The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to a report online [34], more than 200 million unique users search for jobs online every month. This incredibly large and fast growing demand has enticed software giants such as Google and Facebook to enter this space, which was previously dominated by companies such as LinkedIn, Indeed, Dice and CareerBuilder. Recently, Google released their “AIpowered Jobs Search Engine”, “Google For Jobs”...
In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from...
Key Performance Indicators (KPIs) are used to inspect the performance and progress of businesses. This study introduces a new, integrated approach to manage KPIs in the context of decentralized information efficiently and to address the visual and managerial gaps existing in companies. The proposed Business Indicator Management (BIM) system is essential for any businesses to meet their needs in terms...
Warehouse Management Systems (WMS) play a major role in optimizing warehouse logistic processes, archiving merchant trends of supply and demand, and also easen treating of goods which are close to expiring deadline, out of stock, broken or deposited by customers. Since warehouse management systems may be integrated with business intelligence, they may comprise algorithms for optimization of warehouse...
The aim of this study is to propose an information system that should help boost cooperation between business and academia and their innovativeness. Its novelty relies on introducing such a system architecture and business processes that allow implementing the paradigm of open innovation easily. More specifically, the proposed system: (i) automatically acquires data from the Internet and extracts...
E-recruitment sites such as LinkedIn, Reed, and Indeed have a huge number of professional resumes from job seekers and job openings posted by recruiters. In this situation, it is a very time-consuming task for job seekers to find job openings that are well matched to their careers and desired conditions. Accordingly, active studies on job recommendation (JR) have been conducted recently. In this paper,...
The increasing digitalization of business and society has led to drastic changes within companies. Nearly all enterprises are facing enormous challenges dealing with topics such as Industry 4.0/Industrial Internet. With the goal of supporting companies to handle these challenges and “move” in an Industry 4.0 environment, several frameworks or reference models already exist. Here, we share the results...
The aim of this paper is to show the strengths and the weakness of process mining tools in post-delivery validation. This is illustrated on two use-cases from a real-world system. We also indicate what type of research has to be done to make process mining tools more usable for validation purposes.
Forecasting and analyzing urban car traffic is an actual but still very complex problem. The modern car fleet handling IT systems designed for taxi and delivery service companies allows GPS coordinate data acquisition from large amount of vehicles for optimizing the ride and freight allocation. Since the database of these companies contains movement patterns belonging to multitude of vehicles, arise...
Business cards are defined as cards which contains some business information about a company or individual. Business card are usually includes a company name or business affiliation with a logo, in addition to some information about cards holders such as (holders name, street addresses, telephone number, fax number, e-mail addresses and website). Nowadays, it became very necessary for these cards...
This article dials with the problems of information search in company knowledge management system by keywords and belonging to some category. The approach of weight coefficients correction based on user activity statistics is considered; also, associative analysis that allows to determine keywords bonds in measure of user request is used.
In the last decades, the explosion of the volume of digital document images, and the development of consumer tools to modify these images, has lead to a huge increase on reported fraudulent document cases. This situation has promoted the development of automatic methods for both preventing forgeries in modified documents and detecting them. However, document forensics is a sensitive topic. Data is...
Career perspectives are known to motivate software engineers. However, so far, career perspectives have been mostly studied within traditional software development companies. In our work we take a complementary approach and study career paths of open source developers, focusing on their advancement through the code review hierarchy, from developers to reviewers and further to core reviewers.To gain...
Brazil is one of the major crops producer in the world, and second and third soybean and maize producer respectively. Among Brazilian States, Mato Grosso State represents near 23% of the national production in grains. Despite these numbers, there is no diagnosis of the static grain storage capacity at the municipal or state level. The aim of this paper is to evaluate the grain storage deficit in Mato...
In many applications, such as data integration and big data analytics, one has to integrate data from multiple sources without detailed and accurate schema information. The state of the art focuses on matching attributes among sources based on the information derived from the data in those sources. However, a best join result according to a method's own pre-determined criteria may not fit a user's...
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype...
SQL Injection is one of the most critical security vulnerability in web applications. Most web applications use SQL as web applications. SQL injection mainly affects these websites and web applications. An attacker can easily bypass a web applications authentication and authorization and get access to the contents they want by SQL injection. This unauthorised access helps the attacker to retrieve...
Identifying the technology trends, key patents to be aware of, the key players active in the field, the product areas that are heavily patented or scarcely addressed, and the focus of a company's competitors represent crucial aspects of developing a successful strategic plan, determining a company's freedom to make and sell their product, and focusing future research & product development efforts...
When performing a separation of test results, coping with enormous high-dimensional data sets is necessary but problematic. The input of high-dimensional data, in which not a few elements are irrelevant or less relevant than others, usually lead to inadequate results. It is therefore useful to consult methods, which classify the individual dimensions of the data volumes according to their relevance...
Selecting, developing and deploying a document management system for engineering use involves the ability to follow an engineering revision process, integrate easily with engineering and corporate applications (custom or Commercial Off the Shelf (COTS)), uniting disparate on-premise and cloud systems, and integrating existing and evolved business processes and applications.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.