Academic literature on the topic 'Data Manipulation and Integrity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Manipulation and Integrity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data Manipulation and Integrity"

1

Apurva, Shelke* Aditi Shinde Samruddhi Shinde Karan Shinde Saurabh Shinde S. D. Mankar. "Data Integrity in Pharmaceutical Sciences." International Journal of Pharmaceutical Sciences 3, no. 4 (2025): 1142–48. https://doi.org/10.5281/zenodo.15185271.

Full text
Abstract:
The abstract highlights the importance of data integrity, especially in the pharmaceutical industry. It emphasizes that accurate and reliable data is essential for organizational stability and performance. The ALCOA principles (Attributable, Legible, Contemporaneous, Original, and Accurate) are recommended by regulatory bodies like the USFDA to ensure data integrity. Violations can occur due to data manipulation, inadequate procedures, or shared accounts. A study found that most breaches occurred in quality control (QC), with China and India having the highest number of violations. The study u
APA, Harvard, Vancouver, ISO, and other styles
2

Service, R. F. "RESEARCH INTEGRITY: Pioneering Physics Papers Under Suspicion for Data Manipulation." Science 296, no. 5572 (2002): 1376–77. http://dx.doi.org/10.1126/science.296.5572.1376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sreevibhu, Sagi, and Teendra Pavan Kumar. "Application of Integrated RSA Encryption in Remote Data Integrity Check." Journal of Research in Science and Engineering 6, no. 8 (2024): 32–37. http://dx.doi.org/10.53469/jrse.2024.06(08).08.

Full text
Abstract:
Cloud computing storage services offer a convenient means of maintaining and managing large volumes of data at a minimal cost. However, they do not guarantee data integrity. Data is transferred to remote cloud servers that may be unsafe or untrustworthy, raising the risk of unauthorized manipulation by external entities or unintentional modification by service providers. Protecting data from potential hackers has thus become imperative to safeguard its integrity. To address this challenge, the paper proposes an Enhanced Data Integrity technique tailored for cloud computing environments. As par
APA, Harvard, Vancouver, ISO, and other styles
4

Eka Mayasari and Sri Trisnaningsih. "Case Study: Manipulation of Financial Reports at PT. Adisarana Wanaartha Life Insurance (Wanaartha Life)." Formosa Journal of Applied Sciences 2, no. 10 (2023): 2541–50. http://dx.doi.org/10.55927/fjas.v2i10.6578.

Full text
Abstract:
This research aims to determine violations in professional ethics both from public accountants and from related parties. Violations committed by accountants can undermine the nature and integrity of accounting. When there are violations involving data manipulation, misrepresentation, or unethical behavior in accounting practices, it can shake the foundations of the integrity of the profession. The author uses the Expert Opinion Method to analyze what and how violations of the code of ethics for the public accounting profession take place. To identify efforts related to the studies discussed, t
APA, Harvard, Vancouver, ISO, and other styles
5

Ullagaddi, P. "Safeguarding Data Integrity in Pharmaceutical Manufacturing." Journal of Advances in Medical and Pharmaceutical Sciences 26, no. 8 (2024): 64–75. http://dx.doi.org/10.9734/jamps/2024/v26i8708.

Full text
Abstract:
Aims: Comprehensively analyze data integrity challenges in the pharmaceutical industry, analyze regulatory observations, and propose mitigation strategies for ensuring compliance with current good manufacturing practices (cGMP), particularly for electronic data and computerized systems. Study Design: Analysis of regulatory documents, industry-standard guides, and case studies. Methodology: The study involved a comprehensive review of FDA guidance documents, warning letters, and Form 483 observations related to data integrity. Case studies of non-compliance were analyzed to identify common issu
APA, Harvard, Vancouver, ISO, and other styles
6

ARFEEN, RIMSHA. "Detection of Data Manipulation in Datasets Using Machine Learning." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50775.

