The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
More and more people express their personal views and opinions to an event through micro-blog at the same time they also convey their emotions. The micro-blog can reflect the relationship between the event and people's interests, the degree of influence. The emotional complexity of a text is to measure the variety of people's emotional response in a text. In this paper the text is the whole micro-blog,...
The paper presents considerations on the concept of big data. The aim of the paper is to confront the attempts of defining big data with its common understanding by different groups of users. In this research the group of respondents are students of Warsaw University of Economics. The authors advocate that the student's opinion and attitude to big data can be important regarding the fact that they...
We describe a business workflow case study with abnormal behavior management (i.e. recovery) and demonstrate how temporal logics and model checking can provide a methodology to iteratively revise the design and obtain a correct-by construction system. To do so we define a formal semantics by giving a compilation of generic workflow patterns into LTL and we use the bound model checker Zot to prove...
Recently we can get to huge amount of complex information easily and quickly from internet. But it is hard to capture appropriate information inside since we should go through them and see quickly what's going on. So automatic summarization is indispensable. In this work, assuming concept hierarchy, we extract suitable labels for documents by abstracting and ranking characteristic words.
While some widely used network services, such as Internet telephony, clearly cannot function well in communication environments characterized by lengthy round-trip message exchange times, others such as electronic mail clearly can. This paper explores the proposition that electronic commerce might be supported effectively by Delay-Tolerant Networking over network infrastructure characterized by high...
In this paper I investigate the problem of providing application domain security constraints to distributed systems will maintaining high availability. This study uses the application domain of business loyalty incentives as a motivating example. The loyalty incentives are earned through electronic point and currency programs while the modeled system ensures the incentives are not vulnerable to cyber-attack...
A large number of Internet applications spawned by the IP based Internet have been rapidly eroding the traditional business of telecom operators in disruptive innovation business model. The traditional telecom operators have put forward the strategy of transformation, but the transformation is lack of theoretical analysis. By using Stackelberg economy analysis model, this paper deduced that it is...
Nahda University is the first privet university in Upper Egypt in Banisuif. As the direction for Nahda University is to be paperless, there is the E Learning Support System (ELS) for the undergraduate students of the six faculties of the university; which includes Oral and Dental Medicine, Pharmacy, Business Administration, Engineering, Mass Communication and information Technology. The ELS is considered...
Reducing the energy consumption of cellular wireless access networks is not only beneficial for the global environment but also makes commercial sense for telecommunication operators, our research focus on how to put forward a constructive energy saving method in the precondition of guaranteed service quality for customer. In this paper, we based on the signaling data and location data coming from...
In general website evaluation includes website function and website content and website credit, customer service and enterprise strength, website security, its interface design and website technology. These studies mainly are based on evaluation approach on traditional websites. The arrival of the era of big data provides new opportunities and challenges to the construction and application of electronic...
It is imperative to forecast advanced or emerging technologies to aid in decision making on firm's R&D investments and business plan for commercialization efforts. Even though a company must align R&D planning with overall business planning such as manufacturing, sales and marketing, personnel, and finance, systematic management approaches are limited in it based upon the prediction of technological...
In this paper, we study the relationship between continuation of use (COU) factor and the users' intention to purchase items in smartphone applications. We also proposed the four factors: trust, diversity of in- app items, social norm and resource usage, specifically affect the COU of the smartphone applications. Structural equation model (SEM) analysis of a questionnaire based survey collected from...
As a branch of electronic commerce, cross-border electronic commerce is considered as a new commodity transaction pattern. Chongqing, the youngest municipality, possesses excellent infrastructure and policies that support the development of cross-border electronic commerce. An econometric model is established in this paper, based on data related to cross-border electronic commerce that occurred in...
T2O is one of the e-commerce business modes which developed from the context of media convergence. The paper explained the essence and motivation of T2O through the research methods of qualitative research, logical inference, case analysis and so on. Firstly, the paper introduced the concept and mechanism of the T2O. Then, it analyzed the differences between the traditional e-commerce modes and T2O,...
With the advent of the era of big data, O2O as a new industry of making an integration of online and offline effectively, attracts more and more people to start to talk about this topic. In this article, after exploring the past academic research for two years, it is considered to select the local service industry and study the problem of the O2O industry, such as “Meituan.com”.
In this paper, wireless deployment scenarios for network operators delivering broadband Internet access in underserved rural areas lacking adequate basic PSTN network infrastructure are examined. Considering the defined operators' broadband coverage targets, the existing national regulatory demands and the EU initiatives engaged in a Digital divide reduction, further deployment of broadband access...
This paper, utilizing correlation analysis and path analysis methods, researches the impact path of negative Internet word related to the mouth on brand equity and quality through cognitive trust concept by regarding universal consumers as study principal body. This research aims to further promote the IWOM research system in China. The empirical conclusions unveil some relationship: (1) the cognitive...
Clickjacking is an attack that tricks victims into clicking on invisible elements of a web page to perform unin- tended actions that might be advantageous for the attacker. To defend against clickjacking, many techniques have been proposed, but it is still questionable whether they are effectively deployed in practice. We investigated how vulnerable Korean websites are to clickjacking attacks by performing...
MOOC triggered a revolution of online education. It has a great influence on methods of teaching, learning, organizing and business pattern of the education in China. The success of this revolution is very important for the research of online teaching process and teaching pattern of MOOC. Being centered on the characteristics of online teaching, this paper analyzes the structure and learning process...
Business process modeling is currently an important step in supporting the development of computational systems, as it occurs prior to the establishment of what is required for implementing the system. The business process mapping and its description are designed to further develop and structure the activities needed for the successful execution of this task. This article presents a modeling methodology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.