To see the other types of publications on this topic, follow the link: Data Manipulation and Integrity.

Dissertations / Theses on the topic 'Data Manipulation and Integrity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Data Manipulation and Integrity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Moss, Ben. "The data integrity problem and multi-layered document integrity." Thesis, University of Nottingham, 2007. http://eprints.nottingham.ac.uk/10538/.

Full text
Abstract:
Data integrity is a fundamental aspect of computer security that has attracted much interest in recent decades. Despite a general consensus for the meaning of the problem, the lack of a formal definition has led to spurious claims such as "tamper proof", "prevent tampering", and "tamper protection", which are all misleading in the absence of a formal definition. Ashman recently proposed a new approach for protecting the integrity of a document that claims the ability to detect, locate, and correct tampering. If determining integrity is only part of the problem, then a more general notion of da
APA, Harvard, Vancouver, ISO, and other styles
2

Putniņš, Tālis J. "Closing price manipulation and the integrity of stock exchanges." University of Sydney, 2010. http://hdl.handle.net/2123/5925.

Full text
Abstract:
Doctor of Philosophy (PhD)<br>Allegations of market manipulation abound in the popular press, particularly during the recent financial turmoil. However, many aspects of manipulation are poorly understood. The purpose of this thesis is to enhance our understanding of market manipulation by providing empirical evidence on the prevalence, effects and determinants of closing price manipulation. The first issue examined in this thesis is the prevalence of closing price manipulation. This thesis uses a hand collected sample of prosecuted closing price manipulation cases from US and Canadian stoc
APA, Harvard, Vancouver, ISO, and other styles
3

Putniņš, Tālis J. "Closing price manipulation and the integrity of stock exchanges." Thesis, The University of Sydney, 2009. http://hdl.handle.net/2123/5925.

Full text
Abstract:
Allegations of market manipulation abound in the popular press, particularly during the recent financial turmoil. However, many aspects of manipulation are poorly understood. The purpose of this thesis is to enhance our understanding of market manipulation by providing empirical evidence on the prevalence, effects and determinants of closing price manipulation. The first issue examined in this thesis is the prevalence of closing price manipulation. This thesis uses a hand collected sample of prosecuted closing price manipulation cases from US and Canadian stock exchanges, and methods that
APA, Harvard, Vancouver, ISO, and other styles
4

Alchazidis, Nikolaos. "Data integrity in RFID systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion-image.exe/06Sep%5FAlchazidis.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S. in Systems Engineering)--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Su, Weilian ; Ha, Tri T. "September 2006." Description based on title screen as viewed on March 12, 2008. Includes bibliographical references (p. 89-91). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Ivan, Thomas R. "Comparison of data integrity models." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/43739.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Data integrity in computer based information systems is a concern because of the damage that can be done by unauthorized manipulation or modification of data. While a standard exists for data security, there currently is not an acceptable standard for integrity. There is a need for incorporation of a data integrity policy into the standard concerning data security in order to produce a complete protection policy. There are several existing models which address data integrity. The Biba, Goguen and Meseguer, and Clark/Wilson data integrit
APA, Harvard, Vancouver, ISO, and other styles
6

Singhal, Rohit. "Data integrity for on-chip interconnects." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5929.

Full text
Abstract:
With shrinking feature size and growing integration density in the Deep Sub- Micron (DSM) technologies, the global buses are fast becoming the "weakest-links" in VLSI design. They have large delays and are error-prone. Especially, in system-onchip (SoC) designs, where parallel interconnects run over large distances, they pose difficult research and design problems. This work presents an approach for evaluating the data carrying capacity of such wires. The method treats the delay and reliability in interconnects from an information theoretic perspective. The results point to an optimal frequenc
APA, Harvard, Vancouver, ISO, and other styles
7

Mallur, Vikram. "A Model for Managing Data Integrity." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20233.

