Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 3

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  system biznesowy
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
This article describes in detail the elements of value creation through the transformations and flexibility, which is carried out in the implementation of sustainable manufacturing. The purpose of this study is to generate the criteria or elements that build the sustainable value creation process through a literature review analysis. The overall classification of sustainable manufacturing implementation discussed shows several essential factors that support this. The process of review studies on selected papers strengthens the classification carried out to obtain the necessary elements of sustainable value creation. The value created can later be a hallmark of the company's superiority to survive the market competition. Besides, the role of partnerships, such as collaboration indicates a positive influence in generating value creation to increasing the company's competitive rate. In addition, the importance of partnership processes such as collaboration and cooperation between stakeholders, is needed to generate value cr-ation to increase the company's competitive level. The partnership process is one of the critical factors in creating sustainable value in achieving sustainable manufacturing in the future.
PL
Artykuł zawiera opis przykładu użycia metod eksploracji danych do wykrywania nadużyć w systemach biznesowych IT. Przedstawiono wybrane metody eksploracyjne – k-najbliższych sąsiadów, drzewa wzmacniane, sieci neuronowe, drzewa CHAID, drzewa C&RT, MARSplines. Metody te zastosowano do zbudowania projektu eksploracyjnego w programie STATISTICA 10 PL. Do badań użyto danych z konkursu KDD Cup 99. Zawierają one symulowane ataki w komputerowej sieci wojskowej.
EN
This paper describes how to use the method of data mining methods to detect fraud. Several useful for fraud detection data mining methods described in this article, namely: k-nearest neighbor, wood-reinforced, neural networks, trees, CHAID, C & RT tree, MARSplines. These methods have been used to build the project exploration in STATISTICA 10 PL. Usefulness of these methods to detect attacks on computer network. The study used data from the KDD Cup 99 competition. These data include simulated attacks on military networks.
EN
The paper presents the proposition of model of determination of information security level. The process of determination of information security level was divided into two phases: determination of security level and analysis of security level. This model allows for determination of information level in quantitative measures.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.