MXPA03010125A - Sistema y metodo para el manejo, analisis y aplicacion de datos para organizaciones con base en el conocimiento. - Google Patents
Sistema y metodo para el manejo, analisis y aplicacion de datos para organizaciones con base en el conocimiento.Info
- Publication number
- MXPA03010125A MXPA03010125A MXPA03010125A MXPA03010125A MXPA03010125A MX PA03010125 A MXPA03010125 A MX PA03010125A MX PA03010125 A MXPA03010125 A MX PA03010125A MX PA03010125 A MXPA03010125 A MX PA03010125A MX PA03010125 A MXPA03010125 A MX PA03010125A
- Authority
- MX
- Mexico
- Prior art keywords
- management
- analysis
- data
- knowledge
- application
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q99/00—Subject matter not provided for in other groups of this subclass
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Testing Of Devices, Machine Parts, Or Other Structures Thereof (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
- Alarm Systems (AREA)
- Investigating Or Analysing Biological Materials (AREA)
- Computer And Data Communications (AREA)
Abstract
La presente invencion pertenece en general al manejo y analisis de datos a traves del uso de computadoras y/o redes conectadas a sistemas de computadoras, la presente invencion tendiendo aplicabilidad particular al manejo y analisis de datos de computadora para identificar enlaces, patrones y redes de asociaciones para descubrir tendencias, determinar sospechosos y/o predecir amenazas en los campos del cumplimiento de la ley y seguridad en lineas aereas.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US28852101P | 2001-05-03 | 2001-05-03 | |
PCT/IB2002/002613 WO2002091256A2 (en) | 2001-05-03 | 2002-05-03 | System and method for the management, analysis, and application of data for knowledge-based organizations |
Publications (1)
Publication Number | Publication Date |
---|---|
MXPA03010125A true MXPA03010125A (es) | 2004-03-10 |
Family
ID=23107478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MXPA03010125A MXPA03010125A (es) | 2001-05-03 | 2002-05-03 | Sistema y metodo para el manejo, analisis y aplicacion de datos para organizaciones con base en el conocimiento. |
Country Status (9)
Country | Link |
---|---|
US (1) | US20040193572A1 (es) |
EP (1) | EP1390891A1 (es) |
BR (1) | BR0209347A (es) |
CA (1) | CA2445155A1 (es) |
IL (1) | IL158592A0 (es) |
MX (1) | MXPA03010125A (es) |
RU (1) | RU2003134952A (es) |
WO (1) | WO2002091256A2 (es) |
ZA (1) | ZA200308351B (es) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7130866B2 (en) * | 2002-07-30 | 2006-10-31 | Koninklijke Philips Electronics N.V. | Controlling the growth of a feature frequency profile by deleting selected frequency counts of features of events |
WO2004084028A2 (en) * | 2003-03-14 | 2004-09-30 | Goldman, Sachs & Co. | Link analysis mapping program risk management |
US8131472B2 (en) | 2004-09-28 | 2012-03-06 | International Business Machines Corporation | Methods for hierarchical organization of data associated with medical events in databases |
CN100376014C (zh) * | 2004-11-08 | 2008-03-19 | 中芯国际集成电路制造(上海)有限公司 | 半导体制造厂产品加工目录自动跟踪监测系统 |
CA2500573A1 (en) * | 2005-03-14 | 2006-09-14 | Oculus Info Inc. | Advances in nspace - system and method for information analysis |
US7613667B2 (en) * | 2005-06-30 | 2009-11-03 | The Boeing Company | Methods and systems for analyzing incident reports |
US20070118562A1 (en) * | 2005-11-21 | 2007-05-24 | Edwards Rocky L | System and methods for linking multiple events involving firearms |
US20100198858A1 (en) * | 2005-11-21 | 2010-08-05 | Anti-Gang Enforcement Networking Technology, Inc. | System and Methods for Linking Multiple Events Involving Firearms and Gang Related Activities |
US20080033587A1 (en) * | 2006-08-03 | 2008-02-07 | Keiko Kurita | A system and method for mining data from high-volume text streams and an associated system and method for analyzing mined data |
US9202184B2 (en) | 2006-09-07 | 2015-12-01 | International Business Machines Corporation | Optimizing the selection, verification, and deployment of expert resources in a time of chaos |
US8145582B2 (en) | 2006-10-03 | 2012-03-27 | International Business Machines Corporation | Synthetic events for real time patient analysis |
US8055603B2 (en) | 2006-10-03 | 2011-11-08 | International Business Machines Corporation | Automatic generation of new rules for processing synthetic events using computer-based learning processes |
US7606795B2 (en) * | 2007-02-08 | 2009-10-20 | International Business Machines Corporation | System and method for verifying the integrity and completeness of records |
US7853611B2 (en) | 2007-02-26 | 2010-12-14 | International Business Machines Corporation | System and method for deriving a hierarchical event based database having action triggers based on inferred probabilities |
US7792774B2 (en) | 2007-02-26 | 2010-09-07 | International Business Machines Corporation | System and method for deriving a hierarchical event based database optimized for analysis of chaotic events |
US7970759B2 (en) | 2007-02-26 | 2011-06-28 | International Business Machines Corporation | System and method for deriving a hierarchical event based database optimized for pharmaceutical analysis |
US8661048B2 (en) * | 2007-03-05 | 2014-02-25 | DNA: SI Labs, Inc. | Crime investigation tool and method utilizing DNA evidence |
US7930262B2 (en) | 2007-10-18 | 2011-04-19 | International Business Machines Corporation | System and method for the longitudinal analysis of education outcomes using cohort life cycles, cluster analytics-based cohort analysis, and probabilistic data schemas |
US7779051B2 (en) | 2008-01-02 | 2010-08-17 | International Business Machines Corporation | System and method for optimizing federated and ETL'd databases with considerations of specialized data structures within an environment having multidimensional constraints |
US20110145710A1 (en) * | 2009-12-16 | 2011-06-16 | Sap Ag | Framework to visualize networks |
US10318877B2 (en) | 2010-10-19 | 2019-06-11 | International Business Machines Corporation | Cohort-based prediction of a future event |
US20120174001A1 (en) * | 2010-12-31 | 2012-07-05 | Itschak Friedman | Graphically based hierarchical method for documenting items of evidence genealogy |
DE102011079034A1 (de) | 2011-07-12 | 2013-01-17 | Siemens Aktiengesellschaft | Ansteuerung eines technischen Systems |
US9268619B2 (en) | 2011-12-02 | 2016-02-23 | Abbott Informatics Corporation | System for communicating between a plurality of remote analytical instruments |
US10997541B2 (en) | 2017-09-22 | 2021-05-04 | 1Nteger, Llc | Systems and methods for investigating and evaluating financial crime and sanctions-related risks |
US11948116B2 (en) | 2017-09-22 | 2024-04-02 | 1Nteger, Llc | Systems and methods for risk data navigation |
US10373091B2 (en) * | 2017-09-22 | 2019-08-06 | 1Nteger, Llc | Systems and methods for investigating and evaluating financial crime and sanctions-related risks |
US10127511B1 (en) * | 2017-09-22 | 2018-11-13 | 1Nteger, Llc | Systems and methods for investigating and evaluating financial crime and sanctions-related risks |
US11651461B1 (en) * | 2022-02-25 | 2023-05-16 | Detective Analytics | Artificial intelligence crime linking network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5654801A (en) * | 1995-01-03 | 1997-08-05 | Forensic Technology Wai Inc. | Fired cartridge examination method and imaging apparatus |
US5956717A (en) * | 1996-10-07 | 1999-09-21 | Kraay; Thomas A. | Database origami |
US5781704C1 (en) * | 1996-10-11 | 2002-07-16 | Environmental Criminology Res | Expert system method of performing crime site analysis |
WO2001015049A1 (en) * | 1999-08-25 | 2001-03-01 | Beecham James E | Criminal management systems, apparatus and methods |
-
2002
- 2002-05-03 RU RU2003134952/09A patent/RU2003134952A/ru not_active Application Discontinuation
- 2002-05-03 WO PCT/IB2002/002613 patent/WO2002091256A2/en not_active Application Discontinuation
- 2002-05-03 IL IL15859202A patent/IL158592A0/xx unknown
- 2002-05-03 EP EP02741062A patent/EP1390891A1/en not_active Withdrawn
- 2002-05-03 CA CA002445155A patent/CA2445155A1/en not_active Abandoned
- 2002-05-03 US US10/475,582 patent/US20040193572A1/en not_active Abandoned
- 2002-05-03 MX MXPA03010125A patent/MXPA03010125A/es unknown
- 2002-05-03 BR BR0209347-2A patent/BR0209347A/pt not_active IP Right Cessation
-
2003
- 2003-10-27 ZA ZA200308351A patent/ZA200308351B/en unknown
Also Published As
Publication number | Publication date |
---|---|
EP1390891A1 (en) | 2004-02-25 |
WO2002091256A8 (en) | 2004-04-22 |
WO2002091256A2 (en) | 2002-11-14 |
CA2445155A1 (en) | 2002-11-14 |
ZA200308351B (en) | 2004-07-05 |
IL158592A0 (en) | 2004-05-12 |
RU2003134952A (ru) | 2005-04-20 |
US20040193572A1 (en) | 2004-09-30 |
BR0209347A (pt) | 2004-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MXPA03010125A (es) | Sistema y metodo para el manejo, analisis y aplicacion de datos para organizaciones con base en el conocimiento. | |
WO2006039208A3 (en) | Threat protection network | |
ATE453277T1 (de) | Verfahren und vorrichtung zum übertragen von vertraulichkeitseinschränkungen unterzogenen daten | |
Clarke | What is überveillance?(And what should be done about it?) | |
Tang | Information security engineering: a framework for research and practices | |
Ozer et al. | A prevention and a traction system for ransomware attacks | |
Khou et al. | A customizable framework for prioritizing systems security engineering processes, activities, and tasks | |
Almazkyzy et al. | The essence and content of cybercrime in modern times | |
Alpers et al. | Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems. | |
Mazher et al. | Artificial Intelligence Based Architecture to Enhance Cloud Computing Security | |
Jerman-Blažič et al. | Towards the development of a research agenda for cybercrime and cyberterrorism–identifying the technical challenges and missing solutions | |
Machina et al. | Crime analysis and intelligence system model design using Big Data | |
Beckett | An intelligent approach to security | |
Ambika | An Improved Solution to Tackle Cyber Attacks | |
Venkatachary et al. | Cybersecurity and Cyber-terrorism Challenges to Energy-Related Infrastructures-Cybersecurity Frameworks and Economics–Comprehensive review | |
Cho et al. | The data indexing for cyber threat resources | |
Taneja et al. | Information and data security model: Background, risks, and challenges | |
Vorozhtsova et al. | Ontological analysis of vulnerabilities in the energy sector | |
Barrett | CYBER SUPPLY CHAIN DUE DILIGENCE: A Step-by-Step Process | |
Sinca | Cybercriminology: Transition from Traditional Criminal Techniques to Cybercrime | |
Chitechi et al. | Cyber-Security Vulnerability Assessment Model for County Governments in Kenya | |
Russello et al. | Coordinating data usage control in loosely-connected networks | |
Gong et al. | Network Information Security Technology in the Era of Big Data | |
Beggs et al. | Safeguarding Australia from cyber-terrorism: a proposed cyber-terrorism SCADA risk framework for Australia | |
Baig | Implementation of Cyber Security in Corporate Sector of Pakistan |