- Все статьи 626
-
Подпишитесь, чтобы получать уведомления о публикации новых выпусков
International Journal of Information Engineering and Electronic Business @ijieeb
Статьи журнала - International Journal of Information Engineering and Electronic Business
Все статьи: 626

Iskandar S.E., Nur Isma Fitriani, Syahruddin S., Yuli Agustina
Статья научная
The purpose of this study is basically to explore (know and study) the effectiveness of intelligence which in this case consists of variables of intellectual intelligence (IQ), emotional intelligence (EQ), and spiritual intelligence (SQ) on employee performance in a retail business organization (case study at eramart store in Timbau sub-district, Tenggarong, Indonesia). The sample in this study was 26 employees of eramart store in Timbau sub-district, Tenggarong, Indonesia. Sampling technique by random sampling. The analysis tool used is a multiple regression equation with a hypothesis test used by the F and t tests. The calculation result of the F test obtained F count is 45.252, while the table F value is obtained a value of 2.80 this means that (Fcount 45, 252 > Ft 2.80) with a significant value of < 0.05, so it can be said that the variables of intellectual intelligence, emotional intelligence and spiritual intelligence together / simultaneously are able to show their influence on employee performance at the eramart store in Timbau sub-district, Tenggarong or it can be explained that the regression model that was built can be used to predict the size of employee performance at the eramart store in Timbau sub-district, Tenggarong, so that the first hypothesis in this study was accepted. The three free variables, namely intellectual intelligence, emotional intelligence, and spiritual intelligence, simultaneously have a meaningful (real) effect on employee performance in retail business organizations (case study at eramart store in Timbau sub-district, Tenggarong, Indonesia). The three free variables were able to explain changes in employee performance by 84.2% (Adjusted R square = 0.842) while the remaining 15.2% was influenced by other variables that were not included in this study such as career development, compensation, work stress. From the three results of the t test above, the partial correlation value of the spiritual intelligence variable is the largest compared to the intellectual intelligence and emotional intelligence variables, which is 0.617 or 61.7%, From this description, it can be concluded that spiritual intelligence is the intelligence we use to access our deepest meanings, values, goals, and highest motivations. Spiritual intelligence is our moral intelligence, which gives us an innate ability to distinguish between right and wrong. Spiritual intelligence is the intelligence we use to create goodness, truth, beauty and compassion in our lives. The spiritual intelligence of Eramart Timbau Tenggarong minimarket employees is likely to be largely influenced by the proximity of mosque facilities near the Eramart Timbau Tenggarong minimarket and most of them live close to the mosque/musholla, so that most employees rarely miss prayer time when working when the time comes.
Бесплатно

A. Tella, T.A. Ogundiya
Статья научная
The study determined the effects of concept mapping and guided discovery instructional strategies on student’s learning achievement in Redox concept in Chemistry in Oyo State, Nigeria. The pretest-posttest control group quasi experimental design with 3x2 factorial matrix was adopted, while six schools with one intact class each; two each for experimental groups and two for control group were used. A total of 176 senior secondary school 2 Chemistry students participated in the study. A validated Chemistry Student Achievement Test (r = 0.77) was used for data collection, while Analysis of covariance and Bonferroni post hoc were used to analyze the data collected at 0.05 level of significance. There was a significant main effect of treatment (F(2, 175) =11.84; p<0.05, partial η2 = 0.13) on student’s achievement. The participants in concept mapping strategy obtained the highest post achievement mean score (12.71), followed by guided discovery instructional strategy (9.24) and conventional strategy (8.60) groups. There was no significant main effect of gender on student’s achievement. There was no significant two- way interaction effect of treatment and gender on student’s achievement in Redox concept of chemistry. Concept mapping and guided discovery instructional strategies enhanced student’s achievement in Redox concept of chemistry. It is therefore recommended that chemistry teachers should adopt these strategies to improve student’s achievement in Chemistry.
Бесплатно

