Abstract: Image search engines rely on the surrounding textual
keywords for the retrieval of images. It is a tedious work for the
search engines like Google and Bing to interpret the user’s search
intention and to provide the desired results. The recent researches
also state that the Google image search engines do not work well on
all the images. Consequently, this leads to the emergence of efficient
image retrieval technique, which interprets the user’s search intention
and shows the desired results. In order to accomplish this task, an
efficient image re-ranking framework is required. Sequentially, to
provide best image retrieval, the new image re-ranking framework is
experimented in this paper. The implemented new image re-ranking
framework provides best image retrieval from the image dataset by
making use of re-ranking of retrieved images that is based on the
user’s desired images. This is experimented in two sections. One is
offline section and other is online section. In offline section, the reranking
framework studies differently (reference classes or Semantic
Spaces) for diverse user query keywords. The semantic signatures get
generated by combining the textual and visual features of the images.
In the online section, images are re-ranked by comparing the
semantic signatures that are obtained from the reference classes with
the user specified image query keywords. This re-ranking
methodology will increases the retrieval image efficiency and the
result will be effective to the user.
Abstract: The study of organisations’ information security
cultures has attracted scholars as well as healthcare services industry
to research the topic and find appropriate tools and approaches to
develop a positive culture. The vast majority of studies in Saudi
national health services are on the use of technology to protect and
secure health services information. On the other hand, there is a lack
of research on the role and impact of an organisation’s cultural
dimensions on information security. This research investigated and
analysed the role and impact of cultural dimensions on information
security in Saudi Arabia health service. Hypotheses were tested and
two surveys were carried out in order to collect data and information
from three major hospitals in Saudi Arabia (SA). The first survey
identified the main cultural-dimension problems in SA health
services and developed an initial information security culture
framework model. The second survey evaluated and tested the
developed framework model to test its usefulness, reliability and
applicability. The model is based on human behaviour theory, where
the individual’s attitude is the key element of the individual’s
intention to behave as well as of his or her actual behaviour. The
research identified a set of cultural and sub-cultural dimensions in SA
health information security and services.
Abstract: Background and aim: It has not been well studied
whether fentanyl-thiopental (FT) is effective and safe for PSA in
orthopedic procedures in Emergency Department (ED). The aim of
this trial was to evaluate the effectiveness of intravenous FT versus
fentanyl-midazolam (FM) in patients who suffered from shoulder
dislocation or distal radial fracture-dislocation.
Methods: In this randomized double-blinded study, Seventy-six
eligible patients were entered the study and randomly received
intravenous FT or FM. The success rate, onset of action and recovery
time, pain score, physicians’ satisfaction and adverse events were
assessed and recorded by treating emergency physicians. The
statistical analysis was intention to treat.
Results: The success rate after administrating loading dose in FT
group was significantly higher than FM group (71.7% vs. 48.9%,
p=0.04); however, the ultimate unsuccessful rate after 3 doses of
drugs in the FT group was higher than the FM group (3 to 1) but it
did not reach to significant level (p=0.61). Despite near equal onset
of action time in two study group (P=0.464), the recovery period in
patients receiving FT was markedly shorter than FM group
(P
Abstract: Given the dynamic nature of the higher education
landscape, induction programmes for new academics has become the
norm nowadays to support academics negotiate these rough terrain.
This study investigates an induction programme for new academics
in a higher education institution to establish what difference it has
made to participants. The findings revealed that the benefits ranged
from creating safe spaces for collaboration and networking to
fostering reflective practice and contributing to the scholarship of
teaching and learning. The study also revealed that some of the
intentions of the programme may not have been achieved, for
example transformative learning. This led to questioning whether this
intention is an appropriate one given the short duration of the
programme and the long, drawn out process of transformation. It may
be concluded that the academic induction programme in this study
serves to sow the seeds for transformative learning through fostering
critically reflective practice. Recommendations for further study
could include long term impact of the programme on student learning
and success, these being the core business of higher education. It is
also recommended that in addition to an induction programme, the
university invests in a mentoring programme for new staff and extend
the support for academics in order to sustain critical reflection and
which may contribute to transformative educational practice.
Abstract: Background: Taiwan now is an aging society. Research
on the elderly should not be confined to caring for seniors, but should
also be focused on ways to improve health and the quality of life.
Senior citizens who participate in volunteer services could become
less lonely, have new growth opportunities, and regain a sense of
accomplishment. Thus, the question of how to get the elderly to
participate in volunteer service is worth exploring. Objective: Apply
the Transtheoretical Model to understand stages of change in regular
volunteer service and voluntary service behaviour among the seniors.
Methods: 1525 adults over the age of 65 from the Renai district of
Keelung City were interviewed. The research tool was a
self-constructed questionnaire, and individual interviews were
conducted to collect data. Then the data was processed and analyzed
using the IBM SPSS Statistics 20 (Windows version) statistical
software program. Results: In the past six months, research subjects
averaged 9.92 days of volunteer services. A majority of these elderly
individuals had no intention to change their regular volunteer services.
We discovered that during the maintenance stage, the self-efficacy for
volunteer services was higher than during all other stages, but
self-perceived barriers were less during the preparation stage and
action stage. Self-perceived benefits were found to have an important
predictive power for those with regular volunteer service behaviors in
the previous stage, and self-efficacy was found to have an important
predictive power for those with regular volunteer service behaviors in
later stages. Conclusions/Implications for Practice: The research
results support the conclusion that community nursing staff should
group elders based on their regular volunteer services change stages
and design appropriate behavioral change strategies.
Abstract: The use of eXtensible Markup Language (XML) in
web, business and scientific databases lead to the development of
methods, techniques and systems to manage and analyze XML data.
Semi-structured documents suffer due to its heterogeneity and
dimensionality. XML structure and content mining represent
convergence for research in semi-structured data and text mining. As
the information available on the internet grows drastically, extracting
knowledge from XML documents becomes a harder task. Certainly,
documents are often so large that the data set returned as answer to a
query may also be very big to convey the required information. To
improve the query answering, a Semantic Tree Based Association
Rule (STAR) mining method is proposed. This method provides
intentional information by considering the structure, content and the
semantics of the content. The method is applied on Reuter’s dataset
and the results show that the proposed method outperforms well.
Abstract: Mobile social games recently become extremely
popular, spawning a whole new entertainment culture. However,
mobile game players are fickle, quickly and easily picking up and
abandoning games. This pilot study seeks to identify factors that
influence users to discontinuing playing mobile social games. We
identified three sacrifices which can prompt users to abandon games:
monetary sacrifice, time sacrifice and privacy sacrifice. The results
showed that monetary sacrifice has a greater impact than the other two
factors in causing players to discontinue usage intention.
Abstract: The connection between past travel experience and
tourists’ revisit behavioral intentions has not been widely explored
but the existing studies suggest a close relationship between them.
Destination image can equally be construed as having effects on the
attitudes of the tourists at the end of their actual visitation and the
satisfaction of a tourist with his or her travel experiences contributes
to a revisit intention towards a particular destination. With strong
marketing efforts, UAE is not only considered to be successful in
attracting foreign investors, but is becoming the most popular tourism
destination in the Arab region. UAE is seriously developing its
tourism image and taking serious initiatives to attract new or repeat
visitations from the international tourists. This study empirically
investigates the causal relationships between tourism destination
image, tourist satisfaction and revisit intention using UAE as a
contextual study setting. A very clear picture emerged which
provides a host country with potential implications for its tourism
industry practitioners, Department of Tourism and Commerce
Marketing and the travel agencies who act as the intermediaries
between the potential tourists and the hotel operators.
Abstract: The use of information and communication
technologies such as computers, mobile phones and the Internet is
becoming prevalent in today’s world; and it is facilitating access to a
vast amount of data, services and applications for the improvement of
people’s lives. However, this prevalence of ICTs is hampered by the
problem of low income levels in developing countries to the point
where people cannot timeously replace or repair their ICT devices
when damaged or lost; and this problem serves as a motivation for
this study whose aim is to examine the perceptions of teachers on the
reliability of cellphones when used for teaching and learning
purposes. The research objectives unfolding this aim are of two
types: Objectives on the selection and design of theories and models,
and objectives on the empirical testing of these theories and models.
The first type of objectives is achieved using content analysis in an
extensive literature survey: and the second type of objectives is
achieved through a survey of high school teachers from the ILembe
and UMgungundlovu districts in the KwaZulu-Natal province of
South Africa. Data collected from this questionnaire based survey is
analysed in SPSS using descriptive statistics and Pearson correlations
after checking the reliability and validity of the questionnaires. The
main hypothesis driving this study is that there is a relationship
between the demographics and the attribution identity of teachers on
one hand, and their perceptions on the reliability of cellphones on the
other hand, as suggested by existing literature; except that attribution
identities are considered in this study under three angles: intention,
knowledge and ability, and action. The results of this study confirm
that the perceptions of teachers on the reliability of cellphones for
teaching and learning are affected by the school location of these
teachers, and by their perceptions on learners’ cellphones usage
intentions and actual use.
