International Journal of Information Technology and Management (44 papers in press)
Study of Repeated E-government Project Audit Based on Text Mining
by YanHong Chen
Abstract: In recent years a large amount of unstructured text data is produced in the auditing field. In order to obtain the abundant potential knowledge and auditing trails, researchers pay more attention to the text mining technology. In this paper, we first introduce the basic concepts and application of text mining. Then, we use TF-IDF method to model text documents as term frequency vectors, and compute similarity between text documents by using cosine similarity. The results of experiment in the repeated E-government project audit shows the analysis method of text achieved a relatively good accuracy.
Keywords: texting mining; project audit; TF-IDF; repeated project; E-government.
Research on book shopping website interface based on the eye tracker
by Hongxia Li, dandan che, xiaofang yuan, yan li
Abstract: This study aims to analyze the behavior of consumers when they buy books online, and analyze the law of their scanning of the products and their focus when they check the information. In the experiment, 20 subjects must follow the instruction to complete two specific tasks, and the eye tracker recorded their eyes movement data automatically. According to the heat map, researchers divided the area of interest (AOI) which got the attention of subjects and analyzed the data in the AOI. Combined with the interview and analysis, they found that: a) The customers tend to view pages following an F pattern: attention is largely focused on the upper and left part; b) The upper part of webpage is more attractive than the lower part; c)In terms of text, Dangdang.com is more attractive than Amazon because Amazon has a cluttered text typography; d)Consumers like to check the goods information and the comments of the goods when they choose them. e) Dangdang.coms operation is simpler than Amazon when they are completing the order.
Keywords: Book shopping website; Electronic commerce; Eye-tracking; Tobii T60XL; Interface design;
Case Study on Estimating the Financial Impact of IT Process Alignment
by Eunil Park, Jay Ohm, Sang Jib Kwon
Abstract: The current study is designed to be used as supplementary material for potential professionals in the area of IT process alignment. This study deals with automation of trouble ticketing system. With this new technology, the company needs to properly align their IT processes with investment model and automation. The proper alignment will bring about dramatic improvements in their business performance. This case study walks through the major components in estimating the financial impact of IT process alignment.
Keywords: IT Process; trouble ticketing system; IT consulting.
Challenges of Software Developers: The Namibian Government Experience
by Monica Nehemia-Maletzky, Tiko Iyamu
Abstract: The Namibian government has recognized the importance of ICT, as one of the critical contributing sector to the development of digital factors, especially with regards to the digital economy. Explicit activities through the National Development Program (NDP) were developed to spearhead the development of the ICT sector. Software development is recognized to be the critical resource behind the development of an ICT sector. Almost 15 years after the NDP was initiated, the government of Namibia is still outsourcing most of its software development to companies from Germany, India, USA and South Africa. This is considered by the general populace of the country to have negative impact on the economy, as well as skill and knowledge transfer. This research, through multiple case studies, examined and discusses the impact of lack of in-house software development experts in the country. The Namibian government institutions which include Serve Agency, Populace Agency, Department of Natural resource and Department of International Affairs were used as cases in the study.
Keywords: Software; Development; Organisation; Skill.
Research on Key Techniques of Cryptographic Access Control and Properties Optimization in Cloud Storage
by Shidong Zhu, Liu Jiang, Zhenliu Zhou
Abstract: With the analysis of data privacy protection requirement from the users, we proposed cryptographic access control scheme and key distribution scheme based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption), and gave a hierarchy based on CP-ABE key generation algorithm. This scheme uses precise identity and hierarchal structure as the user attributes, and supports hierarchal key generation. As the cloud data are encrypted by the users, the data privacy protection can be effectively achieved in cloud storage against network attackers even if CSP (Cloud Service Provider), suitable for the multi-user who have hierarchal structure attributes sharing cloud storage services environment. We also proposed two schemes for improving the usability of cloud storage system. The first one is that the metadata information of unstructured data are stored in cloud using non-relational database MongoDB, which can greatly improve the speed of data access. The second is data migration algorithm based on physical volume, which can migrate data to the matching devices automatically depending on user access frequency value. Experimental results showed that these programs were able to improve the storage efficiency of cloud storage system. The study is of theoretical significance and practical value to the similar systems.
Keywords: cloud storage; storage virtualization; unstructured data storage; cryptographic access control; Key generation; data privacy protection; Ciphertext-Policy Attribute-Based Encryption; data migration.
Informal interactive Bring-Your-Own-Device Strategizing Practices of South African Small and Medium Enterprises
by Salah Kabanda
Abstract: The purpose of this study is twofold: firstly, to identify factors affecting BYOD adoption in South African SMEs and secondly understand strategies SMEs engage in with regards to BYOD. Following an interpretive approach, and interviews as a means of data collection; the findings show that SMEs are consciously aware of BYOD but are not eager to formalise their strategy. Instead, SMEs engage in informal interactive strategizing despite their concerns of cost, security and privacy. SMEs did not view BYOD as a cost saving approach but rather as a double end sword that brought privacy and security concerns; unintended consequence; and no improvement in productivity. Further findings show how SMEs, specifically employees advocated the need for a policy prescribing how mobile devices should be used and in so doing perpetuating the interactive strategizing. External factors such as changing laws and regulation were perceived as barriers towards a formalised BYOD strategy.
Keywords: BYOD; strategy; SME; developing countries; adoption.
