The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Constructivist qualitative research perspective is conducted to explore what an adult learner like when he returns to university. We investigate the influence of adult learner both on themselves and the community they are involved in. By doing some naturalistic research on a specific adult learner, We find the reasons why he returns to school after long time absence. To figure out the background of...
In the ages with economic globalization, knowledgeable informational, and marketable, the shape of enterprises which is as the part of economic activities is also keeping changed. The large enterprise is the pillar of national economy and an important mark that is used to measure the economic power and international competition abilities of a country, but the small-medium enterprises are also the...
Applying the concept of integrated supply chain to emergency logistics, can effectively improve the operation efficiency of emergency logistics, shorten the supply time of emergency resource and diminish the disaster loss. From the view of integrated supply chain, this paper built an emergency logistics system model of Wuhan City Cluster and explored the countermeasures of constructing emergency logistics...
It is as a result of this profound converged network that mobile internet has emerged as both a new phenomenon and a necessity. Mobile internet is promoted by the convergence of the traditional Internet and mobile terminals which is playing an important role of the internet by advantages of a large user base and further explore of the cell phones and other mobile electronic devices. At the crossroads...
Differences in the perceptions of the products modeling between the clients and the designers is common thing in product design. The bounded rationality gives reasonable explanation that because of user's the limited cognitive abilities and quantity of information they hold. In order to establish a multi-perception product model and design system, the user's bounded rationality must be taken into...
In this paper, we have designed a high-security e-mail system using dynamic password and fingerprint recognition to solve the shortages of traditional system. In order to guarantee the security of users' fingerprint characteristic value, we encrypt it with dynamic password. Using a two-way authentication method, not only ensure authentication server can recognize the users, but also guarantee the...
We propose a video copy detection scheme for compressed domain video. Our scheme firstly analyzes texture from DCT coefficients in the compressed domain video, then computes video signatures from the texture properties, and finally computes the distance between candidate video and original video by the video signatures. The proposed scheme is shown to be effective and efficient.
Taking as a kind of cross-platform Web development technology based on Java programming language, JSP occupies a great deal of space in the global WEB development domain. Chinese mess code is a problem that we often encounter in JSP Dynamic website development process. This article analyzes the reasons of mess code in JSP Web application development and provides solution to this problem. It has practicability...
Short Message(also called SMS) is the product of modern mobile communication, which provides more convenience and options for communication. The unwanted advertisements sent with SMS significantly interferes the normal communication among costumers which should have been guaranteed by the mobile service providers. As a result, the SMS spam produces detrimental effects on the quality of the service...
This paper discusses some theories of the system of performance evaluation, analyses merit and disadvantage of these theories. Based on theories of economics, management and accounting, this paper brings forward the system of performance evaluation with method of fuzzy mathematics. This paper validates the correctness of the system of performance evaluation with the example.
In order to investigate the impact of Macroeconomic Environment and financial factors on Companies in financial distress, This paper collects real estate listed companies from 2001 to 2008 as samples and then develops two models, model I of which introduces financial factors and Model II have the financial factors and the macroeconomic factors integrated together. Then this paper uses Logistic Regression...
Based on the Granger causality theory, this paper analyses the relationship of the building industry and the gross domestic product of Shaanxi province in China , using the C-D production function concerning technology advance, this paper also establishes the production function of Shaanxi building industry and offers some advices for the building industry growing style.
With the rapid development of the integration of the world economy, the two deltas, that is, the Yangtze River Delta and the Pearl River Delta have developed fastest and are the strongest and the most dynamic areas. The economic development of the two areas plays a most important role in the all-around development of China's economy. The paper introduces factor analysis and clustering analysis of...
In this paper, we analyze the sub-account value process of the guaranteed equity-linked insurance. By using the financial engineering method, this article presents a static model to deal with the contractual withdrawal situation. Then the stochastic control approach is developed and the Hamilton-Jacobi-Bellman equation model is deduced to price the dynamic withdrawal behavior.
Based on the tax burden, book value of fixed assets, depreciation, income and cash flow, this paper analyzes the influence on the taxpayer's balance sheet, income statement, cash flow statement and statement of change in equity of the VAT reform in China. For the given amount of purchased fixed assets, the result shows that the VAT reform will reduce the tax burden, decrease the book value of fixed...
Investor's trading strategy and the securities market's profit distribution will be affected by insider trading regulation. This paper builds a quantitative financial model to analyze the change of the trading strategy and the market profit distribution. Except the insider trading regulation, market liquidity, insider's type, information veracity and stock price volatility will also affect the trading...
This paper, beginning with the content of self-technological innovation and its capability, re-decomposes and defines the elements of enterprise self-technological innovation capability, and then sets up the evaluation index system of enterprise self-technological innovation ability. Based on the theory of Data Envelopment Analysis (DEA), the article introduces the input-oriented C2R model and C2GS...
This paper examines the extent of firm level over-investment of free cash flow on Chinese capital market. Based on Scott Richardson's framework to measure over-investment and free cash flow (2006), the research introduces a new method to quantify the Chinese companies' over-investment and free cash flow, and provides evidence that in china, consistent with agency cost explanation, the mangers in the...
In 1978, China started its "reform and opening up" policy in order to liberate social productivities. One of the main reform purpose was to solve soft budget constraints (SBCs) being regarded as one of the main causes of low productivity level at that time. SBCs phenomenon is one of the most important incentive problems in transition economies. This paper takes SBCs in transition economies...
It is usually imperfect for the traditional algorithm of mathematical programming when it is used to analyze the optimal power flow (OPF) issues. A new optimal power flow model of differential evolutionary algorithm has been developed in this paper through combining modern intelligent optimization algorithms, such as differential evolution (DE), simulated annealing (SA) and tabu search (TS). Concerning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.