Full text
Abstract:
Consistent, accurate and timely data are essential to the functioning of a modern organization. Managing the integrity of an organization’s data assets in a systematic manner is a challenging task in the face of continuous update, transformation and processing to support business operations. Classic approaches to constraint-based integrity focus on logical consistency within a database and reject any transaction that violates consistency, but leave unresolved how to fix or manage violations. More ad hoc approaches focus on the accuracy of the data and attempt to clean data assets after the f
APA, Harvard, Vancouver, ISO, and other styles
8

Salawu, Olusegun Saheed. "Structural integrity assessment using vibration data." Thesis, University of Plymouth, 1994. http://hdl.handle.net/10026.1/2614.

Full text
Abstract:
Engineering structures need to be assessed as part of activities to ensure their continued serviceability. Global methods of assessment which also give an indication of local conditions are most attractive since they are cost effective and flexible. A suitable method with these attributes is vibration monitoring which involves relating dynamic properties, or changes in them, to the integrity of the assessed structure. The present study investigates the application of vibration testing to structural integrity assessment of civil engineering structures. A survey of existing methods of damage det
APA, Harvard, Vancouver, ISO, and other styles
9

Triebel, Marvin. "Preserving Data Integrity in Distributed Systems." Doctoral thesis, Humboldt-Universität zu Berlin, 2018. http://dx.doi.org/10.18452/19590.

Full text
Abstract:
Informationssysteme verarbeiten Daten, die logisch und physisch über Knoten verteilt sind. Datenobjekte verschiedener Knoten können dabei Bezüge zueinander haben. Beispielsweise kann ein Datenobjekt eine Referenz auf ein Datenobjekt eines anderen Knotens oder eine kritische Information enthalten. Die Semantik der Daten induziert Datenintegrität in Form von Anforderungen: Zum Beispiel sollte keine Referenz verwaist und kritische Informationen nur an einem Knoten verfügbar sein. Datenintegrität unterscheidet gültige von ungültigen Verteilungen der Daten. Ein verteiltes System verändert sich i
APA, Harvard, Vancouver, ISO, and other styles
10

Rahman, Rizwan Tanvir. "Market integrity issues in financial markets." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/12552.

Full text
Abstract:
This dissertation investigates market integrity issues across a range of financial markets. The essays investigate the leakage of information, information asymmetry, market manipulation, and off-market trading across the carbon, equity, and option markets. The study spans across the European Union Emissions Allowances (EUA) futures market, the Australian Securities Exchange (ASX) equity market, and the Australian Securities Exchange (ASX) option market (AOM). The first essay examines the impact of European Union emissions trading scheme (EU ETS) national allocation plan (NAP) announcements o
APA, Harvard, Vancouver, ISO, and other styles
11

Miklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Johnson, Kevin Russell. "Advancements in Thermal Integrity Profiling Data Analysis." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6520.

Full text
Abstract:
Thermal Integrity Profiling (TIP) is a relatively new non-destructive test method for evaluating the post-construction quality of drilled shafts. Therein anomalies in a shaft are indicated by variations in its thermal profile when measured during the curing stages of the concrete. A considerable benefit with this method is in the ability to detect anomalies both inside and outside the reinforcement cage, as well as provide a measure of lateral cage alignment. Similarly remarkable, early developments showed that the shape of a temperature profile (with depth) matched closely with the shape of t
APA, Harvard, Vancouver, ISO, and other styles
13

Lynch, Kevin John. "Data manipulation in collaborative research systems." Diss., The University of Arizona, 1989. http://hdl.handle.net/10150/184923.

Full text
Abstract:
This dissertation addresses data manipulation in collaborative research systems, including what data should be stored, the operations to be performed on that data, and a programming interface to effect this manipulation. Collaborative research systems are discussed, and requirements for next-generation systems are specified, incorporating a range of emerging technologies including multimedia storage and presentation, expert systems, and object-oriented database management systems. A detailed description of a generic query processor constructed specifically for one collaborative research system
APA, Harvard, Vancouver, ISO, and other styles
14

Dorchak, Susan Fife. "An Investigation of Data Integrity in Ada 95." NSUWorks, 1996. http://nsuworks.nova.edu/gscis_etd/492.

