Forthcoming articles


International Journal of Information Technology and Management


These articles have been peer-reviewed and accepted for publication in IJITM, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJITM are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Information Technology and Management (71 papers in press)


Regular Issues


  • Research on book shopping website interface based on the eye tracker   Order a copy of this article
    by Hongxia Li, dandan che, xiaofang yuan, yan li 
    Abstract: This study aims to analyze the behavior of consumers when they buy books online, and analyze the law of their scanning of the products and their focus when they check the information. In the experiment, 20 subjects must follow the instruction to complete two specific tasks, and the eye tracker recorded their eyes movement data automatically. According to the heat map, researchers divided the area of interest (AOI) which got the attention of subjects and analyzed the data in the AOI. Combined with the interview and analysis, they found that: a) The customers tend to view pages following an F pattern: attention is largely focused on the upper and left part; b) The upper part of webpage is more attractive than the lower part; c)In terms of text, is more attractive than Amazon because Amazon has a cluttered text typography; d)Consumers like to check the goods information and the comments of the goods when they choose them. e) Dangdang.coms operation is simpler than Amazon when they are completing the order.
    Keywords: Book shopping website; Electronic commerce; Eye-tracking; Tobii T60XL; Interface design;

  • Case Study on Estimating the Financial Impact of IT Process Alignment   Order a copy of this article
    by Eunil Park, Jay Ohm, Sang Jib Kwon 
    Abstract: The current study is designed to be used as supplementary material for potential professionals in the area of IT process alignment. This study deals with automation of trouble ticketing system. With this new technology, the company needs to properly align their IT processes with investment model and automation. The proper alignment will bring about dramatic improvements in their business performance. This case study walks through the major components in estimating the financial impact of IT process alignment.
    Keywords: IT Process; trouble ticketing system; IT consulting.

  • Challenges of Software Developers: The Namibian Government Experience   Order a copy of this article
    by Monica Nehemia-Maletzky, Tiko Iyamu 
    Abstract: The Namibian government has recognized the importance of ICT, as one of the critical contributing sector to the development of digital factors, especially with regards to the digital economy. Explicit activities through the National Development Program (NDP) were developed to spearhead the development of the ICT sector. Software development is recognized to be the critical resource behind the development of an ICT sector. Almost 15 years after the NDP was initiated, the government of Namibia is still outsourcing most of its software development to companies from Germany, India, USA and South Africa. This is considered by the general populace of the country to have negative impact on the economy, as well as skill and knowledge transfer. This research, through multiple case studies, examined and discusses the impact of lack of in-house software development experts in the country. The Namibian government institutions which include Serve Agency, Populace Agency, Department of Natural resource and Department of International Affairs were used as cases in the study.
    Keywords: Software; Development; Organisation; Skill.

  • Research on Key Techniques of Cryptographic Access Control and Properties Optimization in Cloud Storage   Order a copy of this article
    by Shidong Zhu, Liu Jiang, Zhenliu Zhou 
    Abstract: With the analysis of data privacy protection requirement from the users, we proposed cryptographic access control scheme and key distribution scheme based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption), and gave a hierarchy based on CP-ABE key generation algorithm. This scheme uses precise identity and hierarchal structure as the user attributes, and supports hierarchal key generation. As the cloud data are encrypted by the users, the data privacy protection can be effectively achieved in cloud storage against network attackers even if CSP (Cloud Service Provider), suitable for the multi-user who have hierarchal structure attributes sharing cloud storage services environment. We also proposed two schemes for improving the usability of cloud storage system. The first one is that the metadata information of unstructured data are stored in cloud using non-relational database MongoDB, which can greatly improve the speed of data access. The second is data migration algorithm based on physical volume, which can migrate data to the matching devices automatically depending on user access frequency value. Experimental results showed that these programs were able to improve the storage efficiency of cloud storage system. The study is of theoretical significance and practical value to the similar systems.
    Keywords: cloud storage; storage virtualization; unstructured data storage; cryptographic access control; Key generation; data privacy protection; Ciphertext-Policy Attribute-Based Encryption; data migration.

  • Informal interactive Bring-Your-Own-Device Strategizing Practices of South African Small and Medium Enterprises   Order a copy of this article
    by Salah Kabanda 
    Abstract: The purpose of this study is twofold: firstly, to identify factors affecting BYOD adoption in South African SMEs and secondly understand strategies SMEs engage in with regards to BYOD. Following an interpretive approach, and interviews as a means of data collection; the findings show that SMEs are consciously aware of BYOD but are not eager to formalise their strategy. Instead, SMEs engage in informal interactive strategizing despite their concerns of cost, security and privacy. SMEs did not view BYOD as a cost saving approach but rather as a double end sword that brought privacy and security concerns; unintended consequence; and no improvement in productivity. Further findings show how SMEs, specifically employees advocated the need for a policy prescribing how mobile devices should be used and in so doing perpetuating the interactive strategizing. External factors such as changing laws and regulation were perceived as barriers towards a formalised BYOD strategy.
    Keywords: BYOD; strategy; SME; developing countries; adoption.

  • Establishment for Service Quality Evaluation Index System of Mobile E-commerce   Order a copy of this article
    by Liping Liu 
    Abstract: With the rapid development of mobile e-commerce, more and more importance has been attached by the users to the level of service quality of mobile e-commerce. Accurate settings of the evaluation indexes of the mobile e-commerce services quality is able to better measure and improve the service quality of mobile e-commerce. Based on PZBs SERVQUAL and in combination with the characteristics of mobile e-commerce, the paper constructs evaluation index system of mobile e-commerce service quality, consisting of such six dimensions as tangible, reliability, responsiveness, mobile situationality, safety and remedy. Through the questionnaire survey, SPSS and AMOS software are used to conduct construction validity analysis, reliability analysis, confirmatory factor analysis and other empirical analysis. Results showed that it was reasonable to change six dimensions in the initial scale to five dimensions: safety, responsiveness, tangible, mobile situationality and reliability. The main characteristics of the paper are as follows: first, a dimension mobile situationality corresponding to mobile business feature is added based on the original SERVQUAL model. The mobile business feature is also heighted in other detailed indicators; second, the questionnaire method is used to conduct empirical analysis on the constructed evaluation index system, so as to ensure its reliability and validity.
    Keywords: mobile e-commerce; service quality; evaluation index; SERVQUAL; tangible; reliability; responsiveness; mobile situationality; safety; remedy Introduction.

    by Aisha Abuelmaatti, Vian Ahmed 
    Abstract: It is widely recognised that collaboration in the Architecture, Engineering and Construction (AEC) sector increases productivity, improves quality, competitiveness and profitability. This poses the problem of what are the most appropriate collaboration methods available to accommodate unique work settings and virtual organisation like modus operandi. With Building Information Modelling (BIM) being imposed by the UK government on AEC projects, the development of new technology for collaboration purposes is one solution to this problem. Unfortunately information technologies have failed in productivity growth despite previous governments attempts, most famously, with the 2004 Latham and 2008 Egan reports. BIM is not about a specific technology, but ensuring the whole-sector adoption is fundamental. In fact, many Small and Medium Enterprises (SMEs) within the sector would like to be implementing BIM not only for the business productivity, but also to not get left behind. It is, however, commonly observed that SMEs have fewer chances to get it right and so they need guidance. Debate over whether or not to use BIM has become almost irrelevant. Instead, the question raised is how collaborative technologies promote collaborative working between large companies and SMEs in the AEC sector to increase productivity and improve quality to meet the high collaboration demands? Against this background,several approaches from the literature were reviewed. This led to identifying the key elements to focus on during the collaborative technologies implementation to enhance successful collaboration. A qualitative study of fourteen cases was developed in order to map the current practice of the collaborative technologies implementations and their success level in the AEC sector. The case studies revealed a number of factors affecting the success of collaborative technologies implementations. These factors were affecting the collaboration at the organisation level. This also led to further investigation of the factors affecting the collaboration at the end-user level. The quantitative study of a survey returned by sixty four respondents was guided by the list of elements proposed by the review developed from the literature. The results suggested that the success of collaborative technologies depends on 23 factors. This research concluded that, collaborative technologies are effective methods to support collaboration within the AEC and meet the demands of the sector, when strategically implemented, underlined by a set of factors. Recommendation emerged from these findings are used to suggest a path for SMEs to implement BIM into AEC, so that they are better prepared for the future ways of working.
    Keywords: SMEs; AEC sector; Information Technology (IT); Organisation Readiness and Maturity; Collaborative Working; Factor Analysis.

