Academic literature on the topic 'Risk assessment - Data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Risk assessment - Data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Risk assessment - Data processing"

1

Wang, Lv Rong. "Data Processing in Model of the Bank Credit Risk Assessment Based on Asset Assessment." Applied Mechanics and Materials 707 (December 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.707.493.

Full text
Abstract:
Asset assessment theory research lagging behind the industry development is an important problem existing in current assessment industry, and the construction of theoretical framework system is particularly urgent. Asset appraisal theory frame system is divided into the logical starting point and the theoretical framework. According to the connotation of asset assessment and the concept of the logic starting point in philosophy, the logic starting point of the asset assessment is thought to be the value discovery. According to the relationship to the logical starting point, establish a theoret
APA, Harvard, Vancouver, ISO, and other styles
2

Bryukhovetsky, Kirill, and Ilya Livshitz. "An analysis of a General Data Protection Regulation impact on fuel and energy companies." Energy Safety and Energy Economy 5 (November 2020): 55–63. http://dx.doi.org/10.18635/2071-2219-2020-5-55-63.

Full text
Abstract:
General Data Protection Regulation has been adopted in 2018 and establishes privacy and security protection for data gathered on anyone in the European Union. Russian power engineering companies have to potentially comply with GDPR in regards of processing and storing customer data. This paper contains an analysis of certain GDPR requirements and their meaning for power engineering companies and their departments for the purpose of compliance risk assessment. The results can help make decisions on compliance risk assessment initiatives to diminish data protection risks for international busine
APA, Harvard, Vancouver, ISO, and other styles
3

Hojjati-Emami, Khashayar, Balbir S. Dhillon, and Kouroush Jenab. "The HRA-Based Road Crash Data." International Journal of Strategic Decision Sciences 5, no. 4 (2014): 1–15. http://dx.doi.org/10.4018/ijsds.2014100101.

Full text
Abstract:
Human error has played a critical role in the events precipitating the road accidents. Such accidents can be predicted and prevented by risk assessment, in particular assessing the human contribution to risk. As part of the Human Reliability Assessment (HRA) process, it is usually necessary not only to define what human errors can occur, but how often they will occur. Lack of understanding of the failure distribution characteristics of drivers on roads at any given time is a factor impeding the development of human reliability assessment and prediction of road accidents in order to take best p
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Jian Ping, and Yan Zhang. "Data Processing in Risk Evaluation of China’s Old Real Estate." Applied Mechanics and Materials 685 (October 2014): 727–30. http://dx.doi.org/10.4028/www.scientific.net/amm.685.727.

Full text
Abstract:
In the recent years, the old real estate has a broad development prospects in the real estate due to the aging of the population and the changes of pension. Because the old real estate project is not mature, so there are many potential risk factors in the process of development. This paper uses the risk matrix evaluation method to build old real estate development risk evaluation model. We take some specific data into the model, then can conclude that project risk assessment level through the calculation of the data.We can find out the key factors in the project development and judge the risk
APA, Harvard, Vancouver, ISO, and other styles
5

Kraus, Michal, Petra Bednářová, and Karel Kubečka. "Risk Assessment of Airtightness of Building Envelope." Applied Mechanics and Materials 824 (January 2016): 657–65. http://dx.doi.org/10.4028/www.scientific.net/amm.824.657.

Full text
Abstract:
The paper deals with risk analysis of insufficient airtightness of the envelope construction. The risk analysis is a systematic and structured data processing to identify potential hazards. The main aim of paper is to qualified risks which arise from the danger, i.e. insufficiently airtight of the building envelope. The quality of airtight building envelope except for low energy consumption also minimizes the risk of damage to the structure associated with the spread of the heat, water vapor in the structure and fungal growth. The qualification of risks consists of choice of method and determi
APA, Harvard, Vancouver, ISO, and other styles
6

