensor Local Area Network." In Inventive Computation Technologies, 467–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_52.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Priyalakshmi, V., and R. Devi. "Analysis and Implementation of Normalisation Techniques on KDD’99 Data Set for IDS and IPS." In Proceedings of International Conference on Data Science and Applications, 51–70. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6634-7_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wadiai, Younes, Yousef El Mourabit, and Mohammed Baslam. "Machine Learning for Intrusion Detection: Design and Implementation of an IDS Based on Artificial Neural Network." In Advances in Intelligent Systems and Computing, 206–16. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73603-3_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mehrotra, Latika, Prashant Sahai Saxena, and Nitika Vats Doohan. "Implementation of Modified ID3 Algorithm." In Information and Communication Technology for Sustainable Development, 55–60. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3932-4_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Elliott, Kim S. "Industrial Building Systems (IBS) Project Implementation." In Modernisation, Mechanisation and Industrialisation of Concrete Structures, 61–124. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118876503.ch2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Jeong, Eunseon, Junyoung Park, Minseong Kim, Chanmin Kim, Soyoung Jung, and Kangbin Yim. "ICS Testbed Implementation Considering Dataset Collection Environment." In Lecture Notes in Networks and Systems, 397–406. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61108-8_39.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "IDS IMPLEMENTATION"

1

Varanasi, Venkata Ramani, and Shaik Razia. "CNN Implementation for IDS." In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. http://dx.doi.org/10.1109/icac3n53548.2021.9725426.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Mofidi, Farhad, Sena Hounsinou, and Gedare Bloom. "L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks." In IoTDI '23: International Conference on Internet-of-Things Design and Implementation. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3576842.3589170.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sharma, Anshu, and Monika Sharma. "Analysis and implementation of BRO IDS using signature script." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489563.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Elhak, Messaoud Dhia, Zitouni Abdelkader, Djezzar Boualem, Benabdelmoumene Abdelmadjid, and Zatout Boumediene. "Fast Ids – Vgs Technique Implementation for NBTI Characterization." In 2020 International Conference on Electrical Engineering (ICEE). IEEE, 2020. http://dx.doi.org/10.1109/icee49691.2020.9249809.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mohamed, Yasir Abdelgadir, and Azween B. Abdullah. "Implementation of IDS with response for securing MANETs." In 2010 International Symposium on Information Technology (ITSim 2010). IEEE, 2010. http://dx.doi.org/10.1109/itsim.2010.5561608.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Saheed, Y. K., R. D. Magaji, A. Tosho, and O. B. Longe,. "Adopting Machine Learning Blockchain Intrusion Detection for Protecting Attacks on Internet of Things." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p30.

Повний текст джерела
Анотація:
Intrusion Detection Systems (IDSs) are widely used in various computer networks with the goal of spotting cyber threats and potential incidents. Collaborative intrusion detection networks (CIDSs) have been developed to augment the detection power of a single IDS by allowing IDS nodes to exchange data. The Internet of Things (IoT) can be thought of as a network or connectivity of sensors and actuators that share data in a unique way. Blockchain technology has been applied in a variety of fields to foster trust and data protection by enabling participants to trade transactions and communicate information while preserving a level of trust, integrity, and greater transparency. However, there are numerous security concerns associated with the implementation architectures and technologies that will form the Internet of Things' backbone. Hence, this paper proposes a machine learning technique leveraging on blockchain technology with IDS for detecting attacks on IoT. In this paper, we used Naïve Bayes (NB), K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) models for performing the experiment on NSLKDD dataset. The experimental findings for KNN model achieved 99.6% detection rate with a false alarm rate of 0.4. The NB and SVM models also gave competitive results. Keywords: Machine Learning, Blockchain, Intrusion Detection System, Internet of Things, K-Nearest, Online Safety, Neighbor, Collaborative IDS
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Shrivastava, Utpal, and Neelam Sharma. "Feature Selection and Implementation of IDS using Boosting algorithm." In 2020 International Conference on Computational Performance Evaluation (ComPE). IEEE, 2020. http://dx.doi.org/10.1109/compe49325.2020.9200072.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

"ANALYSIS, DESIGN AND IMPLEMENTATION OF IDS USING DATA MINING." In 4th International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001516100810086.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ma, Fang, Mingyi Duan, and Yajun Yang. "The research and implementation of an improved IPv6 IDS." In International Conference on Electrical and Electronics Engineering. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/iceee140061.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Vaid, Chetna, and Harsh K. Verma. "Anomaly-based IDS implementation in cloud environment using BOAT algorithm." In 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions). IEEE, 2014. http://dx.doi.org/10.1109/icrito.2014.7014762.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "IDS IMPLEMENTATION"

