نتایج جستجو برای: inter transaction dependency
تعداد نتایج: 182250 فیلتر نتایج به سال:
In this work, we targeted two problems of representing a sentence on the basis of a constituent word sequence: a data-sparsity problem in non-compositional word embedding, and no usage of inter-sentence dependency. To improve these two problems, we propose a Hierarchical Composition Recurrent Network (HCRN), which consists of a hierarchy with 3 levels of compositional models: character, word an...
This study is motivated by the premise that online consumers can make a purchase at any time of day if they have even a tiny time slot along with Internet access. Given the increased shopping time flexibility, we first examine the patterns of online purchase timing at an online shopping mall handling diverse products (e.g., Amazon.com). The results show (1) the breakdown of purchase timing regu...
this study investigates the relationship between field-related cognitive styles and global reading comprehension of hypertext. technically, field dependency is prevailing dominance of field on perception of parts, while global comprehension is skim-like reading to grasp the general content. in this research project, 60 senior and junior students of arak university majoring in english literature...
The current inter-regional and inter-provincial power trading is organized by transaction path, the buyers sellers are two regions or provinces through bidding range small, which cannot optimize allocation of resources in trading, it difficult to break provincial regional barriers, therefore, this paper proposes market Therefore, an optimal clearing model for market, can expand scope scale real...
abstract aim and background: evidences show that both negative and positive affects play role in tendency to use substances, giving this issue, the current study was conducted in other to investigate relationships between distress tolerance, negative and positive urgency with severity of dependence and craving in people with substance dependency. methods and materials: the method of this resear...
Weak data dependencies in large databases coupled with poorly written web based applications are a major cause for malicious transactions. The problem of security becomes especially acute when access roles are changed among users. Also the poorly maintained data base caches are a cause for added security leaks. We propose an adaptive Intrusion detection system to keep track of the varying data ...
While organisational collaborations are increasingly common they often fail. More effective design of collaborations should be facilitated by improved understanding of the relationships created. It is suggested that while the most commonly used theoretical lens is transaction cost economics it might not be the most appropriate. Resource dependency theory is proposed as an alternative since it a...
With the development of advanced Internet technology, business applications across multiple enterprises based on Web Services Composition (WSC) paradigm are widely used. When system failure occurs, some tasks of the flow may be committed while others unscheduled, in this situation, it is important to accurately analyze execution log of composition business process. In this paper, we formally de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید