1,421 Hits in 10.9 sec

Computerized retrieval and classification: An application to reasons for late filings with the securities and exchange commission

Ronen Feldman, Benjamin Rosenfeld, Ron Lazar, Joshua Livnat, Benjamin Segal
2006 Intelligent Data Analysis  
This study explores a system to retrieve and classify the reasons for late mandatory SEC (Securities and Exchange Commission) filings.  ...  We also show that the stock market reactions to over 9,000 late filings vary in an intuitive way according to the classified reasons.  ...  Discussion The purpose of this study was to examine various ways to automate the categorization of Late Filing Notification forms filed with the Securities and Exchange Commission.  ... 
doi:10.3233/ida-2006-10206 fatcat:xkykpsrkofdzjenoe4amyja3qq

Crowdsourcing classification and causality to power a search-and-innovation engine [chapter]

Richard Absalom
2022 Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)  
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification.  ...  A search query would be matched with the literature in multiple facets to retrieve holistically similar literature, or to suggest a solution to a problem from elsewhere in technology or the natural world  ...  The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979  ... 
doi:10.5771/9783956508752-13 fatcat:a243zpohn5aq7cgdlnui46p2sy

A hybrid deep learning-improved BAT optimization algorithm for soil classification using remote sensing hyperspectral features

Ujjal Roy
A hybrid deep learning-improved BAT optimization algorithm for soil classification using remote sensing hyperspectral featuresA hybrid deep learning-improved BAT optimization algorithm for soil classification  ...  BAT optimization algorithm for soil classification using remote sensing hyperspectral features  ...  Acknowledgements The research work titled as "Distribution System State Estimation Considering Renewable Energy Sources with Optimized PMU Placements" by A. Thamaraiselvi  ... 
doi:10.6084/m9.figshare.16943230.v1 fatcat:mxxls6u2ufgxrieromvsxwgxni

The Interdependence of Computer and Communications Services and Facilities: A Question of Federal Regulation

Delbert D. Smith
1969 University of Pennsylvania law review  
Every common carrier . . . shall . . . file with the Commission and print and keep open for public inspection schedules showing all charges for itself and its connecting carriers for interstate and foreign  ...  In late 1966, the Federal Communications Commission announced an inquiry to determine "under what circumstances data processing, computer information and message switching services, or any particular combination  ...  However, data processing coupled with message switching and incorporated within a computerized information system probably does not fall within the regulatory domain of the FCC, and probably is not subject  ... 
doi:10.2307/3310940 fatcat:mpwt4naetneqddbo7alwjq7rum

Protecting privacy in computerized medical information

Elaine Russo Martin
1995 Government Information Quarterly  
By linking computerized health information through a national network, the proposal envisions a system that would allow an efficentefllcient exchange of information to improve patient care and expand resources  ...  health care information and the technologies available to both computerize and protect privacy in the information; and 3) models for protection of health care information.  ...  An alternative approach to informed consent is the notion that an individual gains access to medical benefits in exchange for reasonable use of certain medical information by the system for prescribed  ... 
doi:10.1016/0740-624x(95)90017-9 fatcat:pstpnrhqt5bc5gb6hx4iorvwta

An assessment of alternatives for a national computerized criminal history system

Office of Technology Assessment
1982 Computers & society  
Foreword This report addresses four major areas: 1) the status of criminal history record systems in the United States; 2) the alternatives for a national computerized criminal history (CCH) system; 3)  ...  OTA appreciates the participation of the advisory panelists, external reviewers, and others who helped bring this study to fruition.  ...  Acknowledgments Chapter 2 Nature and Origins of Criminal History Records  ... 
doi:10.1145/958581.958585 fatcat:6zai46dx2rg4ffwabmtk3kvs24

International Standards for Global Information [chapter]

Alan Hopkinson
2004 Books in Library and Information Science Series  
This set the scene for the establishment of a joint 'An-glo-American Authority File'.  ...  In 1966, IFLA's Committee on Cataloguing initiated a project for an international standard for the descriptive content of catalog entries and commissioned Michael Gorman to make a comparison of practices  ...  What has replaced it is a web page devoted to the book that can be designed to carry all the rich information of the jacket cover, and more, such as audio and video files pertaining to the book.  ... 
doi:10.1201/9781420030631.ch16 fatcat:hqvz33jepjcprha2qvrngjcari

A Critical Analysis of Databases used in Financial Misconduct Research

Jonathan M. Karpoff, Allison Koester, D. Scott Lee, Gerald S. Martin
2012 Social Science Research Network  
First, the initial dates associated with the events included in each of the four popular databases occur an average of 150 to 1,017 calendar days (depending on the database) after the initial public disclosure  ...  As a result, each captures only 6% to 36% of the value-relevant announcements associated with the cases of misconduct they identify.  ...  We define a case as involving fraud if the SEC or Exchange Act for manipulative and deceptive devices related to the trading of an already issued security.  ... 
doi:10.2139/ssrn.2112569 fatcat:h3lqfhus6zbx5h5kmdfa76743e

