期刊文献+
共找到3,614篇文章
< 1 2 181 >
每页显示 20 50 100
Identifying and classifying data risk sources and triggering events:A conceptual two-stage method for risk-aware data governance
1
作者 Mengdi Mu Jun Hao +1 位作者 Jin Li Jianping Li 《Journal of Management Science and Engineering》 2025年第4期656-677,共22页
In a data-intensive environment,the ability to accurately identify and manage data risks is essential for maintaining cybersecurity,preventing potential threats,supporting decision-making,and enabling effective post-i... In a data-intensive environment,the ability to accurately identify and manage data risks is essential for maintaining cybersecurity,preventing potential threats,supporting decision-making,and enabling effective post-incident analysis.Existing approaches to data risk identification are typically structured around the stages of the data lifecycle,offering a broad perspective but often lacking alignment with the specific dynamics of business operations.This study proposes a data-driven framework for data risk identification that reflects practical business contexts.The framework incorporates 25 categorized risk sources and 13 defined risk-triggering events,using data analysis to examine their interactions and influence.The approach demonstrates strong alignment with documented risk incidents and effectively captures relevant risk factors across operational scenarios.The implementation of this framework enables organizations to identify critical risk points more precisely,enhance the accuracy and timeliness of risk response strategies,and strengthen data governance practices.It also facilitates more informed strategic planning and cross-functional coordination,contributing to improved resilience and operational efficiency. 展开更多
关键词 data risk management data security data risk identification risk analysis
原文传递
The Application of Big data Mining in Risk Warning for Food Safety 被引量:6
2
作者 Yajie WANG Bing YANG +2 位作者 Yan LUO Jinlin HE Hong TAN 《Asian Agricultural Research》 2015年第8期83-86,共4页
Comprehensive evaluation and warning is very important and difficult in food safety. This paper mainly focuses on introducing the application of using big data mining in food safety warning field. At first,we introduc... Comprehensive evaluation and warning is very important and difficult in food safety. This paper mainly focuses on introducing the application of using big data mining in food safety warning field. At first,we introduce the concept of big data miming and three big data methods. At the same time,we discuss the application of the three big data miming methods in food safety areas. Then we compare these big data miming methods,and propose how to apply Back Propagation Neural Network in food safety risk warning. 展开更多
关键词 FOOD safety BIG data MINING risk WARNING BAYESIAN
在线阅读 下载PDF
Dependence Model Selection for Semi-Competing Risks Data 被引量:1
3
作者 Jin-Jian Hsieh Cheng-Fang Tsai 《Open Journal of Statistics》 2020年第2期228-238,共11页
We consider the model selection problem of the dependency between the?terminal event and the non-terminal event under semi-competing risks data. When the relationship between the two events is unspecified, the inferen... We consider the model selection problem of the dependency between the?terminal event and the non-terminal event under semi-competing risks data. When the relationship between the two events is unspecified, the inference on the non-terminal event is not identifiable. We cannot make inference on the non-terminal event without extra assumptions. Thus, an association model for?semi-competing risks data is necessary, and it is important to select an appropriate dependence model for a data set. We construct the likelihood function for semi-competing risks data to select an appropriate dependence model. From?simulation studies, it shows the performance of the proposed approach is well. Finally, we apply our method to a bone marrow transplant data set. 展开更多
