The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years due to increased competition between companies in the services sector, predict churn customer in order to retain customers is so important. The impact of brand loyalty and customer churn in an organization as well as the difficulty of attracting a new customer per lost customer is very painful for organizations. Obtaining a predictive model customer behaviour to plan for and deal with...
Knowledge of a public housing project is very precious resources for other projects. Due to the public housing projects built by different enterprises, enterprises are not willing to transfer knowledge. To solve this problem, this paper uses the method of game theory to analyze the enterprises' knowledge transfer strategy choice, then analyze the dynamic equilibrium point and evolutionary path. Based...
Strengthening the party organization construction in college is the objective requirement for development of the reform and opening-up policy and socialist market economy, and is an important guarantee to construct the harmonious campus. The investigation shows that, the college students' party organization plays a certain role in the campus construction and management and gets the positive achievements,...
The long-term goal of this research is to accommodate the students' perceptions of the influence of the lecturer's leadership and the organizational culture to the students' SPIRIT character development. The method that be used in this research is by distributing questionnaires to the respondents and the data obtained were processed quantitatively with path analysis. The results showed that the leadership...
This article describes the Information Process Maturity Model, which was modeled after the software industry's Capability Maturity Model, to guide managers of information-development groups in assessing and improving the work of their organizations. The model describes five levels of maturity: ad-hoc, rudimentary, organized and repeatable, managed and sustainable, and optimizing. The model currently...
This paper presents a system that uses machine learning to recognize military vehicles in social media images. To do so, the system draws on recent advances in applying deep neural networks to computer vision tasks, while also making extensive use of openly available libraries, models and data. Training a vehicle recognition system over three classes, the paper reports on two experiments that use...
Organizations profoundly rely on contemporary information systems as they store essential business and resources data. Security of these information systems is critically handled by applying both technical and behavioral controls. However, security culture in certain organizations such as Higher Education Institutions (HEI) is questionable due to the lax attitude of employees towards the institutional...
Process Oriented Training and Learning can be applied in two different approaches: (a) processes describing the methodology of training and learning as well as (b) processes describing the organizational context that need to be learned. This paper introduces the results of the EU project Learn PAd that developed prototypes of modelling tools enabling business processes for learning and training. Flexibility...
Project Management (PM) encompasses activities related to the successful accomplishment of a group of goals. According to SR 13465:2007, PM is all about planning, programming, monitoring and controlling the fulfilment of the activities in the project. In addition, PM is about managing all the resources involved or required for completing the project within established timeframe, budget, scope and...
The organization can also be seen as an instrument that managers have at their disposal to ensure the achievement of some goals. History is full of examples of managers who have failed in their attempt to change the organization to meet the demands of the existing situation. The present article aims at a study on the management of the educational organization, the role of the manager within the school...
As system of systems (SoS) models become increasingly complex and interconnected a new approach is needed to capture the effects of humans within the SoS. Many real-life events have shown the detrimental outcomes of failing to account for humans in the loop. This research introduces a novel and cross-disciplinary methodology for modeling humans interacting with technologies to perform tasks within...
We present in this paper a new approach of supervised self organizing map (SOM). We added a supervised perceptron layer to the classical SOM approach. This combination allows the classification of new patterns by taking into account all the map prototypes without changing the SOM organization. We also propose to associate two reject options to our supervised SOM. This allows to improve the results...
This study firstly points out the essence of knowledge acquirement can be accounted for learners' process of decoding and encoding for knowledge from the perspective of knowledge learning. This process includes the encoding and decoding of knowledge transfer process from the perspective of communication, and knowledge information in different storage forms from the perspective of knowledge management...
Open experimental teaching reform has been carried out for 6 years in Huazhong Agricultural University, in which the experimental items can be set up scientifically and rationally according to different majors. Because the experimental time, the experimental space and the experimental contents are completely open to the whole college students, the experiments can be reserved through the online experimental...
Cybersecurity is currently one of the hottest topics for millions of organizations around the world. They depend on information technology to conduct their business processes that are exposed to wide range of security threats, and Portuguese organizations are no exception. How are these organizations taking a holistic approach to allow them to face and handle those threats with confidence? Are the...
During the past two decades, developing and improving intelligent optimization algorithms (IOAs) has been one of the hottest research topics in evolutionary computing. Most of the IOAs are inspired by natural phenomena, and shown to be highly effective in solving complex optimization problems. In this study, we propose a new population based metaheuristic algorithm named Team Effectiveness Based Optimization...
At the position of senior leader for the organization and Information Systems Function management, we find the Information Systems Manager. Given the nature of the activities that he needs to accomplish, his action influences unfailingly the development of the organization in which he is engaged with. Thus, it is important to evaluate the potential performance of the candidates chosen to occupy that...
This paper describes how a new Erasmus Plus project, PILAR, (Platform Integration of Laboratories based on the Architecture of visiR), is being developed and how the startup of the partnership and the project is reinforcing the VISIR (Virtual Instrument Systems in Reality) network and the Special Interest Group of VISIR under the Global Online Laboratory Consortium (GOLC) of the International Association...
This practice paper presents how a software engineering organization spread across three countries successfully transferred the knowledge of a few identified roles for a large mission-critical software system that had to conform to regulatory requirements. Multiple releases of the system have been delivered to customers over the 15 years it has been in the market. Each release of the product had a...
Software development teams apply security practices to prevent vulnerabilities in the software they ship. However, vulnerabilities can be difficult to find, and security practices take time and effort. Stakeholders can better guide software development if they have empirical data on how security practices are applied by development teams. The goal of this paper is to inform managers and developers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.