Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Engineering
User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane
User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane
African Conference on Information Systems and Technology
Users belonging to different countries have different exposure and perception to trust the technology to adopt it. Users’ trust and adoption rates are challenging issues in mobile financial services. Thus, the purpose of the research is how to design a trustful user interface. Market research is conducted to collect data. Using the data, personas and use cases developed. The result of personas and use cases used to develop prototypes. Prototype A and B designed differently to give choice to users to investigate users' trust. Prototype A is designed to make it easy to use and clear workflow. Whereas prototype B …
Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke
Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke
African Conference on Information Systems and Technology
The development of websites and portals are main components of the e-Government strategy implementations for the last nine years in Ethiopia. However, services optimizations with usability and accessibility are key issues of Ethiopia e-Government services development.
Therefore, the ultimate goal of this study is creation of usable, accessible and sustainable Ethiopian eGovernment websites with four stage of research analysis, through proposed model. The investigations results are used to provide a clear picture of what needs to be improves from management and user point of views and also from other stakeholders of e-Government services. This study applies mixed methods of data …
A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, Sisay Yemata
A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, Sisay Yemata
African Conference on Information Systems and Technology
Several models recently have been addressed in software engineering for requirements transformation. However, such transformation models have encountered many problems due to the nature of requirements. In the classical transformation modeling, some requirements are discovered to be missing or erroneous at later stages, in addition to major assumptions that may affect the quality of the software. This has created a crucial need for new approaches to requirements transformation. In this paper, a comprehensive study is presented in the main modern models of linking requirements to software architectures. An extensive evaluation is conducted to investigate the capabilities of such modern models …
Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw
Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw
African Conference on Information Systems and Technology
The industry 4.0 will bring reflective changes to our society, including an important digital shift in the manufacturing sector. At present, several manufacturing firms are trying to adopt the practices of industry 4.0 throughout their supply chain. The Fourth Industrial Revolution and the artificial intelligence at its core are fundamentally changing the way we live, work and interact as citizens. The complexity of this transformation may look overwhelming and to many threatening. Recently, the dramatic growth of new generation information technologies has prompted several countries to seek new strategies for industrial revolution. The globalization and the competitiveness are forcing companies …
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
African Conference on Information Systems and Technology
Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …