Abstract: Implementing Information Technology/ Information
System (IT/IS) is critical for every industry as its potential benefits
have been to motivate many industries including the Malaysian
construction industry to invest in it. To successfully implement IT/IS
has become the major concern for every organisation. Identifying the
critical success factors (CSFs) has become the main agenda for
researchers, academicians and practitioners due to the wide number
of failures reported. This research paper seeks to identify the CSFs
that influence the successful implementation of IT/IS in construction
industry in Malaysia. Limited factors relating to people issue will be
highlighted here to showcase some as it becomes one of the major
contributing factors to the failure. Three (3) organisations have
participated in this study. Semi-structured interviews are employed as
they offer sufficient flexibility to ensure that all relevant factors are
covered. Several key issues contributing to successful
implementations of IT/IS are identified. The results of this study
reveal that top management support, communication, user
involvement, IT staff roles and responsibility, training/skills, leader/
IT Leader, organisation culture, knowledge/ experience, motivation,
awareness, focus and ambition, satisfaction, teamwork/ collaboration,
willingness to change, attitude, commitment, management style,
interest in IT, employee behaviour towards collaborative
environment, trust, interpersonal relationship, personal characteristic
and competencies are significantly associated with the successful
implementations of IT/IS. It is anticipated that this study will create
awareness and contribute to a better understanding amongst
construction industry players and will assist them to successfully
implement IT/IS.
Abstract: Simulation and modeling computer programs are
concerned with construction of models for analyzing different
perspectives and possibilities in changing conditions environment.
The paper presents theoretical justification and evaluation of
qualitative e-learning development model in perspective of advancing
modern technologies. There have been analyzed principles of
qualitative e-learning in higher education, productivity of studying
process using modern technologies, different kind of methods and
future perspectives of e-learning in formal education. Theoretically
grounded and practically tested model of developing e-learning
methods using different technologies for different type of classroom,
which can be used in professor-s decision making process to choose
the most effective e-learning methods has been worked out.
Abstract: Gurus of the Classical Management School (like
Taylor, Fayol and Ford) had an opinion that work must be delegated
to the individual and the individual has to be instructed, his work
assessed and paid based on individual performance. The theories of
the Human Relations School have changed this mentality regarding
the concept of groups. They came to the conclusion that the influence
of groups greatly affects the behaviour and performance of its
members.
Group theories today are characterized by problem-solving teams
and self-managing groups authorized to make decisions and execute;
professional communities also play an important role during the
operation of knowledge management systems.
In this theoretical research we try to find answers to a question:
what kind of characteristics (professional competencies, personal
features, etc.) a successful team needs to manage a change to operate
a knowledge management system step by step.
Abstract: In this study, we introduced a communication system
where human body was used as medium through which data were
transferred. Multiple biosignal sensing units were attached to a subject
and wireless personal area network was formed. Data of the sensing
units were shared among them. We used wideband pulse
communication that was simple, low-power consuming and high data
rated. Each unit functioned as independent communication device or
node. A method of channel search and communication among the
modes was developed. A protocol of carrier sense multiple
access/collision detect was implemented in order to avoid data
collision or interferences. Biosignal sensing units should be located at
different locations due to the nature of biosignal origin. Our research
provided a flexibility of collecting data without using electrical wires.
More non-constrained measurement was accomplished which was
more suitable for u-Health monitoring.
Abstract: The paper presents the service learning project titled
DicDucFac (idea-leadership-product), that was planned and
conducted by the team of information sciences students. It was
planned as a workshop dealing with the application of modern social
media (Facebook, YouTube, Gmail) for the purposes of selfpromotion,
free advertising via social networks and marketing own
ideas and/or products in the virtual world. The workshop was
organized for highly-skilled computer literate unemployed youth.
These youth, as final beneficiaries, will be able to apply what they
learned in this workshop to “the real world“, increasing their chances
for employment and self-employment. The results of the project
reveal that the basic, active-learning principles embodied in our
teaching approach allow students to learn more effectively and gain
essential life skills (from computer applications to teamwork) that
can only be learned by doing. It also shows that our students received
the essentials of professional ethics and citizenship through direct,
personal engagement in professional activities and the life of the
community.
Abstract: In this research, effort was made to identify and
evaluate barriers to the development of entrepreneurship among
Iranian entrepreneur women who were graduated from universities.
In this study, perspectives of thirty-seven available entrepreneur
women were examined. In order to prepare questionnaires and
receive knowledge about barriers among these women, seven cases of
entrepreneur women took part in in-depth interviews. Then, to
evaluate the importance of barriers, the researchers made a
questionnaire with closed questions in which the barriers were
classified into the following categories: personal-familial barriers;
socio-cultural barriers; economic-financial-commercial barriers; and
structural barriers. Entrepreneur women were requested to rate the
importance of each item. The results indicated that there were
different obstacles among entrepreneur women. The order of the
important barriers was as fallow: economic-financial-commercial,
structural, socio-cultural, and personal-familial.
Abstract: If organizations like Mellat Bank want to identify its
customer market completely to reach its specified goals, it can
segment the market to offer the product package to the right segment.
Our objective is to offer a segmentation model for Iran banking
market in Mellat bank view. The methodology of this project is
combined by “segmentation on the basis of four part-quality
variables" and “segmentation on the basis of different in means".
Required data are gathered from E-Systems and researcher personal
observation. Finally, the research offers the organization that at first
step form a four dimensional matrix with 756 segments using four
variables named value-based, behavioral, activity style, and activity
level, and at the second step calculate the means of profit for every
cell of matrix in two distinguished work level (levels α1:normal
condition and α2: high pressure condition) and compare the segments
by checking two conditions that are 1- homogeneity every segment
with its sub segment and 2- heterogeneity with other segments, and
so it can do the necessary segmentation process. After all, the last
offer (more explained by an operational example and feedback
algorithm) is to test and update the model because of dynamic
environment, technology, and banking system.
Abstract: With the advent of emerging personal computing paradigms such as ubiquitous and mobile computing, Web contents are becoming accessible from a wide range of mobile devices. Since these devices do not have the same rendering capabilities, Web contents need to be adapted for transparent access from a variety of client agents. Such content adaptation is exploited for either an individual element or a set of consecutive elements in a Web document and results in better rendering and faster delivery to the client device. Nevertheless, Web content adaptation sets new challenges for semantic markup. This paper presents an advanced components platform, called SMC, enabling the development of mobility applications and services according to a channel model based on the principles of Services Oriented Architecture (SOA). It then goes on to describe the potential for integration with the Semantic Web through a novel framework of external semantic annotation that prescribes a scheme for representing semantic markup files and a way of associating Web documents with these external annotations. The role of semantic annotation in this framework is to describe the contents of individual documents themselves, assuring the preservation of the semantics during the process of adapting content rendering. Semantic Web content adaptation is a way of adding value to Web contents and facilitates repurposing of Web contents (enhanced browsing, Web Services location and access, etc).
Abstract: A catastrophic earthquake measuring 6.3 on the
Richter scale struck the Christchurch, New Zealand Central Business
District on February 22, 2012, abruptly disrupting the business of
teaching and learning at Christchurch Polytechnic Institute of
Technology. This paper presents the findings from a study
undertaken about the complexity of delivering an educational
programme in the face of this traumatic natural event. Nine
interconnected themes emerged from this multiple method study:
communication, decision making, leader- and follower-ship,
balancing personal and professional responsibilities, taking action,
preparedness and thinking ahead, all within a disruptive and uncertain
context. Sustainable responses that maximise business continuity, and
provide solutions to practical challenges, are among the study-s
recommendations.
Abstract: e-Government structures permits the government to operate in a more transparent and accountable manner of which it increases the power of the individual in relation to that of the government. This paper identifies the factors that determine customer-s attitude towards e-Government services using a theoretical model based on the Technology Acceptance Model. Data relating to the constructs were collected from 200 respondents. The research model was tested using Structural Equation Modeling (SEM) techniques via the Analysis of Moment Structure (AMOS 16) computer software. SEM is a comprehensive approach to testing hypotheses about relations among observed and latent variables. The proposed model fits the data well. The results demonstrated that e- Government services acceptance can be explained in terms of compatibility and attitude towards e-Government services. The setup of the e-Government services will be compatible with the way users work and are more likely to adopt e-Government services owing to their familiarity with the Internet for various official, personal, and recreational uses. In addition, managerial implications for government policy makers, government agencies, and system developers are also discussed.
Abstract: Using mini modules of Tmotes, it is possible to automate a small personal area network. This idea can be extended to large networks too by implementing multi-hop routing. Linking the various Tmotes using Programming languages like Nesc, Java and having transmitter and receiver sections, a network can be monitored. It is foreseen that, depending on the application, a long range at a low data transfer rate or average throughput may be an acceptable trade-off. To reduce the overall costs involved, an optimum number of Tmotes to be used under various conditions (Indoor/Outdoor) is to be deduced. By analyzing the data rates or throughputs at various locations of Tmotes, it is possible to deduce an optimal number of Tmotes for a specific network. This paper deals with the determination of optimum distances to reduce the cost and increase the reliability of the entire sensor network with Wireless Local Loop (WLL) capability.
