MANAGEMENT OF PROJECT SCHEDULE EXCEPTIONS BASED ON BAYESIAN NETWORKS
Published In: 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND INFORMATION TECHNOLOGY
Author(s): CHULSOON PARK , HONGSUK SUNG , SANGCHEON LEE , SUNGMOON BAE
Abstract: The market size of plant projects in overseas is so large that domestic EPC project contractors are actively seek ing the overseas projects and then trying to meet completion plans since successful fulfillment of these projects can provide great opportunities for them to expand into new foreign markets. International EPC projects involve all of the uncertainties commo n to domestic projects as well as uncertainties specific to foreign projects including marine transportation, customs, regulations, nationality, culture and so on. When overseas project gets off - schedule, the resulting uncertainty may trigger unexpected ex ceptions and then critical effects to the project performance. It usually require much more time and costs to encounter these exceptions in foreign sites compared to domestic project sites. Therefore, an exception handling approach is required to manage ex ceptions effectively for successful project progress in foreign project sites. In this research, we proposed a me
- Publication Date: 03-Sep-2017
- DOI: 10.15224/978-1-63248-131-3-24
- Views: 0
- Downloads: 0
INCREASING THE LEVEL OF NETWORK AND INFORMATION SECURITY USING ARTIFICIAL INTELLIGENCE
Published In: 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND INFORMATION TECHNOLOGY
Author(s): GALYA PAVLOVA , GEORGI TSOCHEV , RADOSLAV YOSHINOV , ROUMEN TRIFONOV , SLAVCHO MANOLOV
Abstract: Too often, the unified security programs, based on comprehensive analy ses of unified information from across the IT infrastructure, are costly, complex, difficult to implement and inefficient. As a result, most organizations lack accurate threat detection and informed risk - management capabilities. Therefore, the response to new information security threats can be a “security intelligence” approach. It is based on art ificial intelligence and the use of its methods to protect from cybercrimes. The aim of this study is to present and compare different methods of artificial intel ligence for fighting the crime in cyberspace, or rather their application in systems for detecting and preventing intrusions
- Publication Date: 03-Sep-2017
- DOI: 10.15224/978-1-63248-131-3-25
- Views: 0
- Downloads: 0