To see the other types of publications on this topic, follow the link: Risk assessment - Data processing.

Journal articles on the topic 'Risk assessment - Data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Risk assessment - Data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Lv Rong. "Data Processing in Model of the Bank Credit Risk Assessment Based on Asset Assessment." Applied Mechanics and Materials 707 (December 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.707.493.

Full text
Abstract:
Asset assessment theory research lagging behind the industry development is an important problem existing in current assessment industry, and the construction of theoretical framework system is particularly urgent. Asset appraisal theory frame system is divided into the logical starting point and the theoretical framework. According to the connotation of asset assessment and the concept of the logic starting point in philosophy, the logic starting point of the asset assessment is thought to be the value discovery. According to the relationship to the logical starting point, establish a theoret
APA, Harvard, Vancouver, ISO, and other styles
2

Bryukhovetsky, Kirill, and Ilya Livshitz. "An analysis of a General Data Protection Regulation impact on fuel and energy companies." Energy Safety and Energy Economy 5 (November 2020): 55–63. http://dx.doi.org/10.18635/2071-2219-2020-5-55-63.

Full text
Abstract:
General Data Protection Regulation has been adopted in 2018 and establishes privacy and security protection for data gathered on anyone in the European Union. Russian power engineering companies have to potentially comply with GDPR in regards of processing and storing customer data. This paper contains an analysis of certain GDPR requirements and their meaning for power engineering companies and their departments for the purpose of compliance risk assessment. The results can help make decisions on compliance risk assessment initiatives to diminish data protection risks for international busine
APA, Harvard, Vancouver, ISO, and other styles
3

Hojjati-Emami, Khashayar, Balbir S. Dhillon, and Kouroush Jenab. "The HRA-Based Road Crash Data." International Journal of Strategic Decision Sciences 5, no. 4 (2014): 1–15. http://dx.doi.org/10.4018/ijsds.2014100101.

Full text
Abstract:
Human error has played a critical role in the events precipitating the road accidents. Such accidents can be predicted and prevented by risk assessment, in particular assessing the human contribution to risk. As part of the Human Reliability Assessment (HRA) process, it is usually necessary not only to define what human errors can occur, but how often they will occur. Lack of understanding of the failure distribution characteristics of drivers on roads at any given time is a factor impeding the development of human reliability assessment and prediction of road accidents in order to take best p
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Jian Ping, and Yan Zhang. "Data Processing in Risk Evaluation of China’s Old Real Estate." Applied Mechanics and Materials 685 (October 2014): 727–30. http://dx.doi.org/10.4028/www.scientific.net/amm.685.727.

Full text
Abstract:
In the recent years, the old real estate has a broad development prospects in the real estate due to the aging of the population and the changes of pension. Because the old real estate project is not mature, so there are many potential risk factors in the process of development. This paper uses the risk matrix evaluation method to build old real estate development risk evaluation model. We take some specific data into the model, then can conclude that project risk assessment level through the calculation of the data.We can find out the key factors in the project development and judge the risk
APA, Harvard, Vancouver, ISO, and other styles
5

Kraus, Michal, Petra Bednářová, and Karel Kubečka. "Risk Assessment of Airtightness of Building Envelope." Applied Mechanics and Materials 824 (January 2016): 657–65. http://dx.doi.org/10.4028/www.scientific.net/amm.824.657.

Full text
Abstract:
The paper deals with risk analysis of insufficient airtightness of the envelope construction. The risk analysis is a systematic and structured data processing to identify potential hazards. The main aim of paper is to qualified risks which arise from the danger, i.e. insufficiently airtight of the building envelope. The quality of airtight building envelope except for low energy consumption also minimizes the risk of damage to the structure associated with the spread of the heat, water vapor in the structure and fungal growth. The qualification of risks consists of choice of method and determi
APA, Harvard, Vancouver, ISO, and other styles
6

Chassaigne, Hubert, Sabrina Gioria, Giorgio Tomasi, Agnieszka Kinsner-Ovaskainen, François Rossi, and Claude Guillou. "Untargeted metabolomics in human health risk assessment of nanoparticles: Data processing workflow challenges." Toxicology Letters 221 (August 2013): S193. http://dx.doi.org/10.1016/j.toxlet.2013.05.444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Шинаков, Кирилл, Kirill Shinakov, Михаил Рытов, et al. "SAFETY RISK ASSESSMENT OF INFORMATION SYSTEMS PROCESSING CONFIDENTIAL INFORMATION." Bulletin of Bryansk state technical university 2016, no. 2 (2016): 193–200. http://dx.doi.org/10.12737/20289.

Full text
Abstract:
Confidential information processing in information systems under conditions of the universal informatization in both stateowned and private companies is an urgent problem.
 Many operators processing a trade secret or per-sonal data underestimate possible damage caused by the disclosure, deletion or change of confidential in-formation and afterwards become victims either of deliberate criminals or suits of workers whose rights were violated. In such a way, the safety risk assessment of confidential information processed in information systems is a priority trend both for an operator and fo
APA, Harvard, Vancouver, ISO, and other styles
8

OLENDER, Aleksandra. "RISK ANALYSIS AND DATA PROTECTION IMPACT ASSESSMENT CONDUCTED IN THE PUBLIC SECTOR." Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, no. 1(14)/2020 (2020): 45–57. http://dx.doi.org/10.33674/320194.

Full text
Abstract:
The European Parliament and Council Regulation (EU) 2016/679 of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data and the repeal of Directive 95/46/EC introduced a new one, a proactive model of protection of personal data processed in the organization, based on a risk-based approach. It imposed on the administrators new obligations related to conducting analyzes of the risk of violation of the rights and freedoms of persons whose data they process. Considering the scope, scale and categories of personal data proc
APA, Harvard, Vancouver, ISO, and other styles
9

Izergin, Dmitry, and Michael Eremeev. "Risk assessment model of compromising personal data on mobile devices." E3S Web of Conferences 270 (2021): 01013. http://dx.doi.org/10.1051/e3sconf/202127001013.

Full text
Abstract:
Development of the information space to an avalanche-like increase in the volume of mobile data on the Internet. The generated digital portraits of users are becoming one of the main products for sale. The high quality of user digital portraits and their number is achieved through the use of intelligent data processing methods and the presence of large data sets. The volume of data processed by mobile devices and the number of modern services that collect various types of information make the issue of ensuring the confidentiality of user information the most important. Existing security mechan
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Jun Jun, Bei Zhang, Mei Feng, Liang Chen, and Mei Feng Hou. "Research about Information Security Risk Assessment of Oil and Gas Production Management System." Advanced Materials Research 631-632 (January 2013): 1390–96. http://dx.doi.org/10.4028/www.scientific.net/amr.631-632.1390.

Full text
Abstract:
Current information security risk assessment models usually focus on the security problems of information system and its environment, however they ignore data changes and the accompanying risks in the whole production process. Aiming at the problems above, the paper analyzes the risks of oil and gas production management system during the different stages of data generation, transmission, processing, storage and demonstration, then proposes a set of data risk assessment model and method focusing on data security. The data risk assessment model provides a new way to prevent intrusion, protect d
APA, Harvard, Vancouver, ISO, and other styles
11

Olender, Aleksandra. "Risk Analysis and Data Protection Impact Assessment Conducted in the Public Sector." Wschód Europy. Studia humanistyczno-społeczne 6, no. 2 (2020): 145–57. http://dx.doi.org/10.17951/we.2020.6.2.145-157.

Full text
Abstract:
The European Parliament and Council Regulation (EU) 2016/679 of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data and the repeal of Directive 95/46 / EC, introduced a new one, a proactive model of protection of personal data processed in the organization, based on a risk-based approach. It imposed some new obligations on the administrators, related to conducting analysis of the risk of violation of the rights and freedoms of the persons, whose data they process. Considering the scope, scale and categories of pers
APA, Harvard, Vancouver, ISO, and other styles
12

Kong, Ling Yan, Ying Chun Tao, Jing Liu, and Ai Hua Wu. "Study on Integrated Spatial Database for Composite Urban Disaster Risk Assessment." Applied Mechanics and Materials 738-739 (March 2015): 285–88. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.285.

Full text
Abstract:
In the research of urban disaster risk assessment, data is the most basic element. Accurate, comprehensive, high quality data is essential to ensure the accuracy of disaster analysis and disaster risk classification. The systematic methods of data acquisition, processing and management and analysis need to be studied. In this paper, based on the analysis of characteristics of urban-disasters composite risk assessment data, the risk assessment database is designed. According to processing phase, the database is divided into four sub-databases: gathering database, general database, study area da
APA, Harvard, Vancouver, ISO, and other styles
13

Kozhukhivskyi, A. D., and O. A. Kozhukhivska. "RISK ASSESSMENT MODELING OF ERP-SYSTEMS." Radio Electronics, Computer Science, Control, no. 4 (December 13, 2022): 149. http://dx.doi.org/10.15588/1607-3274-2022-4-12.

Full text
Abstract:
Context. Because assessing security risks is a complex and complete uncertainty process, and uncertainties are a major factor influencing valuation performance, it is advisable to use fuzzy methods and models that are adaptive to noncomputed data. The formation of vague assessments of risk factors is subjective, and risk assessment depends on the practical results obtained in the process of processing the risks of threats that have already arisen during the functioning of the organization and experience of security professionals. Therefore, it will be advisable to use models that can ade-quate
APA, Harvard, Vancouver, ISO, and other styles
14

Funieru, Cristian, and Răzvan Funieru. "Caries Risk software – a new tool used for children caries risk assessment." Romanian Journal of Stomatology 61, no. 2 (2015): 179–82. http://dx.doi.org/10.37897/rjs.2015.2.13.

