The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the important approach in data mining is sequential pattern mining that is used for discovering behaviors of sequential databases. There are various challenges in sequential pattern mining such as efficiency and effectiveness. In this paper different sequential pattern mining algorithm are discussed such as GSP, FreeSpan, PrefixSpan, and CAI-PrefixSpan to improve performance to finding sequential...
The location of business is indispensable for all commercial activities. However, current partition of commercial area mostly depends on human experience and other subjective factors rather than intelligent decisions, which is likely to mislead people who want to engage in business. The new combination of algorithms in this paper aims to clarify how the commercial area is formed by visualizing whether...
IT complexity in enterprise today continues to grow at a dizzying rate. Technology innovation, vendor heterogeneity, and business demands are major reasons why organizations are exposed to new risks, based on the gaps opened between the options and features of each IT element and product, and how they are implemented to support a well-defined policy and company strategy. Moreover, the impact of such...
Studies reveal that 70% of our IT finance is used in maintaining the traditional IT System, while a mere 30% is utilized in enhancing its productivity, efficiency and innovation. This intensifies the need for a computer solution which provides technology designed for high performance, availability, greater reliability, rapid mass scalability, with a reduced cost, that facilitates higher growth and...
This paper is a review of the big data concept, its dimensions, its architecture comparison between the earlier concept and the latest, the storage possible i.e. the databases and origin of big data. The relational database, having rigid schema, has been prevailing since a long time but it is difficult to store the unstructured data in relational database. The unstructured data has mainly text nature...
In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use e-commerce websites on a daily basis to make their everyday...
Currently, the fast rate of population growth in urban areas are putting a big pressure in services supply. In order to fulfil citizens' demands, the cities' operations need to be intelligently optimized. All around the world cities are implementing smart cities initiatives to address this challenge. The development of smart initiatives implies the adoption of solutions that heavily rely on Information...
We show in this paper our experiences and results in teaching different user interface technologies. Our focus is one of the biggest ERP solutions, which offers several UI possibilities. We have recognized that different technologies require different knowledge from programming, design, fantasy and robustness aspects as well. On the other hand the students' age, educational environment, graduate level...
Knowledge-intensive business services (KIBS) such as management consulting, research and development, and IT outsourcing, have become a key component of most industrialized economies. As such, there has been a growing number of empirical studies investigating the way in which KIBS providers, clients, and partners collaboratively create value. These studies provide an important opportunity to improve...
Business process patterns, or generalised reusable process models, have the potential to reduce the effort and costs of developing new business processes or re-engineering existing ones. Identifying new patterns, however, requires an analysis of existing business data to uncover commonalities of processes within and across organisations. In previous work we developed a method to extract linguistic...
Kitchen safety in catering industry has a direct impact on people's health and life safety. In this paper, a kitchen video monitoring system named “sunshine kitchen” is designed and constructed, which is based on cloud computing and video data analysis and provides services for the public, government, operators and other groups of people. One cloud data center is constructed as the supporting and...
This paper on the. Net platform three layer architecture of online bookstore system design process were research and exploration, and the second layer architecture comparison of advantages and disadvantages. Three layer architecture thought take the strategy of "divide and conquer", the separation of system design key points of each to a separate layer implementation, and through mutual...
Each mobile device represents the digital footprint of the owner; at the same time mobile location data stored in telecom operators' databases in terms of Call Detail Record (CDR). It holds the precise identity of the mobile cell tower to which the owner is connected at any given time. Effectively mobile device count within a region for some time period can be calculated. Again, International Mobile...
Over the past 20 years web browsers have changed considerably from being a simple text display to now supporting complex multimedia applications. The client can now enjoy chatting, playing games and Internet banking. All these applications have something in common, they can be run on multiple platforms and in some cases they will run offline. With the introduction of HTML5 this evolution will continue,...
According to the development of our colleges mental health educational background and environment, we'd analyze the architecture of mental health assessment system, using the J2EE structure and SQL SERVER as the database structure, My Eclipse as development environment. Assessment system becomes the key to improve the level of education of college mental health and reduces the mental health of teachers'...
Big-data middle layer architecture is defined to perform the query analysis and the evaluation of the Big Data. This scheme is implemented on dynamic generated data section. The concept of Big Data concerns with a bulk of data presented in large volume with complicated architecture and with increasing data set. The data for such system can be taken from multiple sources and sometimes from independent...
Teradata data warehouse technology has been widely used in China, but few studies it. In order to clearly understand the Teradata and its internal mechanisms, the paper studies the basic structure of Teradata data warehouse through analyzing the parallelism characteristic and scalability characteristic of Teradata MPP System. The paper also discusses the solution about construction of the Teradata...
Over the past decade, the field of Cloud Computing has been the focus of intensive research. This paper proposes 'A Public Cloud based SOA Workflow for Machine Learning based Recommendation Algorithms' to build a framework that will simulate the architectural setup of a cloud environment and examine how it can leverage Apriori and sequential pattern based recommendation algorithms using R. Furthermore,...
In this paper, we focus on the exception handling mechanism of CA-CCML (Context-aware Cooperative Composition Modeling Language). First, according to level of exception generation, we divide Web service exceptions into three broad categories by levels of exception generation, which are Service invocation level exception, Syntax level exception and Semantic level exception. Then we make detail classification...
Aiming at product information management in modern enterprise, the warehouse management system in this paper uses the J2EE architecture and is based on B/S mode. It uses SSH, the more popular integrated open-source framework in web application, improves the security and reliability of the system. This paper mainly introduces architecture and database design of the system. The design of user permissions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.