1,155 research outputs found

    Automation and Management Accounting in British Manufacturing and Retail Financial Services, 1945-1968

    Get PDF
    This article looks at the effects of office mechanisation in greater detail by describing data processing innovations in major building societies during the dawn of the computer era. Reference to similar developments in clearing banks, industrial and computer organisations provides evidence as to the common experience in the computerisation of firms in the post-war years. As a result, research in this article offers a comparison between widespread technological change and changes unique to service sector organisations. Moreover, research in this article ascertains the extent to which the adoption of computer-related innovations in financial services sought to satisfy financial, rather than management accounting, purposes.banks, building societies, manufacturing, computers

    Single Slice Grouping Mechanism for Recognition of Cursive Handwritten Courtesy Amounts of Malaysian Bank Cheques

    Get PDF
    Mechanism to group single slice for recognition involves the process of cutting vertically across an image slice by slice, group every slice at a certain width and tested for recognition using a trained Neural network. The image contains cursive handwritten courtesy Amounts of Malaysian bank cheques. A three layer neural Network architecture with the new error function of Backpropagation learning algorithm is used. This approach yields good recognition results with faster convergence rates

    Satisfiability of General Intruder Constraints with and without a Set Constructor

    Get PDF
    Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of constraint systems called monotonicity and variable origination. In this work we relax these restrictions by giving a decision procedure for solving general intruder constraints (that do not have these properties) that stays in NP. Our result extends a first work by L. Mazar\'e in several directions: we allow non-atomic keys, and an associative, commutative and idempotent symbol (for modeling sets). We also discuss several new applications of the results.Comment: Submitted to the Special issue of Information and Computation on Security and Rewriting Techniques (SecReT), 2011. 59 page

    The E.F.T. Debit Card

    Get PDF

    Usability context analysis: a practical guide

    Get PDF
    The usability of a product is affected not only by the features of the product itself, but also by the characteristics of the users, the tasks they are carrying out, and the technical, organisational and physical environment in which the product is used. In this guide, we use the term 'context' to include all factors which affect the usability of the product, excluding the features of the product itself. We use the term 'product' to represent any interactive system or device designed to support the performance of users' tasks

    The E.F.T. Debit Card

    Get PDF

    Local Housing Allowance Final Evaluation: The qualitative evidence of claimants’ experience in the nine pathfinder areas

    Get PDF
    The Department for Work and Pensions (DWP) has commissioned an evaluation of Local Housing Allowance (LHA) in nine local authorities, or Pathfinder areas. The evaluation design includes two waves of qualitative interviews with claimants. This report presents the findings from the second wave of interviews
    • 

    corecore