(0 Item)

Infocomm Technologies in Competitive Strategies (ICT 2010)

Academic Conferences - Infocomm Technologies in Competitive Strategies (ICT 2010)
Academic Conferences

By : Global Science & Technology Forum

Date : 2010

Location : Singapore / Singapore

PDF 219p
Description :

The conference focused on the infocomm ecosystem. How the Infocomm Technologies have revolutionized the world and provided with a born-global platform that delivers rich information on every imaginable subject and enables the unprecedented integration of social information.

Keywords :

IT strategic alignment, infocomm proceedings, Infocomm research, infocomm industry, competitve strategies using technology, Technology strategy, information technlogy academic research

Keywords inside documents :

mobile ,banking ,business ,system ,based ,management ,alignment ,model ,strategic ,users ,learning ,training ,security ,technology ,agent ,algorithm ,content ,process ,services ,change

ICT start-ups play a critical role in the infocomm ecosystem. They ride the wave of innovation while leveraging on traditional competitive advantages to build new scalable capabilities. 

Innovation in the Infocomm Technologies have revolutionized the world and provided with a born-global platform that delivers rich information on every imaginable subject and enables the unprecedented integration of social information.

 

Proceedings from the Infocomm Technologies in Competitive Strategies (ICT 2010) conference.

Abstracts from papers available from The Infocomm Technologies in Competitive Strategies (ICT 2010) conference.

 

1. A Proposed Redesign Model of Charles Darwin University’s (CDU) Careers and Employment Website

Craig Coley, Charles Darwin University, School of Academic Language and Learning, Darwin Australia

Dr. Jamal El-Den, Rebecca England, Charles Darwin University, School of Eng. and IT, Darwin Australia

 

Recently, the expectations of Website users have changed as a result of the development of mobile devises andimproved accessibility. The research proposes a redesign, redevelopment and implementation of the CDU careers and Employment website taking these changes into consideration.The initial web site design strictly conforms to the university corporate template with little attention to the needs of the users due to the constraints of past CDU policy which inhibited innovation. The research proposes a model web site as a result of redesigning the CDU Careers and Employment website byreconciling users and client’s needs to the CDU corporate template. In designing the model, the research followed a web development life cycle methodology incorporating comparative analysis, personas, and user testing which visualized the user’sneeds by increments. The research demonstrates recognition of websites showing elements of best design in navigation, layout,and mobile net functionality. In addition the research provided knowledge of user demographics, user scenarios, and preliminary user design. The authors believe that the redesign, which was partially adopted and implemented as the basic foundation for further development of other aspects of the CDU web design in general, has resulted in improving the website’s design, navigation, and interactivity.

 

2. Is Ethics Important in a Virtual World?

Dr. Radha Parikh, Asst. Professor, Dhirubhai Ambani Institute of Information & Communication Technology, Gandhinagar

 

An oft-repeated quote is that “the world is one global village thanks to technology.” When something is of great value, thereare bound to be some disadvantages alongside. And if we were to examine what those weaknesses are which make technology a threat along with a blessing, we would find that a lack of ethical behavior among users of technology ranks high on this list. The argument that all over the world morals are decreasing is notreally true because youth of today while they are questioning superstitious rituals and religious traditions, are actually turning to spirituality and alternate healing techniques. Does this result in ethical behavior online? How can we ensure ethical behavior in the cyber world.

 

3. Descriptive Complexity of a Fragment of C Language

Soha Safwat, Faculty of Computer Science, October University for Modern Science and Arts, Egypt

Wafik Lotfalah, Faculty of Engineering, AUC University, Cairo, Egypt

Ibrahim Farag, Faculty of Computers and Information, Cairo University, Giza, Egypt

 

Descriptive complexity emerged from finite model theory and had its aims in finding logics that capture computational complexity classes. Observing that imperative programming languages can also be considered as logics (maybe with some additional control), we extend the scope of descriptive complexity by defining two fragments of such languages and showing that they capture the classes P and NP.

 

4. Mobile Banking in Bangladesh

Omar Faisal, M.Sc in ICT4D, Department of Computer and System Sciences, Stockholm University, Sweden


Mobile Banking is one of the latest tools for easy and convenient banking in the current world. Day by day mobile payment has become popular and it’s fulfilling consumer’s demand. The large numbers of Bangladeshi people are facing many harassments duo to the lack of modern banking modern banking facilities. The government banks don’t have the internet banking and ATM services; only few of private banks have some ATM booths. There are only about 650 ATM booths forthe huge population and branches of bank are not available in the rural area. For paying utilities bill,money transfer and doing banking activities people needto go to the bank by physically and waiting in bigqueue. This is due to the fact that Bangladesh has more than 40 banks but still now banks couldn’t introduced fully internet and mobile banking services. Another problem is that 46% of the population lives below the poverty line and wretched transportation system overall the country.

 

5. The Role of Information Security in Developing and Delivering Training

David C. Huff, Ph.D., College of Business Wayne State University, College of Information Technology Western Governors University, Detroit, Michigan and Salt Lake City, Utah

 

Information Assets and Proprietary Information mustbe suitably protected, but in order to optimize and leverage these assets, organizations need to disseminate and utilize the very intellectual property that they seek to protect. Organizational training providers can find their mission in direct conflict with organizational Information Security Management Systems processes and policies. The author investigates multiple organizations in order to detail the problems and best practices that are employed to balance the tension between the training function and security policies.

 

6. HONING FILE FORMAT EXTENSION

Blake W. Ford, Department of Computer Science, Texas State University – San Marcos, San Marcos, Texas United States

Khosrow Kaikhah, Department of Computer Science, Texas State University – San Marcos, San Marcos, Texas United States

 

The study expands upon previous work in format extension. The initial research repurposed extra space provided by an unrefined format to store metadata about the file in question. This process does not negatively impact the original intent of the format and allows for the creation of new derivative file types with both backwards compatibility and new features.

 

7. Study On Key Technology For Encryption And Security System In Wireless Communication Network

Hsien-Wei Tseng, Dept. of Computer & Communication, Engineering DE LIN Institute of Technology Tucheng,Taipei County, Taiwan

Rong-Hou Wu, Dept. of Computer & Communication, Engineering St. John's University, Tamsui,Taipei County, Taiwan,

Chih-Yuan Lo, Dept. of Electrical Engineering, Tamkang University, Tamsui,Taipei County, Taiwan

Yang-Han Lee, Dept. of Electrical Engineering, Tamkang University, Tamsui,Taipei County, Taiwan

Liang-Yu Yen, Dept. of Electrical Engineering, Tamkang University, Tamsui,Taipei County, Taiwan

 

A novel secure encryption using the recieved signal strength indicator (RSSI) has been proposed in this paper. RSSI signals are time variant and irregular, especially in more complicated environment. Changes of RSSI can generate anonperiodical random number, and an attacker will hardly predict this number. Furthermore, we use this option, opencryptography algorithm, and rapid stream ciphers to construct an efficient encryption system for wireless communication network.

 

8. IT- Business strategic alignment in influencing sustainable competitive advantage in Jordan

Dmaithan almajali, Universiti Utara Malaysia, Malaysia

Zulkhairi Dahlin, Universiti Utara, Malaysia

 

In this study, we conduct a review of literature on business – IT strategic alignment and sustainable competitive advantage. We argue that conceptual shortcoming, such as the lack of clarity inconstitutive definition of alignment construct. We propose aconceptual definition of business – IT strategic alignment. we conclude this article stressing that additional theoretical and endeavors regarding business- IT strategic alignment and sustainable competitive advantage are needed , emphasizing that such efforts should be conducted with greater attention to th eissues discussed in this review. The result shows that some of the hypothesis were supported except for some of the hypothesis were not supported.


9. Improving Medical Information Security using Contextualization Models

Patricia A H Williams, SECAU- Security Research Centre, Edith Cowan University, Joondalup, Western Australia

 

Information communication technologies will increasingly make security in organizations more complex. This will be particularly evident in sectors that already lack adequate security regimes. One such sector is healthcare, where information security is not their core business and the understanding of its importance is often underestimated. Poor implementation of medical information security is affected by more than the acceptance of technology; it is closely linked to human factors, culture and communities of practice, all under pinned by trust. This situation necessitates research into how to contextualize implementation of information security within this environment. The application of a contextual implementation model is compared to the known cultural and community of practice factors in the medical environment. The outcomes provide a better understanding of the issues and formthe basis of a model for improving the effective implementation and continued application of effective information security. The impact of this research is in the improved protection of medical information and contributes to the potential for secure e-health solutions nationally.

