The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this paper is to explore the influence ways of eXtensible Business Reporting Language (XBRL) for the accounting information quality. The research finds three accounting information quality standards. They are respectively: general quality standards, conversion quality standards and enhance quality standards. According to the three standards, the research put forward three influence...
First, the paper studies three features of Alibaba Financial service product: based on credit evaluation, service to small and micro businesses, large-scale data processing technology based on cloud computing. Then, the paper compares E-commerce financial product with traditional financial product, analyzes its advantages, disadvantages and policy limits. Last, based on the applying of cloud computing,...
The Indian call center workers of a large computer manufacturer receive lower customer service ratings than their America counterparts despite superior repair outcomes. Indian call center managers are unable to bridge the gap between the customer service ratings of their Indian call centers and American call centers despite accent training and significantly more technical training. This study uses...
This paper presents a resource oriented requirement and service description method. Using the input and output resources of requirements and services as targets, it provides a dynamic service composition match-making problem model, gives the steps to construct feasible solutions of service composition match-making, and then converts the model into the dynamic programming model for optimization. An...
With massive penetration of mobile phones the tourism industry is adopting augmented technology (AR) and apps supported by smartphones to create and provide a memorable and exciting experience to tourists with fun, interaction and learning. In this paper we first introduce the basic AR technology and then review several typical and well-known AR engines/platforms developed by companies and research...
These days using Business Intelligence systems are widely popular in the world. Global financial crises make every enterprise to organize a new strategy to stay abreast of rapidly changes. Making decision under time pressure, unpredictable market demand, dramatic market changes, competitors and several other factors compel force senior managers to adopt Intelligence systems [1]. The approach of Business...
The 21st century has seen an enormous and almost sudden expansion in the use and types of technology. However, the cyber-age has also brought along with it new ways to wage attacks which has been a daunting task to thwart. This paper analyzes the number of high-impact security threats, vulnerabilities and alerts that have been reported by the United States Computer Emergency Readiness Team (US-CERT)...
In order to meet customer satisfaction in the future, the postal system of Mongolia has been increasingly facing new challenges to maintain its competitiveness. How exactly, should a given infrastructure/network and transportation strategy be changed to meet the upcoming challenges? Should the postal network throughout the country revised to accommodate introduction of new ICT- based technology? The...
This paper presents a rule-based expert system which is an extension of an ERP system of a fashion company. The fashion company needs a system for analyzing sales reports from mobile devices in many locations. An expert system is suggested, which can work with the company's ERP system. The expert system analyzes sales data and supports decision making strategy on the data. Rules in the proposed expert...
Intangible assets are more difficult to imitate than tangible assets, so competitive advantages are less obtained from the allocation of tangible assets, and more from intangible assets according to resource-based view (RBV). Patents, one of intangible assets, are important for corporate performance. This study explores the influences of the three aspects of patent profile — R&D capability, the...
The core intention of this paper is to observe the impact of effective configuration management (CM) usage in software development firms in Sri Lanka. Since there is large number of software development companies worldwide, the competition is high. In order to survive in the industry a company must have an effective CM process. Same rule can be applied for the Sri Lankan companies as well. Irrespective...
Virtual data storage represents a new business model which includes various concepts such as virtualization, design of distributed applications and management which enables flexible data access. These methods include using networks of remote servers instead of local servers and personal computers for storing, managing and editing data. Locations containing servers which execute applications and store...
This paper investigates the role of Parliamentary oversight over the Cyber Security health and Critical Information Infrastructure Protection (CIIP) of a country, with special reference to Developing Countries. The paper argues that such oversight is especially important in Developing Countries where citizens and companies are venturing into cyber space at great speed and are often not as aware of...
This paper describes the effort of creating a joint international graduate program in the area of semiconductor product engineering and power electronics. As a first step, a joint summer course for undergraduate students is implemented with the intention to create a larger interest in the program among the current undergraduate population at Texas Tech University and the University of Applied Sciences,...
By compiling computer program, the plane map of torpedo searching trajectory and the data of target spread probability density can be synthesized and a tridimensional map can be produced. The tridimensional map can illustrate not only the target spread probability density, but also the searching process and searching effect, and can be used to calculate the finding probability of specified searching...
In order to build an efficient basic information service system of job post resources based on Web mining, a rapid and efficient job post resource mining system should be established. The proposed system is based on Django development, My SQL is used as database. The Django is opted to build the proposed system framework which is a Python open source Web framework, it encourage the rapid development,...
This paper concentrates on cyber-pornography/obscenity, which encompasses online publications or distribution of sexually explicit material in breach of the English obscenity and indecency laws. After examining the major deficiencies of the attempts to restrict illegal pornographic representations, the authors aim to highlight that the debate regarding their availability in the Internet era neglects...
There has been increasing challenges in the effective structure of crucial information for effectual information security, personal privacy and data protection. Especially, when in an age of e-commerce, risks and threats from e-commerce transaction have been keeping rising up. Both new ways of cyber information security and security breach, which have affected people's life in some particular aspects,...
Employers, educational institutions and professional bodies agree that there is need to develop professionals who are highly skilled and ready to face the challenges of increased competition. More than ever industry need professionals who are responsive to economic, social, cultural, technical and environmental change and can work flexibly and intelligently across business contexts. Industry requires...
The combination of the Near Field Communication (NFC) technology and the Mobile Communication technology produced many convenient application modes, and take a new blueprint to the development of the smart city. It is the key problem to the development of smart city that establishing an efficient system to support the application of NFC. This paper puts forward a cloud architecture that based on NFC...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.