The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper puts forward a knowledge push method which is based on multidimensional hierarchical context model for general business process, and constructs a multi-dimensional hierarchical model of business process and a context driven knowledge resource database model, which emphasizes the mapping relation between knowledge and the knowledge context. On this basis, a framework of the knowledge push...
Datamining is the process of extracting interesting information of patterns from large databases. One of the most important datamining task and well-researched is the association rules mining. It aims to find the interesting correlation and relations among sets of items in the transaction databases. One of the main problems related to the discovery of these associations that a decision maker faces...
Online marketplaces are e-commerce websites where thousands of products are provided by multiple third parties. There are dozens of these differently structured marketplaces that need to be visited by the end users to reach their targets. This searching process consumes a lot of time and effort; moreover it negatively affects the user experience. In this paper, extensive analysis and evaluation of...
Document Analysis and Recognition (DAR) has two main objectives, first the analysis of the physical structure of the input image of the document, which should lead to the correct identification of the corresponding different homogeneous components and their boundaries in terms of XY coordinates. Second, each of these homogeneous components should be recognized in such a way that, if it is a text image,...
The literature about enterprise architecture (EA) measurement discusses a number of challenges. This systematic mapping survey explores the EA measurement research area to figure out how the research area is structured, look at gaps in EA measurement research, and recommend future improvements. Some of the key findings of this paper show that current research only address a limit perspective on the...
Telecom Operators are going towards future of virtualization and cloud in order to provide new innovative services that are customer centric and to serve not so predictable Internet of Things (IoT). Transformation of Operation Support Systems (OSS) is recognized by TMForum as a key aspect in supporting upcoming technology changes and services agility. This article will show results of OSS transformation...
To accomplish the organizational business objectives and consistently improve processes, high maturity processes are implemented in numerous software enterprises. Organizational process asset library (OPAL) plays a significant role in the definitions, executions and improvements for software processes. Based on the conceptions of Capability Maturity Model Integration (CMMI) and practical experience,...
In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even...
Hiding High Utility Sequential Patterns (HUSPs) is the task of finding the ways how to hide high utility sequential patterns appearing in sequence databases so that the adversaries cannot discover them after hiding. It has become an important research topic in recent years and has been applied in various domains such as business, marketing, stock, health and security, etc. However, few methods have...
This article reflects on experiences collected by doing technical debt assessments for many years as a primary job. It argues for a model that represents software source code and other informational artifacts as a graph with metadata describing these artifacts. Technical debt items are discovered with graph matching patterns that represent technical debt discovery patterns. These patterns automate...
Web applications are nowadays being used to support enterprise-level business operations and usually rely on back-end databases to deliver service to clients. Research and industry reports indicate the huge impact the quality of the data can have on businesses, especially when applications are not prepared for handling low quality data. In fact, even in widely tested and used applications, the presence...
Merchant acquirer is a business of acquiring debit card, credit card, and prepaid card transactions using EDC (electronic payment terminals) in merchants. It is included in one of the top business priority areas in PT. XYZ. It is in the area of retail payments and deposits. It increases fees based incomes, cheap funds, and high yield loans. In order to improve its business performance, PT. XYZ needs...
Data has a strategic role in planning, evaluating, making decisions, and formulating policy. Various data supplying that appropriate with the potential of each region was conducted by the Statistics Indonesia (BPS) in each of those region. Service engineering efort needs to be done to improve the quality of data services in every regional BPS. In order to implement the services easily in every regional...
Online Analytics Processing (OLAP) is utilised to develop multidimensional operations enabling queries and visualisation for Business Intelligence (BI). Most of the OLAP systems come with a tightly integrated user interface for querying and visualisation of data without the core OLAP operations exposed as an API. Advanced BI applications can be developed and composed to create complex workflows if...
The problem which companies want to face is the integration of the applications in an information system (IS) and the interconnection of the system itself with other information systems. The interoperability of IS constitutes, their ability to communicate and to inter-operate following a given model using a common language favoring the sharing of information for better performance and profitability...
Indoor location can be of great assistance to shoppers: it enables them to find products, navigate around a large store or receive location specific promotions. Business owners also benefit from the collection of location data and movement patterns, as well as the potential for increased revenue and customer engagement by communicating with the user while in the shop. However, so far the lack of ubiquitous...
ERP to cloud integration is a widely debated topic, especially in the — so popular nowadays — cloud and mobility context. This article introduces a cloud based field service management solution that integrates with ERP back offices. To increase commercial adoption and obtain ERP vendor independence, a generic integration application is proposed, that abstracts communication complexity, decreases prototyping...
Filtering and finding items of interest in large volumes of data, such as products in an e-commerce application or invoices in an ERP web platform can be a burdensome task, either for novice users that do not have insights on how the data is modeled or for those users who are already accustomed to the used system, but usually their filtering needs are significantly more complex. Natural language processing...
The number of active, online phishing websites continues to grow unabated in recent years. This has created an ever-increasing security risk for both individual and enterprise users in terms of identity theft, malware, financial loss, etc. Although resources exist for tracking, cataloguing, and blacklisting these types of sites (e.g., PhishTank.com), the ephemeral nature of phishing websites makes...
The detailed designs, technologies and implementations of cloud storage are presented, including the multi-tenant concurrency, separated framework between buffer and business etc. Master/Workers partition algorithm is adopted to improve the reading and writing efficiency for big data in the cloud storage. A cross-platform interface is provided by using RESTful API. Meta files and their permissions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.