Academic literature on the topic 'Cloud POS system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud POS system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud POS system"

1

Yang, Z. H., Y. S. Zhang, T. Zheng, W. B. Lai, Z. R. Zou, and B. Zou. "CO-REGISTRATION AIRBORNE LIDAR POINT CLOUD DATA AND SYNCHRONOUS DIGITAL IMAGE REGISTRATION BASED ON COMBINED ADJUSTMENT." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B1 (June 3, 2016): 259–64. http://dx.doi.org/10.5194/isprsarchives-xli-b1-259-2016.

Full text
Abstract:
Aim at the problem of co-registration airborne laser point cloud data with the synchronous digital image, this paper proposed a registration method based on combined adjustment. By integrating tie point, point cloud data with elevation constraint pseudo observations, using the principle of least-squares adjustment to solve the corrections of exterior orientation elements of each image, high-precision registration results can be obtained. In order to ensure the reliability of the tie point, and the effectiveness of pseudo observations, this paper proposed a point cloud data constrain SIFT matching and optimizing method, can ensure that the tie points are located on flat terrain area. Experiments with the airborne laser point cloud data and its synchronous digital image, there are about 43 pixels error in image space using the original POS data. If only considering the bore-sight of POS system, there are still 1.3 pixels error in image space. The proposed method regards the corrections of the exterior orientation elements of each image as unknowns and the errors are reduced to 0.15 pixels.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Z. H., Y. S. Zhang, T. Zheng, W. B. Lai, Z. R. Zou, and B. Zou. "CO-REGISTRATION AIRBORNE LIDAR POINT CLOUD DATA AND SYNCHRONOUS DIGITAL IMAGE REGISTRATION BASED ON COMBINED ADJUSTMENT." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B1 (June 3, 2016): 259–64. http://dx.doi.org/10.5194/isprs-archives-xli-b1-259-2016.

Full text
Abstract:
Aim at the problem of co-registration airborne laser point cloud data with the synchronous digital image, this paper proposed a registration method based on combined adjustment. By integrating tie point, point cloud data with elevation constraint pseudo observations, using the principle of least-squares adjustment to solve the corrections of exterior orientation elements of each image, high-precision registration results can be obtained. In order to ensure the reliability of the tie point, and the effectiveness of pseudo observations, this paper proposed a point cloud data constrain SIFT matching and optimizing method, can ensure that the tie points are located on flat terrain area. Experiments with the airborne laser point cloud data and its synchronous digital image, there are about 43 pixels error in image space using the original POS data. If only considering the bore-sight of POS system, there are still 1.3 pixels error in image space. The proposed method regards the corrections of the exterior orientation elements of each image as unknowns and the errors are reduced to 0.15 pixels.
APA, Harvard, Vancouver, ISO, and other styles
3

Ojugo, Arnold Adimabua, and Oghenevwede Debby Otakore. "Intelligent Peer-To-Peer Banking Framework: Advancing The Frontiers of Agent Banking For Financial Inclusion In Nigeria Via Smartphones." Quantitative Economics and Management Studies 1, no. 5 (August 22, 2020): 300–311. http://dx.doi.org/10.35877/454ri.qems140.

Full text
Abstract:
The advent of the retail point of sale (POS) system as a critical component of the traditional retail infrastructure seeks to advance client payment-ease for goods and services rendered by vendors as well as the effective collection of funds by the vendor. It also aids the vendor to collect in advance monies that the client may wish to spend later on goods and services. Thus, the POS has since become a necessity in modern retail stores as its increased usage has seen a transformation from a single machine to a cloud and smart platforms. Our study seeks to model a conceptual framework for decentralized POS as adapted to smartphones. This will enhance cashless transaction irrespective of a customer’s location globally and locally. Built around the block-chain technology, it seeks to minimize challenge(s) of time, installation requirements incurred with the adoption of automatic teller machine (ATM), location and citing of agent-banking in a rural area with low tele- and tech-penetration.
APA, Harvard, Vancouver, ISO, and other styles
4

Ojugo, Arnold Adimabua, and Oghenevwede Debby Otakore. "Intelligent Peer-To-Peer Banking Framework: Advancing The Frontiers of Agent Banking For Financial Inclusion In Nigeria Via Smartphones." Quantitative Economics and Management Studies 1, no. 5 (August 22, 2020): 300–311. http://dx.doi.org/10.35877/454ri.qems140.

