scholarly journals Corrigendum: Novel method for decision making in the manufacturing environment

Nurse Leader ◽  
2021 ◽  
Author(s):  
Brooklyn Aaron ◽  
Avery Glover ◽  
Evelina Sterling ◽  
Stuart Downs ◽  
Jason Lesandrini

2014 ◽  
Vol 3 (2) ◽  
pp. 225-236 ◽  
Author(s):  
Alireza Salehi ◽  
Mohammad Izadikhah

Author(s):  
Wouter H. Vermeer ◽  
Justin D. Smith ◽  
Uri Wilensky ◽  
C. Hendricks Brown

AbstractPreventing adverse health outcomes is complex due to the multi-level contexts and social systems in which these phenomena occur. To capture both the systemic effects, local determinants, and individual-level risks and protective factors simultaneously, the prevention field has called for adoption of system science methods in general and agent-based models (ABMs) specifically. While these models can provide unique and timely insight into the potential of prevention strategies, an ABM’s ability to do so depends strongly on its accuracy in capturing the phenomenon. Furthermore, for ABMs to be useful, they need to be accepted by and available to decision-makers and other stakeholders. These two attributes of accuracy and acceptability are key components of open science. To ensure the creation of high-fidelity models and reliability in their outcomes and consequent model-based decision-making, we present a set of recommendations for adopting and using this novel method. We recommend ways to include stakeholders throughout the modeling process, as well as ways to conduct model verification, validation, and replication. Examples from HIV and overdose prevention work illustrate how these recommendations can be applied.


Author(s):  
K. Abumani ◽  
R. Nedunchezhian

Data mining techniques have been widely used for extracting non-trivial information from massive amounts of data. They help in strategic decision-making as well as many more applications. However, data mining also has a few demerits apart from its usefulness. Sensitive information contained in the database may be brought out by the data mining tools. Different approaches are being utilized to hide the sensitive information. The proposed work in this article applies a novel method to access the generating transactions with minimum effort from the transactional database. It helps in reducing the time complexity of any hiding algorithm. The theoretical and empirical analysis of the algorithm shows that hiding of data using this proposed work performs association rule hiding quicker than other algorithms.


Sign in / Sign up

Export Citation Format

Share Document