To see the other types of publications on this topic, follow the link: Service center of computer/laptoprepair business.

Journal articles on the topic 'Service center of computer/laptoprepair business'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Service center of computer/laptoprepair business.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dr., Wachyudi.N.*. "INTERACTION BEHAVIOUR LEADING TO COMFORTIN SERVICE ENCOUNTER OF NOTEBOOK PERIPHERAL SERVICE CENTER BUSINESS." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 5, no. 3 (2018): 30–41. https://doi.org/10.5281/zenodo.1209319.

Full text
Abstract:
This study aims to determine the effect of interaction behavior that elicits a sense of comfort for customers in the service encounter of notebook peripheral business, and investigating the mediating role of comfort on overall service quality, customer satisfaction, word of mouth and the repurchase intention. Based on 250 valid responses collected from a survey questionnaire used structural equation modeling (SEM) to examine the research model. The findings showed that all hypotheses on the relationship between the observed variables were proven to support previous theories and studies. Interaction behavior has asignificant effect on the word of mouth and repurchase intention which mediated by the comfort, overall service quality, and customer satisfaction. Therefore as a practical implication, besides managers are recommended to incorporate interaction behaviors into frontline employee training and designing comfort enhancing-strategies, field technicians must also constantly improve their products knowledge and information in order to make consumers feel comfortable entrusting their goods to be handled by the services center. This is because in addition to the overall service quality provided by the service providers will directly affect customer satisfaction to re-visit the repair service in case of damage, it will also drive their willingness to promote the benefits of service providers to others
APA, Harvard, Vancouver, ISO, and other styles
2

Phiphopsuthipaiboon, Soontorn, and Somjai Boonsiri. "Business Process Reengineering–A Case Study on Computer Center Service." MATEC Web of Conferences 81 (2016): 06006. http://dx.doi.org/10.1051/matecconf/20168106006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Long, Shuaipeng Guan, Wei Deng, and Ping Lu. "ERP System Design for Hydrogen Equipment Manufacturing Industry Based on Low Code Technology." Mobile Information Systems 2022 (May 4, 2022): 1–9. http://dx.doi.org/10.1155/2022/5371471.

Full text
Abstract:
Research Problem. Aiming at the problems such as fast update and iteration speed, high development cost, and isolated enterprise data in hydrogen equipment manufacturing industry, a low code programming system based on enterprise data center and business center was proposed and designed. Research Method. This paper designs the data center service and business center architecture of hydrogen equipment manufacturing industry. The data center collects, mines, and integrates massive data into unified standard structured data and stores them. The business center provides architectural support for the establishment of enterprise resource management system. With the data center service as the system data interaction center and the business center as the model to build the system architecture, the hydrogen equipment manufacturing industry resource management system is constructed through the steps of data interaction, process modeling, and UI editing. Research Results. According to the specific requirements of hydrogen equipment manufacturing industry, the business process of hydrogen enterprise resource management system is constructed, and the construction and development of low code system are studied and discussed by integrating data center and business center. Conclusions. Low code is not just a tool to increase productivity, it has the potential to be a catalyst for technology and culture to promote enterprise innovation and business agility, and ERP systems for hydrogen equipment manufacturing based on low coding technology are needed for the industry of the future. This article contributes to the hydrogen equipment manufacturing industry of low code programming system, users can according to their own needs, through the combination of components, quickly generate a complete management system, update system iteration, greatly reduce the development cost, solve the problem of enterprise data isolation, reduce the development cost, and realize the seamless integration of modern software development practice, so as to promote enterprise innovation and business agility.
APA, Harvard, Vancouver, ISO, and other styles
4

Johansson, Niklas, and Ulrika Mollstedt. "Revisiting Amit and Zott’s model of value creation sources: The SymBelt Customer Center case." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 3 (2006): 16–27. http://dx.doi.org/10.3390/jtaer1030019.

Full text
Abstract:
Amit and Zott [2] recognized the importance of understanding value sources in electronic business (ebusiness). However, the concept of e-business is rather broad and therefore this paper suggests a more narrow focus on the value of complementary services. The reason for this approach is an ever-increasing importance for firms to provide complimentary services supporting products. Amit and Zott’s [2] model of the sources of value creation in e-business includes four dimensions of value creation; efficiency, lock-in, complementarities and novelty. In contrast to Amit and Zott [2], we suggest that the four dimensions of the model should not only be used as value creation sources, but moreover as value evaluation dimensions. The findings of this case study, where Metso Paper’s Internet-based service (a complementary service) and some of their customers’ perceptions of the service have been studied, show that the customers have used the services infrequently. This study also shows that in this specific business-to-business context, the characteristics of the product, which the Internet-based service supports, are vital. Therefore, we suggest a modification of Amit and Zott’s [2] business model when used as a model for value evaluation of complementary services, to replace complementarities with nature of the core product.
APA, Harvard, Vancouver, ISO, and other styles
5

Kyper, Eric, Michael Douglas, and Roger Blake. "Using Business Intelligence for Operational Decision-Making in Call Centers." International Journal of Decision Support System Technology 4, no. 1 (2012): 43–54. http://dx.doi.org/10.4018/jdsst.2012010104.

Full text
Abstract:
This paper proposes an operational business intelligence system for call centers. Using data collected from a large U.S. insurance company, the authors demonstrate a decision tree based solution to help the company achieve excellence through improved service levels. The initial results from this study provide insight into the factors affecting this firm’s call center service levels, and the solution developed in this paper provides two distinct advantages to managers. First, it enables them to identify key factors and the role they play in determining service levels. Second, a sliding window approach is proposed which allows managers to see the effects of resource reallocation on service levels on an on-going basis.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhou, Ke. "Virtual Exhibition Platform Display and Works Presentation Experience Based on Computer Vision." Archives des Sciences 74, s1 (2024): 26–31. http://dx.doi.org/10.62227/as/74s15.

Full text
Abstract:
The use of the virtual exhibition platform can effectively solve the problems of non local exhibitors being unable to participate in the exhibition on site and having high exhibition costs, and effectively expand the business of exhibition operation, exhibition decoration engineering, exhibition equipment leasing, and customer value-added services of the International Convention and Exhibition Center. This research systematically analyzes the architecture, system architecture, visual interface design components and application construction of the mainstream operating system platform of mobile terminals. This paper discusses the basic methods of application software development based on the platform, and focuses on the design of communication module and the development methods of data encapsulation and analysis, which are suitable for lightweight data interaction of the exhibition platform. The experimental results show that the virtual display platform combines the demand analysis of mobile terminal applications in the business display information system, and designs and implements mobile terminal application software. Function display schedule management information service module, display contact information service module, display commodity information service module and mailbox service module.
APA, Harvard, Vancouver, ISO, and other styles
7

Herdiana, Budi, and Bobi Kurniawan. "Program IPTEK bagi Inovasi dan Kreatifitas Kampus IT Training & Service Center (ITSC) UNIKOM." Jurnal Pengabdian kepada Masyarakat (Indonesian Journal of Community Engagement) 3, no. 1 (2017): 18–25. http://dx.doi.org/10.22146/jpkm.23286.

Full text
Abstract:
The community of society is one of main activities required by a lecture as part of the tri dharma which aimed to apply and implement the scientific competence a lecturer to contribute positively especially for society needs. It activities do in UNIKOM is a form of the creativity between lecturers and students who want to develop their skill especially in information technology and entrepreneurship knowlegde, and therefore we established a business unit in 2014 was named "IT Training & Service Center (ITSC)". This business unit is formed by lecturers of electrical engineering, computer systems and informatics techniques. At the beginning of this business unit formed by the same vision and mission of them who joined the workshop activities hardware laboratory device repair activity related to computers, laptops, mobile phones and smartphones. The main target customers of this business unit is high school around Bandung and West Java, collage students, general society and office employees. Quality improvement of this business unit for 3 years we look the number of consumers who use our services increases every year. Where results of 2014 that the number of consumers when it was only 50 people include follow the training and service. For next year the number of customers increased to 235 people for training and 86 for service activities. While, for 2016 increased consumer more than twice with average increase every year more 100%.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Chen. "The Application of Big Data Technology in the Construction of Financial Shared Service Center of Agricultural Enterprise Group." Mobile Information Systems 2022 (August 17, 2022): 1–10. http://dx.doi.org/10.1155/2022/1693365.

Full text
Abstract:
The prerequisite for the reasonable construction and successful implementation of the financial sharing center of the agricultural enterprise group is that the agricultural enterprise group must fully understand the financial sharing center, understand the steps and key points of its construction, and comprehensively design and re-engineer the business process. This paper combines the big data technology to construct the financial sharing center system of agricultural enterprise groups, combines the machine learning algorithm to improve the big data processing algorithm, and builds the intelligent financial sharing platform with the support of the improved algorithm, and builds the overall system architecture and operation process. After constructing the system, the performance verification and practical verification of this system are carried out through experimental research. From the research results, it can be seen that the system constructed in this paper has good data processing effects and data sharing effects, and has good security, which meets the financial sharing needs of agricultural enterprise groups.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yaming, and Chaozhuo Zhang. "Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence." Security and Communication Networks 2022 (May 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/4980893.

