1,155 research outputs found
Automation and Management Accounting in British Manufacturing and Retail Financial Services, 1945-1968
This article looks at the effects of office mechanisation in greater detail by describing data processing innovations in major building societies during the dawn of the computer era. Reference to similar developments in clearing banks, industrial and computer organisations provides evidence as to the common experience in the computerisation of firms in the post-war years. As a result, research in this article offers a comparison between widespread technological change and changes unique to service sector organisations. Moreover, research in this article ascertains the extent to which the adoption of computer-related innovations in financial services sought to satisfy financial, rather than management accounting, purposes.banks, building societies, manufacturing, computers
Single Slice Grouping Mechanism for Recognition of Cursive Handwritten Courtesy Amounts of Malaysian Bank Cheques
Mechanism to group single slice for recognition involves the process of cutting
vertically across an image slice by slice, group every slice at a certain width and
tested for recognition using a trained Neural network. The image contains
cursive handwritten courtesy Amounts of Malaysian bank cheques. A three layer
neural Network architecture with the new error function of Backpropagation
learning algorithm is used. This approach yields good recognition results with
faster convergence rates
Satisfiability of General Intruder Constraints with and without a Set Constructor
Many decision problems on security protocols can be reduced to solving
so-called intruder constraints in Dolev Yao model. Most constraint solving
procedures for protocol security rely on two properties of constraint systems
called monotonicity and variable origination. In this work we relax these
restrictions by giving a decision procedure for solving general intruder
constraints (that do not have these properties) that stays in NP. Our result
extends a first work by L. Mazar\'e in several directions: we allow non-atomic
keys, and an associative, commutative and idempotent symbol (for modeling
sets). We also discuss several new applications of the results.Comment: Submitted to the Special issue of Information and Computation on
Security and Rewriting Techniques (SecReT), 2011. 59 page
Usability context analysis: a practical guide
The usability of a product is affected not only by the features of the product itself, but also by the characteristics of the users, the tasks they are carrying out, and the technical, organisational and physical environment in which the product is used. In this guide, we use the term 'context' to include all factors which affect the usability of the product, excluding the features of the product itself. We use the term 'product' to represent any interactive system or device designed to support the performance of users' tasks
Local Housing Allowance Final Evaluation: The qualitative evidence of claimantsâ experience in the nine pathfinder areas
The Department for Work and Pensions (DWP) has commissioned an evaluation of Local Housing
Allowance (LHA) in nine local authorities, or Pathfinder areas. The evaluation design includes two waves of
qualitative interviews with claimants. This report presents the findings from the second wave of interviews
- âŠ