-
161
Tai Chi Expertise Classification in Older Adults Using Wrist Wearables and Machine Learning
Published 2024-07-01Get full text
Article -
162
-
163
Moving Beyond Proof of Concept and Pilots to Mainstream: Discovery and Lessons from Blockchain in Healthcare
Published 2023-12-01“…Possibilities and results of the collaborative processes have to be shown in meticulous economic rigor for any possibilities of blockchain efforts getting the enterprise portfolio dollars against many enterprise systems that are already overloading budgets. …”
Get full text
Article -
164
-
165
Neuro-controller implementation for the embedded control system for mini-greenhouse
Published 2023-11-01Get full text
Article -
166
Extending Anxiety Detection from Multimodal Wearables in Controlled Conditions to Real-World Environments
Published 2025-02-01Get full text
Article -
167
Automated Modeling with Abstraction for Enterprise Architecture (AMA4EA): Business Process Model Automation in an Industry 4.0 Laboratory
Published 2019-07-01“…An abstraction hierarchy is introduced by AMA4EA to support companies to automatically abstract data from enterprise systems to concepts, then to automatically create an EA model. …”
Get full text
Article -
168
An Improved Route-Finding Algorithm Using Ubiquitous Ontology-Based Experiences Modeling
Published 2019-01-01“…Every day, people are hired in different organizations and old and retiring employees are eliminated from enterprise systems. Eliminating these individuals from organizations leads to the loss of their spatial experiences. …”
Get full text
Article -
169
-
170
Forecasting Seasonal Sales with Many Drivers: Shrinkage or Dimensionality Reduction?
Published 2022-12-01Get full text
Article -
171
Application of Aligned-UMAP to longitudinal biomedical studies
Published 2023-06-01Get full text
Article -
172
FABS: A Framework for Addressing the Business Process Change Challenges for Smart City Development
Published 2023-01-01“…By undertaking a rigorous theoretical adaptation process and incorporating success factors, tools, techniques, and approaches from diverse domains, including enterprise systems, as well as conducting interviews and document analysis, our study contributes to the development of FABS. …”
Get full text
Article -
173
Implementing Benford’s law in continuous monitoring applications
Published 2020-06-01“…The prototype exploits audit trails in enterprise systems. Data: Data was obtained from the SAP ERP systems of two large organizations. …”
Get full text
Article -
174
A UAV-Based Framework for Semi-Automated Thermographic Inspection of Belt Conveyors in the Mining Industry
Published 2020-04-01“…We also proposed and implemented a back-end platform that enables field and cloud connectivity with enterprise systems. Finally, we have also cataloged the anomalies detected during the extensive field tests in order to build a structured dataset that will allow for future experimentation.…”
Get full text
Article -
175
-
176
Contextual Meaning-Based Approach to Fine-Grained Online Product Review Analysis for Product Design
Published 2024-01-01Get full text
Article -
177
-
178
Testing the arbitrage pricing theory on the Tehran stock exchange
Published 2011“…Many empirical studies on the APT have already been conducted in free enterprise systems but, no attention has been given in full Sharia compliant close economy. …”
Get full text
Thesis -
179
Features and technology of enterprise internal benchmarking
Published 2013-06-01“…To make the internal benchmarking conduction helpful, it is advisabled to begin with the study and documentation of all existing in the enterprise systems and business processes.…”
Get full text
Article -
180
Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures
Published 2024-10-01“…It is difficult to adapt to the security protection needs in large-scale distributed new energy, third-party aggregation platforms, and flexible interaction scenarios with power grid enterprise systems. It is necessary to conduct research on dynamic security protection models for IoT and other Blockchain-based IoT architectures. …”
Get full text
Article