Peter Namisiko, Maurice Sakwa, Mwangi Waweru
Статья научная
The study sought to investigate the effects of network infrastructure challenges on open ICT infrastructure sharing by Mobile Service Providers in Kenya. Specifically, the study investigated network sharing challenges as the main determinants to open ICT infrastructure sharing by Mobile Service Providers in Kenya. The empirical literature revealed that Open ICT Infrastructure sharing can substantially reduce capital and operational expenditure thereby increasing the speed of network rollouts, improve coverage and help meet the capacity demands of increased data traffic. Other reviews revealed that each sharing environment is different and may have pressures and priorities that change throughout the process of establishing a partnership between two operators with a view to developing a framework for Open ICT infrastructure sharing. Data was collected from employees from Safaricom, Airtel and Orange in order to study the population. A target population of 800 employees from the three Mobile Service Providers in Kenya was considered. Both Stratified and purposive sampling techniques were used to identify the respondents. A sample size of 86 respondents was used in this study using both structured questionnaires and scheduled interviews. Both descriptive and inferential statistics were used to analyse data collected from respondents in this study. Network service control and Coverage, Network growth and Experience and Resources were identified as the main challenges facing Network sharing by Mobile Service Providers. It is hoped that the results obtained from this study will be beneficial to stakeholders in Mobile Service industry formulate policies that promote ICT Infrastructure sharing with a view to promoting universal access and saving on expenditures.
Бесплатно

V.K. NARENDIRA KUMAR, B. SRINIVASAN, P.NARENDRAN
Статья научная
Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
Бесплатно

Worku Abebe Degife, Dr.ing. Abiot Sinamo
Статья научная
In this paper, we have focused on the data mining technique on market data to establish meaningful relationships or patterns to determine the determinate critical factors of commodity price. The data is taken from Ethiopia commodity exchange and 18141 data sets were used. The dataset contains all main information. The hybrid methodology is followed to explore the application of data mining on the market dataset. Data cleaning and data transformation were used for preprocessing the data. WEKA 3.8.1 data mining tool, classification algorithms are applied as a means to address the research problem. The classification task was made using J48 decision tree classification algorithms, and different experimentations were conducted. The experiments have been done using pruning and unpruning for all attributes. The developed models were evaluated using the standard metrics of accuracy, ROC area. The most effective model to determine the determinate critical factors for the commodity has an accuracy of 88.35% and this result is a good experiment result.
Бесплатно

Paul E. Shao, Mussa Ally Dida
Статья научная
The Electronic Fiscal Device (EFD) Machines have been operating in Tanzania since the year 2010 for the purpose of helping the Tanzania Revenue Authority (TRA) to increase revenues from tax collection. Regard-less of years of its existence, there are still reported cases of tax evasion, and this study was conducted to review the current tax collection system and analyze require-ments for the development of Stock Tracking Module (STM) to be embedded in the current tax collection sys-tem. This paper earmarked some problems relating to Electronic Fiscal Device Machine Management System (EFDMS) and EFD machine. Data collection was done in Kilimanjaro and Arusha, the two regions of Tanzania that involved tax officers and Information Technology (IT) personnel from TRA and drug traders. Data collection process involved both qualitative and quantitative methods to gather data for the development of the system Stock Tracking Module (STM) such as interview, questionnaire, role-playing and observation. The major findings of the study: The efficiency of the EFDMS is at average, thus, need some improvements. The major problems encountered by TRA are; under declaration of sales by traders, non-usage of EFD machines, usage of fake EFD, overestimate of expenses, division of business and conducting business in unknown areas. The proposed solution will reduce the existing challenges and increase revenue collections, reduce manual work and human resource, and improve accuracy on tax estimation process.
Бесплатно

Emotion Recognition System Based On Skew Gaussian Mixture Model and MFCC Coefficients
M.ChinnaRao, A.V.S.N.Murthy, Ch.Satyanarayana
Статья научная
Emotion recognition is an important research area in speech recognition. The features of the emotions will affect the recognition efficiency of the speech recognition systems. Various techniques are used in identifying the emotions. In this paper a novel methodology for identification of emotions generated from speech signals has been addressed. This system is proposed using Skew Gaussian mixture model. The proposed model has been experimented over a gender independent emotion database. In order to extract the features from the speech signals cepstral coefficients are used. The developed model is tested using real-time speech data set and also using the standard and data set of Berlin. This model is evaluated in the presence of noise and without noise the efficiency of the model is evaluated and is presented by using confusion matrix.
Бесплатно