Establishment for Service Quality Evaluation Index System of Mobile E-commerce
by Liping Liu
Abstract: With the rapid development of mobile e-commerce, more and more importance has been attached by the users to the level of service quality of mobile e-commerce. Accurate settings of the evaluation indexes of the mobile e-commerce services quality is able to better measure and improve the service quality of mobile e-commerce. Based on PZBs SERVQUAL and in combination with the characteristics of mobile e-commerce, the paper constructs evaluation index system of mobile e-commerce service quality, consisting of such six dimensions as tangible, reliability, responsiveness, mobile situationality, safety and remedy. Through the questionnaire survey, SPSS and AMOS software are used to conduct construction validity analysis, reliability analysis, confirmatory factor analysis and other empirical analysis. Results showed that it was reasonable to change six dimensions in the initial scale to five dimensions: safety, responsiveness, tangible, mobile situationality and reliability. The main characteristics of the paper are as follows: first, a dimension mobile situationality corresponding to mobile business feature is added based on the original SERVQUAL model. The mobile business feature is also heighted in other detailed indicators; second, the questionnaire method is used to conduct empirical analysis on the constructed evaluation index system, so as to ensure its reliability and validity.
Keywords: mobile e-commerce; service quality; evaluation index; SERVQUAL; tangible; reliability; responsiveness; mobile situationality; safety; remedy Introduction.
COLLLABORATION ENVIRONEMNTS FOR SMALL AND MEDIUM-SIZED ARCHITECTURE, ENGINEERING AND CONSTRUCTION ENTERPRISES: SUCCESS FACTORS IN IMPLEMENTATION
by Aisha Abuelmaatti, Vian Ahmed
Abstract: It is widely recognised that collaboration in the Architecture, Engineering and Construction (AEC) sector increases productivity, improves quality, competitiveness and profitability. This poses the problem of what are the most appropriate collaboration methods available to accommodate unique work settings and virtual organisation like modus operandi. With Building Information Modelling (BIM) being imposed by the UK government on AEC projects, the development of new technology for collaboration purposes is one solution to this problem. Unfortunately information technologies have failed in productivity growth despite previous governments attempts, most famously, with the 2004 Latham and 2008 Egan reports. BIM is not about a specific technology, but ensuring the whole-sector adoption is fundamental. In fact, many Small and Medium Enterprises (SMEs) within the sector would like to be implementing BIM not only for the business productivity, but also to not get left behind. It is, however, commonly observed that SMEs have fewer chances to get it right and so they need guidance. Debate over whether or not to use BIM has become almost irrelevant. Instead, the question raised is how collaborative technologies promote collaborative working between large companies and SMEs in the AEC sector to increase productivity and improve quality to meet the high collaboration demands?
Against this background,several approaches from the literature were reviewed. This led to identifying the key elements to focus on during the collaborative technologies implementation to enhance successful collaboration. A qualitative study of fourteen cases was developed in order to map the current practice of the collaborative technologies implementations and their success level in the AEC sector. The case studies revealed a number of factors affecting the success of collaborative technologies implementations. These factors were affecting the collaboration at the organisation level. This also led to further investigation of the factors affecting the collaboration at the end-user level. The quantitative study of a survey returned by sixty four respondents was guided by the list of elements proposed by the review developed from the literature. The results suggested that the success of collaborative technologies depends on 23 factors. This research concluded that, collaborative technologies are effective methods to support collaboration within the AEC and meet the demands of the sector, when strategically implemented, underlined by a set of factors. Recommendation emerged from these findings are used to suggest a path for SMEs to implement BIM into AEC, so that they are better prepared for the future ways of working.
Keywords: SMEs; AEC sector; Information Technology (IT); Organisation Readiness and Maturity; Collaborative Working; Factor Analysis.
Hadoop Ecosystem As Enterprise Big Data Platform: Perspectives and Practices
by Sourav Mazumder, Subhankar Dhar
Abstract: Innovation in Hadoop and other related Big Data technologies in last few years brings on to the table a lot of promises around better management of enterprise data at much lesser cost but with high value business benefits. However, managing Big Data environment at enterprise level can be an involved task both from the perspectives of cost and operation complexities. Supporting various types of enterprise data use cases with different workload patterns in the same cluster, minimizing the data movement in and out of cluster, assuring different Service Level Agreements (SLAs) across various use cases and user groups, ensuring data lineage and veracity, security and data privacy are some of the key challenges every enterprise is trying to address in their individual stage of establishing Enterprise Big Data Platform.
In this paper, we propose to delve into some of the challenges from practitioners perspective based on lessons learnt from various Big Data implementation scenarios. We also aim to discuss the emerging concept of Hadoop Ecosystem as Big Data platform to address these challenges with a holistic proposition. We also discuss the other technologies outside Hadoop Ecosystem which can be also potentially used to realize the patterns of Big Data platform. Finally, we also provide a prescriptive approachbased on the best practices which can help moving towards the vision of Enterprise Big Data Platform using Hadoop Ecosystem balancing between the short term objectives and the long term goals of managing and maintaining Enterprise Big Data Platform. Hence this work will be beneficial to industry experts and practitioners for managing enterprise Big Data environment.
Keywords: Business analytics; Big Data; Data Mining; Map Reduce; Hadoop; Spark; Tachyon; NoSQL.
Factors Affecting Diffusion and Adoption of Information and Communication Technology Among Rural Users in Khyber Pakhtunkhwa Province, Pakistan
by Zahid Latif, Wang Lei, Zulfiqar Hussain Pathan, Sikander Hussain, Kaleem Khan
Abstract: Information and Communication Technology (ICT) is increasingly recognized as an important driver for economic growth, innovation, employment and productivity, and is widely attributed as the foremost pillar for the development of any country. In the present globalized era, the accessibility of ICT to rural areas is a core challenge that needs to be addressed. Implementation of ICT technology is more likely to improve technical advancements and revenue generation of overall service sector of a country. The purpose of this study is to investigate and categorize the factors influencing diffusion and adoption of ICT in the rural areas of Pakistan. The research deals principally with common people of the rural areas of Khyber Pakhtunkhwa Province for adoption of ICT in their daily life. The sample size encountered was 330 respondents, who were selected through random sampling technique. Primary data was collected from people belonging to different races of life throughout the province. The results of the study were calculated by using Confirmatory Factor Analysis (CFA) and Structural Equation Modeling (SEM) techniques, which show that the overall ICT diffusion and adoption is profoundly influenced by seven factors, including social, political, environmental, regulatory, technological, economic and legal. The study confirms a most significant impact of social and political factors upon ICT diffusion, whereas the remaining factors seem to have a moderate impact.
