Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The maintenance management in the macro-ergonomics context
The future factory empowers managers with new capabilities and enables the realization of
sophisticated approaches based on the collaboration of devices, network services within the …
sophisticated approaches based on the collaboration of devices, network services within the …
[HTML][HTML] BR4DQ: A methodology for grou** business rules for data quality evaluation
Data quality evaluation is built upon data quality measurement results.“Data quality
evaluation” uses the “data quality rules” representing the risk appetite of the organization to …
evaluation” uses the “data quality rules” representing the risk appetite of the organization to …
[HTML][HTML] A Process-Centered Approach to the Description of Clinical Pathways—Forms and Determinants
The aim of the study is to indicate the need for variability in the presentation of clinical
pathways, in various phases of their implementation, and to define the forms of presentation …
pathways, in various phases of their implementation, and to define the forms of presentation …
Multi-faceted methodology of the risk analysis and management referring to the IT system supporting the processing of documents at different levels of sensitivity
M Kiedrowicz - MATEC Web of Conferences, 2017 - matec-conferences.org
This article outlines the methodology of the IT system risk analysis and management,
including various categories of risk factors significant from the point of view of the sensitive …
including various categories of risk factors significant from the point of view of the sensitive …
A semantic similarity evaluation method and a tool utilised in security applications based on ontology structure and lexicon analysis
M Chmielewski, M Paciorkowska… - … on Mathematics and …, 2017 - ieeexplore.ieee.org
This paper discusses a semantic similarity evaluation method within semantic models
represented as ontologies or an instance bases. The capabilities of the method can be used …
represented as ontologies or an instance bases. The capabilities of the method can be used …
Consistency conditions for multi-object distributed operations
N Mittal, VK Garg - … on Distributed Computing Systems (Cat. No …, 1998 - ieeexplore.ieee.org
The traditional distributed shared memory (DSM) model provides atomicity at levels of read
and write on single objects. Therefore, multi-object operations such as double compare and …
and write on single objects. Therefore, multi-object operations such as double compare and …
Dynamic topology construction for road network
Y Chen, C Wu, M Yao - 2008 Fourth International Conference …, 2008 - ieeexplore.ieee.org
How to maintain topological relationship's real-time updates and maintain dynamic
topological relationship, is an important issue must be taken into account in the network …
topological relationship, is an important issue must be taken into account in the network …
Reference Low-code Development Platform Architecture: Aurea BPM
R Waszkowski - Human Factors in Engineering, 2023 - taylorfrancis.com
This chapter presents the reference architecture of low-code development platforms. The
architecture assumes the division of the platform into subsystems organized in the …
architecture assumes the division of the platform into subsystems organized in the …
The implementation of dynamic business process management
M Szelągowski, M Szelągowski - Dynamic Business Process Management …, 2019 - Springer
The implementation of process management requires, first and foremost, the introduction of
changes to the fundamental principles of management within the organization. It is …
changes to the fundamental principles of management within the organization. It is …
System risk model of the IT system supporting the processing of documents at different levels of sensitivity
J Stanik - MATEC Web of Conferences, 2017 - matec-conferences.org
This study outlines the system risk model of IT system oriented at the safety of the processes
of sensitive data processing. The model constitutes a multi-dimensional approach to the …
of sensitive data processing. The model constitutes a multi-dimensional approach to the …