关键词 COPULA MODEL LIKELIHOOD Function MODEL Selection Semi-Competing riskS data
在线阅读 下载PDF
Modeling data quality for risk assessment of GIS 被引量:1
4
作者 Su, Ying Jin, Zhanming Peng, Jie 《Journal of Southeast University(English Edition)》 EI CAS 2008年第S1期37-42,共6页
This paper presents a methodology to determine three data quality (DQ) risk characteristics: accuracy, comprehensiveness and nonmembership. The methodology provides a set of quantitative models to confirm the informat... This paper presents a methodology to determine three data quality (DQ) risk characteristics: accuracy, comprehensiveness and nonmembership. The methodology provides a set of quantitative models to confirm the information quality risks for the database of the geographical information system (GIS). Four quantitative measures are introduced to examine how the quality risks of source information affect the quality of information outputs produced using the relational algebra operations Selection, Projection, and Cubic Product. It can be used to determine how quality risks associated with diverse data sources affect the derived data. The GIS is the prime source of information on the location of cables, and detection time strongly depends on whether maps indicate the presence of cables in the construction business. Poor data quality in the GIS can contribute to increased risk or higher risk avoidance costs. A case study provides a numerical example of the calculation of the trade-offs between risk and detection costs and provides an example of the calculation of the costs of data quality. We conclude that the model contributes valuable new insight. 展开更多
关键词 risk assessment data quality geographical information system PROBABILITY spatial data quality
在线阅读 下载PDF
Risk Analysis Technique on Inconsistent Interview Big Data Based on Rough Set Approach
5
作者 Riasat Azim Abm Munibur Rahman +1 位作者 Shawon Barua Israt Jahan 《Journal of Data Analysis and Information Processing》 2016年第3期101-114,共14页
Rough set theory is relativly new to area of soft computing to handle the uncertain big data efficiently. It also provides a powerful way to calculate the importance degree of vague and uncertain big data to help in d... Rough set theory is relativly new to area of soft computing to handle the uncertain big data efficiently. It also provides a powerful way to calculate the importance degree of vague and uncertain big data to help in decision making. Risk assessment is very important for safe and reliable investment. Risk management involves assessing the risk sources and designing strategies and procedures to mitigate those risks to an acceptable level. In this paper, we emphasize on classification of different types of risk factors and find a simple and effective way to calculate the risk exposure.. The study uses rough set method to classify and judge the safety attributes related to investment policy. The method which based on intelligent knowledge accusation provides an innovative way for risk analysis. From this approach, we are able to calculate the significance of each factor and relative risk exposure based on the original data without assigning the weight subjectively. 展开更多
关键词 Rough Set Theory Big data risk Analysis data Mining Variable Weight Significance of Attribute Core Attribute Attribute Reduction
在线阅读 下载PDF
Quantile Regression Based on Semi-Competing Risks Data
6
作者 Jin-Jian Hsieh A. Adam Ding +1 位作者 Weijing Wang Yu-Lin Chi 《Open Journal of Statistics》 2013年第1期12-26,共15页