Keywords: ICT diffusion; Confirmatory Factor Analysis(CFA); Gross Domestic Product (GDP); Khyber Pakhtunkhwa; Pakistan.
Finding Linkage between Sustainability Science and Complex Networks
by Katsuhide Fujita
Abstract: Sustainability science has been widely accepted worldwide as an important research field worldwide. Since it is widespread in many research fields such as environmental science and engineering, architecture, materials science, and civil engineering, it is important to discover the hidden connections between sustainability science and other academic fields. For this purpose, supporting tools are necessary.
This paper investigates the relationship between sustainability science and complex networks on the basis of citation network analysis using large datasets of academic papers. First, citation networks are generated on the basis of academic paper datasets and clustered to understand the research fields of sustainability science and complex networks. Next, we measure the textual similarities among the clusters in these fields and analyze the shared terms to find the overlapping research areas that connect the two fields. These results offer overviews of how complex networks contribute to sustainability science and assist the formation of policies that promote key results in artificial intelligence toward future sustainable societies.
Keywords: Citation Networks; Sustainability Science; Complex Networks.
Top Management Support and Information Systems Implementation Success: A Meta-Analytical Replication
by Mark Hwang
Abstract: Factors that contribute to the success or failure of Information systems implementation have received extensive attention in the literature. Top management support is considered one of the most, if not the most, critical factors for implementation success. However, the positive effect of top management support is not always borne out in empirical data, prompting a quest for moderator variables. A classic meta-analysis shows that the effect of top management support on implementation success is moderated by task interdependence, a claim refuted in several more recent meta-analyses. Drawing from the lessons learned from these meta-analyses, the current research reanalyzed the top management support literature with a larger sample while controlling for the effect of common method variance and systems success measurement issues. The results reaffirm the significant and substantial effect of top management support on systems success. At the same time, evidence also supports the moderating role of task interdependence, common method variance, and how systems success is measured. Implications for systems implementation are discussed.
Keywords: top management support; task interdependence; IS implementation; IT project; meta-analysis; common method variance.
User Engagement in Social Media- Empirical Results from Facebook
by Rupak Rauniar, Greg , Ronald Salazar, Donald Hudson
Abstract: Theory building and better understanding of user engagement behavior is fundamental to developing future approaches and effective organizational deployment of social media technologies. Based on the Theory of Reasoned Action (TRA), predictors of intention to engage on social media sites were empirically examined with 389 users of Facebook - the most popular online social media site. Our results suggest that perceived value, social presence, interactivity, and trustworthiness are positively related to the users attitude towards social media. The research model shows promise for use by managers and organizations to predict and understand the usage of social media in a target population.
Keywords: Queueing; Reward-cost structure; Extensive form game; Behavioral
strategy; Nash equilibrium.
From social capital to continuous use of social networking sites: a conceptualisation
by Rui Chen, Sushil K. Sharma, H. Raghav Rao
Abstract: Site use is important to the sustainability of social networking sites. In this paper, we explore the drivers of member site use through the theoretical lens of social capital theory. Drawing upon supporting literature, we contend that social capital acts as an important factor in motivating members to continue their site usage. Specifically, we expect cognitive, structural, and relational capital to jointly contribute to one's use activity. In addition, we investigate the intricate relationships among the three capital acts and suggest that cognitive and relational capital will strengthen (i.e., positive moderation) the relationship between structural capital and member site use. This article contributes to the literature on social networking sites by developing a theoretical framework that helps explain user behaviour. The study also sheds light on social capital research by advocating the potential value of social capital theory in social networking research and theorising the mutual relationships among distinct social capitals.
Keywords: social networking site; SNS; social capital theory; SCT; site use; main effect; interaction effect; conceptual model.
Exploring the benefits of cloud services and accountability tools from a competitiveness and return on investment perspective
by Sindre Høyland, Janne Merete Hagen, Ruth Østgaard Skotnes
Abstract: There are a number of challenges involved in using cloud services, such as privacy, control of data and compromised networks. The EU-project A4Cloud arose from an interest in mitigating these challenges through the development of tools for holding service providers accountable for handling of data. As part of the A4Cloud project, we applied a case study approach to explore cloud services and accountability tools among enterprise users and authorities in Norway. Our findings suggest that potential competitiveness and return on investment lie in an integrated cloud and accountability tools solution that can improve service dependability and alleviate pressing security concerns, improve competitiveness, and achieve cost reductions while representing a flexible, on-demand, and pay-per-use asset for effectively generating revenues. Therefore, return on investment is found in the synergy between the cloud and accountability tools, where the security mitigation potential of the tools plays an integral part.
Keywords: cloud services; accountability tools; economic theories; case study; content analysis.
References-based search methodology for assuring acceptable quality of a query research article
by Ranjeet Kumar, Ramesh Chandra Tripathi
Abstract: It has been noted many a times that some new author(s) cite irrelevant references in their research article and at the same time skip the most genuine references having a bearing on the subject matter. In the growing academic research publications, assessing therefore the relevancy of references cited in a research document becomes a major concern in the current internet age. At the same time some of the research articles published in the conferences-proceedings are found to have some contents questionable in terms of copyrights. In the present paper, development of a references-based tool for first hand assuring acceptable quality of a query research article simply-based on references is described subject to the reach of the repository used. The tool also reports the relevancy check-up of the references in the query research article so as to make the references compact and also check plagiarism on self created repository of most likely research articles as the resources.
Keywords: references-based search; citation relevancy; textual plagiarism; content similarity.
