The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of knowledge economy, the companies usually collect large amounts information to make decisions. Management information cost is a kind of new cost form, which happens in process of decision-making. In this paper, the author discusses the measuring structure, pattern and methods of management information cost.
In order to study the dynamic mechanism of knowledge movement in industrial integration, the force of knowledge-spillover/transfer and the effect of integration on inter-organizational relation are analyzed in this paper based on both knowledge management theory and field theory. The results shows that the convergence force caused by the integration-effect gives a promotion for inter-organizational...
The aging population is an unavoidable development trend over the world. Our country has become a member of the countries of aging population. In recent years, the governable income for the elder has been increased constantly and on that point, those persons will have more leisure time and the better physical situations, which all simulate the rising of the demands of the elder tourism. Therefore,...
Customer loyalty is an eventful precondition of enterprise development. Many researches indicated that the customer satisfaction and switching costs are important predictors of the customer loyalty. However, few studies focus on the moderating variables between these relationships. This study focuses on the moderating effect of personal innovativeness to the relationship between customer satisfaction,...
This paper starts from security needs of electronic notes in the present situation of e-commerce and discusses the application of information hiding technology and relative concepts. Then it presents a algorithm of information hiding technology that applies in the electronic notes system, including embedded hidden information algorithm and hidden information extraction algorithm, and describes the...
As the network faults happen, a mass of the unprocessed data from the distributed network based on the traditional self-healing mode will be transmitted in the whole network, which will aggravate the network transmission burden. In this paper, a new network fault healing mode based on the mobile agent is proposed. On the basis of it, the self-healing algorithm which named the pre-deploying available...
The article introduces the background that learning curve was established and sets up its model. The basic principles and methods of estimating and improving learning rate are put forward. The author elaborates the concrete application of learning curve in enterprise management, and analyzes its applied conditions and limitations to provide suggestions for enterprises making reasonable application.
Tacit knowledge is the main source of forming enterprise competitiveness, but its implicit and uncoded characters cause that its applicable scope is limited. It should be explicit that it can be put into good use. Conversion of tacit knowledge involves two questions within enterprise: one is that the attitude of enterprise and knowledge worker colony is different; second is that the attitude of high...
Context is important in personal knowledge and social knowledge construction process. Context awareness means being able to collect environment and learning resource information from the learner and surrounding equipment to provide learners with the context-related learning activities and content. The context elements, including intra object, inter-object, session, social systemic, economic techno-physical...
The authors used the system dynamics methods, applied the Vensim PLE software to set up the dynamic structure model of technology development system, put up numerical simulation to study the principles of technology development system and the operational process, analyzed the power mechanism of technology development, so as to provide a reference for the future development of technology strategy formulation...
This paper introduces network security System based on intrusion detection technique. Describe the definition and the classification of intrusion detection introduce the gengric intrusion detection model, Then we design a network security system based on intrusion deception.
Orthogonal frequency division multiplexing (OFDM) is an effective technique for combating radio channel multipath fading and for high-bit-rate transmission over wireless channels and it is extensively used in modern wireless local area network systems to support high performance bandwidth-efficient multimedia services. Easily applied channel estimation and simple channel equalization are important...
Peer-to-peer (P2P) computing may trigger a revolution in the near future because of its ease of use, huge choice and low price. Its chief features are anonymous, independent, dynamic, and absent of centralized server. Due to these features, on the other hand, P2P networks are often insecure and easily suffer from the malicious attacks. Besides, the peers in the system should cooperate in order for...
With the development of multicore-processor, the parallel computer system are gaining a rapid progress from supercomputer to personal computer. But the knowledge on parallel computing is seldom involved in the traditional undergraduate stage of computer specialty. Under the current situation, it is very necessary to set the parallel computing as an independent course in the teaching plan of computer...
Bilingual education is an important manifestation of internationalized school running mode in the current domestic colleges and universities. Combined with the bilingual teaching experience of e-commerce course in SIFT, this paper starts with the construction of diversified learning platform to give a detailed analysis on the reasonable arrangement of bilingual teaching course content, the effective...
The traditional knowledge push service based on non-semantic is inefficient in the hit ratio and accuracy because of the lack of semantic description and modeling to user preferences and knowledge resources. Semantic Web has unique advantages such as the robotization of the meaning interpretation, the decentralization of knowledge expression and the information identification by ontology. It provides...
The weaknesses between L1 norm minimization estimator and L2 norm minimization estimator in the traditional super resolution reconstruction problem are analyzed. In this paper, L1 norm and L2 norm are weighted and combined to measure the data fidelity term, and based on an approximate total variation regularization method, a robust weighted and combined super resolution reconstruction algorithm is...
With the development of Internet, basic information services can no longer fulfill some customers' requests, which requires information service brokers to provide value-added services to improve their information service quality. Based on the web service architecture, this paper constructs a value-added service model of mining right information from the perspective of information value-adding, and...
E-commerce is the core content and inevitable trend of the information society. With the rapid growth of e-commerce in recent years, internet fraud and credit risk in e-commerce environment occurs more and more frequently, especially in China. The credit risk has become the critical factor restricting the development of e-commerce. It is of great importance to study the credit risk management of online...
With the continuous development of Internet technology, the Internet word-of-mouth (WOM) communication has become increasingly widespread and important. The paper has an overview of the study status in the Internet WOM communication. Then from systematic angle, the paper puts forward and analyzes five factors that affect Internet WOM communication, these includes network communicator, online information,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.