Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper we describe the algorithms and tools offered by DOCODE, a system for plagiarism detection in educational institutions, with a special focus on the task of external plagiarism detection using the Web as a source of information. In that context, although DOCODE is a full-featured system based on several algorithms, our main contribution is an algorithm that given a document is capable...
Effective category management by grocery stores requires product category evaluation. Previous studies have evaluated product categories using point-of-sales shopping behavior data. Recent developments in radio frequency identificatio technology facilitate the tracking of customer shopping paths within a store and aggregated stay time in sales areas. In addition to radio frequency identificatio data,...
BPEL has emerged as the de facto industry standard for composing web services. In this paper, we focus on a core subset of BPEL, called BPEL, and provide a set of rules for translating BPEL into the process algebra language mCRL2, which can be used to verify properties of BPEL processes. An employee travel arrangement example is provided to show our approach.
South African industries are under increasing budgetary pressure with the current rise of electricity costs above inflation. In addition to this, industries that are supplied through municipalities have to cope with additional service costs of up to 20%. These consumers are therefore compelled to find new ways of saving electricity. Further, in order to decrease the country's peak electrical load...
The performance of industrial DSM projects often deteriorates without proper maintenance. Underperforming DSM projects waste money and increase the demand for electricity from Eskom. A solution to this problem is dedicated maintenance on industrial DSM projects. This ensures maximum performance and maximum electricity cost savings. In this paper, the business case for industrial DSM maintenance is...
This paper proposes requirements patterns for Online Social Networks (OSNs). Patterns are based on features observed on currently popular OSNs, and are defined as i-star models. Patterns are relevant for the requirements engineering of new OSNs. They can help in requirements elicitation, in order to avoid missing important OSN requirements. They can be used as basic models of OSN requirements, something...
IT has changed business model and business process, and has become an essential ingredient for the competitive advantage. Under such circumstances, a conventional requirements engineering methodology is not sufficient. We propose an IT-driven business model design methodology in order to take advantage of innovative information technologies. The proposed methodology includes XBMC (eXtended BMC), an...
According to the characteristics of microfinance of Chinese commercial bank, a performance evaluation system of microfinance of commercial bank is developed. Fuzzy mathematics and AHP are used in the empirical analysis of performance of commercial bank microfinance to get a better evaluation results.
It is still an open question how to achieve a proper balance between the cost and value of requirements elicitation. When deciding to assign time and other resources to elicitation, one needs to know what its effectives would be. In the paper we investigate the Structured Elicitation of Non-functional Require-ments(SENoR) method. The method is composed of a sequence of short brainstorming sessions...
Extracting user requirements in designing innovative ICT based solutions for emerging vague problems is a challenge. We successfully addressed this challenge by blending several techniques in Software Engineering (SE) and Human Computer Interaction (HCI) within a Design Science Research (DSR) framework. These techniques were traditional surveys and interviews, causal analysis, scenario creation and...
Oriented Programming is the supplement with OOP, which separate the core business logic from general supported service in software development. The concepts of AOP and the technology characteristics of .NET framework are introduced, then this paper analyzed the implement mechanism of AOP in .NET framework, finally an approach to implement AOP Framework in .NET framework and a corresponding example...
This research proposes a trust and reputation model to support collectivist digital business ecosystems for regions such as Africa, where collectivist culture norms and behaviours are common. As trusting behaviour is strongly influenced by cultural norms and beliefs, trust should not only be considered from a technical perspective, but also from a cultural perspective. A multi-level group trust and...
With the limitation of low predictive performance and poor reliability in current case-based reasoning method, this paper proposes a case-based reasoning algorithm based on qualitative causality (CBR-QC). On the basis of traditional quantitative retrieval method, it introduces relevant knowledge about qualitative reasoning, describes the case qualitatively with qualitative method, constructs qualitative...
According to the characteristics of the IT system construction and the practicality of enterprise application, this study proposes the IT system business support ability evaluation system and establishes the evaluation criteria. Finally this study carries on the evaluation system based on an example of verification, turning out to be of practical significance.
O2O E-commerce is booming. The consumer trust is important to the development of O2O, so this paper studies the related factors of consumer trust degree of O2O in four dimensions, including customer factor, vendor factor, website platform factor and transaction environment factor. We set up a comprehensive evaluation method based on Analytical Hierarchy Process and the fuzzy analysis. Empirical analysis...
Existent indices for measuring RMB internationalization degree only reflect past and current situation of RMB's international use, and don't consider the fact that the financial openness of China is still considerably restricted. This paper aims at building a forward-looking index to measure RMB's potential in becoming internationalized currency, under the assumption that China will eventually unleash...
With the purpose of solving the problem of enterprises' marketing management and using 'collaborative innovation' to guide enterprises' marketing management program, this paper integrates marketing major in vocational colleges and the region's largest retailers to discuss the education reform in vocational marketing major teaching. Hence, this can enhance the level of vocational colleges, and promote...
Smarty is a variability management approach for UML-based software product lines. It allows the identification, representation and tracing of variabilities in several UML models by means of an UML profile, the Smarty Profile, and a systematic process, the Smarty Process, with guidelines to provide user directions for applying such a profile. The existing UML-based variability management approaches...
Patterns and pattern languages are widely used nowadays. The need to apply patterns in the right sequence is very important, but how to apply them using many pattern languages or pattern catalogue is sometimes very difficult. After examining the current literature on the use of patterns from the software development perspective, this paper proposes a framework for determining the pattern applicability...
During the execution of a business process users need to be authenticated by multiple component service providers, while their identities need to be shared and propagated across multi-domain in a privacy-preserving fashion. An anonymous credential-based identity verification scheme is proposed to address privacy issue. Users establish trust relationship with the federation by running the enrollment...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.