Abstract: At a time of growing market turbulence and a strong
shifts towards increasingly complex risk models and more stringent audit requirements, it is more critical than ever to maintain the highest quality of financial and credit information. IFC implemented
an approach that helps increase data integrity and quality significantly. This approach is called “Screening". Screening is based on linking information from different sources to identify potential
inconsistencies in key financial and credit data. That, in turn, can help
to ease the trials of portfolio supervision, and improve overall company global reporting and assessment systems. IFC experience
showed that when used regularly, Screening led to improved information.
Abstract: The research is to minimize environmental damage
pertinent to maritime activities about the operation of lighter boat
anchorage and its tugboat. The guidance on upgrading current
harbor service and infrastructure has been provided to Kho Sichang
Municpality. This will involve a study of the maritime logistics of
the water area under jurisdiction of the Sichang island Municipality
and possible recommendations may involve charging taxes,
regulations and fees. With implementing these recommendations will
help in protection of the marine environment and in increasing
operator functionality. Additionally, our recommendation is to
generate a consistent revenue stream to the municipality. The action
items contained in this research are feasible and effective, the success
of these initiatives are heavily dependent upon successful promotion
and enforcement. Promoting new rules and regulations effectively
and peacefully can be done through theories and techniques used in
the psychology of persuasion. In order to assure compliance with the
regulations, the municipality must maintain stringent patrols and
fines for violators. In order to become success, the Municipality
must preserve a consistent, transparent and significant enforcement
system. Considering potential opportunities outside of the current
state of the municipality, the authors recommend that Koh Sichang be
given additional jurisdiction to capture value from the master vessels,
as well as to confront the more significant environmental challenges
these vessels pose. Finally, the authors recommend that the Port of
Koh Sichang Island obtain a free port status in order to increase
economic viability and overall sustainability.
Abstract: The supply chains (SCs) have to appeal to new management paradigms to improve their ability to respond rapidly and cost effectively to unpredictable changes in markets and increasing levels of environmental turbulence, both in terms of volume and variety. In this highly demanded context, the Agile paradigm provides the capabilities to SC quickly adapt to changes in the market requirements. The purpose of this paper is to suggest an Agile Index to assess the agility of the automotive companies and corresponding SCs. The proposed integrated assessment model incorporates Agile practices weighted according to their importance to the automotive SC competitiveness and obtained from the Delphi technique.
Abstract: In order to develop any strategy, it is essential to first
identify opportunities, threats, weak and strong points. Assessment of
technology level provides the possibility of concentrating on weak
and strong points. The results of technology assessment have a direct
effect on decision making process in the field of technology transfer
or expansion of internal research capabilities so it has a critical role
in technology management. This paper presents a conceptual model
to analyze the technology capability of a company as a whole and in
four main aspects of technology. This model was tested on 10
automotive parts manufacturers in IRAN. Using this model,
capability level of manufacturers was investigated in four fields of
managing aspects, hard aspects, human aspects, and information and
knowledge aspects. Results show that these firms concentrate on hard
aspect of technology while others aspects are poor and need to be
supported more. So this industry should develop other aspects of
technology as well as hard aspect to have effective and efficient use
of its technology. These paper findings are useful for the technology
planning and management in automotive part manufactures in IRAN
and other Industries which are technology followers and transport
their needed technologies.
Abstract: The issue of real-time and reliable report delivery is extremely important for taking effective decision in a real world mission critical Wireless Sensor Network (WSN) based application. The sensor data behaves differently in many ways from the data in traditional databases. WSNs need a mechanism to register, process queries, and disseminate data. In this paper we propose an architectural framework for data placement and management. We propose a reliable and real time approach for data placement and achieving data integrity using self organized sensor clusters. Instead of storing information in individual cluster heads as suggested in some protocols, in our architecture we suggest storing of information of all clusters within a cell in the corresponding base station. For data dissemination and action in the wireless sensor network we propose to use Action and Relay Stations (ARS). To reduce average energy dissipation of sensor nodes, the data is sent to the nearest ARS rather than base station. We have designed our architecture in such a way so as to achieve greater energy savings, enhanced availability and reliability.
Abstract: The purpose of this research was to study five vital
factors related to employees’ job performance. A total of 250
respondents were sampled from employees who worked at a public
warehouse organization, Bangkok, Thailand. Samples were divided
into two groups according to their work experience. The average
working experience was about 9 years for group one and 28 years for
group two. A questionnaire was utilized as a tool to collect data.
Statistics utilized in this research included frequency, percentage,
mean, standard deviation, t-test analysis, one way ANOVA, and
Pearson Product-moment correlation coefficient. Data were analyzed
by using Statistical Package for the Social Sciences. The findings
disclosed that the majority of respondents were female between 23-
31 years old, single, and hold an undergraduate degree. The average
income of respondents was less than 30,900 baht. The findings also
revealed that the factors of organization chart awareness, job process
and technology, internal environment, employee loyalty, and policy
and management were ranked as medium level. The hypotheses
testing revealed that difference in gender, age, and position had
differences in terms of the awareness of organization chart, job
process and technology, internal environment, employee loyalty, and
policy and management in the same direction with low level.
Abstract: Group key management is an important functional
building block for any secure multicast architecture.
Thereby, it has been extensively studied in the literature.
In this paper we present relevant group key management
protocols. Then, we compare them against some pertinent
performance criteria.
Abstract: Human Resource (HR) applications can be used to
provide fair and consistent decisions, and to improve the
effectiveness of decision making processes. Besides that, among
the challenge for HR professionals is to manage organization
talents, especially to ensure the right person for the right job at the
right time. For that reason, in this article, we attempt to describe
the potential to implement one of the talent management tasks i.e.
identifying existing talent by predicting their performance as one of
HR application for talent management. This study suggests the
potential HR system architecture for talent forecasting by using
past experience knowledge known as Knowledge Discovery in
Database (KDD) or Data Mining. This article consists of three
main parts; the first part deals with the overview of HR
applications, the prediction techniques and application, the general
view of Data mining and the basic concept of talent management
in HRM. The second part is to understand the use of Data Mining
technique in order to solve one of the talent management tasks, and
the third part is to propose the potential HR system architecture for
talent forecasting.
Abstract: Service innovations are central concerns in fast
changing environment. Due to the fitness in customer demands and
advances in information technologies (IT) in service management, an
expanded conceptualization of e-service innovation is required.
Specially, innovation practices have become increasingly more
challenging, driving managers to employ a different open innovation
model to maintain competitive advantages. At the same time, firms
need to interact with external and internal customers in innovative
environments, like the open innovation networks, to co-create values.
Based on these issues, an important conceptual framework of e-service
innovation is developed. This paper aims to examine the contributing
factors on e-service innovation and firm performance, including
financial and non-financial aspects. The study concludes by showing
how e-service innovation will play a significant role in growing the
overall values of the firm. The discussion and conclusion will lead to a
stronger understanding of e-service innovation and co-creating values
with customers within open innovation networks.
Abstract: User-Centered Design (UCD), Usability Engineering (UE) and Participatory Design (PD) are the common Human- Computer Interaction (HCI) approaches that are practiced in the software development process, focusing towards issues and matters concerning user involvement. It overlooks the organizational perspective of HCI integration within the software development organization. The Management Information Systems (MIS) perspective of HCI takes a managerial and organizational context to view the effectiveness of integrating HCI in the software development process. The Human-Centered Design (HCD) which encompasses all of the human aspects including aesthetic and ergonomic, is claimed as to provide a better approach in strengthening the HCI approaches to strengthen the software development process. In determining the effectiveness of HCD in the software development process, this paper presents the findings of a content analysis of HCI approaches by viewing those approaches as a technology which integrates user requirements, ranging from the top management to other stake holder in the software development process. The findings obtained show that HCD approach is a technology that emphasizes on human, tools and knowledge in strengthening the HCI approaches to strengthen the software development process in the quest to produce a sustainable, usable and useful software product.
Abstract: Complaints today have the ability to retain
customer loyalty using state of the art systems and strategies
in customer relationship management to analyze and respond
to a plethora of customer perception. The Majority of
companies are not aware of the beneficiary utilization of
customer complaints for the sake of quality improvements.
Also, some companies have problems determining how
resolution of complaints can be profitable. In this study, we
will define the problems and ascertain the importance of
customer management system on the companies. Furthermore,
we will determine the impact of such a system on efficiency,
confidence, profitability and customer complaints. Eventually,
we will develop methods and address the issues. In this paper,
we used an open-ended questionnaire and distributed that to
30 randomly chosen respondents which were the passengers in
an airport. We also define three hypotheses for our study and
we will validate each of them. Then using frequency, Chi-
Square and quality control method we optimized the size of
customers- negative feedback and improved the process of
customer retention.
Abstract: One of the most important areas of knowledge management studies is knowledge sharing. Measured in terms of number of scientific articles and organization-s applications, knowledge sharing stands as an example of success in the field. This paper reviews the related papers in the context of the underlying individual behavioral variables to providea direction framework for future research and writing.
Abstract: Currently, there has been a 3G mobile networks data
traffic explosion due to the large increase in the number of smartphone
users. Unlike a traditional wired infrastructure, 3G mobile networks
have limited wireless resources and signaling procedures for complex
wireless resource management. And mobile network security for
various abnormal and malicious traffic technologies was not ready. So
Malicious or potentially malicious traffic originating from mobile
malware infected smart devices can cause serious problems to the 3G
mobile networks, such as DoS and scanning attack in wired networks.
This paper describes the DoS security threat in the 3G mobile network
and proposes a detection technology.
Abstract: Spatial and mobile computing evolves. This paper
describes a smart modeling platform called “GeoSEMA". This
approach tends to model multidimensional GeoSpatial Evolutionary
and Mobile Agents. Instead of 3D and location-based issues, there
are some other dimensions that may characterize spatial agents, e.g.
discrete-continuous time, agent behaviors. GeoSEMA is seen as a
devoted design pattern motivating temporal geographic-based
applications; it is a firm foundation for multipurpose and
multidimensional special-based applications. It deals with
multipurpose smart objects (buildings, shapes, missiles, etc.) by
stimulating geospatial agents.
Formally, GeoSEMA refers to geospatial, spatio-evolutive and
mobile space constituents where a conceptual geospatial space model
is given in this paper. In addition to modeling and categorizing
geospatial agents, the model incorporates the concept of inter-agents
event-based protocols. Finally, a rapid software-architecture
prototyping GeoSEMA platform is also given. It will be
implemented/ validated in the next phase of our work.
Abstract: Practicum placements are an critical factor for student teachers on Education Programs. How can student teachers become professionals? This study was to investigate problems, weakness and obstacles of practicum placements and develop guidelines for partnership in the practicum placements. In response to this issue, a partnership concept was implemented for developing student teachers into professionals. Data were collected through questionnaires on attitude toward problems, weaknesses, and obstacles of practicum placements of student teachers in Rajabhat universities and included focus group interviews. The research revealed that learning management, classroom management, curriculum, assessment and evaluation, classroom action research, and teacher demeanor are the important factors affecting the professional development of Education Program student teachers. Learning management plan and classroom management concerning instructional design, teaching technique, instructional media, and student behavior management are another important aspects influencing the professional development for student teachers.