  • Hadoop Ecosystem As Enterprise Big Data Platform: Perspectives and Practices   Order a copy of this article
    by Sourav Mazumder, Subhankar Dhar 
    Abstract: Innovation in Hadoop and other related Big Data technologies in last few years brings on to the table a lot of promises around better management of enterprise data at much lesser cost but with high value business benefits. However, managing Big Data environment at enterprise level can be an involved task both from the perspectives of cost and operation complexities. Supporting various types of enterprise data use cases with different workload patterns in the same cluster, minimizing the data movement in and out of cluster, assuring different Service Level Agreements (SLAs) across various use cases and user groups, ensuring data lineage and veracity, security and data privacy are some of the key challenges every enterprise is trying to address in their individual stage of establishing Enterprise Big Data Platform. In this paper, we propose to delve into some of the challenges from practitioners perspective based on lessons learnt from various Big Data implementation scenarios. We also aim to discuss the emerging concept of Hadoop Ecosystem as Big Data platform to address these challenges with a holistic proposition. We also discuss the other technologies outside Hadoop Ecosystem which can be also potentially used to realize the patterns of Big Data platform. Finally, we also provide a prescriptive approachbased on the best practices which can help moving towards the vision of Enterprise Big Data Platform using Hadoop Ecosystem balancing between the short term objectives and the long term goals of managing and maintaining Enterprise Big Data Platform. Hence this work will be beneficial to industry experts and practitioners for managing enterprise Big Data environment.
    Keywords: Business analytics; Big Data; Data Mining; Map Reduce; Hadoop; Spark; Tachyon; NoSQL.

  • Factors Affecting Diffusion and Adoption of Information and Communication Technology Among Rural Users in Khyber Pakhtunkhwa Province, Pakistan   Order a copy of this article
    by Zahid Latif, Wang Lei, Zulfiqar Hussain Pathan, Sikander Hussain, Kaleem Khan 
    Abstract: Information and Communication Technology (ICT) is increasingly recognized as an important driver for economic growth, innovation, employment and productivity, and is widely attributed as the foremost pillar for the development of any country. In the present globalized era, the accessibility of ICT to rural areas is a core challenge that needs to be addressed. Implementation of ICT technology is more likely to improve technical advancements and revenue generation of overall service sector of a country. The purpose of this study is to investigate and categorize the factors influencing diffusion and adoption of ICT in the rural areas of Pakistan. The research deals principally with common people of the rural areas of Khyber Pakhtunkhwa Province for adoption of ICT in their daily life. The sample size encountered was 330 respondents, who were selected through random sampling technique. Primary data was collected from people belonging to different races of life throughout the province. The results of the study were calculated by using Confirmatory Factor Analysis (CFA) and Structural Equation Modeling (SEM) techniques, which show that the overall ICT diffusion and adoption is profoundly influenced by seven factors, including social, political, environmental, regulatory, technological, economic and legal. The study confirms a most significant impact of social and political factors upon ICT diffusion, whereas the remaining factors seem to have a moderate impact.
    Keywords: ICT diffusion; Confirmatory Factor Analysis(CFA); Gross Domestic Product (GDP); Khyber Pakhtunkhwa; Pakistan.
    DOI: 10.1504/IJITM.2016.10003630
  • Finding Linkage between Sustainability Science and Complex Networks   Order a copy of this article
    by Katsuhide Fujita 
    Abstract: Sustainability science has been widely accepted worldwide as an important research field worldwide. Since it is widespread in many research fields such as environmental science and engineering, architecture, materials science, and civil engineering, it is important to discover the hidden connections between sustainability science and other academic fields. For this purpose, supporting tools are necessary. This paper investigates the relationship between sustainability science and complex networks on the basis of citation network analysis using large datasets of academic papers. First, citation networks are generated on the basis of academic paper datasets and clustered to understand the research fields of sustainability science and complex networks. Next, we measure the textual similarities among the clusters in these fields and analyze the shared terms to find the overlapping research areas that connect the two fields. These results offer overviews of how complex networks contribute to sustainability science and assist the formation of policies that promote key results in artificial intelligence toward future sustainable societies.
    Keywords: Citation Networks; Sustainability Science; Complex Networks.

  • Top Management Support and Information Systems Implementation Success: A Meta-Analytical Replication   Order a copy of this article
    by Mark Hwang 
    Abstract: Factors that contribute to the success or failure of Information systems implementation have received extensive attention in the literature. Top management support is considered one of the most, if not the most, critical factors for implementation success. However, the positive effect of top management support is not always borne out in empirical data, prompting a quest for moderator variables. A classic meta-analysis shows that the effect of top management support on implementation success is moderated by task interdependence, a claim refuted in several more recent meta-analyses. Drawing from the lessons learned from these meta-analyses, the current research reanalyzed the top management support literature with a larger sample while controlling for the effect of common method variance and systems success measurement issues. The results reaffirm the significant and substantial effect of top management support on systems success. At the same time, evidence also supports the moderating role of task interdependence, common method variance, and how systems success is measured. Implications for systems implementation are discussed.
    Keywords: top management support; task interdependence; IS implementation; IT project; meta-analysis; common method variance.

  • User Engagement in Social Media- Empirical Results from Facebook   Order a copy of this article
    by Rupak Rauniar, Greg , Ronald Salazar, Donald Hudson 
    Abstract: Theory building and better understanding of user engagement behaviour is fundamental to developing future approaches and effective organisational deployment of social media technologies. Based on the theory of reasoned action (TRA), predictors of intention to engage on social media sites were empirically examined with 389 users of Facebook - the most popular online social media site. Our results suggest that perceived value, social presence, interactivity, and trustworthiness are positively related to the users attitude towards social media. The research model shows promise for use by managers and organisations to predict and understand the usage of social media in a target population.
    Keywords: theory of reasoned action; social media; Facebook.

  • Evaluation of mean and variance approximations in three point estimation of task completion times using the beta and the Kumaraswamy distribution   Order a copy of this article
    by Pablo Ortiz Bochard, Thomas Schwarz 
    Abstract: Estimation of task and project completion times within IT projects remains one of the most error-prone, but also most critical duties of an IT project manager. Various three-point methods of PERT have been evaluated by assuming that the true distribution is a beta-distribution. We evaluate PERT methods by comparing additionally with the Kumaraswamy distribution, which has an equal claim to be the true a-priori distribution for project completion times. We use skew and kurtosis in order to define test sets instead of simply choosing a range of shape parameters. We validate various approximations proposed in the literature and show that valid approximations are possible.
    Keywords: project management; expert judgement; mean and variance approximations; PERT; three-point estimations; task completion times; beta distribution; Kumaraswamy distribution.

  • CPPM: a lightweight performance prediction middleware for cloud platforms   Order a copy of this article
    by Xiao Peng 
    Abstract: As more and more commercial clouds have been applied in various areas, how to evaluate the performance of a cloud platform has become an important issue that needs to be addressed. Furthermore, an effective performance prediction mechanism is of significant value for improving the current cloud services, such as resource allocation and task scheduling. In the paper, we present the design and prototype implementation of performance prediction system, namely Cloud Performance Prediction Middleware (CPPM), which is aiming at providing a set of lightweight and flexible services on existing cloud infrastructure so as to allow cloud providers monitoring, estimating and predicting the runtime performance from various aspects. The CPPM enables cloud providers making more efficient and fine-grained resource management and scheduling policies based on its short-term workload prediction mechanism; also it provides an application-level performance prediction service which uses skeleton approach to capture execution characteristics of the running applications so as to predict their actual runtime performance and efficiency. Extensive experiments are conducted to examine the effectiveness and efficiency of the CPPM.
    Keywords: cloud computing; performance evaluation; workload; quality of service.

  • Impact of communication on the collaboration between 3PL service providers and their clients. Case of Lithuania   Order a copy of this article
    by Aidas Vasilis Vasiliauskas, Virgilija Vasiliene-Vasiliauskiene, Ieva Meidute-Kavaliauskiene 
    Abstract: Production enterprises constantly are trying to add more value to their products and secure their competitive advantage. One of the possible ways in achieving this goal is to get rid off of the uncommon activities to intermediaries, which take control over the process of distribution of goods. However due to intense change on the market, intermediaries responsible for provision of 3PL services sometimes falling short to adapt to shifted manufacturers needs. Because of the insufficient exchange of information 3PL service providers start to render inadequate services and are not able to assure efficiency of manufacturers logistics system. This article discusses importance of exchange of information between production enterprises and their logistics intermediaries based on the results of study on the situation of communication problems between 3PL service providers and their clients in Lithuania.
    Keywords: Keywords: communication; collaboration; exchange of information; 3PL services; logistics intermediaries.

  • Investigating the Role of Information Technology in Developing the Learning Organization: Empirical Evidence from Egypt   Order a copy of this article
    by Hadia Hamdy, Karim Hodaib 
    Abstract: Developing a learning organization has been associated with organizational growth and innovation as it enables companies to maintain a memory for their created knowledge and experiences that can be shared among all organizational members. The most important tool identified to build such a memory is Information Technology knowledge management systems. However, despite their importance, their actual contribution to the development of the different dimensions of the learning organization has rarely been studied, especially in developing countries like Egypt. This research investigates the effect of using IT knowledge management tools on the development of the learning organization using the dimensions of the learning organization questionnaire developed by Watkins and Marsick. A pre-post quasi experiment was conducted in an Egyptian organization to measure the dimensions of the learning organization before and after the application of a new IT system designed to enhance employees learning and knowledge sharing. Results indicate that the implementation of the new IT system significantly improved all the dimensions of organizational learning except for degree of teamwork that is essential for the process of knowledge integration. It concludes that IT systems facilitate the creation of the learning organization, and convey a positive message regarding organizational commitment to developing and empowering employees towards a shared organizational vision. However, they have to be implemented within an integrated strategy, structure, culture, and policy change management system to be able to achieve the desired outcome of transferring a rigid organization into a learning one.
    Keywords: Learning organization; Organizational learning; Information Technology; Knowledge management systems; Egypt.

