The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Advanced statistics have proved to be a crucial tool for basketball coaches in order to improve training skills. Indeed, the performance of the team can be further optimized by studying the behaviour of players under certain conditions. In the United States of America, companies such as STATS or Second Spectrum use a complex multi-camera setup to deliver advanced statistics to all NBA teams, but the...
Extracting stop purpose information from raw GPS data is a crucial task in most location-aware applications. With the continuous growth of GPS data collected from mobile devices, this task is becoming more and more interesting; a lot of recent research has focused on pedestrians (mobile phones) data, while the commercial vehicles sector is almost unexplored. In this paper we target the problem of...
Trading strategies basing on both financial analysis and machine learning techniques are becoming increasingly popular due to their ability to capture micro market price movements and leverage big data. An important class of works are focusing on exploiting the structural relationships between companies for accurate stock price prediction. In this paper we develop an algorithm for learning the parameters...
The worldwide market for luxury and fashion goods is dominated today by a handful of multinational corporations (MNCs). The way MNCs access foreign markets and organize distribution, however, remains unclear. In this paper, based on an analysis of foreign trade statistics, we take the example of watches and provide a model to highlight the most important flows as well as regional hubs in this global...
According to a report online [34], more than 200 million unique users search for jobs online every month. This incredibly large and fast growing demand has enticed software giants such as Google and Facebook to enter this space, which was previously dominated by companies such as LinkedIn, Indeed, Dice and CareerBuilder. Recently, Google released their “AIpowered Jobs Search Engine”, “Google For Jobs”...
When analyzing competition in telecommunication markets it is fundamental to take into account their specific characteristics. Moreover, it is important to understand the temporal evolution of competition as a result of multiple contextual factors. For these reasons the present study analyzes competition in mobile telecommunications, measured through the Lerner Index, and explains its evolution through...
Background: In Software Engineering (SE) the term maturity is often linked to the work process and product quality. In many cases, team maturity is seen as a backdrop to the process of SE, and sometimes as something that is known to exist, but which cannot be understood, neither measured accurately nor even dimension its value. Aim: In this article, we seek to understand the concept of mature teams...
Since China launched the national silk road economic belt and formulate action plans, Xinjiang as the core of the land of the silk road economic belt looks remarkably, build Urumqi as the central Asia regional financial center. This is of great significance to the development of the west and to the outside world. In this paper, by analyzing the financial current situation of Urumqi, and will be in...
Background: Understanding and controlling the impact of change decides about the success or failure of evolving products. The problem magnifies for start-ups operating with limited resources. Their usual focus is on Minimum Viable Product (MVP's) providing specialized functionality, thus have little expense available for handling changes. Aims: Change Impact Analysis (CIA) refers to the identification...
Insurance plays a key role in the financial industry, and it is also of great importance for people's socio-economic life. Therefore, in this paper, we demonstrate on the problem of analyzing the operating performance of insurance companies, and it is crucial for modern financial industry development. Firstly, we design an index system for evaluating operating performance of insurance companies, which...
Background: In the last two decades Technical Debt (TD) has received a considerable amount of attention from software engineering research and practice. Recently, a small group of studies suggests that, in addition to its technical and economic consequences, TD can affect developers' psychological states and morale. However, until now there has been a lack of empirical research clarifying such influences...
Background. Process mining is a technique to build process models from "execution logs" (i.e., events triggered by the execution of a process). State-of-the-art tools can provide process managers with different graphical representations of such models. Managers use these models to compare them with an ideal process model or to support process improvement. They typically select the representation...
Social media serves as a unified platform for users to express their thoughts on subjects ranging from their daily lives to their opinion on consumer brands and products. These users wield an enormous influence in shaping the opinions of other consumers and influence brand perception, brand loyalty and brand advocacy. In this paper, we analyze the opinion of 19M Twitter users towards 62 popular industries,...
Recommender systems take inputs from user history, use an internal ranking algorithm to generate results and possibly optimize this ranking based on feedback. However, often the recommender system is unaware of the actual intent of the user and simply provides recommendations dynamically without properly understanding the thought process of the user. An intelligent recommender system is not only useful...
With the increasing concentrations of the air pollution and reduction of fossil fuels the electric buses with carbon-reduction and energy-conservation technology have been extensively encouraged. The battery technology as the significant determinant will directly affect the practical utilization of the buses. The Lithium Titanium Oxide (LTO) battery is becoming increasingly popular as the battery...
Background: Online forums are instruments through which information or problems are shared and discussed, including expressions of interests and intentions. Objective: In this paper, we present ongoing work aimed at analyzing the content of forum posts of a hybrid open source company that offers both free and commercial licenses, in order to help its community manager gain improved understanding of...
Mistaking versatility for universal skills, some companies tend to categorize all software engineers the same not knowing a difference exists. For example, a company may select one of many software engineers to complete a task, later finding that the engineer's skills and style do not match those needed to successfully complete that task. This can result in delayed task completion and demonstrates...
The Internet of Things (IoT) is a trend of connecting physical objects to the Internet. IoT applications running together with interconnected objects enable the vision of gathering data and based on that act in physical environments with minimal human intervention. Maintaining such IoT applications needs to incorporate different software and hardware components to build up the network of things that...
Traditionally the evaluation and supervision of peak shaving operation of thermal power units depend on the simple variable of the minimum achievable load. This method didn't consider the rate of load change and the startup/shutdown time of units, and ignored the safety, emission and economy properties of the units. In addition, the peak shaving operation data of the units were acquired by means of...
Most companies currently carry out security countermeasures against maximum-security risks based on countermeasure cost. However, maximum security is costly and low availability. If we can evaluate and recognize risk dynamically, we can change the security level according to that risk. Therefore, it is possible to lower the security level than maximum security. As a result, availability increases...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.