Full text
Abstract:
Introduction. Dental caries risk is a key factor which may influence dental health in the near future. It is a very important factor for developing individual or community preventive strategies. Material and method. 46 dental records were analyzed including data of caries baseline and caries risk factors in a group of 46 schoolchildren from city of Bucharest. The overall caries risk was estimated using version 1.0 of Caries Risk software, the first software designed and calibrated to provide caries risk for Romanian patients. Results. The caries risk was approximately 40% in our sample. The gi
APA, Harvard, Vancouver, ISO, and other styles
15

Zhou, Wei. "Big Data-Driven Hierarchical Local Area Network Security Risk Event Prediction Algorithm." Scientific Programming 2022 (February 8, 2022): 1–13. http://dx.doi.org/10.1155/2022/4960360.

Full text
Abstract:
Big data processing technology has attracted a lot of attention due to its forecasting and warning of Internet security situation. The current risk assessment system still has problems such as high false alarm rate and excessive reliance on expert knowledge in the security defense system. Based on the big data-driven principle, this paper constructs a hierarchical local area network security risk event prediction model and proposes a predictive complex event processing method. The model building process is evolved and improved on the basis of the scoring function. The establishment method of v
APA, Harvard, Vancouver, ISO, and other styles
16

Ambrus, Árpád, Júlia Szenczi-Cseh, Vy Vy N. Doan, and Adrienn Vásárhelyi. "Evaluation of Monitoring Data in Foods." Agrochemicals 2, no. 1 (2023): 69–95. http://dx.doi.org/10.3390/agrochemicals2010006.

Full text
Abstract:
Pesticide residue monitoring data reflect the actual residues in foods as traded and are suitable for estimating consumers’ exposure, evaluating compliance with maximum residue limits, MRLs, and refining future risk-based sampling programmes. The long-term exposure (daily intake) is calculated from the national or regional food consumption data and average residues in the edible portions of food. The non-detected residues may be counted as LOQ, 0.5 LOQ, or 0. The short-term intake is calculated from the large portion consumption of individual foods multiplied by the highest residue concentrati
APA, Harvard, Vancouver, ISO, and other styles
17

Klapkiv, Lyubov, and Yurij Klapkiv. "METHODS FOR THE IDENTIFICATION OF CYBER RISKS: AN ANALYSIS BASED ON PATENT DATA." CBU International Conference Proceedings 6 (September 24, 2018): 241–46. http://dx.doi.org/10.12955/cbup.v6.1163.

Full text
Abstract:
The problem of fast-rising cyber-risks become very important in the era of the Fourth Industrial Revolution. Cyber-risks cause not only high losses but also break the chain of economic relations between companies and their customers. Besides, cyber risks change their form and structure rapidly, so the tools of risk management must be adequate. That is why the problem of cyber-risk identification and assessment has gotten attention and become so actual. The purpose of this study is to outline new approaches to identifying and estimating cyber-risks based on the dates of the World International
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, W., M. Gardelin, J. Olsson, and T. Bosshard. "Forest fire risk assessment in Sweden using climate model data: bias correction and future changes." Natural Hazards and Earth System Sciences Discussions 3, no. 1 (2015): 837–90. http://dx.doi.org/10.5194/nhessd-3-837-2015.

Full text
Abstract:
Abstract. As the risk for a forest fire is largely influenced by weather, evaluating its tendency under a changing climate becomes important for management and decision making. Currently, biases in climate models make it difficult to realistically estimate the future climate and consequent impact on fire risk. A distribution-based scaling (DBS) approach was developed as a post-processing tool that intends to correct systematic biases in climate modelling outputs. In this study, we used two projections, one driven by historical reanalysis (ERA40) and one from a global climate model (ECHAM5) for
APA, Harvard, Vancouver, ISO, and other styles
19

Ivanov, Alexander, and Alexander Platov. "Environmental monitoring based on data processing of Internet of Things." E3S Web of Conferences 136 (2019): 01041. http://dx.doi.org/10.1051/e3sconf/201913601041.

Full text
Abstract:
The concept of online monitoring of the urban environment is proposed. It is based on the online processing of hydrometeorological and traffic information received through the Internet of Things. The traditional approach of the Internet of things includes transfer and storage of huge arrays of measurements in digital form. This concept of online monitoring is primarily an analysis, evaluation of the results of processing information received from wireless networks. The concept was implemented at Nizhny Novgorod State University of Architecture and Civil Engineering in several services includin
APA, Harvard, Vancouver, ISO, and other styles
20

Georgiou, Dimitra, and Costas Lambrinoudakis. "Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations." Future Internet 13, no. 3 (2021): 66. http://dx.doi.org/10.3390/fi13030066.