This paper considers quantile regression analysis based on semi-competing risks data in which a non-terminal event may be dependently censored by a terminal event. The major interest is the covariate effects on the qu... This paper considers quantile regression analysis based on semi-competing risks data in which a non-terminal event may be dependently censored by a terminal event. The major interest is the covariate effects on the quantile of the non-terminal event time. Dependent censoring is handled by assuming that the joint distribution of the two event times follows a parametric copula model with unspecified marginal distributions. The technique of inverse probability weighting (IPW) is adopted to adjust for the selection bias. Large-sample properties of the proposed estimator are derived and a model diagnostic procedure is developed to check the adequacy of the model assumption. Simulation results show that the proposed estimator performs well. For illustrative purposes, our method is applied to analyze the bone marrow transplant data in [1]. 展开更多
关键词 COPULA Model Dependent CENSORING QUANTILE Regression Semi-Competing riskS data
暂未订购
Comprehensive security risk factor identification for small reservoirs with heterogeneous data based on grey relational analysis model 被引量:6
7
作者 Jing-chun Feng Hua-ai Huang +1 位作者 Yao Yin Ke Zhang 《Water Science and Engineering》 EI CAS CSCD 2019年第4期330-338,共9页
Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when ... Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data. 展开更多
关键词 Security risk factor identification Heterogeneous data Grey relational analysis model Relational degree Information entropy Conditional entropy Small reservoir GUANGXI
在线阅读 下载PDF
HOW BIG DATA MAKES CONSTRUCTION PROJECT RISK INTACT
8
作者 Daniel Ng 《办公自动化》 2014年第S1期394-400,共7页
Construction project is not a standalone engineering maneuver.It is closely linked to the well-being of local communities in concern.The city renovation in Beijing down center for Olympic 2008 transformed many antique... Construction project is not a standalone engineering maneuver.It is closely linked to the well-being of local communities in concern.The city renovation in Beijing down center for Olympic 2008 transformed many antique architecture and regional landscape.It gave a world-recognized achievement in China s modem development and manifested a major milestone in China's economic development.In the course of metro construction projects,there are substantial interwoven municipal structures influencing the success of the projects,which including,but the least,all underground cables and ducts,sewage system,the power consumption of construction works,traffic diversion,air pollution,expatriate business activities and social security.There are many US and UK project insurance companies moving into Asia Pacific.They are doing re-insurance business on major construction guarantee,such as machinery damage,project on-time,power consumption,claims from contractors and communities.Environmental information,such as water quality,indoor and outdoor air quality,people inflow and lift waiting time play deterministic roles in construction's fit-touse.Big Data is a contemporary buzzword since 2013,and the key competence is to provide real time response to heuristic syndrome in order to make short-term prediction.This paper attempts to develop a conceptual model in big data for construction 展开更多
关键词 Construction PROJECT risk BIG data GRAPH modelling
在线阅读 下载PDF
Measuring the Intraday Jump Tail Risk of Financial Asset Price with Noisy High Frequency Data
9
作者 Chao Yu Xujie Zhao Feng Zhang 《Open Journal of Statistics》 2017年第1期72-83,共12页
This paper proposes a simple two-step nonparametric procedure to estimate the intraday jump tail and measure the jump tail risk in asset price with noisy high frequency data. We first propose the pre-averaging thresho... This paper proposes a simple two-step nonparametric procedure to estimate the intraday jump tail and measure the jump tail risk in asset price with noisy high frequency data. We first propose the pre-averaging threshold approach to estimate the intraday jumps occurred, and then use the peaks-over-threshold (POT) method and generalized Pareto distribution (GPD) to model the intraday jump tail and further measure the jump tail risk. Finally, an empirical example further demonstrates the power of the proposed method to measure the jump tail risk under the effect of microstructure noise. 展开更多
关键词 High Frequency data Intraday JUMP Microstructure Noise JUMP TAIL risk Pre-Averaging
暂未订购
Simulation Approach to Risk Quantification While Resources Estimation on Seismic and Log Data
10
作者 A. G. Averbukh N. L. Ivanova 《岩性油气藏》 CSCD 2010年第F07期109-112,共4页
在线阅读 下载PDF
Minimum MSE Weighted Estimator to Make Inferences for a Common Risk Ratio across Sparse Meta-Analysis Data
11
作者 Chukiat Viwatwongkasem Sutthisak Srisawad +4 位作者 Pichitpong Soontornpipit Jutatip Sillabutra Pratana Satitvipawee Prasong Kitidamrongsuk Hathaikan Chootrakool 《Open Journal of Statistics》 2022年第1期49-69,共21页
The paper aims to discuss three interesting issues of statistical inferences for a common risk ratio (RR) in sparse meta-analysis data. Firstly, the conventional log-risk ratio estimator encounters a number of problem... The paper aims to discuss three interesting issues of statistical inferences for a common risk ratio (RR) in sparse meta-analysis data. Firstly, the conventional log-risk ratio estimator encounters a number of problems when the number of events in the experimental or control group is zero in sparse data of a 2 × 2 table. The adjusted log-risk ratio estimator with the continuity correction points  based upon the minimum Bayes risk with respect to the uniform prior density over (0, 1) and the Euclidean loss function is proposed. Secondly, the interest is to find the optimal weights of the pooled estimate  that minimize the mean square error (MSE) of  subject to the constraint on  where , , . Finally, the performance of this minimum MSE weighted estimator adjusted with various values of points  is investigated to compare with other popular estimators, such as the Mantel-Haenszel (MH) estimator and the weighted least squares (WLS) estimator (also equivalently known as the inverse-variance weighted estimator) in senses of point estimation and hypothesis testing via simulation studies. The results of estimation illustrate that regardless of the true values of RR, the MH estimator achieves the best performance with the smallest MSE when the study size is rather large  and the sample sizes within each study are small. The MSE of WLS estimator and the proposed-weight estimator adjusted by , or , or are close together and they are the best when the sample sizes are moderate to large (and) while the study size is rather small. 展开更多
关键词 Minimum MSE Weights Adjusted Log-risk Ratio Estimator Sparse Meta-Analysis data Continuity Correction
在线阅读 下载PDF
A Data Security Framework for Cloud Computing Services 被引量:3
12
作者 Luis-Eduardo Bautista-Villalpando Alain Abran 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期203-218,共16页
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloudbased technologies,such as the Internet of Things.With increasing industr... Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloudbased technologies,such as the Internet of Things.With increasing industry adoption and migration of traditional computing services to the cloud,one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies.This work proposes a Data Security Framework for cloud computing services(CCS)that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS.This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation.The paper presents the design details of the framework,which consists of three stages:identification of data security requirements,management of data security risks and evaluation of data security performance in CCS. 展开更多
关键词 Cloud computing SERVICES computer security data security data security requirements data risk data security measurement
在线阅读 下载PDF
网络安全风险、跨境数据流动限制与数字服务贸易出口
13
作者 丛海彬 祁张辉 +1 位作者 唐敏 邹德玲 《工业技术经济》 北大核心 2026年第1期140-149,共10页
数字经济时代,网络安全风险已上升为制约数字服务跨境流动的核心因素,数字服务贸易作为全球经济复苏与结构转型的重要引擎,其出口高度依赖安全稳定的数据流通环境。本文以2014~2023年全球44个主要国家作为研究对象,分析探讨了网络安全... 数字经济时代,网络安全风险已上升为制约数字服务跨境流动的核心因素,数字服务贸易作为全球经济复苏与结构转型的重要引擎,其出口高度依赖安全稳定的数据流通环境。本文以2014~2023年全球44个主要国家作为研究对象,分析探讨了网络安全风险对数字服务贸易出口的影响以及跨境数据流动限制在其中所起到的关键作用。研究结果发现网络安全风险会显著抑制各国数字服务贸易出口,该结论经一系列稳健性检验后依然成立。异质性分析表明,从风险类型来看,利用性与混合性网络安全风险造成的影响更为显著;从作用对象来看,发达国家受网络安全风险冲击所造成的损失相对较小。机制检验发现,网络安全风险通过加强跨境数据流动限制来遏制数字服务贸易出口,而采取严格的监管措施则能缓解网络安全风险所带来的不利影响。本文的研究结论在一定程度上拓展了数字服务贸易出口的影响因素研究,同时也为平衡网络安全与数字服务贸易自由高质量发展提供了参考。 展开更多
关键词 网络安全风险 跨境数据流动限制 数字服务贸易出口 机制分析 监管环境 高质量发展 数字经济 数字贸易理论
在线阅读 下载PDF
Utilization of Open Source Spatial Data for Landslide Susceptibility Mapping at Chittagong District of Bangladesh—An Appraisal for Disaster Risk Reduction and Mitigation Approach
14
作者 Md. Ashraful Islam Sanzida Murshed +4 位作者 S. M. Mainul Kabir Atikul Haque Farazi Md. Yousuf Gazi Israt Jahan Syed Humayun Akhter 《International Journal of Geosciences》 2017年第4期577-598,共22页
Since creation of spatial data is a costly and time consuming process, researchers, in this domain, in most of the cases rely on open source spatial attributes for their specific purpose. Likewise, the present researc... Since creation of spatial data is a costly and time consuming process, researchers, in this domain, in most of the cases rely on open source spatial attributes for their specific purpose. Likewise, the present research aims at mapping landslide susceptibility at the metropolitan area of Chittagong district of Bangladesh utilizing obtainable open source spatial data from various web portals. In this regard, we targeted a study region where rainfall induced landslides reportedly causes causalities as well as property damage each year. In this study, however, we employed multi-criteria evaluation (MCE) technique i.e., heuristic, a knowledge driven approach based on expert opinions from various discipline for landslide susceptibility mapping combining nine causative factors—geomorphology, geology, land use/land cover (LULC), slope, aspect, plan curvature, drainage distance, relative relief and vegetation in geographic information system (GIS) environment. The final susceptibility map was devised into five hazard classes viz., very low, low, moderate, high, and very high, representing 22 km2 (13%), 90 km2 (53%);24 km2 (15%);22 km2 (13%) and 10 km2 (6%) areas respectively. This particular study might be beneficial to the local authorities and other stake-holders, concerned in disaster risk reduction and mitigation activities. Moreover this study can also be advantageous for risk sensitive land use planning in the study area. 展开更多
关键词 Susceptibility Mapping Open Source Spatial data Heuristic Model Chittagong METROPOLITAN Area GEOGRAPHIC Information System (GIS) Disaster risk Reduction
暂未订购
全生命周期视野下人工智能数据出境安全监管的具体场景、重点风险及体系构建
15
作者 李贤森 李坤锦 《河北法学》 北大核心 2026年第2期101-122,共22页
人工智能的发展离不开数据这一核心生产要素。数据的跨境流动在提升模型性能与多样性的同时,也带来了个人信息泄露、商业秘密外流和国家数据主权受损等安全风险。人工智能的风险在其全生命周期中逐级递增,具体体现在算法开发、服务提供... 人工智能的发展离不开数据这一核心生产要素。数据的跨境流动在提升模型性能与多样性的同时,也带来了个人信息泄露、商业秘密外流和国家数据主权受损等安全风险。人工智能的风险在其全生命周期中逐级递增,具体体现在算法开发、服务提供以及算力调用等环节。数据出境的技术路径复杂且存在监管盲区,导致现行监管框架面临技术规避行为和重要数据识别困境等现实问题。为构建安全与发展平衡的人工智能数据出境安全的监管体系,需建立能够动态响应风险的监管框架,通过建立数据分级响应机制与出境“白名单”制度,细化重要数据动态分类标准,并设立权责统一的监管主体,从而为我国人工智能产业全球化协作提供坚实的法治保障。 展开更多