Internet thinking of the traditional enterprise - taking Su Ning as an example
by Dan Chang, Jiawei Song
Abstract: In the internet age, people's daily life has been changed with the application of the internet. Internet has penetrated into all aspects of people's lives and it has subverted people's traditional conception of thinking. The internet enterprises gradually invade the core business of the traditional industries with its powerful potentials in resource integration and advanced business model. Many companies begin to make the transition with the help of the internet. Starting from the nature of the internet, this paper summaries seven kinds of internet thinking and put forward the business model under internet thinking. Finally, this paper analyses on the case of Su Ning's transformation to make some reference significance for actual practice.
Keywords: internet thinking; enterprise model; business model; Su Ning.
Information industry security: an industry convergence point of view
by Xiaolan Guan, Menggang Li
Abstract: There is a close relationship between industry convergence and information industry security, so we can study theoretically by combining the industry convergence and information industry security. In this paper, by using the theory and methods of industry convergence, industry security and ecology, we analysed the mechanism of information industry security from the perspective of industry convergence deeply, and constructed a model to analyse on the basis of logistic model. Then we took the integration of informatisation and industrialisation of China as an example to do the empirical research, and provided a range of effective policy recommendations about how to enhance the information industry security.
Keywords: information industry security; industry convergence; logistic model; convergence of informatisation and industrialisation.
Network dynamics in friend recommendation: a study of Indian engineering students
by Pradip Swarnakar, Ajay Kumar, Himanshu Tyagi
Abstract: Social networks are the frequently used service which over the past few years, have grown by leaps and bounds. In this study, a survey of engineering students has been conducted to find out the most relevant socio-demographic and webographic factors that are considered by users while sending/accepting friend requests. An extensive survey has been conducted and the responses were used to determine the influence of various factors in friend request attributes. Based on the collected responses, logistic regression and artificial neural network models have been developed for predicting the users' friend request attributes. A comparative performance analysis of these models to predict the friend request attributes has also been done. The results indicate that neural network model outperformed the logistic regression model when data are nonlinear. The study also shows that among all the factors, users' gender, photographs, hometown, age, and shared interests are the most significant factors.
Keywords: social networks; Facebook; user perception of friendship; logistic regression; artificial neural network; ANN.
Using cognitive radio scheme for big data traffic management in cellular systems
by Jamal Raiyn
Abstract: This paper introduces the use of the cognitive radio in the cellular system. Cognitive radio Approach aims to manage the traffic flow in dynamic systems. The cognitive radio is a self-aware communication system that efficiently uses spectrum in an intelligent way. The cognitive radio scheme offers several features like autonomy, negotiation and sensing. The use of cognitive radio gives greater autonomy to the base stations. This autonomy allows an increase in flexibility to deal with new situations in the traffic load. The negotiation is used to avoid conflict in the resource allocation. The proposed algorithm is very successful for two reasons. The cognitive radio handles the handoff problem that reduces the handoff blocking rate. The reduction of the call blocking rate in cellular networks will increase the accuracy and the reliability of the forecast model. A number of spectrum sensing techniques have been proposed. A spectrum scheme uses received signals to detect channel states. To improve the performance of spectrum sensing scheme new technique will be added to spectrum scheme. The new technique is channel states forecasting based on quality of experience.
Keywords: cognitive radio; cellular system; forecast scheme.
Special Issue on: ICSS 2015 Services Computing Technologies and Applications
Threefold similarity analysis
A case study on crowdsourcing feeds
by Kaixu Liu, Gianmario Motta
Abstract: Crowdsourcing is a valuable social sensing for the smarter city. We present
a framework of crowdsourcing feeds similarity analysis from a threefold point of view, namely image, text, and geography, which is based on similarity analysis, founded on a sequence that goes from coarse to thinner similarity filters. The main idea is to extract feeds within a specific geographic range, and then to analyze similarity of image color and text in clustered feed sets. The framework enables to identify feeds that report the same issue, and hence to filter redundant information. Based on proved methods and algorithms, such framework has been implemented in a software application, called CITY FEED, which is used by the Municipality of Pavia.
Keywords: Crowdsourcing, Smart city, Image similarity analysis, Text similarity analysis.
Needle in a Haystack: An Empirical Study on Mining Tags from Flickr User Comments
by Haijun Zhang, Jingxuan Li, Bin Luo, Yan Li
Abstract: In the Web2.0 era, user generated content has become the main source of information of many popular photo-sharing websites such as Flickr. In Flickr, many photos have very few or even no tags, because only the uploader can mark tags for a photo. Meanwhile, the user can deliver his/her comment on the photo, which he/she is browsing. Therefore, it is possible to recommend new tags or enrich the existing tag set based on user comments. The work of this paper contains two phases, i.e. the tag generation, and the ranking algorithm. In the phase of candidate tags generation, two methods are introduced relying on Natural Language Processing (NLP) techniques, namelyword-based and phrase-based. In ranking and recommending tags, we proposed an algorithm by jointly modeling the location information of candidate tags, statistical information of candidate tags and semantic similarity between candidate tags. Extensive experimental results demonstrate the effectiveness of our method.
Keywords: tag recommendation; user comment; Flickr; image annotation
SGP: A Social Network Sampling Method Based on Graph Partition
by Xiaolin Du, Yunming Ye, Yan Li, Yueping Li
Abstract: A representative sample of a social network is essential for many Internet services that rely on accurate analysis. A good sampling method for social network should be able to generate small sample network with similar structures and distributions as its original network. In this paper, a sampling algorithm based on graph partition, SGP (Sampling based on Graph Partition), is proposed to sample social networks. SGP firstly partitions the original network into several subnetworks, and then samples in each subnetwork evenly. This procedure enables SGP to effectively maintain the topological similarity and community structure similarity between the sampled network and its original network. Finally, we evaluate SGP on several well-known data sets. The experimental results show that SGP method outperforms seven state-of-the-art methods.
Keywords: sampling algorithms; social networks; graph partition; community structure; topology structure.
Special Issue on: Next Generation of Social Computing for Computational Collective Intelligence
Immersive element analysis of the multiplayer online battle arena game genre
by Gilsang Yoo, Jaebum Jung, Jaechun Ryu, Jeahong Kim, Kichun Nam
Abstract: The game industry is the total entertainment industry, which includes its entertainingness and popularity and the future planning industry, which allows to create added value with its neighboring industry. The main purpose of these game development is improving its competitiveness by making satisfied product for users. To make competitiveness game product, it is needed to classify the interested elements and analyze flow elements correctly. In this study, we deducted the content elements from the Multiplayer Online Battle Arena (MOBA) game genre and quantified the importance of subdivided elements of focus group interview and semi-Delphi. Play theory based MOBAs flow elements is analyzed by the quantified value of subdivided elements. By this, we propose the developmental direction about interested elements of the MOBA game genre. This study result can be used for contents satisfaction of MOBA game genre and flow evaluation system.
Keywords: Flow, Game immersive, Game design, Play theory, Multiplayer Online Battle Arena
Texture Analysis Based Feature Extraction Using Gabor Filter and SVD for Reliable Fault diagnosis of an Induction Motor
by Rashedul Islam, Jia Uddin, Jong-Myon Kim
Abstract: This paper presents a texture analysis based feature extraction method using a Gabor filter and singular value decomposition (SVD) for reliable fault diagnosis of an induction motor. This method first converts 1D vibration signal to 2D image pixels to create a 2D grey-level texture image for each fault signal. Then, the 2D Gabor filter with optimal frequency and orientation values is used to extract a filtered image with distinctive texture information, and SVD is utilized to decompose the Gabor filtered image and select finer singular values of SVD as discriminative features for multi-fault diagnosis. Finally, one-against-all multiclass support vector machines (OAA-MCSVMs) is used as a classifier. In this study, multiple induction motor faults with different noisy conditions are used to validate this proposed fault diagnosis methodology. Experimental result indicates that the proposed method achieves an average classification accuracy of 99.86% and outperforms conventional fault diagnosis algorithms in the fault classification accuracy.
Keywords: induction motor; texture analysis; discriminative features; Gabor filter; singular valued decomposition
An Introduction to Face-Recognition Methods and its Implementation in Social Software Applications
by Kang-Hee Lee, Byoung-Moo Kwon
Abstract: Face detection and recognition technology has shown a steep development in the field of scientific research and is subsequently harvesting growing interest from the industry, which in fact can be confirmed seeing numerous implementations in forms of socially interactive applications such as autofocus in digital cameras, human computer interfaces in smartphones, or even video surveillance cameras in airports. In response to this growing interest and willingness to implement this technology of face detection and face recognition technology, this paper will provide the readers with fundamental knowledge of how face detection essentially works and ought to help the readers to establish a foothold in developing own ideas using face detection technology. The main purpose of this research paper is to introduce several significant principles of current face-detecting methods such as active shape model(ASM), active appearance model(AAM) and constrained local models(CLM) in a comprehensive manner and to provide some insight on closely related topics such as principal component analysis and eigenfaces. In this paper we will also present selected examples of implementations of above mentioned face-detecting methods via open-source software applications such as ofxFacetracker and FaceSubstitution with openFrameworks.
Keywords: Face Recognition, Active Shape Model(ASM), Active Appearance Model(AAM), Constrained Local Model(CLM
Shadow Detection using Chromaticity and Entropy in colour image
by Ki-Hong Park, Jae-Ho Kim, Yoon-Ho Kim
Abstract: Shadows in image often bring a significant problem which can cause unintended negative outcome, so how to detect shadow is an important issue of computer vision tasks. This paper proposed a method to detect shadows from real images. Due to shadows in image have a dark pixel values, shadow candidates are defined. Shadow candidates have been estimated and detected by chromaticity of colour image and threshold image using entropy. Some experiments are conducted so as to verify the proposed method, and results show that the proposed method can detect shadows in colour image.
Keywords: shadow detection; shadow candidates; chromaticity; entropy; single image; minimum cross entropy; maximum entropy; colour distribution; colour model; colour histogram.
The Investigation of Relationships: Self-esteem, Self-confidence, and Conduct Problems in Counseling
by Mila Park
Abstract: The purpose of this study was to investigate the relationship between self-esteem self-confidence, and conduct problems. It demonstrated that the correlation of self-esteem and self-confidence was not significantly related to the children and adolescents' conduct problems. Also, there is no direct relationship between self-confidence and parents couple intimacy. However, self-esteem and parents' couple intimacy were significantly related, indicating that self-esteem and self-confidence are different. As demonstrated by Hypotheses, the relationship of self-esteem and self-confidence is significant. In particular, self-esteem is more significant than self-confidence in this study. The relationship of self-esteem and parents' couple intimacy, and self-esteem and self-confidence, were accepted. It indicated that self-esteem and self-confidence are very similar but they have different ripple effects. This study aims to examine coping conduct problems, self-confidence, and self-esteem of students in Korea. Results of the study also gave information about the general information relating to the self-esteem of 1st to 12th grade students. The results produced evidence for the obvious correlations between coping behaviors, and self-esteem as well. This data will help counselors and educators recognize their students difficulties when they practice in counseling settings and identify how to help students use their counseling more proficiently.
Keywords: Self-esteem, Self-confidence, Conduct(behavioral) problems, Parents’ couple intimacy, HTP drawing test, Adolescents, Children, Counseling, Education, Family relationship, parenting.