Enable Better and Timelier Decision-Making Using Real-Time Business Intelligence System
Darshan M. Tank
Статья научная
Today's businesses need support when making decisions. Business intelligence (BI) helps businesses to make decisions based on good pre-analysis and documented data, and enables information to be presented when and where the decisions need to be made. Real time business intelligence (RTBI) presents numbers in real time, providing the decision makers at the operational and tactical layers with data as fresh as it can be. By having accurate, fresher and a bigger amount of data, businesses will be able to make decisions in a faster pace, and eliminate tedious complexity of the decision-making process. The objective of this research is to show that a real time business intelligence solution would be beneficial for supporting the operational and tactical layers of decision-making within an organization. By implementing an RTBI solution, it would provide the decision-maker with fresh and reliant data to base the decisions on. Visualization of the current decision processes showed that by adding a real time business intelligence solution it would help eliminate the use of intuition, as there would be more data available and the decisions can be made where the work is performed. The aim of this research is to contribute by visualizing how a real time business intelligence solution can shorten a complex decision process by giving the correct information to the right people. Organizations need to address potential challenges as part of a pre-project of a real time business intelligence implementation.
Бесплатно

Enhanced Password Based Security System Based on User Behavior using Neural Networks
Preet Inder Singh, Gour Sundar Mitra Thakur
Статья научная
There are multiple numbers of security systems are available to protect your computer/resources. Among them, password based systems are the most commonly used system due to its simplicity, applicability and cost effectiveness But these types of systems have higher sensitivity to cyber-attack. Most of the advanced methods for authentication based on password security encrypt the contents of password before storing or transmitting in the physical domain. But all conventional encryption methods are having its own limitations, generally either in terms of complexity or in terms of efficiency. In this paper an enhanced password based security system has been proposed based on user typing behavior, which will attempt to identify authenticity of any user failing to login in first few attempts by analyzing the basic user behaviors/activities and finally training them through neural network and classifying them as genuine or intruder.
Бесплатно

Enhanced Word Sense Disambiguation Algorithm for Afaan Oromoo
Abdo Ababor Abafogi
Статья научная
In various circumstances, the same word can mean differently based on the usage of the word in a particular sentence. The aim of word sense disambiguation (WSD) is to precisely understand the meaning of a word in particular usage. WSD utilized in several applications of natural language to interpret an ambiguous word contextually. This paper enhances a statistical algorithm proposed by Abdo [36] that performs a task of WSD for Afaan Oromoo (one of under-resourced language spoken in East Africa by nearly 50% of Ethiopians). The paper evaluates appropriate methods that used to increase the performance of disambiguation for the language with and without morphology consideration. The algorithm evaluated by 249 sentences with four evaluation metrics: recall, precision, F1 and accuracy. The evaluation result has achieved state of the art for Afaan Oromoo. Finally, future direction is highlighted for further research of the task on the language.
Бесплатно

Enhancing Employee Onboarding through Blockchain-Based Identity Verification in HR Management
Priya Chanda, Pritpal Singh, Mukesh Kumar, Vivek Bhardwaj
Статья научная
This research paper explores Blockchain (BC) technology-based identity verification's role in streamlining and securing the employee onboarding process within Human Resource (HR) management. It addresses this technology's potential benefits, challenges, and limitations in enhancing HR practices. This study is grounded in the theoretical foundation of BC technology and its applications. It examines existing identity verification systems in HR management and delves into the potential implications of adopting BC-based solutions. This research employs a comprehensive design encompassing a discussion of the background, research problem, objectives, and significance. A detailed overview of BC technology and its applications and an analysis of existing identity verification systems are presented. The study employs a well-defined research design, including a sampling strategy, sample size determination, data collection methods, and data analysis techniques. The study's findings reveal that BC-based identity verification has the potential to streamline and secure the employee onboarding process in HR management. However, the investigation also identified scalability, interoperability, and data security challenges. These findings contribute to understanding the feasibility of adopting BC technology in HR practices. The study informs HR managers and BC developers on the potential benefits and hurdles of implementing BC-based identity verification, enabling them to make informed decisions.
Бесплатно

