The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The author focuses on the issue of IT security for micro enterprises, specifically enterprises carrying out manual work considering German law and industrial requirements, with the aim of developing a self-implemented IT security assessment designed to identify threats and aid in increasing their security level. This is necessary because micro-enterprises contributing to the national economy have...
Spreadsheets serve as a basis for decision-making processes in many companies and bugs in spreadsheets can therefore represent a considerable risk to businesses. Systematic tests can help to locate such bugs, but providing test cases can be cumbersome and complex for large real-world spreadsheets. To make the specification of test cases easier, we propose to split spreadsheets into smaller logically...
This article aims to compare the educational effect of the Manga Case Method in offline and online environments. The Manga Case Method is an educational tool described by Manga. In this study, we used a manga case designed to improve learners' literacy when using social media in a company. We conducted experiments of the Manga Case Method in both offline and online environments. The results show that...
Implementing a successful warehouse management system from scratch contains many challenges of different nature. The most important aspect is the financial status of the company that is implementing the system. How many resources is the company willing to spend is always a difficult dilemma. The second important issue is the actual usefulness of the developed solution. If the system cannot be implemented...
In the paper, we consider the features of the new revolutionary transportation technology (the Hyperloop technology) proposed in the USA and associated with the use of ultra-high-speed vacuum trains moving inside tubes with a reduced internal air pressure. In doing so, we focus on Hyperloop cargo systems for transporting standard 20-foot containers. Now Russia has plans to build such a transport system...
In modern industrial control, it is significant to achieve interoperability of state data and control data at field level and service management layer. Therefore, the demand for data exchange and sharing is getting higher and higher. This paper presents a research of the common mainstream network protocols on industrial network architecture of Northbound Interface, then it makes a comprehensive analysis...
Privacy laws and international privacy standards require that companies collect only the data they have a stated purpose for, called collection limitation. Furthermore, these regimes prescribe that companies will not use data for purposes other than the purposes for which they were collected, called use limitation, except for legal purposes and when the user provides consent. To help companies write...
This paper describes how the use of an impact assessment reveals unknown information to project teams who conduct community engagement engineering projects in rural and distant villages. The paper depicts a “tried and tested” case study to describe how the impact assessment is done and the information revealed. The second phase of the Gwakwani project included the installation of off-grid solar home...
Today is precious is the presence of the head of a developed emotional intelligence because the head is necessary to capture the mood of subordinates and employees. This article briefly outlines the concept of the Professional Project Manager — the person who unites the main groups of professional competences and has a highly developed level of emotional intelligence. These competences are divided...
The state-of-the art education system should be in time for the knowledge-intensive technologies, that are developing with a high pace and be as mobile and effective as possible. The development of science-intensive technologies is developing with a tremendous pace, so the knowledge obtained in the university is quickly becoming obsolete, therefore the modernization of equipment should go in synchronism...
The Ecuadorian electricity sector is a strategic area of the country, whose general objective is to Generate, Transmit, Distribute and Commercialize electrical energy. In 2009, the Ministry of Electricity and Renewable Energy (MEER) and the Electric Utilities of Ecuador signed an agreement for institutional cooperation to strengthen the electricity distribution sector with the objective of achieving...
The contemporary market is in demand of more power with expenditure of as less amount of energy as possible. Hence the scientists nowadays have shifted their concentration to design processes to meet this need. In this paper, the use of HP PC LEDs have been proved to be more efficient and environment friendly and have better scope of improvement in future than other lighting sources. The paper also...
In 2015, Eskom introduced fundamental changes to the Demand Side Management (DSM) energy services company (ESCo) model. This included a mandatory three-year sustainability period for all DSM projects. The funding available to ESCos was reduced and the funding structure altered to be performance based over the three years. Thus, the focus of this paper was to develop a sustainable project strategy...
The results of big data's analysis used in the audit of financial statements allowed revealing the occurrence of accounting misstatements, herewith full and timely implementation of audit procedures did not provide an opportunity to determine these misstatements.
Because that the taxi industry generally appears a series of problems such as “difficult to take a taxi”, “high part money”, and the consumption demand presents the multi-level diversification trend as people income growth as well, the tailored taxi arose, remitting the contradiction of supply and demand of taxi service problems and providing people with a variety of service. But in the meantime,...
The objective of the work leans on the development of an agent-based engine, part of a Service Oriented Architecture, that provides the mechanisms to receive, interpret and execute extensions of products/processes (as software). A novel methodology that uses Service Composition paradigm as base for development and specification of features used by the acting services, along with the use of specific...
In smart grid, how to establish a communication paradigm among the customers, smart meter and utilities is an important challenge, which requires access control, data encryption, and authentication to ensure message integrity and confidentiality. In this paper, we present a communication architecture based on Attribute Based Cryptosystem to secure the communications in smart grids. In this paper,...
This paper proposes a route-planning method for an environment in which self-driving vehicles are widely used. Such vehicles will plan their route based on the passenger's condition, which is recognized using a biological sensor. Various carmakers and IT companies have recently developed various technologies for self-driving vehicles, Google, Inc. being one. In this paper, we focus on a technique...
Spatial co-location pattern mining is employed to identify a group of spatial types, the instances of which are frequently located in spatial proximity. Current co-location mining methods have two limitations: (1) it is difficult to set an appropriate proximity threshold to identify close instances in an unknown region and (2) those methods neglect the effects of distance values between instances...
Industrial systems are more and more dominated by software. In addition, this software is present across several compute domains, from decentralized edge to centralized datacenters and clouds. While the productivity of application lifecycle management has tremendously improved in the area of cloud computing, there is no homogeneous and seamless environment to build, deploy and operate the software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.