The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proliferation of web as an easily accessible information resource has led many corporations to gather competitor intelligence from the internet. While collection of such information is easy from internet, the collation and structuring of them for perusal of business decision makers, is a real trouble. Text clustering based topic identification techniques are expected to be very useful for such application...
Organisational security is strongly dependent on the organisational actors and their behaviour. Trust, as a phenomenon has strong influence on the perceived level of security and influences the employees' intent for whistleblowing or the readiness for change and learning. Trust as a relation however is defined in variety of ways by the relevant scientific literature. Hence, the primary aim of present...
Open education and distance learning are not new pedagogical innovations. However, through the introduction of Massive Open Online Courses (MOOC), they have recently attracted a great deal of attention among educational establishments. MOOCs can be considered a threat to small universities, but, on the other hand, they can also be a means of providing opportunities to develop their core activities...
The stock price is assumed to follow the geometric Brownian motion, the insider is assumed to know exactly the stock liquidation price on a certain day in the near future which will be lower than the current market price. The expected return of submitting a limit sell order is obtained based on the boundary crossing probability of the Brownian bridge. By comparing the expected return of submitting...
This paper describes a system-on-chip design module, suitable for post-graduate students of electronics and computer engineering and for PhD students as a training course; it covers both analogue and digital design skills and flows, with emphasis on the use of industry standard tools such as Cadence, Synopsys, and Mentor Graphics. The course is designed using the constructive alignment method; it...
This paper presents a Six Sigma approach for reducing operational downtime in service processes. The objective is to improve and bring betterment in the service processes for timely delivery of products and services. A case study of downtime reduction in service processes at a local company is used to illustrate the Six Sigma application. The company has been experiencing unexpected increase in downtime...
Abstract-Reasonable assurance of the reliability of financial report is one of the main objectives of internal control. Thus, high-quality internal control should help to improve the quality of corporate's financial report theoretically. In this paper, we examine the effect of internal control on earnings management, which was measured by real activity earnings management. Besides, we further test...
Perum Bulog is one of State Owned Enterprises (SOE) Indonesia, which was built with the purpose of organizing the logistics business with food quality and adequate for fulfilling lives of many people. Therefore, Perum Bulog must be able to manage the supply of main food commodities. However, there are some obstacles infrequently occur that cause inventory management becomes impaired. Weather and natural...
Using technology such as LBS, multimedia, mobile work flow to develop an electricity services investigation operating and evaluation system based on hand-held terminal. The system realizes functions such as the tasks inspection, work flow automatic generating, technical management standards retrieval query, business network locating and automatic matching profiles, site devices recognizing, data real-time...
Recently, as real-time Ethernet based protocols, especially EtherCAT have become more widely used in various fields such as automation systems and motion control, many studies on their design have been conducted. In this paper, we describe a method for the design of an EtherCAT slave module we developed and its application to a closed loop motor drive. Our EtherCAT slave module consists of the ARM...
Computer Diagrams are the communication mechanism among the different stakeholders of the software development lifecycle. While they are though at school, and promoted to be used by students for current and future projects, we still do not see full adoption in real life context. The literature reviewed points out some reasons related to this issue and propose some solutions, but still the problem...
Although there are standards for DFT, there are none for Design for Debug and Validation (DFD/DFV) of silicon in systems. Many semiconductor companies have standardized DFD/DFV architectures and features within their own products, however these are proprietary solutions. The panel will explore whether or not these solutions share common requirements and will debate whether the industry would benefit...
Power Line Communication (PLC) is one of the most promising contender for Advanced Metering Infrastructure (AMI). There are other contending communication technologies but PLC has an inherent advantage of using existing power lines that makes it an attractive choice. In this paper we present a detailed analysis of the tests conducted for investigating the feasibility of PLCs as part of AMI on the...
The development of SCM systems is a difficult activity, since it involves integrating critical business flows both within and among participating companies. The inherently difficulty of the problem is exacerbated by the business constraint (that almost invariably applies in the real world) that the investments made by individual companies throughout the years must be preserved. This maps to major...
A hospital equipment company that has large market must maintain their competitiveness both in terms of the quality, price, number of employees, timeliness of delivery, the expansion of marketing, technology development, et all. Problems that faced by hospital equipment companies in Indonesia are often running out of stock of one of the actuator motor parts of the electric bed product. Motor actuator...
Human Reliability Assessment (HRA) is used to analyze the inherent risk of human behavior or actions introducing errors into the operation of a system or process. Assessments identify where errors are most likely to arise and the potential risks involved if they do occur. Using the basic concepts of HRA, an evolving group of methodologies are used to meet various industry needs. airline industry mishaps,...
The increasing use of Enterprise Social Networks (ESN) has been resulting in important changes in individual work practices, and is subject of numerous studies. From both a theoretical and a practical perspective, there is a lack of well-founded knowledge on how the implementation of ESN can be supported best to trigger both learning and change processes in the enterprise. For such processes, managers...
Digital business ecosystems are becoming an increasingly popular concept as an open environment for modeling and building interoperable system integration. Business organizations have realized the importance of using standards as a cost-effective method for accelerating business process integration. Small and medium size enterprise (SME) participation in global trade is increasing, however, digital...
This paper proposes the novel methodology using Neuro-fuzzy for analysis the overall operations of 982 companies in Thailand. The propose method consists of two parts. The first part is the clustering process to define classes of dataset using fuzzy system. The second part is the prediction process using the Neuro-fuzzy system to create the classification model for predict the turnover score of each...
Requirements Engineering (RE) is a complex but essential phase of any project. Most of the time, final result of development process depends on quality of requirements obtained from stakeholders. Nevertheless, requirements engineering is not something universal, unchangeable and applicable for any type of project. Every technology implies applications appropriate to its requirements engineering activities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.