Enhancing Mobile Software Developer Selection through Integrated F-AHP and F-TOPSIS Methods
Murnawan, Vaya Viora Novitasari
Статья научная
This study delves into the impact of employee recruiting within the dynamic and fiercely competitive realm of information technology (IT), focusing on the role of mobile software developers in a software development company situated in Bandung, Indonesia. Given that the quality of employees and their alignment with organizational needs are pivotal drivers of productivity and overall performance, the recruitment process assumes paramount importance. However, this process is riddled with complexity and challenges, stemming from the need to define precise criteria and navigate decision-making amidst uncertainty and ambiguity. To confront these challenges, this research advocates for the utilization of the Fuzzy Analytic Hierarchy Process (F-AHP) and Fuzzy Technique for Order of Preference by Similarity to Ideal Solution (F-TOPSIS). The F-AHP method, employing Chang's extent analysis approach, assists in establishing weights for uncertain criteria. Meanwhile, F-TOPSIS is leveraged to evaluate alternatives based on predefined criteria. The focal point of this study is the selection of mobile software developers within a software development company in Bandung, Indonesia. Decision-makers, drawing insights from policy documents and assessment forms, identified pertinent criteria and sub-criteria. Utilizing F-AHP, they determined the weights for criteria and sub-criteria through paired comparisons using fuzzy numbers. Subsequently, F-TOPSIS was applied to rank 10 mobile software developer candidates, culminating in the identification of alternative-7 (CK-7) as the top mobile software developer candidate. In essence, the application of F-AHP and F-TOPSIS methods presents an effective approach to navigate the complexity of Multi-Criteria Decision Making (MCDM) in employee selection, particularly within the competitive landscape of the information technology industry. This study's findings underscore the significance of employing advanced decision-making techniques to enhance the efficiency and effectiveness of employee recruitment processes, thereby bolstering organizational performance and competitiveness.
Бесплатно

Enhancing Nigerian Telecommunication Customer Service Channels Using Self-Service Software Model
Adamu Abubakar, Hyacinth C. Inyiama, Olayemi Mikail Olaniyi, Muhammad Bashir Abdullahi
Статья научная
Until recently, the most common methods used by Nigerian Telecommunication Operators for providing services to their customers include: customer service centers and online channels. With the rapid increase in the number of customers, the existing channels of responding to customers queries through walk in centers and online customer agent cannot be adequate due to the time required to respond to each customer's queries. Hence the need to provide an alternative channel that will often provide faster, reliable, convenient, less expensive and most affordable customer service. In this paper, a self-service model was developed for Nigerian Telecommunications Operators to improve customer service delivery. Self-Service Software Model (SSSM) allows customers to request for specific services without interacting with customer care representative at their own convenient time and have these services delivered to them within a short period of time. SSSM was designed using Model-View-Controller design pattern and implemented using Hypertext Markup Language, Cascading Style Sheet and MySQL relational database management. The prototype of the SSSM was tested with data collected and analysed from three Telecommunication subscribers in Nigeria. The results of the study showed that the model allows customers to request for specific services at their own convenience in a timely manner and it is faster, reliable, less expensive, and reduces cost of maintaining hardware, software and overhead cost of existing customer service delivery.
Бесплатно

Enhancing Traceability in Agricultural Supply Chain Using Blockchain Technology
Vedant Sharma, Anitha Palakshappa, Syed Adil Naqvi
Статья научная
The work highlights exploring the usage of blockchain technology for enhancing traceability in agricultural supply chain management. The aim is to develop a secure and transparent system, which improves the easy tracking and tracing of agricultural products from the point of origin until it reaches the end consumer. Currently, Blockchain is a technology, which provides security in various fields of transactions. The work utilizes to improve supply chain efficiency, increase transparency and accountability, and enhance consumer trust in the agricultural products. The system will utilize smart contracts to automate processes and ensure compliance with regulations and standards, which improves supply chain efficiency. Smart contracts enable agreement between two parties present in the supply chain. Further, the financial transactions can be improved with the help of block chain. Additional, the work will also provide recommendations for companies and organizations looking to implement blockchain-based results in their supply chain management. The work implements an application using ganache, solidity and truffle. Ethereum block chain is used as primary infrastructure for the application. Smart contracts generated using solidity is deployed into Ethereum network using truffle. The deployment of the application in agricultural sectors improves the accountability in the field of the supply chain. The deployment in a wider range will avoid manipulation of the data. Agricultural supply chain tracing website involves the use of several tools and technologies, including Ganache, Solidity, and Truffle. The system uses the Ethereum blockchain as the underlying infrastructure to store and manage supply chain data securely and transparently. The smart contracts in the supply chain tracing system are generated using Solidity and deployed to the Ethereum network using Truffle.
Бесплатно

Ensembles of Classification Methods for Data Mining Applications
M.Govindarajan
Статья научная
One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed using classifiers in both homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of real and benchmark data sets of data mining applications like intrusion detection, direct marketing and signature verification. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase and combining phase. A wide range of comparative experiments are conducted for real and benchmark data sets of direct marketing. The accuracy of base classifiers is compared with homogeneous and heterogeneous models for data mining problem. The proposed ensemble methods provide significant improvement of accuracy compared to individual Classifiers and also heterogeneous models exhibit better results than homogeneous models for real and benchmark data sets of data mining applications.
Бесплатно

Entity Based Distinctive Secure Storage and Control Enhancement in Cloud
Divesh Kumar, Amit Sharma, Surjan Singh
Статья научная
Cloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means "everywhere" and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access.
Бесплатно

Entrepreneurial Development of "Ojek Sampah" (OJAH) through Android Applications
Yosua Damas Sadewo, Pebria Dheni Purnasari
Статья научная
The purpose of this research is to develop application-based "Ojah" entrepreneurship. This research will be conducted using the type of Research and Development. The entrepreneurship of the "Ojah" has been developed in an application that will become a medium for collecting waste. Data collection that will be used in this research is to use (1) Observation, which will be carried out for the maintenance of the development process and product testing (2) validation sheets, used as instruments in testing, and validation of the developed product (3) The questionnaire given to the public or users of the "Ojah" application to see the characteristics from the application used, a satisfaction questionnaire will also be used to measure the effectiveness of the resulting product (4) Field notes that are carried out simultaneously with the implementation of product trials that contain things that happened during the trial product; (5) Documentation that includes images or photographs during the research development being carried out. The results of the research show evidence that the development of the "Ojah" application. The results showed that the development of the android application-based garbage motorcycle taxi business showed measurable success through assessments conducted by several parties, including media experts, entrepreneurship experts, and users of android app-based "Ojah" services. Validation results by media experts and entrepreneurial experts showed that both businesses and applications developed to support The "Ojah" business are in a decent category. The validity score given by expert validators is 86.6 from entrepreneurial experts. In contrast, media experts provide an assessment of 84.24. Based on limited scale trials, the android-based "Ojah" application has characteristics that deserve to use in terms of practicality, use, service, and completeness, with a feasibility score of 77.35.
Бесплатно

Epidemic Dynamics for the Two-stage Model on Scale-free Networks
Maoxing Liu, Yunli Zhang, Wei Han
Статья научная
In this paper, we will study a two-stage model on complex networks. The dynamic behaviors of the model on a heterogeneous scale-free (SF) network are considered, where the absence of the threshold on the SF network is demonstrated, and the stability of the disease-free equilibrium is obtained. Four immunization strategies, proportional immunization, targeted immunization, acquaintance immunization and active immunization are applied in this model. We show that both targeted and acquaintance immunization strategies compare favorably to a proportional scheme in terms of effectiveness. For active immunization, the threshold is easier to apply practically.
Бесплатно

Ergodic Capacity of MIMO Channel in Multipath Fading Environment
Rafik Ahmad, Devesh Pratap Singh, Mitali Singh
Статья научная
The demand for the higher bandwidth is continuously increasing, and to cater to wireless communication can be used. The bandwidth has a close relationship with data-rates in turn has a dependency with channel capacity. In this paper, the channel capacity is estimated when CSI is known/not known at the transmitter and it has been shown that the knowledge of the CSI at the transmitter may not be very useful. The channel capacity for the random MIMO channels is also estimated through simulation and outage capacity is discussed. Finally, MIMO channel capacity in the presence of antenna correlation effect is estimated and obtained results are discussed.
Бесплатно

Sahana Das, Kaushik Roy, Chanchal K. Saha
Статья научная
The most widely accepted method of monitoring the fetal heart rate and uterine activity of the mother is using Cardiotocograph (CTG). It simultaneously captures these two signals and correlate them to find the status of the fetus. This method is preferred by obstetricians since it is non-invasive as well as cost-effective. Though used widely, the specificity and predictive precision has not been undisputable. The main reason behind this is due to the contradiction in clinicians opinions. The two main components of CTG are Baseline and Variability which provide a thorough idea about the state of the fetal-health when CTG signals are inspected visually. These parameters are indicative of the oxygen saturation level in the fetal blood. Automated detection and analysis of these parameters is necessary for early and accurate detection of hypoxia, thus avoiding further compromise. Results of the proposed algorithm were compared with the visual assessment performed by three clinicians in this field using various statistical techniques like Confidence Interval (CI), paired sample t-test and Bland-Altman plot. The agreement between the proposed method and the clinicians’ evaluation is strong.
Бесплатно
- О проекте
- Правообладателям
- Правила пользования
- Контакты
- Разработчик: ООО "Технологии мобильного чтения"
Государственная аккредитация IT: АО-20230321-12352390637-3 | Минцифры России - 2024 © SciUp.org — Платформа публикаций в области науки, технологий, медицины, образования и литературы. "SciUp" — зарегистрированный товарный знак. Все права защищены.