News, Trends and Comments

1984 Information Services and Use  
Mead Data Central is now offering, on its Nexis service, a new data base called "Exchange", which contains the full texts of Securities and Exchange Commission 10-Q filings for many companies, as well  ...  ,uation retrieval applications on one system and computer to communicate with those on others. For more information, contact John R.  ...  successful in the academic sector; it now remains only on DIALOG, which for whatever reason has provided and so far still provides a home to a number of unprofitable humanities files.  ... 
doi:10.3233/isu-1984-4407 fatcat:eh3o2ipdorhwdej5kp3n5dqwly

A Survey on Secured Approach of External Cloud without Avoiding the Data Integrity

Ankur P. Saikia, L. P. Saikia
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
This exchange tries to protect the consider of multi-mists guerdon to its adaptability to influenced a long story to short security chances that push the distributed computing buyer.  ...  The thought process of this freebee is to skim late research over each other to hit and multi-mists cash in the bank and to give conceivable arrangements.  ...  Moreover, there is a probability for the client's email (Amazon client name) to be hacked (see [25] for an exchange of the potential dangers of email), and since Amazon enables a lost secret word to  ... 
doi:10.23956/ijarcsse.v7i11.476 fatcat:z73gmm5oyzfwxgw3z7x4f3qs2e

Information technology and e-risk of supply chain management

N Varma T, Khan D A
2015 African Journal of Business Management  
The purpose of these empirical studies is to discuss the IT application and trend to curb the supply chain's e-risks.  ...  Application of information and communication technology (ICT) is exponentially growing in Supply Chain Management (SCM) for increasing productivity and profitability in business.  ...  e-procurement An e-procurement is expected to be integrated into the wider purchase-to-pay (P2P) value chain with the trend toward computerized supply chain management.  ... 
doi:10.5897/ajbm2013.7308 fatcat:qgqthj53rrgvhouxvuez5axhky

Convergence toward common standards in machine-readable cataloging

C D Gull
1969 Bulletin of the Medical Library Association  
There is reason to hope that the use of the MARC II format will facilitate catalogers' decision processes.  ...  monographs and serials and that the system will thoroughly process contributed catalog entries before adding them to the Data Bank.  ...  and publication of Index Medi-cus and for the retrieval of bibliographic data in response to individual requests.  ... 
pmid:5782261 pmcid:PMC197343 fatcat:5d4tzbnn6fbcbndqe3pxxxwc6q

The International Scene

Ronald Plavchan
1984 The American Archivist  
Photofile the ultimate in archival record preservation Acid-Free Envelopes Rare manuscripts and documents can be stored and preserved indefinitely in these high qualify acid-free envelopes.  ...  Records Commission 8,[17][18] 77, 85, 96,[98][99] 198, 207, 212, 297, 332, 379,[433][434][435][436] 436 database 358, 359, 360, 361 notes 321, 323, 323, 325, 325 National Information Systems for  ...  Index 485 National Archival Information System 28 National Archives and Records Service 8, 20, 57,[98][99] 117, 119,132, 135, 137, 139, 154, 168, 209, 210,[238][239][241][242][243][244][245][246][247  ... 
doi:10.17723/aarc.47.4.n208p2w86np13x15 fatcat:wb3mmwm5bzczllkppkeupfmxlq

Sexual Offences in the Cyber World: Emerging Technological Challenges

2020 International journal of recent technology and engineering  
The aim of the study is to analyze the effectiveness of the protection provided for privacy and the related interests of women in cyberspace.  ...  These instruments constitute an area of law and politics that has reached considerable maturity, diffusion and normative importance over the decades.  ...  With the advent of technology, cybercrime and victimization of women are at the top and pose a major threat to human security".  ... 
doi:10.35940/ijrte.f9927.038620 fatcat:46srtvk5dvdizjwt6gxj7vkzpi

The Paperless Letter of Credit and Related Documents of Title

Boris Kozolchyk
1992 Law & Contemporary Problems  
"computerizing" letter-of-credit transactions commenced in the late 1970s.  ...  ; (2) the security procedure is "commercially reasonable"; and (3) "the [receiving] bank proves that it accepted the payment order in good faith and in compliance with the security procedure and any written  ... 
doi:10.2307/1191864 fatcat:j5k2ejflk5hcrag55koacqqggm
« Previous Showing results 1 — 15 out of 1,421 results