Showing 161 - 180 results of 292 for search '"enterprise systems"', query time: 0.12s Refine Results
  1. 161
  2. 162
  3. 163

    Moving Beyond Proof of Concept and Pilots to Mainstream: Discovery and Lessons from Blockchain in Healthcare by Sathya Krishnasamy, MS, Badri Narayanan Gopalakrishnan, PhD

    Published 2023-12-01
    “…Possibilities and results of the collaborative processes have to be shown in meticulous economic rigor for any possibilities of blockchain efforts getting the enterprise portfolio dollars against many enterprise systems that are already overloading budgets. …”
    Get full text
    Article
  4. 164
  5. 165
  6. 166
  7. 167

    Automated Modeling with Abstraction for Enterprise Architecture (AMA4EA): Business Process Model Automation in an Industry 4.0 Laboratory by Marco Nardello, Shengnan Han, Charles Møller, John Gøtze

    Published 2019-07-01
    “…An abstraction hierarchy is introduced by AMA4EA to support companies to automatically abstract data from enterprise systems to concepts, then to automatically create an EA model. …”
    Get full text
    Article
  8. 168

    An Improved Route-Finding Algorithm Using Ubiquitous Ontology-Based Experiences Modeling by Maryam Barzegar, Abolghasem Sadeghi-Niaraki, Maryam Shakeri, Soo-Mi Choi

    Published 2019-01-01
    “…Every day, people are hired in different organizations and old and retiring employees are eliminated from enterprise systems. Eliminating these individuals from organizations leads to the loss of their spatial experiences. …”
    Get full text
    Article
  9. 169
  10. 170
  11. 171
  12. 172

    FABS: A Framework for Addressing the Business Process Change Challenges for Smart City Development by Vahid Javidroozi, Hanifa Shah, Gerald Feldman

    Published 2023-01-01
    “…By undertaking a rigorous theoretical adaptation process and incorporating success factors, tools, techniques, and approaches from diverse domains, including enterprise systems, as well as conducting interviews and document analysis, our study contributes to the development of FABS. …”
    Get full text
    Article
  13. 173

    Implementing Benford’s law in continuous monitoring applications by Kishore Singh, Peter Best

    Published 2020-06-01
    “…The prototype exploits audit trails in enterprise systems. Data: Data was obtained from the SAP ERP systems of two large organizations. …”
    Get full text
    Article
  14. 174

    A UAV-Based Framework for Semi-Automated Thermographic Inspection of Belt Conveyors in the Mining Industry by Regivaldo Carvalho, Richardson Nascimento, Thiago D’Angelo, Saul Delabrida, Andrea G. C. Bianchi, Ricardo A. R. Oliveira, Héctor Azpúrua, Luis G. Uzeda Garcia

    Published 2020-04-01
    “…We also proposed and implemented a back-end platform that enables field and cloud connectivity with enterprise systems. Finally, we have also cataloged the anomalies detected during the extensive field tests in order to build a structured dataset that will allow for future experimentation.…”
    Get full text
    Article
  15. 175
  16. 176
  17. 177
  18. 178

    Testing the arbitrage pricing theory on the Tehran stock exchange by Sabetfar, Pooyar

    Published 2011
    “…Many empirical studies on the APT have already been conducted in free enterprise systems but, no attention has been given in full Sharia compliant close economy. …”
    Get full text
    Thesis
  19. 179

    Features and technology of enterprise internal benchmarking by A.V. Dubodelova, O.V. Yurynets

    Published 2013-06-01
    “…To make the internal benchmarking conduction helpful, it is advisabled to begin with the study and documentation of all existing in the enterprise systems and business processes.…”
    Get full text
    Article
  20. 180

    Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures by Weiwei Miao, Xinjian Zhao, Nianzhe Li, Song Zhang, Qianmu Li, Xiaochao Li

    Published 2024-10-01
    “…It is difficult to adapt to the security protection needs in large-scale distributed new energy, third-party aggregation platforms, and flexible interaction scenarios with power grid enterprise systems. It is necessary to conduct research on dynamic security protection models for IoT and other Blockchain-based IoT architectures. …”
    Get full text
    Article