Abstract: Recently, universities are increasingly consuming
energy to support various activities. A large population of staff and
students in Malaysian universities has led to excessive energy
consumption which directly gives an impact to the environment. The
key question then ascended “How well is an energy management
(EM) been practiced in universities without taking the Critical
Success Factors (CSFs) into consideration to ensure the management
of university achieves the goals in reducing energy consumption.
Review on past literature is carried out to establish CSFs for EM best
practices. Thus, this paper highlighted the CSFs which have to be
focused on by management of university to successfully measure the
EM implementation and its performance. At the end of this paper, a
theoretical framework is developed for EM success factors towards
sustainable university.
Abstract: Interaction between human, location and activity
defines space. In the framework of these relations, space is a
container for current specifications in relations of the 3 mentioned
elements. The change of land utility considered with average
performance range, urban regulations, society requirements etc. will
provide welfare and comfort for citizens. From an engineering view it
is fundamental that choosing a proper location for a specific civil
activity requires evaluation of locations from different perspectives.
The debate of desirable establishment of municipal service elements
in urban regions is one of the most important issues related to urban
planning. In this paper, the research type is applicable based on goal,
and is descriptive and analytical based on nature. Initially existing
terminals in Esfahan are surveyed and then new locations are
presented based on evaluated criteria. In order to evaluate terminals
based on the considered factors, an AHP model is used at first to
estimate weight of different factors and then existing and suggested
locations are evaluated using Arc GIS software and AHP model
results. The results show that existing bus terminals are located in
fairly proper locations. Further results of this study suggest new
locations to establish terminals based on urban criteria.
Abstract: The aim of this paper is to give an assessment of
environmental effects of IPPC permit conditions of installations that
are in specific territory with high concentration of industrial
activities.
The IPPC permit is the permit that each operator should hold to
operate the installation as stated by the directive 2010/75/UE on
industrial emissions (integrated pollution prevention and control),
known as IED (Industrial Emissions Directive).
The IPPC permit includes all the measures necessary to achieve a
high level of protection of the environment as a whole, also defining
the monitoring requirements as measurement methodology,
frequency and evaluation procedure. The emissions monitoring of a
specific plant may also give indications of the contribution of these
emissions on the air quality of a definite area.
So, it is clear that the IPPC permits are important tools both to
improve the environmental framework and to achieve the air quality
standards, assisting to assess the possible industrial sources
contributions to air pollution.
Abstract: Different tools and technologies were implemented
for Crisis Response and Management (CRM) which is generally
using available network infrastructure for information exchange.
Depending on type of disaster or crisis, network infrastructure could
be affected and it could not be able to provide reliable connectivity.
Thus any tool or technology that depends on the connectivity could
not be able to fulfill its functionalities. As a solution, a new message
exchange framework has been developed. Framework provides
offline/online information exchange platform for CRM Information
Systems (CRMIS) and it uses XML compression and packet
prioritization algorithms and is based on open source web
technologies. By introducing offline capabilities to the web
technologies, framework will be able to perform message exchange
on unreliable networks. The experiments done on the simulation
environment provide promising results on low bandwidth networks
(56kbps and 28.8 kbps) with up to 50% packet loss and the solution is
to successfully transfer all the information on these low quality
networks where the traditional 2 and 3 tier applications failed.
Abstract: Image search engines rely on the surrounding textual
keywords for the retrieval of images. It is a tedious work for the
search engines like Google and Bing to interpret the user’s search
intention and to provide the desired results. The recent researches
also state that the Google image search engines do not work well on
all the images. Consequently, this leads to the emergence of efficient
image retrieval technique, which interprets the user’s search intention
and shows the desired results. In order to accomplish this task, an
efficient image re-ranking framework is required. Sequentially, to
provide best image retrieval, the new image re-ranking framework is
experimented in this paper. The implemented new image re-ranking
framework provides best image retrieval from the image dataset by
making use of re-ranking of retrieved images that is based on the
user’s desired images. This is experimented in two sections. One is
offline section and other is online section. In offline section, the reranking
framework studies differently (reference classes or Semantic
Spaces) for diverse user query keywords. The semantic signatures get
generated by combining the textual and visual features of the images.
In the online section, images are re-ranked by comparing the
semantic signatures that are obtained from the reference classes with
the user specified image query keywords. This re-ranking
methodology will increases the retrieval image efficiency and the
result will be effective to the user.
Abstract: The study of organisations’ information security
cultures has attracted scholars as well as healthcare services industry
to research the topic and find appropriate tools and approaches to
develop a positive culture. The vast majority of studies in Saudi
national health services are on the use of technology to protect and
secure health services information. On the other hand, there is a lack
of research on the role and impact of an organisation’s cultural
dimensions on information security. This research investigated and
analysed the role and impact of cultural dimensions on information
security in Saudi Arabia health service. Hypotheses were tested and
two surveys were carried out in order to collect data and information
from three major hospitals in Saudi Arabia (SA). The first survey
identified the main cultural-dimension problems in SA health
services and developed an initial information security culture
framework model. The second survey evaluated and tested the
developed framework model to test its usefulness, reliability and
applicability. The model is based on human behaviour theory, where
the individual’s attitude is the key element of the individual’s
intention to behave as well as of his or her actual behaviour. The
research identified a set of cultural and sub-cultural dimensions in SA
health information security and services.
Abstract: The development, operation and maintenance of
Integrated Waste Management Systems (IWMS) affects essentially
the sustainable concern of every region. The features of such systems
have great influence on all of the components of sustainability. In
order to reach the optimal way of processes, a comprehensive
mapping of the variables affecting the future efficiency of the system
is needed such as analysis of the interconnections among the
components and modeling of their interactions. The planning of a
IWMS is based fundamentally on technical and economical
opportunities and the legal framework. Modeling the sustainability
and operation effectiveness of a certain IWMS is not in the scope of
the present research. The complexity of the systems and the large
number of the variables require the utilization of a complex approach
to model the outcomes and future risks. This complex method should
be able to evaluate the logical framework of the factors composing
the system and the interconnections between them. The authors of
this paper studied the usability of the Fuzzy Cognitive Map (FCM)
approach modeling the future operation of IWMS’s. The approach
requires two input data set. One is the connection matrix containing
all the factors affecting the system in focus with all the
interconnections. The other input data set is the time series, a
retrospective reconstruction of the weights and roles of the factors.
This paper introduces a novel method to develop time series by
content analysis.
Abstract: This study examines several critical dimensions of eservice
quality overlooked in the existing literature and proposes a
model and instrument framework for measuring customer perceived
e-service quality in the banking sector. The initial design was derived
from a pool of instrument dimensions and their items from the
existing literature review by content analysis. Based on focused
group discussion, nine dimensions were extracted. An exploratory
factor analysis approach was applied to data from a survey of 323
respondents. The instrument has been designed specifically for the
banking sector. Research data was collected from bank customers
who use electronic banking in a developing economy. A nine-factor
instrument has been proposed to measure the e-service quality. The
instrument has been checked for reliability. The validity and sample
place limited the applicability of the instrument across economies and
service categories. Future research must be conducted to check the
validity. This instrument can help bankers in developing economies
like India to measure the e-service quality and make improvements.
The present study offers a systematic procedure that provides insights
on to the conceptual and empirical comprehension of customer
perceived e-service quality and its constituents.
Abstract: This research study is an exploration of the selfdirected
professional development of teachers who teach in public
schools in an era of democracy and educational change in South
Africa. Amidst an ever-changing educational system, the teachers in
this study position themselves as self-directed teacher-learners where
they adopt particular learning practices which enable change within
the broader discourses of public schooling. Life-story interviews
were used to enter into the private and public spaces of five teachers
which offer glimpses of how particular systems shaped their
identities, and how the meanings of self-directed teacher-learner
shaped their learning practices. Through the Multidimensional
Framework of Analysis and Interpretation the teachers’ stories were
analysed through three lenses: restorying the field texts - the self
through story; the teacher-learner in relation to social contexts, and
practices of self-directed learning. This study shows that as teacherlearners
learn for change through self-directed learning practices,
they develop their agency as transformative intellectuals, which is
necessary for the reworking of South African public schools.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: Web-based Cognitive Writing Instruction (WeCWI)’s
contribution towards language development can be divided into
linguistic and non-linguistic perspectives. In linguistic perspective,
WeCWI focuses on the literacy and language discoveries, while the
cognitive and psychological discoveries are the hubs in non-linguistic
perspective. In linguistic perspective, WeCWI draws attention to free
reading and enterprises, which are supported by the language
acquisition theories. Besides, the adoption of process genre approach
as a hybrid guided writing approach fosters literacy development.
Literacy and language developments are interconnected in the
communication process; hence, WeCWI encourages meaningful
discussion based on the interactionist theory that involves input,
negotiation, output, and interactional feedback. Rooted in the elearning
interaction-based model, WeCWI promotes online
discussion via synchronous and asynchronous communications,
which allows interactions happened among the learners, instructor,
and digital content. In non-linguistic perspective, WeCWI highlights
on the contribution of reading, discussion, and writing towards
cognitive development. Based on the inquiry models, learners’
critical thinking is fostered during information exploration process
through interaction and questioning. Lastly, to lower writing anxiety,
WeCWI develops the instructional tool with supportive features to
facilitate the writing process. To bring a positive user experience to
the learner, WeCWI aims to create the instructional tool with
different interface designs based on two different types of perceptual
learning style.
Abstract: There is decagram of strategic decisions of operations
and production/service management (POSM) within operational
research (OR) which must collate, namely: design, inventory, quality,
location, process and capacity, layout, scheduling, maintain ace, and
supply chain. This paper presents an architectural configuration
conceptual framework of a decagram of sets decisions in a form of
mathematical complete graph and abelian graph.
Mathematically, a complete graph is undirected (UDG), and
directed (DG) a relationship where every pair of vertices is
connected, collated, confluent, and holomorphic.
There has not been any study conducted which, however,
prioritizes the holomorphic sets which of POMS within OR field of
study. The study utilizes OR structured technique known as The
Analytic Hierarchy Process (AHP) analysis for organizing, sorting
and prioritizing(ranking) the sets within the decagram of POMS
according to their attribution (propensity), and provides an analysis
how the prioritization has real-world application within the 21st
century.
Abstract: Nowadays, the successful implementation of ICTs is
vital for almost any kind of organization. Good governance and ICT
management are essential for delivering value, managing
technological risks, managing resources and performance
measurement. In addition, outsourcing is a strategic IT service
solution which complements IT services provided internally in
organizations. This paper proposes the measurement tools of a new
holistic maturity model based on standards ISO/IEC 20000 and
ISO/IEC 38500, and the frameworks and best practices of ITIL and
COBIT, with a specific focus on IT outsourcing. These measurement
tools allow independent validation and practical application in the
field of higher education, using a questionnaire, metrics tables, and
continuous improvement plan tables as part of the measurement
process. Guidelines and standards are proposed in the model for
facilitating adaptation to universities and achieving excellence in the
outsourcing of IT services.
Abstract: Femtocells are regarded as a milestone for next
generation cellular networks. As femtocells are deployed in an
unplanned manner, there is a chance of assigning same resource to
neighboring femtocells. This scenario may induce co-channel
interference and may seriously affect the service quality of
neighboring femtocells. In addition, the dominant transmit power of a
femtocell will induce co-tier interference to neighboring femtocells.
Thus to jointly handle co-tier and co-channel interference, we
propose an interference-free power and resource block allocation
(IFPRBA) algorithm for closely located, closed access femtocells.
Based on neighboring list, inter-femto-base station distance and
uplink noise power, the IFPRBA algorithm assigns non-interfering
power and resource to femtocells. The IFPRBA algorithm also
guarantees the quality of service to femtouser based on the
knowledge of resource requirement, connection type, and the
tolerable delay budget. Simulation result shows that the interference
power experienced in IFPRBA algorithm is below the tolerable
interference power and hence the overall service success ratio, PRB
efficiency and network throughput are maximum when compared to
conventional resource allocation framework for femtocell (RAFF)
algorithm.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: The star network is one of the promising
interconnection networks for future high speed parallel computers, it
is expected to be one of the future-generation networks. The star
network is both edge and vertex symmetry, it was shown to have
many gorgeous topological proprieties also it is owns hierarchical
structure framework. Although much of the research work has been
done on this promising network in literature, it still suffers from
having enough algorithms for load balancing problem. In this paper
we try to work on this issue by investigating and proposing an
efficient algorithm for load balancing problem for the star network.
The proposed algorithm is called Star Clustered Dimension Exchange
Method SCDEM to be implemented on the star network. The
proposed algorithm is based on the Clustered Dimension Exchange
Method (CDEM). The SCDEM algorithm is shown to be efficient in
redistributing the load balancing as evenly as possible among all
nodes of different factor networks.
Abstract: Supply chain (SC) is an operational research (OR)
approach and technique which acts as catalyst within central nervous
system of business today. Without SC, any type of business is at
doldrums, hence entropy. SC is the lifeblood of business today
because it is the pivotal hub which provides imperative competitive
advantage. The paper present a conceptual framework dubbed as
Homomorphic Conceptual Framework for Effective Supply Chain
Strategy (HCEFSC).The term Homomorphic is derived from abstract
algebraic mathematical term homomorphism (same shape) which
also embeds the following mathematical application sets:
monomorphisms, isomorphism, automorphisms, and endomorphism.
The HCFESC is intertwined and integrated with wide and broad sets
of elements.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: Enterprise Architecture (EA) is employed by
enterprises for providing integrated Information Systems (ISs) in
order to support alignment of their business and Information
Technology (IT). Evaluation of EA implementation can support
enterprise to reach intended goals. There are some problems in
current evaluation methods of EA implementation that lead to
ineffectiveness implementation of EA. This paper represents current
issues on evaluation of EA implementation. In this regard, we set the
framework in order to represent evaluation’s issues based on their
functionality and structure. The results of this research not only
increase the knowledge of evaluation, but also could be useful for
both academics and practitioners in order to realize the current
situation of evaluations.
Abstract: Recommendation systems are widely used in
e-commerce applications. The engine of a current recommendation
system recommends items to a particular user based on user
preferences and previous high ratings. Various recommendation
schemes such as collaborative filtering and content-based approaches
are used to build a recommendation system. Most of current
recommendation systems were developed to fit a certain domain such
as books, articles, and movies. We propose1 a hybrid framework
recommendation system to be applied on two dimensional spaces
(User × Item) with a large number of Users and a small number
of Items. Moreover, our proposed framework makes use of both
favorite and non-favorite items of a particular user. The proposed
framework is built upon the integration of association rules mining
and the content-based approach. The results of experiments show
that our proposed framework can provide accurate recommendations
to users.