A description logic based approach to formalizing the information bearing capability of paths in ER schemata

Author(s):  
Kaibo Xu ◽  
Junkang Feng ◽  
Malcolm Crowe ◽  
Lin Liu

Purpose – The purpose of this paper is to show how description logics (DLs) can be applied to formalizing the information bearing capability (IBC) of paths in entity-relationship (ER) schemata. Design/methodology/approach – The approach follows and extends the idea presented in Xu and Feng (2004), which applies DLs to classifying paths in an ER schema. To verify whether the information content of a data construct (e.g. a path) covers a semantic relation (which formulates a piece of information requirement), the principle of IBC under the source-bearer-receiver framework is presented. It is observed that the IBC principle can be formalized by constructing DL expressions and examining constructors (e.g. quantifiers). Findings – Description logic can be used as a tool to describe the meanings represented by paths in an ER schema and formalize their IBC. The criteria for identifying data construct distinguishability are also discovered by examining quantifiers in DL expressions of paths of an ER schema. Originality/value – This paper focuses on classifying paths in data schemas and verifying their formalized IBC by using DLs and the IBC principle. It is a new point of view for evaluation of data representation, which looks at the information borne by data but not data dependencies.

Author(s):  
Marcin Lefik ◽  
Krzysztof Komeza ◽  
Ewa Napieralska-Juszczak ◽  
Daniel Roger ◽  
Piotr Andrzej Napieralski

Purpose The purpose of this paper is to present a comparison between reluctance synchronous machine-enabling work at high internal temperature (HT° machine) with laminated and solid rotor. Design/methodology/approach To obtain heat sources for the thermal model, calculations of the electromagnetic field were made using the Opera 3D program including effect of rotation and the resulting eddy current losses. To analyse the thermal phenomenon, the 3D coupled thermal-fluid (CFD) model is used. Findings The presented results show clearly that laminated construction is much better from a point of view of efficiency and temperature. However, solid construction can be interesting for high speed machines due to their mechanical robustness. Research limitations/implications The main problem, despite the use of parallel calculations, is the long calculation time. Practical implications The obtained simulation and experimental results show the possibility of building a machine operating at a much higher ambient temperature than it was previously produced for example in the vicinity of the aircraft turbines. Originality/value The paper presents the application of fully three-dimensional coupled electromagnetic and thermal analysis of new machine constructions designed for elevated temperature.


2017 ◽  
Vol 20 (3) ◽  
pp. 301-310 ◽  
Author(s):  
Noriaki Yasaka

Purpose This report aims to focus on how suspicious transaction report is created with data mining methods and used from the point of view of knowledge management. Design/methodology/approach This paper considers data mining versus knowledge management in the anti-money laundering (AML) field. Findings In the AML field, the information and knowledge gained are not necessarily used for or shared with the related shareholders. Creating and co-evolving the network of “knowledge professionals” is the impending assignment in this industry. The first and most important task is knowledge management in the global AML field. Originality/value The report considers the creation with data mining methods and utilization from the point of view of knowledge management.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ciro Troise ◽  
Diego Matricano ◽  
Elena Candelo ◽  
Mario Sorrentino

Purpose Starting from the state-of-the-art of Fintech development, this study aims to propose some research propositions comparing reward-crowdfunding (RCF) and equity-crowdfunding (ECF). In this sense, the present research provides a comprehensive analysis of fintech development and – to conceptualize the comparison between RCF and ECF – it focuses on campaigns’ characteristics, aims and post-campaigns scenarios. Design/methodology/approach All the research propositions related to the comparison between RCF and ECF are rooted in dedicated literature. The methodological approach adopted in the present paper can be referred to theorizing. Findings This study suggests that five key elements characterize the development of fintech: regulation, infrastructure, technologies, finance and innovations. The research provides nine propositions: four related to the campaigns’ characteristics; two related to the use of crowdfunding models by entrepreneurs; and three related to the performance of crowdfunded companies. Practical implications By offering nine research propositions, this study is expected to foster and support the investigation of fintech development from an entrepreneurial and managerial point of view. Originality/value To the best of authors’ knowledge, this study is among the first to explore the fintech development and to propose a comparative approach between RCF and ECF. This research contributes to the current debate on fintech development as well as on the comparison between crowdfunding models.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Cecília Olexová ◽  
Milan Husťák ◽  
František Sudzina

Purpose The purpose of this paper is to analyse the effects of carousel fraud on the average price of goods, as one of the negative economic aspects of carousel fraud. Design/methodology/approach This paper is primarily based on the description of selected legal cases and the modus operandi of carousel fraud, the analysis of legal texts (legislation and judgments of courts) and the discussion, from the point of view of price manipulation. Findings The results of the analysis specify the negative impact of carousel fraud in the form of the distortion of reported average prices and suggest that the authorities should monitor usual or fair prices to detect cases where there is a risk of carousel fraud. Originality/value This paper brings new insight into the issue of carousel frauds by understanding the principle of carousel fraud, the motives for it, and the possibilities for detecting this type of tax fraud, which is necessary to prevent tax evasion and to preserve a state’s income.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Thi Hieu Hanh Truong

PurposeThe purpose of this paper is to look into the mechanism in which customers involve themselves in omni-channel retail setting and use its advantages.Design/methodology/approachVia an empirical analysis through surveying customers, this paper assesses and confirms the drivers of omni-channel shopping intention within the context of fashion retailing sector in Danang.FindingsThe findings highlight the significance of customer perception of research shopping (including showrooming and webrooming) behaviours, compatibility and risk to their intention towards omni-channel shopping, implying profound understanding of designing effective omni-channel retailing strategy.Originality/valueFrom a theoretical perspective, comprehending customer perception of the omni-channel concept has emerged as an important theme in recent literature as well as in practitioners' reports. Hence, the meaningful contribution of this study is the involvement in the attractive steam of study. From a managerial perspective, this study could offer guidance to retailers or managers about developing a successful omni-channel strategy from a customer point of view.


2020 ◽  
Vol 50 (6) ◽  
pp. 1099-1108
Author(s):  
Giovanni Aulisa ◽  
Claudio Binda ◽  
Elvira Padua ◽  
Antonio Pratesi ◽  
Alfonso Bellia ◽  
...  

Purpose This study aims to evaluate if soya consumption can compromise or positively influence the effects of the Mediterranean diet (MD). Design/methodology/approach A full literature review has been conducted as part of a proposal of a new point of view on the consumption of soya and its derivatives in areas where until a few decades ago this type of food did not exist at all. Findings There does not seem to be any contraindications for soy systematic use, therefore, excluding historical-geographical reasons, soya could be included in an MD without altering the benefits associated with it. Practical implications Soya is not advised as a typical food in the MD, but promoting its use could probably contribute to increase the variety of the diet and likely consolidates the positive health benefits characteristic of MD. Originality/value To the best of the authors’ knowledge, this review is one of the first to evaluate soybean consumption within the MD.


2020 ◽  
Vol 28 (3) ◽  
pp. 347-358
Author(s):  
Joakim Kävrestad ◽  
Johan Zaxmy ◽  
Marcus Nohlberg

Purpose Using passwords to keep account and data safe is very common in modern computing. The purpose of this paper is to look into methods for cracking passwords as a means of increasing security, a practice commonly used in penetration testing. Further, in the discipline of digital forensics, password cracking is often an essential part of a computer examination as data has to be decrypted to be analyzed. This paper seeks to look into how users that actively encrypt data construct their passwords to benefit the forensics community. Design/methodology/approach The study began with an automated analysis of over one billion passwords in 22 different password databases that leaked to the internet. The study validated the result with an experiment were passwords created on a local website was analyzed during account creation. Further a survey was used to gather data that was used to identify differences in password behavior between user that actively encrypt their data and other users. Findings The result of this study suggests that American lowercase letters and numbers are present in almost every password and that users seem to avoid using special characters if they can. Further, the study suggests that users that actively encrypt their data are more prone to use keyboard patterns as passwords than other users. Originality/value This paper contributes to the existing body of knowledge around password behavior and suggests that password-guessing attacks should focus on American letters and numbers. Further, the paper suggests that forensics experts should consider testing patterns-based passwords when performing password-guessing attacks against encrypted data.


