Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Engineering

Android And Web Application For Tracking Employees, Kaival Dholakia Dec 2019

Android And Web Application For Tracking Employees, Kaival Dholakia

Electronic Theses, Projects, and Dissertations

The purpose that this tracking system serves is to keep track of the employees of the company who have the nature of their job which involves a lot of traveling to various locations on a day to day basis. It is an amalgamation of Android as well as a Web application. The employee is supposed to pass the location and image as per the terms and conditions specified to use the Android application. The web application is used by the admin department to access the information which would help them monitor the location of the employee in a timely manner. …


Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che Jul 2019

Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che

Journal of International Technology and Information Management

In this paper, we outline how recruiting and talent acquisition gained importance within HRM field, then give a brief introduction to the newest tools used by the professionals for recruiting and lastly, describe the Artificial Intelligence-based tools that have started playing an increasingly important role. We also provide further research suggestions for using artificial intelligence-based tools to make recruiting more efficient and cost-effective.


Table Of Contents Jitim Vol 28 Issue 2, 2019 Jul 2019

Table Of Contents Jitim Vol 28 Issue 2, 2019

Journal of International Technology and Information Management

Table of Contents JITIM 2, 2019


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Health And Wellness Information System, Monica Rangel Jun 2019

Health And Wellness Information System, Monica Rangel

Electronic Theses, Projects, and Dissertations

The greatest wealth is health. It is sometimes said your health is a function of what you are not doing, not what you are currently doing. The degree to which individuals can attain, process, and comprehend the necessary health information and services they need to make proper health decisions is vital for optimal health and well-being.

This project documents the analysis, design, development, and implementation of a prototype web-based data-driven health & wellness system targeted for college students. The architecture for this system uses business intelligence to develop a smart online platform for real-time analysis based on inputs entered by …


Data Driven Workforce Performance Planning, Christopher Barajas Jun 2019

Data Driven Workforce Performance Planning, Christopher Barajas

Electronic Theses, Projects, and Dissertations

The business of logistics and transportation is increasing in demand and complexity and will do so into the future. As with many businesses in the digital age, large amounts of data is being generated at increasing speeds leading us all into the era of big data. A common result is that organizations are left data rich and information poor. At ABC Logistics, and many other third party logistics and transportation companies, the question is how to harness the data and create centers of excellence through business intelligence methodologies. This research project goes through the steps taken to identify an area …


Building A Secure Network Test Environment Using Virtual Machines, Byungjin Lee Jun 2019

Building A Secure Network Test Environment Using Virtual Machines, Byungjin Lee

Electronic Theses, Projects, and Dissertations

The objective of this project is to provide an overview of how to create a secure network test environment using virtual machines with Red Hat CentOS 7. Using virtual machines to create a secure network test environment simplify the workflow of testing several servers including network segmentation, network path redundancy, and traffic control using a firewall. This study suggests a set of guidelines for building a secure network test environment that includes a Domain Name Server (DNS), Web Server, File Transfer Protocol (FTP) Server, and a firewall. The documentation provided in this project is primarily useful for IT students looking …


Security Practices: Keeping Individuals Safe And Aware In The Cyber World, Annie Respicio Jun 2019

Security Practices: Keeping Individuals Safe And Aware In The Cyber World, Annie Respicio

Electronic Theses, Projects, and Dissertations

We currently live in a day and age where nearly everyone uses electronic devices and connects to the web. Whether it be from a desktop, laptop, or smartphone, staying connected and having information at your fingertips is easier than ever. Although technology has become so intermingled with our daily lives, the idea around security is not as momentous as it should be. As mentioned by the Multi-State Information Sharing and Analysis Center (MS-ISAC), “based on recent statistics, the average unprotected computer can be compromised in a matter of minutes. The majority of individuals who thought their computers were safe…were wrong.” …


Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh Jun 2019

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh

Journal of International Technology and Information Management

The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …


The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski May 2019

The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski

Journal of International Technology and Information Management

Research has established the critical role of social networks in facilitating adjustment to foreign environments. Increasingly, social interactions are happening through computer mediated technology. This paper explores the role of emotional expression in newcomers’ blogs in developing and interacting with social networks in a new country. This research uses a dictionary-based text analytics approach to detect emotional expression in newcomers’ blog posts and their associated discussions. Blog posts with more emotional expression had more associated responses; discussions tended to be more positive than posts; and the relative amount of negative emotion in the discussions increases as posts become more negative. …


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He May 2019

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …


College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch May 2019

College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch

Journal of International Technology and Information Management

College enrollments and low to moderate household incomes are stagnating while tuition costs are increasing. The New York State Legislature enacted the nation’s first tuition-free degree program, the Excelsior Scholarship, designed to make a college education more affordable to middle class families. This legislation can impact what institution of higher education students will choose upon high school graduation. In order to understand the choice criteria for selecting an institution of higher education, a research study was conducted among a representative sample of high school upper classmen and parents of this respondent segment. The data collection and analysis were accomplished using …


The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun May 2019

The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun

Journal of International Technology and Information Management

This article discusses generic scripting, a useful scripting technology for developing applications. In its simplest use, generic scripting can be used as a documentation tool to replace flowcharting or pseudocode. in certain situations, generic scripting can lead directly to a working application without the need to write, compile and test a new program. Generic scripting is discussed as a tool which can be used in logical design, detailed design and implementation of a new application. An example is presented to show how generic scripting can be used by non-programmers to simplify the development of applications. This example is used to …


Ability Sports And Education Festival Mobile Application, Thomas Saldana Mar 2019

Ability Sports And Education Festival Mobile Application, Thomas Saldana

Electronic Theses, Projects, and Dissertations

The purpose of this project is to create an iOS native mobile application for the Ability Sports & Education Festival at the California State University of San Bernardino. The iOS application will solve three business needs. First, it will allow participants to view the events, hours, schedules, coaches, and resources of the Ability Sports and Education Festival. Second, it will allow participants to route, search, and find event locations using ArcGIS. Lastly, it will allow participants to register for the event right from their phones.


Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel Mar 2019

Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel

Journal of International Technology and Information Management

The skills related to the use of information and communication technologies (ICT) were examined in this study within the context of eight communities with a high degree of vulnerability and diversity. The objectives of the study were: a) to conduct a diagnosis of thirteen competencies related to the use of ICT in eight Mayan-speaking communities in the state of Yucatan, Mexico, and b) to examine such variables as gender, marital status, and the education level of their parents. in relation to the degree of ICT among these youth.

The findings indicate that there are differences in the use of technology …


Reviews To Rating Conversion And Analysis Using Machine Learning Techniques, Charitha Chanamolu Mar 2019

Reviews To Rating Conversion And Analysis Using Machine Learning Techniques, Charitha Chanamolu

Electronic Theses, Projects, and Dissertations

With the advent of technology in recent years, people depend more on online reviews to purchase a product. It is hard to determine whether the product is good or bad from hundreds of mixed reviews. Also, it is very time-consuming to read many reviews. So, opinion mining of reviews is necessary.

The main aim of this project is to convert the reviews of a product into a rating and to evaluate the ratings using machine learning algorithms such as Naïve Bayes and Support Vector Machine. In the process of converting the reviews to a rating, score words are created using …


Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles Jan 2019

Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles

Journal of International Technology and Information Management

This paper features a case study of Hewlett Packard Brazil’s deployment of radio frequency identification-enabled Exceler8 platform to support its product assembly using Flextronics in Sorocaba, Sao Paulo and distribution by DHL. The study also identifies the stage HP Brazil belongs to in its journey to being a full smart factory using the framework of Odwazny et al. (2018). The case study and content analysis methods are used in analyzing the concepts prescribed by the Industry 4.0, smart factory, and Industrial Internet of Things (IIOT) frameworks to HP Brazil’s RFID system. The Odwazny et al. (2018) framework identifies HP Brazil …


Table Of Contents Jitim Vol 28 Issue 1, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 1, 2019

Journal of International Technology and Information Management

Table of contents


Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt Jan 2019

Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt

Journal of International Technology and Information Management

Internet of things (IoT) is the buzzword and pioneering breakthrough approach highlighted in today’s industry 4.0, where the devices are seamlessly integrated with each other, sharing vital information in real-time sync. With the wearable IoT devices, the diagnostic readings and physical measurements of the patients can be shared with the physician on the go and suitable diagnosis can as well be shared with patient in the real-time on their own mobile devices through IoT applications. This study empirically examines the importance of m-IoT adoption on the information pervasiveness across the network and patient stakeholders and in turn investigating how efficiency …


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye Jan 2019

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis …


Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin Jan 2019

Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin

Journal of International Technology and Information Management

Today, many critical information systems have safety-critical and non-safety-critical functions executed on the same platform in order to reduce design and implementation costs. The set of safety-critical functionality is subject to certification requirements and the rest of the functionality does not need to be certified, or is certified to a lower level. The resulting mixed-criticality systems bring challenges in designing such systems, especially when the critical tasks are required to complete with a timing constraint. This paper studies a problem of scheduling a mixed-criticality system with fault tolerance. A fault-recovery technique called checkpointing is used where a program can go …


Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles Jan 2019

Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles

Journal of International Technology and Information Management

This paper features the use of blockchain technology in the healthcare industry, with special focus on healthcare data exchange and interoperability; drug supply chain integrity and remote auditing; and clinical trials and population health research. This study uses the research method of analyzing the published case studies, academic articles, trade articles, and videos on MEDRec, Patientory, and the AmerisourceBergen/Merck alliance with SAP/CryptoWerk. The “blockchain” concept was introduced around October 2008 when a proposal for the virtual currency, bitcoin, was offered. Blockchain is a much broader concept than bitcoin and has the following key attributes: distributed database; peer-to-peer transmission; transparency with …


Table Of Contents Jitim Vol 27 Issue 4, 2018-2019 Jan 2019

Table Of Contents Jitim Vol 27 Issue 4, 2018-2019

Journal of International Technology and Information Management

ToC JITIM - Special Issue on ICT4D


A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng Jan 2019

A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng

Journal of International Technology and Information Management

The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …


Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che Jan 2019

Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che

Journal of International Technology and Information Management

The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.


Table Of Contents Jitim Vol 28 Issue 4, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 4, 2019

Journal of International Technology and Information Management

Table of Contents