Special Issue on: ICSS 2015 Services Computing Technologies and Applications

  • Threefold similarity analysis A case study on crowdsourcing feeds   Order a copy of this article
    by Kaixu Liu, Gianmario Motta 
    Abstract: Crowdsourcing is a valuable social sensing for the smarter city. We present a framework of crowdsourcing feeds similarity analysis from a threefold point of view, namely image, text, and geography, which is based on similarity analysis, founded on a sequence that goes from coarse to thinner similarity filters. The main idea is to extract feeds within a specific geographic range, and then to analyze similarity of image color and text in clustered feed sets. The framework enables to identify feeds that report the same issue, and hence to filter redundant information. Based on proved methods and algorithms, such framework has been implemented in a software application, called CITY FEED, which is used by the Municipality of Pavia.
    Keywords: Crowdsourcing, Smart city, Image similarity analysis, Text similarity analysis.

  • Needle in a Haystack: An Empirical Study on Mining Tags from Flickr User Comments   Order a copy of this article
    by Haijun Zhang, Jingxuan Li, Bin Luo, Yan Li 
    Abstract: In the Web2.0 era, user generated content has become the main source of information of many popular photo-sharing websites such as Flickr. In Flickr, many photos have very few or even no tags, because only the uploader can mark tags for a photo. Meanwhile, the user can deliver his/her comment on the photo, which he/she is browsing. Therefore, it is possible to recommend new tags or enrich the existing tag set based on user comments. The work of this paper contains two phases, i.e. the tag generation, and the ranking algorithm. In the phase of candidate tags generation, two methods are introduced relying on Natural Language Processing (NLP) techniques, namelyword-based and phrase-based. In ranking and recommending tags, we proposed an algorithm by jointly modeling the location information of candidate tags, statistical information of candidate tags and semantic similarity between candidate tags. Extensive experimental results demonstrate the effectiveness of our method.
    Keywords: tag recommendation; user comment; Flickr; image annotation

  • SGP: A Social Network Sampling Method Based on Graph Partition   Order a copy of this article
    by Xiaolin Du, Yunming Ye, Yan Li, Yueping Li 
    Abstract: A representative sample of a social network is essential for many Internet services that rely on accurate analysis. A good sampling method for social network should be able to generate small sample network with similar structures and distributions as its original network. In this paper, a sampling algorithm based on graph partition, SGP (Sampling based on Graph Partition), is proposed to sample social networks. SGP firstly partitions the original network into several subnetworks, and then samples in each subnetwork evenly. This procedure enables SGP to effectively maintain the topological similarity and community structure similarity between the sampled network and its original network. Finally, we evaluate SGP on several well-known data sets. The experimental results show that SGP method outperforms seven state-of-the-art methods.
    Keywords: sampling algorithms; social networks; graph partition; community structure; topology structure.

Special Issue on: Next Generation of Social Computing for Computational Collective Intelligence

  • Immersive element analysis of the multiplayer online battle arena game genre   Order a copy of this article
    by Gilsang Yoo, Jaebum Jung, Jaechun Ryu, Jeahong Kim, Kichun Nam 
    Abstract: The game industry is the total entertainment industry, which includes its entertainingness and popularity and the future planning industry, which allows to create added value with its neighboring industry. The main purpose of these game development is improving its competitiveness by making satisfied product for users. To make competitiveness game product, it is needed to classify the interested elements and analyze flow elements correctly. In this study, we deducted the content elements from the Multiplayer Online Battle Arena (MOBA) game genre and quantified the importance of subdivided elements of focus group interview and semi-Delphi. Play theory based MOBAs flow elements is analyzed by the quantified value of subdivided elements. By this, we propose the developmental direction about interested elements of the MOBA game genre. This study result can be used for contents satisfaction of MOBA game genre and flow evaluation system.
    Keywords: Flow, Game immersive, Game design, Play theory, Multiplayer Online Battle Arena

  • Texture Analysis Based Feature Extraction Using Gabor Filter and SVD for Reliable Fault diagnosis of an Induction Motor   Order a copy of this article
    by Rashedul Islam, Jia Uddin, Jong-Myon Kim 
    Abstract: This paper presents a texture analysis based feature extraction method using a Gabor filter and singular value decomposition (SVD) for reliable fault diagnosis of an induction motor. This method first converts 1D vibration signal to 2D image pixels to create a 2D grey-level texture image for each fault signal. Then, the 2D Gabor filter with optimal frequency and orientation values is used to extract a filtered image with distinctive texture information, and SVD is utilized to decompose the Gabor filtered image and select finer singular values of SVD as discriminative features for multi-fault diagnosis. Finally, one-against-all multiclass support vector machines (OAA-MCSVMs) is used as a classifier. In this study, multiple induction motor faults with different noisy conditions are used to validate this proposed fault diagnosis methodology. Experimental result indicates that the proposed method achieves an average classification accuracy of 99.86% and outperforms conventional fault diagnosis algorithms in the fault classification accuracy.
    Keywords: induction motor; texture analysis; discriminative features; Gabor filter; singular valued decomposition.

  • An Introduction to Face-Recognition Methods and its Implementation in Social Software Applications   Order a copy of this article
    by Kang-Hee Lee, Byoung-Moo Kwon 
    Abstract: Face detection and recognition technology has shown a steep development in the field of scientific research and is subsequently harvesting growing interest from the industry, which in fact can be confirmed seeing numerous implementations in forms of socially interactive applications such as autofocus in digital cameras, human computer interfaces in smartphones, or even video surveillance cameras in airports. In response to this growing interest and willingness to implement this technology of face detection and face recognition technology, this paper will provide the readers with fundamental knowledge of how face detection essentially works and ought to help the readers to establish a foothold in developing own ideas using face detection technology. The main purpose of this research paper is to introduce several significant principles of current face-detecting methods such as active shape model(ASM), active appearance model(AAM) and constrained local models(CLM) in a comprehensive manner and to provide some insight on closely related topics such as principal component analysis and eigenfaces. In this paper we will also present selected examples of implementations of above mentioned face-detecting methods via open-source software applications such as ofxFacetracker and FaceSubstitution with openFrameworks.
    Keywords: Face Recognition, Active Shape Model(ASM), Active Appearance Model(AAM), Constrained Local Model(CLM

  • Shadow Detection using Chromaticity and Entropy in colour image   Order a copy of this article
    by Ki-Hong Park, Jae-Ho Kim, Yoon-Ho Kim 
    Abstract: Shadows in image often bring a significant problem which can cause unintended negative outcome, so how to detect shadow is an important issue of computer vision tasks. This paper proposed a method to detect shadows from real images. Due to shadows in image have a dark pixel values, shadow candidates are defined. Shadow candidates have been estimated and detected by chromaticity of colour image and threshold image using entropy. Some experiments are conducted so as to verify the proposed method, and results show that the proposed method can detect shadows in colour image.
    Keywords: shadow detection; shadow candidates; chromaticity; entropy; single image; minimum cross entropy; maximum entropy; colour distribution; colour model; colour histogram.

  • The Investigation of Relationships: Self-esteem, Self-confidence, and Conduct Problems in Counseling   Order a copy of this article
    by Mila Park 
    Abstract: The purpose of this study was to investigate the relationship between self-esteem self-confidence, and conduct problems. It demonstrated that the correlation of self-esteem and self-confidence was not significantly related to the children and adolescents' conduct problems. Also, there is no direct relationship between self-confidence and parents couple intimacy. However, self-esteem and parents' couple intimacy were significantly related, indicating that self-esteem and self-confidence are different. As demonstrated by Hypotheses, the relationship of self-esteem and self-confidence is significant. In particular, self-esteem is more significant than self-confidence in this study. The relationship of self-esteem and parents' couple intimacy, and self-esteem and self-confidence, were accepted. It indicated that self-esteem and self-confidence are very similar but they have different ripple effects. This study aims to examine coping conduct problems, self-confidence, and self-esteem of students in Korea. Results of the study also gave information about the general information relating to the self-esteem of 1st to 12th grade students. The results produced evidence for the obvious correlations between coping behaviors, and self-esteem as well. This data will help counselors and educators recognize their students difficulties when they practice in counseling settings and identify how to help students use their counseling more proficiently.
    Keywords: Self-esteem; Self-confidence; Conduct(behavioral) problems; Parents’ couple intimacy; HTP drawing test; Adolescents; Children; Counseling; Education; Family relationship; parenting.

