Data Capturing: Methods, Issues and Concern

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward Provenance Capturing as Cross-Cutting Concern

Although provenance gained much attention, solutions to capture provenance do not meet all the requirements. For instance, most solution currently assume a closed world and are explicitly designed to capture provenance. Thus, they fail in integrating the provenance concern into existing environments. Hence, we argue that provenance should be considered as cross-cutting concern that can easily b...

متن کامل

Capturing Concern Descriptions During Program Navigation

On Monday morning, Pat gets assigned the task of restructuring the data model of the company’s SuperTool software, to optimize performance for speed. Pat opens the software development environment, checks out the 1357 source files of SuperTool, and confidently begins the task. Although not familiar with SuperTool’s code base, Pat infallibly knows which file to open, in which order, and what cha...

متن کامل

data mining rules and classification methods in insurance: the case of collision insurance

assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...

15 صفحه اول

Zika virus: issues of concern.

The suspected involvement of Zika virus (ZIKV), an arthropod-borne flaviviral agent newly emerged in the Western Hemisphere, in the “epidemics” of microcephaly and Guillain-Barré syndrome (GBS) among patients from Brazil and French Polynesia is a matter of concern (Fauci and Morens, 2016). As a consequence, characterizing the viral neurotropism and neuropathogenicity, along with the host-pathog...

متن کامل

3 Shock Capturing Methods

8 were performed by Mark Sussman, see ref 29], 30]. The algorithm is based on the level set method and is quite simple to implement. It should be stressed that no special work is needed at pinchoo, merging, development of kinks, etc. and the algorithm is very easy to implement on a xed, uniform grid. All these gures should be read left to right, top to bottom. Figure 1 shows the evolution of a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Academic Research in Business and Social Sciences

سال: 2018

ISSN: 2222-6990

DOI: 10.6007/ijarbss/v8-i9/4642