Full text
Abstract:
This dissertation investigates data integrity in Ada 95. The hypothesis presented is that Ada 95 programs must be designed under the control of the programmer in order for data entities to be protected from internal corruption. The designers of the language made a conscious decision to add object-oriented features by extending the existing definitions of Ada 83. While the new implementation provides the object-oriented features of inheritance and polymorphism, the language implementation of these features, along with that of hierarchical libraries, introduce an ambiguity of object-oriented des
APA, Harvard, Vancouver, ISO, and other styles
15

Jenkins, William George. "Real-time vehicle performance monitoring with data integrity." Master's thesis, Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kalibjian, Jeff, and Steven Wierenga. "Assuring Post Processed Telemetry Data Integrity With a Secure Data Auditing Appliance." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604910.

Full text
Abstract:
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Recent federal legislation (e.g. Sarbanes Oxley, Graham Leach Bliley) has introduced requirements for compliance including records retention and records integrity. Many industry sectors (e.g. Energy, under the North American Energy Reliability Council) are also introducing their own voluntary compliance mandates to avert possible additional federal regulation. A trusted computer appliance
APA, Harvard, Vancouver, ISO, and other styles
17

Paolini, Robert. "Data-Driven Statistical Models of Robotic Manipulation." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1217.

Full text
Abstract:
Improving robotic manipulation is critical for robots to be actively useful in realworld factories and homes. While some success has been shown in simulation and controlled environments, robots are slow, clumsy, and not general or robust enough when interacting with their environment. By contrast, humans effortlessly manipulate objects. One possible reason for this discrepancy is that, starting from birth, humans have years of experience to collect data and develop good internal models of what happens when they manipulate objects. If robots could also learn models from a large amount of real d
APA, Harvard, Vancouver, ISO, and other styles
18

Liu, Baolong. "XML security in XML data integrity, authentication, and confidentiality." Thesis, University of Huddersfield, 2010. http://eprints.hud.ac.uk/id/eprint/9671/.

Full text
Abstract:
The widely application of XML has increasingly required high security. XML security confronts some challenges that are strong relating to its features. XML data integrity needs to protect element location information and contextreferential meaning as well as data content integrity under fine-grained security situations. XML data authentication must satisfy a signing process under a dependent and independent multi-signature generation scenario. When several different sections are encrypted within the XML data, it cannot query the encrypted contents without decrypting the encrypted portions. The
APA, Harvard, Vancouver, ISO, and other styles
19

Posse, Oliver, and Ognjen Tomanović. "Evaluation of Data Integrity Methods in Storage: Oracle Database." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10413.

Full text
Abstract:
Context. It is very common today that e-commerce systems store sensitiveclient information. The database administrators of these typesof systems have access to this sensitive client information and are ableto manipulate it. Therefore, data integrity is of core importance inthese systems and methods to detect fraudulent behavior need to beimplemented. Objectives. The objective of this thesis is to implement and evaluatethe features and performance impact of different methods for achievingdata integrity in a database, Oracle to be more exact.Methods. Five methods for achieving data integrity wer
APA, Harvard, Vancouver, ISO, and other styles
20

Vuković, Ognjen. "Data Integrity and Availability in Power System Communication Infrastructures." Licentiate thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122447.

Full text
Abstract:
Society is increasingly dependent on the proper functioning of electric power systems. Today's electric power systems rely heavily on information and networking technology in order to achieve efficient and secure operation. Recent initiatives to upgrade power systems into smart grids target an even tighter integration with information and communication technologies in order to enable the integration of renewable energy sources, local and bulk generation and demand response. Therefore for a proper functioning of smart grids, it is essential that the communication network is secure and reliable
APA, Harvard, Vancouver, ISO, and other styles
21

Clarke, Dwaine E. (Dwaine Errol) 1976. "Towards constant bandwidth overhead integrity checking of untrusted data." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33936.

Full text
Abstract:
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.<br>Includes bibliographical references (leaves 137-140).<br>We present a trace-hash scheme and an adaptive tree-trace scheme to improve the performance of checking the integrity of arbitrarily-large untrusted data, when using only a small fixed-sized trusted state. Currently, hash trees are used to check the data. In many systems that use hash trees, programs perform many data operations before performing a critical operation that exports a result outside of the program's executio
APA, Harvard, Vancouver, ISO, and other styles
22

Glenn, Gregory J., Nhattrieu Duong, and Jason L. Speyer. "Integrity Analysis and Fault Detection of Flight Test Data." International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/605936.

Full text
Abstract:
ITC/USA 2010 Conference Proceedings / The Forty-Sixth Annual International Telemetering Conference and Technical Exhibition / October 25-28, 2010 / Town and Country Resort & Convention Center, San Diego, California<br>Undetected sensor malfunctions during flight testing can lead to cost overruns and program delays. Determining the presence of these faults in a timely manner allows the operator to mitigate their effect. One way to detect these faults is to use a priori knowledge of sensor calibration data and system dynamics to calculate measurement uncertainties. These can then be used to dete
APA, Harvard, Vancouver, ISO, and other styles
23

Davis, Hugh. "Data integrity problems in an open hypermedia link service." Thesis, University of Southampton, 1995. https://eprints.soton.ac.uk/256597/.

Full text
Abstract:
A hypermedia link service is system which stores the information describing hypertext links in a database which is separate from the data content over which the links are intended to operate. One of the first open hypermedia link services was Microcosm, which takes this philosophy to the extreme, storing not only the links in a separate database, but also the information about the endpoints of the links. The most important advantage of such an organisation is that the system remains open so that hypertext functionality may be extended to third party applications. The first part of this thesis
APA, Harvard, Vancouver, ISO, and other styles
24

Balakrishnan, Arjun. "Integrity Analysis of Data Sources in Multimodal Localization System." Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG060.

Full text
Abstract:
Les véhicules intelligents sont un élément clé pour des systèmes de transport plus sûrs, efficaces et accessibles à travers le monde. En raison de la multitude de sources de données et de processus associés aux véhicules intelligents, la fiabilité de l'ensemble du système dépend fortement de la possibilité d'erreurs ou de mauvaises performances observées dans ses composants. Dans notre travail, nous nous intéressons à la tâche critique de localisation des véhicules intelligents et relevons les défis de la surveillance de l'intégrité des sources de données utilisées dans la localisation. La con
APA, Harvard, Vancouver, ISO, and other styles
25

Hock, Kevin. "The Integrity Enforcer: Ensuring Program Data and Code Security." Miami University Honors Theses / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111148755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gunupudi, Vandana. "Performance Evaluation of Data Integrity Mechanisms for Mobile Agents." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4366/.

Full text
Abstract:
With the growing popularity of e-commerce applications that use software agents, the protection of mobile agent data has become imperative. To that end, the performance of four methods that protect the data integrity of mobile agents is evaluated. The methods investigated include existing approaches known as the Partial Result Authentication Codes, Hash Chaining, and Set Authentication Code methods, and a technique of our own design, called the Modified Set Authentication Code method, which addresses the limitations of the Set Authentication Code method. The experiments were run using the DADS
APA, Harvard, Vancouver, ISO, and other styles
27

Bednar-Schadle, Teresa. "Misinterpretation of Digital Evidence| Recommendations to Improve Data Integrity." Thesis, Utica College, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423713.

Full text
Abstract:
<p> The criminal justice system struggles to remain current with modern technology, and the result is the conviction of innocent victims due to the misinterpretation of digital forensic data. It is common for criminal trials to rely on digital evidence and not uncommon the guilty acquitted based on digital evidence. The research contained in this report covered some of the factors contributing to the misinterpretation of digital forensic data. Among the contributing factors are lack of professional and ethical standards governing digital forensic investigators, inadequate training, outdated eq
APA, Harvard, Vancouver, ISO, and other styles
28

Wylie, Austin. "Geospatial Data Modeling to Support Energy Pipeline Integrity Management." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1447.