Full text
Abstract:
The General Data Protection Regulation (GDPR) harmonizes personal data protection laws across the European Union, affecting all sectors including the healthcare industry. For processing operations that pose a high risk for data subjects, a Data Protection Impact Assessment (DPIA) is mandatory from May 2018. Taking into account the criticality of the process and the importance of its results, for the protection of the patients’ health data, as well as the complexity involved and the lack of past experience in applying such methodologies in healthcare environments, this paper presents the main s
APA, Harvard, Vancouver, ISO, and other styles
21

Moore, Jason, Samuel Stuart, Peter McMeekin, et al. "Enhancing Free-Living Fall Risk Assessment: Contextualizing Mobility Based IMU Data." Sensors 23, no. 2 (2023): 891. http://dx.doi.org/10.3390/s23020891.

Full text
Abstract:
Fall risk assessment needs contemporary approaches based on habitual data. Currently, inertial measurement unit (IMU)-based wearables are used to inform free-living spatio-temporal gait characteristics to inform mobility assessment. Typically, a fluctuation of those characteristics will infer an increased fall risk. However, current approaches with IMUs alone remain limited, as there are no contextual data to comprehensively determine if underlying mechanistic (intrinsic) or environmental (extrinsic) factors impact mobility and, therefore, fall risk. Here, a case study is used to explore and d
APA, Harvard, Vancouver, ISO, and other styles
22

Kozhukhivskyi, A. D., and O. A. Kozhukhivska. "DEVELOPING A FUZZY RISK ASSESSMENT MODEL FOR ERPSYSTEMS." Radio Electronics, Computer Science, Control, no. 1 (April 8, 2022): 106. http://dx.doi.org/10.15588/1607-3274-2022-1-12.

Full text
Abstract:
Context. Because assessing information security risks is a complex and complete uncertainty process, and uncer-tainties are a major factor influencing valuation performance, it is advisable to use fuzzy methods and models that are adaptive to non-calculated data. The formation of vague assessments of risk factors is subjective, and risk assessment depends on the practical results obtained in the process of processing the risks of threats that have already arisen during the functioning of the organization and experience of information security professionals. Therefore, it will be advisable to u
APA, Harvard, Vancouver, ISO, and other styles
23

Wu, Yun Na, Yi Qi Hu, and Kai Feng Chen. "Data Processing in Risk Research on Non-Profit Government Investment Project of Agent Construction System Based on FATP." Applied Mechanics and Materials 730 (January 2015): 343–48. http://dx.doi.org/10.4028/www.scientific.net/amm.730.343.

Full text
Abstract:
The non-profit government investment project (Non-profit Government Investment Project, hereinafter referred to as NGIP) own huge investment, large-scale, long cycle, involving a wide range of social benefits and it is related to the country's macroeconomic development, in its implementation period does not great certainty. Under Agent Construction System NGIP has its own risk, the paper will be based on Fuzzy Analytic Hierarchy Process (Fuzzy Analytic Hierarchy Process, FAHP) establish NGIP risk assessment model, through data processing the final use of the evaluation model for empirical anal
APA, Harvard, Vancouver, ISO, and other styles
24

Dudek, Ewa, and Michał Kozłowski. "The Concept of Risk Tolerability Matrix Determination for Aeronautical Data and Information Chain." Journal of KONBiN 43, no. 1 (2017): 69–94. http://dx.doi.org/10.1515/jok-2017-0040.

Full text
Abstract:
Abstract This article is a continuation of the Authors’ study on the ways to ensure the quality and safety of aeronautical data and information in the entire process (considered as the supply chain) of those data and information creation, collection, processing and publication. In its content attention was paid to air traffic proactive safety management aa well as the need to manage identified incompatibilities. The risk assessment and tolerability matrices arising from ICAO specifications were presented, and then on their bases, the concept of such matrices determination for aeronautical data
APA, Harvard, Vancouver, ISO, and other styles
25

Begun, V. V., and S. Yu Potetiuiev. "New method for fire risk assessment." Mathematical machines and systems 4 (2020): 125–35. http://dx.doi.org/10.34121/1028-9763-2020-4-125-135.

Full text
Abstract:
Ukraine is at the last places at the international ratings concerning safety of life. It is related first of all to the fields of technogenic safety and fire safety. The values of annual losses due to fires, accidents and due to other emergency situations reach billions of hryvna, which is the essential part of the national budget and they have the increasing trends. Such situation is common for almost all branches of the industry of Ukraine except for the nuclear energy of Ukraine, which is under the additional guidance and under the additional control of the international organizations. The
APA, Harvard, Vancouver, ISO, and other styles
26

Zhao, Mingkai. "Research on Financial Risk Assessment Based on Artificial Intelligence." SHS Web of Conferences 151 (2022): 01017. http://dx.doi.org/10.1051/shsconf/202215101017.

Full text
Abstract:
The effective application of artificial intelligence (AI) models in various fields in the field of financial risk can improve the speed of data processing, deepen the degree of data analysis and reduce the labor cost, thus effectively improving the efficiency of financial risk control. The application of AI in the field of financial risk management puts forward new requirements for the system setup and operation mode of financial supervision. With the rapid growth ofcomputer and network technology, the increase of market transaction frequency, the diversification of data sources and the develo
APA, Harvard, Vancouver, ISO, and other styles
27

Zyelyk, Ya I., N. M. Kussul, S. V. Skakun, and A. Yu Shelestov. "Natural disaster risk assessment based on the ensemble processing and technology of heterogeneous geospatial data fusion." Kosmìčna nauka ì tehnologìâ 17, no. 1 (2011): 60–64. http://dx.doi.org/10.15407/knit2011.01.060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Murgano, Emanuele, Riccardo Caponetto, Giuseppina Pappalardo, Salvatore Damiano Cafiso, and Alessandro Severino. "A Novel Acceleration Signal Processing Procedure for Cycling Safety Assessment." Sensors 21, no. 12 (2021): 4183. http://dx.doi.org/10.3390/s21124183.

Full text
Abstract:
With the growing rate of urban population and transport congestion, it is important for a city to have bike riding as an attractive travel choice but one of its biggest barriers for people is the perceived lack of safety. To improve the safety of urban cycling, identification of high-risk location and routes are major obstacles for safety countermeasures. Risk assessment is performed by crash data analysis, but the lack of data makes that approach less effective when applied to cyclist safety. Furthermore, the availability of data collected with the modern technologies opens the way to differe
APA, Harvard, Vancouver, ISO, and other styles
29

Cadet, Bernard. "Epistemiological and Methodological aspects of Individual Risk Assessment." Psihologia Resurselor Umane 5, no. 2 (2020): 15–24. http://dx.doi.org/10.24837/pru.v5i2.324.

Full text
Abstract:
In societies in which technological development has reached an advanced stage, risk assessment of all kinds is an individual and social necessity. Individual risk assessment strategies employed by "ordinary" people have certain specific epistemological and methodological characteristics that are well worth studying in order to understand how such people behave. In this paper, the author argues that risk assessment is reached by means of a complex and subjective "construct"; he goes on to analyse two distinct approaches - factorial and procedural - to the assessment process. The difficulties th
APA, Harvard, Vancouver, ISO, and other styles
30

Algarni, Abdullah M., Vijey Thayananthan, and Yashwant K. Malaiya. "Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems." Applied Sciences 11, no. 8 (2021): 3678. http://dx.doi.org/10.3390/app11083678.

Full text
Abstract:
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surface of these cyber systems. Consequently, there has been a consequent increase in the associated cybersecurity risks. However, no significant studies have been conducted that examine, compare, and evaluate the approaches used by the risk calculators to
APA, Harvard, Vancouver, ISO, and other styles
31

Bidyuk, P. I., N. V. Kuznietsova, O. M. Trofymchuk, O. M. Terentiev, and L. B. Levenchuk. "Bayesian modeling of risks of various origin." KPI Science News, no. 4 (October 26, 2022): 7–18. http://dx.doi.org/10.20535/kpisn.2021.4.251684.

Full text
Abstract:
Background. Financial as well as many other types of risks are inherent to all types of human activities. The problem isto construct adequate mathematical description for the formal representation of risks selected and to use it for possibleloss estimation and forecasting. The loss estimation can be based upon processing available data and relevant expertestimates characterizing history and current state of the processes considered. An appropriate instrumentation for mod-elling and estimating risks of possible losses provides probabilistic approach including Bayesian techniques known todayas B
APA, Harvard, Vancouver, ISO, and other styles
32

Mavrina, L., E. Shaikhlislamova, I. Khasanova, L. Karimova, N. Muldasheva, and N. Beigul. "Professional risk in processing processes complex (review of literature)." Sanitarnyj vrač (Sanitary Inspector), no. 3 (March 1, 2020): 29–37. http://dx.doi.org/10.33920/med-08-2003-03.

Full text
Abstract:
The relevance of the problem. Ensuring safe working conditions is currently an urgent problem of our time. Purpose of work. Analysis of bibliographic data on issues of occupational risk, industrial injuries among workers of the processing complex. Materials and methods. To achieve this goal, materials related to this topic were studied in the works of domestic and foreign scientists. Results. A lot of scientific works are devoted to the problem of assessing professional risk in the production of a processing complex. Modern research has proved that risk assessment is one of the main methods fo
APA, Harvard, Vancouver, ISO, and other styles
33

Reinivuo, Heli, Tero Hirvonen, Marja-Leena Ovaskainen, Tommi Korhonen, and Liisa M. Valsta. "Dietary survey methodology of FINDIET 2007 with a risk assessment perspective." Public Health Nutrition 13, no. 6A (2010): 915–19. http://dx.doi.org/10.1017/s1368980010001096.

Full text
Abstract:
AbstractA cross-sectional survey, FINDIET 2007, was carried out in Finland. Food intake data was collected by a 48 h recall interview. Additional food intake data was collected by a repeated 3 d food diary, a barcode-based product diary, a food frequency questionnaire and by a supplementary questionnaire on rarely eaten foods. The purpose of the present paper is to describe the methodology of the national dietary survey and to discuss the particular implications for the applications of food consumption data in risk assessment. The food consumption data of the FINDIET 2007 survey can be used in
APA, Harvard, Vancouver, ISO, and other styles
34

Bujna, Marián, and Petr Dostál. "Assessment of Selected Equipment by Method FTA." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 65, no. 5 (2017): 1655–61. http://dx.doi.org/10.11118/actaun201765051655.

Full text
Abstract:
The aim of my research was to qualitatively and quantitatively evaluate the potential risks on Extruder, detect the probability of occurrence and therefore take reformation measures for their elimination or minimization. Throughout the research, we focused on the process compounding and recycling of plastic waste, production stage of secondary processing with plastic waste. We have reviewed the extruder machine. First, we qualitative consider the device by constructing fault tree. First, we consider qualitative data of the device with constructing fault tree, Subsequently, we use quantitative
APA, Harvard, Vancouver, ISO, and other styles
35

Onishchenko, P. S., K. Y. Klyshnikov, and E. A. Ovcharenko. "Artificial Neural Networks in Cardiology: Analysis of Numerical and Text Data." Mathematical Biology and Bioinformatics 15, no. 1 (2020): 40–56. http://dx.doi.org/10.17537/2020.15.40.

Full text
Abstract:
This review discusses works on the use of artificial neural networks for processing numerical and textual data. Application of a number of widely used approaches is considered, such as decision support systems; prediction systems, providing forecasts of outcomes of various methods of treatment of cardiovascular diseases, and risk assessment systems. The possibility of using artificial neural networks as an alternative approach to standard methods for processing patient clinical data has been shown. The use of neural network technologies in the creation of automated assistants to the attending
APA, Harvard, Vancouver, ISO, and other styles
36

Kraus, Michal. "Risk assessments of contemporary accidents in construction industry." MATEC Web of Conferences 146 (2018): 03004. http://dx.doi.org/10.1051/matecconf/201814603004.

Full text
Abstract:
The contribution deals with the risk assessments of contemporary accidents in construction in the Czech Republic. The risk analysis is defined as a systematic and structured data processing to identify potential hazards. The risk is a quantitative or qualitative expression of threat. A number of accidents and human errors are characteristic of the construction industry. A zero risk does not exist. An analysis of 615 incidents is presented which identified the location within the building sector in the Czech Republic. The risk analysis including the Risk Assessment Matrix (RAM) is based on seco
APA, Harvard, Vancouver, ISO, and other styles
37

Le Duc, Anh, Lam Dao Duy, Chi Thai Thi Kim, and Phuong Bach Thi Diep. "A machine learning approach to risk assessment of expressway bridges." Transport and Communications Science Journal 73, no. 7 (2022): 661–73. http://dx.doi.org/10.47869/tcsj.73.7.1.

Full text
Abstract:
The expressway network in Vietnam is developing strongly, playing the role of the backbone of the national road system, in which bridge construction accounts for a large proportion. With many specific characteristics and complex risks always hidden in all stages of the expressway project, risk assessment to have solutions and plans to prevent and respond to risks, limiting the impacts of quality assurance and operational safety of the works is essential. However, the current risk assessment and forecasting models still have many limitations. The application of Machine Learning to all aspects o
APA, Harvard, Vancouver, ISO, and other styles
38

SANTILLANA FARAKOS, SOFIA M., RÉGIS POUILLOT, GORDON R. DAVIDSON, et al. "A Quantitative Risk Assessment of Human Salmonellosis from Consumption of Walnuts in the United States." Journal of Food Protection 82, no. 1 (2018): 45–57. http://dx.doi.org/10.4315/0362-028x.jfp-18-233.

Full text
Abstract:
ABSTRACT We assessed the risk of human salmonellosis from consumption of shelled walnuts in the United States and the impact of 0- to 5-log reduction treatments for Salmonella during processing. We established a baseline model with Salmonella contamination data from 2010 to 2013 surveys of walnuts from California operations to estimate baseline prevalence and levels of Salmonella during preshelling storage and typical walnut processing stages, considered U.S. consumption data, and applied an adapted dose-response model from the Food and Agriculture Organization and the World Health Organizatio
APA, Harvard, Vancouver, ISO, and other styles
39

Shah, S. K. Ali, G. Khan, S. Ali, J. A. Qureshi, N. Habib, and A. Khan. "MULTI-HAZARD RISK ASSESSMENT OF QURUMBAR VALLEY, GHIZER, GILGIT BALTISTAN, PAKISTAN." Journal of Mountain Area Research 4 (December 23, 2019): 24. http://dx.doi.org/10.53874/jmar.v4i0.63.

Full text
Abstract:
Being located in a seismically active zone, these mountain valleys are exposed to different hydro-meteorological hazards like rockfall, debris flow, landslide, ice avalanches, and glacial lake outburst flood (GLOFs). The present study is to investigate different multi-hazards and their prevailing risk in the particular area of Qurumbar valley Ishkoman. In the mid-nineteen and twenty centuries at least six devastating glacial lake outburst floods (GLOFs) has been recorded, initially, only the Qurumbar glacier was considered as the main cause of this outburst flood, later field investigation and
APA, Harvard, Vancouver, ISO, and other styles
40

Dai, Yi Lan, and Lei Chen. "Risk Assessment and Countermeasures of Occupational Fraud Conduct in Corporate Construction Projects." Applied Mechanics and Materials 599-601 (August 2014): 2130–33. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.2130.

Full text
Abstract:
Risk management has been a part of enterprise engineering construction projects. Since previous studies mostly analyzed in a qualitative way. This paper utilized in a more quantitative way, which merges the use of questionnaires and the use of risk assessment formula for data processing. The results show that the probability and consequences of corporate construction projects in 18 career malpractice risk events fall into four categories: high-risk and high-probability, high-risk and low-probability, low risk and high probability, low risk and low probability. And accordingly it puts forward t
APA, Harvard, Vancouver, ISO, and other styles
41

Meily, Meily. "XYZ Web App Information Security Management Risk Assessment." ACMIT Proceedings 1, no. 1 (2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.

Full text
Abstract:
Cloud computing is one of the strategic technology trends. It’s pay as you go characteristic and the fact that the service is provided via a broad network, such as a web browser is what makes cloud providers incentivised by profits by providing cloud services, and cloud customers are interested in the chance of eliminating costs that come with in-house service provision. Due to its infrastructure where cloud providers maintain everything cloud customers are wary and concerned about their data and system security. Hence this paper was tries to address and answer cloud customers’ concern on secu
APA, Harvard, Vancouver, ISO, and other styles
42

Chen, Manting, Hailiang Wang, Lisha Yu, et al. "A Systematic Review of Wearable Sensor-Based Technologies for Fall Risk Assessment in Older Adults." Sensors 22, no. 18 (2022): 6752. http://dx.doi.org/10.3390/s22186752.

Full text
Abstract:
Falls have been recognized as the major cause of accidental death and injury in people aged 65 and above. The timely prediction of fall risks can help identify older adults prone to falls and implement preventive interventions. Recent advancements in wearable sensor-based technologies and big data analysis have spurred the development of accurate, affordable, and easy-to-use approaches to fall risk assessment. The objective of this study was to systematically assess the current state of wearable sensor-based technologies for fall risk assessment among community-dwelling older adults. Twenty-fi
APA, Harvard, Vancouver, ISO, and other styles
43

Shandrivska, O., and N. Shynkarenko. "APPLIED RISK ASSESSMENT IN THE SYSTEM OF SOCIO-ECONOMIC PROCESSES IN CYBERSPACE." Journal of Lviv Polytechnic National University. Series of Economics and Management Issues 4, no. 2 (2020): 94–105. http://dx.doi.org/10.23939/semi2020.02.094.

Full text
Abstract:
In the paper investigated safety of socio-economic processes in the virtual space. Studied the main trends influence on formation of preventive and adaptive mechanisms for ensuring information and cyber security enterprises. Key trends of the modern business and social environment include: globalization, informatization and individualization of consumer needs; mediatization, territorialization and universalization of social phenomena. Presented an original ensuring security model for the virtual information sphere. In this model was invented a conceptual scheme for identifying the information
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Yijie. "Research on Supply Chain Financial Risk Assessment Based on Blockchain and Fuzzy Neural Networks." Wireless Communications and Mobile Computing 2021 (February 16, 2021): 1–8. http://dx.doi.org/10.1155/2021/5565980.

Full text
Abstract:
With the development of supply chain finance, the credit risk of small- and medium-sized financing enterprises from the perspective of supply chain finance has arisen. Risk management is one of the key tasks of the credit business of banks and other financial institutions, which runs through all aspects of the credit business before, during, and after the loan. This article combines blockchain and fuzzy neural network algorithms to study the credit risk of SME financing from the perspective of supply chain finance. This article builds a supply chain financial system through blockchain technolo
APA, Harvard, Vancouver, ISO, and other styles
45

Al-Dossari, Hmood, and Aisha Ali Sumaili. "A Data Governance Maturity Assessment: A Case Study of Saudi Arabia." International Journal of Managing Public Sector Information and Communication Technologies 12, no. 02 (2021): 19–30. http://dx.doi.org/10.5121/ijmpict.2021.12202.