1

Michelitsch, Roland, Odette Maciel, Claudia Figueroa, Regina Legarreta, Melanie Putic, and Alejandro Ahumada. Management’s Implementation of OVE Recommendations: IDB Group’s Evaluation Recommendation Tracking System. Inter-American Development Bank, July 2019. http://dx.doi.org/10.18235/0002182.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Prince, Zachary M., Jean C. Ragusa, and Yaqi Wang. Improved Quasi-Static Method: IQS Method Implementation for CFEM Diffusion in Rattlesnake. Office of Scientific and Technical Information (OSTI), February 2016. http://dx.doi.org/10.2172/1261241.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Frost, Sandra, Nigel Lawrence, and William Humbert. Implementation and Demonstration of P4 Software for Improving ICS Protocol Visibility and Control. Office of Scientific and Technical Information (OSTI), January 2023. http://dx.doi.org/10.2172/1909544.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sembler, Jose Ignacio, Regina Legarreta, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, et al. Approach Paper: Evaluation of IDB Invest. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004463.

Повний текст джерела
Анотація:
This approach paper defines the objectives, scope, and methodology for the evaluation of IDB Invest by the Office of Evaluation and Oversight (OVE). At the 2015 annual meeting in Busan, the Boards of Governors of the Inter-American Development Bank (IDB) and the Inter-American Investment Corporation (IIC) decided to consolidate the IDB Group's private sector operations into the IIC. This decision was accompanied by a US$2.03 billion capital increase for the IIC over a 10-year period (2016-2025). This process of consolidation and capitalization, known as the private sector merge-out, took effect on 1 January 2016. In 2017, OVE completed a midterm review of implementation of the private sector merge-out to identify emerging lessons that might be helpful in completing the merge-out. In November 2017, the IIC was rebranded as IDB Invest. At the request of the Boards of Executive Directors of the IDB and IDB Invest, this evaluation was included in OVE's 2021-2022 work program. The Busan Resolution set forth a “Renewed Vision” for promoting development through the private sector. This Renewed Vision provides a long-term framework (2016-2025) for IDB Invest and focuses on strengthening development effectiveness, development impact, and additionality of operations, as well as maximizing the efficient use of resources and synergies between the IDB Group's public and private sector activities. The merge-out was selected as the way to implement this Renewed Vision. The challenges posed by the COVID-19 health crisis, as well as current discussions on the need to pursue a new business model for the institution and its financial and operational implications, make this an ideal moment to take stock of lessons learned and provide input for future discussions at the corporate level. Against this backdrop, this evaluation seeks to report independently to the Boards of Executive Directors of the IDB and IDB Invest on the effectiveness of the implementation to date of the Renewed Vision that gave rise to the creation of IDB Invest. This evaluation will also use the findings of OVE's 2017 midterm review of implementation of the merge-out to further analyze areas that had not yet matured at that time (e.g., finance, operations management, development effectiveness, etc.). The evaluation will cover the period from January 2016 (when the merge-out took effect) to December 2021.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sembler, Jose Ignacio, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, Diego Del Pilar, et al. Corporate Evaluation: Evaluation of IDB Invest. Inter-American Development Bank, July 2023. http://dx.doi.org/10.18235/0005014.

Повний текст джерела
Анотація:
At the 2015 annual meeting in Busan, the Boards of Governors of the Inter-American Development Bank (IDB) and the Inter-American Investment Corporation (IIC) decided to consolidate the IDB Group's private-sector operations into the IIC. This process of consolidation and capitalization, known as the private sector merge-out, took effect on 1 January 2016. The Busan Resolution set forth a “Renewed Vision” for promoting development in the region through the private sector. This Renewed Vision provides a long-term framework (2016-2025) for IDB Invest and focuses on the objectives of: (i) strengthening effectiveness and additionality; (ii) maximizing synergies between the public and private sectors; and (iii) maximizing the efficient use of resources and ensuring long-term financial sustainability. This evaluation seeks to independently assess and report on the effectiveness of the implementation to date of the Renewed Vision, aimed at promoting development in the region through the private sector. Specifically, the general question that the evaluation aims to answer is the following: To what extent is IDB Invest on its way to achieving the end objectives set out in the Renewed Vision? To that end, the Office of Evaluation and Oversight (OVE) used a combination of complementary methods, including a review of strategic and corporate documents, financial and portfolio analyses, interviews and surveys, and documentary analyses of a sample of operations. This evaluation covers the 2016-2021 period and uses as reference the findings in OVE's 2017 midterm review of implementation of the merge-out to further analyze areas that had not yet matured at that time. The evaluation was also guided by a reference framework that linked the objectives of the Renewed Vision to the main activities and initiatives undertaken thus far to help achieve those objectives.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Bouillon, César P., Maria Fernanda Rodrigo, Michelle Infanzón, Henry Dyer, and Sumiko Andrade Sakaguchi. Approach Paper: IDB Support to Strengthen Public Sector Transparency and Integrity in Latin America and the Caribbean. Inter-American Development Bank, April 2021. http://dx.doi.org/10.18235/0003248.

