Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
we proposed an automated approach for discovering and aligning these consistent fields
The Building Assessment Survey and Evaluation (BASE) study was a five year study to characterize determinants of indoor air quality and occupant perceptions in representative public and commercial office buildings across the U.S. This data source is the raw data from this study about the indoor air quality.
https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy
The Database Security Evaluation System market is experiencing robust growth, driven by the increasing frequency and sophistication of cyberattacks targeting sensitive data stored in databases. The market's expansion is fueled by the rising adoption of cloud-based databases, the growing volume of data generated by businesses, and stringent data privacy regulations like GDPR and CCPA. Companies are increasingly prioritizing proactive security measures, recognizing that reactive approaches are often too costly and disruptive. This demand for robust security solutions is pushing the market towards advanced technologies such as automated vulnerability assessments, machine learning-driven threat detection, and data loss prevention (DLP) tools integrated within database security evaluation systems. We estimate the market size in 2025 to be $2.5 billion, with a Compound Annual Growth Rate (CAGR) of 15% projected through 2033. This growth reflects the continued investment by organizations in bolstering their cybersecurity posture and mitigating the financial and reputational risks associated with data breaches. Key players like Oracle, IBM, and other specialized security firms are actively competing in this space, offering a diverse range of solutions tailored to different database systems and organizational needs. The market is segmented based on deployment (cloud, on-premise), organization size (small, medium, large), and database type (relational, NoSQL). While the market faces challenges like the high cost of implementation and the need for skilled cybersecurity professionals, the overall trend points towards sustained growth driven by the ever-increasing importance of data security in today's digital world. The competitive landscape is dynamic, with established players and emerging startups vying for market share through innovation and strategic partnerships. This leads to continuous improvement in the effectiveness and affordability of Database Security Evaluation Systems.
The Evaluation Registry is the main source for USAID evaluation reporting, including the number of evaluations completed by USAID operating units each year, and how evaluations are used. USAID evaluations are the systematic collection and analysis of data about the characteristics and outcomes of strategies, projects, and activities. They are used as evidence to inform decisions, to improve effectiveness of current program activities, and future programming. The data contained in this dataset is derived from the USAID Evaluation Registry.
https://www.icpsr.umich.edu/web/ICPSR/studies/2844/termshttps://www.icpsr.umich.edu/web/ICPSR/studies/2844/terms
These data were collected to evaluate the Partnership for Long-Term Care (PLTC), a project in which the Robert Wood Johnson Foundation awarded grants to four states -- California, Connecticut, Indiana, and New York -- to work with private insurers to create long-term care insurance policies that were more affordable and provided better protection against impoverishment than those generally available. PLTC policies combine private long-term care insurance with special Medicaid eligibility standards that protect assets of the insured once private insurance benefits are exhausted. This collection was extracted from a database compiled from data submitted by three of the PLTC states: California, Connecticut, and Indiana (New York refused participation). It comprises seven parts, which can be linked together using common identifying variables. Part 1, Insured, describes the characteristics of each issued policy and includes variables covering the effective policy date, policy type, elimination periods, maximum benefits, inflation protection mode, and annualized premium, as well as the year of birth, sex, marital status, and state of residence of the insured. Each insured person is represented by one or more records: one record for the initial PLTC policy, plus a separate record for each change to the policy, if any. Part 2, Changes, consists of policy change records used to update the policies in Part 1. Assessments for benefits are recorded in Part 3. This file includes variables on the assessment date, whether the insured met policy criteria at the time of the assessment, disability date, deficiencies in activities of daily living, and MSQ and Folstein test scores. Parts 4-6 describe service payments and utilization: reporting period (quarter), type of service received by the insured, service amount billed, days of service rendered, and amount of remaining benefits (dollars and days). Part 7 contains information on persons denied application to PLTC policies, including date of denial, type and amount of coverage sought, reason for denial, and the sex, year of birth, and marital status of the applicant.
We evaluated CANOPUS on two MS/MS reference datasets: The SVM training dataset, which was also used for training CSI:FingerID (in 10-fold cross-validation), and the Agilent MassHunter library, used as indepenent dataset.The SVM training dataset contains spectra from GNPS, MassBank, and NIST17. As NIST17 is a commercial library, we can only provide the spectra from GNPS and MassBank. Here, we provide the public part of the SVM training dataset (svm_training_data.zip).For training the deep neural network we used a subset of PubChem with 1,106,938 structures for which we downloaded ClassyFire annotations (Feunang et al 2016) and another set of 2,997,933 compounds from the ClassyFire database. The PubChem structures, together with ClassyFire annotations for the evaluation data are available as "structures.csv.gz".With CANOPUS, we analyzed data from two biological studies; the mzML and mzXML files are available at MassIVE (https://massive.ucsd.edu/) with the accession numbers MSV000079949 (mice data, Quinn et al 2020) and MSV000081082 (Euphorbia plant data, Ernst et al 2019).The network visualization of the mice data was done using Cytoscape (Shannon et al 2003). Here, we provide the Cytoscape file (mice_multiple_classes.cys).The source code of CANOPUS is part of the SIRIUS GitHub repository (https://github.com/boecker-lab/sirius-libs). The scripts we used for analyzing and visualizing the data are available at the GitHub repository (https://github.com/kaibioinfo/canopus_treemap).See the LICENSE.txt for further licensing information on Classyfire annotations and mass spectra.
https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy
The global database security evaluation system market size was valued at approximately USD 3.5 billion in 2023 and is projected to reach around USD 8.5 billion by 2032, exhibiting a compound annual growth rate (CAGR) of 10.2% during the forecast period. This robust growth can be attributed to the increasing complexity and volume of cyber threats, alongside stringent regulatory requirements for data protection and privacy.
One of the primary growth factors in the database security evaluation system market is the rapid digitalization across various industries. As companies increasingly adopt digital technologies to streamline operations, enhance customer experiences, and innovate business models, the volume of data generated and stored in databases has skyrocketed. This data, often containing sensitive information, becomes a lucrative target for cybercriminals, thus driving the demand for robust database security evaluation systems. Additionally, the emergence of big data analytics and cloud computing has further necessitated advanced security measures to protect data integrity and confidentiality.
Another significant factor contributing to market growth is the increasing regulatory pressure to safeguard sensitive information. Governments and regulatory bodies worldwide are enforcing stringent data protection laws, such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States. These regulations require organizations to implement comprehensive security evaluation systems to ensure compliance. Failure to adhere to these regulations can lead to severe penalties, thus incentivizing organizations to invest in advanced database security solutions.
The proliferation of sophisticated cyber threats is also a key driver of market growth. Cyber-attacks are becoming increasingly complex and difficult to detect, often resulting in significant financial and reputational damage. As a result, organizations are prioritizing the implementation of advanced security evaluation systems to proactively identify vulnerabilities and mitigate potential risks. The advent of artificial intelligence (AI) and machine learning (ML) technologies is further enhancing the capabilities of these systems, enabling real-time threat detection and response.
From a regional perspective, North America currently holds the largest market share, driven by the presence of several key players and a highly developed IT infrastructure. The Asia Pacific region is expected to witness the highest growth rate during the forecast period, fueled by rapid digital transformation, increasing adoption of cloud services, and the growing awareness of data security. Europe also represents a significant market, largely due to stringent regulatory requirements and the increasing frequency of cyber-attacks in the region.
The rise of cloud-based solutions has brought about significant advancements in database security, particularly in the realm of Cloud-based Database Security. As organizations increasingly migrate their data and applications to the cloud, ensuring the security of these databases has become paramount. Cloud-based database security solutions offer a range of benefits, including scalability, flexibility, and real-time threat detection. These solutions leverage advanced technologies such as AI and ML to provide robust security measures, enabling organizations to protect their data from unauthorized access and cyber threats. Additionally, cloud-based security solutions often come with automated updates and patches, ensuring that security measures remain up-to-date and effective. As the adoption of cloud services continues to grow, the demand for cloud-based database security solutions is expected to rise, driving further innovation and development in this area.
