Enterprise Information Systems have a long-established and crucial role for modern organizations, as they enable seamless integration and management of critical business processes, ensuring efficiency in operations, d...
详细信息
Enterprise Information Systems have a long-established and crucial role for modern organizations, as they enable seamless integration and management of critical business processes, ensuring efficiency in operations, data accuracy, and enhanced decision-making capabilities. One of their most interesting emerging technologies refer to the use of Artificial Intelligence as they may seamlessly automate routine tasks, offer predictive analytics, and provide deep insights, ultimately leading to intelligent data-driven decisions and improved operational efficiency. Of course, this direction of work is accompanied by some important challenges that come from the opacity of certain AI models and their potential biases due to low-quality training data used. In this paper, we argue that such challenges can be mitigated by a novel framework able to integrate, in a transparent manner, quality-related metadata on datasets used for training the AI-enabled emerging technologies in the field of EIS systems. These metadata are minted as Non-Fungible Tokens (NFTs) over the blockchain.
Software development companies commonly use Global Software Development (GSD) in their industry. A competent Scrum team supports the success of the GSD project. This research aims to identify the game components in th...
详细信息
ISBN:
(纸本)9798350345728
Software development companies commonly use Global Software Development (GSD) in their industry. A competent Scrum team supports the success of the GSD project. This research aims to identify the game components in the form of types, elements, and technologies that contribute to building experience for the Scrum team in a GSD environment. We used a Systematic Literature Review (SLR) with the Kitchenham and snowball method. From the 12 papers, we concluded that none of the games specifically focused on the competence of the Scrum team at GSD. The SLR results also identify ten game elements and technologies as a reference for game development to meet the challenges in GSD. The conclusion is that there are still great opportunities to develop a game that can improve the competence of the GSD Scrum team. Game development should refer to elements and identified technologies.
It is entirely justified to use the attribute digital in describing contemporary era due to omnipresence of digital technologies and devices based on them and their strong influence to almost all aspects of human acti...
详细信息
Instrument-tissue interaction detection task, which helps understand surgical activities, is vital for constructing computer-assisted surgery systems but with many challenges. Firstly, most models represent instrument...
详细信息
Concurrent with the rise of real-time wireless systems enabled by the Internet of Things, the age of information (AoI) has been widely perceived as a crucial destination-centric performance metric to quantify the time...
Concurrent with the rise of real-time wireless systems enabled by the Internet of Things, the age of information (AoI) has been widely perceived as a crucial destination-centric performance metric to quantify the timeliness of data delivery. This paper deals with the analysis of information freshness in a multi-source M/G/1 queueing system with utilization of idle server time, referred to as server vacation, in an effective manner. In particular, the status update packets in our model are generated independently by a finite set of source nodes and according to a Poisson process, while their service time follows a general random variable. Using stochastic decomposition and the Laplace-Stieltjes transform, we derive the average AoI (AAoI) expression for the multi-source M/G/1 queueing model with generally-distributed vacation time in closed form. Our numerical simulations validate the accuracy of the derived AAoI expression and assess the impact of different parameters on the system performance.
Asia stands out as a priority for urgent biodiversity conservation due to its large protected areas(PAs)and threatened *** the 21st century,both the highlands and lowlands of Asia have been experiencing the dramatic h...
详细信息
Asia stands out as a priority for urgent biodiversity conservation due to its large protected areas(PAs)and threatened *** the 21st century,both the highlands and lowlands of Asia have been experiencing the dramatic human ***,the threat degree of human expansion to biodiversity is poorly ***,the threat degree of human expansion to biodiversity over 2000 to 2020 in Asia at the continental(Asia),national(48 Asian countries),and hotspot(6,502 Asian terrestrial PAs established before 2000)scales is investigated by integrating multiple large-scale *** results show that human expansion poses widespread threat to biodiversity in Asia,especially in Southeast Asia,with Malaysia,Cambodia,and Vietnam having the largest threat degrees(~1.5 to 1.7 times of the Asian average level).Human expansion in highlands induces higher threats to biodiversity than that in lowlands in one-third Asian countries(most Southeast Asian countries).The regions with threats to biodiversity are present in~75%terrestrial PAs(including 4,866 PAs in 26 countries),and human expansion in PAs triggers higher threat degrees to biodiversity than that in *** findings provide novel insight for the Sustainable Development Goal 15(SDG-15 Life on Land)and suggest that human expansion in Southeast Asian countries and PAs might hinder the realization of *** reduce the threat degree,Asian developing countries should accelerate economic transformation,and the developed countries in the world should reduce the demands for commodity trade in Southeast Asian countries(i.e.,trade leading to the loss of wildlife habitats)to alleviate human expansion,especially in PAs and highlands.
The routing of data between the packets in mobile adhoc networks has severe limitations that involves communication and computational overhead, which has to be reduced for effective transmission of data packets. In th...
详细信息
In the current scenarios there is a lot of development in the networking sector. Additionally needed are quick operations and the capability to solve complex issues. From several technical angles, IoT is being promote...
详细信息
In the current scenarios there is a lot of development in the networking sector. Additionally needed are quick operations and the capability to solve complex issues. From several technical angles, IoT is being promoted to meet these developments. Implementations of IoT confront difficulties in handling such enormous volume of data including issues with its Quality of Services (QoS) necessities, privacy with security and the variety of networking elements. In smart cities, a vast volume of data is generated through IoT devices. They need to be processed near the edge devices due to latency issues, especially in the case of critical data-sensitive applications. Fog computing, a new technological paradigm, delivers a collection of networking essential services nearer to the client than cloud computing does. Fog computing overrides the cloud computing in the areas such as networking infrastructure scalability, latency reduction, network service dependability, and network device security. The technical approach to provide the highest degree of computing service has advanced by contributing cloud-assisted network services nearer to the end user/customer level. Fog servers can malfunction in a variety of circumstances. In this study, we describe the fog system as a machine-repair problem, where repair work is performed at a certain pace as soon as the Virtual Machine (VM) malfunctions. To analyze the system, numerous numerical analyses have been conducted.
In a strongly connected graph G = (V, E), a cut arc (also called strong bridge) is an arc e ∈ E whose removal makes the graph no longer strongly connected. Equivalently, there exist u, v ∈ V, such that all u-v walks...
详细信息
暂无评论