Abstract: This paper deals with various questions related to
functionality and providing banking services in the European union
on the Internet. Due to the fact that we live in the information
technologies era, the Internet become a new space for doing
economic and business activities in all areas, and especially important
in banking. Accepting the busy tempo of life, in the past several years
electronic banking has become necessity and a must for most users of
banking services. On a sample of 300 web sites of the banks
operating in European Union (EU) we conduct the research on the
functionality of e-banking services offered through banks web sites
with the key objective to reveal to what extent the information
technologies are used in their business operations. Characteristics of
EU banks websites will be examined and compared to the basic
groups of business activities on the web. Also some
recommendations for the successful bank web sites will be provided.
Abstract: The development of adaptive user interfaces (UI)
presents for a long time an important research area in which
researcher attempt to call upon the full resources and skills of several
disciplines, The adaptive UI community holds a thorough knowledge
regarding the adaptation of UIs with users and with contexts of use.
Several solutions, models, formalisms, techniques and mechanisms
were proposed to develop adaptive UI. In this paper, we propose an
approach based on the fuzzy set theory for modeling the concept of
the appropriateness of different solutions of UI adaptation with
different situations for which interactive systems have to adapt their
UIs.
Abstract: With the growing of computer and network, digital
data can be spread to anywhere in the world quickly. In addition,
digital data can also be copied or tampered easily so that the security
issue becomes an important topic in the protection of digital data.
Digital watermark is a method to protect the ownership of digital data.
Embedding the watermark will influence the quality certainly. In this
paper, Vector Quantization (VQ) is used to embed the watermark into
the image to fulfill the goal of data hiding. This kind of watermarking
is invisible which means that the users will not conscious the existing
of embedded watermark even though the embedded image has tiny
difference compared to the original image. Meanwhile, VQ needs a lot
of computation burden so that we adopt a fast VQ encoding scheme by
partial distortion searching (PDS) and mean approximation scheme to
speed up the data hiding process.
The watermarks we hide to the image could be gray, bi-level and
color images. Texts are also can be regarded as watermark to embed.
In order to test the robustness of the system, we adopt Photoshop to
fulfill sharpen, cropping and altering to check if the extracted
watermark is still recognizable. Experimental results demonstrate that
the proposed system can resist the above three kinds of tampering in
general cases.
Abstract: Cloud computing is the innovative and leading
information technology model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources
that can be rapidly provisioned and released with minimal
management effort. In this paper, we aim at the development of
workflow management system for cloud computing platforms based
on our previous research on the dynamic allocation of the cloud
computing resources and its workflow process. We took advantage of
the HTML5 technology and developed web-based workflow interface.
In order to enable the combination of many tasks running on the cloud
platform in sequence, we designed a mechanism and developed an
execution engine for workflow management on clouds. We also
established a prediction model which was integrated with job queuing
system to estimate the waiting time and cost of the individual tasks on
different computing nodes, therefore helping users achieve maximum
performance at lowest payment. This proposed effort has the potential
to positively provide an efficient, resilience and elastic environment
for cloud computing platform. This development also helps boost user
productivity by promoting a flexible workflow interface that lets users
design and control their tasks' flow from anywhere.
Abstract: Icons, or pictorial and graphical objects, are
commonly used in human-computer interaction (HCI) fields as the
mediator in order to communicate information to users. Yet there has
been little studies focusing on a majority of the world’s population –
semi-literate communities – in terms of the fundamental knowhow
for designing icons for such population. In this study, two sets of
icons belonging in different icon taxonomy – abstract and concrete –
are designed for a mobile application for semi-literate agricultural
communities. In this paper, we propose a triadic relationship of an
icon, namely meaning, task and mental image, which inherits the
triadic relationship of a sign. User testing with the application and a
post-pilot questionnaire are conducted as the experimental approach
in two rural villages in India. Icons belonging to concrete taxonomy
perform better than abstract icons on the premise that the design of
the icon fulfills the underlying rules of the proposed triadic
relationship.
Abstract: Introduction: There are multiple social, individual and
cultural factors that influence an individual’s decision to adopt family
planning methods especially among non-users in patriarchal societies
like Pakistan. Non-users, if targeted efficiently, can contribute
significantly to country’s CPR. A research study showed that nonusers
if convinced to adopt lactational amenorrhea method can shift
to long term methods in future. Research shows that if non users are
targeted efficiently a 59% reduction in unintended pregnancies in
Saharan Africa and South-Central and South-East Asia is anticipated.
Methods: We did secondary data analysis on Pakistan
Demographic Heath Survey (2012-13) dataset. Use of contraception
(never-use/ever-use) was the outcome variable. At univariate level
Chi-square/Fisher Exact test was used to assess relationship of
baseline covariates with contraception use. Then variables to be
incorporated in the model were checked for multicollinearity,
confounding and interaction. Then binary logistic regression (with an
urban-rural stratification) was done to find relationship between
contraception use and baseline demographic and social variables.
Results: The multivariate analyses of the study showed that
younger women (≤ 29 years)were more prone to be never users as
compared to those who were >30 years and this trend was seen in
urban areas (AOR 1.92, CI 1.453-2.536) as well as rural areas (AOR
1.809, CI 1.421-2.303). While looking at regional variation, women
from urban Sindh (AOR 1.548, CI 1.142-2.099) and urban
Balochistan (AOR 2.403, CI 1.504-3.839) had more never users as
compared to other urban regions. Women in the rich wealth quintile
were more never users and this was seen both in urban and rural
localities (urban (AOR 1.106 CI .753-1.624); rural areas (AOR 1.162,
CI .887-1.524)) even though these were not statistically significant.
Women idealizing more children (>4) are more never users as
compared to those idealizing less children in both urban (AOR 1.854,
CI 1.275-2.697) and rural areas (AOR 2.101, CI 1.514-2.916).
Women who never lost a pregnancy were more inclined to be nonusers
in rural areas (AOR 1.394, CI 1.127-1.723) .Women familiar
with only traditional or no method had more never users in rural areas
(AOR 1.717, CI 1.127-1.723) but in urban areas it wasn’t significant.
Women unaware of Lady Health Worker’s presence in their area
were more never users especially in rural areas (AOR 1.276, CI
1.014-1.607). Women who did not visit any care provider were more
never users (urban (AOR 11.738, CI 9.112-15.121) rural areas (AOR
7.832, CI 6.243-9.826)).
Discussion/Conclusion: This study concluded that government,
policy makers and private sector family planning programs should
focus on the untapped pool of never users (younger women from underserved provinces, in higher wealth quintiles, who desire more
children.). We need to make sure to cover catchment areas where
there are less LHWs and less providers as ignorance to modern
methods and never been visited by an LHW are important
determinants of never use. This all is in sync with previous literate
from similar developing countries.
Abstract: The advent of social networking technologies has been
met with mixed reactions in academic and corporate circles around
the world. This study explored the influence of social network in
current era, the relation being maintained between the Social
networking site and its user by the extent of use, benefits and latest
technologies. The study followed a descriptive research design
wherein a questionnaire was used as the main research tool. The data
collected was analyzed using SPSS 16. Data was gathered from 1205
users and analyzed in accordance with the objectives of the study.
The analysis of the results seem to suggest that the majority of users
were mainly using Facebook, despite of concerns raised about the
disclosure of personal information on social network sites, users
continue to disclose huge quantity of personal information, they find
that reading privacy policy is time consuming and changes made can
result into improper settings.
Abstract: Typically, virtual communities exhibit the well-known
phenomenon of participation inequality, which means that only a
small percentage of users is responsible of the majority of
contributions. However, the sustainability of the community requires
that the group of active users must be continuously nurtured with new
users that gain expertise through a participation process. This paper
analyzes the time evolution of Open Source Software (OSS)
communities, considering users that join/abandon the community
over time and several topological properties of the network when
modeled as a social network. More specifically, the paper analyzes
the role of those users rejoining the community and their influence in
the global characteristics of the network.
Abstract: This study examined how individuals in their
respective teams contributed to innovation performance besides
defining the term of innovation in their own respective views. This
study also identified factors that motivated University staff to
contribute to the innovation products. In addition, it examined
whether there is a significant relationship between professional
training level and the length of service among university staff
towards innovation and to what extent do the two variables
contributed towards innovative products. The significance of this
study is that it revealed the strengths and weaknesses of the
university staff when contributing to innovation performance.
Stratified-random sampling was employed to determine the samples
representing the population of lecturers in the study, involving 123
lecturers in one of the local universities in Malaysia. The method
employed to analyze the data is through categorizing into themes for
the open-ended questions besides using descriptive and inferential
statistics for the quantitative data. This study revealed that two types
of definition for the term “innovation” exist among the university
staff, namely, creation of new product or new approach to do things
as well as value-added creative way to upgrade or improve existing
process and service to be more efficient. This study found that the
most prominent factor that propels them towards innovation is to
improve the product in order to benefit users, followed by selfsatisfaction
and recognition. This implies that the staff in the
organization viewed the creation of innovative products as a process
of growth to fulfill the needs of others and also to realize their
personal potential. This study also found that there was only a
significant relationship between the professional training level and
the length of service of 4 - 6 years among the university staff. The
rest of the groups based on the length of service showed that there
was no significant relationship with the professional training level
towards innovation. Moreover, results of the study on directional
measures depicted that the relationship for the length of service of 4-
6 years with professional training level among the university staff is
quite weak. This implies that good organization management lies on
the shoulders of the key leaders who enlighten the path to be
followed by the staff.
Abstract: Taking into account the significance of measuring the
daily use of the study space in the libraries in order to develop and
reorganize the space for enhancing the efficiency of the study space,
the current study aimed to apply GIS in analyzing the study halls of
the Central Library and Document Center of Tehran University in
order to determine how study desks and chairs were used by the
students. The study used a combination of survey-descriptive and
system design method. In order to gather the required data, surveydescriptive
method was used. For implementing and entering data
into ArcGIS and analyzing the data and displaying the results on the
maps of the study halls of the library, system design method was
utilized. The design of the spatial database of the use of the study
halls was measured through the extent of occupancy of the space by
the library users and the maps of the study halls of the central library
of Tehran University as the case study. The results showed that
Abooreyhan hall had the highest rate of occupancy of the desks and
chairs compared to the other halls. The Hall of Science and
Technology, with an average occupancy rate of 0.39 for the tables
represented the lowest number of users and Rashid al-Dins hall, and
Science and Technology hall with an average occupancy rate (0.40)
had the lowest number of users for seats. In this study, the
comparison of the space occupied at different periods in the morning,
evenings, afternoons, and several months was performed through
GIS. This system analyzed the space relationships effectively and
efficiently. The output of this study would be used by administrators
and librarians to determine the exact extent of use of the equipment
of the study halls and librarians can use the output map to design the
space more efficiently at the library.
Abstract: The aim of software maintenance is to maintain
the software system in accordance with advancement in software
and hardware technology. One of the early works on software
maintenance is to extract information at higher level of abstraction. In
this paper, we present the process of how to design an information
extraction tool for software maintenance. The tool can extract the
basic information from old programs such as about variables, based
classes, derived classes, objects of classes, and functions. The tool
have two main parts; the lexical analyzer module that can read the
input file character by character, and the searching module which
users can get the basic information from the existing programs. We
implemented this tool for a patterned sub-C++ language as an input
file.
Abstract: Cloud computing is a new technology in industry and
academia. The technology has grown and matured in last half decade
and proven their significant role in changing environment of IT
infrastructure where cloud services and resources are offered over the
network. Cloud technology enables users to use services and
resources without being concerned about the technical implications of
technology. There are substantial research work has been performed
for the usage of cloud computing in educational institutes and
majority of them provides cloud services over high-end blade servers
or other high-end CPUs. However, this paper proposes a new stack
called “CiCKAStack” which provide cloud services over unutilized
computing resources, named as commodity computers.
“CiCKAStack” provides IaaS and PaaS using underlying commodity
computers. This will not only increasing the utilization of existing
computing resources but also provide organize file system, on
demand computing resource and design and development
environment.
Abstract: This paper reports the worldwide status of building
information modeling (BIM) adoption from the perspectives of the
engagement level, the Hype Cycle model, the technology diffusion
model, and BIM services. An online survey was distributed, and 156
experts from six continents responded. Overall, North America was
the most advanced continent, followed by Oceania and Europe.
Countries in Asia perceived their phase mainly as slope of
enlightenment (mature) in the Hype Cycle model. In the technology
diffusion model, the main BIM-users worldwide were “early majority”
(third phase), but those in the Middle East/Africa and South America
were “early adopters” (second phase). In addition, the more advanced
the country, the more number of BIM services employed in general. In
summary, North America, Europe, Oceania, and Asia were advancing
rapidly toward the mature stage of BIM, whereas the Middle
East/Africa and South America were still in the early phase. The
simple indexes used in this study may be used to track the worldwide
status of BIM adoption in long-term surveys.
Abstract: Recently, the competition between websites becomes
intense. How to make users “adopt” their websites is an issue of urgent
importance for online communities companies. Social procedures
(such as social influence) can possibly explain how and why users’
technologies usage behaviors affect other people to use the
technologies. This study proposes two types of social influences on the
initial usage of Facebook Check In-friends and group members.
Besides, this study combines social influences theory and social
network theory to explore the factors influencing initial usage of
Facebook Check In. This study indicates that Facebook friends’
previous usage of Facebook Check In and Facebook group members’
previous usage of Facebook Check In will positively influence focal
actors’ Facebook Check In adoption intention, and network centrality
will moderate the relationships among Facebook friends’ previous
usage of Facebook Check In, Facebook group members’ previous
usage of Facebook Check In and focal actors’ Facebook Check In
adoption intention. The article concludes with contributions to
academic research and practice.
Abstract: The feedbacks obtained regarding the sense of
presence from pilot users operating a Mobile Robotic presence
(MRP) system to visit a simulated museum are reported in this paper.
The aim is to investigate how much the perception of system’s
usefulness and ease of use is affected by operators’ sense of social
telepresence (presence) in the remote location. Therefore, scenarios
of visiting a museum are simulated and the user operators are
supposed to perform some regular tasks inside the remote
environment including interaction with local users, navigation and
visiting the artworks. Participants were divided into two groups,
those who had previous experience of operation and interaction with
a MRP system and those who never had experience. Based on the
results, both groups provided different feedbacks. Moreover, there
was a significant association between user’s sense of presence and
their perception of system usefulness and ease of use.
Abstract: Electronic Word-Of-Mouth (eWOM) communities
represent today an important source of information in which more
and more customers base their purchasing decisions. They include
thousands of reviews concerning very different products and services
posted by many individuals geographically distributed all over the
world. Due to their massive audience, eWOM communities can help
users to find the product they are looking for even if they are less
popular or rare. This is known as the long tail effect, which leads to a
larger number of lower-selling niche products. This paper analyzes
the long tail effect in a well-known eWOM community and defines a
tool for finding niche products unavailable through conventional
channels.
Abstract: Presently, it is necessary to ensure the sustainable
development of passenger and freight transport. Increasing
performance of road freight has had a negative impact to environment
and society. It is therefore necessary to increase the competitiveness
of intermodal transport, which is more environmentally friendly. The
study describes the effectiveness of logistical centers realization for
companies and society and research how the partial internalization of
external costs reflected in the efficient use of these centers and
increase the competitiveness of intermodal transport to road freight.
In our research, we use the method of comparative analysis and
market research to describe the advantages of logistic centers for their
users as well as for society as a whole. Method normal costing is used
for calculation infrastructure and total costs, method of conversion
costing for determine the external costs. We modelled total society
costs for road freight transport and inter modal transport chain (we
assumed that most of the traffic is carried by rail) with different
loading schemes for condition in the Slovak Republic. Our research
has shown that higher utilization of inter modal transport chain do
good not only for society, but for companies providing freight
services too. Increase in use of inter modal transport chain can bring
many benefits to society that do not bring direct immediate financial
return. They often bring the multiplier effects, such as greater use of
environmentally friendly transport mode and reduce the total society
costs.
Abstract: This paper describes the problem of building secure
computational services for encrypted information in the Cloud
Computing without decrypting the encrypted data; therefore, it meets
the yearning of computational encryption algorithmic aspiration
model that could enhance the security of big data for privacy,
confidentiality, availability of the users. The cryptographic model
applied for the computational process of the encrypted data is the
Fully Homomorphic Encryption Scheme. We contribute a theoretical
presentations in a high-level computational processes that are based
on number theory and algebra that can easily be integrated and
leveraged in the Cloud computing with detail theoretic mathematical
concepts to the fully homomorphic encryption models. This
contribution enhances the full implementation of big data analytics
based cryptographic security algorithm.
Abstract: The traditional Turkish houses becoming unusable are
a result of the deterioration of the balanced interaction between users
and house (human and house) continuing during the history.
Especially depending upon the change in social structure, the houses
becoming neglected do not meet the desires of the users and do not
have the meaning but the shelter are becoming unusable and are
being destroyed.
A conservation policy should be developed and renovations should
be made in order to pass the traditional houses carrying the quality of
a cultural and historical document presenting the social structure, the
lifestyle and the traditions of its own age to the next generations and
to keep them alive.
Abstract: Learning Management System (LMS) is the system
which uses to manage the learning in order to grouping the content
and learning activity between the lecturer and learner including
online examination and evaluation. Nowadays, it is the borderless
learning era so the learning activities can be accessed from
everywhere in the world and also anytime via the information
technology and media. The learner can easily access to the
knowledge so the different in time and distance is not a constraint for
learning anymore.
The learning pattern which was used in this research is the
integration of the in-class learning and online learning via internet
and will be able to monitor the progress by the Learning management
system which will create the fast response and accessible learning
process via the social media. In order to increase the capability and
freedom of the learner, the system can show the current and history
of the learning document, video conference and also has the chat
room for the learner and lecturer to interact to each other.
So the objectives of the “The Design and Applied of Learning
Management System via Social Media on Internet: Case Study of
Operating System for Business Subject” are to expand the
opportunity of learning and to increase the efficiency of learning as
well as increase the communication channel between lecturer and
student. The data of this research was collect from 30 users of the
system which are students who enroll in the subject. And the result of
the research is in the “Very Good” which is conformed to the
hypothesis.