The database security evaluation system market is segmented by components into software, hardware, and services. The software segment constitutes the largest market share, as it encompasses various security tools and solutions designed to protect database integrity, confidentiality, and availability. These software solutions include database activity monitoring, encryption, data masking, and vulnerability assessment tools. Organizations are increasingly adopting these solutions to safeguard their databases from internal and external threats, ensuring compliance with regulatory requirements.</p&
This MS Excel Stocktake Database contains a list of EBA tools, as sourced from online and hardcopy sources (Worksheet 'EBA Tools Database'). It also includes a number of projects that may be categoriesed as Ecosystem Based Adaptation Projects (Worksheet 'Profiling of EBA Projects') as well as a list of tools to evaluate adaptation projects (Worksheet 'Evaluation Tools'). The database was compiled as input into a project that developed a Decision Support Framework for Ecosystem Based Adaptation for the United Nations Environment Program (UNEP). The outputs presented here are interim deliverables for this project.
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
Dataset Card for Chinese Musical Instruments Timbre Evaluation Database
The original dataset is sourced from the National Musical Instruments Timbre Evaluation Dataset, which includes subjective timbre evaluation scores using 16 terms such as bright, dark, raspy, etc., evaluated across 37 Chinese instruments and 24 Western instruments by Chinese participants with musical backgrounds in a subjective evaluation experiment. Additionally, it contains 10 spectrogram analysis reports for… See the full description on the dataset page: https://huggingface.co/datasets/ccmusic-database/instrument_timbre.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
Database of the process evaluation questionnaire
Apache License, v2.0https://www.apache.org/licenses/LICENSE-2.0
License information was derived automatically
This repository presents the evaluation data used for ASM. Please refer to this document for more details about the repository.
U.S. Government Workshttps://www.usa.gov/government-works
License information was derived automatically
The U.S. Geological Survey (USGS), in cooperation with the Pennsylvania Department of Environmental Protection (PADEP), conducted an evaluation of data used by the PADEP to identify groundwater sources under the direct influence of surface water (GUDI) in Pennsylvania (Gross and others, 2022). The data used in this evaluation and the processes used to compile them from multiple sources are described and provided herein. Data were compiled primarily but not exclusively from PADEP resources, including (1) source-information for public water-supply systems and Microscopic Particulate Analysis (MPA) results for public water-supply system groundwater sources from the agency’s Pennsylvania Drinking Water Information System (PADWIS) database (Pennsylvania Department of Environmental Protection, 2016), and (2) results associated with MPA testing from the PADEP Bureau of Laboratories (BOL) files and water-quality analyses obtained from the PADEP BOL, Sample Information System (Pennsylvania ...
MIT Licensehttps://opensource.org/licenses/MIT
License information was derived automatically
LEANN-RAG Evaluation Data
This repository contains the necessary data to run the recall evaluation scripts for the LEANN-RAG project.
Dataset Components
This dataset is structured into three main parts:
Pre-built LEANN Indices:
dpr/: A pre-built index for the DPR dataset. rpj_wiki/: A pre-built index for the RPJ-Wiki dataset. These indices were created using the leann-core library and are required by the LeannSearcher.
Ground Truth Data:
ground_truth/: Contains the… See the full description on the dataset page: https://huggingface.co/datasets/LEANN-RAG/leann-rag-evaluation-data.
