Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (137)
- Computer and Systems Architecture (136)
- Business (133)
- Technology and Innovation (126)
- Social and Behavioral Sciences (124)
-
- Management Information Systems (122)
- Communication (117)
- Communication Technology and New Media (115)
- Science and Technology Studies (115)
- Data Storage Systems (112)
- Business Intelligence (105)
- Information Literacy (103)
- Library and Information Science (103)
- E-Commerce (97)
- Management Sciences and Quantitative Methods (97)
- Social Media (97)
- Operational Research (95)
- Operations Research, Systems Engineering and Industrial Engineering (95)
- Other Computer Engineering (29)
- Physical Sciences and Mathematics (12)
- Computer Sciences (11)
- Education (8)
- Medicine and Health Sciences (7)
- Business Administration, Management, and Operations (6)
- Business Analytics (6)
- Hardware Systems (5)
- Health Information Technology (5)
- Artificial Intelligence and Robotics (4)
- Keyword
-
- Internet (10)
- ToC (10)
- Java (Computer program language) (6)
- Machine Learning (6)
- Technology (6)
-
- World Wide Web (6)
- Android (5)
- Healthcare (5)
- TAM (5)
- Table (5)
- Blockchain (4)
- Contents (4)
- Data mining (4)
- Database design (4)
- Editor (4)
- Educational technology (4)
- Privacy (4)
- Social media (4)
- Tanzania (4)
- Web site development (4)
- Wireless communication systems (4)
- AI (3)
- Cybersecurity (3)
- Deep learning (3)
- Electronic data processing -- Distributed processing (3)
- Information (3)
- International (3)
- Internet programming (3)
- Machine learning (3)
- Mobile communication systems (3)
- Publication Year
- Publication
- Publication Type
Articles 121 - 150 of 237
Full-Text Articles in Computer Engineering
Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla
Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla
Electronic Theses, Projects, and Dissertations
In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to …
Study On The Pattern Recognition Enhancement For Matrix Factorizations With Automatic Relevance Determination, Hau Tao
Electronic Theses, Projects, and Dissertations
Learning the parts of objects have drawn more attentions in computer science recently, and they have been playing the important role in computer applications such as object recognition, self-driving cars, and image processing, etc… However, the existing research such as traditional non-negative matrix factorization (NMF), principal component analysis (PCA), and vector quantitation (VQ) has not been discovering the ground-truth bases which are basic components representing objects. On this thesis, I am proposed to study on pattern recognition enhancement combined non-negative matrix factorization (NMF) with automatic relevance determination (ARD). The main point of this research is to propose a new technique …
Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn
Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn
Communications of the IIMA
In the fast-changing world of IT, relevant competencies are getting more important as these determine how successful you can function in practice. As a consequence, organizations are introducing competency frameworks like the European e-Competence Framework (e-CF, 2014) in their IT departments. However, for many organizations it is unclear what good practices and pitfalls are when introducing such a framework. In this paper this topic is studied by analysing 13 interviews with IT- and HR-managers who are (or recently have been) involved in a transition towards the use of competencies with their IT-staff.
Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam
Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam
Electronic Theses, Projects, and Dissertations
Indoor Positioning System (IPS) focuses on locating objects inside
Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings. [1] IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is designed for Libraries. It is designed specifically for John M. Pfau Library, …
Inter Process Communication Between Two Servers Using Mpich, Nagabhavana Narla
Inter Process Communication Between Two Servers Using Mpich, Nagabhavana Narla
Electronic Theses, Projects, and Dissertations
The main aim of the project is to launch multiple processes and have those processes communicate with each other using peer to peer communication to eliminate the problems of multiple processes running on a single server, and multiple processes running on inhomogeneous servers as well as the problems of scalability. This entire process is done using MPICH which is a high performance and portable implementation of Message Passing Interface standard.
The project involves setting up the passwordless authentication between two local servers with the help of SSH connection. By establishing a peer to peer communication and by using a unique …
Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham
Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham
Electronic Theses, Projects, and Dissertations
Cloud computing is one important direction of current advanced technology trends, which is dominating the industry in many aspects. These days Cloud computing has become an intense battlefield of many big technology companies, whoever can win this war can have a very high potential to rule the next generation of technologies. From a technical point of view, Cloud computing is classified into three different categories, each can provide different crucial services to users: Infrastructure (Hardware) as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). Normally, the standard measurements for cloud computing reliability level is …
Epicconfigurator Computer Configurator And Cms Platform, Ivo A. Tantamango
Epicconfigurator Computer Configurator And Cms Platform, Ivo A. Tantamango
Electronic Theses, Projects, and Dissertations
Very often when we are looking to buy new IT equipment in an online store, we face the problem that certain parts of our order are not compatible with others or sometimes one part needs additional components. From another point of view in this process, when an online store owner wants to manage the products available in stock, assign prices, set conditions to make an order, or manage customer information, he or she must often rely on information from different systems, physical files, or other sources.
EpicConfigurator simplifies and solves the issues mentioned above. EpicConfigurator makes it easy for User …
The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi
The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi
Journal of International Technology and Information Management
The adoption of mobile technology has gained a serious attention in organizations and individuals. SMEs in the developing countries have hugely been relying on mobile phone technology in performing their activities. The main reasons for the popularity of mobile phones include their perceived low cost, less learning curve, mobility and its compatibility with the usage at the SMEs level as compared to the desktop computers. Despite existence on studies on adoption of mobile technology in different contexts, few of them have explicitly explored the way personal privacy can affect its acceptance to be used at the workplaces.
This study covers …
Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu
Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu
Journal of International Technology and Information Management
Massive open source online course (MOOC) platform enables enterprises to introduce their new innovations and deliver basic knowledge to handle the new products. We incorporated an openSAP course into a management information systems (MIS) class. Students learned the latest development of SAP customer relationship management (CRM) solutions along with the SAP enterprise resource planning (ERP) business processes integration that they learned in the classroom. 46.2% of the students obtained Record of Achievement and Confirmation of Participation certificates, which is higher than the average success rate of MOOCs. More importantly, the students experienced a way of sustainable and lifelong learning.
Table Of Contents Jitim Vol 27 Issue 1, 2018
Table Of Contents Jitim Vol 27 Issue 1, 2018
Journal of International Technology and Information Management
Table of Contents JITIM volume 27, issue 1 - 2018
Table Of Contents Jitim Vol 27 Issue 2, 2018
Table Of Contents Jitim Vol 27 Issue 2, 2018
Journal of International Technology and Information Management
ToC JITIM vol 27 - 2, 2018
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Journal of International Technology and Information Management
The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Journal of International Technology and Information Management
The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Table Of Contents Jitim Vol 26 Issue 4, 2017
Table Of Contents Jitim Vol 26 Issue 4, 2017
Journal of International Technology and Information Management
Table of Contents
Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech
Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech
Journal of International Technology and Information Management
It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …
Table Of Contents Jitim Vol 26 Issue 3, 2017
Table Of Contents Jitim Vol 26 Issue 3, 2017
Journal of International Technology and Information Management
Table of Contents
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Journal of International Technology and Information Management
Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Electronic Theses, Projects, and Dissertations
Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine …
Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang
Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang
Electronic Theses, Projects, and Dissertations
Natural Language Processing (NLP) is the field of study that focuses on the interactions between human language and computers. By “natural language” we mean a language that is used for everyday communication by humans. Different from programming languages, natural languages are hard to be defined with accurate rules. NLP is developing rapidly and it has been widely used in different industries. Technologies based on NLP are becoming increasingly widespread, for example, Siri or Alexa are intelligent personal assistants using NLP build in an algorithm to communicate with people. “Natural Language Processing Based Generator of Testing Instruments” is a stand-alone program …
Table Of Contents Jitim Vol 26 Issue 2, 2017
Table Of Contents Jitim Vol 26 Issue 2, 2017
Journal of International Technology and Information Management
Table of Contents JITIM vol 26 issue 2, 2017
Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew
Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew
Journal of International Technology and Information Management
Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …
Children’S Social Network: Kids Club, Eiman Alrashoud
Children’S Social Network: Kids Club, Eiman Alrashoud
Electronic Theses, Projects, and Dissertations
Young children often have a profound interest that if nurtured, would develop to great social cues and skills thereby improving their social aspects of life. Parents can conveniently benefit from a swift data sharing in the collaborative scrutiny of their kid's participation, in public activities facilitated through the internet digital technology. To facilitate the involvement of shared activities among children, an interactive website is essential. The aim of my project is to develop a website that is intended to be an interactive platform for a variety of events selection. Additionally, the website will aid parents in the creation, discovery and …
Android Mobile Application For Hospital Executives, Vihitha Nalagatla
Android Mobile Application For Hospital Executives, Vihitha Nalagatla
Electronic Theses, Projects, and Dissertations
Hospitals are the largest and most complex organizations where health care is provided. Safe and effective patient care services in hospitals depend on the efficient decisions made by hospital executives. The main task of hospital executives is to ensure the hospital can provide high quality patient care and services. “Android Mobile Application For Hospital Executives” is an Android application used for displaying hospital performance metrics on a daily basis. This application allows hospital executives to review and monitor hospital operational data with ease of access and in a portable manner. Thus, reducing the effort of the hospital executives to perform …
Automatic Generation Of Web Applications And Management System, Yu Zhou
Automatic Generation Of Web Applications And Management System, Yu Zhou
Electronic Theses, Projects, and Dissertations
One of the major difficulties in web application design is the tediousness of constructing new web pages from scratch. For traditional web application projects, the web application designers usually design and implement web application projects step by step, in detail. My project is called “automatic generation of web applications and management system.” This web application generator can generate the generic and customized web applications based on software engineering theories. The flow driven methodology will be used to drive the project by Business Process Model Notation (BPMN). Modules of the project are: database, web server, HTML page, functionality, financial analysis model, …
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Journal of International Technology and Information Management
Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
Journal of International Technology and Information Management
There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Journal of International Technology and Information Management
Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …
Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran
Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran
Journal of International Technology and Information Management
In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …