The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Contemporary human behaviours using the Internet and social media are an extension of behaviours seen long before the knowledge society. In particular, online identities and avatars, and the behaviours associated with these, have strong precedents in literature, in philosophy and in medieval carnival. The philosopher Mikhail Bakhtin has described these phenomena in detail. The growth in scale of such...
Multi-cloud APIs, such as jclouds, have been regarded as central players in achieving cloud portability and managing multiple clouds. Although their benefits, little is known about their performance. This is critical because applications can suffer performance degradation if the overhead created by a multi-cloud API is significantly larger than a platform specific API. Furthermore, if multi-cloud...
Business to Business (B2B) marketing aims at meeting the needs of other businesses instead of individual consumers. In B2B markets, the buying processes usually involve series of different marketing campaigns providing necessary information to multiple decision makers with different interests and motivations. The dynamic and complex nature of these processes imposes significant challenges to analyze...
In this paper, we define a new practical technology-driven Resource Constrained Scheduling Problem (t-RCPSP). We propose three approaches, applying constructive heuristics to tackle effectively the practical application of RCPSP. In the RCPSP formulation, the constraints are defined to design the tasks in the spaces constructed by non- and renewable resources, without violating the precedence relationships...
We consider a model of the opinion dynamics in a social network containing two centers of influence. Network agents can influence the opinions of each other. Opinion dynamics is described by a homogeneous Markov chain. We study the problem of the reachability of a consensus in the network. We examine the network with a special structure, i.e., the set of agents who are not the centers of influence...
Human behavior is predictable in principle: people are systematic in their everyday choices. This predictability can be used to plan events and infrastructure, both for the public good and for private gains. In this paper we investigate the largely unexplored relationship between the systematic behavior of a customer and its profitability for a retail company. We estimate a customer's behavioral entropy...
With technological developments and the appeal for rational use of electricity, new equipment was developed to promote a change in the relationship between consumers and power utility companies. The introduction of smart meters and the development and improvement of new sources of power generation near of energy consumption point, become the customer in an active agent in the electrical grid, where...
the development of internet comes with the other domain that is cyber-crime. The record and intelligently can be exposed to a user of illegal activity so that it has become important to make the technology reliable. Phishing techniques include domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform...
The growth of electricity demand in Argentina leads to the system expansion in generation, transmission and distribution networks in that country. Regarding distribution networks, a typical problem arises when a distribution company or a large customer must choose the location of its electrical substations; because this decision will determine the total cost of the installation. With the aim of minimize...
Yard Allocation Problem (YAP) is a frequently problem observed in port logistic operations, and consists in a temporary assignment of cargo containers, both export and import, to blocks storage located in the operation zone of seaports. The principal objective of YAP resolution is to improve the operations efficiency both terminal port as shipping companies that use the seaport, which allow to decrease...
This paper presents results of the analysis of a tourism information web-site (AmFostAcolo.ro) by using Complex Networks (CN) methods. The work accomplished here complements a previous paper, where we discussed data extraction and modelling into a complex network. Properties of the resulted network, communities and vertices are looked upon, in order to extract useful information and detect social...
In this paper, we develop a combinatorial testing technique for tree-structured test models. First, we generalize our previous test models for combinatorial testing based on and-xor trees with constraints limited to a syntactic subset of propositional logic, to allow for constraints in full propositional logic. We prove that the generalized test models are strictly more expressive than the limited...
Advanced globalization has led to information sharing among the overseas bases of companies. Technical information should be protected as they are the knowledge assets of companies. Therefore, companies establish general standards within enterprises, and it is necessary for all employees of an organization to act under their regulations and rules.
The exponential growth of text data on the World Wide Web as well as on databases off line created a critical need for efficient text summarizers that significantly reduce its size while maintaining its integrity. In this paper, we present a new multigraph-based text summarizer method. This method is unique in that it produces a multi-edge-irregular-graph that represents words occurrence in the sentences...
Email has become widely used in recent years bringing with it new problems. Although this event doesn't happen often, misdirected emails can bring out great information leakage. It is not easy to detect these misdirected emails from legitimate ones since they may be only distinguishable in the sender's perspective. Existing methods discover misdirected emails from user agent or gateway but are not...
Cloud computing represents a modern concept in the area of informatics, consisting of a distributed assembly of computational services, applications, access to information and data storage, in such a manner that the user does not need to know the placement and physical configuration of the systems supplying theses services. There is no assimilated Romanian translation for the term cloud computing...
This paper examines the overall development of professional identity of two English teachers in the same Chinese college employing the narrative analysis approach. The process of sharing two participants' teaching experiences is proved to be instrumental in combing and understanding their change in professional identity, to which four factors are found to be instrumental, namely teachers' personality,...
Bring your own device or BYOD is one of the technological trends that give direct impact for organizations, because of technology information adaptation in organizations. BYOD referred to an environment in which employees use personal technology such as laptops, smartphones, tablets, and even desktop PCs — to access corporate networks, applications, and data. Furthermore, basic motivation of this...
The availability of up-to-date information to people is an important requirement in many scenarios such as companies and civil institutions. In this regard, most establishments either use websites, emails or notice boards. However, in developing countries internet access is not available to many people on their mobile devices because of high costs. Moreover, having an electronic notice board requires...
With the focus on India-Israel Defense relations three modeling aspects - Multiple Regression on EV/EBTIDA multiple, Projections of share price by Monte Carlo Simulation and Rank Correlation (current year) are being utilized for the study. The result suggested that the contribution in multiple (based on MLR) is more from debt and intercept in the companies of Israel and USA. Indian companies are not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.