The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices that can sense their location using GPS or Wi-Fi have become extremely popular. However, many users hesitate to provide their accurate location information to unreliable third parties if it means that their identities or sensitive attribute values will be disclosed by doing so. Many approaches for anonymization, such as ${k}$ -anonymity, have been proposed to tackle this issue. Existing...
This paper proposes an approach to estimating fungibility between skills given multiple information sources of those skills. An estimate of skill adjacency or fungibility or substitutability is critical for effective capacity planning, analytics and optimization in the face of changing skill requirements of an organization. The proposed approach is based on computing a similarity measure between skills,...
Development of document processing systems is considered. The direction of transition to the object-associated electronic document management systems is shown. The assessment of correlation of control of processes of relocation of documents and change of objects in the distributed large-scale systems is carried out.
In our daily life we develop many activities that result imperceptible for the majority of us because the null effort that they represent to develop them, however, when we most develop those activities with any type of restriction, they acquire a higher level of difficulty. One simple activity is the communication process; we develop it in an easy way during almost all day, however, for people with...
In asset management, the availability of appropriate information is key in generating strategic, tactical and operational business decisions. Especially in the planning of asset management, it is required centralization and integration of data to ensure the control of the output (information) in the decision-making. PLN TJBB currently develop data management consist of assets data and asset management...
Cloud database management systems (DBMSs) often decouple database instances from physical storage to provide reliability and high availability to users. This design can robustly handle a single point of failure, but needs substantial effort to attain good performance. In this paper, we analyze the decoupled architecture and present important optimization issues that we faced in implementing the design...
Nowadays, under the circumstance of open innovation, R&D organizations of dual-coupled mode have been used in China to solve such problems existing in R&D organizations as repetition and fragmentation of institutions and research programs, low commercialization rate of scientific research results, single operating mode and the phenomenon of research lagging behind the development of industry...
It is described the concepts of recommender system and virtual creative team and their characteristics. It is also analyzed the functional features of developed automated system, called “Information assistant of a scientist” that provides information search and storage which is relevant to research topics of creative research team in the field of e-science.
Learning lessons from projects is becoming increasingly critical to organizations and has peaked academics' and practitioners' interests. Although for many reasons in practice, the process of learning today to avoid making the same mistake tomorrow does not necessarily take place throughout the project's lifecycle. This paper is based on research aimed at examining the measurable impact of systematic...
This article is addicted to the analysis of the main components of informational environment in the universities. The authors provide the characteristics of the chief documents load at universities. It is proposed the informational and analytical systems to be used in order to manage the informational and documental environment at the University.
This paper presents the current problematic of development a set of indicators user direction, informational direction and reputational direction to perform task of directions of the organization of life cycle of virtual community. The method of determination of possible variants of balancing indicators of virtual community is developed. These indicators based on the analysis of the subject area of...
The article considers approaches to assessing the quality of applications submitted for participation in competitions, which are implemented in the automated project management system. These approaches allow us to evaluate the scientific background of the team of the project executors and the correspondence of the project's keywords with the selected CSCSTI codes (Codes of State Categories Scientific...
Traditional methods of testing were based on Instrument-Centric models which included sensor and measurement capabilities inside of instruments that allowed test engineers to be able to perform measurements and collect data. Such data would then be analyzed by software to determine whether the test resulted in a pass or fail disposition. Modern technologies have significantly changed the equation...
The problems that arise during implementation of electronic document management systems at Ukrainian universities were analyzed. Functional incompleteness of such systems and the difficulties that arise during their deployment were shown. For this reason, it was proposed extending the scope of such systems to include the processes of information management of universities. The project approach to...
The importance of data security and confidentiality increases day by day, since for most companies and organizations data remains as the most important asset. Standard database security measures like access control mechanisms, authentication and encryption technologies are of little help when it comes to preventing data theft from insiders. By incorporating intrusion detection mechanisms, we can improve...
Members of international organizations often meet in person at a common location for discussions. There is frequently disagreement over the place and time of the meeting due to the different travel efforts of the members. They usually travel by plane and their travel expenses depend on the flight connections. This paper presents an approach to calculate the optimized location and time, where and when...
It is estimated that, nowadays, around 40 records containing private data are leaked every second. Many of these illegally obtained records are due to the lack of security measures taken into consideration. One of the biggest mistakes that can be done, when it comes to data security, is to store data in plaintext, because a vulnerability that gives an attacker access to the database may result in...
This paper discusses the similarities and differences in both ideology expressed and practices employed by two terrorist groups that operated in Greece between the years of 1975 and 2017: Revolutionary Organization 17 November and Conspiracy of Fire Nuclei. Within this line of thought, we will briefly provide an outline of the political and ideological framework of the groups on focus in an effort...
“Internet + intelligent education” is the inevitable trend with the development of the education industry. iStudy, a Generic practice platform is a kind of practical curriculum evaluation platform for teachers and students, which combines operation, practice, evaluation, examination and item bank management with comprehensive teaching system and management system and is being accepted and enjoyed...
Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.