关键词 人工智能 数据安全 数据跨境流动 算法风险 数据出境监管
原文传递
信息处理者安全保障义务的体系阐释
16
作者 苏成慧 《河北法学》 北大核心 2026年第1期120-138,共19页
安全保障义务本质上是一种危险、风险防免义务,其保障的安全权益包括国家安全、公共安全和个人安全。法律在风险防范中的价值追求为信息处理者安全保障义务的承担提供正当性基础。数字技术条件下,“信息处理者”的主体范围并不限于机构... 安全保障义务本质上是一种危险、风险防免义务,其保障的安全权益包括国家安全、公共安全和个人安全。法律在风险防范中的价值追求为信息处理者安全保障义务的承担提供正当性基础。数字技术条件下,“信息处理者”的主体范围并不限于机构主体,还应包括自然人主体。信息处理者安全保障义务包括积极义务和消极义务,其具体内容体现在不同领域、性质、等级的法规范中,以强制性规范为主要表达方式。信息处理者安全保障义务的体系展开应以宪法规定的基本权利为基点,在以强制性规范为主的公法体系中设置具体行为规范,《民法典》中相关引致条款和转介条款具有实现安全保障义务规范在公、私法体系中的衔接功能,使得作为保护性规范的安全保障义务规范在个人信息权益受损时的私法救济体系中能发挥“违法推定过失”的规范效果。 展开更多
关键词 数据安全保护 信息处理者 数据安全保障义务 数据安全风险 数据安全法治
原文传递
离岸数据风险分类、识别与管理系统开发及示范应用
17
作者 沐华平 朱晓雯 王翔 《中国科技产业》 2026年第1期58-62,共5页
针对离岸数据安全治理的理论缺口与实践需求,本研究聚焦海南自贸港等离岸数据高密度区域,旨在构建系统性治理方案以平衡数据安全与开放流动。研究建立了“三维度-四层级”风险治理框架,提出“沙盒监管+负面清单”治理范式,并研发了离岸... 针对离岸数据安全治理的理论缺口与实践需求,本研究聚焦海南自贸港等离岸数据高密度区域,旨在构建系统性治理方案以平衡数据安全与开放流动。研究建立了“三维度-四层级”风险治理框架,提出“沙盒监管+负面清单”治理范式,并研发了离岸数据风险智能管理系统。该系统集成了改进型风险识别引擎、合规评估模块与决策支持系统,实现了风险动态感知与闭环处置。海南自贸港应用验证表明,该系统显著提升了数据处理效率和风险识别准确性,有效解决规则适用性矛盾,精准拦截非法交互并降低监管延迟。该融合技术与管理创新的方案,成功平衡了离岸数据的安全与开放需求,“一线放开、二线管死”策略结合智能监管,为跨境数据流动提供了可复制的风险管理范式,对完善国家数据安全评估体系和参与国际规则制定具有重要实践价值。 展开更多
关键词 离岸数据 风险治理 跨境数据流动 海南自贸港
在线阅读 下载PDF
数据驱动下检察建议制发的范式转型与风险规制
18
作者 杨林霈 赵旭光 《河南财经政法大学学报》 2026年第1期150-166,共17页
传统检察建议制发模式面临监督效力“刚性不足”与“被动性”之困境,数据驱动依托算法监督模型,使之由被动响应到主动监督、柔性建议到刚性支撑、经验决策到科学决策转型,是新时代检察机关应对风险社会治理需求、充分释放技术赋能潜力... 传统检察建议制发模式面临监督效力“刚性不足”与“被动性”之困境,数据驱动依托算法监督模型,使之由被动响应到主动监督、柔性建议到刚性支撑、经验决策到科学决策转型,是新时代检察机关应对风险社会治理需求、充分释放技术赋能潜力、服务国家治理现代化大局和落实“高质效办好每一个案件”要求而进行的系统性变革。然而,技术赋能亦存在技术应用失当削弱监督刚性、法律监督谦抑性与监督能动扩张的冲突、技术依赖与资源约束掣肘检察建议质效等风险。对此,应从顶层设计角度统筹谋划,以实现制度间的协调和衔接。通过“理念—边界—规制—保障”的规制路径,实现数据驱动下检察建议的高质量发展。 展开更多
关键词 数据驱动 检察建议 范式转型 风险规制
在线阅读 下载PDF
烟酸注射液导致药品不良反应的回顾性分析
19
作者 张伟 史丛 《中国实用医药》 2026年第3期166-169,共4页
目的基于大数据驱动的深度挖掘视角,系统剖析成武县人民医院收治患者中烟酸注射液引发药品不良反应(ADR)的潜在模式与动态演变特征,为构建精准化临床用药安全防控体系提供循证依据。方法采用回顾性队列研究设计,选取176例烟酸注射液相关... 目的基于大数据驱动的深度挖掘视角,系统剖析成武县人民医院收治患者中烟酸注射液引发药品不良反应(ADR)的潜在模式与动态演变特征,为构建精准化临床用药安全防控体系提供循证依据。方法采用回顾性队列研究设计,选取176例烟酸注射液相关ADR患者,运用时序分析、关联规则挖掘等方法,系统探究烟酸注射液导致ADR发生的时间-效应关系、人群特异性分布、原发病关联特征及多系统损害谱。结果176例患者的原发病基本与烟酸注射液的主要适应证相吻合,其中,原发病为神经系统疾病患者的占比(78.41%)明显高于原发病为其他系统疾病的患者。同一例患者发生ADR可累及多个器官和(或)系统,因此176例报告共涉及ADR表现218例次。最多见的是消化系统损害(26.15%),以腹痛、恶心为主要表现;其次是全身性损害(22.48%),以胸闷、发热、寒战为主要表现;再次是血管损害和出凝血障碍(19.27%),主要为静脉炎。218例次ADR临床表现主要发生在用药过程中,共204例次(93.58%),用药30 min内最为集中,有154例次(70.64%),其中用药5 min内有37例次;用药结束后发生的有9例次(4.13%)。结论本研究揭示烟酸注射液导致ADR的“年龄-疾病-时间”三维风险特征,建议成武县人民医院建立基于动态风险评估的个性化用药策略,重点强化老年人群及神经系统疾病患者的实时监测与预警干预,推动临床用药从经验驱动向数据驱动模式转型。 展开更多
关键词 烟酸注射液 药品不良反应 时序数据分析 风险预警模型 精准用药
暂未订购
The Credit-Risk Decision Mechanism on Fixed Loan Interest Rate with Imperfect Information 被引量:1
20
作者 Pang, S. Liu, Y. +1 位作者 Wang, Y. Yao, H. 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2001年第3期20-24,共5页
In this paper, decision mechanism of credit-risk for banks is studied when the loan interest rate is fixed with asymmetry information in credit market. We give out the designs of rationing and non-rationing on credit ... In this paper, decision mechanism of credit-risk for banks is studied when the loan interest rate is fixed with asymmetry information in credit market. We give out the designs of rationing and non-rationing on credit risky decision mechanism when collateral value provided by an entrepreneur is not less than the minimum demands of the bank. It shows that under the action of the mechanism, banks could efficiently identify the risk size of the project. Finally, the condition of the project investigation of bank is given over again. 展开更多
关键词 Classification (of information) Financial data processing risk assessment
在线阅读 下载PDF
上一页 1 2 181 下一页 到第
使用帮助 返回顶部