The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
e-Invoicing Application in Turkey has been implemented since 2010. But after 2014 it has reached widespread usage by government regulation and as of 2017 the number of e-invoice users has exceeded sixty thousands. Generating invoices according to a single standard in electronic environment has made it easier to analyze and inspect through the data. In this case, the analyzes can be performed on the...
Malfunctioning areas and various business-IT mismatches encumber the achievement of strategic alignment. This paper deals with the concept of misalignment, with special attention to enterprise architecture (EA)-based analytical potential. In this paper, an analytical solution is tested in form of a case study at a road management authority. The study proposes a rule-based framework to reveal the symptoms...
Users have to require authentication with many times different a set of username and password which access various service providers and applications in their daily task and on social life. In this case, the user must need to memorize many pair of a set of username and password. This one is then to enforce the users using ordinary/same passwords or to keep note of passwords somewhere. It is a problem...
IT services built from cloud applications are subject of several maintenance operations like upgrades, reconfigurations, or redeployments. Monitoring those changes is crucial to detect operator errors, which are a main source of service failures. Another challenge, which exacerbates operator errors is the increasing frequency of changes, e.g. because of continuous deployments. In this paper we propose...
Online marketplaces are e-commerce websites where thousands of products are provided by multiple third parties. There are dozens of these differently structured marketplaces that need to be visited by the end users to reach their targets. This searching process consumes a lot of time and effort; moreover it negatively affects the user experience. In this paper, extensive analysis and evaluation of...
In this work we present a synergic integration of the Functional Mock-Up Interface (FMI) and Business Process Model and Notation (BPMN) standards aimed at managing coupled system simulations. The expressiveness of the BPMN diagrams enabled us to define the relationship between the involved systems and guarantees a one-to-one correspondence with an XML file which is the starting point for the automation...
21st century is completely a new era in which security and data roaming are on the upfront and borders are ceased globally by standardization. In the process of moving paper to electronic media, all these components should be taken in consider. By this way the process can be operated effectively. Generation and communicational standards of electronic invoice process and its components are examined...
ERP to cloud integration is a widely debated topic, especially in the — so popular nowadays — cloud and mobility context. This article introduces a cloud based field service management solution that integrates with ERP back offices. To increase commercial adoption and obtain ERP vendor independence, a generic integration application is proposed, that abstracts communication complexity, decreases prototyping...
Service-Oriented Architecture (SOA) is a widely accepted paradigm for development of distributed applications using interoperable and flexible software components. Still the preferred technology for SOA implementation is provided by the web services. Their interface as well as complex interactions are described with XML-based standards, such as Web Service Description Language (WSDL) and Business...
Network functionality is growing increasingly complex, making the commands addition of network device a steadily growing challenge. In order to improve the efficiency of adding new commands to developing or developed network devices, we propose an extensible command parsing method (ECPM). With this method, we design the extensible command parsing system consisting of business-logic module and command-matching...
Metadata enables organizations or individuals to create and associated data that can help to define richer details about the world and events around it. For the cloud environment, metadata demands identification of associative capacity of information. At the same time, the system should be flexible, scalable and capable of supporting efficient searching mechanism over disparate information generated...
Business rules are crucial and most adaptive to their related business process. These business rules define and constrain the workflow logic of the business process. Thus, it is important to verify the business rules to ensure their correctness and consistency properties. Alternatively, the topology modeling of a workflow would be formalized into a Coloured Petri Nets. However, the business rules...
Heterogeneous rectangular dissections are frequently used in information processing such as multiple paged books in spread sheet languages and multi-layer image data. In previous studies, a hexadecimal grid graph model was proposed for multilayer rectangular dissections and certain algorithms were provided. In this paper, we propose a 16-ary list structure to implement their algorithms for the hexadecimal...
With the advance of information technology, Home-School Interactive Education Platform (HSIEP) becomes an important department of the digital campus network. How to solve the “islands of information” of the digital campus network is a key problem, because of the heterogeneous environment, database, and data format in the network. In this paper, we analyzed “islands of information” phenomenon of the...
Technological advancements have provided Banks several means of sending messages to their customers. In the context of business-to-customer interaction, Single Channel Messaging (SCM) model is prominently used by most Banks in Africa. SCM is restricted to one communication medium and messages are not sent based on urgency or priority. The ultimate aim of this research study is to propose and implement...
While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to...
Previous work has demonstrated that property-based testing can successfully be applied to web services. For example, it has been shown that JSON schemas can be used to automatically derive test-case generators for web forms. This paper presents a test-case generation approach for web services that takes business rule models as input for property-based testing. We parse these models to automatically...
This paper proposes a quantitative metric to analyze potential reusability of a Business Process Execution Language (BPEL) process. The approach is based on the description and logic mismatch probability of a BPEL process that will be reused within potential contexts. The mismatch probabilities have been consolidated to a metric formula for quantifying the probability of potential reuse of BPEL processes...
IT complexity in enterprise today continues to grow at a dizzying rate. Technology innovation, vendor heterogeneity, and business demands are major reasons why organizations are exposed to new risks, based on the gaps opened between the options and features of each IT element and product, and how they are implemented to support a well-defined policy and company strategy. Moreover, the impact of such...
Software systems which are dynamically composed from autonomous Web Services, coordinated by some composition processes referred to as Web Service Based Systems (WSBS). These are essentially distributed in nature and in most cases facilitated through third party service providers. Service-based approaches are widely used to integrate the heterogeneous systems. Web Services allow for the design of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.