Abstract: This paper discusses E-government, in particular the
challenges that face adoption in Saudi Arabia. E-government can be
defined based on an existing set of requirements. In this research we
define E-government as a matrix of stakeholders: governments to
governments, governments to business and governments to citizens,
using information and communications technology to deliver and
consume services. E-government has been implemented for a
considerable time in developed countries. However, E-government
services still face many challenges in their implementation and
general adoption in many countries including Saudi Arabia. It has
been noted that the introduction of E-government is a major
challenge facing the government of Saudi Arabia, due to possible
concerns raised by its citizens. In addition, the literature review and
the discussion identify the influential factors that affect the citizens’
intention to adopt E-government services in Saudi Arabia.
Consequently, these factors have been defined and categorized
followed by an exploratory study to examine the importance of these
factors. Therefore, this research has identified factors that determine
if the citizen will adopt E-government services and thereby aiding
governments in accessing what is required to increase adoption.
Abstract: The human friendly interaction is the key function of a human-centered system. Over the years, it has received much attention to develop the convenient interaction through intention recognition. Intention recognition processes multimodal inputs including speech, face images, and body gestures. In this paper, we suggest a novel approach of intention recognition using a graph representation called Intention Graph. A concept of valid intention is proposed, as a target of intention recognition. Our approach has two phases: goal recognition phase and intention recognition phase. In the goal recognition phase, we generate an action graph based on the observed actions, and then the candidate goals and their plans are recognized. In the intention recognition phase, the intention is recognized with relevant goals and user profile. We show that the algorithm has polynomial time complexity. The intention graph is applied to a simple briefcase domain to test our model.
Abstract: The lack of any centralized infrastructure in mobile ad
hoc networks (MANET) is one of the greatest security concerns in
the deployment of wireless networks. Thus communication in
MANET functions properly only if the participating nodes cooperate
in routing without any malicious intention. However, some of the
nodes may be malicious in their behavior, by indulging in flooding
attacks on their neighbors. Some others may act malicious by
launching active security attacks like denial of service. This paper
addresses few related works done on trust evaluation and
establishment in ad hoc networks. Related works on flooding attack
prevention are reviewed. A new trust approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate and prevent flooding attacks in an ad hoc environment.
The performance of the trust algorithm is tested in an ad hoc network
implementing the Ad hoc On-demand Distance Vector (AODV)
protocol.
Abstract: This study proposes and tests a rescapturing elements of perceived gain and loss that, by perceived value of medical tourism products, influencintention of potential customers. Data from 301 usable qwere tested against the research model using the structmodeling approach. The results indicated that perceivedkey predictor of customer intentions. As for benefimedical quality, service quality and enjoyment wcomponents that significantly influenced the perceptiRegarding sacrifice, the effects of perceived risk on pewere significant. The findings can provide insights intohow destination countries can make medical tourism a wfor themselves and international patients.KeywordsMedical tourism, perceived valueintention.
Abstract: Multi-Agent Systems (MAS) emerged in the pursuit to improve our standard of living, and hence can manifest complex human behaviors such as communication, decision making, negotiation and self-organization. The Social Network Services (SNSs) have attracted millions of users, many of whom have integrated these sites into their daily practices. The domains of MAS and SNS have lots of similarities such as architecture, features and functions. Exploring social network users- behavior through multiagent model is therefore our research focus, in order to generate more accurate and meaningful information to SNS users. An application of MAS is the e-Auction and e-Rental services of the Universiti Cyber AgenT(UniCAT), a Social Network for students in Universiti Tunku Abdul Rahman (UTAR), Kampar, Malaysia, built around the Belief- Desire-Intention (BDI) model. However, in spite of the various advantages of the BDI model, it has also been discovered to have some shortcomings. This paper therefore proposes a multi-agent framework utilizing a modified BDI model- Belief-Desire-Intention in Dynamic and Uncertain Situations (BDIDUS), using UniCAT system as a case study.
