Found 4468 related files. Current in page 7

contoh data primer dan sekunder

Male involvement and utilization of maternal health  services in India

The present paper examines the association between the men‟s knowledge regarding the maternal health service utilization and maternal health in India using data from National Family Health Survey 2005-06. The indicator of maternal health used in the analysis is safe delivery. Binary and multinomial logistic regression are used established the said association. Males involvement coded into two ways and two categories viz father present at the time of ANC visit or not, and whether at any time during the pregnancy any health provider or health worker told them about the various sign of pregnancy complications or not. The other independent variables used in this analysis are age, children ever born, work status of the women, education of the women, religion and caste. The findings clearly suggest that male involvement and their knowledge about maternal health significantly associated with the maternal health. Those women‟s husband has knowledge regarding maternal health

A Risk Management Framework for Clouds Using Big  Data and Security Informatics usingAttack Trees an

Social media refers to the means of interactions among people in which they create, share, and exchange information and ideas in virtual communities and networks. The growth of Information and Communication Technology (ICT) has resulted in an enormous volume of security related information present on the web largely when it comes to social media networks. Therefore, with the changing face of cyber security, although it is difficult, it was found that detecting the potential cyber-attacks or crimes is possible and feasible with the vast improvements in ICT. Cloud computing uses ICT resources that are delivered as a service over a network which has opened a promising opportunity across the globe thus resulting a greater popularity of e-commerce. The proposed framework is developed to manage risks of social media networks using the attack tree method which is used to model the risk of the system and identify the possible attacking strategies which the adversaries may launch.

Does Proficiency in the Second Language Influence  Bilingual Word Retrieval and Pronunciation?

During empirical sociolinguistic research this correlational study statistically compares quantitative scores of an independent variable Proficiency in English against the quantified dependent variable Rate of occurrence of deviations from Standard Sri Lankan English (SSLE) pronunciation across the 185 users of Other Varieties of Sri Lankan Englishes. The participants diversified in their first language. 100 participants had Sinhala while the first language of 85 participants was Sri Lankan Tamil. a questionnaire cum word elicitation process compiled data. The instrument consisted of 25 lexical items which gave rise to pronunciation deviations compiled from literature on Sri Lankan English. Descriptive statistics posit that there is a negative correlation between the two variables while the percentage variance explained for the correlation between the variables was a medium 9% for the Sinhala and 24% for the Tamil bilingual participants. This study concludes that other

Importance rules of an online payment

Web personalization techniques employed to analyze data collected from customers include content-based filtering, collaborative filtering, rule-based filtering, and web usage mining.

Communal Land Acquisition and Valuation for  Compensation in Nigeria

It is debatable that the Nigerian Land Use Act of 1978 has not absolutely transferred ownership of land to the Governor of states in Nigeria. It is argued that the citizens have no rights or interest over the land beyond their occupation because such rights or interest has been taken over by the virtue of section 1 of the Land Use Act, which provides that subject to the provisions of the Act, lands in each State of the Federation is vested in the Governor of that State and such land shall be held in trust and administered for the use and common benefits of all Nigerians. No doubt, the procedure for compulsory acquisition requires adequate notice to be given to the owner, compensation to be paid and the acquisition must be for “public purpose”. This article seeks to dwell on the valuation for compensation aspect of the three requirements for compulsory acquisition. The data for this write up is basically secondary data source. Findings show the truism


GCC nations are at a pivotal stage with regard to Big Data infrastructure build and business analytic investments.Hence the announcement of this much needed Summit.

Why Business Analytics Services Are Necessary For Your Business

The major role of predictive business analytics is to let a business offer data consulting services and convert data into information that can be used to make correct decisions. With the big data consulting services and the business analytics services you are able to discover the areas that can increase profitability to your company while allocating more sources and allowing growth.

DATA Lab Warszawa
by Datalab 0 Comments favorite 22 Viewed Download 0 Times

DATA Lab ul. Wałbrzyska 11 blok A lokal 78 02-739 Warszawa Tel.: 22 54 990 45

DATA Lab Warszawa
by Datalab 0 Comments favorite 20 Viewed Download 0 Times

DATA Lab ul. Wałbrzyska 11 blok A lokal 78 02-739 Warszawa Tel.: 22 54 990 45

Manage your field service technicians using Work force tracker

Work Force Tracker is a powerful & highly customizable solution with best-in-class features for managing your field work force. It provides Location Tracking, Location Maps, Security Alerts, Advanced Geo-Fencing, Time-sheets, Task Assignments, Employee Messaging, Custom Data Forms, and many more advanced features needed to run complex field operations.