Abstract: Self-service technologies (SSTs) make an important
contribution to the daily life of people nowadays. However, the
introduction of SST does not lead to its usage. Thereby, this paper
was an attempt on discovery of the most preferred SST in the
customers’ point of view. To fulfill this aim, the Analytical Hierarchy
Process (AHP) was applied based on Saaty’s questionnaire which
was administered to the customers of e-banking services located in
Golestan providence, northern Iran. This study used qualitative
factors in association with the intention of consumers’ usage of SSTs
to rank three SSTs: ATM, mobile banking and internet banking. The
results showed that mobile banking get the highest weight in
consumers’ point of view. This research can be useful both for
managers and service providers and also for customers who intend to
use e-banking.
Abstract: This study is purposed to develop an efficient fault
detection method for Global Navigation Satellite Systems (GNSS)
applications based on adaptive noise covariance estimation. Due to the
dependence on radio frequency signals, GNSS measurements are
dominated by systematic errors in receiver’s operating environment.
In the proposed method, the pseudorange and carrier-phase
measurement noise covariances are obtained at time propagations and
measurement updates in process of Carrier-Smoothed Code (CSC)
filtering, respectively. The test statistics for fault detection are
generated by the estimated measurement noise covariances. To
evaluate the fault detection capability, intentional faults were added to
the filed-collected measurements. The experiment result shows that
the proposed method is efficient in detecting unhealthy measurements
and improves GNSS positioning accuracy against fault occurrences.
Abstract: This study discovers a novel framework of individual
level technology adoption known as I-P (Individual- Privacy) towards
health information application in Smart National Identity Card. Many
countries introduced smart national identity card (SNIC) with various
applications such as health information application embedded inside
it. However, the degree to which citizens accept and use some of the
embedded applications in smart national identity remains unknown to
many governments and application providers as well. Moreover, the
factors of trust, perceived risk, Privacy concern and perceived
credibility need to be incorporated into more comprehensive models
such as extended Unified Theory of Acceptance and Use of
Technology known as UTAUT2. UTAUT2 is a mainly widespread
and leading theory up to now. This research identifies factors
affecting the citizens’ behavioural intention to use health information
application embedded in SNIC and extends better understanding on
the relevant factors that the government and the application providers
would need to consider in predicting citizens’ new technology
acceptance in the future. We propose a conceptual framework by
combining the UTAUT2 and Privacy Calculus Model constructs and
also adding perceived credibility as a new variable. The proposed
framework may provide assistance to any government planning,
decision, and policy makers involving e-government projects.
Empirical study may be conducted in the future to provide proof and
empirically validate this I-P framework.
Abstract: Recently, an increasing number of researchers have
been focusing on working out realistic solutions to sustainability
problems. As sustainability issues gain higher importance for
organisations, the management of such decisions becomes critical.
Knowledge representation is a fundamental issue of complex
knowledge based systems. Many types of sustainability problems
would benefit from models based on experts’ knowledge. Cognitive
maps have been used for analyzing and aiding decision making. A
cognitive map can be made of almost any system or problem. A
fuzzy cognitive map (FCM) can successfully represent knowledge
and human experience, introducing concepts to represent the essential
elements and the cause and effect relationships among the concepts to
model the behaviour of any system. Integrated waste management
systems (IWMS) are complex systems that can be decomposed to
non-related and related subsystems and elements, where many factors
have to be taken into consideration that may be complementary,
contradictory, and competitive; these factors influence each other and
determine the overall decision process of the system. The goal of the
present paper is to construct an efficient IWMS which considers
various factors. The authors’ intention is to propose an expert based
system design approach for implementing expert decision support in
the area of IWMSs and introduces an appropriate methodology for
the development and analysis of group FCM. A framework for such a
methodology consisting of the development and application phases is
presented.
Abstract: Online forum is part of a Learning Management
System (LMS) environment in which students share their opinions.
This study attempts to investigate the perceptions of students towards
online forum and their patterns of listening behavior during the forum
interaction. The students’ perceptions were measured using a
questionnaire, in which seven dimensions were used involving online
experience, benefits of forum participation, cost of participation,
perceived ease of use, usefulness, attitude, and intention. Meanwhile,
their patterns of listening behaviors were obtained using the log file
extracted from the LMS. A total of 25 postgraduate students
undertaking a course were involved in this study, and their activities
in the forum session were recorded by the LMS and used as a log file.
The results from the questionnaire analysis indicated that the students
perceived that the forum is easy to use, useful, and bring benefits to
them. Also, they showed positive attitude towards online forum, and
they have the intention to use it in future. Based on the log data, the
participants were also divided into six clusters of listening behavior,
in which they are different in terms of temporality, breadth, depth and
speaking level. The findings were compared to previous clusters
grouping and future recommendations are also discussed.