  • User Interface Using Bounce for Realistic Movement on Smart TV   Order a copy of this article
    by Daehyun Ryu 
    Abstract: In this research, we designed the various movements on the screen based on a touch pad of smart TV. Due to increment of smart TV, diverse interfaces are applied on the screen and movement is the crucial part of the interfaces. However, the screen is comprised of pattern as a button, the availability of new interface is less effected for users. Therefore, it is necessary to research new screen composition to escape the existing one. rnThe plan of this research is to expect the appropriate screen of smart TV, we analyze related research and give a change of movement. This screen layout suggests new directional properties such as moving the position where we want with simple gesture. Moreover, we found the fact in this research that less change from movement of many objects is showed that compared with existing movement. rnThe result of this research, it is possible to show motion of various effects and two-dimensional movement better than existing one-dimensional movement. So, we enhanced motion naturally and degree of freedom. rnThis research suggests matched motion for the applicable interface on the screen composition of smart TV from now on, so that we expect compatible development for the future UI environment of screen.rn
    Keywords: Smart TV; UI; Bounce; touch pad; realistic;

  • Analysis of Serious Games for Preventing Internet Gaming Addiction   Order a copy of this article
    by Ji-Yun Kim, Jae Hwan Bae 
    Abstract: Internet Addiction and Internet Gaming(Game) Addiction are two terms regularly used in our daily lives, however, their distinction is rather vague. Internet Gaming Addition refers to a psychological, emotional, and social state where one, due to increased tolerance and dependence to games and other reasons, loses control over and plays internet games excessively and compulsively, and any efforts to reduce or stop playing will be ensued by withdrawal symptoms. One means to better the problems caused by Gaming Addiction is development of a variety of Serious Games and related services. Whereas Internet games are played for entertainment, Serious Games utilize the entertainment function to further education and addition preventive measures objectives.
    Keywords: Serious Game, Game Addiction Preventionrn

  • A Framework for Context-Aware Application Programming on Smart Phone   Order a copy of this article
    by BaekGyoon Sung 
    Abstract: The internationalization of a small mobile operator into the surrounding emerging markets is an entrepreneurial and risky process due to the target markets nature. This paper deals with market and timing factors potentially influencing the transaction costs of a company in its international ventures, which are used as transaction cost proxies, based on Gerpott and Jakopins paper Determinants of Mobile Network Operators Choice of Cross-Border Entry Modes. In addition, they are assigned as corresponding hypotheses in order to test their effect on Zain Telecoms entry mode choices. This model did not seem to explain all factors influencing the entry mode choices of Zain Telecom, since not only many hypotheses were rejected, but also they did not match with the findings of Gerpott and Jakopin for mobile operators in the Western world. Hence, in order to understand the managerial drivers in Zain Telecoms decision-making, a holistic framework MEMS (Market and Market Entry Mode Selection) model was used. This framework shed the light on many of the managerial facets of Zains strategical decision-making and answered the following question: How did target country, market, and timing factors contribute in shaping Zain Telecoms cross-border entry mode choices? Of course, for optimal and overall decision making, this research should be enriched with engineering analysis and techniques.
    Keywords: Framework for context aware application, Context awareness, personalized service, Context aware system on smart phone, rule based reasoning, case based reasoning, Smartphone sensor.

  • A Tree Cognitive Navigation System Based on Two-dimensional Code and GPS   Order a copy of this article
    by Wenjie Hu, Chunling Wang, Qiaochu Mo, Bo Wang 
    Abstract: The recognition of trees plays an important role in the construction of ecological civilization. In order to strengthen tree information management and help the public to have a better understanding of trees, an Android-based tree cognitive navigation system for smart phones was developed. Using two-dimensional code and GPS technologies, the system can rapidly acquire geographic coordinates and species of trees. In this paper, the theory, system framework and key technologies of the system are presented. Subsequently, a tree cognitive system based on two-dimensional code and GPS was developed for Beijing Forestry University. The system implementation approach hasbroad application prospects. The case study showed that it is portable, practical, user-friendly, and network-independent and has good potential for application and expansion.
    Keywords: tree; two-dimensional code; GPS; Android system; cognitive navigation

  • Estimating the Sentiment Strength of a Word using Word Similarity   Order a copy of this article
    by Kangbok Lee, Jongbum Baik, Soowon Lee 
    Abstract: Identifying the sentiment orientation and strength of a sentence or phrase is one of the crucial issues in opinion mining. A dictionary approach to this problem is to use the sentiment orientations and strengths for the words included in a given document unit. This paper proposes a novel method for estimating the sentiment strength of a word using similarities between a target sentiment word and sentiment words in dictionary. To calculate the word similarity, we introduce the notions of relative similarity and adjusted similarity. The experimental results from the analysis of Facebook text data demonstrate the effectiveness of the proposed method in terms of the root-mean-square-error.
    Keywords: sentiment strength; word similarity; sentiment analysis; relative similarity; adjusted similarity

  • Game Operation Query Language (GOQL) for Facilitating Game Servers FCAPS Operation   Order a copy of this article
    by Hwan-Soo Yoo, Seong-Whan Kim 
    Abstract: Game companies require successful game operation for their revenue maximization. In an operation phase, they need not only operators who are experts in non-functional and operational issues but also developers who are experts in game development. Game server should manage several operational issues such as fault recovery, performance metering, and configuration management during game service period. However, most game server operators do not have programming expertise. To support successful FACPS (fault, accounting, configuration, performance, security) operation without programming expertise or development knowledge, we introduce DSL (domain specific language) operation approach for usual game operators. We design GOQL DSL, focusing on fault, configuration, and performance management issues. We experimented with 15 game server operators who are working in major game publishers. Experimental results show that GOQL was attractive to game operators because it is functional and does not require programming knowledge even in the situation that needs programming source modifications. For the future research, we will extend our textual version of GOQL to visual language version to give more convenience and intuitive advantage to game operators and novice developers. To cover this, we require study on visual notations, UX related elements, and visual transformation of text.
    Keywords: Game; Server; Operation; FCAPS; DSL

  • Automatic Classification of Lithuanian Parliament Bills   Order a copy of this article
    by Aušra Mackutė-Varoneckienė, Ka Lok Man, Tomas Krilavičius 
    Abstract: Quantitative methods are becoming more and more important in political science. However, they are not applicable without computers and computer based systems. In this paper we apply Natural Language Technologies, mainly text classification, to categorize bills of the Lithuanian parliament into the predefined groups for further use in voting analysis and in other text analytic tasks. As only the titles of bills were used, in general it can be claimed that the problem of short text classification, which is poorly explored in consideration with the Lithuanian language, is addressed in this study.
    Keywords: Text Classification; Natural Language Processing.

Special Issue on: LISS 2014 Data Mining Theories, Methods, and Applications

  • Modeling Technique of the Object-Attribute System Oriented to Data Mining   Order a copy of this article
    by Yaoyu Hu, Ai Wang 
    Abstract: The research of modeling the object-attribute system, essentially a two dimensional problem, belongs to the domain of interpretative structural modeling and it is one of the basic problems in the data mining field. Firstly, this paper proposes and demonstrates the Subsystem Judgment theorem. In order to solve the problem above, this paper puts forward an algorithm which can reduce the scale and the dimension of the original data through modeling the object-attribute system based on the object similar feature matrix (OSFM). In the last part of the paper, a numerical value example is provided to show the whole process of the method.
    Keywords: ISM; Subsystem Judgment theorem; data mining; OSFM

  • Relationships among Customer Loyalty, Customer Satisfaction, Corporate Image and Behavioral Intention on Social Media for A Corporation   Order a copy of this article
    by Lv Haixia, Yu Guang, Wu Gang 
    Abstract: In this paper, how customer loyalty, customer satisfaction, corporate image and behavioral intention affect each other on social media and how to make the benefit maximization for corporation are explored. We leverage Natural Language Processing (NLP) techniques analysis emotion of comment and retweet in the text, and combined with the other attributes and behavior of the Weibo users who interact with the corporate account (we used the accounting data of Shanghai Peace Hotel as the study case) to research the relationships on social media. The results show that customer image has a direct impact on customer satisfaction and has an indirect impact on customer loyalty. Customer loyalty is impacted by customer satisfaction and behavior intention. Th influence of customer image on behavior intention and loyalty and the influence of customer satisfaction on behavior intention are not very significant. As the results suggest, Shanghai Peace Hotel needs to more widely publicize their corporation such as celebrity endorsement and make more interaction with his followers through a variety of marketing activities (Lv et al., 2013). The difference between the traditional media and social media is another marketing problem. Facing such challenges, businesses should reconsider their strategy regarding customer satisfaction. Whether they can keep existing consumer, or make extra efforts to anticipate, appreciate, understand, and satisfy their genuine needs and whether they can build close relationship with existing customers are the three main topics. This study provides empirical evidences to analyze the relationships and provide the reference for the corporation to make the strategic plan.
    Keywords: Behavioral Intention, Corporate Image, Customer Satisfaction, Customer Loyalty, Social Media, Structural Equation

  • A Research on the International Competition Ability Measure of Chinese ICT Industry   Order a copy of this article
    by Li Hai-chao, Fan Shi-jie 
    Abstract: ICT industry is playing a key role nowadays and in future world economic development, and has become the focus of world economic competitions. In the process of making current empirical investigation on the international competition ability of ICT industry, we meet great difficulties. The research on the international competition ability measure of Chinese ICT industry can remedy the shortcomings of the theory research and also benefit for determining Chinese ICT status in the world, in that way we can get the access to make improvement for international competition ability of Chinese ICT industry. To further explore and discover the level of international competition ability of ICT industry in a scientific way, some famous scholars choose the evaluation index on the mixing of the ICT industry's specific characteristics. In this paper, we have selected RCA index, MS index, TC index and CA index as measuring indexes and find out the weight of these index and time sequence through advanced entropy method to measure international competition ability of Chinese ICT industry. The results show that the international competition ability of Chinese ICT industry is in the second place among 15 countries, with a higher level of international competition ability
    Keywords: ICT industry; international competition ability; entropy method; measure.

Special Issue on: LISS16-ITM Information and Technology Management in Big Data Environment

  • Analysis of the Multi-Agents Relationship in Collaborative Innovation Network for Science and Technology SEMs Based on Evolutionary Game Theory   Order a copy of this article
    by Guangyou Nan, Jinyu Wei, Haiju Hu 
    Abstract: The construction of collaborative innovation network for the science and technology small and middle enterprises (SMEs) is an attempt to effectively combine the advantages of science and technology SMEs. In this paper, the evolutionary game theory is used to establish the three partys game model including the government, science and technology SMEs, the college and research institution. Then, the interaction mechanism among them is analyzed. On the basis of analyzing each partys cost and benefit under different strategic portfolios of three parties, the stable strategy of the evolutionary game is derived. The research results show that the government can effectively mobilize the enthusiasm of enterprises and the college and research institution by setting up reasonable subsidies or fines for them, and could also influence and promote the cooperation relations between enterprises and the college and research institution.
    Keywords: Collaborative Innovation Network; Government; Science and Technology SMEs; College and Research institution; Innovation Management; Evolutionary Game Theory.

  • Research on the Measuring Method and Structure Mining of Organization Conflict   Order a copy of this article
    by Lei Liu, Xinan Zhao 
    Abstract: Jehn divides organization conflict into task conflict and relationship conflict. To grasping the degree and structure of organization conflict, which can provide effective decision-making basis for dealing with conflict. Establishing measurement model of organization conflict , giving the weight with the methods of distinguish individual advantage characteristic and using Intergroup Conflict Scale to measure conflict situation .According to the measurement results, (1) analyzing the intensity of the conflict of the organization, (2) analyzing the types of organization conflict, (3)fingding the common features of high conflict members. Taking a company in Shenyang as an example, selecting market services and property management departments. Applying the research method to analyze the organization conflict, determining the causes for conflict of high conflict group members, and verifing the feasibility of this study.
    Keywords: organization conflict;structure mining;individual advantage characteristic;clustering analysis.

  • Electric vehicle range estimation based on the road congestion level classification   Order a copy of this article
    by Hong Liang, Wenjiao Wang, Yunlei Sun, Min Zhong, Jianhang Liu 
    Abstract: Electric vehicles have been an emerging industry in recent years even though the remaining driving range bothering the drivers. To strengthen the user acceptance and relieve the range anxiety, an efficient and accurate estimation approach of remaining driving range would be a solution. In this paper, a road congestion level classification based on support vector machines is proposed and an electric vehicle power model is implemented based on the real-world dataset collected from LF620 battery vehicles. The experiment includes data pre-processing, best parameters searching, support vector machine model training and remaining driving range calculation. The results show the significant influence of considering the big data analysis results on range estimation.
    Keywords: electric vehicle; driving range estimation; support vector machine; python.

  • A Decision Support System for Identification of Technology Innovation Risk Based on Sequential CBR   Order a copy of this article
    by Quan Xiao 
    Abstract: To identify risks in the increasingly complex market is an important issue for the survival and development of technology innovation enterprises. But it is contended that there still lack effective methods to support the dynamic characteristic and knowledge reuse of the problem. In front of a variety of risk sources, the utilization of IT is necessary, and we introduce Case-based Reasoning (CBR) technique to identify new risks from cases in the past. However, extant CBR method has limitations on problems with dynamic characteristics. In this paper we provide insights into the dynamic nature of technology innovation risk identification, and contribute a novel extension of CBR to sequential CBR and design a decision support system for identification of technology innovation risk. In our framework, cases are represented as sequences of risk events, and similarity between cases is measured based on weighted event sequence pattern mining method. The effectiveness of this work is illustrated with a case of technology innovation risk identification.
    Keywords: risk identification; case-based reasoning; technology innovation; sequential data.

  • The research on the selection of the rice transfer machine   Order a copy of this article
    by Xin Yang, Zhenxiang Zeng, Xinjiang Cai 
    Abstract: This article sets the fuel consumption index and the working efficiency index as the main basis for the rice transfer machine. Through the simulation experiment of different load transfer machine models, it reaches their fuel law in the rice field. Finally it determines the best model by the optimal ratio and the working efficiency, which extremely satisfies the requirement of the short payback period and the long service life. The transfer machine reduces the labor intensity of the future agriculture field, improves the production efficiency, and reduces the labor cost. And it also has an important role on improving business efficiency.
    Keywords: Rice mechanization; Transfer machine; BOM; Fuel consumption efficiency ratio.

  • Employing clustering node in bipartite network to alleviate the high sparsity issue of recommender system   Order a copy of this article
    by Fuguo Zhang, Shumei Qi 
    Abstract: In recent years, recommender systems play an important role in helping users to deal with information overload. The application of recommended algorithms, represented by collaborative filtering, is very successful. Bipartite network based recommendation algorithm is one of the more widely used in binary rating system. However, the above algorithms are all facing a severe challenge of sparsity, which limits the applicability of recommended algorithms. In this paper, we apply clustering nodes in bipartite network to alleviate the influence brought by sparse data to recommendation results. Experiments are conducted through available datasets: Movielens and Delicious. The experimental results indicate that clustering nodes in the bipartite graph can substantially reduce the impact of sparse data and improve the recommendation quality.
    Keywords: recommender system; information overload; collaborative filtering; sparsity; bipartite network; clustering nodes.

  • Data set Replica Placement Strategy under a Response Time Constraint in the Cloud   Order a copy of this article
    by Wu Xiuguo, Su Wei 
    Abstract: In cloud computing environment, especially data-intensive systems, large amounts of data sets are stored in distributed data centres, and often be retrieved by users in different regions. To reduce the users' response time, replicating the popular data sets to multiple suitable data centers is an advisable choice, as tasks can access the data sets from a nearby site. Nevertheless, the data set replicas' suitable storage placement selection is still an important issue that should be solved urgently from the response time constraint view, for the reason that too much more replicas are infeasible in practice. In this paper, we first propose a comprehensive data set response time estimation model, then present a replica placement model based on Steiner tree. After that, an approximate replica placement algorithm under a response time constraint in the Cloud is given using Kruskal minimum spanning tree. At last, a practical and reasonable performance evaluation is designed and implemented. Both the theoretical analysis and simulations conducted on general (random) data sets show the efficiency and effectiveness of the proposed strategy in the cloud.
    Keywords: cloud computing; replicas placements; response time constraint; Steiner tree; minimum spanning tree algorithm.

Special Issue on: Intelligent Technologies in Modern Industries Challenges Facing Globalisation and Informatisation

  • Automatic recognition and defect compensation for calf leather   Order a copy of this article
    by Yu-Tang Lee, Chung Yeh 
    Abstract: Various defects existed on the surface of calf leather could affect its usable area and the salable price. No international criterion specifies the compensatory credits for calf leather surface defects which cause additional cost between supplier and purchaser in complicated negotiation process. This paper is to develop an artificial intellectual technique to implement the automatic recognition for types of leather defect and to compensate for leather defective unusable area in order to bridge trading gap between leather provider (supplier) and manufacturer (purchaser). An approach starts with scanning the images of collected samples of leather and classifies surface defects into seven categories by using digital image processing technique and blobs analysis which attributes hole, area, perimeter, ratio of perimeter, length and width of defects etc. Data of calf defects from sample is extracted to develop an automatic recognition system via artificial intellectual techniques ANN learning process is introduced to make a sustainable automatic recognition system used to identify types of categories for upcoming leathers under inspection, then incorporated with compensation criterion of specific category for leather defect which is accepted by both parties to conclude compensation credit. Study results the validity and accuracy of automatic defect recognition can meet requirement of practical implementation on leather business transaction; the mean error rate of recognizing leather defect is less than 2.16% and the mean deviation rate for compensation area is 0.03% under this simulated transaction.
    Keywords: Leather surface defects; artificial neural network; digit image processing; mean error rate of recognizing leather defect; mean deviation rate for the leather area.

  • Fitting the power spectrum of stationary random sequence   Order a copy of this article
    by Chang-qing ZHANG, Zhan-wen LIU, Zhi-gang XU 
    Abstract: Based on the spectral representation of zero-mean stationary process, another method of fitting the target power spectrum is obtained. The fitted random sequence is uniformly convergent with respect to the target sequence. Compared to the commonly used wave superposition method in simulating wind velocity fluctuations, its merits and deficiencies are shown.
    Keywords: Turbulent wind velocity sequence; stationary process; fitted power spectrum; wave superposition method.