Повний текст джерела
Анотація:
As part of its 2020-2021 work program, the Office of Evaluation and Oversight (OVE) will conduct an evaluation of the Inter-American Development Bank efforts to strengthen public sector transparency and integrity (T&I) in Latin America and the Caribbean since 2010. The evaluation aims at takings stock of IDB activities in the area of Transparency and Integrity between 2010 and 2019 and at extracting insights from the implementation of these activities. The evaluation will also provide insights for country dialogue and the prioritization and design of future IDB activities and operations to support public sector transparency and integrity in the region.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Li, Meng Hua, ed. Smart Manufacturing: National Implementation Framework. Asian Productivity Organization, March 2022. http://dx.doi.org/10.61145/getj1519.

Повний текст джерела
Анотація:
APO has brought out this publication at a time when smart manufacturing is being recognized as a key leverage for raising productivity growth, more so after the pandemic-induced degrowth and slowdown. With some members that are already at an advanced level of smart manufacturing adoption, it is time for other APO member economies to accelerate. From policymaking at the national level to crafting strategies at the enterprise level, this publication offers a multitude of frameworks and implementation plans that the stakeholders can adapt and use.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jahromi, Maryam Eslami, and Haleh Ayatollahi. Utilization of telehealth to manage the Covid-19 pandemic in low and middle income countries: a scoping review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, August 2022. http://dx.doi.org/10.37766/inplasy2022.8.0004.

Повний текст джерела
Анотація:
Review question / Objective: How was telehealth utilized to manage the Covid-19 pandemic in low and middle income countries? Rationale: Low- and middle-income countries (LMICs) often experienced significant challenges in providing telehealth interventions due to limited resources and technology. A review of the literature shows that a small number of LMICs changed their management strategies during the Covid-19 pandemic and moved towards using telehealth. There is a lack of evidence about the practical implementation of telehealth in LMICs. As a result, the present study aimed to review the utilization of telehealth to manage the Covid-19 pandemic in low- and middle-income countries focusing on implementations. In this study, how to implement telehealth in LMICs in response to the COVID-19 pandemic, including telehealth platforms used, the impact, pros and barriers encountered in implementation and adoption of telehealth interventions, are reviewed. The implementation of telehealth systems in different LMICs may pose both similar and different challenges. The lessons learned from this study can be useful for improving implementation of digital health interventions including LMICs in different countries.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Sharples, Jonathan, Dan Bristow, Emma Taylor-Collins, and Eleanor McKillop. What Works Network Implementation Project. Wales Centre for Public Policy - Cardiff University, April 2022. http://dx.doi.org/10.54454/20220411.

Повний текст джерела
Анотація:
Building on our work to increase the impact of the What Works network across the UK, the Wales Centre for Public Policy won funding from the ESRC to work with Professor Jonathan Sharples at EEF and other What Works Centres to apply the latest thinking and evidence on implementation – how evidence is used in decision making – to the What Works network. What Works Centres face similar challenges on implementation, and the principles, evidence and strategies that underpin effective implementation are often transferrable across different fields. The project looked at developing a common infrastructure for implementation across the network, including shared language, models, guidance, tools and capacity.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tokarieva, Anastasiia V., Nataliia P. Volkova, Inesa V. Harkusha, and Vladimir N. Soloviev. Educational digital games: models and implementation. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3242.

Повний текст джерела
Анотація:
Nowadays, social media, ICT, mobile technologies and applications are increasingly used as tools for communication, interaction, building up social skills and unique learning environments. One of the latest trends observed in education is an attempt to streamline the learning process by applying educational digital games. Despite numerous research data, that confirms the positive effects of digital games, their integration into formal educational contexts is still relatively low. The purpose of this article is to analyze, discuss and conclude what is necessary to start using games as an instructional tool in formal education. In order to achieve this aim, a complex of qualitative research methods, including semi-structured expert interviews was applied. As the result, the potential of educational digital games to give a unique and safe learning environment with a wide spectrum of build-in assistive features, be efficient in specific training contexts, help memorize studied material and incorporate different learning styles, as well as to be individually adaptable, was determined. At the same time, the need for complex approach affecting the administration, IT departments, educators, students, parents, a strong skill set and a wide spectrum of different roles and tasks a teacher carries out in a digital game-based learning class were outlined. In conclusion and as a vector for further research, the organization of Education Design Laboratory as an integral part of a contemporary educational institution was proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії