The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In an increasingly competitive environment the successful functioning of any business requires continuous improvement of services, expanding the range of products and range of services, standardization, and implementation of new busines ideas, establishment and dissemination of innovative solutions on the market. The implementation of such measures were carried out in a well-developed business projects...
This study demonstrates how to extract essential information from a set of financial and non-financial business indicators, leading to a better understanding of company performance. The use of Rough Set Theory and the Dominance principle associated with the probabilistic relationship between conditions and decisions in decision algorithms, is justified by the possibility of there being uncertain data...
IBM is one of the top companies in technology and business field, the aim of the research is to measure the awareness gauge of computer science students and graduates about some of the main IBM cloud solutions which are IBM Bluemix, and Watson Analytics in Saudi Arabia. The method used in the research to measure the awareness was publishing both online and paper surveys. The surveys got a total of...
In recent days Cloud services such as storage is more familiar to business and Individuals. This storage services are found as a problem to examiners and researchers in the field of forensics. There are many kind of storage services available in cloud and every service face a diverse issues in illegitimate action. The evidence identification, preservation, and collection are hard when dissimilar services...
The last two decades have witnessed an enormously rapid development of computer technologies which have undoubtedly affected all the fields of human activities, including education. In fact, computer science is one of the most evolving profile study programmes at technical universities nowadays. This article thus focuses on the description of the key content courses, curricula and degrees offered...
Crowd-sourcing is an amalgamation of outsourcing to the crowd. Being an extremely well flourishing paradigm crowd sourcing is soon to be the new Cloud computing because it has revolutionized the entire organizational setup. In this paper we not only show the circumstances that led to the modern day crowd-sourcing but also the concerns of security complications and privacy invasions that have arisen...
Workshop is one of the most important practical training processes in current colleges design education activities. At present, there are mainly two design workshop models for colleges: one is held by some colleges on the occasion of the academic meeting opportunity, and the other one is held by creative industrial parks or creative corporations. However, neither of them could be conducted in a normalized...
The dependency on cloud computing is expanding exponentially due to its operational and cost-effective benefits, allowing organizations to adopt solutions within very short periods without wasting enormous efforts and resources on implementation, instead focusing on more strategic objectives. Therefore, the process of understanding the effect of critical success factors (CSFs) which influences the...
Nowadays, PC is normally used in companies and information which contains secrets is often managed on PCs. Protection of the information is one of the important things in nowadays society. Virtual machine is one of the solutions of the problem since guest OS can be observed by hypervisor. However, in this case, sending secrets to outside cannot be prevented. Moreover, the observation sometimes decreases...
Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. through combining social engineering with technical hacking. The most relevant targets of APT are internal enterprise and production networks providing access...
To achieve sustainable business IT alignment (BITA) requires firms to create a circular organizational structure that enhance interactions of major stakeholders. We aim to explore the issue, and in our study of SAAB, we find three viable components to design the organizational structure so it can foster the accomplishment of sustainable BITA: (1) Strong top management initiates the management boards...
Recently cloud computing technology has gained its popularity on research and development for petroleum explorations. The advances of cloud computing offer flexibility of computing power and storage capacity, provides beneficial technology for this application domain. For instance, the cloud computing technology can effectively reduce the complexity of information collection and control time in the...
IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture...
This paper seeks to unpack the main reasons as to why there is a dramatic gender imbalance as females are underrepresented in the subject of computer science. Research was undertaken as a British University and focused upon the Faculty of Technology and Environment. The author intended to add to a broad range of literature surrounding the subject matter. The content emphasizes the daunting figures...
This research paper presents a secondary study aimed at outline the role of artificial intelligence in the management of financial crisis in a business or organization. The research explored empirical evidence and mathematical modelling to provide reliable data that was used to achieve the objectives of the study. The cases of financial crisis in the UK, US, and Boston Chicken Inc. were used in the...
This research aims to study the customers' preferences ranking of smartphone attributes and the price range preferences among Taiwanese customers. A modified AHP is conducted in order to meet the research objective. Smartphone features were selected from previous research to construct the hierarchy structure. The AHP scale between two criteria was simplified to 0 ∼ 1 in order to conduct an online...
With the further development of computer and network technologies, information security requirements in semiconductor field has been elevated to a new stage. Owing to the developments of advanced (e.g., 28nm and 14nm) technologies and the applications in high confidentiality arenas, more and more semiconductor design and manufacture companies realize the needs of tighter and more systematic controls...
To square large size complex numbers using n×n embedded multipliers as in using FPGAs, one needs to first partition the real and imaginary parts into segments of size less or equal to n and then to multiply the segments using these embedded multipliers. When the size of some segments is small, we show that three multiplications can be carried out using one n×n multiplier thus two n×n embedded multipliers...
This paper presents GitBull tool as a source code hosting web application tailored for the university ecosystem. GitBull introduces the ideology of open source software development. The main aim of GitBull is to fill the gap between how students work on software development projects in university and how software is being developed in the work environment. GitBull helps students use source code versioning...
In a deregulated electricity market, the most important purpose of each generating company (GENCO) is to find its optimal bid at each trading period. This paper proposes a new algorithm to determine optimal prices and quantities for the GENCO using a new context named dominating demand. The proposed method considers transmission constraints as a determining factor to construct optimal bids. The method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.