Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Engineering

Contextual Influences On Human Resources Development: Considerations And Evaluations On The Various External And Internal Factors That Shape And Influence Hrd In Organisations, Charles Alves De Castro Dec 2019

Contextual Influences On Human Resources Development: Considerations And Evaluations On The Various External And Internal Factors That Shape And Influence Hrd In Organisations, Charles Alves De Castro

Articles

This article aims to briefly understand and evaluate the main external and internal factors that impact directly on human resources development area within the organisations, mainly related to multinational companies. Also, it discusses the various aspects and influences on HRD-(Human Resources Development) such as societal, organisational/local, global, that impacts on costs, environment, regulations, policies, culture, beliefs, technology and values. This research was carried out by way of a literature review. This is important to demonstrate, explain and evaluate the current existent literature about this specific theme covered in this article. Furthermore, through this review we compared previous research on HRD. …


Feasibility Of Collaborative Alliance Association For Non-Competitive Small Business Contractors, Brody Allen Gill Dec 2019

Feasibility Of Collaborative Alliance Association For Non-Competitive Small Business Contractors, Brody Allen Gill

Construction Management

Small business construction contracting firms around the country struggle with growing their business successfully. This is a result of unknown results from new business practices and few resources to initiate programs that can improve productivity and efficiency. A simple solution could give small business construction contractors the opportunity to share ideas, compare company analytics and promote professional networking in a non-competitive, collaborative alliance. The goal of this project is to determine if a collaborative alliance association using data benchmarking would be an effective solution for non-competitive small business contractors to grow their businesses. Thereafter being proven effective, is such an …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng Sep 2019

Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng

Communications of the IIMA

Complex environments show a high degree of dynamics caused by vital interactions between objects within those environments and alterations through which the set of objects and their characteristics within those environments go over time. Within this work, we show that we can tame the level of complexity in dynamic environments by identifying relationships of interest between objects in such environments. To this end, we apply the theory of Information Flow, also known as Channel Theory, to the application area of smart manufacturing. We enhance the way how the Channel Theory has been applied so far by using an …


Systems Approach To Evaluating Mih-Cp (Mobile Integrated Healthcare – Community Paramedicine): A Case Study Of East Baton Rouge Parish (Ebrp) Emergency Medical Services (Ems) Community Paramedicine Program Initiative, Oluwakemi Aiyedun Sep 2019

Systems Approach To Evaluating Mih-Cp (Mobile Integrated Healthcare – Community Paramedicine): A Case Study Of East Baton Rouge Parish (Ebrp) Emergency Medical Services (Ems) Community Paramedicine Program Initiative, Oluwakemi Aiyedun

LSU Doctoral Dissertations

This study applied a holistic method of healthcare program assessment, known as systems approach, to evaluate the efficacy of the East Baton Rouge Parish (EBRP) EMS Community-integrated Health Program (CIHP). The author developed assessment metrics following the Quadruple Aim Framework: IHI (Institute for Healthcare Improvement) Triple Aim + Provider Experience.

Results showed that the CP program in this study delivers high ratings on patient experience and provided a 51% return on investment (ROI) through reduced emergency service utilization, ED visits and inpatient hospital admissions. However, findings did not demonstrate meaningful improvement in patients’ health-related quality of life (HRQoL) and self-efficacy …


Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che Jul 2019

Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che

Journal of International Technology and Information Management

In this paper, we outline how recruiting and talent acquisition gained importance within HRM field, then give a brief introduction to the newest tools used by the professionals for recruiting and lastly, describe the Artificial Intelligence-based tools that have started playing an increasingly important role. We also provide further research suggestions for using artificial intelligence-based tools to make recruiting more efficient and cost-effective.


Table Of Contents Jitim Vol 28 Issue 2, 2019 Jul 2019

Table Of Contents Jitim Vol 28 Issue 2, 2019

Journal of International Technology and Information Management

Table of Contents JITIM 2, 2019


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner Jun 2019

Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner

Ilker Karaca

This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network methodologies. Both methods …


Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh Jun 2019

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh

Journal of International Technology and Information Management

The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …


Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne Jun 2019

Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne

Journal of Cybersecurity Education, Research and Practice

With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.

However, up to this point there has been a …


Effects Of Supplemental Bid Documentation, Alexis M. Bynum Jun 2019

Effects Of Supplemental Bid Documentation, Alexis M. Bynum

Construction Management

As the complexity of construction projects increases, more work is being subcontracted out by general contractors who oversee the construction of the project. Research suggests that a variety of factors are impacting subcontractors when putting together a bid. These factors were considered in determining a proposed solution for simplifying the bid process. This case study attempts to analyze the bidding process of construction projects in order to improve the accuracy of bids. Traditionally, bid documents include plans and specifications. This study analyzes the effects of adding a scope of work, as ascertained by the general contractor for each trade, to …


The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski May 2019

The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski

Journal of International Technology and Information Management

Research has established the critical role of social networks in facilitating adjustment to foreign environments. Increasingly, social interactions are happening through computer mediated technology. This paper explores the role of emotional expression in newcomers’ blogs in developing and interacting with social networks in a new country. This research uses a dictionary-based text analytics approach to detect emotional expression in newcomers’ blog posts and their associated discussions. Blog posts with more emotional expression had more associated responses; discussions tended to be more positive than posts; and the relative amount of negative emotion in the discussions increases as posts become more negative. …


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He May 2019

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …


College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch May 2019

College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch

Journal of International Technology and Information Management

College enrollments and low to moderate household incomes are stagnating while tuition costs are increasing. The New York State Legislature enacted the nation’s first tuition-free degree program, the Excelsior Scholarship, designed to make a college education more affordable to middle class families. This legislation can impact what institution of higher education students will choose upon high school graduation. In order to understand the choice criteria for selecting an institution of higher education, a research study was conducted among a representative sample of high school upper classmen and parents of this respondent segment. The data collection and analysis were accomplished using …


The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun May 2019

The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun

Journal of International Technology and Information Management

This article discusses generic scripting, a useful scripting technology for developing applications. In its simplest use, generic scripting can be used as a documentation tool to replace flowcharting or pseudocode. in certain situations, generic scripting can lead directly to a working application without the need to write, compile and test a new program. Generic scripting is discussed as a tool which can be used in logical design, detailed design and implementation of a new application. An example is presented to show how generic scripting can be used by non-programmers to simplify the development of applications. This example is used to …


Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel Mar 2019

Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel

Journal of International Technology and Information Management

The skills related to the use of information and communication technologies (ICT) were examined in this study within the context of eight communities with a high degree of vulnerability and diversity. The objectives of the study were: a) to conduct a diagnosis of thirteen competencies related to the use of ICT in eight Mayan-speaking communities in the state of Yucatan, Mexico, and b) to examine such variables as gender, marital status, and the education level of their parents. in relation to the degree of ICT among these youth.

The findings indicate that there are differences in the use of technology …


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Jan 2019

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

J. Philip Craiger, Ph.D.

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as intellectual property theft …


Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles Jan 2019

Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles

Journal of International Technology and Information Management

This paper features a case study of Hewlett Packard Brazil’s deployment of radio frequency identification-enabled Exceler8 platform to support its product assembly using Flextronics in Sorocaba, Sao Paulo and distribution by DHL. The study also identifies the stage HP Brazil belongs to in its journey to being a full smart factory using the framework of Odwazny et al. (2018). The case study and content analysis methods are used in analyzing the concepts prescribed by the Industry 4.0, smart factory, and Industrial Internet of Things (IIOT) frameworks to HP Brazil’s RFID system. The Odwazny et al. (2018) framework identifies HP Brazil …


Mapse Modelo De Administración De Proyectos En Una Empresa Del Sector Eléctrico, Juan José Bernal Segura Jan 2019

Mapse Modelo De Administración De Proyectos En Una Empresa Del Sector Eléctrico, Juan José Bernal Segura

Maestría en Ingeniería

Este trabajo propone la adaptación de los modelos propuestos por el PMBOK ® Guide cuarta edición y la norma ISO 10006 tomando los elementos básicos que aplican a las empresas del sector eléctrico, dada la necesidad de tener un referente para abordar proyectos en este sector desde el punto de vista de la gerencia de proyectos, tomando como referencia una compañía que desarrolla proyectos para el sector público y privado en el territorio nacional de Colombia, bajo la modalidad de licitación o contratación directa. Esto implica que los usuarios finales son miles de Colombianos que hacen uso del servicio eléctrico …


Table Of Contents Jitim Vol 28 Issue 1, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 1, 2019

Journal of International Technology and Information Management

Table of contents


Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt Jan 2019

Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt

Journal of International Technology and Information Management

Internet of things (IoT) is the buzzword and pioneering breakthrough approach highlighted in today’s industry 4.0, where the devices are seamlessly integrated with each other, sharing vital information in real-time sync. With the wearable IoT devices, the diagnostic readings and physical measurements of the patients can be shared with the physician on the go and suitable diagnosis can as well be shared with patient in the real-time on their own mobile devices through IoT applications. This study empirically examines the importance of m-IoT adoption on the information pervasiveness across the network and patient stakeholders and in turn investigating how efficiency …


Global Aviation System: Towards Sustainable Development, Marina P. Bonser Dr. Jan 2019

Global Aviation System: Towards Sustainable Development, Marina P. Bonser Dr.

International Journal of Aviation, Aeronautics, and Aerospace

Aviation around the world has integrated into a global system. As the integration process continues, more aspects and levels of it need to be lead towards the sustainable development of the whole system via advancing strategic management, global communication proficiency, and technological expertise. It becomes essential to enrich global language (English) proficiency with cross-cultural communication competence not only for communication in the air but also for airport security, passenger and cargo services, aircraft and equipage engineering, building, and maintenance. Nowadays lower levels of management need more advanced strategic thinking and problem solving skills, and higher levels of management need global …


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye Jan 2019

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis …


Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles Jan 2019

Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles

Journal of International Technology and Information Management

This paper features the use of blockchain technology in the healthcare industry, with special focus on healthcare data exchange and interoperability; drug supply chain integrity and remote auditing; and clinical trials and population health research. This study uses the research method of analyzing the published case studies, academic articles, trade articles, and videos on MEDRec, Patientory, and the AmerisourceBergen/Merck alliance with SAP/CryptoWerk. The “blockchain” concept was introduced around October 2008 when a proposal for the virtual currency, bitcoin, was offered. Blockchain is a much broader concept than bitcoin and has the following key attributes: distributed database; peer-to-peer transmission; transparency with …


Table Of Contents Jitim Vol 27 Issue 4, 2018-2019 Jan 2019

Table Of Contents Jitim Vol 27 Issue 4, 2018-2019

Journal of International Technology and Information Management

ToC JITIM - Special Issue on ICT4D


A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng Jan 2019

A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng

Journal of International Technology and Information Management

The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …


Assessment Of Adaptability Of A Supply Chain Trading Agent’S Strategy: Evolutionary Game Theory Approach, Yoon Sang Lee, Riyaz T. Sikora Jan 2019

Assessment Of Adaptability Of A Supply Chain Trading Agent’S Strategy: Evolutionary Game Theory Approach, Yoon Sang Lee, Riyaz T. Sikora

Journal of International Technology and Information Management

With the increase in the complexity of supply chain management, the use of intelligent agents for automated trading has gained popularity (Collins, Arunachalam, B, et al. 2006). The performance of supply-chain agents depends on not just the market environment (supply and demand patterns) but also on what types of other agents they are competing with. For designers of such agents it is important to ascertain that their agents are robust and can adapt to changing market and competitive environments. However, to date there has not been any work done that assesses the adaptability of a trading agent’s strategy in the …


Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che Jan 2019

Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che

Journal of International Technology and Information Management

The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.