Abstract: The grey oyster mushroom, Pleurotus sajor-caju
(PSC), is a common edible mushroom and is now grown
commercially around the world for food. This fungus has been
broadly used as food or food ingredients in various food products for
a long time. To enhance the nutritional quality and sensory attributes
of bakery-based products, PSC powder is used in the present study to
partially replace wheat flour in baked product formulations. The
nutrient content and sensory properties of rice-porridge and
unleavened bread (paratha) incorporated with various levels of PSC
powder were studied. These food items were formulated with either
0%, 2%, 4% or 6% of PSC powder. Results show PSC powder
recorded β-glucan at 3.57g/100g. In sensory evaluation, consumers
gave higher score to both rice-porridge and paratha bread containing
2-4% PSC compared to those that are not added with PSC powder.
The paratha containing 4% PSC powder can be formulated with the
intention in improving overall acceptability of paratha bread.
Meanwhile, for rice-porridge, consumers prefer the formulated
product added with 4% PSC powder. In conclusion, the addition of
PSC powder to partially wheat flour can be recommended for the
purpose of enhancing nutritional composition and maintaining the
acceptability of carbohydrate-based products.
Abstract: In this paper the behavior of the decision feedback
equalizers (DFEs) adapted by the decision-directed or the constant
modulus blind algorithms is presented. An analysis of the error
surface of the corresponding criterion cost functions is first
developed. With the intention of avoiding the ill-convergence of the
algorithm, the paper proposes to modify the shape of the cost
function error surface by using a soft decision instead of the hard
one. This was shown to reduce the influence of false decisions and to
smooth the undesirable minima. Modified algorithms using the soft
decision during a pseudo-training phase with an automatic switch to
the properly tracking phase are then derived. Computer simulations
show that these modified algorithms present better ability to avoid
local minima than conventional ones.
Abstract: Signature represents an individual characteristic of a
person which can be used for his / her validation. For such application
proper modeling is essential. Here we propose an offline signature
recognition and verification scheme which is based on extraction of
several features including one hybrid set from the input signature
and compare them with the already trained forms. Feature points
are classified using statistical parameters like mean and variance.
The scanned signature is normalized in slant using a very simple
algorithm with an intention to make the system robust which is
found to be very helpful. The slant correction is further aided by the
use of an Artificial Neural Network (ANN). The suggested scheme
discriminates between originals and forged signatures from simple
and random forgeries. The primary objective is to reduce the two
crucial parameters-False Acceptance Rate (FAR) and False Rejection
Rate (FRR) with lesser training time with an intension to make the
system dynamic using a cluster of ANNs forming a multiple classifier
system.
Abstract: Tourism researchers have recently focused on repeat visitation as a part of destination loyalty. Different models have also considered satisfaction as the main determinant of revisit intention, while findings in many studies show it as a continuous issue. This conceptual paper attempts at evaluating recent empirical studies on satisfaction and revisit intention. Based on limitations and gaps in recent studies, the current paper suggests a new model that would be more comprehensive than those in previous studies. The new model offers new relationships between antecedents (destination image, perceived value, specific novelty seeking, and distance to destination) and both of satisfaction and revisit intention. Revisit intention in turn is suggested to be measured in a temporal approach.
Abstract: The aspiration of this research article is to target and
focus the gains of university-Industry (U-I) collaborations and
exploring those hurdles which are the obstacles for attaining these
gains. University-Industry collaborations have attained great
importance since 1980 in USA due to its application in all fields of
life. U-I collaboration is a bilateral process where academia is a
proactive member to make such alliances. Universities want to
ameliorate their academic-base with the technicalities of technobabbles.
U-I collaboration is becoming an essential lane for achieving
innovative goals in this century. Many developed nations have set
successful examples to prove this phenomenon as a catalyst to reduce
costs, efforts and personnel for R&D projects. This study is exploits
amplitudes of UI collaboration incentives in the light of success
stories of developed countries. Many universities in USA, UK,
Canada and various European Countries have been engaged with
enterprises for numerous collaborative agreements. A long list of
strategic and short term R&D projects has been executed in
developed countries to accomplish their intended purposes. Due to
the lack of intentions, genuine research and research-oriented
environment, the mentioned field could not grow very well in
developing countries. During last decade, a new wave of research
has induced the institutes of developing countries to promote R&D
culture especially in Pakistan. Higher Education Commission (HEC)
has initiated many projects and funding supports for universities
which have collaborative intentions with industry.
Findings show that rapid innovation, overwhelm the technological
complexities and articulated intellectual-base are major incentives
which steer both partners to establish faculty-industry alliances. Everchanging
technologies, concerned about intellectual property,
different research environment and culture, research relevancy (Basic
or applied), exposure differences and diversity of knowledge
(bookish or practical) are main barriers to establish and retain joint
ventures. Findings also concluded that, it is dire need to support and
enhance cooperation among academia and industry to promote highly
coordinated research behaviors. Author has proposed a roadmap for
developing countries to promote R&D clusters among faculty and
industry to deal the technological challenges and innovation
complexities. Based on our research findings, Model for R&D
Collaboration for developing countries also have been proposed to
promote articulated R&D environment. If developing countries
follow this phenomenon, rapid innovations can be achieved with
limited R&D budget heads.
Abstract: The purpose of this paper is to analyze determinants of
information security affecting adoption of the Web-based integrated
information systems (IIS). We introduced Web-based information
systems which are designed to formulate strategic plans for Peruvian
government. Theoretical model is proposed to test impact of
organizational factors (deterrent efforts and severity; preventive
efforts) and individual factors (information security threat; security
awareness) on intentions to proactively use the Web-based IIS .Our
empirical study results highlight that deterrent efforts and deterrent
severity have no significant influence on the proactive use intentions
of IIS, whereas, preventive efforts play an important role in proactive
use intentions of IIS. Thus, we suggest that organizations need to do
preventive efforts by introducing various information security
solutions, and try to improve information security awareness while
reducing the perceived information security threats.
Abstract: Previous researches found that conventional WBL is effective for meaningful learner, because rote learner learn by repeating without thinking or trying to understand. It is impossible to have full benefit from conventional WBL. Understanding of rote learner-s intention and what influences it becomes important. Poorly designed user interface will discourage rote learner-s cultivation and intention to use WBL. Thus, user interface design is an important factor especially when WBL is used as comprehensive replacement of conventional teaching. This research proposes the influencing factors that can enhance learner-s intention to use the system. The enhanced TAM is used for evaluating the proposed factors. The research result points out that factors influencing rote learner-s intention are Perceived Usefulness of Homepage Content Structure, Perceived User Friendly Interface, Perceived Hedonic Component, and Perceived (homepage) Visual Attractiveness.
Abstract: The use of new technologies such internet (e-mail, chat
rooms) and cell phones has steeply increased in recent years.
Especially among children and young people, use of technological
tools and equipments is widespread. Although many teachers and
administrators now recognize the problem of school bullying, few are
aware that students are being harassed through electronic
communication. Referred to as electronic bullying, cyber bullying, or
online social cruelty, this phenomenon includes bullying through email,
instant messaging, in a chat room, on a website, or through
digital messages or images sent to a cell phone. Cyber bullying is
defined as causing deliberate/intentional harm to others using internet
or other digital technologies. It has a quantitative research design nd
uses relational survey as its method. The participants consisted of
300 secondary school students in the city of Konya, Turkey. 195
(64.8%) participants were female and 105 (35.2%) were male. 39
(13%) students were at grade 1, 187 (62.1%) were at grade 2 and 74
(24.6%) were at grade 3. The “Cyber Bullying Question List"
developed by Ar─▒cak (2009) was given to students. Following
questions about demographics, a functional definition of cyber
bullying was provided. In order to specify students- human values,
“Human Values Scale (HVS)" developed by Dilmaç (2007) for
secondary school students was administered. The scale consists of 42
items in six dimensions. Data analysis was conducted by the primary
investigator of the study using SPSS 14.00 statistical analysis
software. Descriptive statistics were calculated for the analysis of
students- cyber bullying behaviour and simple regression analysis was
conducted in order to test whether each value in the scale could
explain cyber bullying behaviour.
Abstract: In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of audio steganography. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Abstract: The double exponential model (DEM), or Laplace
distribution, is used in various disciplines. However, there are issues
related to the construction of confidence intervals (CI), when using
the distribution.In this paper, the properties of DEM are considered
with intention of constructing CI based on simulated data. The
analysis of pivotal equations for the models here in comparisons with
pivotal equations for normal distribution are performed, and the
results obtained from simulation data are presented.