  • Factors Influencing Cloud Computing Adoption for Higher Educational Institutes in India: A Fuzzy AHP Approach   Order a copy of this article
    by Mahak Sharma, Ruchita Gupta, Padmanav Acharya 
    Abstract: Information and communication technologies (ICT) are changing the ways of imparting education, providing learning opportunities and enhancing institutional performance. Cloud Computing (CC) helps in lightening the burden of massive technology investments required for improving performance. However, CC adoption in higher educational institutes in India is still in nascent phase. Therefore, the objective is to identify and rank the factors enabling CC adoption in the context. Fuzzy Analytic Hierarchy Process (FAHP) has been applied. Time to cater IT demand, security and relative advantage are found as the most critical factors. The findings will aid other institutes in adoption decision and gain competitive advantage.
    Keywords: Adoption; Cloud Computing; Higher Educational Institutes; India; Fuzzy Analytic Hierarchy Processing; Critical Factors.

  • A Blind Demodulation Algorithm of DSSS by Continuous Wavelet Transform   Order a copy of this article
    by Wei Huang, Xiangmo Zhao, Chao Wang 
    Abstract: This paper proposes a novel blind demodulation algorithm of the Direct Sequence Spread Spectrum Signal (DSSS) modulation with noise by using continuous wavelet transform. We chose Morlet wavelet with similarity and symmetry. The proposed algorithm can demodulate DSSS with a negative signal to noise ratio(SNR) without any prior knowledge. The simulated the bit error rate(BER) curves of the existing blind demodulation algorithms of DSSS are above the theoretical BER curve of the coherent demodulation or coincidence. Simulation result of new algorithm shows that BER curve of the blind demodulation of the wavelet transform is below the theoretical BER curve of coherent demodulation. The novel blind demodulation algorithm allows to obtain an 8dB gain in SNR terms compared with that obtained by the theoretical coherent modulation when SNR is 10^-4 .
    Keywords: DSSS; SNR; BER; continuous wavelet transform; blind demodulation.

  • E-HRM implementation,adoption and its predictors;A Case of Small and Medium Enterprises of Pakistan'   Order a copy of this article
    by Abdul Waheed, Miao Xiaoming 
    Abstract: The purpose of this study is to investigate the predictors of E-HRM implementation and adoption in the Small medium enterprise (SMEs) in the manufacturing sector. Three main predictors including conventional HRM practices, availability of resources and employees attitude towards E-HRM were analyzed. Data was collected through a questionnaire survey, and 500 employees participated in this survey. Results reveal that E-HRM heavily depends on employee attitude towards E-HRM and availability of resources. Conventional HRM practices including training and development, compensation and benefits, and performance appraisal also have an essential role. The readiness of implementing and adopting E-HRM practices in small and medium enterprises heavily dependent on expertise, financial and technical resources. This study will help managers to develop a strategy for effective implementation of E-HRM in Small, medium enterprises (SMEs) in the manufacturing sector.
    Keywords: E-HRM;Conventional HRM; Small Medium Enterprises; Pakistan SME’s; Implementation; Adoption.

  • Moderating Effect of Information Technology Ambidexterity linking New Human Resource Management practices and Innovation Performance   Order a copy of this article
    by Abdul Waheed, Miao Xiaoming 
    Abstract: This study aims to investigate the relationship between new human resource management (NHRM) practices and innovation performance. Further, the moderating role of IT ambidexterity was examined between NHRM and innovation performance. This study selected Pakistans largest IT-based semi-government organization National Database & Registration Authority (NADRA) as a case study. Data were collected from three major cities (Lahore, Gujranwala, and Jhelum) of Pakistan. 500 employees of NADRA participated in the survey-based research. The empirical results found the positive relationship between NHRM practices and innovation performance. The moderating influence of IT ambidexterity was also found in this study. Employees with high IT ambidexterity are more involved in innovation performance. Continuous adaption of technology enhances long-term competitive advantage. Therefore, utilizing new technologies and knowledge consistently is significant for the enhancement of innovation performance.
    Keywords: New HRM practices; Innovation performance; IT ambidexterity;IT flexibility; IT Standardization.

  • Canonical correlation analysis of the impact of ICT on the diversification performance   Order a copy of this article
    by Omar Alexánder León García, Juan Ignacio Igartua, Jaione Ganzarain 
    Abstract: The main objective of this study was to establish the relationship between the use of information and communication technologies (ICT) and the performance of business diversification within a sample of companies belonging to the Autonomous Community of the Basque Country. For this, a Canonical Correlation Analysis (CCA) was performed, taking the coefficients to explain the variance of the two sets of variables. . It can be affirmed that the ICT of general use, of electronic commerce and of relationship impact in the elements that compose the performance of the diversified company.
    Keywords: ICT; diversification; performance; canonical correlation.

Special Issue on: Information and Communication Technologies for Business Process Efficiency and Effectiveness

  • Impact of information and communication technologies on productivity growth   Order a copy of this article
    by Alma Maciulyte-Sniukiene, Mindaugas Butkus 
    Abstract: In modern economy information and communication technologies (ICT) play the essential role. The improvement of ICT infrastructure, developing ICT knowledge and usage can lead to economic growth due to higher productivity. However, this impact can depend on countries ICT investment or expenditure amount, reached ICT development and productivity levels. Moreover, ICT impact on productivity growth can occur after a certain period. Consequently, forming the ICT development strategies it is important to identify ICT impact period and impact differences between relatively high and low productivity countries. Authors examined the impact of ICT investments on productivity in EU countries covering the period of 1995-2015. Research results have revealed that ICT development positively and directly influences productivity, but this effect manifests with a lag in time. Moreover, it was found that the impact of ICT development on productivity is about twice bigger in countries with relatively high productivity level compared with countries that have relatively low productivity level.
    Keywords: ICT; ICT investment; labour productivity; productivity growth.

  • A Delphi-based study on the innovation practices in the Albanian financial sector   Order a copy of this article
    by Amali Cipi, Enida Pulaj( Brakaj) 
    Abstract: Based on an application of the Delphi technique, this paper aims to analyse the current situation of innovation practices in Albania, based on an application of the Delphi technique to a panel of Albanian financial institutions executives. Despite the short life of most of the financial companies in the Albanian trade market, results show that executives have a relatively good level of knowledge regarding the benefits of the innovation approach to the firm, but there is a lack of some innovation types used by their companies. Furthermore, there is a low level of investment amount to be spent in innovation, indicating a non-possibility to create new products or processes and thus not having the possibility to be a leader and create better promise for the company growth. Government is advised to consider innovation as a mediating factor to achieve better business performance and thus helping and promoting sustainable macroeconomic growth.
    Keywords: innovation; technology innovation; product innovation; Albania; Delphi technique; financial companies.

  • Does Social Media Use at Work Lower Productivity?   Order a copy of this article
    by Joseph Vithayathil, Majid Dadgar, John Kalu Osiri 
    Abstract: We conducted an empirical study that analyzed the relationship between the use of social media at work and project success at work. This study adds to the emerging literature on the impact of social media use on organizational outcomes. We found that only one of the four popular social media platforms studied adds value to the workplace. Specifically, we found the use of Facebook at work, whether controlling for age, gender and education or not, to be negatively associated with project success. The use of LinkedIn (with the controls) and the use of Other Social Media (without the controls) were both found to be positively associated with work project success. Other Social Media was used to capture all other social media platforms, including firm-specific or work-specific social media platforms. We explained our results using social network analysis (SNA), the strength of weak ties, and information diffusion theories. Our findings have implications for practice, policy and future research.
    Keywords: social media usage; project success; social network analysis; strength of weak ties.

  • Implementing ERP evaluation through a fuzzy analysis: an empirical investigation   Order a copy of this article
    by Maria Rosaria Marcone 
    Abstract: The purpose of this paper is to present an integrated manufacturing performance measurement through an (implemented) integrated information technology system to focus the organization on value streams and, by doing so, to improve performance, and, secondly, to analyze the results obtained. This study extends the literature on information systems (IS) integration by providing insights into a set of interrelationships that are relevant for the attainment of firm profitability from IS integration.rn The conceptual model for fitness evaluation was developed by literature review. The purpose of this paper is to develop a comprehensive model for fitness evaluation and to determine a fitness index using fuzzy methods. To test the hypotheses, we employed a multi-case study methodology. An evaluation of the improvement in efficiency of the processes was conducted on 21 medium sized enterprises (SMEs) which produce on the basis of orders, and have implemented a system of enterprise resource planning (ERP), in order to check the progress of each order and to increase the efficiency of the processes they are connected to. rn
    Keywords: information system; ERP; production system.

Special Issue on: Information Technology/Information Systems Applications in Enterprise Systems

  • Investigation and Analysis on Crowdsourcing for Improving Enterprise QoS   Order a copy of this article
    by Remya S, Sasikala R 
    Abstract: Crowd sourcing is treated as an open contest for a crowd of people known as workers. All workers can contribute their suggestions and solutions to the platform. Hence crowd sourcing can connect a large number of people and they can share their knowledge. The amount of unstructured data is increasing now. This is where crowd sourcing can help big data by breaking down data into mini chunks and have the power of crowd to do the organizing task. This helps big analytics companies focus on the core aspect of infrastructure and security. It also makes sense of the data and not invests resources in organizing data and this distributed environment can be solved intelligently. Here various crowd sourcing techniques in different aspects related to data pre-processing, performance approaches, security issues and applications are analysed. Out of these approaches the most efficient one in each are characterized. This survey helps to analyse the various issues in crowd sourcing and proposed some solutions for improving the quality and security of workers in crowd sourcing based on the literature survey
    Keywords: Enterprise; Crowd sourcing; Bigdata; K-means; QoS.

  • Assessing the Impact of Information Technology on Human Resource Practices: Evidence from Organisations in Ghana.   Order a copy of this article
    by Mayqueen Attatsitsey, Noble Osei-Bonsu 
    Abstract: Information Technology (IT) is universally regarded as an essential tool in enhancing the competitiveness of the economy of a country. There is consensus that IT has significant effects on the productivity of firms. This study focused on how modern Information Technology impacts on effectiveness and efficiency of HR practices. Human Resource Management practitioners generally use IT in the form of Human Resource Information System (HRIS) for the purposes of decision making in the field of HR. The main objective of this study was to examine the impact of IT on HR practices in organisations in Ghana. One hundred organizations were purposively sampled for the study. The descriptive survey methodology was used. Data was collected using a self-designed questionnaire made up of closed and open-ended questions and statements. Results revealed organizations awareness and use of the various HR-related software, and despite the fact that these software are costly, they, at the same time, generates terrific benefits.
    Keywords: Information Technology; Human Resource; Human Resource Information Systems; Ghana.

  • Congestion Management with Improved Real Power Transfer Using TCSC in Thirty Bus System   Order a copy of this article
    by Mohana Sundaram Kuppusamy, Kalaimani P 
    Abstract: Secure operation and reliable utilization of transmission lines is a challenging issue in deregulated power system. The scheduled power transactions are difficult due to the overloading of transmission lines in restructured power system as the electricity market has become more competitive. Due to congestion of transmission lines, the transfer of real power and the power system voltage profile are greatly affected in the power system. The aim of this research work is to increase the real power and the reactive power flowing in the lines of multibus system using thyristor controlled series compensator (TCSC). Real power transfer with reduced losses and improved voltage stability is an important factor in the present global scenario. This paper deals with the improvement of power flow in power transmission lines by series compensation device in thirty bus system with reduced congestion. The thirty bus system without and with thyristor controlled series compensation device (TCSC) is modeled and simulated and the results are presented. The simulation studies indicate a significant improvement in the real and the reactive power flow with the introduction of TCSC .The advantages of the proposed system include the smooth variations of the real and the reactive powers.
    Keywords: TCSC; Congestion Management; Real power flow; Voltage Stability; Available Transfer Capability.

    Abstract: The problem of classifying scenes from cricket video is addressed and a robust framework for this problem is proposed. It is proposed that the finite state machines (FSM) are suitable for detecting and classifying scenes and their usage is demonstrated for three types of events: wicket, six, four. This framework utilises the structural information of the scenes together with the low-level and mid-level features. Low level features of the video including motion and audio energy and a mid-level feature, body, are used in this approach. The transitions of the FSMs are determined by the features from each shot in the scene. The FSMs have been experimented on over 80 clips and convincing results have been achieved.
    Keywords: Fine State Machine.

  • Automatic Brain Tumor Detection using Image Processing and Data Mining Techniques   Order a copy of this article
    by Geetha Ramani R, Febronica Faustina, Shalika Siddique, Sivaselvi Krishnamoorthy 
    Abstract: In recent days, analysis on Magnetic Resonance Imaging (MRI) has extensively performed to understand the complex information in the human brain. Mostly, the pathological regions in the brain are detected using various MRI techniques. Depending upon the MRI technique specific regions may be exhibited better than other regions. These images are computationally analysed to identify the abnormal regions. In this work, glioma images are involved to detect the tumor regions in the brain using image processing and data mining techniques. Broadly, the pixels are grouped into tumor and tumor pixels using unsupervised as well as supervised data mining methods. Further, the tumor pixels are classified into four classes namely, edema, necrosis, enhancing tumor and non-enhancing tumor using supervised classification methods. K-means clustering could detect the tumor pixels with the accuracy of 94.64% whereas Random Forest classifier with 99.5% could identify the pixel classes correctly.
    Keywords: Image Processing; Data Mining; Clustering; Classification; Random Forest; Brain Tumor Detection;.

  • An Improved Mean Curvature Based Bending Model for Cloth Simulation   Order a copy of this article
    by Xiaohui Tan 
    Abstract: In cloth animation, the bending behavior of cloth is important for cloth simulation effects. The presentation of cloth bending properties plays a key role in cloth animation research because cloth is characterized by strong resistance to stretch while weak resistance to bending. This paper proposed an improved approximate nonlinear bending model based on local geometric information. In the dynamic simulation, cloth was divided into several regions according to mean curvature of surface. The bending force was updated according to the changes of the mean curvature in each region. The calculation of bending force was simple and accurate with the proposed model. Experimental results show that wrinkles and folds generated in a natural way with the improved model and the efficiency of simulation is improved compared with the original algorithm.
    Keywords: bending model; cloth simulation; mean curvature; surface segmentation.

  • Frequency Variations Management in Deregulated Environment using Intelligent Controller   Order a copy of this article
    by Chockalingam Aravind Vaithilingam, Yi Heng Ser, Ramani Kannan, Charles R Sarimuthu 
    Abstract: Information of the frequency variations is critical to restore the dynamics of power system network. In this paper a modified load frequency control method in the deregulated power system to restore back the frequency is proposed and analysed. The research is done using industry standard modelling tool and the frequency variations are investigated through the construction of the power system network. The distribution company participation matrix is used in the deregulated environment with number of Generation Company (GENCO) and Distribution Company (DISCO). Three type of controllers are applied to the proposed two-area system through load frequency control including the conventional and intelligent controllers. The deviation of the output frequency in each area and tie line exchange are studied. It is concluded that the modified load frequency control method using intelligent controller shows 10% improvement on the settling time and about 20% improvement on undershooting.
    Keywords: Load Frequency Control; Multi-Area Power System; Reliable Grid; Energy storage systems.

  • Automation of Smart Monitoring for Person Localization & Alerting Network   Order a copy of this article
    by Deepika Kripanithi 
    Abstract: my Person Localization and Alerting Network (myPLAN) is an application for cautioning connections in deadlock situations. myPLAN is a mobile Application (App) developed for Android enabled smartphone. The App invokes Global Positioning System (GPS) Application Programming Interface (API) from the smartphone. Android Operating System (OS) enables the GPS API to retrieve the geographical location data. The whereabouts of an individual are incorporated using GPS module and Wi-Fi networks that are embedded in the device. GPS and Wi-Fi sensors utilize triangulation techniques to pinpoint the exact location on the global map. The application involves in linking the entity with the blood relations. myPLAN App opens by passing an unique code in the phone. The entity can send help request to family associations and emergency vehicle equipments through the App. An individual can inform the associated people about the whereabouts in case of trouble. The person can alert the connections about the location and time via Short Message Service (SMS) and Electronic Mailing System (E-MAIL). Emergency dispatchers can be chosen based on the necessity. The GPS API in the mobile phone locates the relevant assistance in the specified radius from the place where the individual positioned. The information is sent to the emergency carriers through SMS with the entity details along with the location co-ordinates.
    Keywords: Application; Emergency; Global Positioning Systems; Location;rnLocalization; Positioning; Security; Sensors.

  • A Review on Feature Selection Methods for Improving the Performance of Classification in Educational Data Mining   Order a copy of this article
    by Maryam Zaffar, Manzoor Hashmani, Sameer Khan 
    Abstract: Educational Data Mining (EDM) evaluates and predicts students performance that assists to discover important factors affecting students academic performance and also guides educational managers to make appropriate decisions accordingly. The most common technique for discovering meaningful information from the educational database is classification. The accuracy of classification algorithms on educational data can be increased by applying Feature Selection Algorithms. Feature Selection Algorithms help in selecting robots and meaningful features for predicting students performance with high accuracy. This paper presents different EDM approaches for forecasting students performance using different data mining techniques. In addition, this paper also presents an evaluation of recent classification algorithms and feature selection algorithms used in Educational Data Mining. Furthermore, the paper will guide the researchers on new and possible dimensions in building a prediction model in EDM.
    Keywords: Educational Data Mining (EDM); Feature Selection in Educational Data Mining; Filter Feature Selection; Wrapper Feature Selection.

    by Suganthy M, Manjula S 
    Abstract: Among all biometric technologies, iris recognition is most accurate and high confidence authentication system. Due to the limitations in PCA based system, modified Principal Component Analysis (PCA) based feature extraction is proposed in iris recognition system. In the proposed system, features are extracted using Gaussian Kernal PCA (GKPCA) and classified using Support Vector Machine (SVM). GKPCA and SVM algorithms are evaluated using CASIA V3 Iris database. The performances are compared with the existing PCA based system. The proposed system achieves 96.67% of accuracy for 256 features using GKPCA linear SVM. False Acceptance Rate (FAR) and False Rejection Rate (FRR) are 0 and 3 respectively, for linear SVM. The results show that the proposed system performs accurate localization of patterns even in non-ideal conditions.
    Keywords: Gaussian Kernal Principal Component Analysis; Support Vector Machine; Iris recognition; False Acceptance Rate.

