Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Conference

Discipline
Institution
Keyword
Publication

Articles 1 - 20 of 20

Full-Text Articles in Business

Application Of Ict Ii: The Impact Of Performance Management System On The Performance Of The Employees & The Organization, Arshad Siddiqui, Faryal Malik Aug 2009

Application Of Ict Ii: The Impact Of Performance Management System On The Performance Of The Employees & The Organization, Arshad Siddiqui, Faryal Malik

International Conference on Information and Communication Technologies

The purpose of this paper is to examine the relationship between performance management system (PMS), employee's job satisfaction and thus, their commitment to the organization by working for its fate. If various characteristics of PMS that build commitment and satisfaction could be identified, then managers may be more capable of using PMS so as to yield positive results. Further, the study will also examine the impact of PMS on organizational effectiveness by enhancing personal performance using appropriate performance measures.


Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani Aug 2009

Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani

International Conference on Information and Communication Technologies

Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …


Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari Aug 2009

Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari

International Conference on Information and Communication Technologies

As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.


Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq Aug 2009

Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq

International Conference on Information and Communication Technologies

Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …


Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha Aug 2009

Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha

International Conference on Information and Communication Technologies

Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Artificial Intelligence – Ii: Image Normalization For Face Recognition Using 3d Model, Zahid Riaz, Michael Beetz, Bernd Radig Aug 2009

Artificial Intelligence – Ii: Image Normalization For Face Recognition Using 3d Model, Zahid Riaz, Michael Beetz, Bernd Radig

International Conference on Information and Communication Technologies

This paper describes an image segmentation and normalization technique using 3D point distribution model and its counterpart in 2D space. This segmentation is efficient to work for holistic image recognition algorithm. The results have been tested with face recognition application using Cohn Kanade facial expressions database (CKFED). The approach follows by fitting a model to face image and registering it to a standard template. The models consist of distribution of points in 2D and 3D. We extract a set of feature vectors from normalized images using principal components analysis and using them for a binary decision tree for classification. A …


Artificial Intelligence – Ii: Watermarking Of Chest Ct Scan Medical Images For Content Authentication, Nisar A. Memon, S.A.M. Gilani, Asad Ali Aug 2009

Artificial Intelligence – Ii: Watermarking Of Chest Ct Scan Medical Images For Content Authentication, Nisar A. Memon, S.A.M. Gilani, Asad Ali

International Conference on Information and Communication Technologies

Medical image is usually comprised of region of interest (ROI) and region of non interest (RONI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in RONI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.


Networks - Ii: Assessment Of Node Density In Cartesian Ad Hoc Routing Protocols (Carp), Imran Raza, Mohammad Hasan Raza Aug 2009

Networks - Ii: Assessment Of Node Density In Cartesian Ad Hoc Routing Protocols (Carp), Imran Raza, Mohammad Hasan Raza

International Conference on Information and Communication Technologies

With the rapid development in the geographical positioning system (GPS) technology, the geographical routing category of the MANET protocols has recently been a hot research area. The Cartesian Ad hoc Routing Protocols (CARP) are a set of three adaptive and connectionless protocols that address the problem of routing and power consumption in MANET. These protocols are used to limit the number of forwarding nodes in a logical transmission area. Density of an ad hoc network is considered a network parameter in CARP, and is used in the calculations to form a logical transmission area. The CARP assume that the nodes …


Data Mining: Applying Centroid Based Adjustment To Kernel Based Object Tracking For Improving Localization, Rashid Mehmood, Muhammad Usman Ali, Imtiaz A. Taj Aug 2009

Data Mining: Applying Centroid Based Adjustment To Kernel Based Object Tracking For Improving Localization, Rashid Mehmood, Muhammad Usman Ali, Imtiaz A. Taj

International Conference on Information and Communication Technologies

In recent studies kernel based object tracking (KBOT) using Bhattacharya coefficient as similarity measure is shown to be robust and efficient object tracking technique. Image histogram provides a compact summarization of the distribution of data in an image. Due to computational efficiency; histogram has been successfully applied in KBOT based tracking algorithms. However without spatial or shape information, similar objects of different color may be indistinguishable based solely on histogram comparisons. The application of meanshift algorithm (the core of KBOT) on 1-D low level features of histogram may converge to false local maxima and cause inaccuracy of target localization. In …


Data Mining: Implementation Of Data Mining Engine On Crm-Improve Customer Satisfaction, A. S. Al- Mudimigh, F. Saleem, Z. Ullah, F. N. Al-Aboud Aug 2009

Data Mining: Implementation Of Data Mining Engine On Crm-Improve Customer Satisfaction, A. S. Al- Mudimigh, F. Saleem, Z. Ullah, F. N. Al-Aboud

International Conference on Information and Communication Technologies

Analysis on customer relationship is reaching more practical and motivating success factor for the growth of every company, in the same way, discovery of unseen information is also supporting for the successful expansion in an organization. A customer and a company are essential to each other and their good relationship and understanding will take the company on the top as well as the customer to the satisfactory level. In this paper we presented the model of customer relationship management (CRM) to describe the association of a customer with the company and enhanced the model by connection with data mining engine …


Application Of Ict - I: Risp Design Using Tightly Coupled Reconfigurable Fpga Cores, M. Aqeel Iqbal, Uzma Saeed Awan Aug 2009

Application Of Ict - I: Risp Design Using Tightly Coupled Reconfigurable Fpga Cores, M. Aqeel Iqbal, Uzma Saeed Awan

International Conference on Information and Communication Technologies

Reconfigurable instruction set processors are the next generation processors which can adapt their instruction sets through a reconfiguration process in their hardware according to the demand of the application being under execution on them. In this way the processors adapt the hardware which is the most suitable solution for the running application and hence it accelerates the performance gain. The reconfigurable instruction set processors are programmable processors that contain the reconfigurable logic in one or more of their functional units. Among the most important design parameters are: the granularity of the reconfigurable logic, the structure of the configuration memory, the …


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Artificial Intelligence – I: Robust Audio Steganography Via Genetic Algorithm, Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, Akram M. Zeki Aug 2009

Artificial Intelligence – I: Robust Audio Steganography Via Genetic Algorithm, Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, Akram M. Zeki

International Conference on Information and Communication Technologies

Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …


Corporate Social Responsibility : Have Corporations Become More Socially Responsible?, Robin Stanley Snell Jun 2009

Corporate Social Responsibility : Have Corporations Become More Socially Responsible?, Robin Stanley Snell

Conference on “Improving the Human Destiny"

No abstract provided.


Going Green Makes Cents!, Anthony Caldwell, Logan Fountain, Tiffany Snider Mar 2009

Going Green Makes Cents!, Anthony Caldwell, Logan Fountain, Tiffany Snider

Undergraduate Research Conference

No abstract provided.


The Green Business Revolution, Jacob Martin, Penny Mcclendon, Brian Watson, Jimanna Watson Mar 2009

The Green Business Revolution, Jacob Martin, Penny Mcclendon, Brian Watson, Jimanna Watson

Undergraduate Research Conference

No abstract provided.


Afternoon Concurrent Track 3: Green Curricula At Unlv, Thomas Jones, Ken Teeters, Barbara St. Pierre Schneider, Nancy Menzel, Lori Candela, Yu Xu, Sally Miller, Scott Nowicki Mar 2009

Afternoon Concurrent Track 3: Green Curricula At Unlv, Thomas Jones, Ken Teeters, Barbara St. Pierre Schneider, Nancy Menzel, Lori Candela, Yu Xu, Sally Miller, Scott Nowicki

Education for a Global Future: 21st Century Challenges in Sustainability & Climate Change Education

AFTERNOON CONCURRENT TRACK 3: GREEN CURRICULA AT UNLV Moderator Carolyn Yucha Student Union Room 213 Tom Jones, Ken Teeters – Incorporating Sustainability into a Hospitality Management Curriculum Abstract: For the past 15 years, faculty members in the Harrah College of Hotel Administration who teach Facilities Management (HMD 395) have incorporated a sustainability management component in this required course. The concepts of sustainability and global climate change are introduced through readings and multi-media. The concept of Triple Bottom Line is presented and is applied to almost every component in the course. Students are assigned a variety of semester-long service-learning projects that …