2017 ◽  
Vol 38 (4/5) ◽  
pp. 276-284 ◽  
Author(s):  
Felicitas Ciabere Ratanya

Purpose The purpose of this paper is to examine the access and use of the institutional repository (IR) among academic staff at Egerton University. Design/methodology/approach The paper provides a description of the building and development of the IR at the Egerton university and describes expected benefits of the repository to the University and relevant stakeholders. A survey was conducted among 84 academic staff with an aim of examining their levels of awareness on the existence of the IR at the Egerton University and assess their access and use. Through a structured questionnaire both quantitative and qualitative data were collected. Findings The study revealed that majority of the academic staff at the Egerton University are still not aware of the existence of the IR. Staff also faced challenges in accessing and using the content available. The paper provided suggestions on how best to enhance the access and utilization of the IRs among the academic staff. Practical implications From a practical point of view, the paper provides implications on the access and use of IRs by the academic staff. The paper points out some challenges faced by this group of users which other academic institutions may try to solve in their respective contexts. Originality/value Findings and discussions provided in the paper will pave way to solving the challenges faced in access and use of IR by the academic staff at the Egerton University.


2015 ◽  
Vol 4 (3) ◽  
pp. 186-193 ◽  
Author(s):  
Ulla Runesson

Purpose – It has been suggested that, if pedagogical and learning theories are integrated into lesson and learning study, a systematic construction of pedagogical knowledge is possible (Elliott, 2012). In this Special Issue, it is reported how theory and theoretical concepts can add value to lesson and learning study. The purpose of this paper is to introduce the Special Issue and explore the above concepts. Design/methodology/approach – This paper presents the Special Issue papers thematically and the main issues are discussed. Findings – Together the papers suggest that pedagogical theories and theorizing practice may contribute to the improvement of teachers’ practical knowledge and knowledge about teachers’ professional tasks and objects. Furthermore, some theories and theoretical concepts hitherto under-exploited in lesson and learning study are presented and discussed from the point of view how these might improve the quality of the studies. Originality/value – As a total, this collection of papers bring out issues about the role of pedagogical and learning theories and how these could inform lesson and learning study.


2019 ◽  
Vol 34 (5) ◽  
pp. 1093-1105 ◽  
Author(s):  
Christina Öberg ◽  
Tawfiq Shams

Purpose With the overarching idea of disruptive technology and its effects on business, this paper focuses on how companies strategically consider meeting the challenge of a disruptive technology such as additive manufacturing. The purpose of this paper is to describe and discuss changes in positions and roles related to the implementation of a disruptive technology. Design/methodology/approach Additive manufacturing could be expected to have different consequences for parties based on their current supply chain positions. The paper therefore investigates companies’ strategies related to various supply chain positions and does so by departing from a position and role point of view. Three business cases related to metal 3D printing - illustrating sub-suppliers, manufacturers and logistics firms - describe as many strategies. Data for the cases were collected through meetings, interviews, seminars and secondary data focusing on both current business activities related to additive manufacturing and scenarios for the future. Findings The companies attempted to defend their current positions, leading to new roles for them. This disconnects the change of roles from that of positions. The changed roles indicate that all parties, regardless of supply chain positions, would move into competing producing roles, thereby indicating how a disruptive technology may disrupt network structures based on companies’ attempts to defend their positions. Originality/value The paper contributes to previous research by reporting a disconnect between positions and roles among firms when disruption takes place. The paper further denotes how the investigated firms largely disregarded network consequences at the disruptive stage, caused by the introduction of additive manufacturing. The paper also contributes to research on additive manufacturing by including a business dimension and linking this to positions and roles.


Sign in / Sign up

Export Citation Format

Share Document