Chassaigne, Hubert, Sabrina Gioria, Giorgio Tomasi, Agnieszka Kinsner-Ovaskainen, François Rossi, and Claude Guillou. "Untargeted metabolomics in human health risk assessment of nanoparticles: Data processing workflow challenges." Toxicology Letters 221 (August 2013): S193. http://dx.doi.org/10.1016/j.toxlet.2013.05.444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Шинаков, Кирилл, Kirill Shinakov, Михаил Рытов, et al. "SAFETY RISK ASSESSMENT OF INFORMATION SYSTEMS PROCESSING CONFIDENTIAL INFORMATION." Bulletin of Bryansk state technical university 2016, no. 2 (2016): 193–200. http://dx.doi.org/10.12737/20289.

Full text
Abstract:
Confidential information processing in information systems under conditions of the universal informatization in both stateowned and private companies is an urgent problem.
 Many operators processing a trade secret or per-sonal data underestimate possible damage caused by the disclosure, deletion or change of confidential in-formation and afterwards become victims either of deliberate criminals or suits of workers whose rights were violated. In such a way, the safety risk assessment of confidential information processed in information systems is a priority trend both for an operator and fo
APA, Harvard, Vancouver, ISO, and other styles
8

OLENDER, Aleksandra. "RISK ANALYSIS AND DATA PROTECTION IMPACT ASSESSMENT CONDUCTED IN THE PUBLIC SECTOR." Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, no. 1(14)/2020 (2020): 45–57. http://dx.doi.org/10.33674/320194.

Full text
Abstract:
The European Parliament and Council Regulation (EU) 2016/679 of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data and the repeal of Directive 95/46/EC introduced a new one, a proactive model of protection of personal data processed in the organization, based on a risk-based approach. It imposed on the administrators new obligations related to conducting analyzes of the risk of violation of the rights and freedoms of persons whose data they process. Considering the scope, scale and categories of personal data proc
APA, Harvard, Vancouver, ISO, and other styles
9

Izergin, Dmitry, and Michael Eremeev. "Risk assessment model of compromising personal data on mobile devices." E3S Web of Conferences 270 (2021): 01013. http://dx.doi.org/10.1051/e3sconf/202127001013.

Full text
Abstract:
Development of the information space to an avalanche-like increase in the volume of mobile data on the Internet. The generated digital portraits of users are becoming one of the main products for sale. The high quality of user digital portraits and their number is achieved through the use of intelligent data processing methods and the presence of large data sets. The volume of data processed by mobile devices and the number of modern services that collect various types of information make the issue of ensuring the confidentiality of user information the most important. Existing security mechan
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Jun Jun, Bei Zhang, Mei Feng, Liang Chen, and Mei Feng Hou. "Research about Information Security Risk Assessment of Oil and Gas Production Management System." Advanced Materials Research 631-632 (January 2013): 1390–96. http://dx.doi.org/10.4028/www.scientific.net/amr.631-632.1390.

Full text
Abstract:
Current information security risk assessment models usually focus on the security problems of information system and its environment, however they ignore data changes and the accompanying risks in the whole production process. Aiming at the problems above, the paper analyzes the risks of oil and gas production management system during the different stages of data generation, transmission, processing, storage and demonstration, then proposes a set of data risk assessment model and method focusing on data security. The data risk assessment model provides a new way to prevent intrusion, protect d
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Risk assessment - Data processing"

1

Jankovsky, Zachary Kyle. "Development of Computational and Data Processing Tools for ADAPT to Assist Dynamic Probabilistic Risk Assessment." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1524194454292866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wheeler, Sonya. "A structured technique for applying risk based internal auditing in information technology environments : (with specific reference to llA RBIA, King Report and CobiT) /." Link to the online version, 2005. http://hdl.handle.net/10019/1310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Narasimhan, Ramesh. "Preliminary control risk assessments by computer audit specialists and non-specialists." Diss., Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/49868.

