The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with the “Clean Energy for All Europeans” proposals presented by the European Commission on Wednesday, 30th November 2016 in its constant endeavor to mobilize efforts of the innovation community and lead the transition toward a more decentralized, decarbonized, democratized, diversified, digitalized and disruptive model.
Online professional social networks such as LinkedIn have enhanced the ability of job seekers to discover and assess career opportunities, and the ability of job providers to discover and assess potential candidates. For most job seekers, salary (or broadly compensation) is a crucial consideration in choosing a new job. At the same time, job seekers face challenges in learning the compensation associated...
The first part of the article presents the assumptions of the capacity market in Poland that was recently presented by the Ministry of Economy. The mechanism is based on the centralized capacity market solution already implemented in Great Britain, however, introduces novel solutions such as separate auctions for new and existing power units. In the second part, we described the modifications that...
Development in information systems has brought the need for universal access to data stored in computer systems using database approach. It should ensure quality, reliability, performance with emphasis on rising data amount. The first part of the paper deals with the index structure definition, index access methods, which delimit access type. However, another significant factor is the data security...
Recently, privacy preservation in publishing social network has become one of the most notable challenges. Researchers have developed a variety of methods to protect individual's privacy while maintaining utility at the same time. There exists such a situation that an adversary may identify the privacy of a victim with the background knowledge of public neighborhoods. Unfortunately, most of previous...
Due to the increasing penetration of distributed generation and new high-power consumption loads - such as electric vehicles (EVs) - distribution system operators (DSO) are facing new grid security challenges. DSOs have historically dealt with such issues by making investments in grid reinforcement. However, an alternative solution, enabled by the expected roll-out of smart meters and high penetration...
Software developers with open source project experience acquire verifiable technical expertise, peer-certified competencies, and positional power--advantages that align with companies' need to obtain a competitive advantage.
The main reasons of the excessive residents' income gap in China are the lower proportions of labor payment and residents' income in the first distribution and redistribution, and enterprises and government have occupied the residents' income. As for the unfair income distribution, it appears mostly because of the imperfect political and economic systems and income distribution system, such as corruption,...
Insider threat is a critical problem due to the immense harm that it poses to organizations. This paper investigates this problem in relational database systems. Generally, defending systems against insider threat may require rejecting insiders' requests to access some data items. The paper focuses on preventing unauthorized knowledge acquisition by insiders in concurrent undeclared tasks, where a...
The Royal Malaysia Police (RMP) is one of the largest enforcement agencies in Malaysia. In keeping the security of the country, the service of the police force is very important and undeniable; hence, the objective of this study is to investigate the level of job satisfaction among technical and operational personnel in the Communication Division of the RMP. The findings showed that 23.8% of the respondents...
There are lots of successful experiences and lost lessons in the course of utilization of foreign capital according all of the nations, the biggest one is a fairly large scale with its national conditions. In China, FDI has its negative influence on economy as well as its contributed, how to deal with these negative influences and where is the fairly large scale will be discussed in this paper, based...
In the fourth quarter of 2008, US subprime crisis swept through all over the world, whipping up an international financial storm. China was also involved in this around of crisis, with weak and fatigue market performance, lead to the depression of the macro-economy and the operation difficulties of domestic enterprises. It became a challenge facing the management layer to adjust human resource strategies...
In this paper, DEA modeling and efficiency evalutation is employed to assess the financial efficiency in more than 30 province china. The data of financial efficiency in each provinces and vadity in the financial scale as well as input indicators on finance was obtained. Through the comparison evaluations, the paper indicates that there are great difference in regional financial efficiency. At the...
Based on the background of incentive mechanism of AA Co., first analyzes the current situation of incentive mechanism, and then has an in-depth understanding of incentive mechanism of the company. Based on motivation theory analyzes the incentive situation in qualitative and quantitative way, and find the main problems existing in the incentive mechanism, and the reason of negative of staff. Work...
In recent years, people have institutional arrangements of the CPA had a doubt. That lead to "an independent audit is not independent, "the major factor is the actual choice and pay the audit fees accounting firm that audited entity management. I believe that auditor independence from the source control problem, we must reform the current mode of unreasonable audit commission should be under...
Inference has been a longstanding issue in database security, and inference control, aiming to curb inference, provides an extra line of defense to the confidentiality of databases by complementing access control. However, in traditional inference control architecture, database server is a crucial bottleneck, as it enforces highly computation-intensive auditing for all users who query the protected...
Reinforcement learning is an algorithm without model which is learning what to do--how to map situations to actions-so as to maximize a numerical reward signal. Reinforcement learning provides an available method to the systems, which are very difficult to build up accurate models around complex environment. But now many practical problems demand a maximum reward with not much cost (expense). For...
This paper presents a comprehensive design for reactive power markets. Under this approach, the system operator purchases the required reactive power capacity for generation and absorption from the reactive power market agents. To introduce competition in the proposed market different agents are able to participate in the annual auction, such as generators, capacitor banks, shunt reactors, SVCs or...
We investigate the inference problems due to functional dependencies (FD) and multi-valued dependencies (hND) in a multilevel relational database (MDB) with attribute and record classification schemes, respectively. For FDs, we show that, to prevent compromise, the security levels of attributes must be assigned by using the knowledge of functional dependencies. Under the assumption that all the attributes...
A number of mechanisms have been proposed for protecting the privacy of individual records in statistical databases. One such method is to perturb the data by adding random noise. It has been previously thought that this method, although increasing estimation variance, produces unbiased estimates. This paper demonstrates that in fact the addition of noise may introduce quite serious biases in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.