The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. The Enhydra Shark from the existing WfMS shows the process records on the web client by the allocated activities during the designing process of the process log for the sake of the process monitoring....
Establishing the new complex cooperative making information system about daily dispatching plan is the focal problem in the field of railway dispatching informatization in China now, through integrating the core function modules of each existing special business making information by using the advanced technology, Building the corresponding cooperative making model about daily dispatching plan is...
With the development of informationization in different application fields, establishment of the complex cooperative human-computer cooperative information system has become the focus now. The key to the problem is to build corresponding complex cooperative problem solving model. The blackboard model based on agent group is an efficient technique to build the model of certain types of complex cooperative...
In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed intrusion detection technology in electronic commerce...
Sophisticated event-pattern rules are the key to successful applications of Complex Event Processing (CEP). However, creating such rules may place heavy demands on business users. In this paper we propose a novel approach to rule composition for the event-based system SARI: Via a web-based user interface, users can compose ruling logic from abstracted, configurable buildings block as previously prepared...
Business intelligence is a powerful tool, it can help and guide enterprise to make decision, but improves their products and services quantity. This paper describes the functions of Performance Point Server and Microsoft other BI products, discusses their features, and finally, compares their management capabilities: monitoring, analysis, planning, and reporting.
This article describes a Business Intelligence (BI) development project applied to Homogeneous Diagnostic Groups (GDH) which are very specific and important for health management. All the phases of construction/evolution of this research and implementation project are explained and also some final results are presented. With this tool it is possible to analyze and monitor at each moment the state...
Promoting students success requires the implementation of processes and mechanisms that allows the closely monitoring of the students academic activities. Although essential, the activities involved in this complex process do not take place in many higher education institutions due to the lack of appropriate practices and an adequate technological support that sustain these practices. To overcome...
When stakeholder span is large, project scope identification can be challenging due to multiplicity of goals and competency uncertainties introduced by large number of external stakeholders. Conventional prescription of extensive stakeholder dialog in early stages may not suit time critical projects. This paper outlines a methodology to model and support comprehensive early stage identification and...
Many organizations success in the strategic planning, but they commonly fail in execution. The knowledge complexity and environment uncertainty in decision making evoke that strategy is not easy to be executed. It will influence the achievement of organization objectives and organization performance onward. This research is to solve those problems and the importance of knowledge management in making...
The ability to assess the relevance of topics and related sources in information-rich environments is a key to success when scanning business environments. This paper introduces a hybrid system to support managerial information gathering. The system is made up of three components: 1) a hierarchical hyperbolic SOM for structuring the information environment and visualizing the intensity of news activity...
Enterprise information management systems deal with management of business information within organizations in order to support decision-making processes or day-to-day operations that require the availability of knowledge. The business information from such systems is typically analyzed using monitoring systems that are designed with traditional data-warehouse and batch ETL (extract, transform and...
How to strengthen emergency management is important to the country overall economic, social development, people's life and property. By analyzing the macro business process in emergency management and the relevant emergency resources, it classifies the emergency resources and analyzes the relationship between emergency resources and events, then evaluates the emergency state by emergency resources...
In this paper, the necessity of the establishment of risk management system for construction enterprises is expounded first, and then a new risk management concept for construction enterprises on projects is proposed through the analysis on the construction enterprise risk management theory and practical experience on the basis of the progress of construction enterprises. The new risk management concept...
Management on inter-enterprise collaborations (business networks) still face grand challenges especially in terms of managing interoperability of nonfunctional properties (NFPs) at various levels (technical, semantic, pragmatic). This paper identifies three categories of nonfunctional properties (collaborative for business level, contractual for communication issues, extrafunctional for computational...
It is important to ensure that the IT governance is not only designed to achieve internal efficiency in the IT organization, such as deploying good IT processes and making sure that the means and goals are documented. The final goal of good IT governance is rather to provide the business with the support needed in order to conduct business in a good manner. This paper describes the IT organization...
Ensuring public security is an important issue for every government, and effective public security depends on the efficiency of criminal justice processes and procedures. The procedures of the criminal justice may be viewed as the upper-, middle-, and down-stream sections of a supply chain. Like their business counterparts, most law enforcement agencies have to deal with logistics, information flow,...
Along with rapid development of workflow technology, on the market, there are a lot of workflow products. Workflow exception handling study in the exception of workflow, through the appropriate method to deal effectively with the exception to ensure the implementation of the workflow. Most existing research on workflow management systems (WFMS) has been focused on workflow based on well structured...
Information systems used at higher education institution support essentially academic management processes like student's registration, student's management, student's marks, among others. These systems do not permit the closely monitoring of student's academic activities, the evaluation of their academic success and the support of academic activities concerning with teaching and tutoring. On the...
With the development of the complex and strategic of IT outsourcing, IT outsourcing decision becomes more complex and entails considerable implications for the strategy of the firm. In this work, we focus on IT outsourcing decision from a process conceptualization. According to the typical IT outsourcing process, the decision process of IT outsourcing can be classified four stages: pre-decision, selective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.