Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Digital Communications and Networking

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni Aug 2020

Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni

English Language Institute

COVID-19 pandemic has significantly changed library user behavior, workplaces, and some public areas including in the library. During the COVID 19 pandemics, the digital library with a mobile app like ipusnas has facilitated to accessing library resources. The ipusnas has increased people's accessibility to library materials. This research focuses on the use of the digital library has a significant impact on library users behavior; it can influence how they read, access the library, and their interaction with the library resources.


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, Rachel S. Evans Feb 2020

Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, Rachel S. Evans

Presentations

No matter what member of the team you are or what type of library you are in - be it electronic resources manager, cataloger, head of acquisitions, ILS or systems administrator, or even repository coordinator - getting things done and meeting goals depends largely on how you communicate with one another and how you handle your time. Meeting goals and deadlines on both big and small projects in addition to your personal tasks can be achieved less painfully by making effective use of a few on point tools. This session will use the presenter's preferred platforms to show specific examples …


Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa Feb 2020

Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa

Library Philosophy and Practice (e-journal)

In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over internet. Cryptanalyst tries to break secret code by using different methods like Brute Force attack, Linear Cryptanalysis and differential cryptanalysis etc. The basic aim of this bibliometric survey is to understand the extent of the available literature for the area of cryptanalysis of block ciphers towards cyber security. The bibliometric analysis is primarily based on Scopus as it provides research database for various areas and tools like Sciencescape, Gephi etc. It is analyzed by bibliometric survey that major publications are from conference, …


Piecing Together Summon Over Alma Documentation, James M. Day Feb 2020

Piecing Together Summon Over Alma Documentation, James M. Day

Publications

Ex Libris provides some useful documentation for “Alma-Summon Integration” but it is not complete. Most Alma documentation and online help pages assume you are using Primo. Sometimes the Alma configurations for Primo apply to Summon, but mostly they do not. The ELUNA Summon Product Working Group members using Summon over Alma started a project to identify existing documentation, consolidate it, and create supplemental documentation where necessary. We hope this will help Ex Libris provide better support for Summon over Alma.


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd Jan 2020

Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd

Journal of International Technology and Information Management

Blockchain has become the new hype term in the business world for the last decade. Due to the new technology’s characteristics and innovative applications, it is being adopted globally in a wide number of industries including the banking industry, yet no adoption model is provided to guide this process. This research aims to contribute to facilitating the successful adoption and implementation of the blockchain new technology in the banking industry. Building on the assumption that the blockchain’s adoption in banking will be directed by the regulations and best practices guidelines of the global banking regulatory bodies and practitioner, this research …


The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani Jan 2020

The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani

Journal of International Technology and Information Management

This paper is based on a Ph.D. study investigating the critical challenges facing e-commerce adoption by entrepreneurs in Saudi Arabia, identifying the major driving factors, barriers, motivations, perceived advantages, potential problems and some practical solutions as well as future expectations from entrepreneurs’ perspectives. From the study findings, a set of practical recommendations were derived for the government, entrepreneurs and investors in Saudi Arabia to consider, to promote ecommerce entrepreneurship in the county.

The research was undertaken using a qualitative approach. Data collection techniques involved in-depth, semi-structured interviews, with (1) e-commerce entrepreneurs, and (2) government authorities, educational initiatives and private support …


Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi Jan 2020

Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi

Journal of International Technology and Information Management

Technology empowers entrepreneurs to pursue alternative funding through platforms like crowdfunding. This research explores significant startup funding factors using Crunchbase. Controlling for common factors (acquisition/funding-rounds/IPO), the research uniquely focuses on web attention - the visibility on social media - and its impact on funding. It also examines the moderating influence of startup’s home country culture (individualism/collectivism). Findings show stronger positive impact of web attention on startup funding for collectivist countries. While individualistic investors value personal goals, collectivists value collaborative goals - inclinations that align with crowdfunding behavior. Therefore while increasing web attention, crowdfunding efforts can be targeted towards collectivist countries.


Table Of Contents Jitim Vol 29 Issue 1, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 1, 2020

Journal of International Technology and Information Management

Table of contents


Assessment Of The Needs Of Ict Skills On Employability In Smes: A Vft Approach, Renatus Michael Mushi Jan 2020

Assessment Of The Needs Of Ict Skills On Employability In Smes: A Vft Approach, Renatus Michael Mushi

Journal of International Technology and Information Management

the globalised economy comes with extra demand of ICT skills among the graduates. This is due to the demand if ICT technicalities in performing a number of basic activities in the workplaces. Majority of studies which concentrate with ICT skills on employability deals with technical enterprises. In non-technical companies such as construction, manufacturing and agriculture, ICT is studied as among the basic skill-set of graduates. However, recently, there has been special demand of graduates with basic ICT knowledge on recruitment processes. This indicates the growing demand of basic ICT skills among a broad range of professions. However, the type of …


Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari Jan 2020

Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari

Journal of International Technology and Information Management

System success is considered to be an important element in accomplishing the goals of the organization; therefore evaluation of system success needs to be done in order to ensure that investment in Information System is successful. Most of Higher Learning Institutions (HLIs) in Tanzania have adopted the use of IS in providing service to their customers. Nevertheless, there is less evidence that system success evaluation has been done in order to identify the desired characteristics which could make IS more effective. Due to that, this study evaluates the effectiveness of Student Information System (SIS) used at the Institute of Finance …


An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang Jan 2020

An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang

Journal of International Technology and Information Management

Data management has become an important challenge. Good data management requires an effective approach to collecting, storing, and accessing data across the enterprise. In this paper, a knowledge modeling approach to data management is introduced with an emphasis on data requirements analysis. A knowledge model can provide a high-level view of organizational data by specifying the structure and relationships of the knowledge contents used in business processes. The proposed knowledge modeling approach is business process oriented and decision oriented. The description of the knowledge contents in the model is based on ontological specification. The model is comprised of five elements: …


Table Of Contents Jitim Vol 29 Issue 2, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 2, 2020

Journal of International Technology and Information Management

Table of contents


Table Of Contents Jitim Vol 29 Issue 3, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 3, 2020

Journal of International Technology and Information Management

Table of contents


Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar Jan 2020

Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar

Library Philosophy and Practice (e-journal)

There are numerous libraries in Pakistan that cannot afford RFID technology because of the limited budget and resources and confronted book theft, low security, and delay services. This paper base an experiment that how libraries can adopt this technology effectively and productively with a lower budget and higher outcomes. The FAST-National University of Computer and Emerging Sciences Library Karachi campuses is the principal library in Pakistan which has adopted UHF-RFID technology with the integration of ILS insignia; SIP II compliance that jointly works with library integrated system and numerous activities can be made through this. An exploratory study conducted in …