1,237 research outputs found

    Efficient Maxima-Finding Algorithms for Random Planar Samples

    Get PDF
    this paper a simple classification of several known algorithms for finding the maxima, together with several new algorithms; among these are two efficient algorithms---one with expected complexity n +O( # nlogn) when the point samples are issued from some planar regions, and another more efficient than existing one

    Communications and Interfaces in Implementation of e-Bid System: A Case Study for Governmental Procurement in EC

    Get PDF
    While the computer network is very popular in many applications, anything is always electronically rebuilt to pursue higher value. This is an era of information technology, computers and networks are linked together to reform the society, all fields of business administration are generally reengineering through the adoption of information and technology. One of the new requirements is the bid system operated in Internets. Because the huge cost and inconvenience in managing paper-based bid system, e-bid system is then required. A research team of professors is formed and get the grant from National Science Council (NSC) to design and implement the e-bid system for three years. The objective is to develop an e-bid system with features of fairness, justice and opening. This paper explains overall design of the e-bid system; all tasks in development of e-bid system are partitioned to five subprojects. The functions of interfaces and communications are in charge by us, we have the primary concern to design and implement an easy and friendly operational interfaces and secure communications for external users. With three basic characteristics of the proposed e-bid system, we hope that the proposed e-bid system may be applicable for all governmental procurements

    The Functionality Discussion with LTE Simulator for Emergency Disaster-Resilient Network Systems

    Get PDF
    The emergency communication system is a critical factor of any disaster rescue operation. Emergency communication based on an LTE system provides an evolution path toward broadband capabilities for existing and new public safety networks. The development of an LTE communication simulator is aimed at improving the performance of radio access. However, backhaul network such as base station and satellite-based relay would cause limited communication resources to hamper the rescue operation process. In this paper, we discuss the problems of disaster relief communication systems and investigate the requirements in the disaster scenario. Based on the previous LTE simulator comparison and the requirement of emergency communication, five functionalities are discussed that include disaster-oriented network management, mobility/user management, radio resource management, disaster-oriented flow management, and modeling framework. These five functionalities can help to evaluate overall resource management after disaster relief. The paper also conducted an offloading simulation to evaluate the radio resource usage for emergent disaster-resilient LTE network systems

    The Internal Audit Performance: The Effectiveness of ERM and IT Environments

    Get PDF
    The purpose of this study is to examine the factors determining the performance of the internal audit (IA) in the context of internal auditors’ work environments. This includes Enterprise Risk Management (ERM) implementation, the Enterprise Resource Planning (ERP) system, the use of auditing software and the internal auditors’ IT (information technology) competence. Although a number of recent studies have reported tremendous changes in the roles of the IA, there is still little research on the influential factors of IA implementation and its effectiveness from a contextual perspective. This paper develops and tests a theoretical framework with samples from Taiwan. Data were analyzed using the structural equation model (SEM). This research confirms that the complete ERM implementation and effectiveness of ERP implementation have significant impacts on the performance of IA. It also highlights the importance of internal auditors’ IT competence in improving the performance of IA

    EXPLORING E-LEARNING BEHAVIOR THROUGH LEARNING DISCOURSES

    Get PDF
    As many studies predict e-learning behaviors through intention, few of them investigate user’s learning behaviors directly. In addition to intention, individual’s e-learning behaviors may be influenced by technology readiness and group influences, such as social identity and social bond. This research-in-progress study explores how e-learning behaviors vary with intention, technology readiness, social identity and social bond. Our investigation was based on analyzing the speech acts embedded in fourteen learners’ online discourses in an eighteen-week e-learning course. We then compared how speech acts varied among groups with different degree of intention, technology readiness, social identity, and social bond. Our findings contribute e-learning research by clarifying how intention, technology readiness, social identity, and social bond influence learning behaviors in e-learning context
    • 

    corecore