The Concept of the Receipts & Promotions Cloud Service: a New Level of Communication between Bank, Store, and Customer

2020 ◽  
Vol 26 (12) ◽  
pp. 697-700
Author(s):  
V. I. Belovitskiy ◽  

The development of cloud services improving the interaction of banks, stores and customers becomes high-demanded by digitalized society, that is ready to use innovative software products. The Receipts & Promotions cloud service, developed at the concept level, allows to realize the idea of providing complete information of a receipt in electronic form along with printed receipt for the Mir plastic card holders through the "Privet, Mir!" mobile application. Information from electronic receipts accumulated in the Mir cloud will allow the customer to receive personalized bonus offers from the stores — partners of the program, as well as manage the family budget. The introduction of the service opens up the wide opportunities to the stores for communication with customers. The Receipts & Promotions service is able to become the first software product based on the collection and analysis of information from electronic receipts linked to a specific user. The system of flexible personalization of bonus offers and their assessment by customers is unique and not implemented in other software products. It will be possible to consider the display of electronic receipts in the "Privet, Mir!" mobile application in a user-friendly interface as the first fully automated option of providing electronic receipts to a wide range of users.

Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


2019 ◽  
Vol 9 (24) ◽  
pp. 5364 ◽  
Author(s):  
Ángel Jesús Varela-Vaca  ◽  
Rafael M. Gasca ◽  
Rafael Ceballos ◽  
María Teresa Gómez-López ◽  
Pedro Bernáldez Torres

Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software products and systems. The complexity in the configuration of products and systems is a known challenge in the software industry since it includes a wide range of parameters to be taken into account. In other contexts, the configuration problems are solved using Software Product Lines. This is the reason why in this article the framework Cybersecurity Software Product Line (CyberSPL) is proposed. CyberSPL is based on a methodology to design product lines to verify cybersecurity policies according to the possible configurations. The patterns to configure the systems related to the cybersecurity aspects are grouped by defining various feature models. The automated analysis of these models allows us to diagnose possible problems in the security configurations, reducing or avoiding them. As support for this proposal, a multi-user and multi-platform solution has been implemented, enabling setting a catalogue of public or private feature models. Moreover, analysis and reasoning mechanisms have been integrated to obtain all the configurations of a model, to detect if a configuration is valid or not, including the root cause of problems for a given configuration. For validating the proposal, a real scenario is proposed where a catalogue of four different feature models is presented. In this scenario, the models have been analysed, different configurations have been validated, and several configurations with problems have been diagnosed.


2013 ◽  
Vol 427-429 ◽  
pp. 2377-2382
Author(s):  
Ying Liu ◽  
Yan Wang ◽  
Xian You Sun

Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust cloud center of gravity evaluation method (CCGE). Finally, the experiment results show that this model can build precise trust relationship between cloud users and cloud services based on users performance demands.


Author(s):  
Guo Jia ◽  
Yang Ming

Since safety-critical software is crucial to nuclear safety in the occurrence of accident, it is required to have rather higher requirements in both reliability and safety than the non-safety one. However, since the complexity of a software product, how to ensure the reliability and safety of a software product is still a challenging work. The paper presents a design of a platform for safety justification of safety-critical software of nuclear power plants. A syllogism referred as to Claim, Argument and Evidence (CAE) is applied to clarify the key factors that will affect software reliability and the dependencies between them. The proposed safety justification platform offers a user-friendly graphical interface to help construct a CAE model by a drag and drop way. The proposed safety justification platform could be used for the rigorous argument of various factors that may affect the reliability of a safety-critical software product during different phases of its life cycle and establishing their causalities. In this way, it could greatly improve its creditability and applicability and lowering the uncertainties in software development and application, and therefore has a significant engineering values in ensuring and improving the quality and reliability of nuclear software products.


Database ◽  
2019 ◽  
Vol 2019 ◽  
Author(s):  
Sana Akhter ◽  
Harpreet Kaur ◽  
Piyush Agrawal ◽  
Gajendra P S Raghava

AbstractRareLSD is a manually curated database of lysosomal enzymes associated with rare diseases that maintains comprehensive information of 63 unique lysosomal enzymes and 93 associated disorders. Each entry provides a complete information on the disorder that includes the name of the disease, organ affected, age of onset, available drug, inheritance pattern, defected enzyme and single nucleotide polymorphism. To facilitate users in designing drugs against these diseases, we predicted and maintained structures of lysosomal enzymes. Our information portal also contains information on biochemical assays against disease-associated enzymes obtained from PubChem. Each lysosomal entry is supported by information that includes disorders, inheritance pattern, drugs, family members, active inhibitors, etc. Eventually, a user-friendly web interface has been developed to facilitate the users in searching and browsing data in RareLSD with a wide range of options. RareLSD is integrated with sequence similarity search tools (e.g. BLAST and Smith-Waterman algorithm) for analysis. It is built on responsive templates that are compatible with most of browsers and screens including smartphones and gadgets (mobile, iPhone, iPad, tablets, etc.).


Author(s):  
Saravana Kumar N. ◽  
Rajya Lakshmi Gubburi Venkataramana ◽  
Balamurugan B.

Cloud computing is one of most fast developing technology and many organizations are now offering a wide range of cloud services. Although the services provided are the same there is no common programming language, technology and protocol to access the entirety of the cloud services. Client who use a service provided by a certain organization are often limited and confined to that specific organization its structure and technologies. A Cloud federation is one solution to that interoperability through which computing resources of one Cloud Service Provider is rented or sold to another service provider or the services provided by one Cloud Service Provider is replicated into another Cloud Service Provider without having to lose any functionality and performance. This process is a tedious task and is prone to multiple limitations. In this paper we proposed the architectural framework and algorithm for the possible interoperability between the cloud service providers based on SLA in prospective of health sector as the application of cloud in health sector is highly needed in future.


2021 ◽  
Vol 4 (2) ◽  
pp. 18
Author(s):  
Muhammad Saad Amin ◽  
Syed Tahir Hussain Rizvi ◽  
Sameer Malik ◽  
Muhammad Awais Yousaf ◽  
Sadaf Mehmood

The technology of An Autonomous "follow me" platform for carrying and moving objects has gone through rapid technological advancements. Numerous follow me robots are accessible with various running advancements, yet the expense is high. These robots are not user-friendly and therefore not much successful. In this research, a fully automated, economical, fast, efficient and smart “Follow Me” robot is designed. This robot has the ability to carry luggage or move objects from one place to another place. It will help pregnant women and elder people to carry their things. An autonomous follow me robot has two working modes, the first one is the default mode and the second one is Bluetooth mode or remote mode. In default mode, the user will walk in the front of the ultrasonic sensor and it will follow the user until it goes beyond the range. In Bluetooth mode, the customer needs to interact with the robot with the help of a mobile application. The customer by then has the Graphical User Interface (GUI) to control the robot. This framework enables the client to vigorously communicate with the robot at various dimensions of the control (left, right, forward, backward, and stop). The application interface is built as simple as it can be used by a wide range of patients.


2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Lan Zhang

With the continuous development of social economy, social sport is more and more valued and favored by the people as a universal and nationwide sport, but it should be noted that social sport involves a wide range of aspects, but due to its particularity, it is also constrained by economic development. In view of these needs and limitations, three technical methods of entropy method, RSR (rank-sum ratio), and TOPSIS are introduced, to sort out the development of social sports, national physical development, social sports guidance, and the number of people to be measured in various places based on the relevant technologies of smart cities in this paper, realize the application analysis of social sports in the public service level. This paper aims to provide a scientific evaluation and evaluation method for social sports information cloud services. The results of simulation experiments show that the evaluation of social sports information cloud service quality based on smart cities is effective, and the comprehensive application of methods can be implemented perfectly, and the further promotion and popularization of social sports services can be realized.


Author(s):  
Ju. A. Tikhonova

The article discusses the development trends of the modern preschool education system in the aspect of the activity of the teacherpsychologist of the preschool educational organization. The experience of using 1C software products in the practical work of the psychological service of kindergarten 318 of the city of Perm in the aspects of psychological monitoring of children’s readiness to study at school and correctional and developmental work with preschool children is presented. The components of the child’s psychological readiness for school are described. On practical examples, diagnostic methods for determining the level of readiness of children for schooling are analyzed. The data of testing kindergarten pupils at the beginning of the 2019/2020 school year on the parameters allowing to identify urgent problems and determine the direction of the necessary correctional development work are presented. Features of the practical application of the software product 1C:Preschool Psychodiagnostics in the process of psychological support of preparing children for school are considered. Methods are described, the scope of which is aimed not only at the study of personality traits, but also at its development. The possibilities of using games of the 1C:Educational Collection in the correctional and developmental work are disclosed. The description of game collections is given, options for their use are presented.


2012 ◽  
Vol 6 (1-3) ◽  
pp. 243-259 ◽  
Author(s):  
Yohan Yoo

This article demonstrates the need for the iconic status and function of Buddhist scripture to receive more attention by illuminating how lay Korean Buddhists try to appropriate the power of sutras. The oral and aural aspects of scripture, explained by Wilfred Cantwell Smith, provide only a limited understanding of the characteristics of scripture. It should be noted that, before modern times, most lay people, not only in Buddhist cultures but also in Christian and other traditions, neither had the chance to recite scriptures nor to listen to their recitations regularly. Several clear examples demonstrate contemporary Korean Buddhists’ acceptance of the iconic status of sutras and their attempt to appropriate the power and status of those sacred texts. In contemporary Korea, lay Buddhists try to claim the power of scriptures in their daily lives by repeating and possessing them. Twenty-first century lay believers who cannot read or recite in a traditional style have found new methods of repetition, such as internet programs for copying sacred texts and for playing recordings of their recitations. In addition, many Korean Buddhists consider the act of having sutras in one’s possession to be an effective way of accessing the sacred status and power of these texts. Hence, various ways of possessing them have been developed in a wide range of products, from fancy gilded sutras to sneakers embroidered with mantras.


Sign in / Sign up

Export Citation Format

Share Document