Abstract: With the intention of screening for heavy metal
tolerance, a number of bacteria were isolated and characterized from
a pristine soil. Two Gram positive isolates were identified as
Paenibacillus sp. and Bacillus thuringeinsis. Tolerance of Cd2+, Cu2+
and Zn2+ by these bacteria was studied and found that both bacteria
were highly sensitive to Cu2+ compared to other two metals. Both
bacteria showed the same pattern of metal tolerance in the order Zn+
> Cd2+ > Cu2+. When the metal tolerance in both bacteria was
compared, Paenibacillus sp. showed the highest sensitivity to Cu2+
where as B. thuringiensis showed highest sensitivity to Cd2+ and Zn2+
.These findings revealed the potential of Paenibacillus sp. in
developing a biosensor to detect Cu2+ in environmental samples.
Abstract: Mobile marketing through mobile messaging service
has highly impressive growth as it enables e-business firms to
communicate with their customers effectively. Educational
institutions hence start using this service to enhance communication
with their students. Previous studies, however, have limited
understanding of applying mobile messaging service in education.
This study proposes a theoretical model to understand the drivers of
students- intentions to use the university-s mobile messaging service.
The model indicates that social influence, perceived control and
attitudes affect students- intention to use the university-s mobile
messaging service. It also provides five antecedents of students-
attitudes–perceived utility (information utility, entertainment utility,
and social utility), innovativeness, information seeking, transaction
specificity (content specificity, sender specificity, and time
specificity) and privacy concern. The proposed model enables
universities to understand what students concern about the use of a
mobile messaging service in universities and handle the service more
effectively. The paper discusses the model development and
concludes with limitations and implications of the proposed model.
Abstract: Service quality has become a centerpiece for airline companies in vying with one another and keeps their image in the minds of passengers. Many airlines have pushed service quality through service personalization which includes both ground and on board especially from the viewpoint of retaining satisfied passengers and attracting new ones. Besides those, in-flight meals/food service is another important aspect of the airline operation. The in flight meals/food services now are seen as part of marketing strategies in attracting business or leisure travelers. This study reports the outcomes of the investigation on in-flight meals/food attributes toward passengers- level of satisfaction and re-flying intention. Taste, freshness, appearance of in-flight meals/food served and menu choices are important to the airlines passengers especially for the long haul flight. Food not only contributes to the prediction of the airline passengers- levels of satisfaction but besides other factors slightly influence passengers- re- flying intention. Airline companies therefore should not ignore this element but take the opportunity to create more attractive and acceptable in-flight meals/food along with other matter as marketing tools in attracting passengers to re-flying with them.
Abstract: High employee turnover rate in Malaysia-s retail industry has become a major issue that needs to be addressed. This study determines the levels of job satisfaction, organizational commitment, and turnover intention of employees in a retail company in Malaysia. The relationships between job satisfaction and organizational commitment on turnover intention are also investigated. A questionnaire was developed using Job Descriptive Index, Organizational Commitment Questionnaire, and Lee and Mowday-s turnover intention items and data were collected from 62 respondents. The findings suggested that the respondents were moderately satisfied with job satisfaction facets such as promotion, work itself, co-workers, and supervisors but were unsatisfied with salary. They also had moderate commitment level with considerably high intention to leave the organization. All satisfaction facets (except for co-workers) and organizational commitment were significantly and negatively related to turnover intention. Based on the findings, retention strategies of retail employees were proposed.
Abstract: E-learning is not restricted to the use of new technologies for the online content, but also induces the adoption of new approaches to improve the quality of education. This quality depends on the ability of these approaches (technical and pedagogical) to provide an adaptive learning environment. Thus, the environment should include features that convey intentions and meeting the educational needs of learners by providing a customized learning path to acquiring a competency concerned In our proposal, we believe that an individualized learning path requires knowledge of the learner. Therefore, it must pass through a personalization of diagnosis to identify precisely the competency gaps to fill, and reduce the cognitive load To personalize the diagnosis and pertinently measure the competency gap, we suggest implementing the formative assessment in the e-learning environment and we propose the introduction of a pre-regulation process in the area of formative assessment, involving its individualization and implementation in e-learning.