Abstract: The study examines the influence of marital status on
consumers of products and services using blogs as a source of
information. A pre-designed questionnaire was used to collect the
primary data from the respondents (experiences). Data were collected
from one hundred and eighty seven respondents residing in and
around the Emirates of Sharjah and Dubai of the United Arab
Emirates. The collected data was analyzed with the help of statistical
tools such as averages, percentages, factor analysis, Student’s t-test
and Structural Equation Modelling Technique.
Objectives of the study are to know the reasons how married and
unmarried or single consumers of products and services are
motivated to use blogs as a source of information, to know whether
the consumers of products and services irrespective of their marital
status share their views and experiences with other bloggers and to
know the respondents’ future intentions towards blogging.
The study revealed the following: Majority of the respondents
have the motivation to blog because they are willing to receive
comments on what they post about services, convenience of blogs to
search for information about services and products, by blogging
respondents share information on the symptoms of a disease/ disorder
that may be experienced by someone, helps to share information
about ready to cook mix products and are keen to spend more time
blogging in the future.
Abstract: With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.
Abstract: Entrepreneurship has captured the attention of policy-makers, educators and researchers in the last few decades. It has been regarded as a main driver for economic growth, development and employment generation in many countries worldwide. However, scholars have not agreed on the key factors that impact entrepreneurial intention. This study attempts, through an extensive literature review, to provide a holistic view and a more comprehensive understanding of the key factors that lead university undergraduate students to become entrepreneurs. A systematic literature review is conducted and several scientific articles and reports have been examined. The results of this study indicate that there are four main sets of factors: the personality-traits factors, contextual factors, motivational factors, and personal background factors. This research will serve as a base for future studies and will have valuable implications for policy makers and educators.
Abstract: Intrabody communication (IBC) is a new way of transferring data using human body as a medium. Minute current can travel though human body without any harm. IBC can remove electrical wires for human area network. IBC can be also a secure communication network system unlike wireless networks which can be accessed by anyone with bad intentions. One of the IBC systems is based on frequency shift keying modulation where individual data are transmitted to the external devices for the purpose of secure access such as digital door lock. It was found that the quality of IBC data transmission was heavily dependent on ground configurations of electronic circuits. Reliable IBC transmissions were not possible when both of the transmitter and receiver used batteries as circuit power source. Transmission was reliable when power supplies were used as power source for both transmitting and receiving sites because the common ground was established through the grounds of instruments such as power supply and oscilloscope. This was due to transmission dipole size and the ground effects of floor and AC power line. If one site used battery as power source and the other site used the AC power as circuit power source, transmission was possible.
Abstract: Negotiation is a specific form of interaction based on communication in which the parties enter into deliberately, each with clear but different interests or goals and a mutual dependency towards a decision due to be taken at the end of the confrontation. Consequently, negotiation is a complex activity involving many different disciplines from the strategic aspects and the decision making process to the evaluation of alternatives or outcomes and the exchange of information. While gender differences can be considered as one of the most researched topic within negotiation studies, empirical works and theory present many conflicting evidences and results about the role of gender in the process or the outcome. Furthermore, little interest has been shown over gender differences in the definition of what is negotiation, its essence or fundamental elements. Or, as differences exist in practices, it might be essential to study if the starting point of these discrepancies does not come from different considerations about what is negotiation and what will encourage the participants in their strategic decisions. Some recent and promising experiments made with diverse groups show that male and female participants in a common and shared situation barely consider the same way the concepts of power, trust or stakes which are largely considered as the usual driving forces of any negotiation. Furthermore, results from Human Resource self-assessment tests display and confirm considerable differences between individuals regarding essential behavioral dimensions like capacity to improvise and to achieve, aptitude to conciliate or to compete and orientation towards power and group domination which are also part of negotiation skills. Our intention in this paper is to confront these dimensions with negotiation’s usual driving forces in order to build up new paths for further research.
Abstract: The objectives of this research paper was to study the influencing factors that contributed the willingness of consumers to purchase products online included quality of website, perceived ease of use, perceived usefulness, trust on online purchases, attitude towards online shopping and intentions to online purchases. The research was conducted in both quantitative and qualitative methods, by utilizing both questionnaire and in-depth interview. A questionnaire was used to collect data from 350 consumers who had online shopping experiences in Bangkok, Thailand. Statistics utilized in this research included descriptive statistics and path analysis.
The findings revealed that the factors concerning with quality of website, perceived ease of use and perceived usefulness played an influence on trust in online shopping. Trust also played an influence on attitude towards online purchase, whereas trust and attitude towards online purchase manipulated the intention of online purchase.