Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Institute of Business Administration

2009

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Business

Application Of Ict Ii: The Impact Of Performance Management System On The Performance Of The Employees & The Organization, Arshad Siddiqui, Faryal Malik Aug 2009

Application Of Ict Ii: The Impact Of Performance Management System On The Performance Of The Employees & The Organization, Arshad Siddiqui, Faryal Malik

International Conference on Information and Communication Technologies

The purpose of this paper is to examine the relationship between performance management system (PMS), employee's job satisfaction and thus, their commitment to the organization by working for its fate. If various characteristics of PMS that build commitment and satisfaction could be identified, then managers may be more capable of using PMS so as to yield positive results. Further, the study will also examine the impact of PMS on organizational effectiveness by enhancing personal performance using appropriate performance measures.


Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani Aug 2009

Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani

International Conference on Information and Communication Technologies

Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …


Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari Aug 2009

Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari

International Conference on Information and Communication Technologies

As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.


Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq Aug 2009

Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq

International Conference on Information and Communication Technologies

Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …


Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha Aug 2009

Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha

International Conference on Information and Communication Technologies

Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Artificial Intelligence – Ii: Image Normalization For Face Recognition Using 3d Model, Zahid Riaz, Michael Beetz, Bernd Radig Aug 2009

Artificial Intelligence – Ii: Image Normalization For Face Recognition Using 3d Model, Zahid Riaz, Michael Beetz, Bernd Radig

International Conference on Information and Communication Technologies

This paper describes an image segmentation and normalization technique using 3D point distribution model and its counterpart in 2D space. This segmentation is efficient to work for holistic image recognition algorithm. The results have been tested with face recognition application using Cohn Kanade facial expressions database (CKFED). The approach follows by fitting a model to face image and registering it to a standard template. The models consist of distribution of points in 2D and 3D. We extract a set of feature vectors from normalized images using principal components analysis and using them for a binary decision tree for classification. A …


Artificial Intelligence – Ii: Watermarking Of Chest Ct Scan Medical Images For Content Authentication, Nisar A. Memon, S.A.M. Gilani, Asad Ali Aug 2009

Artificial Intelligence – Ii: Watermarking Of Chest Ct Scan Medical Images For Content Authentication, Nisar A. Memon, S.A.M. Gilani, Asad Ali

International Conference on Information and Communication Technologies

Medical image is usually comprised of region of interest (ROI) and region of non interest (RONI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in RONI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.


Networks - Ii: Assessment Of Node Density In Cartesian Ad Hoc Routing Protocols (Carp), Imran Raza, Mohammad Hasan Raza Aug 2009

Networks - Ii: Assessment Of Node Density In Cartesian Ad Hoc Routing Protocols (Carp), Imran Raza, Mohammad Hasan Raza

International Conference on Information and Communication Technologies

With the rapid development in the geographical positioning system (GPS) technology, the geographical routing category of the MANET protocols has recently been a hot research area. The Cartesian Ad hoc Routing Protocols (CARP) are a set of three adaptive and connectionless protocols that address the problem of routing and power consumption in MANET. These protocols are used to limit the number of forwarding nodes in a logical transmission area. Density of an ad hoc network is considered a network parameter in CARP, and is used in the calculations to form a logical transmission area. The CARP assume that the nodes …


Data Mining: Applying Centroid Based Adjustment To Kernel Based Object Tracking For Improving Localization, Rashid Mehmood, Muhammad Usman Ali, Imtiaz A. Taj Aug 2009

Data Mining: Applying Centroid Based Adjustment To Kernel Based Object Tracking For Improving Localization, Rashid Mehmood, Muhammad Usman Ali, Imtiaz A. Taj

International Conference on Information and Communication Technologies

In recent studies kernel based object tracking (KBOT) using Bhattacharya coefficient as similarity measure is shown to be robust and efficient object tracking technique. Image histogram provides a compact summarization of the distribution of data in an image. Due to computational efficiency; histogram has been successfully applied in KBOT based tracking algorithms. However without spatial or shape information, similar objects of different color may be indistinguishable based solely on histogram comparisons. The application of meanshift algorithm (the core of KBOT) on 1-D low level features of histogram may converge to false local maxima and cause inaccuracy of target localization. In …


Data Mining: Implementation Of Data Mining Engine On Crm-Improve Customer Satisfaction, A. S. Al- Mudimigh, F. Saleem, Z. Ullah, F. N. Al-Aboud Aug 2009

Data Mining: Implementation Of Data Mining Engine On Crm-Improve Customer Satisfaction, A. S. Al- Mudimigh, F. Saleem, Z. Ullah, F. N. Al-Aboud

International Conference on Information and Communication Technologies

Analysis on customer relationship is reaching more practical and motivating success factor for the growth of every company, in the same way, discovery of unseen information is also supporting for the successful expansion in an organization. A customer and a company are essential to each other and their good relationship and understanding will take the company on the top as well as the customer to the satisfactory level. In this paper we presented the model of customer relationship management (CRM) to describe the association of a customer with the company and enhanced the model by connection with data mining engine …


Application Of Ict - I: Risp Design Using Tightly Coupled Reconfigurable Fpga Cores, M. Aqeel Iqbal, Uzma Saeed Awan Aug 2009

Application Of Ict - I: Risp Design Using Tightly Coupled Reconfigurable Fpga Cores, M. Aqeel Iqbal, Uzma Saeed Awan

International Conference on Information and Communication Technologies

Reconfigurable instruction set processors are the next generation processors which can adapt their instruction sets through a reconfiguration process in their hardware according to the demand of the application being under execution on them. In this way the processors adapt the hardware which is the most suitable solution for the running application and hence it accelerates the performance gain. The reconfigurable instruction set processors are programmable processors that contain the reconfigurable logic in one or more of their functional units. Among the most important design parameters are: the granularity of the reconfigurable logic, the structure of the configuration memory, the …


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Artificial Intelligence – I: Robust Audio Steganography Via Genetic Algorithm, Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, Akram M. Zeki Aug 2009

Artificial Intelligence – I: Robust Audio Steganography Via Genetic Algorithm, Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, Akram M. Zeki

International Conference on Information and Communication Technologies

Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …


The Development Of Informal Sector Small And Medium Scale Enterprises Through Formation Of Cluster And Networking: A Case Study Based On Sri Lanka And Pakistan, S.W.S.B. Dasanayaka Jul 2009

The Development Of Informal Sector Small And Medium Scale Enterprises Through Formation Of Cluster And Networking: A Case Study Based On Sri Lanka And Pakistan, S.W.S.B. Dasanayaka

Business Review

In recent years Pakistan has faced a rapidly growing services sector which has lead some observers to believe that there is a transfer of resources occurring in Pakistan from the tradable to the non-tradable sector, hence causing the Dutch Disease in the economy. However no precise response has been offered on this subject. This paper seeks to provide empirical evidence on the question of the existence of Dutch Disease in Pakistan by using Linda Kamas's model on Dutch Disease. The percentage change in the growth of the tradable and the non-tradable sectors in Pakistan is calculated by using data from …


Front Matter Of Volume 4 Number 2, Tufail A. Qureshi Jul 2009

Front Matter Of Volume 4 Number 2, Tufail A. Qureshi

Business Review

Front Matter, Contents, Editorial Perspective


Back Matter Of Volume 4 Number 2, Tufail A. Qureshi Jul 2009

Back Matter Of Volume 4 Number 2, Tufail A. Qureshi

Business Review

A word about the IBA, Note for contributors


Role Of Project Manager In Design Management, Shamas-Ur-Rehman Toor, Faisal Manzoor Arain, Rubi Lai-Chua Suat Hong Jul 2009

Role Of Project Manager In Design Management, Shamas-Ur-Rehman Toor, Faisal Manzoor Arain, Rubi Lai-Chua Suat Hong

Business Review

A project manager wears many hats including project leader, project facilitator, project mediator, project coordinator, project communicator, project promoter, project motivator and project controller. Complying with all these roles and sometimes reconciling with the competing demands of project stakeholders is not easy. Hence, for construction work, project managers must develop necessary skills to cater to the intricate and tricky situations for different construction projects. Many project managers pay a lot of focus on keeping the project on time and within budget – leaving design problems to the architect. Managing design is a challenging job which tests technical, personal, interpersonal, team …


Foreign Direct Investment And Labour Productivity In Nigeria's Manufacturing Sector, Nasiru Musa Yauri Jul 2009

Foreign Direct Investment And Labour Productivity In Nigeria's Manufacturing Sector, Nasiru Musa Yauri

Business Review

This paper investigates the relationship between Foreign Direct Investment (FDI) and labour productivity. The paper is able to clarify whether employees of foreign firms record significantly higher productivity levels than their counterparts in domestic firms in Nigeria’s manufacturing sector. Using data from the World Bank Nigerian Manufacturing Survey 2001, employing an Ordinary Least Squares (OLS) regression model run on STATA, the paper finds that employees in foreign firms exhibit higher levels of productivity than their counterparts in domestic manufacturing firms. On the basis of this finding, the paper speculates on whether the differential is as a result of better training …


The Impact Of Manager's Orientation On The Job Satisfaction Of Their Subordinates, Sarwat Sultan, Afia Hanif Jul 2009

The Impact Of Manager's Orientation On The Job Satisfaction Of Their Subordinates, Sarwat Sultan, Afia Hanif

Business Review

The present research was designed to explore the impact of manager’s orientation on the job satisfaction of their subordinates. The sample consisted of 120 employees; 20 managers and 100 of their subordinates ranging in age from 23 to 54 taken from different organizations of Multan. Motivator’s Orientation Questionnaire (Deci, Connell, & Ryan 1989) and Job Satisfaction Questionnaire (Hackman & Oldham, 1975) were used to collect the information. Results indicated that subordinates working under autonomy oriented managers are more satisfied with their jobs as compared to the subordinates working under controlled oriented managers. Findings pertaining to gender differences suggested that female …


Call For Papers: International Conference On Management And Valuation Of Intangibles Icmvi 2009, Prof. R. C. Sobti Jul 2009

Call For Papers: International Conference On Management And Valuation Of Intangibles Icmvi 2009, Prof. R. C. Sobti

Business Review

December 22-23, 2009

Venue: Panjab University, Chandigarh-160014 India

Organized by: University Business School Panjab University Chandigarh India


Factors Affecting Business Success Of Small And Medium Enterprises (Smes) In Bangladesh, Muhammad Aminul Islam, Ejaz Ahmad Mian, Muhammad Hasmat Ali Jan 2009

Factors Affecting Business Success Of Small And Medium Enterprises (Smes) In Bangladesh, Muhammad Aminul Islam, Ejaz Ahmad Mian, Muhammad Hasmat Ali

Business Review

The concepts of cluster and networking emerged in 1960s in Small and Medium Scale Enterprises (SMEs) literature but the formation of SME clusters and networking is a very new strategy for Sri Lanka started in 2001 and Pakistan started in 2003. But it shows some positive sign of growth by increasing competitiveness of SMEs by opening-up new opportunities due to good innovative networking, common facility usage and collective efficiency of economies of scale, scopes and synergies, etc. The problem of many SMEs in both countries is not their size, but being isolated and working in enclave nature, therefore SMEs individually …


Total Quality Management And Hoshin Kanri For Construction Organizations, Low Sui Pheng, Liu Jun Ying, Amos Cheong Jan 2009

Total Quality Management And Hoshin Kanri For Construction Organizations, Low Sui Pheng, Liu Jun Ying, Amos Cheong

Business Review

Quality trends in construction projects have advanced from quality assurance to quality management under the ISO 9000 standards. Having achieved ISO 9000 certification and established a systematic approach to operations, the journey towards Total Quality Management (TQM) seems to weigh significantly on the ability of an organization to translate, integrate and institutionalize TQM behaviour into its business culture. More importantly, there is a need for organizational-wide management and a need to provide alignment of processes and people in the TQM environment. The Japanese concept of Hoshin Kanri, a form of policy management which prescribes a participative way of quality management, …


Back Matter Of Volume 4 Number 1, Tufail A. Qureshi Jan 2009

Back Matter Of Volume 4 Number 1, Tufail A. Qureshi

Business Review

Call for Papers: the Third International Conference on Information and Communication Technologies (ICICT'09) August 15-16, 2009, A word about the IBA, About our Authors, Back Matter


Asian Financial Crisis 1997: An Empirical Investigation, Khurshid M. Kiani Jan 2009

Asian Financial Crisis 1997: An Empirical Investigation, Khurshid M. Kiani

Business Review

Multinomial Asian Financial Crises are said to happen because of financial mismanagement due to post Bretton Woods era financial liberalization, enhancement in private sector debt, currency crises, investor panic as well as inept attitude of the governments in these countries after start of the crises. Since Taiwan is the only country that was not hit as hard as the other countries in the region due to the brunt of these crises we decided to analyze its firm structure to unfold the causes of its survival. Our analysis reveal evidence that manager operated firms finances their growth through external finance without …


Front Matter, Contents And Editorial Perspective, Tufail A. Qureshi Jan 2009

Front Matter, Contents And Editorial Perspective, Tufail A. Qureshi

Business Review

.


Foreign Direct Investment (Fdi) - Destination India, Muhammad Shakil Khan Jan 2009

Foreign Direct Investment (Fdi) - Destination India, Muhammad Shakil Khan

Business Review

Foreign Direct Investment (FDI) is becoming more and more revolutionary and happening phenomenon across the globe. The FDI is giving new hope and height to the economy of the nations across the frontiers of the countries. It is adding extra pace of economic growth and sustainability in terms of capital, human skills, machineries and equipment. FDI is not only enriching the Balance of Payments (BOP) but at the same time helping the nations in establishing the social bonds with other nations. The recent approval made on March7’2008 by the Ministry of Finance, Govt. of India, clearing 18 FDI proposals worth …


Customer Perception Of The Commercial Banks’ Services In Kano Metropolis, Ahmed Audu Maiyaki Jan 2009

Customer Perception Of The Commercial Banks’ Services In Kano Metropolis, Ahmed Audu Maiyaki

Business Review

It is a general belief that business is changing and will continue to change the way we work and live in the twenty- first century. For instance, technology shrinks time and space, customers can be anywhere in the globe and they can transact business at anytime of the day. The business environment in the present time is practically undergoing a major revolution in the way customers buy, shop, and decide to come back or to take their business elsewhere. Companies are increasingly realising that the balance of power is shifting from sellers to buyers. The customers need exactly what they …