Full text
Abstract:
Nowadays, data has become important and influences the decision-making process on government and business sectors. Data governance strategy should not be underestimated because it increases the value of data and minimize data-related cost and risk. The data governance concept promotes the accomplishment of organizational objectives by developing and implementing an appropriate strategy for processing data in perfect and secure manner. This study aims to assess the maturity of data governance for Saudi sectors by design a framework and using it to measure whether the data governance have been a
APA, Harvard, Vancouver, ISO, and other styles
46

Hofstee, Willem K. B. "Types and variables: towards a congenial procedure for handling personality data." European Journal of Personality 16, no. 1_suppl (2002): S89—S96. http://dx.doi.org/10.1002/per.447.

Full text
Abstract:
Standard procedures for processing and interpreting data in personality assessment run the risk of losing their audience. Most notably, relative scaling of data, whether through interindividual or intra‐individual comparison, leads to losing either the persons or the variables from view. I set out an alternative, more congenial procedure for handling personality data, consisting of (i) translating assessments to a bipolar bounded scale running from − 1 to + 1, (ii) adopting the uncorrected average cross‐product (ACP) as the index of association or correspondence between variables and between i
APA, Harvard, Vancouver, ISO, and other styles
47

Xu, Wenpei, and Ting-Kwei Wang. "Dynamic safety prewarning mechanism of human–machine–environment using computer vision." Engineering, Construction and Architectural Management 27, no. 8 (2020): 1813–33. http://dx.doi.org/10.1108/ecam-12-2019-0732.

Full text
Abstract:
PurposeThis study provides a safety prewarning mechanism, which includes a comprehensive risk assessment model and a safety prewarning system. The comprehensive risk assessment model is capable of assessing nine safety indicators, which can be categorised into workers’ behaviour, environment and machine-related safety indicators, and the model is embedded in the safety prewarning system. The safety prewarning system can automatically extract safety information from surveillance cameras based on computer vision, assess risks based on the embedded comprehensive risk assessment model, categorise
APA, Harvard, Vancouver, ISO, and other styles
48

Borghi, Francesca, Libero Andrea Mazzucchelli, Davide Campagnolo, et al. "Retrospective Exposure Assessment Methods Used in Occupational Human Health Risk Assessment: A Systematic Review." International Journal of Environmental Research and Public Health 17, no. 17 (2020): 6190. http://dx.doi.org/10.3390/ijerph17176190.

Full text
Abstract:
As part of the assessment and management of chemical risk and occupational hygiene, retrospective exposure assessment (REA) to chemical agents can be defined as the estimate of exposure associated with a person’s work history. The fundamental problem underlying the reconstruction of the exposure is that of transforming this type of information in quantitative terms to obtain an accurate estimate. REA can follow various approaches, some of which are technically complicated and both time and resource consuming. The aim of this systematic review is to present the techniques mainly used for occupa
APA, Harvard, Vancouver, ISO, and other styles
49

de Lusignan, S., S.-T. Liaw, C. Kuziemsky, et al. "Big Data Usage Patterns in the Health Care Domain: A Use Case Driven Approach Applied to the Assessment of Vaccination Benefits and Risks." Yearbook of Medical Informatics 23, no. 01 (2014): 27–35. http://dx.doi.org/10.15265/iy-2014-0016.

Full text
Abstract:
Summary Background: Generally benefits and risks of vaccines can be determined from studies carried out as part of regulatory compliance, followed by surveillance of routine data; however there are some rarer and more long term events that require new methods. Big data generated by increasingly affordable personalised computing, and from pervasive computing devices is rapidly growing and low cost, high volume, cloud computing makes the processing of these data inexpensive. Objective: To describe how big data and related analytical methods might be applied to assess the benefits and risks of va
APA, Harvard, Vancouver, ISO, and other styles
50

Huang, Jianling, Xiaoye Zeng, Jing Fu, Yang Han, and Huihua Chen. "Safety Risk Assessment Using a BP Neural Network of High Cutting Slope Construction in High-Speed Railway." Buildings 12, no. 5 (2022): 598. http://dx.doi.org/10.3390/buildings12050598.

Full text
Abstract:
High-speed railway construction is extending to mountainous areas, and the harsh environment and complex climate pose various risks to the slope construction. This seriously threatens human lives and causes huge economic losses. The existing research results on the construction safety risks of high cutting slope construction in HSRs are limited, and a complete set of safety risk assessment processes and methods has not yet been formed. Therefore, in this study, we aimed to develop a safety risk assessment model, including factor identification and classification and assessment data processing,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!