Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    REVIEW

    Survey and Prospect for Applying Knowledge Graph in Enterprise Risk Management

    Pengjun Li1, Qixin Zhao1, Yingmin Liu1, Chao Zhong1, Jinlong Wang1,*, Zhihan Lyu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3825-3865, 2024, DOI:10.32604/cmc.2024.046851 - 26 March 2024

    Abstract Enterprise risk management holds significant importance in fostering sustainable growth of businesses and in serving as a critical element for regulatory bodies to uphold market order. Amidst the challenges posed by intricate and unpredictable risk factors, knowledge graph technology is effectively driving risk management, leveraging its ability to associate and infer knowledge from diverse sources. This review aims to comprehensively summarize the construction techniques of enterprise risk knowledge graphs and their prominent applications across various business scenarios. Firstly, employing bibliometric methods, the aim is to uncover the developmental trends and current research hotspots within the… More >

  • Open Access

    ARTICLE

    An Overview of Seismic Risk Management for Italian Architectural Heritage

    Lucio Nobile*

    Structural Durability & Health Monitoring, Vol.17, No.5, pp. 353-368, 2023, DOI:10.32604/sdhm.2023.028247 - 07 September 2023

    Abstract The frequent occurrence of seismic events in Italy poses a strategic problem that involves either the culture of preservation of historical heritage or the civil protection action aimed to reduce the risk to people and goods (buildings, bridges, dams, slopes, etc.). Most of the Italian architectural heritage is vulnerable to earthquakes, identifying the vulnerability as the inherent predisposition of the masonry building to suffer damage and collapse during an earthquake. In fact, the structural concept prevailing in these ancient masonry buildings is aimed at ensuring prevalent resistance to vertical gravity loads. Rarely do these ancient… More >

  • Open Access

    ARTICLE

    Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network

    Lei Feng1, Bo Wang1,*, Fuqi Ma1, Hengrui Ma2, Mohamed A. Mohamed3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1487-1501, 2023, DOI:10.32604/csse.2023.035377 - 09 February 2023

    Abstract As the scale of the power system continues to expand, the environment for power operations becomes more and more complex. Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately. Therefore, more reliable and accurate security control methods are urgently needed. In order to improve the accuracy and reliability of the operation risk management and control method, this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal… More >

  • Open Access

    ARTICLE

    TRUSED: A Trust-Based Security Evaluation Scheme for A Distributed Control System

    Saqib Ali1,*, Raja Waseem Anwar2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4381-4398, 2023, DOI:10.32604/cmc.2023.031472 - 31 October 2022

    Abstract Distributed control systems (DCS) have revolutionized the communication process and attracted more interest due to their pervasive computing nature (cyber/physical), their monitoring capabilities and the benefits they offer. However, due to distributed communication, flexible network topologies and lack of central control, the traditional security strategies are inadequate for meeting the unique characteristics of DCS. Moreover, malicious and untrustworthy nodes pose a significant threat during the formation of a DCS network. Trust-based secure systems not only monitor and track the behavior of the nodes but also enhance the security by identifying and isolating the malicious node, More >

  • Open Access

    ARTICLE

    Forecasting E-Commerce Adoption Based on Bidirectional Recurrent Neural Networks

    Abdullah Ali Salamai1,*, Ather Abdulrahman Ageeli1, El-Sayed M. El-kenawy2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5091-5106, 2022, DOI:10.32604/cmc.2022.021268 - 11 October 2021

    Abstract E-commerce refers to a system that allows individuals to purchase and sell things online. The primary goal of e-commerce is to offer customers the convenience of not going to a physical store to make a purchase. They will purchase the item online and have it delivered to their home within a few days. The goal of this research was to develop machine learning algorithms that might predict e-commerce platform sales. A case study has been designed in this paper based on a proposed continuous Stochastic Fractal Search (SFS) based on a Guided Whale Optimization Algorithm… More >

  • Open Access

    ARTICLE

    Dynamic Voting Classifier for Risk Identification in Supply Chain 4.0

    Abdullah Ali Salamai1, El-Sayed M. El-kenawy2, Ibrahim Abdelhameed3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3749-3766, 2021, DOI:10.32604/cmc.2021.018179 - 24 August 2021

    Abstract Supply chain 4.0 refers to the fourth industrial revolution’s supply chain management systems, which integrate the supply chain’s manufacturing operations, information technology, and telecommunication processes. Although supply chain 4.0 aims to improve supply chains’ production systems and profitability, it is subject to different operational and disruptive risks. Operational risks are a big challenge in the cycle of supply chain 4.0 for controlling the demand and supply operations to produce and deliver products across IT systems. This paper proposes a voting classifier to identify the operational risks in the supply chain 4.0 based on a Sine… More >

  • Open Access

    ARTICLE

    A Digital Start-up Project – CARM Tool as an Innovative Approach to Digital Government Transformation

    S. Green

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 257-269, 2020, DOI:10.32604/csse.2020.35.257

    Abstract The digital revolution impacts modern workplaces through constant advances in technology. This study uses a digital start-up project experience to demonstrate how a Digital Government Transformation can be beneficial. The increase of administrative requirements, compliance, and capability readiness has prompted the development of the Digital start–up project known as the CARM Tool (Compliance, Assurance and Risk Management). CARM introduces a low risk low cost and high productivity solution, which can directly and immediately benefit stakeholders in a large complex government enterprise. It aims to elevate staff performance, customer service and provide qualification between financial statements, asset management More >

  • Open Access

    ARTICLE

    Digital Continuity Guarantee Method of Urban Construction Archives Based on Risk Management

    Ran Ou1,2, Fei Chen1,2, Yongjun Ren1,2,*, Yepeng Liu1,2, Qirun Wang3

    Journal on Big Data, Vol.1, No.2, pp. 71-77, 2019, DOI:10.32604/jbd.2019.06057

    Abstract With the broad application of information technology in urban infrastructure, urban construction has entered the stage of a smart city, forming many electronic records in urban construction. These electronic records play a vital role in the maintenance of urban infrastructure. However, electronic records often change in the process of urban construction. How to preserve the electronic records of urban construction became a significant challenge. In response to this problem, this paper proposes the use of risk-based management techniques to ensure the digital continuity, authenticity, integrity, and availability of electronic records More >

  • Open Access

    ABSTRACT

    Risk modeling by CHAID decision tree algorithm

    A.S. Koyuncugil1, N. Ozgulbas2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.11, No.2, pp. 39-46, 2009, DOI:10.3970/icces.2009.011.039

    Abstract In this paper, a data mining model for detecting financial and operational risk indicators by CHAID Decision Tree is presenting. The identification of the risk factors by clarifying the relationship between the variables defines the discovery of knowledge from the financial and operational variables. Automatic and estimation oriented information discovery process coincides the definition of data mining. During the formation of model; an easy to understand, easy to interpret and easy to apply utilitarian model that is far from the requirement of theoretical background is targeted by the discovery of the implicit relationships between the More >

Displaying 1-10 on page 1 of 9. Per Page