Full text
Abstract:
The advent of the retail point of sale (POS) system as a critical component of the traditional retail infrastructure seeks to advance client payment-ease for goods and services rendered by vendors as well as the effective collection of funds by the vendor. It also aids the vendor to collect in advance monies that the client may wish to spend later on goods and services. Thus, the POS has since become a necessity in modern retail stores as its increased usage has seen a transformation from a single machine to a cloud and smart platforms. Our study seeks to model a conceptual framework for decentralized POS as adapted to smartphones. This will enhance cashless transaction irrespective of a customer’s location globally and locally. Built around the block-chain technology, it seeks to minimize challenge(s) of time, installation requirements incurred with the adoption of automatic teller machine (ATM), location and citing of agent-banking in a rural area with low tele- and tech-penetration.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Qian, Chao Tang, Cuijun Dong, Qingzhou Mao, Fei Tang, Jianping Chen, Haiqian Hou, and Yonggang Xiong. "Absolute Positioning and Orientation of MLSS in a Subway Tunnel Based on Sparse Point-Assisted DR." Sensors 20, no. 3 (January 23, 2020): 645. http://dx.doi.org/10.3390/s20030645.

Full text
Abstract:
When performing the inspection of subway tunnels, there is an immense amount of data to be collected and the time available for inspection is short; however, the requirement for inspection accuracy is high. In this study, a mobile laser scanning system (MLSS) was used for the inspection of subway tunnels, and the key technology of the positioning and orientation system (POS) was investigated. We utilized the inertial measurement unit (IMU) and the odometer as the core sensors of the POS. The initial attitude of the MLSS was obtained by using a static initial alignment method. Considering that there is no global navigation satellite system (GNSS) signal in a subway, the forward and backward dead reckoning (DR) algorithm was used to calculate the positions and attitudes of the MLSS from any starting point in two directions. While the MLSS passed by the control points distributed on both sides of the track, the local coordinates of the control points were transmitted to the center of the MLSS by using the ranging information of the laser scanner. Then, a four-parameter transformation method was used to correct the error of the POS and transform the 3-D state information of the MLSS from a navigation coordinate system (NCS) to a local coordinate system (LCS). This method can completely eliminate a MLSS’s dependence on GNSS signals, and the obtained positioning and attitude information can be used for point cloud data fusion to directly obtain the coordinates in the LCS. In a tunnel of the Beijing–Zhangjiakou high-speed railway, when the distance interval of the control points used for correction was 120 m, the accuracy of the 3-D coordinates of the point clouds was 8 mm, and the experiment also showed that it takes less than 4 h to complete all the inspection work for a 5–6 km long tunnel. Further, the results from the inspection work of Wuhan subway lines showed that when the distance intervals of the control points used for correction were 60 m, 120 m, 240 m, and 480 m, the accuracies of the 3-D coordinates of the point clouds in the local coordinate system were 4 mm, 6 mm, 7 mm, and 8 mm, respectively.
APA, Harvard, Vancouver, ISO, and other styles
6

Muryani, Ayu Sri, and Muqorobin Muqorobin. "Decision Support System Using Cloud-Based Moka Pos Application To Easy In Input In Orange Carwash Blulukan Flash N0.110 Colomadu." International Journal of Computer and Information System (IJCIS) 1, no. 3 (November 30, 2020): 66–69. http://dx.doi.org/10.29040/ijcis.v1i3.20.

Full text
Abstract:
Orange Carwash is a car wash service business that has been running in 2018, Orange Car. The wash address that I studied is located at Jalan Adi Sucipto no.110 Blulukan Colomadu In running a car wash service business, Orange Carwash tries to provide services to customers, regarding inputting types of washing products, member entry, express washing promos, and payment transaction methods. The system used is still classified as manual. For the purpose of this research, it really helps companies in terms of promoting and introducing products to car wash consumers with a computerized system using the cloud-based Moka Pos application. The method in this research is through observation, interviews, documentation, and heritage studies (looking for references from books or journals). The system design is made with context diagrams, HIPO, DAD, input output design, hardware requirements analysis, software requirements analysis. By using online input, the cashier will find it easier to group the washing type product data, as well as compile accurate and efficient reports. The final result of designing an online car wash service information system, using the Moka Pos application, in the form of sales report recap data and the number of types of washing products, classification of types of washing products, and the washer name of each cashier, which will be designed by the car wash. Oranger Carwash.
APA, Harvard, Vancouver, ISO, and other styles
7

Muthu Selvam, M., K. Mariappan, G. V. Sriramakrishnan, and G. Suseendran. "DeyPoS-homomorphism authenticated tree (HAT) for multi-user locality in cloud storage." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 141. http://dx.doi.org/10.14419/ijet.v7i2.31.13427.