Full text
Abstract:
Data integrity is pivotal for achieving model performance and delicacy and for making believable opinions in moment's data wisdom and analytics environment. This design enforced and estimated a machine literacy- driven frame that can descry data tampering through a generative analysis of a structured dataset in its original and acclimated countries. By transubstantiating both datasets to match their structure, and calculating a point-full difference vector, the system estimated and linked possible tampering in the acclimated dataset through statistical analysis on named ordered features, simil
APA, Harvard, Vancouver, ISO, and other styles
7

Putra, Ryan Adi, Rizka Ardiansyah, Mohammad Yazdi Pusadan, Anita Ahmad Kasim, and Yuri Yudhaswana Joefrie. "Developing Decentralized Data Storage Network Using Blockchain Technology to Prevent Data Alteration." Advance Sustainable Science, Engineering and Technology 6, no. 1 (2024): 02401017. http://dx.doi.org/10.26877/asset.v6i1.17772.

Full text
Abstract:
In the face of escalating global data exchange, the pronounced vulnerability oftraditional centralized storage networks to manipulation and attacks poses a pressing challenge. Digital service providers, entrusted with vast datasets, grapple with the formidable task of ensuring the security, integrity, and continuous availability of their stored information. This paper tackles these multifaceted issues by proposing a decentralized data storage network empowered by blockchain technology. This approach systematically mitigates the inherent susceptibilities of centralized systems, thereby providin
APA, Harvard, Vancouver, ISO, and other styles
8

Jaiswal, Himani, Muddukrishna B. S., and Girish Pai Kulyadi. "Data Integrity Violations: A Challenge to the Pharmaceutical Industry." International Journal of Pharmaceutical Quality Assurance 11, no. 01 (2020): 196–98. http://dx.doi.org/10.25258/ijpqa.11.1.30.

Full text
Abstract:
Data integrity refers to data reliability throughout the data lifecycle. Terminology “ALCOA” means that the data should be attributable, legible, contemporaneously recorded, original, and accurate. “ALCOA Plus” was introduced later. Violation of the integrity of data is termed as a breach of data integrity. It can take place in various fields, but not limited to manufacturing, quality control (QC), quality assurance (QA), and research. Some of the reasons for breach in data integrity are fabrication or duplication of data, out of specification, out of trend, back-dating, manipulation of data,
APA, Harvard, Vancouver, ISO, and other styles
9

Novianti, Sinta, and Deannes Isynuwardhana. "Pengaruh Komisaris Independen, Leverage, Dan Kepemilikan Institusional Terhadap Integritas Laporan Keuangan." Jurnal Pendidikan Akuntansi & Keuangan 9, no. 1 (2021): 64–73. http://dx.doi.org/10.17509/jpak.v9i1.27003.

Full text
Abstract:
Several cases that occurred in several companies in Indonesia, such as manipulation of financial statements, showed that the integrity of the financial statements presented by the company was still low. To avoid manipulation, it requires concervative accounting practices. This study aims to determine how the influence of independent commissioner variables, leverage, and institutional ownership on the financial statements integrity. This study’s population are all mining sector companies listed on the Indonesia Stock Exchange in 2015-2018. The samples produced were 128 samples using purposive s
APA, Harvard, Vancouver, ISO, and other styles
10

Elwaaey, Hossameldin Ali, and Ahmed Ibrahim Yousef. "Cybersecurity Aspects in Gamification: A Comprehensive Overview." International Journal Of Modern Engineering Research (IJMER) 14, no. 5 (2024): 79–87. https://doi.org/10.5281/zenodo.14048861.

Full text
Abstract:
ABSTRACT: Gamification, the incorporation of game-design elements into non-game contexts, hasemerged as a powerful strategy to enhance user engagement, motivation, and productivity across variousindustries. As gamified systems become increasingly sophisticated and pervasive, particularly within theframework of Industry 4.0, the associated cybersecurity challenges grow in complexity and severity. Thispaper provides a comprehensive analysis of the cybersecurity vulnerabilities inherent in gamified systems,including data privacy concerns, user manipulation risks, and threats to system integrity.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data Manipulation and Integrity"

1

Moss, Ben. "The data integrity problem and multi-layered document integrity." Thesis, University of Nottingham, 2007. http://eprints.nottingham.ac.uk/10538/.

Full text
Abstract:
Data integrity is a fundamental aspect of computer security that has attracted much interest in recent decades. Despite a general consensus for the meaning of the problem, the lack of a formal definition has led to spurious claims such as "tamper proof", "prevent tampering", and "tamper protection", which are all misleading in the absence of a formal definition. Ashman recently proposed a new approach for protecting the integrity of a document that claims the ability to detect, locate, and correct tampering. If determining integrity is only part of the problem, then a more general notion of da
APA, Harvard, Vancouver, ISO, and other styles
2

Putniņš, Tālis J. "Closing price manipulation and the integrity of stock exchanges." University of Sydney, 2010. http://hdl.handle.net/2123/5925.

Full text
Abstract:
Doctor of Philosophy (PhD)<br>Allegations of market manipulation abound in the popular press, particularly during the recent financial turmoil. However, many aspects of manipulation are poorly understood. The purpose of this thesis is to enhance our understanding of market manipulation by providing empirical evidence on the prevalence, effects and determinants of closing price manipulation. The first issue examined in this thesis is the prevalence of closing price manipulation. This thesis uses a hand collected sample of prosecuted closing price manipulation cases from US and Canadian stoc
APA, Harvard, Vancouver, ISO, and other styles
3

Putniņš, Tālis J. "Closing price manipulation and the integrity of stock exchanges." Thesis, The University of Sydney, 2009. http://hdl.handle.net/2123/5925.

Full text
Abstract:
Allegations of market manipulation abound in the popular press, particularly during the recent financial turmoil. However, many aspects of manipulation are poorly understood. The purpose of this thesis is to enhance our understanding of market manipulation by providing empirical evidence on the prevalence, effects and determinants of closing price manipulation. The first issue examined in this thesis is the prevalence of closing price manipulation. This thesis uses a hand collected sample of prosecuted closing price manipulation cases from US and Canadian stock exchanges, and methods that
APA, Harvard, Vancouver, ISO, and other styles
4

Alchazidis, Nikolaos. "Data integrity in RFID systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion-image.exe/06Sep%5FAlchazidis.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S. in Systems Engineering)--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Su, Weilian ; Ha, Tri T. "September 2006." Description based on title screen as viewed on March 12, 2008. Includes bibliographical references (p. 89-91). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Ivan, Thomas R. "Comparison of data integrity models." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/43739.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Data integrity in computer based information systems is a concern because of the damage that can be done by unauthorized manipulation or modification of data. While a standard exists for data security, there currently is not an acceptable standard for integrity. There is a need for incorporation of a data integrity policy into the standard concerning data security in order to produce a complete protection policy. There are several existing models which address data integrity. The Biba, Goguen and Meseguer, and Clark/Wilson data integrit
APA, Harvard, Vancouver, ISO, and other styles
6

Singhal, Rohit. "Data integrity for on-chip interconnects." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5929.

Full text
Abstract:
With shrinking feature size and growing integration density in the Deep Sub- Micron (DSM) technologies, the global buses are fast becoming the "weakest-links" in VLSI design. They have large delays and are error-prone. Especially, in system-onchip (SoC) designs, where parallel interconnects run over large distances, they pose difficult research and design problems. This work presents an approach for evaluating the data carrying capacity of such wires. The method treats the delay and reliability in interconnects from an information theoretic perspective. The results point to an optimal frequenc
APA, Harvard, Vancouver, ISO, and other styles
7

Mallur, Vikram. "A Model for Managing Data Integrity." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20233.

Full text
Abstract:
Consistent, accurate and timely data are essential to the functioning of a modern organization. Managing the integrity of an organization’s data assets in a systematic manner is a challenging task in the face of continuous update, transformation and processing to support business operations. Classic approaches to constraint-based integrity focus on logical consistency within a database and reject any transaction that violates consistency, but leave unresolved how to fix or manage violations. More ad hoc approaches focus on the accuracy of the data and attempt to clean data assets after the f
APA, Harvard, Vancouver, ISO, and other styles
8

Salawu, Olusegun Saheed. "Structural integrity assessment using vibration data." Thesis, University of Plymouth, 1994. http://hdl.handle.net/10026.1/2614.

Full text
Abstract:
Engineering structures need to be assessed as part of activities to ensure their continued serviceability. Global methods of assessment which also give an indication of local conditions are most attractive since they are cost effective and flexible. A suitable method with these attributes is vibration monitoring which involves relating dynamic properties, or changes in them, to the integrity of the assessed structure. The present study investigates the application of vibration testing to structural integrity assessment of civil engineering structures. A survey of existing methods of damage det
APA, Harvard, Vancouver, ISO, and other styles
9

Triebel, Marvin. "Preserving Data Integrity in Distributed Systems." Doctoral thesis, Humboldt-Universität zu Berlin, 2018. http://dx.doi.org/10.18452/19590.

Full text
Abstract:
Informationssysteme verarbeiten Daten, die logisch und physisch über Knoten verteilt sind. Datenobjekte verschiedener Knoten können dabei Bezüge zueinander haben. Beispielsweise kann ein Datenobjekt eine Referenz auf ein Datenobjekt eines anderen Knotens oder eine kritische Information enthalten. Die Semantik der Daten induziert Datenintegrität in Form von Anforderungen: Zum Beispiel sollte keine Referenz verwaist und kritische Informationen nur an einem Knoten verfügbar sein. Datenintegrität unterscheidet gültige von ungültigen Verteilungen der Daten. Ein verteiltes System verändert sich i
APA, Harvard, Vancouver, ISO, and other styles
10

Rahman, Rizwan Tanvir. "Market integrity issues in financial markets." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/12552.

Full text
Abstract:
This dissertation investigates market integrity issues across a range of financial markets. The essays investigate the leakage of information, information asymmetry, market manipulation, and off-market trading across the carbon, equity, and option markets. The study spans across the European Union Emissions Allowances (EUA) futures market, the Australian Securities Exchange (ASX) equity market, and the Australian Securities Exchange (ASX) option market (AOM). The first essay examines the impact of European Union emissions trading scheme (EU ETS) national allocation plan (NAP) announcements o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Data Manipulation and Integrity"

1

Herrero, Rolando, ed. Networking Data Integrity and Manipulation in Cyber-Physical and Communication Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83149-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vojvodić, Mira. Managing data integrity. National Library of Canada = Bibliothèque nationale du Canada, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spector, Phil. Data Manipulation with R. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-74731-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Deardurff, John. T-SQL Data Manipulation. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4993-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dooley, Bill. Ensuring data integrity at Bell Atlantic. Information Management Forum, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Shaoxu, and Lei Chen. Integrity Constraints on Rich Data Types. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-27177-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

J, Thomas Stephen, ed. Asset data integrity is serious business. Industrial Press, Inc., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wilkinson, T. A. WATFILE/Plus data manipulation system tutorial and reference. WATCOM Publications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wilkinson, T. A. WATFILE/Plus data manipulation system tutorial and reference. 3rd ed. WATCOM Publications, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Technology), Invitational Workshop on Data Integrity (1989 National Institute of Standards and. Report of the Invitational Workshop on Data Integrity. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Data Manipulation and Integrity"

1

Herrero, Rolando. "Introduction to Networking Data Integrity and Manipulation in Cyber-Physical and Communication Systems." In Engineering Cyber-Physical Systems and Critical Infrastructures. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83149-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vijayalakshmi K, N. V. S. K., J. Sasikala, and C. Shanmuganathan. "Exposing Manipulation: Deep Learning for Copy-Paste Forgery Detection in Images and Medical Data Integrity." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3725-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dionysopoulos, Lambis. "Historic Overview and Future Outlook of Blockchain Interoperability." In Big Data and Artificial Intelligence in Digital Finance. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94590-9_6.

Full text
Abstract:
AbstractFor three decades, the Bitcoin network processes transactions collectively worth billions in a fully decentralized and trustless way. Its introduction as a way for disintermediating financial institutions came at a time of rising dismay against the establishment due to the financial collapse of 2008. Bitcoin’s rising popularity gave birth to the realization that its underlying technologies could be utilized for other use-cases besides money. This gave rise to imitators, iterators and ultimately a diverse ecosystem of protocols and applications. In most cases, those aforementioned proto
APA, Harvard, Vancouver, ISO, and other styles
4

Müller, Rainer, Ali Kanso, and Fabian Adler. "An Approach to Integrate a Blockchain-Based Payment Model and Independent Secure Documentation for a Robot as a Service." In Annals of Scientific Society for Assembly, Handling and Industrial Robotics 2021. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-74032-0_15.

Full text
Abstract:
AbstractRobots for hire instead of purchase are developing an increasing interest among customers. This article will present a concept developed at ZeMA for the integration of a blockchain-based payment module and manipulation-proof documentation of process-specific data. This should improve the business model of hiring robots not only in terms of technical components but also in terms of economic considerations. In this way, the billing process can be automated to a certain extent, and a legally secure basis with the manipulation-proof storage of process-specific data can be created. The adva
APA, Harvard, Vancouver, ISO, and other styles
5

Seadle, Michael. "Quantifying Image Manipulation." In Quantifying Research Integrity. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-031-02306-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gorman, Tim. "Data Manipulation." In Beginning Oracle SQL. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6557-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

de Haan, Lex, Daniel Fink, Tim Gorman, Inger Jørgensen, and Karen Morton. "Data Manipulation." In Beginning Oracle SQL. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7196-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lafler, Kirk Paul. "Data Manipulation." In Power SAS: A Survival Guide. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-1155-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Venkateshan, S. P. "Data Manipulation." In Mechanical Measurements. John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781119115571.ch15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Venables, W. N., and B. D. Ripley. "Data Manipulation." In Modern Applied Statistics with S. Springer New York, 2002. http://dx.doi.org/10.1007/978-0-387-21706-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data Manipulation and Integrity"

1

Maddhi, Sunitha, Ratnam Dodda, T. Layaraj, and C. Raghavendra. "Safeguarding Log Data Integrity: Employing DES Encryption Against Manipulation Attempts." In 2024 4th International Conference on Intelligent Technologies (CONIT). IEEE, 2024. http://dx.doi.org/10.1109/conit61985.2024.10627320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wong, Sin-Man, Cheng-Shian Lin, and Chien-Chang Chen. "Weather Sensor Data Manipulation Detection." In 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2024. http://dx.doi.org/10.1109/icce-taiwan62264.2024.10674389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Han, Zhijie, Xingbo Xie, Xiaoyu Du, Ying Du, and Xin He. "Blockchain-Based Data Integrity Verification." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhattacharjee, Shameek, Mehrdad Salimitari, Mainak Chatterjee, Kevin Kwiat, and Charles Kamhoua. "Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sakamoto, Junichi, Shungo Hayashi, Daisuke Fujimoto, and Tsutomu Matsumoto. "How to Code Data Integrity Verification Secure Against Single-Spot-Laser-Induced Instruction Manipulation Attacks." In 2020 IEEE/ACS 17th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2020. http://dx.doi.org/10.1109/aiccsa50499.2020.9316521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Loertthiraporn, Thirut, Passaworn Silakorn, Kunachat Witoonsoontorn, Athipkiat Lertthanasart, Suthisak Thepsriha, and Chatchai Laemkhowthong. "Plant Integrity Assurance by the Development and Deployment of Advanced NDE and Digitalization." In International Petroleum Technology Conference. IPTC, 2023. http://dx.doi.org/10.2523/iptc-22869-ms.

Full text
Abstract:
Abstract In the Gulf of Thailand, PTT Exploration and Production are operating 231 platforms. And with facility ages up to 40 years, inspection programs are required to be more rigorous. Conventional inspection concepts, mainly requiring human direct assessment and data manipulation, are labor-intensive and requires facility shutdown for safe access. Therefore, company have been developing and deploying advanced NDE and digitalization to assure integrity with optimum inspection strategies, while keeping operational cost reasonable and avoiding work backlogs. The initiatives of advanced NDE (No
APA, Harvard, Vancouver, ISO, and other styles
7

Zhuo, Fan, Ying He, Fei Yu, Pengteng Li, Zheyi Zhao, and Xilong Sun. "ABM: Attention before Manipulation." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/201.

