Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 17 of 17

Full-Text Articles in Computer Engineering

Requirements Specification For Dsic: Distribution System For Information And Collaboration, Alex Abrahamian Dec 2011

Requirements Specification For Dsic: Distribution System For Information And Collaboration, Alex Abrahamian

Computer Science and Software Engineering

There seems to exist an invisible barrier between people that should be connected but for whatever reasons (don't hang out in the same circles, don't go to the same meetings, or are geographically separated) haven't met each other yet.

Normally these people will only meet when others bring them together or they are thrown together on a project. DSIC aims to preempt the person discovery process by allowing a way for people to post ideas, events, and other collaborations in a single place that can then be searched by other users.

The system utilizes postings, user profiles, and a tagging …


A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr Oct 2011

A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Efficient bureaucratic processes as essential to attract and retain investment, as well as promote SME growth. The e_Gov is one of many ways emerging economies have used to streamline public service delivery and create a freindly and conducive atmosphere for business -both MNC and SMEs. This presentation provide an overview of some of the World's most recent case examples on the successful design-plan-implementation of eGov to build a strong basis to attract investment and deliver seamless essential services to Citizens.


A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr Oct 2011

A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The purpose of this paper is to critically assess the effectiveness of Fiscal and Monetary Policies in the South Pacific Island Countries. The paper tracks down the economic growth for the last 20 years between 1990-2010, and drawing from key fiscal and monetary policies in place during the time under consideration, as well as specific interventions in the region, we find that: 1) While the South Pacific Island Countries (SPICs) particularly the six major economies (Solomon Islands, Fiji, Vanuatu, PNG, Samoa, Tonga) pursued fiscal and monetary policies for promoting growth and diversification of their economies, their fiscal policies relied heavily …


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz Jul 2011

Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz

International Conference on Information and Communication Technologies

Electronic negotiations are business negotiations conducted via electronic means using information and communications technologies (ICT). Two dominant types of electronic negotiation systems are automated negotiation systems for software agents and negotiation support systems (NSSs) for humans. However, the integration of two types for human-agent negotiations is an important task. In this paper, an extended communication model for human-agent business negotiations is presented. For this purpose, the underlying communication models of automated negotiations and NSSs are analyzed. The extended communication model is based on a common negotiation ontology which captures the negotiation agenda and paves the way for such hybrid communication, …


A Study On Facility Planning Using Discrete Event Simulation: Case Study Of A Grain Delivery Terminal., Sarah M. Asio Jul 2011

A Study On Facility Planning Using Discrete Event Simulation: Case Study Of A Grain Delivery Terminal., Sarah M. Asio

Department of Industrial and Management Systems Engineering: Dissertations, Theses, and Student Research

The application of traditional approaches to the design of efficient facilities can be tedious and time consuming when uncertainty and a number of constraints exist. Queuing models and mathematical programming techniques are not able to capture the complex interaction between resources, the environment and space constraints for dynamic stochastic processes. In the following study discrete event simulation is applied to the facility planning process for a grain delivery terminal. The discrete event simulation approach has been applied to studies such as capacity planning and facility layout for a gasoline station and evaluating the resource requirements for a manufacturing facility. To …


A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala Jun 2011

A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith Apr 2011

A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith

Purdue Polytechnic Masters Theses

Any major research institution has a substantial number of computer systems on its campus, often in the scale of tens of thousands. Given that a large amount of scientific computing is appropriate for execution in an opportunistic environment, a campus grid is an inexpensive way to build a powerful computational resource. What is missing, though, is a model for making an informed decision on the cost-effectives of a campus grid. In this thesis, the author describes a model for measuring the costs and benefits of building a campus computing resource based on the institution’s existing investment in computing hardware.

For …


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala Jan 2011

A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


Data Warehouse As A Backbone For Business Intelligence: Issues And Challenges, Mutaz M. Al-Debei Jan 2011

Data Warehouse As A Backbone For Business Intelligence: Issues And Challenges, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The aim of this research is to identify and classify the main issues and challenges facing different business organizations when implementing Data Warehouse (DW) technologies. This is highly significant given the theoretical and practical implications and importance of such technologies. It is also important to highlight these challenges given the scarcity of research in this domain despite its value. To determine DW issues and challenges, a qualitative research methodology was followed. A semi-structured interview protocol was used with 17 DW project managers and seniors’ members. The gathered data were analyzed by utilizing a bottom-up content analysis technique where content is …


Nested Circles Boundary Algorithm For Rotated Texture Classification, Mutaz M. Al-Debei, Suzan Awienat, Rana Abu-Laila Jan 2011

Nested Circles Boundary Algorithm For Rotated Texture Classification, Mutaz M. Al-Debei, Suzan Awienat, Rana Abu-Laila

Dr. Mutaz M. Al-Debei

A new simple yet efficient classification algorithm named as Nested Circle Boundary (NCB) is proposed in this study. This algorithm provides features from measuring the average of the sum of boundary pixels for a number of nested circles inside the texture image. It was tested on different 91 rotated texture images for 13 texture classes using Brodatz texture database. The proposed algorithm achieves 100% accuracy when it comes to rotated texture classification. The methodology of NCB algorithm is based on two phases. Phase one mainly measures the features of the 13 texture classes and the original texture images. Then, the …


Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison Jan 2011

Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison

Dr. Mutaz M. Al-Debei

The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak business …


A Semi-Automatic Ontology Extension Method For Semantic Web Services, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad Jan 2011

A Semi-Automatic Ontology Extension Method For Semantic Web Services, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad

Dr. Mutaz M. Al-Debei

this paper provides a novel semi-automatic ontology extension method for Semantic Web Services (SWS). This is significant since ontology extension methods those existing in literature mostly deal with semantic description of static Web resources such as text documents. Hence, there is a need for methods that can serve dynamic Web resources such as SWS. The developed method in this paper avoids redundancy and respects consistency so as to assure high quality of the resulting shared ontologies.


Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang Jan 2011

Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang

Management, Entrepreneurship and Technology Faculty Publications

The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …


Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo Jan 2011

Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.