Full text
Abstract:
The technology PoS (Dynamic Proof of storage) is a cryptographic primordial allows a abuser to test the reliability of subcontracted documents and effectively replace documents in the cloud storage system. Despite the fact that investigators have projected several dynamic proofs of storage designs in distinct client settings, hassle in the multi-client settings have now not been examined adequately. In sensible multi-client cloud server storage space wishes a cozy client part cross client system of deduplication, it permits client toward bypass importing manner as well as gain instantly the rights of the files, while different vendors of the same files hold uploaded to the cloud system server. In the direction of familiarity not a bit of prevailing dynamic Proof of Storages can guide this system. This research article we are bring the model of dynamic proof of storage in deduplicatable system and endorse a green creation known as Dedupicatable Dynamic Proof of Storage (DeyPoS), on the way to attain DeyPoS and comfy reduplication concurrently in cross client. Taking into account confront of formation assortment and personal blot creation make use of a new tool called HAT (Homomorphic Authenticated Tree). Also verify precautions of creation and the hypothetical, investigational outcomes shows that the creation is green in use.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Jian Jun. "Compensating Impact of the Roll Variation of Airborne Platform on Laser Point Cloud from Airborne LiDAR." Applied Mechanics and Materials 229-231 (November 2012): 2042–46. http://dx.doi.org/10.4028/www.scientific.net/amm.229-231.2042.

Full text
Abstract:
The roll variation of airborne platform has significant impact on the coverage area and point density of the laser point cloud obtained by airborne LiDAR. Thus, it is of practical significance to compensate the impact of roll variation. In this paper, a compensation device was designed firstly, including the mechanical structure and control system, to compensate the impact of roll variation on the laser point cloud. Then, the compensation principle of the airborne LiDAR with the designed compensation device was analyzed. Finally, the actual working procedure of the airborne LiDAR with the designed compensation device was simulated, in which the measurement errors of the position and orientation system (POS), as well as the measurement errors and control errors of the designed compensation device has been considered. The experimental results show that the designed compensation device is effective to compensate the impact of the roll variation.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Chen, Zhang, and Zheng. "A Hovercraft-Borne LiDAR and a Comprehensive Filtering Method for the Topographic Survey of Mudflats." Remote Sensing 11, no. 14 (July 10, 2019): 1646. http://dx.doi.org/10.3390/rs11141646.

Full text
Abstract:
To obtain the mudflat topography when existing measuring systems and data processing methods are impracticable under special conditions, this paper presents a hovercraft-borne LiDAR (light detection and ranging) system and a novel comprehensive filtering method. The system is based on a hovercraft and equipped with a laser scanner and a POS (position and orientation system). The filtering method firstly segments the point cloud into different segments by combining the geometric and intensity information, then fitting the ground surface by cloth simulation method, and finally synthetically extracts the ground points with three constraints. These constraints are the distance of the point to the fitting surface, the normal difference between the point and the fitting surface, and the proportion of the possible ground points in the total points of each segment. The effectiveness of the measurement system and the development of the post-processing results were verified on the basis of field measurements, in which a total filtering error of 0.3% and the elevation accuracy of 6.4 cm were obtained. The proposed system and methods provide a new way for efficient and accurate topographic survey on mudflats.
APA, Harvard, Vancouver, ISO, and other styles
10

Shahraji, M. H., C. Larouche, and M. Cocard. "ANALYSIS OF SYSTEMATIC ERRORS OF MOBILE LiDAR SYSTEMS: A SIMULATION APPROACH." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences V-1-2020 (August 3, 2020): 253–60. http://dx.doi.org/10.5194/isprs-annals-v-1-2020-253-2020.

Full text
Abstract:
Abstract. The systematic error analysis of the mobile LiDAR system (MLS) is always a challenging task in real-world situations. This challenge is mainly due to the mixture of systematic errors with non-systematic errors. To tackle this issue, in this paper, we introduce a conceptual model of an MLS simulator. The main advantage of the simulation-based approach is the full control over the erroneous systematic and non-systematic parameters that affect an MLS’s output. In the proposed simulation approach, we only take into account systematic errors that affect the simulated georeferenced point cloud. These systematic errors are as follows, POS-LiDAR boresight angles, POS-LiDAR leverarms, range offset, and scan angle offset. To simplify our analysis, we concentrate only on modeling the effects of systematic errors on planar targets and we focus solely on the terrestrial platform. Based on an independent analysis performed on each of the eight systematic errors of an MLS, to obtain strong visibility over systematic errors of an MLS, we suggest two planar targets of 1m x 1m dimensions with vertical and inclined orientations and a five-line pattern for MLS, two parallel and three side-looking passages. The proposed configuration generates an ideal input point cloud for the detection of systematic errors (except for the Z-Leverarm error) and ultimately it will lead to the proper input data for calibration of a terrestrial MLS. To validate our methodology, with an in-house assembled terrestrial MLS, we scanned a set of planar targets with three different orientations (vertical, inclined, and horizontal). This real-data validation test illustrated that with only two out of three planar targets (vertical and inclined) and with five out of six passages (two parallel to the planar targets and three side-looking passages), we will obtain expected visibility over the systematic errors of a terrestrial MLS, which approves the results with the simulation data.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud POS system"

1

Emma, Lindgren, and Rosén Kajsa. "Riskhantering vid ett systembyte." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20243.