Abstract: Environmental factors affect agriculture production
productivity and efficiency resulted in changing of profit efficiency.
This paper attempts to estimate the impacts of environmental factors
to profitability of rice farmers in the Red River Delta of Vietnam. The
dataset was extracted from 349 rice farmers using personal
interviews. Both OLS and MLE trans-log profit functions were used
in this study. Five production inputs and four environmental factors
were included in these functions. The estimation of the stochastic
profit frontier with a two-stage approach was used to measure
profitability. The results showed that the profit efficiency was about
75% on the average and environmental factors change profit
efficiency significantly beside farm specific characteristics. Plant
disease, soil fertility, irrigation apply and water pollution were the
four environmental factors cause profit loss in rice production. The
result indicated that farmers should reduce household size, farm
plots, apply row seeding technique and improve environmental
factors to obtain high profit efficiency with special consideration is
given for irrigation water quality improvement.
Abstract: Biometric techniques are gaining importance for
personal authentication and identification as compared to the
traditional authentication methods. Biometric templates are
vulnerable to variety of attacks due to their inherent nature. When a
person-s biometric is compromised his identity is lost. In contrast to
password, biometric is not revocable. Therefore, providing security
to the stored biometric template is very crucial. Crypto biometric
systems are authentication systems, which blends the idea of
cryptography and biometrics. Fuzzy vault is a proven crypto
biometric construct which is used to secure the biometric templates.
However fuzzy vault suffer from certain limitations like nonrevocability,
cross matching. Security of the fuzzy vault is affected
by the non-uniform nature of the biometric data. Fuzzy vault when
hardened with password overcomes these limitations. Password
provides an additional layer of security and enhances user privacy.
Retina has certain advantages over other biometric traits. Retinal
scans are used in high-end security applications like access control to
areas or rooms in military installations, power plants, and other high
risk security areas. This work applies the idea of fuzzy vault for
retinal biometric template. Multimodal biometric system
performance is well compared to single modal biometric systems.
The proposed multi modal biometric fuzzy vault includes combined
feature points from retina and fingerprint. The combined vault is
hardened with user password for achieving high level of security.
The security of the combined vault is measured using min-entropy.
The proposed password hardened multi biometric fuzzy vault is
robust towards stored biometric template attacks.
Abstract: Web usage mining has become a popular research
area, as a huge amount of data is available online. These data can be
used for several purposes, such as web personalization, web structure
enhancement, web navigation prediction etc. However, the raw log
files are not directly usable; they have to be preprocessed in order to
transform them into a suitable format for different data mining tasks.
One of the key issues in the preprocessing phase is to identify web
users. Identifying users based on web log files is not a
straightforward problem, thus various methods have been developed.
There are several difficulties that have to be overcome, such as client
side caching, changing and shared IP addresses and so on. This paper
presents three different methods for identifying web users. Two of
them are the most commonly used methods in web log mining
systems, whereas the third on is our novel approach that uses a
complex cookie-based method to identify web users. Furthermore we
also take steps towards identifying the individuals behind the
impersonal web users. To demonstrate the efficiency of the new
method we developed an implementation called Web Activity
Tracking (WAT) system that aims at a more precise distinction of
web users based on log data. We present some statistical analysis
created by the WAT on real data about the behavior of the Hungarian
web users and a comprehensive analysis and comparison of the three
methods
Abstract: The major aim of this paper is to investigate the opposition politics in Africa. The paper also examines the status and the role, the contributions and the weaknesses of opposition1 political parties in Africa, particularly in transitional democracies that emerged in the 1990s. In Africa, many of the opposition parties appear or become active only during an election, and disappear when the election is over. It is found out that most of the opposition parties in Africa are established around the personalities of individuals, lack internal democracy, suffer from inter-party and intra-party conflicts, have severe shortage of finance, and lack strong base and experience. Their weaknesses also include bad organization and weak connection with the popular constituencies. The paper concludes that most of the weaknesses of the African opposition parties emanate from the incumbents- hostile policies, which are mostly aimed at fragmenting and weakening the opposition groups.
Abstract: The objectification of the Russian and Kazakh concepts, identify significant national identity, which reflects the cultural and social interpersonal are discussed in this article.
Abstract: The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.