Full text
Abstract:
Auditors are encountering more and more computerized accounting applications as the pervasiveness of computing technology increases in business. Auditors, therefore, need to adapt their audit approaches in the face of the changes caused by the new technology. The AICPA has addressed the issue by requiring auditors to consider the nature of the data processing system ln their client environments when planning the audits. Specialists, if necessary, are recommended to be brought in as part of the audit team in audits involving computerized accounting applications. The implicit assumption behind
APA, Harvard, Vancouver, ISO, and other styles
4

Razavi, Amir Reza. "Applications of Knowledge Discovery in Quality Registries - Predicting Recurrence of Breast Cancer and Analyzing Non-compliance with a Clinical Guideline." Doctoral thesis, Linköping : Univ, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chatterjee, Ayona. "Probabilistic risk assessment of dietary data." Thesis, University of Edinburgh, 2005. http://hdl.handle.net/1842/14388.

Full text
Abstract:
Until recently, deterministic methods have been used to estimate food risk. These methods give one risk estimate for the whole population, mostly ignore the variability in the consumption data and produce unrealistic results. Recently there has been an increase in the use of probabilistic models for food risk assessment. Some of these probabilistic models are purely based on empirical distributions and others on probability models in a frequentist or Bayesian framework. In this thesis we improve on existing Bayesian models for food consumption data collected on successive days, and propose pos
APA, Harvard, Vancouver, ISO, and other styles
6

Chittella, Sriram Kishore, and Teixeira Marcos Machado. "Data-driven risk assessment for truckload service providers." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99808.

Full text
Abstract:
Thesis: M. Eng. in Logistics, Massachusetts Institute of Technology, Engineering Systems Division, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 78-79).<br>Non-asset backed third-party logistics companies provide shippers access to a flexible source of capacity through transportation carrier spot market. The increased volatility in the trucking spot market rates is turning the 3PL businesses more risky and complex. To maximize profitability, a better understanding of the risk and the volatility patterns across the different geographies, time perio
APA, Harvard, Vancouver, ISO, and other styles
7

Lo, Owen. "Heart data analysis, modelling and application in risk assessment." Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8833.

Full text
Abstract:
The heart is a fundamental aspect of the human body. Significant work has been undertaken to better understand the characteristics and mechanisms of this organ in past research. Greater understanding of the heart not only provides advances in medicine but also enables practitioners to better assess the health risk of patients. This thesis approaches the study of the heart from a health informatics perspective. The questions posed in this thesis is whether research is capable of describing and modelling heart data from a statistical perspective, along with exploring techniques to improve the ac
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Moazzam. "Security metric based risk assessment." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47527.

Full text
Abstract:
Modern day computer networks have become very complex and attackers have benefited due to this complexity and have found vulnerabilities and loopholes in the network architecture. In order to identify the attacks from an attacker all aspects of network architecture needs to be carefully examined such as packet headers, network scans, versions of applications, network scans, network anomalies etc. and after the examination attributes playing a significant impact on the security posture of the organization needs to be highlighted so that resources and efforts are directed towards those attribute
APA, Harvard, Vancouver, ISO, and other styles
9

Duricu, Alexandra. "Data Protection Impact Assessment (DPIA) and Risk Assessment in the context of the General Data Protection Regulation (GDPR)." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhao, Xiaoyun. "Road network and GPS tracking with data processing and quality assessment." Licentiate thesis, Högskolan Dalarna, Mikrodataanalys, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:du-17354.

Full text
Abstract:
GPS technology has been embedded into portable, low-cost electronic devices nowadays to track the movements of mobile objects. This implication has greatly impacted the transportation field by creating a novel and rich source of traffic data on the road network. Although the promise offered by GPS devices to overcome problems like underreporting, respondent fatigue, inaccuracies and other human errors in data collection is significant; the technology is still relatively new that it raises many issues for potential users. These issues tend to revolve around the following areas: reliability, dat
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Risk assessment - Data processing"

1

The security risk assessment handbook: A complete guide for performing security risk assessments. Auerbach Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

The security risk assessment handbook: A complete guide for performing security risk assessments. 2nd ed. CRC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

C, Davis John, and Wendebourg Johannes, eds. Computing risk for oil prospects: Principles and programs. Pergamon, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Robert, Stack. Risk assessments: Microcomputer protection : a bankwide assessment of risks associated with traditional and nontraditional services and new business opportunities. American Bankers Association, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ke xue, ji shu yu shi fan. Ke xue chu ban she, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, C. L. Development and use of a train-level probabilistic risk assessment. Division of Safety Issue Resolution, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maderbacher, Michael. Früherkennung von Kreditrisken: Dynamische Kontendatenanalyse zur Risikofrüherkennung. Orac, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gheorghe, Adrian V. Integration von Fuzzy-Logic für eine regionale Umweltrisiko-Analyse: Modellierung komplexer Zusammenhänge in der regionalen Sicherheitsplanung. VDF, Hochschulverlag an der ETH, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Levatino Joseph, ed. Knowledge at risk: Protecting business strategies in an information-driven environment. McWains Chelsea, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shu ju ku, feng xian di tu yu wang luo ping tai. Ke xue chu ban she, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Risk assessment - Data processing"

1

Ali-Eldin, Amr, Anneke Zuiderwijk, and Marijn Janssen. "A Privacy Risk Assessment Model for Open Data." In Lecture Notes in Business Information Processing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78428-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Righini, R., and G. Zappellini. "Physics Models for Reliability Data Processing." In Reliability Data Collection and Use in Risk and Availability Assessment. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/978-3-642-83721-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pnevmatikakis, Aristodemos, Stathis Kanavos, Alexandros Perikleous, and Sofoklis Kyriazakos. "Risk Assessment for Personalized Health Insurance Products." In Big Data and Artificial Intelligence in Digital Finance. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94590-9_16.

Full text
Abstract:
AbstractThe way people lead their lives is considered an important factor in health. In this chapter, we describe a system to provide risk assessment based on behavior for the health insurance sector. The system processes real-world data (RWD) of individuals from their daily life that enumerate different aspects of behavior collection. The data have been captured using the Healthentia platform and a simulator that augments the actual dataset with synthetic data. Classifiers are built to predict variations of peoples’ well-being short-term outlook. Risk assessment services are provided to health insurance professionals by processing the classifier predictions in the long term while explaining the classifiers themselves provide insights on the coaching of the users of the service.
APA, Harvard, Vancouver, ISO, and other styles
4

Leroy, A., M. Gaboriaud, and J. C. Michon. "OCAAR: A Tool for Incident Analysis, Reporting and Processing." In Reliability Data Collection and Use in Risk and Availability Assessment. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/978-3-642-83721-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nouredanesh, Mina, and James Tung. "Multimodal Ambulatory Fall Risk Assessment in the Era of Big Data." In Signal Processing and Machine Learning for Biomedical Big Data. CRC Press, 2018. http://dx.doi.org/10.1201/9781351061223-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hale, A. R., J. Karczewski, F. Koornneef, E. Otto, and L. Burdorf. "An Intelligent End-User Interface for the Collection and Processing of Accident Data." In Reliability Data Collection and Use in Risk and Availability Assessment. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/978-3-642-83721-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Hualiang, Runzhong Liu, Li Li, et al. "A Framework for Occupational Risk Assessment in Power Grid Using AHP Method." In Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1468-5_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Melillo, Paolo, Paolo Scala, Filippo Crispino, and Leandro Pecchia. "Cloud-Based Remote Processing and Data-Mining Platform for Automatic Risk Assessment in Hypertensive Patients." In Ambient Assisted Living and Daily Activities. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13105-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gonscherowski, Susan, and Felix Bieker. "Who You Gonna Call When There’s Something Wrong in Your Processing? Risk Assessment and Data Breach Notifications in Practice." In Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16744-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rausand, Marvin. "Data for Risk Analysis." In Risk Assessment. John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118281116.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Risk assessment - Data processing"

1

Rekik, Ali, and Nissen Masmoudi. "A New Approach for Forming a Probabilistic Risk Assessment Model of Innovative Project Implementation Under Risk." In 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP). IEEE, 2018. http://dx.doi.org/10.1109/dsmp.2018.8478572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Postnikova, U. S., V. V. Nicheporchuk, and O. V. Taseiko. "Design, implementation and application of an intelligent system for territorial risks assessment." In Spatial Data Processing for Monitoring of Natural and Anthropogenic Processes 2021. Crossref, 2021. http://dx.doi.org/10.25743/sdm.2021.71.71.064.

Full text
Abstract:
The process describes an intelligent system creation designed for risk evaluation and management. The risk can be anthropogenic, natural, or social nature, and belong to territories of different scales. Complexity in structuring and collecting information about the state territorial security as well as different risks assessment methods necessitate the development of a modular multitask system. The information management system support model formalizes the problem area to justify the joint intelligent technologies use. Based on the model, system architecture has been developed. This architectu
APA, Harvard, Vancouver, ISO, and other styles
3

Mangold, David, and Ryan Huntley. "Utilizing Modern Data and Technologies for Pipeline Risk Assessment." In 2016 11th International Pipeline Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/ipc2016-64128.

Full text
Abstract:
Risk management of gas and hazardous liquid pipeline systems is a core element of US integrity management regulations (49 CFR part 192, subpart O; 49 CFR 195.452) and a challenging responsibility facing operators worldwide. The importance of health, safety, and environmental protection demands a continuous evolution of industry expectations, practices, and regulations, with regulators and operators invariably seeking ways to advance risk modeling methodologies for pipeline risk assessment. The evolution to more advanced risk modeling methodologies marks a transitional trend from simple, relati
APA, Harvard, Vancouver, ISO, and other styles
4

Moskvichev, V. V., U. S. Postnikova, and O. V. Taseiko. "Cluster analysis and individual anthropogenic risk." In Spatial Data Processing for Monitoring of Natural and Anthropogenic Processes 2021. Crossref, 2021. http://dx.doi.org/10.25743/sdm.2021.54.88.063.

Full text
Abstract:
Models and assessment methods of anthropogenic risk are analyzed at this article, general basis of mathematical approach for risk analysis is disclosed. Based on multivariate statistic methods, algorithm of analysis for Siberian territories safety is formulated, it allows to define acceptable level of risk for each territorial group (cities with population density more than 70 000, towns with population less than 70 000, and municipals areas).
APA, Harvard, Vancouver, ISO, and other styles
5

Pan, Qiao, Lan Xiang, Chunru Yu, Yuanyuan Zhang, Dehua Chen, and Gaonian Gao. "The Risk Assessment of Breast Tumors Based on Text Data of Ultrasound Reports." In 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC). IEEE, 2017. http://dx.doi.org/10.1109/ispa/iucc.2017.00184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weaver, Gabriel A. "A Data Processing Pipeline For Cyber-Physical Risk Assessments Of Municipal Supply Chains." In 2021 Winter Simulation Conference (WSC). IEEE, 2021. http://dx.doi.org/10.1109/wsc52266.2021.9715355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sorensen, James, John Gallagher, and Steven Hawthorne. "Subsurface Transport and Fate of Natural Gas Processing Wastes: Implications for Risk Assessment and Remediation." In ASME 2001 Engineering Technology Conference on Energy. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/etce2001-17088.

Full text
Abstract:
Abstract Fundamental data has been developed regarding the chemical nature and subsurface transport and fate of wastes generated by amine-based gas sweetening and glycol-based dehydration operations. Results indicate the mobility and biodegradability of both amine- and glycol-based wastes are variable depending primarily on soil type. The data suggest 1) a thorough understanding of site-specific waste and subsurface characteristics is necessary when predicting the fate of gas processing wastes, and 2) glycols may act as cosolvents for less mobile, but more highly regulated, hydrocarbons, there
APA, Harvard, Vancouver, ISO, and other styles
8

Polasik, Steven J., Michelle LeMesurier, Tony Alfano, Burke Delanty, and Thomas Bubenik. "Data Analysis in Parallel With GIS Systems." In 2010 8th International Pipeline Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/ipc2010-31559.

Full text
Abstract:
The processing and integration of data for direct assessment (DA) and in-line inspection (ILI) comparisons is critical to making sound integrity-based decisions. While geographic information systems (GIS) are now commonly used to model pipeline systems, most day-to-day data processing and integration occurs outside of the GIS, for example in Microsoft Excel™. As such, Det Norske Veritas (DNV) developed a data integration tool within Excel™ as part of a large scale stress corrosion cracking direct assessment (SCCDA) program for a major pipeline operator. Linear based data provided by the client
APA, Harvard, Vancouver, ISO, and other styles
9

He, Haixia, He Huang, Ping Wang, and Yinxiang Sun. "Agriculture drought risk assessment of the irrigated agriculture zone in North Henan Plain using HJ-1 and MODIS data." In Seventh International Symposium on Multispectral Image Processing and Pattern Recognition (MIPPR2011), edited by Jianguo Liu, Jinwen Tian, Hongshi Sang, and Jie Ma. SPIE, 2011. http://dx.doi.org/10.1117/12.901857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

He, Haixia. "A simplified approach of drought risk assessment in Poyang Lake basin using real-time precipitation and multi-source remote sensing data." In Ninth International Symposium on Multispectral Image Processing and Pattern Recognition (MIPPR2015), edited by Jianguo Liu and Hong Sun. SPIE, 2015. http://dx.doi.org/10.1117/12.2205991.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Risk assessment - Data processing"

1

Volkova, Nataliia P., Nina O. Rizun, and Maryna V. Nehrey. Data science: opportunities to transform education. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3241.

Full text
Abstract:
The article concerns the issue of data science tools implementation, including the text mining and natural language processing algorithms for increasing the value of high education for development modern and technologically flexible society. Data science is the field of study that involves tools, algorithms, and knowledge of math and statistics to discover knowledge from the raw data. Data science is developing fast and penetrating all spheres of life. More people understand the importance of the science of data and the need for implementation in everyday life. Data science is used in business
APA, Harvard, Vancouver, ISO, and other styles
2

Townsend, C. S., and K. B. Johnson. Risk assessment data bank design at the Savannah River Site. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/6756236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Estes, Allen C. Estimating Risk From Spillways on Dams Using Condition Assessment Data. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada427596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Townsend, C. S., and K. B. Johnson. Risk assessment data bank design at the Savannah River Site. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10113492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saricks, C. L., R. G. Williams, and M. R. Hopf. Data base of accident and agricultural statistics for transportation risk assessment. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/7171598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singhroy, V., J. E. Loehr, and A. C. Correa. Landslide Risk Assessment with High Spatial Resolution Remote Sensing Satellite Data. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2000. http://dx.doi.org/10.4095/219716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Efroymson, R. A., B. L. Jackson, and D. S. Jones. Waste area grouping 2 Phase I task data report: Ecological risk assessment and White Oak Creek watershed screening ecological risk assessment. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/251610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hazard, John W., Jeralyn Snellgrove, and J. Michael Geist. Processing data from soil assessment surveys with the computer program SOILS. U.S. Department of Agriculture, Forest Service, Pacific Northwest Forest and Range Experiment Station, 1985. http://dx.doi.org/10.2737/pnw-gtr-179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Groth, Katrina, and Laura Swiler. Use of limited data to construct Bayesian networks for probabilistic risk assessment. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1095131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vo, T. V., T. M. Mitts, H. K. Phan, T. R. Blackburn, and L. O. Casazza. Data collection and analysis in support of risk assessment for hydroelectric stations. Office of Scientific and Technical Information (OSTI), 1995. http://dx.doi.org/10.2172/135008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!