Special Issue on: ICSS 2017 Service Computing Technologies and Applications

  • Study on Image Feature Recognition Algorithm and Its Application in Public Security Management   Order a copy of this article
    by Xiaoyi Yang, Qian Wu, Xinmei Deng 
    Abstract: Public security is the topic of common concern of the government and the common people. In order to solve the puzzle of image distortion, being complex in algorithm and being difficult to take into account of the overall structure and details of the image in the image recognition algorithm of public security management system, the paper presented a fusion algorithm of texture consistency measure based on bi-orthogonal wavelet transform. By means of the orthogonal wavelet transform, the wavelet transform is used to decompose the source image, and then the low frequency and high frequency wavelet coefficient matrix of the fused image is determined according to a certain proportion and texture measure, thus the fusion image is obtained. The experimental results show that the algorithm can not only distinguish the false edges of the image, but also enrich the details of the image and take into account the overall visual image, so it can better improve the recognition effect of the image in the public security management system.
    Keywords: Public security; security management system; public security management; government concern; image distortion; overall structure; details information; orthogonal wavelet transform&; wavelet coefficient matrix; texture measure&; false edges; enrich the details.

  • Identifying Inter-Organizational Resource-Service Sequences Based on Similarity for Collaborative Tasks   Order a copy of this article
    by Haibo Li, Mengxia Liang 
    Abstract: To improve the efficiency of a collaborative task, collaboration of resource services in a business process is important. From the business process viewpoint, the resource services should be provided as service flows to business processes. Resource services are selected and used by different organizations. This reduces the efficiency of the collaboration of resource services among different organizations. To solve this problem, a similarity based approach is proposed to identify the resource service sequences in an inter-organizational business process. Manufacturing is used as an example to discuss the problem. First, a modeling method, RSTM (resource service temporal relationship modeling), is presented. In RSTM, the temporal relationship of resource services is described, which is resolved according to the big data of business. Then, based on the RSTM, all resource service sequences are obtained directly. Next, an algorithm of similarity is presented to calculate the isomorphic resource service sequences with inter-organization consideration. Finally, the proposed approach is tested with a simulation experiment, and the results show that it is very promising.
    Keywords: collaborative task; inter-organization; resource service sequence; big data.

  • A Collusion-Resistant Public Auditing Scheme for Shared Cloud Data   Order a copy of this article
    by Fulin Nan, Hui Tian, Tian Wang, Yiqiao Cai, Yonghong Chen 
    Abstract: With the increasing popularity of collaboration in the cloud, shared data have become a new branch of cloud data, which also brings new challenges for remote integrity auditing. One of the most serious concerns is the potential collusion attack when some users leave the shared group. To address the concern, this paper presents a novel public auditing scheme for shared data. Differing from the existing works, we introduce a new entity called local authentication server to finalize the block tags of shared data, namely re-signing the data block once again for security, which can thereby prevent the collusion attack effectively. Moreover, thanks to the new mechanism of tag generation, our scheme relieves the user manager of the burden of management and largely reduces the computation and communication overheads in the user revocation scenario. In addition, we extend the scheme to support batch auditing by employing the aggregate BLS signature technique. We formally prove the security of the proposed scheme and evaluate its performance by comprehensive experiments and comparisons with the state-of-art schemes. The results demonstrate that the proposed scheme can effectively achieve the public auditing for shared data while providing excellent security, and outperforms the previous ones in the computation and communication overheads in the user revocation phases.
    Keywords: cloud storage; shared data; public auditing; collusion attack; user revocation; local authentication server.

  • Cost and Green Aware Workload Migration on Geo-Distributed Data Centers   Order a copy of this article
    by Jiacheng Jiang, Yingbo Wu, De Xiang, Keqin Yu, Tianhui Wang 
    Abstract: With the development of the inter-datacenter (inter-DC) virtual machine migration technology, it is possible to reduce the cost of electricity and the environment by using the workload migration across the data center. This paper presents a solution - cost and green aware workload migration algorithm (CGWM) that utilizing the difference of electricity prices, CO2 emissions and water consumption between different geographical locations to manage the workload. CGWM attempts to reduce electricity costs, carbon emissions and water consumption. When the three optimization goals conflict, CGWM first to ensure the reduction of electricity cost, and then by adjusting the weight factor to make CGWM more biased to optimize the carbon dioxide or water consumption. Simulation results show CGWM can reduce electricity costs while controlling carbon dioxide emissions and water consumption.
    Keywords: Cloud Computing; VM Migration; Geographical Datacenters; Green Datacenters; Carbon Dioxide Emissions; Greedy Algorithm.

  • Parallel Na   Order a copy of this article
    by Shiqi Wen, Cheng Wang, Haibo Li, Guoqi Zheng 
    Abstract: Collaborative filtering (CF) algorithms are widely used in a lot of recommender systems. However, space-time overhead and high computational complexity hinder their use in large scale systems. This paper implements the parallel Na
    Keywords: Parallel Naïve Bayes regression model; model-based collaborative filtering; big data; Hadoop; MapReduce.

  • A Semi-Supervised Approach of Graph-based with Local and Global Consistency   Order a copy of this article
    by Yihao Zhang 
    Abstract: An approach of graph-based semi-supervised learning is proposed that consider the local and global consistency of data. Like most graph-based semi-supervised learning, the algorithm mainly focused on two key issues: the graph construction and the manifold regularization framework. In the graph construction, these labeled and unlabeled data are represented as vertices encoding edges weights with the similarity of instances, which means that not only the local geometry information but also the class information are utilized. In manifold regularization framework, the cost function contains two terms of smoothness constraint and fitting constraint, it is sufficiently smooth with respect to the intrinsic structure revealed by known labeled and unlabeled instances. Specifically, we design the algorithm that uses the normalized Laplacian eigenvectors, which ensure the cost function can converge to closed form expression, and then we provide the convergence proof. Experimental results on various datasets and entity relationship classification show that the proposed algorithm mostly outperforms the popular classification algorithm.
    Keywords: Semi-supervised learning; graph construction; manifold regularization; data consistency.

  • Diabetes Index Evaluation Framework Based on Data Mining Technology: a genetic factor involved solution for predicting diabetes risk   Order a copy of this article
    by Yao Wang, Dianhui Chu, Mingqiang Song 
    Abstract: With the development of data mining, scientists began to apply information technology to solve medical problems. In this context, the idea of auxiliary medical service emerged. The purpose of this study is to propose a new framework predicting the probability of suffering from diabetes via DI (diabetes index), which is defined as a score to assess the diabetes-related risk of the participant. DI is calculated based on a diabetic clinical dataset, and the SVM model is applied as well. Particularly, genetic feature is innovatively introduced as an important factor in view of the fact that people with family history are more vulnerable to diabetes. The framework is applied to implement a diabetes auxiliary evaluation system. After a set of comprehensive experiments, the assessment result is supposed to identify risk of the disease at an early stage, which contributes to a deeper understanding of ones own health conditions.
    Keywords: data mining; diabetes evaluation framework; diabetes index; genetic feature; SVM; diabetes auxiliary evaluation system.

  • Voice Transmission through WiFi   Order a copy of this article
    by Shalini Goel, Vipul Garg, Deepak Garg, Manshiv Kathait 
    Abstract: In the current dynamic era of digital communication, one of the key requirements is of free connectivity. In addition to that, one of the most anticipated issues is that connectivity is not available in most of the areas. Also, at several geographical locations, it is not possible to install infrastructure based networks due to cost-effectiveness or non-vulnerability terrains (cellular blind spots like desert, battlefields, forests etc.) Therefore, application for free connectivity needs to be developed which can be applied to these infrastructure-less wireless standards (Wi-Fi, Bluetooth) to improve them. In the light of the above-mentioned discussion, an android application has been developed in the ongoing project for android based wireless devices and has been named as Wi-Fi_Intercom. Wi-Fi_Intercom uses classes which allows its user to connect with other connected users through Wi-Fi wireless standard using P2P (point to point) or WLAN connection as a means of communication between Android-based wireless devices. The application will also allow a mobile user to search and call other connected users within the Wi-Fi range through the mobile application. Each mobile device connects to a WLAN router and identifies itself in the routing table. The application was successfully developed and the issues as stated before were successfully resolved.
    Keywords: WLAN; P2P; Protocols; Wireless standards; Connectivity; Wireless Infrastructure; Mobile Devices.

  • A Fuzzy Inference Based Trust Model Estimation System for Service Selection in Cloud computing   Order a copy of this article
    by Roney Thomas, Priya Govindaraj 
    Abstract: Cloud Computing assures to be the fundamental changeover in the evolution of the computing world. The cloud computing helps the users to have no Capex, which is making a lot of businesses and individuals to it. Lot of services are provided by cloud, for users to meet their applications functional as well as non-functional. Due to the vast number of available services, ambiguous requirements, security and trust measures and efficiency provided by different cloud providers, it is often difficult for the users to select the cloud services. This paper, proposes a system that assesses trust of cloud services by providers using a fuzzy based inference system for selecting the services dynamically.
    Keywords: Cloud computing; Trust; Service Selection; Fuzzy inference; FCL; jFuzzyLogic.