The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a novel approach for detecting malicious user activity in databases. Specifically, we propose a new machine learning algorithm for detecting attacks such as a stolen user account or illegal use by a user. Our algorithm relies on two main components that examine the consistency of a user's activity and compare it with activity patterns learned from past access. The first component tests...
The main problem of rule-based information extraction technique is that the extraction rules tend to be specifically designed for specific information or document structure; hence it cannot be directly used in another without some proper modifications. Semi-structured documents like tables present another challenge to information extraction; since there are no standards on how to design it, the structure...
Transport companies are probably one of the greatest sources of pollution nowadays. Perhaps because these companies would like to improve this situation, or perhaps because they simply would like to reduce the petrol they consume, they are more than ever deploying plans in order to increase the efficiency of their fleets. One of the easiest and cheapest ways to achieve this is to teach their drivers...
It is possible to streamline corporate Environment, Health, and Safety (EH&S) duties through the use of workflow management technology. This approach requires a specification of workflow models that among others are composed of activities. A domain-specific workflow meta data model is proposed. The model consists of modelling concepts for the detection of failures of EH&S activities that already...
Lack of text data is one of the main issues encountered by Malay speech researchers. Currently, there are few established Malay text corpora to aid in their research. Text corpora are essential due to its ability to provide empirical data for researchers in the field of linguistics and are useful to construct word lists for speech intelligibility test, speech analysis across genders and automatic...
This paper proposes Graph Multi -Dimensional Data Model (GMDDM) of a Data Warehouse and conversion of its equivalent Object - Oriented Schema. Data warehouse representation is complex itself. Thus the pictorial representation of the Data Warehouse should increase the understandability to the warehouse designer. The warehouse representation through graph G [V, E] may be an effective approach that reduces...
Performance measurement is a knowledge intensive business process and performance measurement systems (PMS) are appropriate tools to collect relevant performance information. Though, the application of many PMS fails. Therefore, there is a vivid debate in the literature about the right design, implementation, and use of PMS. Other contributions describe specific obstacles in different contexts, but...
Follow-the-Sun (FTS) is a strategy in Global Software Development (GSD) focusing on software development twenty-four hours, seven days per week with physically distributed teams. Many companies have tried to implement FTS strategy, but have abandoned it after some point because of the difficulty to put it into practice. Thus, this article aims to presents a research plan for developing a software...
Successful industrial goods-delivering companies are always looking for ways to develop and grow their business. A strong present trend is to expand the traditionally tangible offering by integrating intangible offerings i.e. services. In academia the term industrial product-service systems (IPS2) are being used to describe this paradigm shift. However, a systematic review of the IPS2 literature is...
Businesses are increasingly engaging in inter-organizational collaboration. At the same time, assessing the benefits and the success of an inter-organizational system is still a challenge. Academia and businesses alike struggle with insufficient assessment methods and benefits measurement processes. Our research applies and extends a recently developed framework for the assessment of expected and...
Business analysis helps companies in making decisions, and this involves doing evaluations and comparisons on business data. Our research focus on the development of a question answering (QA) system capable of interpreting and answering comparative and evaluative questions under the domain of business intelligence (BI). The paper describes the architecture, the approaches, the question and predicate...
In service-based systems, service evolution might raise critical communication issues since the client cannot be aware of the changes that have occurred on the black-box services side. In this paper, we propose an automated process to adapt the client to the changes that have occurred. Our approach relies on a compatibility measuring method, and changes the client interface to ensure the system compatibility...
Content usage statistics from superdistribution users have great commercial values since they can be used for any number of purposes including marketing, accounting, and/or fraud prevention. However tracking content usage under the superdistribution model poses a great challenge since most content users have no explicit pre-established relationship with the content provider. In this paper, we present...
BBSs (Bulletin Board Systems) and Social Network Services (SNS) have been increasing in recenter years. In such systems, users can easily upload and share their own information via personal computers, and also cellular phones. However some information, such as adult content, is not appropriate for all users, notably children. Many SNS and BBS providing companies have been trying to monitor and check...
Web sites are acknowledged as essential to the marketing of brick-and-mortar companies in the maturing e-commerce marketplace. Knowledge of how to position these companies' Websites effectively is thus regarded as essential by scholars and practitioners. By investigating consumer cross-channel behavior, the current study was designed to reveal determinants of consumers' e-loyalty. Two hundred and...
Recent research has shown that including context in a recommender system may improve its performance. The context-based recommendation approaches are classified as pre-filtering, post-filtering and contextual modeling. Moreover, in real e-commerce applications, collecting ratings may be quite difficult. It is possible to use purchasing frequencies instead of ratings, but little research has been done...
ITIL (information technology infrastructure library) is the most widely used IT framework in organizations. This de-facto standard is a service-based IT-framework that aims to improve the quality of organizational services. The core of this framework is configuration management that includes configuration management data base (CMDB) to record, update and trace all assessed activities and information...
Duplicate records are a major problem and duplicate invoices are a specific example of this. The detection of duplicate invoices is a critical issue for business since duplicate invoices can result in a company paying more than once for goods or services ordered. Past experience has shown that generic duplicate record detection techniques are not very useful when applied to invoices: the rate of false...
In this paper, we propose a characterization of the main classes contained in the database of the system K-DSS and related to the domain of identification of the crucial knowledge for which a capitalizing operation is required. We exploit ontological categories existing in the literature to define the notions of knowledge, actor, support and criteria of knowledge vulnerability. The objective is to...
This paper describes the IDEF1 information modeling technique, its key concepts, modeling approach, rules, and graphical notation. A step-by-step example is presented, which illustrates use of IDEFl as a conceptual database development tool. The example demonstrates the four phases of IDEFl model development, concentrating on the modeling process and its application to a typical information modeling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.