User Interface Using Bounce for Realistic Movement on Smart TV
by Daehyun Ryu
Abstract: In this research, we designed the various movements on the screen based on a touch pad of smart TV. Due to increment of smart TV, diverse interfaces are applied on the screen and movement is the crucial part of the interfaces. However, the screen is comprised of pattern as a button, the availability of new interface is less effected for users. Therefore, it is necessary to research new screen composition to escape the existing one. rnThe plan of this research is to expect the appropriate screen of smart TV, we analyze related research and give a change of movement. This screen layout suggests new directional properties such as moving the position where we want with simple gesture. Moreover, we found the fact in this research that less change from movement of many objects is showed that compared with existing movement. rnThe result of this research, it is possible to show motion of various effects and two-dimensional movement better than existing one-dimensional movement. So, we enhanced motion naturally and degree of freedom. rnThis research suggests matched motion for the applicable interface on the screen composition of smart TV from now on, so that we expect compatible development for the future UI environment of screen.rn
Keywords: Smart TV; UI; Bounce; touch pad; realistic;
Analysis of Serious Games for Preventing Internet Gaming Addiction
by Ji-Yun Kim, Jae Hwan Bae
Abstract: Internet Addiction and Internet Gaming(Game) Addiction are two terms regularly used in our daily lives, however, their distinction is rather vague. Internet Gaming Addition refers to a psychological, emotional, and social state where one, due to increased tolerance and dependence to games and other reasons, loses control over and plays internet games excessively and compulsively, and any efforts to reduce or stop playing will be ensued by withdrawal symptoms. One means to better the problems caused by Gaming Addiction is development of a variety of Serious Games and related services. Whereas Internet games are played for entertainment, Serious Games utilize the entertainment function to further education and addition preventive measures objectives.
Keywords: Serious Game, Game Addiction Preventionrn
A Framework for Context-Aware Application Programming on Smart Phone
by BaekGyoon Sung
Abstract: The internationalization of a small mobile operator into the surrounding emerging markets is an entrepreneurial and risky process due to the target markets nature. This paper deals with market and timing factors potentially influencing the transaction costs of a company in its international ventures, which are used as transaction cost proxies, based on Gerpott and Jakopins paper Determinants of Mobile Network Operators Choice of Cross-Border Entry Modes. In addition, they are assigned as corresponding hypotheses in order to test their effect on Zain Telecoms entry mode choices. This model did not seem to explain all factors influencing the entry mode choices of Zain Telecom, since not only many hypotheses were rejected, but also they did not match with the findings of Gerpott and Jakopin for mobile operators in the Western world. Hence, in order to understand the managerial drivers in Zain Telecoms decision-making, a holistic framework MEMS (Market and Market Entry Mode Selection) model was used. This framework shed the light on many of the managerial facets of Zains strategical decision-making and answered the following question: How did target country, market, and timing factors contribute in shaping Zain Telecoms cross-border entry mode choices? Of course, for optimal and overall decision making, this research should be enriched with engineering analysis and techniques.
Keywords: Framework for context aware application, Context awareness, personalized service, Context aware system on smart phone, rule based reasoning, case based reasoning, Smartphone sensor.
A Tree Cognitive Navigation System Based on Two-dimensional Code and GPS
by Wenjie Hu, Chunling Wang, Qiaochu Mo, Bo Wang
Abstract: The recognition of trees plays an important role in the construction of ecological civilization. In order to strengthen tree information management and help the public to have a better understanding of trees, an Android-based tree cognitive navigation system for smart phones was developed. Using two-dimensional code and GPS technologies, the system can rapidly acquire geographic coordinates and species of trees. In this paper, the theory, system framework and key technologies of the system are presented. Subsequently, a tree cognitive system based on two-dimensional code and GPS was developed for Beijing Forestry University. The system implementation approach hasbroad application prospects. The case study showed that it is portable, practical, user-friendly, and network-independent and has good potential for application and expansion.
Keywords: tree; two-dimensional code; GPS; Android system; cognitive navigation
Estimating the Sentiment Strength of a Word using Word Similarity
by Kangbok Lee, Jongbum Baik, Soowon Lee
Abstract: Identifying the sentiment orientation and strength of a sentence or phrase is one of the crucial issues in opinion mining. A dictionary approach to this problem is to use the sentiment orientations and strengths for the words included in a given document unit. This paper proposes a novel method for estimating the sentiment strength of a word using similarities between a target sentiment word and sentiment words in dictionary. To calculate the word similarity, we introduce the notions of relative similarity and adjusted similarity. The experimental results from the analysis of Facebook text data demonstrate the effectiveness of the proposed method in terms of the root-mean-square-error.
Keywords: sentiment strength; word similarity; sentiment analysis; relative similarity; adjusted similarity
Game Operation Query Language (GOQL) for Facilitating Game Servers FCAPS Operation
by Hwan-Soo Yoo, Seong-Whan Kim
Abstract: Game companies require successful game operation for their revenue maximization. In an operation phase, they need not only operators who are experts in non-functional and operational issues but also developers who are experts in game development. Game server should manage several operational issues such as fault recovery, performance metering, and configuration management during game service period. However, most game server operators do not have programming expertise. To support successful FACPS (fault, accounting, configuration, performance, security) operation without programming expertise or development knowledge, we introduce DSL (domain specific language) operation approach for usual game operators. We design GOQL DSL, focusing on fault, configuration, and performance management issues. We experimented with 15 game server operators who are working in major game publishers. Experimental results show that GOQL was attractive to game operators because it is functional and does not require programming knowledge even in the situation that needs programming source modifications. For the future research, we will extend our textual version of GOQL to visual language version to give more convenience and intuitive advantage to game operators and novice developers. To cover this, we require study on visual notations, UX related elements, and visual transformation of text.
Keywords: Game; Server; Operation; FCAPS; DSL
Gaining compliance in humanrobot interaction: Korean honorific forms and gestures
by Eunji Kim, Jonathan Sangyeon Lee, Meina Cui, Namyeon Lee, Ohbyung Kwon
Abstract: Although research on social robots has increased as robots become more prevalent in everyday life, there is still a controversy as to what makes people agree to or follow instructions coming from robots during humanrobot interaction. In this paper, we propose a research model of compliance with robot guidance, examining the stages through which compliance develops and the associated stimuli, cognition, and attitude toward the consequences of complying with the guidance of a social robot. In an experiment, participants (n=36) interacted with a guidance robot exhibiting different levels of honorifics. The results demonstrate that the perceived level of politeness in robot speech and gestures is a determinant of compliance intention. The findings from this study may contribute to a better understanding of human feelings and perceptions toward social robots and the development of effective and interactive design guidelines.
Keywords: Human–Robot Interaction; Social Robot; Politeness; Compliance.
Special Issue on: LISS 2014 Data Mining Theories, Methods, and Applications
Modeling Technique of the Object-Attribute System Oriented to Data Mining
by Yaoyu Hu, Ai Wang
Abstract: The research of modeling the object-attribute system, essentially a two dimensional problem, belongs to the domain of interpretative structural modeling and it is one of the basic problems in the data mining field. Firstly, this paper proposes and demonstrates the Subsystem Judgment theorem. In order to solve the problem above, this paper puts forward an algorithm which can reduce the scale and the dimension of the original data through modeling the object-attribute system based on the object similar feature matrix (OSFM). In the last part of the paper, a numerical value example is provided to show the whole process of the method.
Keywords: ISM; Subsystem Judgment theorem; data mining; OSFM
Relationships among Customer Loyalty, Customer Satisfaction, Corporate Image and Behavioral Intention on Social Media for A Corporation
by Lv Haixia, Yu Guang, Wu Gang
Abstract: In this paper, how customer loyalty, customer satisfaction, corporate image and behavioral intention affect each other on social media and how to make the benefit maximization for corporation are explored. We leverage Natural Language Processing (NLP) techniques analysis emotion of comment and retweet in the text, and combined with the other attributes and behavior of the Weibo users who interact with the corporate account (we used the accounting data of Shanghai Peace Hotel as the study case) to research the relationships on social media. The results show that customer image has a direct impact on customer satisfaction and has an indirect impact on customer loyalty. Customer loyalty is impacted by customer satisfaction and behavior intention. Th influence of customer image on behavior intention and loyalty and the influence of customer satisfaction on behavior intention are not very significant. As the results suggest, Shanghai Peace Hotel needs to more widely publicize their corporation such as celebrity endorsement and make more interaction with his followers through a variety of marketing activities (Lv et al., 2013). The difference between the traditional media and social media is another marketing problem. Facing such challenges, businesses should reconsider their strategy regarding customer satisfaction. Whether they can keep existing consumer, or make extra efforts to anticipate, appreciate, understand, and satisfy their genuine needs and whether they can build close relationship with existing customers are the three main topics. This study provides empirical evidences to analyze the relationships and provide the reference for the corporation to make the strategic plan.
Keywords: Behavioral Intention, Corporate Image, Customer Satisfaction, Customer Loyalty, Social Media, Structural Equation
A Research on the International Competition Ability Measure of Chinese ICT Industry
by Li Hai-chao, Fan Shi-jie
Abstract: ICT industry is playing a key role nowadays and in future world economic development, and has become the focus of world economic competitions. In the process of making current empirical investigation on the international competition ability of ICT industry, we meet great difficulties. The research on the international competition ability measure of Chinese ICT industry can remedy the shortcomings of the theory research and also benefit for determining Chinese ICT status in the world, in that way we can get the access to make improvement for international competition ability of Chinese ICT industry. To further explore and discover the level of international competition ability of ICT industry in a scientific way, some famous scholars choose the evaluation index on the mixing of the ICT industry's specific characteristics. In this paper, we have selected RCA index, MS index, TC index and CA index as measuring indexes and find out the weight of these index and time sequence through advanced entropy method to measure international competition ability of Chinese ICT industry. The results show that the international competition ability of Chinese ICT industry is in the second place among 15 countries, with a higher level of international competition ability
Keywords: ICT industry; international competition ability; entropy method; measure.
Special Issue on: Advances in Technology and Management in a Global World
Enhancing BRICS integration: A Cloud-based Green Supply Chain Concept
by Saroj KOUL, Hari Narayan PERIKAMANA, Uma KUMAR, Vinod KUMAR
Abstract: Today BRICS a five nation active group represents an emerging power that aims to increase its economic integration in response to new global challenges. While many companies in the BRICS group are opening up new geographical industry clusters, changing their IT landscape, and contributing to global climate change concerns, others are not fully prepared, or ready, to do so. This study explores the applicability of mutually beneficial Cloud-based Green Supply Chain System among BRICS nations to help achieve development targets while mitigating the environmental impacts associated with rapid development and industrialization. Data on the BRICS countries trade potential and patterns is reviewed to get a sense of the movement of goods and services between the BRICS nations. Although regulatory barriers and inter-country coordination pose significant challenges for meeting the promise of BRICS trade cooperation, the adoption of new Cloud-based IT technologies, new innovations and new thinking remains an important enabling driver of GSCM and needs to be explored.
Keywords: BRICS; Green Supply Chain Management; Cloud-based system; IT technologies
The Internet of things-New Value Streams for Customers
by Ashok Wahi, Vandana Ahuja
Abstract: This manuscript traces the changes in the organizational ecosystems which will pave the way for the evolution of the Business systems for 2020 and studies the diverse applications of the Internet of Things (IoT). IoT can help companies in creating new value streams for customers, speed time to market, and respond more rapidly to customer needs. Real Time Information on Mission-Critical systems-Enterprises can capture more data about processes and products more quickly and radically improve market agility. The manuscript further proceeds to outline the varied applications which would eventually translate into long term benefits for the corporate sector with respect to creation of new business models, real time mission critical systems, diversification of revenue streams, global visibility through digital marketing and efficient, intelligent operations. While some benefits may be have greater value to the corporate sector, the others while having tremendous potential may spell out slightly lesser significance and advantage to the Commercial sector.
This study develops an Internet of Things Application Benefit Index (IABI), which reflects the composite potential of a specific Internet of Things application, in terms of its long term benefits to the corporate workspaces. This index will be useful to industries for (i) understanding how timely adoption of specific applications can translate into long term competitive advantages and (ii) Create roadmaps for maximum productivity. Some technologies merely fade away because of inflated user expectations, while some move into the Trough of Disillusionment merely because of a mismatch between perceived value and actual relevance and business benefit. This is where the IABI can help organizations in making comparisons and technology adoption.
Keywords: The Internet of Things, Business Models, Internet of Things Application Benefit Index (IABI), Value Streams, Revenue Streams, Digital Marketing
Big Data Analytics for Exploratory Social Network Analysis
by Chetna Dabas
Abstract: In todays world, if an organization desires to retrieve valuable business information content and productive insights, big data analytics plays a vital role in designing and analyzing the spectra of unstructured, semi-structured and precisely structured data. Big data assumes human-sourced information machine-generated data and process-mediated data .Big data as a product of Social Networks comes from human experiences previously recorded in works of art or in books and then in audio, video or photographs. This human data is almost digitized and bears storage ranging from Personal Computer, Laptops, Tablets, Mobile Phones to Social Networks. So, a small piece of information that might have begun with a suggestion of purchasing a smart phone (bearing a specific brand) during group chats amongst a circle of friends might end up on the desk of a smart phone company manager as an aid to decision making. Moreover, humans have loosely used the idea of Social Network for more than a century for representing set of relationships (complex) amongst members of social systems. And, this has been done at diverse scales from interpersonal to international.SNA has now taken off its journey from intriguing metaphor to an analytic approach to a paradigm carrying its own methods, metrics and theoretical statements and analysis which further motivates the consumer trust in big data analytics. In the similar context, this paper aims to address big data analytics for exploratory social network and proposes an experimental study with analysis and results. This case study is carried out for a group of members in an Electronic Store which sells, installs and maintains mobile phones, tablets, and other electronic devices. The social network under consideration bears friendship bonds amongst the employees of this Electronic Store. The analysis and results of the proposed work are carried out on Social Network Visualization (SocNetV) Version1.9 using Pajek and are in the form of graphs which highlights the importance of Social Network Analysis in decision making while working with big data. Also, various metrics of Social network analysis are evaluated and analyzed in this paper to strengthen decision making.
Keywords: Big Data Analytics, , Social Network Analysis, Data Visualization
Evaluating the competitiveness of Indian metro cities: In the smart cities context
by Harish Kumar, Manoj Kumar Singh, Manmohan Prasad Gupta
Abstract: The eminent outgrowth rate of urban population and varying conditions need improving public utilities and various services to its citizens in a particular city. There is a need for smarter, effective, efficient and sustainable cities in developing countries like India. Various urban development initiatives have been planned by the Indian government for the rapid urbanization. The objective of this study is to analyze the competitiveness of four main metro cities in India. Various indicators essential for city competitiveness were identified from the extensive literature study. Secondary data was collected for 4 metro cities i.e. Delhi, Kolkata, Mumbai and Chennai. Based on city competitive analysis, this study explores about the smart city initiatives which could be implemented for these metro cities to make them smart cities.
Keywords: City Competitiveness, Smart Cities, standardized score, Competitive analysis, smart city initiatives.
ANTECEDENTS FOR SUCCESS OF E-COMMERCE PLATFORMS:AN INVESTIGATIVE APPROACH
by Asif Ali, Gowhar Rasool, Anjali Pathania
Abstract: Plethora of literature is available highlighting the Critical Success Factors (CSFs) of Information Systems (IS). While most of the studies were elusive in determining CSFs, the research of DeLone McLean (1992) proposed an IS success model ( based on six success factors i.e. System Quality, Information Quality, Use, User Satisfaction, Individual Impact and Organizational Impact) which is most comprehensive and widely applied model in various research studies carried out in this context. This paper attempts to examine the role of each critical success factors as suggested by DeLone McLean (1992) towards the success of E- commerce platforms and how it can be leveraged for enhancing customer value by laying strong foundation on most vital factor. DeLone McLean (1992) model was applied to make a comparison between Flipkart and Snapdeal which are two dominant players of E-commerce in India, so as to investigate the antecedents for the success of E- commerce platforms.rn
Keywords: Information Systems, E-Commerce Platforms, User experiences, Critical success factorsrn
Special Issue on: LISS16-ITM Information and Technology Management in Big Data Environment
Analysis of the Multi-Agents Relationship in Collaborative Innovation Network for Science and Technology SEMs Based on Evolutionary Game Theory
by Guangyou Nan, Jinyu Wei, Haiju Hu
Abstract: The construction of collaborative innovation network for the science and technology small and middle enterprises (SMEs) is an attempt to effectively combine the advantages of science and technology SMEs. In this paper, the evolutionary game theory is used to establish the three partys game model including the government, science and technology SMEs, the college and research institution. Then, the interaction mechanism among them is analyzed. On the basis of analyzing each partys cost and benefit under different strategic portfolios of three parties, the stable strategy of the evolutionary game is derived. The research results show that the government can effectively mobilize the enthusiasm of enterprises and the college and research institution by setting up reasonable subsidies or fines for them, and could also influence and promote the cooperation relations between enterprises and the college and research institution.
Keywords: Collaborative Innovation Network; Government; Science and Technology SMEs; College and Research institution; Innovation Management; Evolutionary Game Theory.