Full text
Abstract:
For major organizations, establishing financial shared service centers to unify the financial activities of entities in multiple countries and regions for bookkeeping and reporting has become the trend for financial and management optimization. Based on this, this paper selects security company A as a case study, introduces the emerging blockchain technology (BCT) as the core and embeds it into the concept of financial shared center, tries to explore a new model of financial shared service model under BCT from the theoretical perspective, and optimizes the original service model by improving its business process, creating visualized, supervisible, and traceable financial data processing capability, and expanding. This paper first examines the financial shared service model of Company A. This paper starts with the actual situation of Company A’s financial shared service model. Complex procedures, highly centralized information, unreasonable division of labor in corporate processes, and a lack of adequate information communication methods are discovered through process analysis. New requirements for accountants have emerged in the digital age, and the security protection of private keys in asymmetric encryption algorithms in organizations, particularly in large and medium-sized enterprises, must be done well.
APA, Harvard, Vancouver, ISO, and other styles
10

Nuranita, Neri, Hamdil Khaliesh, and Jawas Dwijo Putro. "PONTIANAK WEDDING CENTER." JMARS: Jurnal Mosaik Arsitektur 10, no. 2 (2022): 642. http://dx.doi.org/10.26418/jmars.v10i2.57263.

Full text
Abstract:
Marriage is a precious moment for every couple, where they formalize their bond legally according to law, norms, and religion. At a wedding, the venue for the event is one that must be prepared so that the event can run smoothly. Weddings in the city are often held in hotels or multi-purpose halls. This is due to the limited land area of the house so that it is less accommodating to accommodate guests and vehicle parking spaces in addition to showing self-existence or prestige. In addition to the venue for the wedding, the selection of makeup, clothing, wedding decorations, documentation, entertainment, food and drinks for invited guests is something that needs to be prepared. Of the many preparations needed to provide business opportunities in the field of wedding services and supplies. For this reason, the design of the Pontianak Wedding Center is expected to meet the needs of the community and service providers in wedding equipment. The Pontianak Wedding Center design method consists of several stages, namely the idea stage, the data collection stage, the analysis stage, then the synthesis and finally the design. In designing the Pontianak Wedding Center using a contemporary architectural approach. From the design of the Pontianak Wedding Center, it produces a place for weddings and marriage ceremonies, meeting places, management offices, thematic shopping facilities and other supporting facilities. The design of the Pontianak Wedding Center will be a new idea where the wedding building has a thematic shopping center in it.
APA, Harvard, Vancouver, ISO, and other styles
11

Altinişik, Ünsal, and Akin Çelik. "Investigation of Service Quality Perceived by Fitness Center Consumers." Pakistan Journal of Medical and Health Sciences 15, no. 10 (2021): 3225–29. http://dx.doi.org/10.53350/pjmhs2115103225.

Full text
Abstract:
Aim: This research aims to examine the service quality perceived by fitness center consumers. Methods: This research, which has a descriptive nature, was carried out according to the survey model. The sample of study consists of 332 people who go to fitness centers in Trabzon. The "Personal Information Form" created by the researchers and the "Sports-Fitness Centers Service Quality Scale" developed by Uçan (2007) were used as data collection tools in the research. The dependent variable of the research is the perceived service quality, and the independent variables are gender, education level and income level. The findings obtained as a result of the data collection process were transferred to the computer environment, and descriptive statistics (frequency, arithmetic mean, standard deviation), t-test and single-factor analysis of variance (One-Way ANOVA) test were used in the analysis and interpretation of the data. Results: As a result of the analyses made, it was determined that the service quality perceived by the fitness center consumers included in the research differed significantly according to gender, education level and income level. Conclusion: Fitness centers appear as businesses that provide services to people both in terms of physical appearance and health. The fact that fitness centers undertake these missions paves the way for the participants to form a sense of belonging to these centers. Therefore, facility managers working in these businesses should strive to meet the demands necessary to ensure the continuity of people, taking into account the intense competitive environment. Based on the findings, although the perceived service quality of the participants is above the average level, it is recommended that public and private businesses that provide sports services regularly apply surveys to their customers that measure the service quality level of the business and take managerial measures by determining their thoughts. Keywords: Fitness Center, Service Quality, Fitness Center Consumers
APA, Harvard, Vancouver, ISO, and other styles
12

Aindrila, Ghorai. "Revolutionizing Customer Service: Integrating Computer Telephony (CTI) with Amazon Connect in the PEGA Platform." Journal of Scientific and Engineering Research 10, no. 2 (2023): 208–12. https://doi.org/10.5281/zenodo.12792582.

Full text
Abstract:
The integration of Computer Telephony Integration (CTI) systems with Customer Relationship Management (CRM) platforms has revolutionized customer service operations, enhancing efficiency and user experience. This research paper delves into the integration of PEGA’s CTI capabilities with Amazon Connect, a cloud-based contact center service. The paper explores the technical architecture, implementation process, benefits, and challenges of this integration, providing a comprehensive guide for organizations looking to leverage these technologies for optimized customer service operations.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhu, Ying, Caixia Liu, Wei You, Yiming Zhang, and Weicheng Zhang. "A Business Process-Based Security Enhancement Scheme for the Network Function Service Access Procedure in the 5G Core Network." Electronics 12, no. 3 (2023): 576. http://dx.doi.org/10.3390/electronics12030576.

Full text
Abstract:
As the signaling processing center of 5G, the security and stability of the 5G Core Network (5GC) are of great importance for 5G. The current 5GC consists of multiple mutually independent Network Functions (NFs). However, the NF service access procedure does not match NF service requests and business processes. NFs can request authorized services for access at any time, which poses a security threat to NFs and user data. This paper proposes a security enhancement scheme for NF service access procedures based on the business process, which realizes the management of the NF business process. The NRF adds a token identifier field bound to the business process in the access token and establishes an access token repository to store the token identifier. NF Service Producer introduces an access token re-signature mechanism and a shared repository of responded access tokens. The security of the proposed scheme is verified by theoretical analysis and formal analysis, and the performance of the proposed scheme is evaluated in terms of response rate and resource consumption. The experimental results show that the proposed scheme can meet the security requirement with little efficiency degradation under the condition of increasing certain resource loss.
APA, Harvard, Vancouver, ISO, and other styles
14

Bruno, Giorgio. "People-Oriented Enterprise Information Systems." International Journal of Enterprise Information Systems 5, no. 4 (2009): 17–33. http://dx.doi.org/10.4018/jeis.2009090202.

Full text
Abstract:
Current notations and languages do not emphasize the participation of users in business processes and consider them essentially as service providers. Moreover, they follow a centralized approach as all the interactions originate from or end in a business process; direct interactions between users cannot be represented. What is missing from this approach is that human work is cooperative and cooperation takes place through structured interactions called conversations; the notion of conversation is at the center of the language/action perspective. However, the problem of effectively integrating conversations and business processes is still open and this chapter proposes a notation called POBPN (People-Oriented Business Process Notation) and a perspective, referred to as conversation-oriented perspective, for its solution.
APA, Harvard, Vancouver, ISO, and other styles
15

Borthick, A. Faye, and Donald R. Jones. "Analyzing a Potential Warranty Call Center Budget Overrun: Using Database Queries to Solve Business Problems." Journal of Information Systems 19, no. 1 (2005): 97–111. http://dx.doi.org/10.2308/jis.2005.19.1.97.

Full text
Abstract:
In this case, students develop and use database queries to analyze possible causes of a potential budget overrun for telephone warranty service for a company that sells personal computers (PCs). Students query a Microsoft Access® database with tables for sales of PCs, estimates for technician time, employees, technician costs, and service minutes provided. The queries illustrate those that accountants could prepare to analyze transaction-level data to develop insights about business operations. Query-based approaches to analyzing transaction data are likely to become more common as businesses take advantage of the wealth of data available to them for solving business problems and exploiting emerging opportunities. This case is appropriate for students with rudimentary database querying proficiency, e.g., at the level developed by Borthick et al.'s (2001) case on assuring compliance for responses to website referrals.
APA, Harvard, Vancouver, ISO, and other styles
16

Marín Díaz, Gabriel, Ramón Alberto Carrasco, and Daniel Gómez. "RFID: A Fuzzy Linguistic Model to Manage Customers from the Perspective of Their Interactions with the Contact Center." Mathematics 9, no. 19 (2021): 2362. http://dx.doi.org/10.3390/math9192362.

Full text
Abstract:
In an increasingly globalized market, the relationship between the customer and the brand goes beyond the purchasing process. It is very important to understand the customer, to know their needs and to propose actions to increase the value of the brand for them. In the literature, there are several models capable of determining and segmenting customers according to variables dependent on the purchasing process. However, we have not found any study that applies to the business case of classifying customers according to their relationship with the contact centre. In this paper, we establish a working model that allows us to define the value of the customer in the process of interaction with the contact centre, so that we can propose actions both in the sales phase and during the post-sales service, so that the value and perception of the brand is increased. In this model, we propose using the value of recency, frequency, importance and duration of customer interactions with the post-sales service, thus obtaining a ranking, and grouping of customers to help establish personalized communication strategies. We have verified this model by presenting a business case applied to the telecom sector.
APA, Harvard, Vancouver, ISO, and other styles
17

Chanpanit, Thanyawan, and Apinanthana Udomsakdigool. "Workforce Planning Framework for a Mobile Call Center Considering a Special Event." Energies 15, no. 4 (2022): 1551. http://dx.doi.org/10.3390/en15041551.

Full text
Abstract:
Workforce planning is essential in today’s business management. If an organization can find and keep enough staff who have the right values, then they can provide high-quality service. This paper presents a workforce planning framework for selecting the best forecasting model in order to provide minimum wage and computer electricity costs for a mobile call center during the Songkran festival event, and to optimize workforce planning. The framework is constructed with four main steps: a study of a separate period; the separation of models with different data types; the simulation of models under different service levels to determine the number of customers waiting in a call center; and the evaluation of the models. The results from the proposed framework presented the best forecasting method and the optimal workforce plan. It is clear that this approach can assist in systematically selecting the best forecasting model. In addition, a workforce planner can use this framework to support workforce planning and cost evaluation in other event periods.
APA, Harvard, Vancouver, ISO, and other styles
18

Padlee, Siti Falindah, Siti Zulaieqa Mohd Hat, Hayatul Safrah Salleh, and Siti Nur. "Modeling Service Quality and Satisfaction of Evacuation Center Using Partial Least Squares Structural Equation Modeling (PLS-SEM)." International Journal of Service Science, Management, Engineering, and Technology 12, no. 3 (2021): 20–33. http://dx.doi.org/10.4018/ijssmet.2021050102.

Full text
Abstract:
The objective of the study was to examine the relationship between evacuees' perception of service quality and their level of satisfaction on the services provided at the evacuation center. The measurement of the relationship between the constructs was analyzed by using the PLS-SEM. About 600 questionnaires were administered in three locations—Kemaman (Terengganu), Kuala Krai (Kelantan), and Temerloh (Pahang)—that are severely affected by floods during the monsoon season from November to March. The results revealed that evacuees' perceived service quality on the seven dimensions of services such as food catering, health and safety, transportation, volunteers, site services, telecommunication, and special facilities for special needs significantly influence their overall satisfaction. The outcome was the identification of seven key service variables of an evacuation center that have impacted to evacuees' overall satisfaction. This study hopes to assist the government in providing continuous quality of services to evacuees in the evacuation center in Malaysia.
APA, Harvard, Vancouver, ISO, and other styles
19

Anam, Chairul, and Abdul Mujib. "Relationships Between Service Quality, Store Image, Customer Satisfaction, And Customer Loyalty." IJEBD (International Journal of Entrepreneurship and Business Development) 6, no. 6 (2023): 1157–65. http://dx.doi.org/10.29138/ijebd.v6i6.2585.

Full text
Abstract:
Over the last few years, MSMEs have become the main motor in driving economic growth. In today's increasingly fierce competitive conditions, business competitors continue to strive to provide high quality services, create an excellent brand image, with the aim of meeting customer satisfaction and maintaining their loyalty. The aim of this research is to empirically examine the relationship between service quality, store image, customer satisfaction, and customer loyalty. We collected research data on consumers who purchased MSME products at the Mojokerto City Center for Featured Products, using accidental sampling techniques. We propose a conceptual model from previous research and consider it in the context of superior MSME products in Mojokerto City. The analysis technique used is multiple linear regression analysis using the SPSS computer application program. The research results show that service quality and store image significantly impacts customer loyalty. Likewise, the research results also confirm that customer satisfaction significantly impacts customer loyalty at the Mojokerto City Center for Featured Products. In addition, the research results reveal that customer satisfaction strengthens the influence of store image on customer loyalty. This research suggests implications for managers, limitations and directions for future research of the above findings.
APA, Harvard, Vancouver, ISO, and other styles
20

Wu, Nan, Hao Wu, and Feiyan Zhang. "Evaluation of the Construction of a Data Center-Driven Financial Shared Service Platform From the Remote Multimedia Network Perspective." International Journal of Information Technologies and Systems Approach 16, no. 3 (2023): 1–15. http://dx.doi.org/10.4018/ijitsa.320178.

Full text
Abstract:
The financial shared service (FSS) platform under the remote multimedia network perspective is a newly proposed accounting and reporting business management mode in recent years that plays a good role in the operation of enterprises. The multimedia technology in the health cloud biological authentication and data management system can be applied to the construction of the data center-driven FSS platform. This study used multimedia in the data management system to build a data center-driven FSS platform to maintain the normal operation of the enterprise. Moreover, the study analyzed from the perspective of employee satisfaction, work efficiency, enterprise cost, and work continuity and drew a conclusion. The survey of employee satisfaction showed that the satisfaction of employees after modeling had been greatly improved compared with that before modeling. Moreover, according to the survey of work efficiency, the work efficiency of employees in the five enterprises after modeling has been greatly improved compared with that before modeling. Furthermore, in the survey of enterprise cost, the cost reduction effect of postal enterprises is best after using multimedia technology to model the data center-driven FSS platform. Then, according to the survey on work continuity, the work continuity of the five enterprises has been improved to varying degrees after the establishment of the FSS platform. Among them, the work continuity of Enterprise 2 has been improved by 11%, with the best effect. The multimedia modeling in the health cloud biological authentication and data management system plays a role in promoting the development of enterprises.
APA, Harvard, Vancouver, ISO, and other styles
21

Mohialden, Yasmin Makki, Muhanad Tahrir Younis, and Nadia Mahmood Hussien. "A Novel Approach to Arabic Chabot, Utilizing Google Colab and the Internet of Things: A Case Study at a Computer Center." Webology 18, no. 2 (2021): 946–54. http://dx.doi.org/10.14704/web/v18i2/web18365.

Full text
Abstract:
A Chabot is a software program for humans to interact with natural-language computers. It has numerous applications in business, service, education, and healthcare, among others. Arabic Chabot’s, on the other hand, fight to generate and display Arabic characters correctly because of linguistic problems. In this paper, we propose a new method for the development of effective Arabic Chabot’s, which is improved by the use of the Internet of things (IOT). An experiment was performed utilizing Google Colab and the Python Chatterbot library to build and deploy an Arabic Chabot for a computer center based on IOT.
APA, Harvard, Vancouver, ISO, and other styles
22

Pransky, Joanne. "The Pransky interview: Dr Steve Cousins, CEO, Savioke, Entrepreneur and Innovator." Industrial Robot: An International Journal 43, no. 1 (2016): 1–5. http://dx.doi.org/10.1108/ir-11-2015-0196.

Full text
Abstract:
Purpose – The following paper is a “Q & A interview” conducted by Joanne Pransky of Industrial Robot Journal as a method to impart the combined technological, business and personal experience of a prominent, robotic industry engineer-turned successful business leader, regarding the commercialization and challenges of bringing technological inventions to market while overseeing a company. The paper aims to discuss these issues. Design/methodology/approach – The interviewee is Dr Steve Cousins, a seasoned executive, entrepreneur and innovator with a strong track record for managing research and development organizations and realizing a significant return on investment. Dr Cousins has dedicated the past near-decade of his life to the mission of building and deploying personal and service robotic technology to assist people. In this interview, Dr Cousins discusses some of the technical and business insights that have led to his most recent robotic advancements as Chief Executive Officer (CEO) of Savioke, a company that is creating autonomous robot helpers for the services industry. Findings – Dr Cousins received his BS and MS degrees in computer science from Washington University, and holds a PhD in computer science from Stanford University. Dr Cousins managed the Advanced Systems Development Laboratory at the Xerox Palo Alto Research Center (PARC) and then went on to lead the IBM Almaden Research Center, one of the top human–computer interaction research groups in the world, as the Senior Manager of the User-Focused Systems Research Group. While at IBM, Dr Cousins earned a micro-MBA. Originality/value – Dr Cousins is spearheading a new business model for robotics, Robots as a Service (RaaS), with Savioke’s flagship mobile robot, Relay. Based on the information technology industry service trend of improving customer experiences, Savioke is successfully applying RaaS to the hospitality industry with about 10 Relays at half a dozen US major hotels. Before founding Savioke, Dr Cousins was the President and CEO of Willow Garage, where he oversaw the creation of the robot operating system (ROS), the PR2 robot and the open-source TurtleBot. In the last three years of his tenure at Willow Garage, Dr Cousins spun off eight successful companies: Suitable Technologies (maker of the Beam remote presence system); Industrial Perception, Inc. (acquired by Google in 2013); Redwood Robotics (acquired by Google in 2013); HiDOF (ROS and robotics consulting); Unbounded Robotics; The Open Source Robotics Foundation; The OpenCV Foundation; and The Open Perception Foundation. Dr Cousins is an active participant in the Robots for Humanity project.
APA, Harvard, Vancouver, ISO, and other styles
23

Daza, Alfredo, Elmer Marcelino De la Paz Ttito, and Yohan Roy Alarcón Cajas. "Impact of business intelligence on incident management in the control center of a security company." Bulletin of Electrical Engineering and Informatics 13, no. 1 (2024): 422–35. http://dx.doi.org/10.11591/eei.v13i1.5819.

Full text
Abstract:
The main objective of this article is to implement business intelligence (BI) technology to improve incident management in the control center of a security company; making use of the Ralph Kimball method for the development of the data mart, contemplating the phases: planning of projects, definition of requirements, design of technological architecture, performing a dimensional modeling a star with 9 dimensions and 1 table made, also used the structured query language (MySQL) database, extract, transform, and load (ETL). Development the pentaho data integration, which allowed the migration, transformation and cleaning of the data from the online transaction processing (OLTP) and online analytical processing (OLAP) database, obtaining as a result that the BI managed to increase the level of the service by 28.42% and reducing the frequency index by 25%.
APA, Harvard, Vancouver, ISO, and other styles
24

Pelangie, Kissi Rosari, Andri Irfan Rifai, and Pradana Yudhistira. "Services Analysis of Pedestrian Facility in Office and Business Area: Case Study Jalan Wahid Hasyim, Jakarta." Citizen : Jurnal Ilmiah Multidisiplin Indonesia 2, no. 5 (2022): 804–14. http://dx.doi.org/10.53866/jimi.v2i5.195.

Full text
Abstract:
Jalan Wahid Hasyim is in the heart of Central Jakarta's offices and businesses, with a strategic location and easy access to destinations such as Jalan Thamrin or Tanah Abang Shopping Center; many road users choose to travel through this road. This study was conducted to analyze the level of service provided by pedestrian facilities to pedestrians on Jalan Wahid Hasyim in Jakarta. The index performance analysis method was used to compare the value of satisfaction and the importance of pedestrian facilities in Jalan Wahid Hasyim. The results showed that the average satisfaction index was 3.16, the average interest index was 4.24, and the average gap was -1.08. The most common recommendations were to improve pedestrian safety and comfort on Jalan Wahid Hasyim Jakarta.
APA, Harvard, Vancouver, ISO, and other styles
25

Jia, Xudong, Ning Hu, Shi Yin, Yan Zhao, Chi Zhang, and Xinda Cheng. "A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT." Mobile Information Systems 2020 (December 21, 2020): 1–19. http://dx.doi.org/10.1155/2020/8889192.

Full text
Abstract:
The fifth-generation mobile communication technology (5G) provides high-bandwidth and low-latency data channels for massive IoT terminals to access the core business network. At the same time, it also brings higher security threats and challenges. Terminal identity authentication is an important security mechanism to ensure the core business network; however, most of the existing solutions adopt a centralized authentication model. Once the number of authentication requests exceeds the processing capacity of the authentication center service, it will cause authentication request congestion or deadlock. The decentralized authentication model can effectively solve the above problems. This article proposes a decentralized IoT authentication scheme called A2 Chain. First, A2 Chain uses edge computing to decentralize the processing of authentication requests and eliminate the burden on authentication services and the network. Second, to implement cross-domain identity verification of IoT devices, A2 Chain uses blockchain, and sidechain technologies are used to securely share the identity verification information of IoT devices. Additionally, A2 Chain replaces public key infrastructure (PKI) algorithm with identity-based cryptography (IBC) algorithm to eliminate the management overhead caused by centralized authentication model.
APA, Harvard, Vancouver, ISO, and other styles
26

Brunello, Andrea, Paolo Gallo, Enrico Marzano, Angelo Montanari, and Nicola Vitacolonna. "An Event-Based Data Warehouse to Support Decisions in Multi-Channel, Multi-Service Contact Centers." Journal of Cases on Information Technology 21, no. 1 (2019): 33–51. http://dx.doi.org/10.4018/jcit.2019010103.

Full text
Abstract:
Multi-channel contact centers are an increasingly important component of today's business world. They serve as a primary customer-facing channel for firms in many different industries, and employ millions of operators across the globe. During their operation, they generate vast amounts of data, ranging from automatically registered logs to handwritten notes and voice recordings. Unfortunately, in most firms, data of interest is unstructured, and stored in several databases, making their exploitation very hard. This article presents a decision support system for a multi-channel, multi-service contact center for front office business process outsourcing, along with its prospective extension to a decision management system. Its core is an enterprise-wide data warehouse, based on the general concept of an event. The proposed system supports a broad new set of advanced analysis tasks, ranging from operator performance assessment to call-flow simulation and data mining, providing operational and management staff the basis for taking effective operative and strategic decisions.
APA, Harvard, Vancouver, ISO, and other styles
27

Stephanie, Weny, Yuliana, William Vincent, and Fahmi Sulaiman. "Pengaruh Kualitas Jasa terhadap Kepuasan Pelanggan di Prima Elektronik Medan." ARBITRASE: Journal of Economics and Accounting 2, no. 2 (2021): 40–45. http://dx.doi.org/10.47065/arbitrase.v2i2.283.

Full text
Abstract:
The increasing intensity of competition requires companies to always pay attention and try to meet the needs and desires of customers by providing better services than competitors. Service is defined as an appearance performance, intangible and quickly lost, more can be felt than owned, and consumers can directly consume the service. The best service quality will lead to customer satisfaction. In addition, creating and building consumer trust is also one of the most important factors in creating consumer loyalty. Loyalty leads to repeat purchases, recommendations, and an increased proportion of purchases. Prima Elektronik is a business entity engaged in computer and printer repair services for HP brand products (Hewlett Packard) and has been trusted to be an HP Service Center in Medan City. The purpose of this research is to determine the effect of Service Quality on Customer Satisfaction at Prima Elektronik Medan. The results show that service quality affects customer satisfaction at Prima Elektronik Medan. In R square (R2) shows the coefficient of determination is 67% where the Service Quality variable can explain the Customer Satisfaction variable, while the remaining 33% is explained by other variables not examined. by this research. As a suggestion, Prima Elektronik is expected to continue to improve the quality of services in order to achieve customer satisfaction so that organizational goals can be achieved
APA, Harvard, Vancouver, ISO, and other styles
28

Sun, Pingping, and Lingang Gu. "Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology." Complexity 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/4582838.

Full text
Abstract:
Based on the Internet of Things technology, this paper proposes building a cross-border e-commerce logistics supervision system and determines the evaluation index system from the overall framework design of the system, supply chain supervision process optimization, risk supervision optimization, and system order degree optimization. First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence contract, legal anonymous identity authentication, intelligent transaction matching, abnormal data analysis and detection, privacy protection, and traceability are realized under the framework of the supervision system. Then, the security analysis and transaction supervision component software are used to verify the security, control, and operating efficiency of the transaction supervision framework. Finally, in a real crowd sourcing logistics enterprise platform to run on the software component, the actual measurement, the measured results show that the proposed cross-border supervision system is safe and controllable, and electronic business logistics protects users and data privacy, prevents forgery and fraud, and realizes the user behavior and user data in addition to auditability and traceability.
APA, Harvard, Vancouver, ISO, and other styles
29

Manikandan, J., and Sri Lakshmi Uppalapati. "Critical Analysis on Detection and Mitigation of Security Vulnerabilities in Virtualization Data Centers." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3s (2023): 238–46. http://dx.doi.org/10.17762/ijritcc.v11i3s.6187.

Full text
Abstract:
There is an increasing demand for IT resources in growing business enterprises. Data center virtualization helps to meet this increasing demand by driving higher server utilization and utilizing un-used CPU cycles without causes much increase in new servers. Reduction in infrastructure complexities, Optimization of cost of IT system management, power and cooling are some of the additional benefits of virtualization. Virtualization also brings various security vulnerabilities. They are prone to attacks like hyperjacking, intrusion, data thefts, denial of service attacks on virtualized servers and web facing applications etc. This works identifies the security challenges in virtualization. A critical analysis on existing state of art works on detection and mitigation of various vulnerabilities is presented. The aim is to identify the open issues and propose prospective solutions in brief for these open issues.
APA, Harvard, Vancouver, ISO, and other styles
30

Liang, Chih-Chin, and Hsing Luh. "Solving two-dimensional Markov chain model for call centers." Industrial Management & Data Systems 115, no. 5 (2015): 901–22. http://dx.doi.org/10.1108/imds-12-2014-0363.

Full text
Abstract:
Purpose – The purpose of this paper is to develop a novel model of a call center that must treat calls with distinctly different service depending on whether they orginate from VIP or regular customers. VIP calls must be responded to immediately but regular calls can be routed to a retrial queue if the operators are busy. Design/methodology/approach – This study’s proposed model can easily reveal the optimal arrangement of operators while minimizing computational time and without losing any precision of the performance measure when dealing with a call center with more operators. Findings – Based on the results of the comparison between the exact method and the proposed approximation method, the approach shows that the larger the number of operators or inbound calls, the smaller the error between the two methods. Originality/value – This investigation presents a computational method and management cost function intended to identify the optimal number of operators for a call center. Because of computational limitations, many operators could not be easily analyzed using the exact method. For the manager of a call center, the sooner the optimal solution is found, the faster business strategies are deployed. This study develops an approximation method and compares it with the exact method.
APA, Harvard, Vancouver, ISO, and other styles
31

Dian Noviandri, Indra Hermawan, Agnita Yolanda, and Fahmi Sulaiman. "Upaya Peningkatan Kemampuan Penggunaan Microsoft Access Programming Bagi Pegawai Unit Usaha Bank Sumut Syariah." PaKMas: Jurnal Pengabdian Kepada Masyarakat 2, no. 1 (2022): 85–88. http://dx.doi.org/10.54259/pakmas.v2i1.822.

Full text
Abstract:
This training aims to improve the ability to use microsoft access programming for employees of the Bank Sumut Syariah business unit. This training was attended by all employees because this training is considered very important to support the performance of the employees. Currently, the Bank Sumut Syariah business unit has implemented technology based on Microsoft Access Programming in the context of carrying out all office activities. This training is carried out by means of socialization to employees, discussions, training and also direct practice of its use. The service activities for the Microsoft Access Programming Training have been carried out well. The service activity for the Microsoft Access Programming Training received an enthusiastic response from the participants of the Bank Sumut Syariah unit employees. Microsoft Access Programming training is carried out in stages and distributed in 14 meetings with a student center learning system and project based learning model so that employees can solve work problems with the skills that have been taught. Microsoft Access is a relational computer database application program that is used to design, create and process various types of data with large capacities. Database is a collection of related tables. Between tables with one another are related to each other, so it is often called a relational database. The relations between tables are connected by a key, namely the primary key and foreign key
APA, Harvard, Vancouver, ISO, and other styles
32

Trisnadoli, Anggy, Rika Perdana Sari, and Iqbal Setiawan. "Mobile Application Development Analysis for Cafe Reservations and Delivery Order." JURNAL TEKNIK INFORMATIKA 16, no. 2 (2023): 123–32. http://dx.doi.org/10.15408/jti.v16i2.25561.

Full text
Abstract:
Owning a cafe is one of a business that is currently trending in Indonesia, especially in Pekanbaru. With a wide range of cafes in Indonesia, it is directly proportional to the competition among the owners of a cafe. With the rapid development of technology, each cafe owner innovates a delivery order feature to compete with their competitors. They believe it will be a channel for business marketing to be efficient, fast, and sophisticated by providing delivery order features. The delivery order feature provides in two ways; call center by telephone and through an Android-based delivery order application offered by motorcycle taxi online. However, the weakness of using delivery orders through a mobile application is that there is an additional charge due to service fees and expensive shipping costs, which are burdensome to the customers. Regarding this, not having enough space also becomes a primary problem. For that matter, developing an Android application can make the customers easier to order food and drink online. In addition, customers can make reservations and order food or drinks simultaneously, which minimizes customers from running out of space.
APA, Harvard, Vancouver, ISO, and other styles
33

Song, Yujiao, Hao Wang, Xiaochao Wei, and Lei Wu. "Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud." Security and Communication Networks 2019 (May 23, 2019): 1–9. http://dx.doi.org/10.1155/2019/3249726.

Full text
Abstract:
Due to the rapid development of new technologies such as cloud computing, Internet of Things (IoT), and mobile Internet, the data volumes are exploding. Particularly, in the industrial field, a large amount of data is generated every day. How to manage and use industrial Big Data primely is a thorny challenge for every industrial enterprise manager. As an emerging form of service, cloud computing technology provides a good solution. It receives more and more attention and support due to its flexible configuration, on-demand purchase, and easy maintenance. Using cloud technology, enterprises get rid of the heavy data management work and concentrate on their main business. Although cloud technology has many advantages, there are still many problems in terms of security and privacy. To protect the confidentiality of the data, the mainstream solution is encrypting data before uploading. In order to achieve flexible access control to encrypted data, attribute-based encryption (ABE) is an outstanding candidate. At present, more and more applications are using ABE to ensure data security. However, the privacy protection issues during the key generation phase are not considered in the current ABE systems. That is to say, the key generation center (KGC) knows both of attributes and corresponding keys of each user. This problem is especially serious in the industrial big data scenario, because it will cause great damage to the business secrets of industrial enterprises. In this paper, we design a new ABE scheme that protects user’s privacy during key issuing. In our new scheme, we separate the functionality of attribute auditing and key generating to ensure that the KGC cannot know user’s attributes and that the attribute auditing center (AAC) cannot obtain the user’s secret key. This is ideal for many privacy-sensitive scenarios, such as industrial big data scenario.
APA, Harvard, Vancouver, ISO, and other styles
34

Lu, Fuqiang, Runxue Jiang, Hualing Bi, and Zhiyuan Gao. "Order Distribution and Routing Optimization for Takeout Delivery under Drone–Rider Joint Delivery Mode." Journal of Theoretical and Applied Electronic Commerce Research 19, no. 2 (2024): 774–96. http://dx.doi.org/10.3390/jtaer19020041.

Full text
Abstract:
Order distribution and routing optimization of takeout delivery is a challenging research topic in the field of e-commerce. In this paper, we propose a drone–rider joint delivery mode with multi-distribution center collaboration for the problems of limited-service range, unreasonable distribution, high delivery cost, and tight time windows in the takeout delivery process. The model is constructed with the minimum delivery cost and the overall maximum customer satisfaction as the objective function, and a two-stage heuristic algorithm is designed to solve the model. In the first stage, Euclidean distance is used to classify customers into the regions belonging to different distribution centers, and the affinity propagation (AP) clustering algorithm is applied to allocate orders from different distribution centers. The second stage uses an improved tabu search algorithm for route optimization based on specifying the number of rider and drone calls. This paper takes China’s Ele.me and Meituan takeout as the reference object and uses the Solomon data set for research. The experimental results show that compared with the traditional rider delivery mode, the drone–rider joint delivery mode with multiple distribution center collaboration can effectively reduce the number of riders used, lower the delivery cost, and improve the overall customer satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
35

Dewi, Nyoman Ayu Nila, and A. A. Ngurah Bima Prasatria. "Service Level Management of Information Technology and System in ITB STIKOM Bali." CommIT (Communication and Information Technology) Journal 15, no. 2 (2021): 57–64. http://dx.doi.org/10.21512/commit.v15i2.6895.

Full text
Abstract:
ITB STIKOM Bali is a technology-based university so that all business processes, especially related to academics, student affairs, and finance, utilize information technology. Management of the information system and technology is carried out by the Computer and Network Center unit (Pusat Komputer dan Jaringan - PUSKOMJAR). In the management of Information Technology (IT) services, an agreement is needed in the form of Service Level Management (SLM) which contains the level of service, quality of service, and complaints handling, so users’ needs are aligned with the system developer. Meanwhile, in managing the internal system of ITB STIKOM Bali, the agreement between PUSKOMJAR and related units is only in the form of submitting a form for making or changing the system. Therefore, it raises a problem if there is a mismatch in the manufacture or development of the system because there is no contract document that regulates in detail about the system. Hence, designing an SLM of IT and system services at ITB STIKOM Bali to overcome these problems is necessary. The research presents a case study by analyzing and designing the SLM of service system and IT in ITB STIKOM Bali. The applied research method is literature study and observation, analysis of existing SLM, designing new SLM, and conclusions. The result of the research is a document of SLM for internal IT and system services at ITB STIKOM Bali. Based on the analysis and design of SLM, the SLM document can help the PUSKOMJAR in documenting IT service information and making it easier for users to get information related to the provided IT services.
APA, Harvard, Vancouver, ISO, and other styles
36

Surantha, Nico, Felix Ivan, and Ritchie Chandra. "A case analysis for Kubernetes network security of financial service industry in Indonesia using zero trust model." Bulletin of Electrical Engineering and Informatics 12, no. 5 (2023): 3134–41. http://dx.doi.org/10.11591/eei.v12i5.4240.

Full text
Abstract:
In this study, a case analysis of Kubernetes application in an enterprise providing financial services in Indonesia is presented. It is implemented to improve their digital services-based application, developed using micro-services architecture. Kubernetes, an application container technology, has been applied in the enterprise providing financial services in Indonesia to improve their digital services-based application, developed using micro-services architecture concepts. Without incorporating any additional hardware, the new technology and services have been adopted to existing virtualized resources of the enterprise. An infrastructure design for secure Kubernetes networking was built and has been studied using the data center provided by the enterprise. This study focuses on two important aspects: network and security. As a security guideline, the network recommendations from VMware, Cisco, and Forrester’s zero trust model were employed to design the infrastructure and were evaluated. The proposed secure network infrastructure design is successfully applied in the container networks using the zero trust requirement, the enterprise’s requirements, and constraints. And we hope this study about network design security can be used and adaptable with existing network and reduce risk and disruption to the business caused by the network.
APA, Harvard, Vancouver, ISO, and other styles
37

Abramov, Sergey, and Nikolay Sluka. "Geoinformation support for studying the location of foreign TNC in global cities." InterCarto. InterGIS 27, no. 1 (2021): 205–17. http://dx.doi.org/10.35595/2414-9179-2021-1-27-205-217.

Full text
Abstract:
The article discusses the experience of assessing the location of foreign TNCs in global cities as a significant factor in the field of environmental, economic and social aspects of sustainable development of urban areas. A number of initial theoretical models are proposed from the standpoint of the center-peripheral approach and a conceptual scheme of geoinformation and cartographic support of the study is presented, the main stages of its implementation are revealed. The databases of the European Commission’s Joint Research Center (GHS Urban Center Database, GHS-UCDB) and (GHS Functional Urban Areas, GHS-FUA) were used to get an idea of the real models of the intracity location of large business in the delimitation of the boundaries of agglomerations and their separate zones. To determine the composition of TNC divisions, Forbes 2000 data for 2020 and information from corporate websites on the branch network with geographic reference from the Craft.co reference service were used. In total, 55 global cities of the alpha group and more than 12 thousand foreign branches of TNCs were involved in the analysis. The processing and systematization of the obtained data was carried out using the object-relational database management system (RDBMS) PostgreSQL and the PostGIS extension. The visualization of the research results based on the consolidation of tabular data and spatial relationships using QGIS. Comparative analysis showed the effectiveness of the developed technique. As a result of its application, the overall scale of the presence of big business in the global cities of the alpha group and a significant gap between leaders and outsiders were determined. The absence of a universal model for the zonal distribution of TNCs in the urban space was revealed, the basic invariants of which were visualized using the example of a number of centers. The presented developments can contribute to the development of the direction of microgeographic research in geo-urban studies. In practice, the methodology can be useful for modernizing the assessment of the quality of the urban environment and the conditions for its formation as part of the implementation in the Russian Federation of the national project “Housing and Urban Environment”.
APA, Harvard, Vancouver, ISO, and other styles
38

Kraus, Sarit, Yaniv Oshrat, Yonatan Aumann, et al. "Customer Service Combining Human Operators and Virtual Agents: A Call for Multidisciplinary AI Research." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 13 (2023): 15393–401. http://dx.doi.org/10.1609/aaai.v37i13.26795.

Full text
Abstract:
The use of virtual agents (bots) has become essential for providing online assistance to customers. However, even though a lot of effort has been dedicated to the research, development, and deployment of such virtual agents, customers are frequently frustrated with the interaction with the virtual agent and require a human instead. We suggest that a holistic approach, combining virtual agents and human operators working together, is the path to providing satisfactory service. However, implementing such a holistic customer service system will not, and cannot, be achieved using any single AI technology or branch. Rather, such a system will inevitably require the integration of multiple and diverse AI technologies, including natural language processing, multi-agent systems, machine learning, reinforcement learning, and behavioral cloning; in addition to integration with other disciplines such as psychology, business, sociology, economics, operation research, informatics, computer-human interaction, and more. As such, we believe this customer service application offers a rich domain for experimentation and application of multidisciplinary AI. In this paper, we introduce the holistic customer service application and discuss the key AI technologies and disciplines required for a successful AI solution for this setting. For each of these AI technologies, we outline the key scientific questions and research avenues stemming from this setting. We demonstrate that integrating technologies from different fields can lead to a cost-effective successful customer service center. The challenge is that there is a need for several communities, each with its own language and modeling techniques, different problem-solving methods, and different evaluation methodologies, all of which need to work together. Real cooperation will require the formation of joint methodologies and techniques that could improve the service to customers, but, more importantly, open new directions in cooperation of diverse communities toward solving joint difficult tasks.
APA, Harvard, Vancouver, ISO, and other styles
39

Hornik, Jacob, Chezy Ofir, Matti Rachamim, and Sergei Graguer. "Fog Computing-Based Smart Consumer Recommender Systems." Journal of Theoretical and Applied Electronic Commerce Research 19, no. 1 (2024): 597–614. http://dx.doi.org/10.3390/jtaer19010032.

Full text
Abstract:
The latest effort in delivering computing resources as a service to managers and consumers represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to users over the internet from large-scale data centers. However, with the advent of the cloud-based IoT and artificial intelligence (AI), which are advancing customer experience automations in many application areas, such as recommender systems (RS), a need has arisen for various modifications to support the IoT devices that are at the center of the automation world, including recent language models like ChatGPT and Bard and technologies like nanotechnology. This paper introduces the marketing community to a recent computing development: IoT-driven fog computing (FC). Although numerous research studies have been published on FC “smart” applications, none hitherto have been conducted on fog-based smart marketing domains such as recommender systems. FC is considered a novel computational system, which can mitigate latency and improve bandwidth utilization for autonomous consumer behavior applications requiring real-time data-driven decision making. This paper provides a conceptual framework for studying the effects of fog computing on consumer behavior, with the goal of stimulating future research by using, as an example, the intersection of FC and RS. Indeed, our conceptualization of the “fog-based recommender systems” opens many novel and challenging avenues for academic research, some of which are highlighted in the later part of this paper.
APA, Harvard, Vancouver, ISO, and other styles
40

Citra Utami, Dina Septiningtyas, Lisherly R Debataraja, Tetra Oktaviani, and Fahrizal Zulkarnain. "Mapping the Distribution of High Buildings in West Medan Subdistrict Using Geographic Information System (GIS)." Jurnal Inotera 9, no. 2 (2024): 536–43. https://doi.org/10.31572/inotera.vol9.iss2.2024.id426.

Full text
Abstract:
Cities are one of the main centers for the development of urban areas. The opportunity for investment activities in a city is one of the biggest pull factors for migration. Medan's rapid development can be seen from the construction of many tall buildings such as malls, apartments, and offices. The granting of permits for the construction of these high-rise buildings is closely related to urban spatial planning. Medan City does not yet have a 3D map of the distribution of high-rise buildings, there is only data on the number and location of high-rise buildings. Therefore, urban spatial mapping of high-rise buildings is needed. The model in this research uses a GIS computer model integrated in Arcgis software by taking the object of West Medan sub-district. The results of this study are the suitability of the distribution of tall buildings with a fairly dense uniform pattern in the West Medan sub-district where this sub-district is indeed a service center for trade/business, services and provincial and municipal government activities, and the economy
APA, Harvard, Vancouver, ISO, and other styles
41

Qasim, T. Zaidi. "The Case of Exchange Logs – A Deep Dive." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 11–17. https://doi.org/10.5281/zenodo.7842176.

Full text
Abstract:
<strong>Abstract:</strong> This article gives you important guidelines for analyzing the logs of Microsoft Exchange Servers. Microsoft Exchange Server is an On-Premises email service which is often deployed by large organizations to have autonomy over business communication. Logs are an important part of any Information Technology&rsquo;s analysis of any tracking, troubleshooting, and incident handling; email server logs analysis is key to getting to the bottom line faster and more efficiently. While not all logs are useful, some can be very handy for any case and email administrator may be working on. This research paper dives into those critical logs of Exchange Server which every administrator must be familiar with. <strong>Keywords:</strong> Exchange Server Logs, Log Analysis, Email Service troubleshooting, Client Connectivity, Exchange Commandlet History, Exchange Admin Center. <strong>Title:</strong> The Case of Exchange Logs &ndash; A Deep Dive <strong>Author:</strong> Qasim T. Zaidi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 2, April 2023 - June 2023</strong> <strong>Page No: 11-17</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 18-April-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7842176</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/the-case-of-exchange-logs--a-deep-dive</strong>
APA, Harvard, Vancouver, ISO, and other styles
42

Kurniawansyah, Kevin, Noneng Marthiawati. H, and Anita Puspita Sari. "Analysis and Design of Information Systems for Lecturer Performance Reports at Jambi Muhammadiyah University." Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer dan Teknologi Informasi 8, no. 2 (2022): 69. http://dx.doi.org/10.24014/coreit.v8i2.19874.

Full text
Abstract:
In a tertiary institution, the existence of lecturers is needed to carry out the tridharma activities of higher education and it is the responsibility of the lecturers themselves. Higher Education Tridharma covers Education, Research and Service. There are several problems that researchers see related to the performance of lecturers, especially for the University of Muhammadiyah Jambi Higher Education. So far, the processing of lecturer performance data at the University of Muhammadiyah Jambi is carried out conventionally, namely inputting data into Microsoft Excel by the admin on duty and additional files that have been submitted by each lecturer are simply stored on the computer without a data center or centralized data storage. . The purpose of this study is to analyze and design a lecturer performance report information system that is able to simplify business processes, use lecturer performance reports according to needs and process lecturer performance data which includes identity data, lecturer tridharma data, and other supporting data more effectively and efficiently by system prototyping method that produces a web-based lecturer performance report information system at the Muhammadiyah University of Jambi to overcome existing problems
APA, Harvard, Vancouver, ISO, and other styles
43

Mohammed, Israa H., Tariq N. Ataiwe, and Hisham Al Sharaa. "Accuracy Assessment of a Variety of GPS Data Processing, Online Services and Software." Geomatics and Environmental Engineering 15, no. 4 (2021): 5–19. http://dx.doi.org/10.7494/geom.2021.15.4.5.

Full text
Abstract:
The processing of GPS observations in precise positioning is complex and requires professional surveyors since it must be carried out after each static measurement. In GPS network adjustment, the obtaining of the correct coordinates of the determined point is possible after determining the components of GPS vectors and aligning the networks of these vectors, while PPP requires the availability of precise products for the reference satellites orbits and clock. For that reason, surveyors can take advantage of free online GPS data processing. In this paper, the authors compare the results obtained from different sources of free online GPS data processing (AUSPOS, OPUS, CenterPoint RTX, APPS, MagicGNSS, CSRS-PPP, GAPS, and SCOUT) in terms of their accuracy, availability, and operation. This is then compared with free GPS processing software (gLAB and RTKLIB), and finally with commercial software (TBC Trimble Business Center). The results show that online processing services are more accurate than offline processing software, which indicates the strength of their algorithms and processes. The CSRS-PPP online service had the best results. The difference between the relative solution of AUSPOS and OPUS, and CSRS-PPP is insignificant.
APA, Harvard, Vancouver, ISO, and other styles
44

Suprihadi, Suprihadi, Radius Tanone, and Rudy Latuperissa. "IPTEKS BAGI MASYARAKAT DESA MLATIHARJO MENUJU PENGELOLAAN KOMODITAS DESA BERBASIS DIGITAL." CCIT Journal 11, no. 2 (2018): 143–57. http://dx.doi.org/10.33050/ccit.v11i2.583.

Full text
Abstract:
Mlatiharjo is a village in Demak District, Central Java province, it has been well-known as an innovative village because of their various innovations especially in high quality (supreme) seed varieties of fruit and rice. In order to support the production and cultivation of those commodities, information management has been employed but still in simple ways and doesn’t have any information system yet, therefore it often causes mistake in their production estimation. It will impact to their sales service of their commodities toward the buyer, particularly the customer. Another problem is Mlatiharjo’s farmer group does not have any information exchange medium to interact with other business actors who comes from outside their area, whereas those outsider-business actors will buy their product with a higher price. Mlatiharjo’s IbM Program aims to build an Information System which is able to manage the information of Mlatiharjo’s commodities production, especially in farming production. The method employed for developing the system is Prototyping. Meanwhile, the transfer of technology employs mentoring process for the client of program through conducting focus group discussion, workshop dan training. This Commodity Information System is implemented into two kinds of computer application. Firstly, web application that is used for managing the data center and share it to the public who want to capture the information of the mlatiharjo’s product. Secondly, android based mobile application utilized by the farmer who has become a member of cluster-farming group to input the location area mapping data and progress report of production data and also provide a discussion forum among member of the system. The Web Application is built using PHP and the database used MySQL. Mobile Application is implemented using Java Android. As a result, Tani Mahardika Cluster and KSU Citra Kinaraya – Mlatiharjo have a digital-based system to manage their Commodity in order to encourage and strengthen business-production institution through Commodity Information System
APA, Harvard, Vancouver, ISO, and other styles
45

Diah Damayanti, Dida, Nia Novitasari, Erlangga Bayu Setyawan, and Prafajar Suksessanno Muttaqin. "Intelligent Warehouse Picking Improvement Model for e-Logistics Warehouse Using Single Picker Routing Problem and Wave Picking." JOIV : International Journal on Informatics Visualization 6, no. 2 (2022): 418. http://dx.doi.org/10.30630/joiv.6.2.1006.

Full text
Abstract:
Abstract— The development and use of technological innovations have changed people's behavior from an industrial society to an information society. It can be seen in the increase in people's consumption patterns from trading through physical stores (offline) to trading through electronic systems, often referred to as e-commerce. Logistics services are distribution actors in the downstream line which are tasked with delivering products from the fulfillment center from e-commerce to the end customer. The uncertainty of the number of requests is the biggest challenge for logistics service players. The growth of e-commerce has also led to an increase in sales volume in e-commerce which has given rise to a new generation of warehouses that are specifically tailored to the special needs of online retailers who directly serve the demands of end-customers in the business-to-consumer (B2C) segment. Traditional warehousing systems cannot handle orders with the characteristics of many transactions but smaller sizes. In addition, warehouses that handle e-commerce are also required to have a fast process in the warehouse because shipments must be made on the same day. In this study, the author aims to perform calculations to find the optimal order picking time in the warehouse, so orders in e-commerce can be processed faster by comparing the picking process time using ordinary Single Picker Routing Problem (SPRP) and combined with the concept of wave picking using Genetic Algorithm (GA). Based on a theoretical study in this paper, the combination between SPRP and wave picking can reduce 42.28% picking time.
APA, Harvard, Vancouver, ISO, and other styles
46

Baihaqi Siregar, Erna B Nababan, and Opim S Sitompul. "ANALYSIS OF FACTORS CAUSING THE PRODUCT PURCHASED BY CONSUMERS BASED ON DATA ON THE SALE OF GOODS IN A MARKET PLACE IN INDONESIA." ABDIMAS TALENTA: Jurnal Pengabdian Kepada Masyarakat 3, no. 1 (2018): 48–53. http://dx.doi.org/10.32734/abdimastalenta.v3i1.2337.

Full text
Abstract:
Starting from the success of giant web service companies as well as Google and Facebook in managing and utilizing unstructured data in the form of consumer generated media and click stream in a very large volume, a concept known as Big Data then became the center attention in the world of information technology. The fact also shows that more and more organizations in the world, whether private companies or government agencies, have difficulty managing data whose volumes are growing and their types are increasingly complex. They have to organize and analyze these data, and they must find the meaning or value of the ever-expanding and increasingly complex data pile, which is said to have exceeded the capability of conventional data processing applications to process it. The condition of this kind of data is also categorized as Big Data, which is interpreted as a set of data in a very large number of challenges lies in how the data should be stored, how to search in the pile of data, how to distribute it, how to visualize it, and how the data should be analyzed. The long-term goal of IbKIK's proposed program is the establishment of a startup company in the field of analytic data from the world of campus directly. Within the planned three-year period, it is desirable that the company be financially self-sufficient by being a data analytics consultant and also creating a sophisticated and advanced Big Data Analytic application platform product. The advantages possessed when the company started from the academic world is the quantity and quality of human resources as intellectual actors can be selected quickly and accurately. Especially with the synchronization between the curriculum content that is taught with its implementation directly through the program IbKIK become useful products and economic value. From the academic point of view, the desired outcomes are from this program published several journals and proceedings of national and international scale, the publication of textbooks, getting HKI, and publications in the mass media. Also, with the success of this company can produce a derivative company engaged in other areas that are still related as a supporter of the business. The product output of the community service activity that has been done for the first year of the planned three years period is the establishment of a Product Information System Sold on E-Commerce Transactions at Market Place. Also, has been established research unit as the forerunner of the business unit under the auspices of the Faculty of Computer Science and Information Technology University of Sumatera Utara under the name Data Science Research Group.
APA, Harvard, Vancouver, ISO, and other styles
47

AL-Momani, Mohammad Omar, and Insaf George Alrabadi. "Requirements For The Application Of Total Quality In The University Educational System In Light Of The Information And Technological Revolution." Científic@ - Multidisciplinary Journal 10, no. 1 (2023): 1–20. http://dx.doi.org/10.37951/2358-260x.2023v10i1.6494.

Full text
Abstract:
Background: We live today in a very complex and changing world. We are all at the center of the event, and no one can be isolated from this huge development in human knowledge. Knowledge flows like a waterfall, and change is rapid, and the invasion of cultures is dangerous, and informatics has swept away every belief that calls for backwardness that chained humanity. With its restrictions for centuries, education is no longer a service issue but a national security issue, and investment in people is linked to the development of the people’s productive, economic and military capabilities, and the issue has become the preparation and rehabilitation of capable youth armed with science, knowledge and technology.&#x0D; Purpose: This study aims to identify the requirements for the application of total quality in the university educational system in light of the information and technological revolution.&#x0D; Methods: The qualitative analytical descriptive approach was used, the limitations of which are limited to higher education institutions.&#x0D; Results: The study concluded the need for a feasible and effective educational system, centered on the student through his interaction and active participation, in which computer technologies and information and communication technology represented in local networks and the global Internet play a promising role based on the concept and philosophy of total quality in education.&#x0D; Conclusions: We conclude that the nature of modern business requires educational and academic institutions to prepare students with a different set of skills other than those adopted by the old education system; The shape of educational institutions will be very different from what it is now, and the shape of the classroom will differ so that there will be a computer for each student, and departments in faculties will be able to communicate with different libraries to get what they want from references, scientific materials or educational software, and the shape of the course will differ from the usual It is likely that it will be replaced by a floppy or optical disk, and there will be a new type of teacher and students.
APA, Harvard, Vancouver, ISO, and other styles
48

Zhu, Yong, Xiao Wu, and Zhihui Hu. "Fine Grained Access Control Based on Smart Contract for Edge Computing." Electronics 11, no. 1 (2022): 167. http://dx.doi.org/10.3390/electronics11010167.

Full text
Abstract:
Traditional centralized access control faces data security and privacy problems. The core server is the main target to attack. Single point of failure risk and load bottleneck are difficult to solve effectively. And the third-party data center cannot protect data owners. Traditional distributed access control faces the problem of how to effectively solve the scalability and diversified requirements of IoT (Internet of Things) applications. SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control). It can be applied to various types of nodes in different application scenarios that attributes are used as basic decision elements and authorized by role. The research objective is to combine the efficiency of service orchestration in edge computing with the security of consensus mechanism in blockchain, making full use of smart contract programmability to explore fine grained access control mode on the basis of traditional access control paradigm. By designing SSH-based interface for edge computing and blockchain access, SCAC parameters can be found and set to adjust ACLs (Access Control List) and their policies. The blockchain-edge computing combination is powerful in causing significant transformations across several industries, paving the way for new business models and novel decentralized applications. The rationality on typical process behavior of management services and data access control be verified through CPN (Color Petri Net) tools 4.0, and then data statistics on fine grained access control, decentralized scalability, and lightweight deployment can be obtained by instance running in this study. The results show that authorization takes into account both security and efficiency with the “blockchain-edge computing” combination.
APA, Harvard, Vancouver, ISO, and other styles
49

Pransky, Joanne. "The Pransky interview: Dr William “Red” Whittaker, Robotics Pioneer, Professor, Entrepreneur." Industrial Robot: An International Journal 43, no. 4 (2016): 349–53. http://dx.doi.org/10.1108/ir-04-2016-0124.

Full text
Abstract:
Purpose The following paper details a “Q&amp;A interview” conducted by Joanne Pransky, Associate Editor of Industrial Robot Journal, to impart the combined technological, business and personal experience of a prominent, robotic industry engineer-turned successful business leader, regarding the commercialization and challenges of bringing technological inventions to the market while overseeing a company. The paper aims to discuss these issues. Design/methodology/approach The interviewee is Dr William “Red” Whittaker, Fredkin Research Professor of Robotics, Robotics Institute, Carnegie Mellon University (CMU); CEO of Astrobotic Technology; and President of Workhorse Technologies. Dr Whittaker provides answers to questions regarding the pioneering experiences of some of his technological wonders in land, sea, air, underwater, underground and space. Findings As a child, Dr Whittaker built things and made them work and dreamed about space and robots. He has since then turned his dreams, and those of the world, into realities. Dr Whittaker’s formal education includes a BS degree in civil engineering from Princeton and MS and PhD degrees in civil engineering from CMU. In response to designing a robot to cleanup radioactive material at the Three Mile Island nuclear plant, Dr Whittaker established the Field Robotics Center (FRC) in 1983. He is also the founder of the National Robotics Engineering Center, an operating unit within CMU’s Robotics Institute (RI), the world’s largest robotics research and development organization. Dr Whittaker has developed more than 60 robots, breaking new ground in autonomous vehicles, field robotics, space exploration, mining and agriculture. Dr Whittaker’s research addresses computer architectures for robots, modeling and planning for non-repetitive tasks, complex problems of objective sensing in random and dynamic environments and integration of complete robot systems. His current focus is Astrobotic Technology, a CMU spin-off firm that is developing space robotics technology to support planetary missions. Dr Whittaker is competing for the US$20m Google Lunar XPRIZE for privately landing a robot on the Moon. Originality/value Dr Whittaker coined the term “field robotics” to describe his research that centers on robots in unconstrained, uncontrived settings, typically outdoors and in the full range of operational and environmental conditions: robotics in the “natural” world. The Field Robotics Center has been one of the most successful initiatives within the entire robotics industry. As the Father of Field Robotics, Dr Whittaker has pioneered locomotion technologies, navigation and route-planning methods and advanced sensing systems. He has directed over US$100m worth of research programs and spearheaded several world-class robotic explorations and operations with significant outreach, education and technology commercializations. His ground vehicles have driven thousands of autonomous miles. Dr Whittaker won DARPA’s US$2m Urban Challenge. His Humvees finished second and third in the 2005 DARPA’s Grand race Challenge desert race. Other robot projects have included: Dante II, a walking robot that explored an active volcano; Nomad, which searched for meteorites in Antarctica; and Tugbot, which surveyed a 1,800-acre area of Nevada for buried hazards. Dr Whittaker is a member of the National Academy of Engineering. He is a fellow of the American Association for Artificial Intelligence and served on the National Academy of Sciences Space Studies Board. Dr Whittaker received the Alan Newell Medal for Research Excellence. He received Carnegie Mellon’s Teare Award for Teaching Excellence. He received the Joseph Engelberger Award for Outstanding Achievement in Robotics, the Advancement of Artificial Intelligence’s inaugural Feigenbaum Prize for his contributions to machine intelligence, the Institute of Electrical and Electronics Engineers Simon Ramo Medal, the American Society of Civil Engineers Columbia Medal, the Antarctic Service Medal and the American Spirit Honor Medal. Science Digest named Dr Whittaker one of the top 100 US innovators for his work in robotics. He has been recognized by Aviation Week &amp; Space Technology and Design News magazines for outstanding achievement. Fortune named him a “Hero of US Manufacturing”. Dr Whittaker has advised 26 PhD students, has 16 patents and has authored over 200 publications. Dr Whittaker’s vision is to drive nanobiologics technology to fulfillment and create nanorobotic agents for enterprise on Earth and beyond (Figure 1).
APA, Harvard, Vancouver, ISO, and other styles
50

Muradi, Dadi, and Isdaryanto Iskandar. "OPTIMIZING THE HANDLING OF NATIONAL ROAD PRESERVATION IN BANGKA BELITUNG PROVINCE USING THE INTEGRATED ROAD MANAGEMENT SYSTEM (IRMS) EBUDGETING PROGRAM." International Journal of Engineering Applied Sciences and Technology 7, no. 5 (2022): 177–80. http://dx.doi.org/10.33564/ijeast.2022.v07i05.029.

Full text
Abstract:
In order to meet the service level of the national road network following with the current needs and future needs by optimizing the smallest costs and risks, the Directorate General of Bina Marga in the Ministry of Public Works and Public Housing uses a decision support tool, namely IRMS-V3 in the overall business process of programming and budgeting of road network preservation. This study aimed to determine the handling of Road Preservation in Bangka Belitung Province, assisted by the Integrated Road Management System (IRMS) e-budgeting Program. From the running result, it will be seen that the road preservation management program was in accordance with the provided funding limit and the road stability target. Data from field surveys, unit prices of work, and the accuracy of validated fieldwork history information were needed to ensure consistency of programming outputs by the IRMS-V3 program. The IRMS-V3 e-budgeting program was used to optimize the strategic planning process for road network preservation, programming, and budgeting for the preservation of the national road network, as well as being one of the supporting tools for decision-making at Bangka Belitung National Road Implementation Center to support the achievement of the national road stability target for Bina Marga Strategic Plan, Ministry of Public Works and Public Housing. In order to calculate road handling following the indicative ceiling, the IRMS program used. Researchers need to conducted calculations to keep the road stability in good condition to avoid decline. The running results showed that the handling was more appropriate. If you want to achieve 100% stability, then a road preservation ceiling fund of 955,996,704,278 was established to achieved maximum stability.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!