Full text
Abstract:
Several hundred thousand miles of energy pipelines span the whole of North America -- responsible for carrying the natural gas and liquid petroleum that power the continent's homes and economies. These pipelines, so crucial to everyday goings-on, are closely monitored by various operating companies to ensure they perform safely and smoothly. Happenings like earthquakes, erosion, and extreme weather, however -- and human factors like vehicle traffic and construction -- all pose threats to pipeline integrity. As such, there is a tremendous need to measure and indicate useful, actionable data for
APA, Harvard, Vancouver, ISO, and other styles
29

Asdoorian, Mark 1975. "Data manipulation services in the Haystack IR system." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46207.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (p. 103-105).<br>by Mark Asdoorian.<br>S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
30

Sturaro, Laura <1994&gt. "Manipulation in chinese environmental data: methods and incentives." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/14056.

Full text
Abstract:
il monitoraggio ambientale fa parte delle atttività di monitoraggio, per cui è necessario che anch' esso si basi su dati accurati ed oggettivi. Nonostante ciò l'accuratezza del dato ambientale cinese viene messo in dubbio non solo dagli osservatori stranieri ma anche da quelli cinesi. Spiegando come funziona il sistema di monitoraggio ambientale cinese, in questo lavoro verranno descritte le due principali fonti di dati ambientali e la modalità attraverso cui questi dati passano dal livello amministrativo locale al livello centrale. Viene inoltre indicato come in questo sistema di trasmission
APA, Harvard, Vancouver, ISO, and other styles
31

Stanier, C. F. "A model integrity based object-relational data model and complex data model definition framework." Thesis, Staffordshire University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.522119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Feifan. "Cross-platform data integrity and confidentiality with graduated access control." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60265.

Full text
Abstract:
Security of data is tightly coupled to its access policy. However, in practice, a data owner has control of his data’s access policies only as far as the boundaries of his own systems. We introduce graduated access control, which provides mobile, programmable, and dynamically-resolving policies for access control that extends a data owner’s policies across system boundaries. We realize this through a novel data-centric abstraction called trusted capsules and its associated system, the trusted data monitor. A trusted capsule couples data and policy into a single mobile unit. A capsule is backwa
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Franck. "Lane-level vehicle localization with integrity monitoring for data aggregation." Thesis, Compiègne, 2018. http://www.theses.fr/2018COMP2458/document.

Full text
Abstract:
Les informations contenues dans les cartes routières numériques revêtent une importance grandissante dans le domaine des véhicules intelligents. La prise en compte d’environnements de plus en plus complexes a augmenté le niveau de précision exigé des informations cartographiques. Les cartes routières numériques, considérées ici comme des bases de données géographiques, contiennent des informations contextuelles sur le réseau routier, facilitant la compréhension correcte de l’environnement. En les combinant avec les données provenant des capteurs embarqués, une représentation plus fine de l’envi
APA, Harvard, Vancouver, ISO, and other styles
34

Francis, Alexandra Michelle. "REST API to Access and Manage Geospatial Pipeline Integrity Data." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1496.

Full text
Abstract:
Today’s economy and infrastructure is dependent on raw natural resources, like crude oil and natural gases, that are optimally transported through a net- work of hundreds of thousands of miles of pipelines throughout America[28]. A damaged pipe can negatively a↵ect thousands of homes and businesses so it is vital that they are monitored and quickly repaired[1]. Ideally, pipeline operators are able to detect damages before they occur, but ensuring the in- tegrity of the vast amount of pipes is unrealistic and would take an impractical amount of time and manpower[1]. Natural disasters, like eart
APA, Harvard, Vancouver, ISO, and other styles
35

Langhi, Samuele. "Integrity over Streams." Electronic Thesis or Diss., Lyon 1, 2025. http://www.theses.fr/2025LYO10061.

Full text
Abstract:
La qualité des données est essentielle en gestion moderne, garantissant exactitude, cohérence, exhaustivité et fiabilité. Si les bases de données statiques assurent bien l'intégrité, les environnements de flux nécessitent une validation en temps réel pour éviter la propagation d'erreurs. Cette thèse explore l'intégrité des flux de données, définie comme l'adhésion à des contraintes prédéfinies. Dans les applications en temps réel comme la finance et la surveillance énergétique, les anomalies peuvent indiquer des dysfonctionnements ou le bon déclenchement de systèmes automatisés. Il est donc es
APA, Harvard, Vancouver, ISO, and other styles
36

Chang, Kaiye. "Integrity Protection On the Linux Based Android Platform." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177176.

Full text
Abstract:
Integrity protection on the Linux based Android Platform is examined. The secure boot mechanism is studied and the verification of user space code is investigated. The task of this master thesis was to extend the current code signing mechanism to include signing of files in the file system, and code pages, and to implement verification of these files and pages. Proof-of-concept solutions of two presented methods are implemented. It was found that the integrity protection on the platform can be improved at a relatively reasonable cost by verifying hashes of modules and programs before they are
APA, Harvard, Vancouver, ISO, and other styles
37

Dinh, Loan. "Semantic manipulation and business context in big data analytics." Thesis, Federation University Australia, 2018. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/169920.

Full text
Abstract:
Business organisations receive a huge amount of data from many sources every day. These data are known as big data. Since they are mostly unstructured, big data creates a complex problem of how to capture, manage, analyse and then derive meaningful information from them. To deal with the challenges that big data has brought, this research proposes a new technique in big data analytics in the business area to integrate semantically meaningful information relevant to textual queries and business context. To achieve this aim, this study makes three major related contributions. Firstly, the relati
APA, Harvard, Vancouver, ISO, and other styles
38

Fechner, Harry H. E., University of Western Sydney, College of Law and Business, and School of Management. "Data base accuracy and integrity as a precondition for overhead allocations." THESIS_CLAB_MAN_Fechner_H.xml, 2004. http://handle.uws.edu.au:8081/1959.7/807.

Full text
Abstract:
Interest in more accurate assignment of overhead costs to establish credible product/service cost profiles has assumed substantial prominence in much of the recent debates on management accounting practices. While the promotion of new cost management systems and in particular Activity Based Costing (ABC) has promised to address many of the perceived shortcomings of more traditional and long established techniques, the lack of its implementation success raises some concern as to the validity and value of these new system designs. A major purpose of this thesis is the development of a mathematic
APA, Harvard, Vancouver, ISO, and other styles
39

Fechner, H. "Data base accuracy and integrity as a precondition for overhead allocations." View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20041103.161903/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Faulkner, Alastair. "Data integrity : an often-ignored aspect of safety systems : executive summary." Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.

Full text
Abstract:
Data is all-pervasive and is found in all aspects of modern computer systems, and yet many engineers seem reluctant to recognise the importance of data integrity. The conventional view of data, as simply an aspect of software, underestimates the role played by data errors in the behaviour of the system and their potential effect on the integrity of the overall system. In many cases hazard analysis is not applied to data in the same way that it is applied to other system components. Without data integrity requirements, data development and data provision may not attract the degree of rigour tha
APA, Harvard, Vancouver, ISO, and other styles
41

Tan, Hwei-Yang. "Statistical methods for the analysis of corrosion data for integrity assessments." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/15275.

Full text
Abstract:
In the oil and gas industry, statistical methods have been used for corrosion analysis for various asset systems such as pipelines, storage tanks, and so on. However, few industrial standards and guidelines provide comprehensive stepwise procedures for the usage of statistical approaches for corrosion analysis. For example, the UK HSE (2002) report "Guidelines for the use of statistics for analysis of sample inspection of corrosion" demonstrates how statistical methods can be used to evaluate corrosion samples, but the methods explained in the document are very basic and do not consider risk f
APA, Harvard, Vancouver, ISO, and other styles
42

Shen, Yifei. "The blockchain based system to guarantee the data integrity of IIoT." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33997.

Full text
Abstract:
With the advent of big data era, there is countless data produced from various kinds of machines every second. These data are used to help people to do studies, produce goods, improve the efficiency of the industrial development, and so on. Especially considering the Internet of things which connects all the smart machines together, the importance of data integrity gets unprecedented attention from us. In order to keep the data integrity, blockchain comes to its birth using its own structure to guarantee the data integrity efficiently. This project is focus on the simulation of data system bas
APA, Harvard, Vancouver, ISO, and other styles
43

Fielk, Klaus W. "Cyberciege scenario illustrating integrity risks to a military like facility." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FFielk.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004.<br>Thesis advisor(s): Cynthia E. Irvine, Paul C. Clark. Includes bibliographical references (p. 97-101). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
44

Stephens, Michael W. "Design and specification of an object-oriented data manipulation language." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA305945.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1995.<br>Thesis advisor(s): David K. Hsiao, C.Thomas Wu. "September 1995." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
45

ARAUJO, SAMUR FELIPE CARDOSO DE. "EXPLORATOR: A TOOL FOR EXPLORING RDF DATA THROUGH DIRECT MANIPULATION." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2009. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=13792@1.

Full text
Abstract:
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO<br>Nessa dissertação propomos uma ferramenta destinada à exploração dos dados na Web Semântica. Nosso objetivo foi desenvolver um modelo de exploração que permitisse o usuário explorar uma base de dados RDF sem deter qualquer conhecimento prévio de seu domínio. Para tanto, apresentamos um modelo de operações que suportadas por uma interface baseada no paradigma de manipulação direta e query-by-example, nos permite explorar uma base de dados RDF semi-estruturada para ganhar conhecimento e responder questões específicas sobre o domíni
APA, Harvard, Vancouver, ISO, and other styles
46

PESCE, MARCIA LUCAS. "RDXEL: A TOOLKIT FOR RDF STATISTICAL DATA MANIPULATION THROUGH SPREADSHEETS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2012. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=26259@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO<br>COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>PROGRAMA DE EXCELENCIA ACADEMICA<br>Dados estatísticos são uma das mais importantes fontes de informação para atividades humanas e organizações. No entanto, o acesso, consulta e correlação deste tipo de dados demanda grande esforço, principalmente em situações que envolvem diferentes organizações. Soluções que facilitem o acesso e a integração de grandes bases de dados analíticos, desta forma, agregam muito valor a este cenário. Neste trabalho propomos um arcabouço de software
APA, Harvard, Vancouver, ISO, and other styles
47

Barrera, Rodriguez Oscar David. "Information and data manipulation in political economy and household contexts." Thesis, Paris, EHESS, 2020. http://www.theses.fr/2020EHES0190.

Full text
Abstract:
L'accès à l'information est essentiel pour plusieurs raisons. Premièrement, il s'agit d'un moyen de créer de la connaissance. Les économistes considèrent que l'information a une valeur économique car elle permet aux individus de faire des choix qui leur procurent des gains et/ou une utilité espérés plus élevés que ceux auxquels ils pourraient prétendre en l'absence d'information. L'accès à l'information est également essentiel pour la démocratie. Il permet d'abord aux citoyens de faire des choix responsables et éclairés plutôt que d'agir dans l’ignorance. Il remplit également une fonction de c
APA, Harvard, Vancouver, ISO, and other styles
48

Tan, Meifang. "An online interactive spreadsheet approach to data analysis and manipulation." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Harris, Todd Roberson. "The construction and manipulation of data models in cell biology /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2002. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Can. "Embodied Interaction for Data Manipulation Tasks on Wall-sized Displays." Thesis, Université Paris-Saclay (ComUE), 2015. http://www.theses.fr/2015SACLS207/document.

Full text
Abstract:
De grands ensembles de données sont de plus en plus utilisés dans divers domaines professionnels, tels que la médecine, la sociologie et l'économie. Ceci pose de nombreux défis dans leurs utilisations pour, par exemple, les classifier et la prise de décision. Pour cela nous n'avons pas seulement besoin d'algorithmes élaborés pour leur traitement, il faut aussi que les utilisateurs puissent visualiser et interagir avec les données pour pouvoir les appréhender et éventuellement corriger ou vérifier les traitement fait par les machines. Cette thèse explore cette problématique en étudiant l'intera
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!