 

10. Factors affecting technology acceptance- evidence from the hotel industry in Mauritius

Vidisha D. Gunesh Ramlugun, Lecturer, Department of Finance and Accounting, University of Mauritius, Reduit, Mauritius

 

We set out to investigate the level of application of ICT / E-business inthe tourism industry in Mauritius. We also sought to ascertain the different impediments to e-business adoption. Out of the 50 questionnaires we administered, 41 were usable. Findings mainly reveal that E-business offers multiple business ventures that assist this sector in expanding their business activities. In addition, it is seen thate-marketing is gaining priority compared to other advertising medium. Nonetheless, the Internet usage amongst the Mauritian tourism industryis still at an early stage, and the rate of adoption of e-business practices is slow. Web pages are inefficiently exploited and merely display static information. The study also demonstrates that cultural differences among customers, lack of personal contact with customers, costsimplications and security issues are factors that impinge on e-business adoption. Managerial implications are discussed and suggestions forfuture research are made.

 

11. An Analysis of Mobile Banking Acceptance in Mauritius

Raj Kishen Moloo, Lecturer, University of Mauritius, Reduit, Mauritius

 

Around the world, especially in developing countries like Kenya, Phillipines and South Africa, Mobile Banking has been a clear success in terms of financial inclusion of the unbanked, poor and rural people. Slower pace of adoption has been noted in developed countries having sufficient banking coverage, with banks and customers treading on a cautious path. In Mauritius, mobile banking is still at its infancy, with the leading banks having shyly introduced such service, restricting it merely to inquiry based and alerts. To countries having implemented it, it provides a cheap, affordable and fast means of performing banking transactions to the convenience of customers, with a variety of possible uses and applications. This mobile banking survey carried out to around 455 people in Mauritius analyses the readiness of Mauritian to accept Mobile banking as a new and innovative way of doing banking and payments chores. It overviews Mauritian banking behaviour patterns, identify target groups and banking services which they might be interested. It also provides a strong insight on Mauritians banking preferences and features they would wish to have in a Mobile banking application. The results can be of valuable guidance to the established banks, new banks and potential new players in the fields like telecom companies, in fine tuning their mobile banking strategies for a better competitive edge.

 

12. Banking on the Move: A Case for Introducing Mobile Banking In Mauritius

Raj Kishen Moloo, Lecturer, University of Mauritius, Reduit, Mauritius


A sound financial and Information Technology (IT) infrastructure, an ever increasing IT and mobile literate population; Banks in Mauritius have all the necessary ingredients in introducing and establishing Mobile banking toits customers. From a mono-economy based on agriculture in the 1960’s to a sound Financial and Digital economy, Mauritius has reinvented its ways of doing business, focussing on customer services. Convenience is the keyword forcustomers; and banks’ competitive advantage depends on their ability to unleash the power of self-service to the convenience of its customers. This paper prospects the readiness of Mauritius in accepting and introducing Mobile Banking. It provides a status of the different sectors involved like Information and Communication Technology (ICT), the banking sector along with the respective regulatory authorities. Finally it provides a strong business case for Banks, Financial institutions and other new business alliancesin Mauritius to introduce this new service to its customers, with possible gains in terms of customer retention and satisfaction, potential time and cost saving and providing “Banking on the Move” at the convenience of the customer.


13. A modular hybrid Ant Colony Approach for solving traveling salesman problem

Sudip Kumar Sahana, Assistant Prof, Dept of CSE, Birla Institute of Technology, Ranchi, Jharkhand, India.

Dr.(Mrs).Aruna Jain, Associate Prof, Dept of IT, Birla Institute of Technology, Ranchi, Jharkhand, India

 

To solve the well known traveling salesman problem(TSP) a combined approach of Ant Colony Optimization (ACO) and Genetic Algorithm (GA) are considered over here primarily. A number of solutions are given by the researchers in the past few decades even using a hybrid approach of ACO and GA to achieve the optimization. But our work gives the optimal solution for the said problem by using the modular hybrid approach of ACO and GA in addition to some heuristic approach. We have incorporated GA in ACO module, hence each iteration calls the GA within ACO module results in a higher amount of pheromone deposited in the optimal path in the global pheromone update. Hence the convergence is quicker and solution is optimal.

 

14. A Lightweight Mobile Banking Solution Easily Integrateable with Existing Banking System

Raj Kishen Moloo, Lecturer, University of Mauritius, Reduit, Mauritius

Maheshwaree Kissoon, Lecturer, University of Mauritius, Reduit, Mauritius

Pascal Louise, Student, University of Mauritius

Sanjeeven Cootthen, Student, University of Mauritius

 

With an ever increasing sophistication of Mobile phones and the rapid pace of adoption of mobile handsets has today revolutionized our lives providing innovative mobile services that are already beyond basic telephony. With increased processing capabilities, better storage, ubiquitous and convenient nature, mobile phones have created new business opportunities, making banking on the move a reality. With nearly 84% of Mauritian having a mobile phone and enjoying 99% network coverage, Mauritius has all the necessary ingredients of wide adoption of mobile banking both by bank customers and by banks themselves. Nevertheless, slow pace of adoption has been noted, the reason being security concerns and high learning curve for customers, while considerable investment and reengineering process for banks. This paper aims at providing a lightweight easy to use and intuitive mobile banking system that can seamlessly integrate with the existing banking, without the need to re-engineer their banking process.

 

15. Phishing: The Worst Computer Crime in Thailand

Danuvasin Charoen, Ph.D, NIDA Business School, Thailand


This paper investigates the crime of phishing in Thailand. The Internet has become a major part ofpeople’s lives, and E-Commerce is growing very rapidly. Information in the past was in analog form, but now most information is kept in digital format.Customers and financial information have become a main target of criminals. Phishing, which is a method that criminals (phishers) use to send or create fraudulent messages to trick users to give away personal information, has become the most frequent computer crime in Thailand. This paper collects data from secondary sources and analyzes the characteristics of phishing in Thailand. This paper also identifies the root causes of phishing and the methods that phishers use to steal information from victims. Organizations can use the results of this study to educate their users about thecrime of phishing crime and implement controls andpolicy to reduce the risk of being a victim of phishing.

 

16. A New Parallel Algorithm to find out the Longest Common Subsequence from Multiple Biological Sequences

Amit Shukla, Computer Science and Engineering Department, MNNIT Allahabad, Allahabad, India

Suneeta Agarwal, Computer Science and Engineering Department, MNNIT Allahabad, Allahabad, India

 

The Longest common subsequence problem is to find a subsequence that is common to two or more given sequences and is the longest one of such subsequences. This problem of searching the longest common subsequence (LCS) from multiple biological sequences is one of the most fundamental tasks in bioinformatics. Earlier Rizvi and Agarwal had proposed an algorithm for it, but we found out that their algorithm gives wrong results in some cases. We have proposed an algorithm towards correcting the errors. Inthis paper, we present a parallel algorithm named NEW_LCS_ALGO to find the LCS from any number of given DNA, RNA, Protein or general sequences. Here we give examples of DNA sequences, although this can be used for RNA, Protein or general sequences (provided we know the characters being used). The speed up in our LCS Algorithm isachieved through pruning operations, in which we reject all those nucleotides which cannot generate the next character of the LCS thus reducing the search space and accelerating thesearch speed.


17. Customizable Rubrics Model for Formative Evaluation of Problem-Based Learning Course

Mawarny binti Md. Rejab, College of Arts & Science, Universiti Utara Malaysia, Sintok, Kedah, Malaysia

Syahidah binti Hassan, College of Arts & Science, Universiti Utara Malaysia, Sintok, Kedah, Malaysia
Isha bin Awang, College of Arts & Science, Universiti Utara Malaysia, Sintok, Kedah, Malaysia

Mazida binti Ahmad, College of Arts & Science, Universiti Utara Malaysia, Sintok, Kedah, Malaysia


Nowadays, a revolution in education is taking place by shifting from the teacher-centered approach to the learner centered approach. Due to the lack of ability and skills in problem solving, Problem-Based Learning (PBL) is introduced in numerous academic disciplines such as engineering, computerscience, and others. Problem Based-Learning is one of the pedagogy approaches that enable students to work in groups to solve real-life problems, whilst the lecturer takes on the role as a facilitator of learning. In conducting the Problem-Based Learning class, the assessment of Problem-Based Learning course involves several evaluation components, namely the written evaluation, the presentation evaluation and the peer evaluation. Several phases or stages are needed in the implementation of PBL and each of phases requires different evaluation.