Full text
Abstract:
Vision-language models (VLMs) show promising generalization and zero-shot capabilities, offering a potential solution to the impracticality and cost of enabling robots to comprehend diverse human instructions and scene semantics in the real world. Existing approaches most directly integrate the semantic representations from pre-trained VLMs with policy learning. However, these methods are limited to the labeled data learned, resulting in poor generalization ability to unseen instructions and objects. To address the above limitation, we propose a simple method called "Attention before Manipulat
APA, Harvard, Vancouver, ISO, and other styles
8

S. Jabor, Maytham, Aqeel Salman Azez, Azhar Hasan Nsaif, Azhar Sabah Abdulaziz, and Worud Mahdi Saleh. "Security Challenges and Threats in Wireless Sensor Networks: A Review." In IX. International Scientific Congress of Pure, Applied and Technological Sciences. Rimar Academy, 2023. http://dx.doi.org/10.47832/minarcongress9-21.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have gained increasing popularity in recent years due to their diverse range of applications. However, owing to their distinctive characteristics—such as limited computational power, energy resources, and a dynamic nature—these networks present unique challenges. Comprising numerous small, lowpower sensor nodes, WSNs are deployed in specific areas to gather and transmit data to a base station or sink node. Nevertheless, they remain susceptible to various security threats. A significant concern in WSNs involves attacks compromising data confidentiality, integrity
APA, Harvard, Vancouver, ISO, and other styles
9

Petronijević, Jovan, Nikola Radić, and Milan Gavrilović. "Dependence on technology and market manipulation as potential risks of using artificial intelligence in finance." In Employment, Education and Entrepreneurship 2024. Faculty of Business Economics and Entrepreneurship, 2024. https://doi.org/10.5937/eee24084p.

Full text
Abstract:
This paper examines two critical risks associated with the increasing use of Artificial Intelligence (AI) in the financial sector: the growing dependence on technology and the potential for market manipulation. As AI becomes more integrated into core financial operations, from algorithmic trading to risk assessment, it brings both unprecedented opportunities and significant challenges. The study highlights how technological dependence exposes financial institutions to risks such as system failures, data breaches, and the erosion of human expertise. It also explores the ways in which sophistica
APA, Harvard, Vancouver, ISO, and other styles
10

Stolicki, Dariusz, Wojciech Słomczyński, and Stanisław Szufa. "Nonparametric Detection of Gerrymandering in Multiparty Plurality Elections." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/329.

Full text
Abstract:
Partisan gerrymandering, i.e., manipulation of electoral district boundaries for political advantage, is one of the major challenges to election integrity in modern day democracies. Yet most of the existing methods for detecting partisan gerrymandering are narrowly tailored toward fully contested two-party elections, and fail if there are more parties or if the number of candidates per district varies. We propose a new method, applying nonparametric statistical learning to detect anomalies in the relation between (aggregate) votes and (aggregate) seats. Unlike in most of the existing methods,
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data Manipulation and Integrity"

1

Burnsides, Dennis, Patrick Files, and Jennifer Whitestone. Integrate 1.28: A Software Tool for Visualizing, Analyzing, and Manipulating Three-Dimensional Data. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada388662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chatterjee, A., and A. Segev. Data manipulation in heterogeneous databases. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/5607873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chatterjee, A., and A. Segev. Data manipulation in heterogeneous databases. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/10130641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rubin, A. Location-Independent Data/Software Integrity Protocol. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fales, J. F., and R. S. Vincent. Datamatrix and PDF417 data integrity test. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/10188706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jaos, Leo, and Davide Braga. Characterization of LVDS Transmission Data Integrity. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1618054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ballard, W. P. xdamp: An IDL{reg_sign}-based Data Manipulation Program. Office of Scientific and Technical Information (OSTI), 1995. http://dx.doi.org/10.2172/62940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Irvine, Cynthia E., and Timothy E. Levin. Data Integrity Limitations in Highly Secure Systems. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada423489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rigotti, Christophe, Patrick Marcel, and Mohand-Saïd Hacid. A Rule-Based Data Manipulation Language for OLAP Systems. Aachen University of Technology, 1997. http://dx.doi.org/10.25368/2022.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wampler, Jason, and Garrett Payer. Blockchain for High Performance Data Integrity and Provenance. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1497843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!