The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main problem of rule-based information extraction technique is that the extraction rules tend to be specifically designed for specific information or document structure; hence it cannot be directly used in another without some proper modifications. Semi-structured documents like tables present another challenge to information extraction; since there are no standards on how to design it, the structure...
Data profiling is an information analysis technique on data stored inside database. Data profiling purpose is to ensure data quality by detecting whether the data in the data source compiles with the established business rules. Profiling could be performed using multiple analysis techniques depending on the data element to be analyzed. The analysis process also influenced by the data profiling tool...
There are many "continuous" practices in software engineering, for example continuous integration (CI), continuous delivery (CD), continuous release (CR), and DevOps. However, the maintenance aspect of continuity is rarely mentioned in publication or education. The continuous practices and applications depend on many repositories and artifacts, such as databases, servers, virtual machines,...
Cloud computing is a model that offers on-demand computational resources to clients as services. In this concept, users are charged based on a pay-per-use business model. Therefore, it dramatically reduces operating costs associated with the maintenance of the local data center. Recently, database is provided as a service to fulfill clients' demand. Following this, companies can rely on a remote database...
Curricula of the Universities and especially of the Universities of Applied Sciences should be, in the best case, developed in such way, that graduates' knowledge should reflect contemporary requirements of the industry, without to losing the assertion of universality as the central perspective of the higher education. This awareness is often identified, but in the real case, the organization of the...
The pulse of today's business processes, competition and technology can be well observed in the increasingly available information companies are confronted with. Particularly, the importance of information leads to big data which makes it even more difficult for companies to manage their information and costumers. Contact centers (CCs) as the main touch point of organizations face the major issues...
As we know internet is a beautiful thing. But it can lead to enmities, if not used properly. As the use of internet is growing participation of user is also growing. Through internet we can make world smaller by communicating, sharing, posting, tagging information's to people. As informative internet is, it can also be non-informative. This non-informative information is of no use in a business oriented...
This paper describes the implementation of a manufacturing monitoring system using RFID, wireless, and plug-and-play technologies. The system gathered information about time and work in process (WIP), enabling process waste identification, production according to takt time, activity balance, and production capacity assessment. The method comprises the development of an RFID reader, a middleware, a...
As technology moves from being an enabler to become the lifeblood of businesses in the digital era, so does the data used to support the implementation of these technological shifts. In order for the data to be an asset and not a liability, it is primordial to ensure that the data captured and maintained over time is accurate, traceable, reliable and current. However, very often, in order to complete...
In today's knowledge society data plays a central role. Large parts of an organization's critical data currently resides in databases which makes them an attractive target for cyber-attacker. The increasing digitization and interconnection of organizations combined with growing complexity of IT systems led to increased attack surface of most organizations. At the same time cyber-adversaries increased...
The State Council proposed to develop the strategic emerging industries and give them some support in terms of policy in 2010. Under the policy context, this paper selected the new energy industry as the research object. Based on the panel data of the new energy industry from 2010 to 2014, we found that government subsidies had a weak positive correlation with the capital structure but a significantly...
MD5(message digest algorithm) plays an important role in the digital signature, identity authentication and data encryption on account of its special ability of strong one-way encryption and irreversibility. Consequently, MD5 is widely used in login authentication module in which password is encrypted by MD5 algorithm. The login process is to compare the encrypted password value and the password stored...
It is possible to streamline corporate Environment, Health, and Safety (EH&S) duties through the use of workflow management technology. This approach requires a specification of workflow models that among others are composed of activities. A domain-specific workflow meta data model is proposed. The model consists of modelling concepts for the detection of failures of EH&S activities that already...
Relations between the users' expertise, complexity of tasks to be solved by knowledge-based organizations and mission of smart information systems, is a multi-dimensional structure that should provide the necessary conceptual framework of sustainable integrated smart development. The users of smart information systems face a variety of problems, such as: system access, data recovery, identifying and...
Broadcasting companies have started offering video-on-demand services to provide their viewers with various kinds of TV programs. Most of these services have a program retrieval system that helps users find the TV programs they would like to watch. The conventional systems retrieve TV programs by keyword matching of the query and the TV program summary. However, it is difficult for these systems to...
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough...
We are currently witnessing an explosion of advances in database technology, that cover all phases of database application design: non-functional requirements, conceptual modeling, logical modeling, deployment, physical design and exploitation. Researchers and engineers cooperate to integrate these advances in the database design. Their proposed solutions have to be confronted with similar studies...
This paper responds to requirement to improve the orientation between offered SW, as ITIL tools. There are really a lot of amount thus offered tools and very often leads to poor implementation of ITIL on the basis of incorrectly chosen tools. Main objective of this paper is to provide an overview about possibilities of choosing a suitable tool. Simultaneously, the research described in this paper...
Twitter is currently the most popular tool for social interaction and real-time information exchange. Outreach and importance of individual accounts is measured by the number of their followers. The aim of this paper is to investigate the applicability and usefulness of corpora containing textual and visual information for the purpose of machine observation of Twitter activities. The results in the...
The terms of logistic management in organizations and the use of information and telecommunication technologies in support of the management are inextricably intertwined. The fundamental benefit which business systems obtain by using logistics business information systems is the optimization of business processes. By using the logistics information systems the focus is shifted to those business processes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.