Due to the tedious works and cumbersome process in needed to assist the formative evaluation for PBL. Thus, the main objective of this paper is to describe a customizable rubrics model for PBL formative evaluation. The model was derived based on the existing rubrics tools. Besides, observation on several previous researches in designing rubrics for supporting educational environment is carried out to firm the model. This paper focuses on formative evaluation in assessing the initial and ongoing activities in problem solving, together with result oroutcome of the problem solution. It also focuses on the individual performance assessment from the perspectives of the team members. This study is expected to provide a fair, manner and efficiency method of Problem-Based Learning formative evaluation that corresponds to any course contents.

 

18. An Empirical Study of Antecedents and IT-Business Strategic Alignment in Jordanian Public Shareholding Firms: A Structural Equation Modelling Approach

Ra’ed M. Masa’deh, Faculty of Business, University of Jordan, Amman, Jordan

Rifat O. Shannak, Faculty of Business, University of Jordan, P.O.Box 13357, Amman, Jordan

Dmaithan A. Almajali, College of Arts & Sciences, Universiti Utara Malaysia, Malaysia

Zulkhairi Dahalin, College of Arts & Sciences, Universiti Utara, Malaysia,Malaysia

 

Preceding research attributed the lack of direct causal impact of Information Technology (IT) on firm performance to numerous missing links including antecedents of IT-business strategic alignment (also known as strategic alignment), and intermediaries between alignment and firm performance. Furthermore, recent reviewers [44] have called for more research into the factors that affect strategic alignment, and the coupling process between alignment and performance.

In this paper, we develop and empirically test specific forms of management structures and processes which arerequired to drive strategic alignment. Further, we proposea causal-chain model to examine the impacts of six antecedents on strategic alignment. The data, from over 180 Jordanian public shareholding firms, using structural equation modeling generally support the hypotheses.Furthermore, the study’s findings suggest that leadership, values and belief, IT managerial resources, and IT implementation successes impact significantly IT businessstrategic alignment; whereas no relationships found between structure and process, and service qualityon strategic alignment.

 

19. Time Domain Blind Adaptive Channel Equalization for Zero-Padding OFDM System

Chen Wei, School of Electronic Engineering,, University of Electronic Science and Technology of China (Qing Shui River Zone), UESTC, Chengdu, P.R.China

 

A adaptive blind equalization algorithm used for ZP-OFDM systems is introduced in this paper, the proposed approach witch uses the zero-padding time guard interval (TGI) of OFDM signals equalizes the multi-path channels in time domain. This algorithm has the advantage of lower complexity and validity for long multi-path (its delay is longer than TGI).

 

20. A novel PEG-based Construction Method for Structured LDPC Codes

Wu Zhanji, Wireless Signal Processing and Network Lab, Beijing University of Posts and Telecommunications, Beijing

Fu Tingting, Wireless Signal Processing and Network Lab, Beijing University of Posts and Telecommunications, Beijing

Zhang Liling, Wireless Signal Processing and Network Lab, Beijing University of Posts and Telecommunications, Beijing

Ma Cheng, Wireless Signal Processing and Network Lab, Beijing University of Posts and Telecommunications, Beijing

Shen Yonghao, Wireless Signal Processing and Network Lab, Beijing University of Posts and Telecommunications, Beijing

Wang Wenbo, Wireless Signal Processing and Network Lab, Beijing University of Posts and Telecommunications, Beijing

 

A construction method for structured Low-Density Parity-Check (LDPC) codes is presented and half-code-rate LDPC codesbased on this method is proposed in this paper.This PEG-based construction method is introduced from the perspective of minimizing the ring and reducing the number of short ringcycles. The LDPC codes based on this method out perform Turbo codes in 3GPP-LTE LDPC codes. Moreover, thanks to its low complexity and small storage space, this method is very easy for encoding and decoding, which makes it applicable to powerful channel coding of future mobile communications and deep-space communications.

 

21. Analysis of Information Security Strategies for Web 2.0 Environment

Ted Lau, Science & Technology Policy Research and Information Center, National Applied Research Laboratory, Taipei, Taiwan

Hsuan-Chih Wang, Science & Technology Policy Research and Information Center, National Applied Research Laboratory, Taipei, Taiwan


The Web 2.0 environment provides fertile ground for Internet criminals to harvest sensitive information, online bank accounts and credit card numbers, and bot nets. Therefore, it is essential to provide security technologies to protect client devices, web servers and user information contents. This article examines the security strategy for the Web 2.0 environment based on Web 2.0 security related technical patents within the USPTO database that were approved between 2000 and 2009. This study found that similar efforts were made in protecting both client devices and web servers. In addition, more effort was put into content management. Furthermore, by examining Web 2.0 security related articles from the SCIand SSCI journals from 2005 through 2009, much research has been conducted in technologies for protecting the information contents.

 

22. Hierarchical Kohonen Network for Clustering the Large Quantities of Multi-Variate Data

Tang Van To, Dept. of Computer Science, Assumption University, Bangkok, Thailand

S. Thummaroj, Dept. of Computer Science, Assumption University, Bangkok, Thailand

 

The Kohonen Network is a powerful tool inexploratory phase of data mining. It is capable of projecting high dimensional data onto a low, usually 2-dimensional grid of neurons with good neighborhood preservation and a good tool for dimensional reduction. However, when to due with the large quantities of high-dimensional data, a large size of networks should be used and it need an extremely time consuming. Hierarchical Kohonen Network is a combination of multi branching decision tree and Kohonen Network, one of solution to overcome the drawback of Kohonen Network. A comparison between Kohonen Network and Hierarchical Kohonen Network is done and a possible way to enlarge the size of Kohonen Network through Hierarchical Kohonen Network will bediscussed.

 

23. Web-based technology assisted teaching: A pilot project at Monash University

A.g.M. Das, Monash University, South Africa

 

We present a Web-based technology assisted teaching project at a University, initiated to overcome difficulties experienced due to distance and different time-zones at six campuses in three continents. We demonstrate that the pilot project initiated to improve teaching methods used for Information Technology degree programs at these campuses have been running smoothly and benefited from experience gained in this pilot project at these campuses thanks to web based technologies. Many of theadvantages for the lecturing staff, administrators and the participating students have been highlighted. We employ paperless teaching and so our program is green technology compliant. We have employed web based course management tools (CMT) to effectively manage, coordinate, monitor progress, provide feedback to students in real time and to link students and staff in six different campuses forming one teaching and learning community dedicated to active learning and to achieve best possible outcomes without sacrificing standards.

The pilot project is elaborated using one course unit as an example showing the benefits and difficulties experienced and solutions explored. The web page is well designed, user-friendly and well managed and forms the backbone of the virtual learning environment (VLE). Web based access to learning materials, simulations and animations, historical images, short clips of scientists and scientific labs contributed for the development of this technological advancements leading to modern computer system designs, sound and video clips of computer technology based systems and finally glimpses of current and future trends including research and development are highlighted. Typical examples of simulations used, animations and web page designs used in this pilot project are shown. The web based learning system forms the integral part of the learning system encompassing all six campuses in a seamless manner. Conscious efforts were made to make the presentation of the course material not tedious but an enjoyable experience to our first year student sof IT. Student satisfaction has been measured using a feedback system and the overall performance improvements measured; these are also presented in this paper.

 

24. HR, IT and Innovation

Kishore Pathur, MBA Candidate: IMT Nagpur, Program Manager, Innovation, Trivandrum, India

Sanuj Krishnan K., MBA Candidate: XLRI Business School, Jamshedpur, Business Success Enabler, UST Global, Trivandrum, India

 

There is tremendous scope for innovation involving the human capital - their biggest asset. The concept of IT enabled mass innovation and crowd sourcing that leverage the ‘crowd’ to ideate, research and innovate gets special attention here.

 

25. Evaluating the performance of Information, Technology Strategic Planning using: ITSP Alignment model

Mohammed Alaa. H. Altemimi1, Faculty of Information Science and Technology, System Management And Science department, Universiti Kebangsaan Malaysia

Mohamad Shanudin Zakaria, UKM-Graduate School of Business, Universiti Kebangsaan Malaysia

Yazrina Yahya, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia


Most of organizations endeavor to employing IT as tool for a competitive and supporting the capability of IT to accomplishment the objective of organization as well as enhance the alignment between IT and business strategy. The research question in this paper; is how to evaluate ITSP performance from management perspective. The suggested model leads to the development a successful IT strategic plan performance, enabling planning with business strategy and allowing technology to provide for competitive advantage. They are often need to find are liable ways to ensure that the business benefits from ITSP plan are released and provide a high level of competitive. This research aims to increase the corporate performance toward efficiency, effectiveness and competitiveness in facing the uncertainty and mobility of the business environment to supportthe strategy planning decision.

 

26. Enterprise Business Architecture in Indonesia Higher Education: A Case Study

Roni Yunis, Department of Information System, STMIK Mikroskil, Medan, Indonesia

Kridanto Surendro, Department of Informatics, STEI, Institute of Technology Bandung, Bandung, Indonesia

Kristian Telaumbanua, Department of Information System, STMIK Mikroskil, Medan, Indonesia

 

In this paper we discuss the concept of enterprise business architecture. We explain a preliminary study the concept and, based on a case study, discuss its relevance, operation, relationship with strategy and business models, and value for Indonesia higher education. Enterprise business architecture contributes to clarify the complexity within an organization and form a useful starting point from which to develop functional, information, process and application architectures. In addition, an explicitly enterprise business architecture helps to structure the responsibilities within organization (higher education), and within the primary processas well as with regard to IT-support. Enterprise business architectures contribute to adequate IT strategies in order to manage the resources for critical business activities and how to manage the development and support for business efficiently.

 

27. Complex Issues on Legacy Modernization in Japan: A Case Study of a System Deployed on Unisys Mainframe

Takashi Imaizumi, Graduate Department of Project Management and Information Technologies, University of Aizu, Aizu-wakamatsu, Japan

Koichi Noda, Graduate Department of Project Management and Information Technologies, University of Aizu, Aizu-wakamatsu, Japan

Saphina Lawrence Mchome, Graduate Department of Project Management and Information Technologies, University of Aizu, Aizu-wakamatsu, Japan

Rentaro Yoshioka,Graduate Department of Project Management and Information Technologies, University of Aizu, Aizu-wakamatsu, Japan
 

A legacy system is an information system that is running on out dated technology. Traditionally, Japan can be viewed as a main frame dependent country. Since the late 1990s, modernization of legacy systems has been under serious considerations. Various approaches for modernizing legacy systems have been presented over the years. However, more than 60% of Japanese companies still possess legacy systems. In this research, the current situation of legacy modernization in Japan is investigated by analyzing actual legacy system. From this study, technical issues and also some non-technical issues have been found which hinders legacy modernization. The fundamental challenge is, managements' lack of long-term vision in maintaining software systems. This paper presents these issues with relation to our model system. Furthermore, technology is always dynamic and any system can become legacy system in the future. Thus, we also propose how organizations can prepare for future migrations through concrete software documentation and establishment of internal policies to govern management of software systems.

 

28. Distance training system as an alternative to traditional training method

Thamer Ahmad, Information Technology Programme, College of Arts and Sciences, Universiti Utara Malaysia (UUM)

Huda Ibrahim , Information Technology Programme, College of Arts and Sciences, Universiti Utara Malaysia (UUM)

Shafiz Affendi Mohd Yusof, Information Technology Programme, College of Arts and Sciences, Universiti Utara Malaysia (UUM)

 

Many scholars have mentioned the obstacles that prevent organizations’ employees to attend traditional training methods. Additionally, they have presented Information and Communication Technology (ICT) especially e-learning system as important way to overcome these obstacles. However, they did not depend on empirical studies to mention those problems. Thus, this survey focused on the public sector employees to mention the problems that prevent them to attend traditional training methods. Furthermore, it aims to explain problems and issues in applying distance training system as important way to overcome employees’ problems with traditional training.

 

29. Change Management in the Australian public sector’s EDRMS implementations

Linh Thuy Nguyen, School of Computer and Information Science, University of South Australia, Adelaide, Australia

Jo Hanisch, School of Computer and Information Science, University of South Australia, Adelaide, Australia

 

EDRMS projects are widely considered the projects of change. The implementation of this enterprise-wide system brings change not only in the work practice of the end-users but also in their perceptions of records management. Many implementations have not achieved satisfactory outcomes due to the ineffective management of this change process, especially in the Australian public sector where the system use is mandated, not voluntary. This paper reports on the analysis of the change management process of eight Australian public organisations’ EDRMS projects using the two change management theories: 3-step model by Lewin and 8-step model by Kotter. The findings indicate the two most important steps in the change process in an EDRMS project are: (a) maintaining a strong coalition that provides consistent support throughout the project life and (b) empowering end-users in the use of the system.

 

30. The Impact of IT Flexibility and Communication Effectiveness on Strategic Alignment

Saeid Jorfi, University of Technology, Malaysia (UTM), Agriculture Bank of Iran, PhD student in IT Management, Kuala Lumpur-Malaysia
Hassan Jorfi, University of Technology, Malaysia (UTM), Educational administration of Iran, PhD student in Management, Kuala Lumpur-Malaysia
Khalil Md Nor, University of Technology, Malaysia (UTM), Associate Professor, Johor -Malaysia

Lotfi Najjar, Nebraska-Omaha.USA, Associate Professor


In today's complex global environment, strategic alignment or the fit between Information Technology (IT) and business strategy; and the effectiveness of communication remains a key topic of concern among managers worldwide. The paper is undertaken to understand the relationship between IT flexibility and managers’ effectiveness of communication to improve strategic alignment in the Bank of Agriculture and Educational Administrationsof Iran. Data (N = 82) for this study was collected through questionnaires. The participants were managers in Agriculture Bank and Educational Administrations of Iran. The results showed that effective communication and IT flexibility have a positive impact on strategic alignment and Strategic Information Systems Planning (SISP) moderates the relationship. The impact of effective communication on SISP is another result of the study.

 

31. Detrending of Non-stationary Solar Radiation Time Series for Improved Prediction Performance

Wu Ji, School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore

Chan Chee Keong, School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore

 

In this work, we firstly check the stationarity of solar radiation series and find it’s non-stationary. To remove the trend lying in it to obtain a stationary series, we apply several detrending models to the series. Then Augement Dickey-Fulle test is used to check the stationarity of the residual series. As a result, the Al-Sadah’s model is proved to be the optimal one. After the detrending, ARMA is applied to do prediction and its performance is compared with linear regression whose performance has been proved to be good. The result shows thatafter detrending, ARMA can present better performance.

 

32. Mesh Simplification

Siti Khadijah Binti Ali, Multimedia, Universiti Putra Malaysia, Serdang Malaysia

A.P. Dr Rahmita Wirza, Multimedia, Universiti Putra Malaysia, Serdang, Selangor
Dr Fatimah Khalid, Multimedia, Universiti Putra Malaysia, Serdang Malaysia


Mesh simplification become an interesting research within last twenty decades. There are new methodologies and also some modification or improvements that have been introduced by some researchers. However, there are three major problems that exist after the mesh simplification is applied on the model. The model has tendency to loss some of information, shape and also its features. In this study, we present an algorithm of triangular mesh simplification. In our algorithm we proposed a new decimation metrics which is ratio to select elements as the candidate to be removed. The experiment results show our proposed algorithm can preserve the shape of the mesh.


33. Delegation in Workflow Systems Using RBAC

Prof. Ms. Padmavati S Dandannavar, Gogte Institute of Technology, Udyambag, Belgaum-590008, Karnataka

Prof. Shri. Prasanna H.Bammigatti, S.D.M.C.E.T, Dharwad, Karnataka

 

In distributed-computing environments, applications or users have to share resources and communicate with each other to perform their jobs more efficiently. With the increase of the shared information and resources in the distributed system and for better performance, it is important to keep resources and the information integrity from the unexpected use by unauthorized user. Unauthorized access to the information by illegal users leads to the leakage of the data also increases. To protect the information in a distributed computing environment, it is necessary to secure the data through the user authentication and access control policy. This kind of policy has to be offered transparently to users or application programs for the convenient use of the system.

 

34. Experimental Evaluation of Performance Gain of Multi-Core System Through OpenMP

Prof. Mrs. Sharada G. Kulkarni, Department of Comp.Sc. and Engg., Gogte Institute of Technology, Belgaum-590008, Karnataka. India.

Prof. Nandini Sidnal, Department of Comp.Sc. and Engg, K.L.E’s College of Engg., Udyambag, India

 

Multi-Core application design and developmentis all about using parallel programming techniques and tools to develop software that takes advantage of multi core architectures. In this paper OpenMP is used to study the performance of Intel® Core™2 Duo processor. Theperformance is evaluated with varying size of data and sorting algorithms. Results of experiments show significant performance improvement due to parallelization of codes using multi threading techniqueson Intel® Core™2 Duo processors.

 

35. Privacy protection in published data using an efficient clustering method

Md. Manzoor Murshed, Computer Science Department, University of Iowa, Iowa City, USA

Jeffrey W. Ohlmann, Management Sciences, University of Iowa, Iowa City, USA


Database privacy or computer disclosure control is publishing anonymized data about individuals in such a way, that sensitive information about them cannot be revealed. In privacy preserving data publishing, both privacy and utility of the data are important. Although data utility for the research community is the main reason for data publishing, several consequences of privacy violation make data privacy an important and urgent research topic. It is a very popular computer science research area and also an important and difficult problem. The major challenge is to store personal sensitive information in public databases in such a manner that balances society’s needs and also can guarantee privacy of the individual whose data are in the database.

Data publishing also needs to address the reason of data collection, verification of security mechanisms, protection of each specific individual’s information and the consequences of disclosing or modifying private information. Several interesting solutions of this problem are already in the literature. Sweeney[1] comes up with the k-anonymity principle. The main goal of kanonymizationis to hide every individual in a group of size kwith respect to the non-sensitive attributes so that linking and identifying someone in other databases becomes difficult. Although k-anonymization by suppressing and generalizing cells in the table is NP-hard, several approximation algorithms have already been proposed as a solution. k-anonymity not only ensures anonymity but also tries to minimize the information loss resulting from the generalization and suppression to guarantee it.

Clustering and anonymizing similar data together can ensure minimum information loss. In this paper we propose an efficient clustering technique for k-anonymization that tries to minimize information loss and at the same time guarantees good and quality data for data mining and other related research. Themain idea behind the proposed algorithm is to group similar and logically related data and records together at the same cluster asmuch as possible which naturally guarantees less information loss during generalization. We propose a modified one pass kmeansalgorithm (MOKA) that runs in O (n2/k) time. Initial experimental result shows some better performance over kmeansalgorithm.

 

36. Analysis and Design of Multi-Agent System for Processing Bio-Signals Using Agent Oriented Programming Approach with JADE

Tholkappia Arasu Govindarajan, Jayam College of Engineering and Technology, Dharmapuri. Tamilnadu, India

Ramesh Manickam, Jayam College of Engineering and Technology, Dharmapuri. Tamilnadu, India

Vinoth Kumar M, Jayam College of Engineering and Technology, Dharmapuri. Tamilnadu, India

Rajavignesh R, Jayam College of Engineering and Technology, Dharmapuri. Tamilnadu, India


Agent can be defined as a component that, given a goal could act in the place of a user within its domain knowledge. Agents are also called intelligent agents, as intelligence is a key component of agency. Agent oriented approach can be viewed as next step of Object Oriented approach. The paper attempts to demonstrate the analysis part of developing Multi-Agent platform for processing of Bio signals using JADE – Java Agent Development framework.FIPA specifies a set of standard interaction protocols, which can be used as standard templates to build agent conversations. For every conversation among agents, JADE distinguishes the Initiator role - the agent starting the conversation and the Responder role - the agent engaging in a conversation after being contacted by some other agent.

JADE provides ready-made behaviour classes for both roles in conversations following most FIPA interaction protocols. The technical goal is to develop a multi agent platform for processing of bio-signals aiming at assisting medical practitioners in developing standard examination procedures. The JADE platform is a popular, FIPA-compliant platform for the development of multi-agent systems. As the agents on the JADE environment run on Threads, the response time is very less which helps the medical practitioner to make a quick diagnosis.

 

37. Cheap and Good ICTs in Education. Low-cost Computers in Indian Rural Primary Schools: Evaluating the Impact

 

Ms Komathi Ale, Wee Kim Wee school of Communication and Information, Nanyang Technological University, Singapore

Dr Arul Chib, Wee Kim Wee school of Communication and Information, Nanyang Technological University, Singapore
 

The increased hype and hope surrounding the advent of low-cost computing devices, specifically targeted at rural children, calls for scientifically established research to test its impact on education. The study aims at using information and communication technologies (ICTs) to improve the cognitive empowerment of children through an ICTs in education intervention designed to influence three community aspects of unbiased access, local language, and teacher training. The Extended Technology-Community-Management model is used to establish these community aspects, in addition to literature review and formative findings used to establish these community aspects, in addition to literature review and formative findings of the Psyschological Empowerment theory, focusing on three variables of computer self-efficacy, technological literacy and functional literacy.

A Proposed Redesign Model of Charles Darwin University’s (CDU) Careers and Employment Website

Company Description : Recently, the expectations of Website users have changed as a result of the development of mobile devises andimproved accessibility. The research proposes a redesign, redevelopment and implementation of the CDU careers and Employment website taking these changes into consideration.The initial web site design strictly conforms to the university corporate template with little attention to the needs of the users due to the constraints of past CDU policy which inhibited innovation. The research proposes a model web site as a result of redesigning the CDU Careers and Employment website byreconciling users and client’s needs to the CDU corporate template. In designing the model, the research followed a web development life cycle methodology incorporating comparative analysis, personas, and user testing which visualized the user’sneeds by increments. The research demonstrates recognition of websites showing elements of best design in navigation, layout,and mobile net functionality. In addition the research provided knowledge of user demographics, user scenarios, and preliminary user design. The authors believe that the redesign, which was partially adopted and implemented as the basic foundation for further development of other aspects of the CDU web design in general, has resulted in improving the website’s design, navigation, and interactivity.

Product Type : Academic Conferences

Author : Various

PDF 8p

Languages : English

Is Ethics Important in a Virtual World?

Company Description : An oft-repeated quote is that “the world is one global village thanks to technology.” When something is of great value, thereare bound to be some disadvantages alongside. And if we were to examine what those weaknesses are which make technology a threat along with a blessing, we would find that a lack of ethical behavior among users of technology ranks high on this list. The argument that all over the world morals are decreasing is notreally true because youth of today while they are questioning superstitious rituals and religious traditions, are actually turning to spirituality and alternate healing techniques. Does this result in ethical behavior online? How can we ensure ethical behavior in the cyber world.

Product Type : Academic Conferences

Author : Dr. Radha Parikh

PDF 6p

Languages : English

Descriptive Complexity of a Fragment of C Language

Company Description : Descriptive complexity emerged from finite model theory and had its aims in finding logics that capture computational complexity classes. Observing that imperative programming languages can also be considered as logics (maybe with some additional control), we extend the scope of descriptive complexity by defining two fragments of such languages and showing that they capture the classes P and NP.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

Mobile Banking in Bangladesh

Company Description : Mobile Banking is one of the latest tools for easy and convenient banking in the current world. Day by day mobile payment has become popular and it’s fulfilling consumer’s demand. The large numbers of Bangladeshi people are facing many harassments duo to the lack of modern banking modern banking facilities. The government banks don’t have the internet banking and ATM services; only few of private banks have some ATM booths. There are only about 650 ATM booths forthe huge population and branches of bank are not available in the rural area. For paying utilities bill,money transfer and doing banking activities people needto go to the bank by physically and waiting in bigqueue. This is due to the fact that Bangladesh has more than 40 banks but still now banks couldn’t introduced fully internet and mobile banking services. Another problem is that 46% of the population lives below the poverty line and wretched transportation system overall the country.

Product Type : Academic Conferences

Author : Omar Faisal

PDF 10p

Languages : English

The Role of Information Security in Developing and Delivering Training

Company Description : Information Assets and Proprietary Information mustbe suitably protected, but in order to optimize and leverage these assets, organizations need to disseminate and utilize the very intellectual property that they seek to protect. Organizational training providers can find their mission in direct conflict with organizational Information Security Management Systems processes and policies. The author investigates multiple organizations in order to detail the problems and best practices that are employed to balance the tension between the training function and security policies.

Product Type : Academic Conferences

Author : David C. Huff

PDF 7p

Languages : English

HONING FILE FORMAT EXTENSION

Company Description : The study expands upon previous work in format extension. The initial research repurposed extra space provided by an unrefined format to store metadata about the file in question. This process does not negatively impact the original intent of the format and allows for the creation of new derivative file types with both backwards compatibility and new features.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Study On Key Technology For Encryption And Security System In Wireless Communication Network

Company Description : A novel secure encryption using the recieved signal strength indicator (RSSI) has been proposed in this paper. RSSI signals are time variant and irregular, especially in more complicated environment. Changes of RSSI can generate anonperiodical random number, and an attacker will hardly predict this number. Furthermore, we use this option, opencryptography algorithm, and rapid stream ciphers to construct an efficient encryption system for wireless communication network.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

IT- Business strategic alignment in influencing sustainable competitive advantage in Jordan

Company Description : In this study, we conduct a review of literature on business – IT strategic alignment and sustainable competitive advantage. We argue that conceptual shortcoming, such as the lack of clarity inconstitutive definition of alignment construct. We propose aconceptual definition of business – IT strategic alignment. we conclude this article stressing that additional theoretical and endeavors regarding business- IT strategic alignment and sustainable competitive advantage are needed , emphasizing that such efforts should be conducted with greater attention to th eissues discussed in this review. The result shows that some of the hypothesis were supported except for some of the hypothesis were not supported.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Improving Medical Information Security using Contextualization Models

Company Description : Information communication technologies will increasingly make security in organizations more complex. This will be particularly evident in sectors that already lack adequate security regimes. One such sector is healthcare, where information security is not their core business and the understanding of its importance is often underestimated. Poor implementation of medical information security is affected by more than the acceptance of technology; it is closely linked to human factors, culture and communities of practice, all under pinned by trust. This situation necessitates research into how to contextualize implementation of information security within this environment. The application of a contextual implementation model is compared to the known cultural and community of practice factors in the medical environment. The outcomes provide a better understanding of the issues and formthe basis of a model for improving the effective implementation and continued application of effective information security. The impact of this research is in the improved protection of medical information and contributes to the potential for secure e-health solutions nationally.

Product Type : Academic Conferences

Author : Patricia A H Williams

PDF 4p

Languages : English

Factors affecting technology acceptance- evidence from the hotel industry in Mauritius

Company Description : We set out to investigate the level of application of ICT / E-business inthe tourism industry in Mauritius. We also sought to ascertain the different impediments to e-business adoption. Out of the 50 questionnaires we administered, 41 were usable. Findings mainly reveal that E-business offers multiple business ventures that assist this sector in expanding their business activities. In addition, it is seen thate-marketing is gaining priority compared to other advertising medium. Nonetheless, the Internet usage amongst the Mauritian tourism industryis still at an early stage, and the rate of adoption of e-business practices is slow. Web pages are inefficiently exploited and merely display static information. The study also demonstrates that cultural differences among customers, lack of personal contact with customers, costsimplications and security issues are factors that impinge on e-business adoption. Managerial implications are discussed and suggestions forfuture research are made.

Product Type : Academic Conferences

Author : Vidisha D. Gunesh Ramlugun

PDF 8p

Languages : English

An Analysis of Mobile Banking Acceptance in Mauritius

Company Description : Around the world, especially in developing countries like Kenya, Phillipines and South Africa, Mobile Banking has been a clear success in terms of financial inclusion of the unbanked, poor and rural people [21]. Slower pace of adoption has been noted in developed countries [14][22] having sufficient banking coverage, with banks and customers treading on a cautious path. In Mauritius, mobile banking is still at its infancy, with the leading banks having shyly introduced such service, restricting it merely to inquiry based and alerts. To countries having implemented it, it provides a cheap, affordable and fast means of performing banking transactions to the convenience of customers, with a variety of possible uses and applications. This mobile banking survey carried out to around 455 people in Mauritius analyses the readiness of Mauritian to accept Mobile banking as a new and innovative way of doing banking and payments chores. It overviews Mauritian banking behaviour patterns, identify target groups and banking services which they might be interested. It also provides a strong insight on Mauritians banking preferences and features they would wish to have in a Mobile banking application. The results can be of valuable guidance to the established banks, new banks and potential new players in the fields like telecom companies, in fine tuning their mobile banking strategies for a better competitive edge.

Product Type : Academic Conferences

Author : Raj Kishen Moloo

PDF 7p

Languages : English

Banking on the Move: A Case for Introducing Mobile Banking In Mauritius

Company Description : A sound financial and Information Technology (IT) infrastructure, an ever increasing IT and mobile literate population; Banks in Mauritius have all the necessary ingredients in introducing and establishing Mobile banking toits customers. From a mono-economy based on agriculture in the 1960’s to a sound Financial and Digital economy, Mauritius has reinvented its ways of doing business, focussing on customer services. Convenience is the keyword forcustomers; and banks’ competitive advantage depends on their ability to unleash the power of self-service to the convenience of its customers. This paper prospects the readiness of Mauritius in accepting and introducing Mobile Banking. It provides a status of the different sectors involved like Information and Communication Technology (ICT), the banking sector along with the respective regulatory authorities. Finally it provides a strong business case for Banks, Financial institutions and other new business alliancesin Mauritius to introduce this new service to its customers, with possible gains in terms of customer retention and satisfaction, potential time and cost saving and providing “Banking on the Move” at the convenience of the customer.

Product Type : Academic Conferences

Author : Raj Kishen Moloo

PDF 7p

Languages : English

A modular hybrid Ant Colony Approach for solving traveling salesman problem

Company Description : To solve the well known traveling salesman problem(TSP) a combined approach of Ant Colony Optimization (ACO) and Genetic Algorithm (GA) are considered over here primarily. A number of solutions are given by the researchers in the past few decades even using a hybrid approach of ACO and GA to achieve the optimization. But our work gives the optimal solution for the said problem by using the modular hybrid approach of ACO and GA in addition to some heuristic approach. We have incorporated GA in ACO module, hence each iteration calls the GA within ACO module results in a higher amount of pheromone deposited in the optimal path in the global pheromone update. Hence the convergence is quicker and solution is optimal.

Product Type : Academic Conferences

Author : Various

PDF 8p

Languages : English

A Lightweight Mobile Banking Solution Easily Integrateable with Existing Banking System

Company Description : With an ever increasing sophistication of Mobile phones and the rapid pace of adoption of mobile handsets has today revolutionized our lives providing innovative mobile services that are already beyond basic telephony. With increased processing capabilities, better storage, ubiquitous and convenient nature, mobile phones have created new business opportunities, making banking on the move a reality. With nearly 84% of Mauritian having a mobile phone and enjoying 99% network coverage, Mauritius has all the necessary ingredients of wide adoption of mobile banking both by bank customers and by banks themselves. Nevertheless, slow pace of adoption has been noted, the reason being security concerns and high learning curve for customers, while considerable investment and reengineering process for banks. This paper aims at providing a lightweight easy to use and intuitive mobile banking system that can seamlessly integrate with the existing banking, without the need to re-engineer their banking process.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Phishing: The Worst Computer Crime in Thailand

Company Description : This paper investigates the crime of phishing in Thailand. The Internet has become a major part ofpeople’s lives, and E-Commerce is growing very rapidly. Information in the past was in analog form, but now most information is kept in digital format.Customers and financial information have become a main target of criminals. Phishing, which is a method that criminals (phishers) use to send or create fraudulent messages to trick users to give away personal information, has become the most frequent computer crime in Thailand. This paper collects data from secondary sources and analyzes the characteristics of phishing in Thailand. This paper also identifies the root causes of phishing and the methods that phishers use to steal information from victims. Organizations can use the results of this study to educate their users about thecrime of phishing crime and implement controls andpolicy to reduce the risk of being a victim of phishing.

Product Type : Academic Conferences

Author : Danuvasin Charoen

PDF 7p

Languages : English

A New Parallel Algorithm to find out the Longest Common Subsequence from Multiple Biological...

Company Description : The Longest common subsequence problem is to find a subsequence that is common to two or more given sequences and is the longest one of such subsequences. This problem of searching the longest common subsequence (LCS) from multiple biological sequences is one of the most fundamental tasks in bioinformatics. Earlier Rizvi and Agarwal had proposed an algorithm for it, but we found out that their algorithm gives wrong results in some cases. We have proposed an algorithm towards correcting the errors. Inthis paper, we present a parallel algorithm named NEW_LCS_ALGO to find the LCS from any number of given DNA, RNA, Protein or general sequences. Here we give examples of DNA sequences, although this can be used for RNA, Protein or general sequences (provided we know the characters being used). The speed up in our LCS Algorithm isachieved through pruning operations, in which we reject all those nucleotides which cannot generate the next character of the LCS thus reducing the search space and accelerating thesearch speed.

Product Type : Academic Conferences

Author : Various

PDF 7p

Languages : English

Customizable Rubrics Model for Formative Evaluation of Problem-Based Learning Course

Company Description : Nowadays, a revolution in education is taking place by shifting from the teacher-centered approach to the learner centered approach. Due to the lack of ability and skills in problem solving, Problem-Based Learning (PBL) is introduced in numerous academic disciplines such as engineering, computerscience, and others. Problem Based-Learning is one of the pedagogy approaches that enable students to work in groups to solve real-life problems, whilst the lecturer takes on the role as a facilitator of learning. In conducting the Problem-Based Learning class, the assessment of Problem-Based Learning course involves several evaluation components, namely the written evaluation, the presentation evaluation and the peer evaluation. Several phases or stages are needed in the implementation of PBL and each of phases requires different evaluation. Due to the tedious works and cumbersome process in needed to assist the formative evaluation for PBL. Thus, the main objective of this paper is to describe a customizable rubrics model for PBL formative evaluation. The model was derived based on the existing rubrics tools. Besides, observation on several previous researches in designing rubrics for supporting educational environment is carried out to firm the model. This paper focuses on formative evaluation in assessing the initial and ongoing activities in problem solving, together with result oroutcome of the problem solution. It also focuses on the individual performance assessment from the perspectives of the team members. This study is expected to provide a fair, manner and efficiency method of Problem-Based Learning formative evaluation that corresponds to any course contents.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

An Empirical Study of Antecedents and IT-Business Strategic Alignment in Jordanian Public Shareh

Company Description : Preceding research attributed the lack of direct causal impact of Information Technology (IT) on firm performance to numerous missing links including antecedents of IT-business strategic alignment (also known as strategic alignment), and intermediaries between alignment and firm performance. Furthermore, recent reviewers [44] have called for more research into the factors that affect strategic alignment, and the coupling process between alignment and performance. In this paper, we develop and empirically test specific forms of management structures and processes which arerequired to drive strategic alignment. Further, we proposea causal-chain model to examine the impacts of six antecedents on strategic alignment. The data, from over 180 Jordanian public shareholding firms, using structural equation modeling generally support the hypotheses.Furthermore, the study’s findings suggest that leadership, values and belief, IT managerial resources, and IT implementation successes impact significantly IT businessstrategic alignment; whereas no relationships found between structure and process, and service qualityon strategic alignment.

Product Type : Academic Conferences

Author : Various

PDF 9p

Languages : English

Time Domain Blind Adaptive Channel Equalization for Zero-Padding OFDM System

Company Description : A adaptive blind equalization algorithm used for ZP-OFDM systems is introduced in this paper, the proposed approach witch uses the zero-padding time guard interval (TGI) of OFDM signals equalizes the multi-path channels in time domain. This algorithm has the advantage of lower complexity and validity for long multi-path (its delay is longer than TGI).

Product Type : Academic Conferences

Author : Chen Wei

PDF 3p

Languages : English

A novel PEG-based Construction Method for Structured LDPC Codes

Company Description : A construction method for structured Low-Density Parity-Check (LDPC) codes is presented and half-code-rate LDPC codesbased on this method is proposed in this paper.This PEG-based construction method is introduced from the perspective of minimizing the ring and reducing the number of short ringcycles. The LDPC codes based on this method out perform Turbo codes in 3GPP-LTE LDPC codes. Moreover, thanks to its low complexity and small storage space, this method is very easy for encoding and decoding, which makes it applicable to powerful channel coding of future mobile communications and deep-space communications.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Analysis of Information Security Strategies for Web 2.0 Environment

Company Description : The Web 2.0 environment provides fertile ground for Internet criminals to harvest sensitive information, online bank accounts and credit card numbers, and bot nets. Therefore, it is essential to provide security technologies to protect client devices, web servers and user information contents. This article examines the security strategy for the Web 2.0 environment based on Web 2.0 security related technical patents within the USPTO database that were approved between 2000 and 2009. This study found that similar efforts were made in protecting both client devices and web servers. In addition, more effort was put into content management. Furthermore, by examining Web 2.0 security related articles from the SCIand SSCI journals from 2005 through 2009, much research has been conducted in technologies for protecting the information contents.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Hierarchical Kohonen Network for Clustering the Large Quantities of Multi-Variate Data

Company Description : The Kohonen Network is a powerful tool inexploratory phase of data mining. It is capable of projecting high dimensional data onto a low, usually 2-dimensional grid of neurons with good neighborhood preservation and a good tool for dimensional reduction. However, when to due with the large quantities of high-dimensional data, a large size of networks should be used and it need an extremely time consuming. Hierarchical Kohonen Network is a combination of multi branching decision tree and Kohonen Network, one of solution to overcome the drawback of Kohonen Network. A comparison between Kohonen Network and Hierarchical Kohonen Network is done and a possible way to enlarge the size of Kohonen Network through Hierarchical Kohonen Network will bediscussed.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Web-based technology assisted teaching: A pilot project at Monash University

Company Description : We present a Web-based technology assisted teaching project at a University, initiated to overcome difficulties experienced due to distance and different time-zones at six campuses in three continents. We demonstrate that the pilot project initiated to improve teaching methods used for Information Technology degree programs at these campuses have been running smoothly and benefited from experience gained in this pilot project at these campuses thanks to web based technologies. Many of theadvantages for the lecturing staff, administrators and the participating students have been highlighted. We employ paperless teaching and so our program is green technology compliant. We have employed web based course management tools (CMT) to effectively manage, coordinate, monitor progress, provide feedback to students in real time and to link students and staff in six different campuses forming one teaching and learning community dedicated to active learning and to achieve best possible outcomes without sacrificing standards. The pilot project is elaborated using one course unit as an example showing the benefits and difficulties experienced and solutions explored. The web page is well designed, user-friendly and well managed and forms the backbone of the virtual learning environment (VLE). Web based access to learning materials, simulations and animations, historical images, short clips of scientists and scientific labs contributed for the development of this technological advancements leading to modern computer system designs, sound and video clips of computer technology based systems and finally glimpses of current and future trends including research and development are highlighted. Typical examples of simulations used, animations and web page designs used in this pilot project are shown. The web based learning system forms the integral part of the learning system encompassing all six campuses in a seamless manner. Conscious efforts were made to make the presentation of the course material not tedious but an enjoyable experience to our first year student sof IT. Student satisfaction has been measured using a feedback system and the overall performance improvements measured; these are also presented in this paper.

Product Type : Academic Conferences

Author : A.g.M. Das

PDF 7p

Languages : English

HR, IT and Innovation

Company Description : There is tremendous scope for innovation involving the human capital - their biggest asset. The concept of IT enabled mass innovation and crowd sourcing that leverage the ‘crowd’ to ideate, research and innovate gets special attention here.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Evaluating the performance of Information, Technology Strategic Planning using: ITSP Alignment..

Company Description : Most of organizations endeavor to employing IT as tool for a competitive and supporting the capability of IT to accomplishment the objective of organization as well as enhance the alignment between IT and business strategy. The research question in this paper; is how to evaluate ITSP performance from management perspective. The suggested model leads to the development a successful IT strategic plan performance, enabling planning with business strategy and allowing technology to provide for competitive advantage. They are often need to find are liable ways to ensure that the business benefits from ITSP plan are released and provide a high level of competitive. This research aims to increase the corporate performance toward efficiency, effectiveness and competitiveness in facing the uncertainty and mobility of the business environment to supportthe strategy planning decision.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Enterprise Business Architecture in Indonesia Higher Education: A Case Study

Company Description : In this paper we discuss the concept of enterprise business architecture. We explain a preliminary study the concept and, based on a case study, discuss its relevance, operation, relationship with strategy and business models, and value for Indonesia higher education. Enterprise business architecture contributes to clarify the complexity within an organization and form a useful starting point from which to develop functional, information, process and application architectures. In addition, an explicitly enterprise business architecture helps to structure the responsibilities within organization (higher education), and within the primary processas well as with regard to IT-support. Enterprise business architectures contribute to adequate IT strategies in order to manage the resources for critical business activities and how to manage the development and support for business efficiently.

Product Type : Academic Conferences

Author : Various

PDF 7p

Languages : English

Complex Issues on Legacy Modernization in Japan: A Case Study of a System Deployed on Unisys...