Abstract: Cryptography provides the secure manner of
information transmission over the insecure channel. It authenticates
messages based on the key but not on the user. It requires a lengthy
key to encrypt and decrypt the sending and receiving the messages,
respectively. But these keys can be guessed or cracked. Moreover,
Maintaining and sharing lengthy, random keys in enciphering and
deciphering process is the critical problem in the cryptography
system. A new approach is described for generating a crypto key,
which is acquired from a person-s iris pattern. In the biometric field,
template created by the biometric algorithm can only be
authenticated with the same person. Among the biometric templates,
iris features can efficiently be distinguished with individuals and
produces less false positives in the larger population. This type of iris
code distribution provides merely less intra-class variability that aids
the cryptosystem to confidently decrypt messages with an exact
matching of iris pattern. In this proposed approach, the iris features
are extracted using multi resolution wavelets. It produces 135-bit iris
codes from each subject and is used for encrypting/decrypting the
messages. The autocorrelators are used to recall original messages
from the partially corrupted data produced by the decryption process.
It intends to resolve the repudiation and key management problems.
Results were analyzed in both conventional iris cryptography system
(CIC) and non-repudiation iris cryptography system (NRIC). It
shows that this new approach provides considerably high
authentication in enciphering and deciphering processes.
Abstract: The vast amount of information on the World Wide
Web is created and published by many different types of providers.
Unlike books and journals, most of this information is not subject to
editing or peer review by experts. This lack of quality control and the
explosion of web sites make the task of finding quality information
on the web especially critical. Meanwhile new facilities for
producing web pages such as Blogs make this issue more significant
because Blogs have simple content management tools enabling nonexperts
to build easily updatable web diaries or online journals. On
the other hand despite a decade of active research in information
quality (IQ) there is no framework for measuring information quality
on the Blogs yet. This paper presents a novel experimental
framework for ranking quality of information on the Weblog. The
results of data analysis revealed seven IQ dimensions for the Weblog.
For each dimension, variables and related coefficients were
calculated so that presented framework is able to assess IQ of
Weblogs automatically.
Abstract: Starting with an analysis of the financial and
operational indicators that can be found in the specialised literature,
this study aims to contribute to improvements in the performance
measurement systems used when the unit of analysis is the
manufacturing plant. For this a search was done in the highest impact
Journals of Production and Operations Management and
Management Accounting , with the aim of determining the financial
and operational indicators used to evaluate performance when
Advanced Production Practices have been implemented, more
specifically when the practices implemented are Total Quality
Management, JIT/Lean Manufacturing and Total Productive
Maintenance. This has enabled us to obtain a classification of the two
types of indicators based on how much each is used. For the financial
indicators we have also prepared a proposal that can be adapted to
manufacturing plants- accounting features. In the near future we will
propose a model that links practices implementation with financial
and operational indicators and these two last with each other. We aim
to will test this model empirically with the data obtained in the High
Performance Manufacturing Project.
Abstract: Data mining has been integrated into application systems to enhance the quality of the decision-making process. This study aims to focus on the integration of data mining technology and Knowledge Management System (KMS), due to the ability of data mining technology to create useful knowledge from large volumes of data. Meanwhile, KMS vitally support the creation and use of knowledge. The integration of data mining technology and KMS are popularly used in business for enhancing and sustaining organizational performance. However, there is a lack of studies that applied data mining technology and KMS in the education sector; particularly students- academic performance since this could reflect the IHL performance. Realizing its importance, this study seeks to integrate data mining technology and KMS to promote an effective management of knowledge within IHLs. Several concepts from literature are adapted, for proposing the new integrative data mining technology and KMS framework to an IHL.
Abstract: Database management systems that integrate user preferences promise better solution for personalization, greater flexibility and higher quality of query responses. This paper presents a tentative work that studies and investigates approaches to express user preferences in queries. We sketch an extend capabilities of SQLf language that uses the fuzzy set theory in order to define the user preferences. For that, two essential points are considered: the first concerns the expression of user preferences in SQLf by so-called fuzzy commensurable predicates set. The second concerns the bipolar way in which these user preferences are expressed on mandatory and/or optional preferences.