Full text
Abstract:
I och med den teknologiska utvecklingen som sker i dagens samhälle blir hotellbranschen mer digitaliserad. Riskhantering får därför en större plats i organisationer som implementerar POS-system. Då dessa system konstrueras på många olika sätt och varierar i komplexitet bildas risker. Studien visar att det inte finns ett specifikt och korrekt tillvägagångssätt för att riskhanteringen ska bli fulländad. Hotellet behöver därför en övergripande strategi för hur risker ska hanteras för att överleva på längre sikt. Syftet med studien var att ta fram ett förslag på hur riskhantering kan organiseras vid ett byte av ett nytt POS-system samt ge författarna en förståelse för de risker som kan identifieras och hur dessa kan hanteras. För att uppfylla syftet undersöktes ett specifikt företags implementering av ett nytt POS-system och de risker som medföljde. Genom en kvalitativ undersökning visar studien att riskhantering handlar om att identifiera risker för att minska sannolikheten och dess konsekvens. Ett genomgående tema har visat sig vara att personalens engagemang är en tydlig risk i systembytet. Det leder till att ledningen blir en central del i att ge stöd åt personalen. För att lyckas göra detta i praktiken har studien resulterat i att riskidentifiering, riskvärdering, åtgärder och uppföljning är stegen för ett framgångsrikt införande. Nyckelord: Riskhantering, implementationsrisker, implementering, POS-system, molnbaserat system, hotellbranschen.
With the technological development taking place in today's society, the hotel industry becomes more digitized. Therefore risk management gets a bigger place in organizations that implement POS-systems. Since these systems is constructed in different ways and varies in complexity risks are formed. The study shows that there is no specific and correct approach for risk management to be accomplished. The hotel therefore needs an overall strategy for how risks should be managed in order to survive in the longer term.The purpose of the study was to produce a proposal on how risk management can be organized in the event of a change of a new POS system and give the authors an understanding of the risks that can be identified and how these can be managed. To fulfill the purpose, a specific company's implementation of a new POS system and the risks that were included were examined. Through a qualitative study, the study shows that risk management is about identifying risks in order to reduce the probability and its consequence. A common theme has been that the staff's commitment is a clear risk in the system change. This leads to the management becoming a central part of providing support to the staff. In order to succeed in this, the study has resulted in risk identification, risk assessment, actions and follow-up being the steps for successful introduction.Key words: Risk management, implementation risks, implementation, POS-system, cloud computing, hotel industry.
APA, Harvard, Vancouver, ISO, and other styles
2

Cogo, Gabriel Silva. "Análise da intenção de adoção da computação em nuvem por profissionais da área de TI." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2013. http://hdl.handle.net/10183/78039.

Full text
Abstract:
A computação em nuvem emerge quando se trata da necessidade dos desenvolvedores de TI de sempre aumentar ou incluir novas capacidades, o mais rápido possível, com o menor investimento possível. Ela vem sendo apontada como uma das maiores inovações em TI nos últimos anos e por isso vem chamando a atenção tanto da comunidade acadêmica quanto da comercial. Apesar deste crescente interesse na tecnologia pela literatura acadêmica, a maior parte do foco das pesquisas se dá nos aspectos técnicos, como potencial computacional e custos. Pesquisas sobre as preferências dos profissionais da área relativa à computação em nuvem como uma ferramenta de negócios estão limitadas a estudos de consultorias e empresas privadas. Esta pesquisa tem como objetivo apresentar um estudo do impacto de diferentes dimensões sobre a intenção de adoção da computação em nuvem por profissionais de TI. Para isto, utiliza uma variação do modelo TAM/UTAUT para verificação de intenção de adoção de novas tecnologias. O método escolhido foi a pesquisa survey, realizada a partir de um instrumento previamente proposto e adaptado, sendo feita em duas etapas: estudo de pré-teste e estudo final. Diferentes técnicas estatísticas foram empregadas para refinar o instrumento, como Análise de Confiabilidade, Análise Fatorial Exploratória e Análise Fatorial Confirmatória, utilizando o método PLS (Partial Least Squares) para Equações Estruturais. Como resultado deste refinamento emergiu um modelo teórico de pesquisa final contendo 8 dimensões e 36 itens. Como contribuição para a área de SI, o modelo teórico de pesquisa final se mostrou adequado para avaliar a intenção de adoção da computação em nuvem por profissionais de TI. A principal contribuição da pesquisa para a prática gerencial é o modelo de intenção de adoção da computação em nuvem, que pode auxiliar provedores de computação em nuvem, através da mensuração das principais razões para sua adoção, que são Utilidade Percebida e Atitude Frente à Inovação Tecnológica. Também demonstra que não existe uma relação positiva entre Segurança e Confiança e a Intenção Comportamental. Doze hipóteses foram validadas e seis das hipóteses propostas foram negadas pelos dados. Estas informações buscam fornecer material para que se possa inspirar os esforços no desenvolvimento da tecnologia como ferramenta de negócio.
Cloud computing emerges when we talk about the necessity of the IT developers to always increase or add new capabilities, as soon as possible, with the lowest investment possible. It has been appointed as one of the biggest IT innovations in the recent years, and for that reason it’s been calling the attention of the academic and management communities. Even with the growing interest by the academic community, most of the research focus on technical aspects, such as computational potencial and costs. Researches involving professionals’ preferences with cloud computing as a business tool are limited to consultant and private studies at most. This research has the purpose of presenting a study about the impact of different dimensions in the intention of adoption of cloud computing by IT professionals. To do so, it uses a variation of the TAM/UTAUT model for the verification of the intention of adopting new technologies. The research method is the survey research, made with a previously proposed and adapted instrument, conducted in two stages: pre-test study and final study. Different statistical techniques were used to refine the instrument, such as Reliability Analisis, Exploratory Factor Analysis and Confirmatory Factor Analysis, this one using the PLS (Partial Least Squares) Path modeling for SEM (Structural Equation Modeling). As a result of this refinement, emerged a theorical research model containing 8 dimensions and 36 measuring items. As contribution to the IS area, the theorical model proved adequate to assess the intention of adoption of cloud computing by IT professionals. The research’s main contribution to the business practice is the model of cloud computing intention of adoption, that aids cloud providers, trought the measurement of the main reasons behind the adoption of the technology, wich are Perceived Utility and Attitude Towards Technology Innovation. Also demonstrates that there are no positive relation between Security and Trust and the Behaviorial Intention. Twelve of the hypothesis were sustained, and six of the proposed hypothesis were denied by the data. This information intends to inspire efforts in developing the technology as a business tool.
APA, Harvard, Vancouver, ISO, and other styles
3

SU, ZHENG-XING, and 蘇政興. "Development and Implementation of a Cloud-based Integrated POS System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/e2gv25.

Full text
Abstract:
碩士
南臺科技大學
高階主管企管碩士班
106
This research, through the development and implementation of the cloud-based POS integrated system, is aimed at exploring customer needs, designing and developing a system implementation process, and evaluating operating costs and customer satisfaction by analysis so as to understand whether the system can benefit consumers and enterprise users. The development process of this system is broken down into five phases: First, understand and analyze the requirements of consumers and stores, and work at system planning; second, design and plan the integrated system based on the requirements collected, building applications: including POS, mobile ordering and payment, and backstage consolidation for orders and shipments; third, conduct testing for the mobile ordering application after the system implementation; fourth, perform error correction and system maintenance after testing, and fifth, connect the integrated POS system to the cloud. This research aims to find the competitive advantages for stores through the implementation of the cloud-based integrated POS system, such as noting changes in consumer behavior, exploring future business opportunities, and reducing operating costs. By implementing the system, physical stores, and shops with long queues or selling highly perishable products, can all reduce problems resulting from long waiting time, for instance, decreased purchase orders, increased customer complaints, or food products past expiration dates. Overall, the system will create competitive strengths for business.
APA, Harvard, Vancouver, ISO, and other styles
4

LI, YU-CHIA, and 李裕家. "Design and Implementation of a Cloud POS System Based on Edge Computing Architecture." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/373952.

Full text
Abstract:
碩士
國立高雄應用科技大學
資訊工程系
106
We have witnessed the disruptive innovations that cloud computing technology brings in different industries over the past decade. The technology of cloud computing has dramatically changed the way information systems and services are deployed. Through various embedded front-end devices and Internet of Things technologies, we are now able to instantly collect a large amount of information on the sales or processing side, and then transmit the information to the cloud system for processing, and then transmit the result of the intelligent computing back to the front end for immediate processing. However, such an architecture is problematic for many enterprises, because it is impossible to achieve immediate decision. For the front-end POS system, if the network is disconnected or delayed, the data cannot be delivered to the cloud for analysis or the decision results cannot be returned in time, which may lead to erroneous judgments or affect the operation of the front-end POS system. The latest Edge Computing has emerged as a technology that can be combined with artificial intelligence, big data analytics, the Internet of Things, and cloud computing to address the above challenges. The purpose of this research is to design and implement a POS system based on the cloud edge computing architecture. This research will implement the front-end POS system with MVC architecture and the latest responsive design technology, and study how to appropriately split the edge server on the front end and the cloud computing system on the back end, and design the data storage architecture of the appropriate database and the Web service and network architecture between the front end and the back end. The edge side can provide user operations for Edge Computing. In turn, user behavior can be analyzed in the cloud to enhance customized services. The results of this research can be used to develop new forms of services with commercial value, and the core technologies derived from them can also improve the technology of cloud and network in industry.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Guo-Wei, and 李國維. "A Research on Service Quality and factors influencing for Continuous Usage Intention of Cloud POS System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/40523302997798636837.

Full text
Abstract:
碩士
國立高雄第一科技大學
資訊管理研究所
101
In recent years, cloud services following the Internet''s development, in ICT (Information and communications technology, ICT) field, another highly representative on the question, but also the future direction of the mainstream global IT applications. "Cloud computing" term, though not for the emerging technology, but it reshaped the IT industry value chain, new faces, and turned to software and service-oriented era of competition. Among them, the concept of software as a service to develop, transfer, charge mode, software as a service (Software as a Service, SaaS) gradually by the attention and use of the consumer market. This study takes the clients of cloud computing POS from “BETHEL Computer Consultant Co., Ltd.” as subjects. We have selected and extracted the questionnaires through two sections, 147 questionnaires are effective. We used SPSS and AMOS Software to run Structural Equation Modeling (SEM) to count and analyze the documents. The result showed that most of the assumptions tend to support the original assumption from this study. This study figured out: (1) Cloud POS S-Qual has an obviously positive affect to Perceived Usefulness, Perceived Ease of use, Trust; (2) Confirmation has an obviously positive affect to Perceived Usefulness, Perceived Ease of use; (3) Cloud POS S-Qual and Confirmation has no positive affect to Satisfaction; (4) Perceived Usefulness, Perceived Ease of use, Trust and Computer Self-efficacy, have an obviously positive affect to Satisfaction; (5) Perceived Usefulness, Satisfaction, and Trust have an obviously positive affect to Cloud POS S-Qual.
APA, Harvard, Vancouver, ISO, and other styles
6

Abreu, Marco António de Araújo e. "Adoção de ERP em ambiente Cloud." Master's thesis, 2018. http://hdl.handle.net/10071/18378.

Full text
Abstract:
Enterprise Resource Planning (ERP) são sistemas informáticos, produto da ciência da computação e ciências organizacionais, que permitem às empresas centralizar toda a sua informação, ao mesmo tempo que simplificam e automatizam os seus processos nas mais variadas áreas funcionais, permitindo às empresas prosperar e superar os mais diversos desafios da atual economia. No entanto são um investimento que pode ter efeitos nefastos na empresa caso não seja efetuado com sucesso. Esta dissertação tem como objetivo analisar uma das vertentes mais importantes da implementação de um sistema ERP, a adoção de tecnologia por parte do utilizador, bem como a intenção de continuar a usar Reporta-se aqui a influência que o modelo da Cloud terá sobre a adoção do utilizador. Para tal foi proposto um modelo teórico com base em modelos de adoção e sucesso de sistemas de informação. O modelo foi validado através de um questionário, cujos resultados foram analisados com método SEM/PLS. Os resultados sugerem que a segurança e privacidade, confiança, custo são fatores determinantes no uso de ERP em cloud. O uso de sistemas cloud, a colaboração, facilidade de uso, utilidade, formação, qualidade do sistema e o suporte aos processos, bem como a satisfação levam a intenção de continuar a usar ERP em cloud.
Enterprise Resource Planning (ERP) are information systems, product of the computer science and management, ERP´s allow companies to centralize all their information. Also, they simplify and automate their processes of the various functional areas of a company which allow companies to thrive in the economic challenges of the current society. However, ERP´s are an investment that can have negative consequences if the implementation is not adequate. This thesis has as a main objective to analyze one of the most important aspects of an ERP implementation: technology adoption from the user perspective and continuous intention to use.. In the present thesis it is added the influence of the Cloud model in the user adoption. Here, it is proposed a cloud ERP adoption and continuous intention to use model, based on the information systems theory. The proposed model was validated for the Portuguese context through a survey. Data was analyzed using the SEM/PLS method. Results suggest that security and privacy, trust and cost are determinants for adopting cloud ERP. Use, collaboration, ease to use, usefulness, training, system quality, process support, as well as satisfaction lead to the continuous intention to use cloud ERP.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cloud POS system"

1

Steffek, Jens. International Organization as Technocratic Utopia. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192845573.001.0001.

Full text
Abstract:
As climate change and a pandemic pose enormous challenges to humankind, the concept of expert governance gains new traction. This book revisits the idea that scientists, bureaucrats, and lawyers, rather than politicians or diplomats, should manage international relations. It shows that this technocratic approach has been a persistent theme in writings about international relations, both academic and policy-oriented, since the 19th century. The technocratic tradition of international thought unfolded in four phases which were closely related to domestic processes of modernization and rationalization. The pioneering phase lasted from the Congress of Vienna to the First World War. In these years, philosophers, law scholars, and early social scientists began to combine internationalism and ideals of expert governance. Between the two world wars, a utopian period followed that was marked by visions of technocratic international organizations that would have overcome the principle of territoriality. In the third phase, from the 1940s to the 1960s, technocracy became the dominant paradigm of international institution-building. That paradigm began to disintegrate from the 1970s onwards, but important elements remain until the present day. The specific promise of technocratic internationalism is its ability to transform violent and unpredictable international politics into orderly and competent public administration. Such ideas also had political clout. This book shows how they left their mark on the League of Nations, the functional branches of the United Nations system, and the European integration project.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cloud POS system"

1

Tamilarasi, P., and D. Akila. "Priority-Based Optimized Scheduling (PBOS) Algorithm for Big Data Applications in Cloud Computing Environments." In Advances in Intelligent Systems and Computing, 223–32. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4389-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nardelli, Robert, Zachary Dall, and Sotiris Skevoulis. "Comparing TensorFlow Deep Learning Performance and Experiences Using CPUs via Local PCs and Cloud Solutions." In Lecture Notes in Networks and Systems, 118–30. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Jian, Hong-Linh Truong, and Yanbo Han. "Introduction to the Proceedings of the 5th International Workshop on Personalization in Cloud and Service Computing (PCS) 2011." In Web Information Systems Engineering – WISE 2011 and 2012 Workshops, 259–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38333-5_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rath, Mamata. "Security Challenges and Resolution in Cloud Computing and Cloud of Things." In Applying Integration Techniques and Methods in Distributed Systems and Technologies, 79–102. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8295-3.ch004.

Full text
Abstract:
Cloud computing is a developing zone of computing innovation that shapes the handling power and the computing assets of many associated, topographically separated PCs associated by means of internet. Cloud computing wipes out the need of having a total framework of equipment and programming to meet clients' prerequisites and applications. It very well may be thought of as a total or an incomplete outsourcing of equipment and programming assets. To get to cloud applications, a great internet association and a standard internet program are required. Cloud computing has its own particular downside from the security perspective; this chapter addresses the vast majority of these dangers and their conceivable arrangements. Cloud computing gives its client numerous abilities like getting to an expansive number of utilizations without the requirement for having a permit, acquiring, introducing, or downloading any of these applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Kaushik, Shweta, and Charu Gandhi. "Security for the Cloud." In Cloud Computing Applications and Techniques for E-Commerce, 68–83. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1294-4.ch004.

Full text
Abstract:
Today's people are moving towards the internet services through cloud computing to acquire their required service, but they have less confidence about cloud computing because all the tasks are handled by the service provider. Cloud system provides features to the owner to store their data on some remote locations and allow only authorized users to access their data according to their access capability. Data security becomes particularly serious in the cloud computing environment because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as smart phones. To make the cloud computing be adopted by enterprise, the security concerns of users should be rectified first to make cloud environment trustworthy. The trustworthy environment is the basic prerequisite to win the confidence of users to adopt this technology. However, there are various security concerns that need to be taken care of regarding the trust maintenance between various parties, authorized access of confidential data, data storage privacy, and integrity.
APA, Harvard, Vancouver, ISO, and other styles
6

S., Koushik, and Annapurna P. Patil. "Adaptive Content Planning and Delivery With Assessment Methodology Using Swarm Intelligence on Cloud Computing." In Handbook of Research on Developing a Post-Pandemic Paradigm for Virtual Technologies in Higher Education, 217–40. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6963-4.ch011.

Full text
Abstract:
University education has been using traditional approaches to impart knowledge. Advancements in technology create a need to change the teaching-learning process's direction to keep up with the current technology pace. Students and teachers should update their skill sets to suit the current needs of technology. Content and syllabus delivery should be planned and delivered to create a more adaptive, self-paced, and personalized learning experience. Evaluation of tests and assignments requires an intelligent system that uses technologies like swarm intelligence and artificial intelligence. Research carried out in this field helps mold the curriculum as per the student's requirements. Swarm intelligence, combined with cloud computing, enables adaptive content planning and delivery. Swarm intelligence techniques and algorithms help design personalized content and delivery. In contrast, cloud infrastructure provides the required computing capability and storage to perform academic tasks on a standard application platform for students and teachers with a cost-effective solution.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud POS system"