https://www.iza.org/wc/dataverse/IIL-1.0.pdfhttps://www.iza.org/wc/dataverse/IIL-1.0.pdf
The IZA Evaluation Dataset Survey (IZA ED) was developed in order to obtain reliable longitudinal estimates for the impact of Active Labor Market Policies (ALMP). Moreover, it is suitable for studying the processes of job search and labor market reintegration. The data allow analyzing dynamics with respect to a rich set of individual and labor market characteristics. It covers the initial period of unemployment as well as long-term outcomes, for a total period of up to 3 years after unemployment entry. A longitudinal questionnaire records monthly labor market activities and their duration in detail for the mentioned period. These activities are, for example, employment, unemployment, ALMP, other training etc. Available information covers employment status, occupation, sector, and related earnings, hours, unemployment benefits or other transfer payments. A cross-sectional questionnaire contains all basic information including the process of entering into unemployment, and demographics. The entry into unemployment describes detailed job search behavior such as search intensity, search channels and the role of the Employment Agency. Moreover, reservation wages and individual expectations about leaving unemployment or participating in ALMP programs are recorded. The available demographic information covers employment status, occupation and sector, as well as specifics about citizenship and ethnic background, educational levels, number and age of children, household structure and income, family background, health status, and workplace as well as place of residence regions. The survey provides as well detailed information about the treatment by the unemployment insurance authorities, imposed labor market policies, benefit receipt and sanctions. The survey focuses additionally on individual characteristics and behavior. Such co-variates of individuals comprise social networks, ethnic and migration background, relations and identity, personality traits, cognitive and non-cognitive skills, life and job satisfaction, risky behavior, attitudes and preferences. The main advantages of the IZA ED are the large sample size of unemployed individuals, the accuracy of employment histories, the innovative and rich set of individual co-variates and the fact that the survey measures important characteristics shortly after entry into unemployment.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
Summary of the existing checklist used in the pharmacoeconomic systematic review.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
PER-Base contains information on institutional research evaluation in the Netherlands. It covers results from evaluations with the 'Vereniging van Samenwerkende Nederlandse Universiteiten' - VSNU 1993, VSNU 1994 and VSNU 1998 protocols as well as the 'Standard Evaluation Protocol' - SEP 2003-2009 and SEP 2009-2015 protocols.The information in the database is derived from the 222 known evaluation reports: protocol used for the evaluation, title of the evaluation report, year of publication of the evaluation report, organisations involved, programs involved, score per criterion per program. The 'Hoger Onderwijs en Onderzoek Plan' - HOOP codes (discipline) are allocated by the authors.PER-Base is developed in 2010-2012 by the 'Center for Higher Education Policy Studies'- CHEPS - University of Twente. The Dutch Ministry of Education, Culture and Science has paid for the development as part of the CHERPA project. In 2012 the database has been transferred to the Rathenau Institute, that will maintain the database.
Tracks the status of HMRC evaluations of research and analyses, findings and meta-data. Updated: ad hoc.
This project aimed to establish a video database of cardiopulmonary resuscitation performance that demonstrates a range of expertise. The original data set contains 54 examples of participants who range in expertise and experience with performing CPR. Each example was recorded from 6 angles with a checkerboard in view to allow for 3D reconstruction. Participants were asked to perform 4 sets of 30 chest compressions with a short pause in between to rest. The faces of each participant have been blurred to reduce the likelihood of identification. The CPR performances are accompanied by the demographics of the participant and the evaluation data. The evaluation data consists of evaluation by two expert raters who teach Basic Life Support at a UK university, and their agreed rating. Participants were able to elect for their data to be included in the available database or restricted to the research team only. Consent was given for video data and evaluation data separately. Thus, this data contains video data from 41 participants, and evaluation data from 42 participants. This dataset is intended to be used to further understanding of expertise in CPR and facilitate the development of technology that can track movement and evaluate healthcare professional skills. Participants provided informed consent (see supplied Information Sheet, Consent form, and Debrief) Each person was recorded from 6 angles while performing 4 sets of 30 chest compressions on a manikin. Participants were recruited from the Department of Nursing and Midwifery and were either university staff or students. Demographics of the participants are provided. Two experts rated each set from each participant along an evaluative checklist (supplied). An overall rating for each participant was also provided. The raters initially rated alone and then resolved any discrepancies to provide an agreed rating. A more thorough description of methods has been supplied (Readme file). Participants evaluated their confidence in performing CPR (Very confident – very unconfident), and the frequency with which they practised CPR (Very frequently – very infrequently) along a 5-point Likert scale.
Comprehensive dataset of 0 Evaluation services in Finland as of July, 2025. Includes verified contact information (email, phone), geocoded addresses, customer ratings, reviews, business categories, and operational details. Perfect for market research, lead generation, competitive analysis, and business intelligence. Download a complimentary sample to evaluate data quality and completeness.
Comprehensive dataset of 6 Evaluation services in Jiangxi, China as of July, 2025. Includes verified contact information (email, phone), geocoded addresses, customer ratings, reviews, business categories, and operational details. Perfect for market research, lead generation, competitive analysis, and business intelligence. Download a complimentary sample to evaluate data quality and completeness.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
we proposed an automated approach for discovering and aligning these consistent fields