Company Description : A legacy system is an information system that is running on out dated technology. Traditionally, Japan can be viewed as a main frame dependent country. Since the late 1990s, modernization of legacy systems has been under serious considerations. Various approaches for modernizing legacy systems have been presented over the years. However, more than 60% of Japanese companies still possess legacy systems. In this research, the current situation of legacy modernization in Japan is investigated by analyzing actual legacy system. From this study, technical issues and also some non-technical issues have been found which hinders legacy modernization. The fundamental challenge is, managements' lack of long-term vision in maintaining software systems. This paper presents these issues with relation to our model system. Furthermore, technology is always dynamic and any system can become legacy system in the future. Thus, we also propose how organizations can prepare for future migrations through concrete software documentation and establishment of internal policies to govern management of software systems.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

Distance training system as an alternative to traditional training method

Company Description : Many scholars have mentioned the obstacles that prevent organizations’ employees to attend traditional training methods. Additionally, they have presented Information and Communication Technology (ICT) especially e-learning system as important way to overcome these obstacles. However, they did not depend on empirical studies to mention those problems. Thus, this survey focused on the public sector employees to mention the problems that prevent them to attend traditional training methods. Furthermore, it aims to explain problems and issues in applying distance training system as important way to overcome employees’ problems with traditional training.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Change Management in the Australian public sector’s EDRMS implementations

Company Description : EDRMS projects are widely considered the projects of change. The implementation of this enterprise-wide system brings change not only in the work practice of the end-users but also in their perceptions of records management. Many implementations have not achieved satisfactory outcomes due to the ineffective management of this change process, especially in the Australian public sector where the system use is mandated, not voluntary. This paper reports on the analysis of the change management process of eight Australian public organisations’ EDRMS projects using the two change management theories: 3-step model by Lewin and 8-step model by Kotter. The findings indicate the two most important steps in the change process in an EDRMS project are: (a) maintaining a strong coalition that provides consistent support throughout the project life and (b) empowering end-users in the use of the system.

Product Type : Academic Conferences

Author : Various

PDF 9p

Languages : English

The Impact of IT Flexibility and Communication Effectiveness on Strategic Alignment

Company Description : In today's complex global environment, strategic alignment or the fit between Information Technology (IT) and business strategy; and the effectiveness of communication remains a key topic of concern among managers worldwide. The paper is undertaken to understand the relationship between IT flexibility and managers’ effectiveness of communication to improve strategic alignment in the Bank of Agriculture and Educational Administrationsof Iran. Data (N = 82) for this study was collected through questionnaires. The participants were managers in Agriculture Bank and Educational Administrations of Iran. The results showed that effective communication and IT flexibility have a positive impact on strategic alignment and Strategic Information Systems Planning (SISP) moderates the relationship. The impact of effective communication on SISP is another result of the study.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Detrending of Non-stationary Solar Radiation Time Series for Improved Prediction Performance

Company Description : In this work, we firstly check the stationarity of solar radiation series and find it’s non-stationary. To remove the trend lying in it to obtain a stationary series, we apply several detrending models to the series. Then Augement Dickey-Fulle test is used to check the stationarity of the residual series. As a result, the Al-Sadah’s model is proved to be the optimal one. After the detrending, ARMA is applied to do prediction and its performance is compared with linear regression whose performance has been proved to be good. The result shows thatafter detrending, ARMA can present better performance.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

Mesh Simplification

Company Description : Mesh simplification become an interesting research within last twenty decades. There are new methodologies and also some modification or improvements that have been introduced by some researchers. However, there are three major problems that exist after the mesh simplification is applied on the model. The model has tendency to loss some of information, shape and also its features. In this study, we present an algorithm of triangular mesh simplification. In our algorithm we proposed a new decimation metrics which is ratio to select elements as the candidate to be removed. The experiment results show our proposed algorithm can preserve the shape of the mesh.

Product Type : Academic Conferences

Author : Various

PDF 4p

Languages : English

Delegation in Workflow Systems Using RBAC

Company Description : In distributed-computing environments, applications or users have to share resources and communicate with each other to perform their jobs more efficiently. With the increase of the shared information and resources in the distributed system and for better performance, it is important to keep resources and the information integrity from the unexpected use by unauthorized user. Unauthorized access to the information by illegal users leads to the leakage of the data also increases. To protect the information in a distributed computing environment, it is necessary to secure the data through the user authentication and access control policy. This kind of policy has to be offered transparently to users or application programs for the convenient use of the system.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Experimental Evaluation of Performance Gain of Multi-Core System Through OpenMP

Company Description : Multi-Core application design and developmentis all about using parallel programming techniques and tools to develop software that takes advantage of multi core architectures. In this paper OpenMP is used to study the performance of Intel® Core™2 Duo processor. Theperformance is evaluated with varying size of data and sorting algorithms. Results of experiments show significant performance improvement due to parallelization of codes using multi threading techniqueson Intel® Core™2 Duo processors.

Product Type : Academic Conferences

Author : Various

PDF 4p

Languages : English

Privacy protection in published data using an efficient clustering method

Company Description : Database privacy or computer disclosure control is publishing anonymized data about individuals in such a way, that sensitive information about them cannot be revealed. In privacy preserving data publishing, both privacy and utility of the data are important. Although data utility for the research community is the main reason for data publishing, several consequences of privacy violation make data privacy an important and urgent research topic. It is a very popular computer science research area and also an important and difficult problem. The major challenge is to store personal sensitive information in public databases in such a manner that balances society’s needs and also can guarantee privacy of the individual whose data are in the database. Data publishing also needs to address the reason of data collection, verification of security mechanisms, protection of each specific individual’s information and the consequences of disclosing or modifying private information. Several interesting solutions of this problem are already in the literature. Sweeney[1] comes up with the k-anonymity principle. The main goal of kanonymizationis to hide every individual in a group of size kwith respect to the non-sensitive attributes so that linking and identifying someone in other databases becomes difficult. Although k-anonymization by suppressing and generalizing cells in the table is NP-hard, several approximation algorithms have already been proposed as a solution. k-anonymity not only ensures anonymity but also tries to minimize the information loss resulting from the generalization and suppression to guarantee it. Clustering and anonymizing similar data together can ensure minimum information loss. In this paper we propose an efficient clustering technique for k-anonymization that tries to minimize information loss and at the same time guarantees good and quality data for data mining and other related research. Themain idea behind the proposed algorithm is to group similar and logically related data and records together at the same cluster asmuch as possible which naturally guarantees less information loss during generalization. We propose a modified one pass kmeansalgorithm (MOKA) that runs in O (n2/k) time. Initial experimental result shows some better performance over kmeansalgorithm.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

Analysis and Design of Multi-Agent System for Processing Bio-Signals Using Agent Oriented...

Company Description : Agent can be defined as a component that, given a goal could act in the place of a user within its domain knowledge. Agents are also called intelligent agents, as intelligence is a key component of agency. Agent oriented approach can be viewed as next step of Object Oriented approach. The paper attempts to demonstrate the analysis part of developing Multi-Agent platform for processing of Bio signals using JADE – Java Agent Development framework.FIPA specifies a set of standard interaction protocols, which can be used as standard templates to build agent conversations. For every conversation among agents, JADE distinguishes the Initiator role - the agent starting the conversation and the Responder role - the agent engaging in a conversation after being contacted by some other agent. JADE provides ready-made behaviour classes for both roles in conversations following most FIPA interaction protocols. The technical goal is to develop a multi agent platform for processing of bio-signals aiming at assisting medical practitioners in developing standard examination procedures. The JADE platform is a popular, FIPA-compliant platform for the development of multi-agent systems. As the agents on the JADE environment run on Threads, the response time is very less which helps the medical practitioner to make a quick diagnosis.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

Cheap and Good ICTs in Education. Low-cost Computers in Indian Rural Primary Schools: Evaluating

Company Description : The increased hype and hope surrounding the advent of low-cost computing devices, specifically targeted at rural children, calls for scientifically established research to test its impact on education. The study aims at using information and communication technologies (ICTs) to improve the cognitive empowerment of children through an ICTs in education intervention designed to influence three community aspects of unbiased access, local language, and teacher training. The Extended Technology-Community-Management model is used to establish these community aspects, in addition to literature review and formative findings used to establish these community aspects, in addition to literature review and formative findings of the Psyschological Empowerment theory, focusing on three variables of computer self-efficacy, technological literacy and functional literacy.

Product Type : Academic Conferences

Author : Various

PDF 1p

Languages : English

Organizer : Global Science & Technology Forum

GSTF provides a global intellectual platform for top notch academics and industry professionals to actively interact and share their groundbreaking research achievements. GSTF is dedicated to promoting research and development and offers an inter-disciplinary intellectual platform for leading scientists, researchers, academics and industry professionals across Asia Pacific to actively consult, network and collaborate with their counterparts across the globe.