1

Gupta, Kishor Datta, Abdur Rahman, Subash Poudyal, Mohammad Nurul Huda, and M. A. Parvez Mahmud. "A Hybrid POW-POS Implementation Against 51 percent Attack in Cryptocurrency System." In 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2019. http://dx.doi.org/10.1109/cloudcom.2019.00068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Mobile of Point of Sales (POS) Application with Cloud Computing Inventory Management System for Micro and Small Enterprises." In 2016 the 6th International Workshop on Computer Science and Engineering. WCSE, 2016. http://dx.doi.org/10.18178/wcse.2016.06.135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Han, Xu, Cong Wang, Jie Liu, and Zheng Li. "A Chinese Radical Embedding for Joint Segmentation and POS Tagging." In 2018 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2018. http://dx.doi.org/10.1109/ccis.2018.8691390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zou, Meng, Junyang Li, Gehui Shen, and Zhihong Deng. "TIER: A Novel Model Based on POS Information to Generate Dialogue." In 2018 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2018. http://dx.doi.org/10.1109/ccis.2018.8691184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Shiqiang, Pai Zheng, Chunyang Yu, and Xun Xu. "Product-Service Family Enabled Product Configuration System for Cloud Manufacturing." In ASME 2017 12th International Manufacturing Science and Engineering Conference collocated with the JSME/ASME 2017 6th International Conference on Materials and Processing. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/msec2017-2987.

Full text
Abstract:
Rapid responsiveness to diverse customer needs is considered a competitive advantage in manufacturing business. To shrink the inquiry-to-order process, manufacturing firms will benefit a lot from building a product configuration system (PCS) which is the enabler of mass customisation (MC). PCS has matured in consumer businesses for decades but in capital goods industries, typically operating in engineer-to-order (ETO) manner, things differ a lot. It is for the reason that conventional PCS is incapable of extending customisation from order-delivery processes to the design/engineering phase. Cloud manufacturing, which is an emerging service-oriented manufacturing paradigms enabled by cyber-physical system, the Internet of Things and the Internet of Service, is promising to break the bottleneck of “ETO PCS” by the provision of technical infrastructure for product, service and data customisation. With the introducing of manufacturing-as-a-service (MaaS) concept, a product family is extended to a product-service family (PSF) in this paper for implementing in-depth product configuration process with scalable customisation depth (i.e., the degree of customisation freedom). Additionally, an approach of service delegation in product configuration process is proposed to support customer-centric product customisation. At last, the methodology proposed in this paper is validated by a case study in which the product configuration process of a complex ETO product is performed.
APA, Harvard, Vancouver, ISO, and other styles
6

Tumer, Eda, and Stefan Kuhn. "Puffle-Pod Marine Evacuation System (POMES)." In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2019. http://dx.doi.org/10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sengar, Shivangi, and Rajesh Kumar Chakrawarti. "Implementation of PDS system with improved security and transparency under cloud environment." In 2016 Symposium on Colossal Data Analysis and Networking (CDAN). IEEE, 2016. http://dx.doi.org/10.1109/cdan.2016.7570929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Xiwei, Liming Zhu, Ingo Weber, Len Bass, and Daniel Sun. "POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Okamoto, Hiroki, and Hiroshi Masuda. "A Point-Based Virtual Reality System for Supporting Product Development." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-59756.

Full text
Abstract:
In this paper, we discuss methods to efficiently render stereoscopic scenes of large-scale point-clouds on inexpensive VR systems. Recently, terrestrial laser scanners are significantly improved, and they can easily capture tens of millions points in a short time from large fields, such as engineering plants. If 3D stereoscopic scenes of large-scale point-clouds could be easily rendered using inexpensive devices, they might be involved in casual product development phases. However, it is difficult to render a huge number of points using common PCs, because VR systems require high frame rates to avoid VR sickness. To solve this problem, we introduce an efficient culling method for large-scale point-clouds. In our method, we project all points onto angle-space panoramic images, whose axes are the azimuth and elevation angles of head directions. Then we eliminate occluded and redundant points according to the resolutions of devices. Once visible points are selected, they can be rendered in high frame rates. Visible points are updated when the user stays at a certain position to observe target objects. Since points are processed on image space in our method, preprocessing is very fast. In our experiments, our method could render stereoscopic views of large-scale point-clouds in high frame rates.
APA, Harvard, Vancouver, ISO, and other styles
10

Han, Hou, Dongqing Wang, and Jun Xu. "Classroom Assessment and Analysis System: Using Tablet PCs and Cloud Computing to Improve Effectiveness of Classroom Assessment." In 2013 International Conference on Advanced Cloud and Big Data (CBD). IEEE, 2013. http://dx.doi.org/10.1109/cbd.2013.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography