Search results for: ICT services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1062

Search results for: ICT services

852 Touch Interaction through Tagging Context

Authors: Gabriel Chavira, Jorge Orozco, Salvador Nava, Eduardo Álvarez, Julio Rolón, Roberto Pichardo

Abstract:

Ambient Intelligence promotes a shift in computing which involves fitting-out the environments with devices to support context-aware applications. One of main objectives is the reduction to a minimum of the user’s interactive effort, the diversity and quantity of devices with which people are surrounded with, in existing environments; increase the level of difficulty to achieve this goal. The mobile phones and their amazing global penetration, makes it an excellent device for delivering new services to the user, without requiring a learning effort. The environment will have to be able to perceive all of the interaction techniques. In this paper, we present the PICTAC model (Perceiving touch Interaction through TAgging Context), which similarly delivers service to members of a research group.

Keywords: Ambient Intelligence, Tagging Context, Touch Interaction, Touching Services.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1834
851 On the Dynamic Model of Service Innovation in Manufacturing Industry

Authors: Yongyoon Suh, Chulhyun Kim, Moon-soo Kim

Abstract:

As the trend of manufacturing is being dominated depending on services, products and processes are more and more related with sophisticated services. Thus, this research starts with the discussion about integration of the product, process, and service in the innovation process. In particular, this paper sets out some foundations for a theory of service innovation in the field of manufacturing, and proposes the dynamic model of service innovation related to product and process. Two dynamic models of service innovation are suggested to investigate major tendencies and dynamic variations during the innovation cycle: co-innovation and sequential innovation. To structure dynamic models of product, process, and service innovation, the innovation stages in which two models are mainly achieved are identified. The research would encourage manufacturers to formulate strategy and planning for service development with product and process.

Keywords: dynamic model, service innovation, service innovation models, innovation cycle, manufacturing industry.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2019
850 Object Negotiation Mechanism for an Intelligent Environment Using Event Agents

Authors: Chiung-Hui Chen

Abstract:

With advancements in science and technology, the concept of the Internet of Things (IoT) has gradually developed. The development of the intelligent environment adds intelligence to objects in the living space by using the IoT. In the smart environment, when multiple users share the living space, if different service requirements from different users arise, then the context-aware system will have conflicting situations for making decisions about providing services. Therefore, the purpose of establishing a communication and negotiation mechanism among objects in the intelligent environment is to resolve those service conflicts among users. This study proposes developing a decision-making methodology that uses “Event Agents” as its core. When the sensor system receives information, it evaluates a user’s current events and conditions; analyses object, location, time, and environmental information; calculates the priority of the object; and provides the user services based on the event. Moreover, when the event is not single but overlaps with another, conflicts arise. This study adopts the “Multiple Events Correlation Matrix” in order to calculate the degree values of incidents and support values for each object. The matrix uses these values as the basis for making inferences for system service, and to further determine appropriate services when there is a conflict.

Keywords: Internet of things, intelligent object, event agents, negotiation mechanism, degree of similarity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1190
849 Member Investment Willingness in Agricultural Cooperatives in Shaanxi (China)

Authors: Lijia Wang, Xuexi Huo

Abstract:

This study analyzes characteristics determining member’s willingness to invest in cooperatives using ordered logit model. The data were collected in a field survey among 122 cooperative members in north-central China. The descriptive analysis of survey evidence suggests that cooperatives in China generally having poor ability to deliver the processing services related to product package, grading, and storage, performing worse in profitability, inability of providing returns to capital and obtaining agricultural loan. The regression results demonstrate that members’ farm size, their satisfaction with cooperative price preferential services, attitudes toward cooperative operational scale and development potential have statistically significant impact on willingness to invest.

Keywords: Cooperatives, investment willingness, member, ordered logit.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1702
848 Electronic Auction Market in Croatia

Authors: Bojan Korizma, Zeljko Panian

Abstract:

Online auctions are not very popular in Croatia. The main reason for this is a very limited number of services which can be used by Croatian users. Until recent times, even selling through the most popular online auction site eBay wasn't possible because PayPal services could not make payment to bank or debit card accounts in Croatia. Furthermore, many foreign sellers do not offer delivery of their products to Croatia which means that large quantities of goods initially offered on such sites are not available. With that in mind, it is necessary to analyze the buying and selling habits of Croatian users and existing online auction sites, both Croatian and foreign, and create a model for new domestic site. This site will have to exploit every positive aspect of existing models and neutralize every negative perception indicated by users in the survey so that, hopefully, it would attract new users.

Keywords: online auction, eBay, safe payment, product delivery

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1802
847 Prevalence, Associated Factors, and Help-Seeking Behavior of Psychological Distress among International Students at the National University of Malaysia

Authors: Khadiga Kahwa, Aniza Ismail

Abstract:

Depression, anxiety, and stress are associated with decreased role functioning, productivity, and quality of life. International students are more prone to psychological distress as they face many stressors while studying abroad. The objectives of the study were to determine the prevalence and associated factors of depression, anxiety, and stress among international students, their help-seeking behavior, and their awareness of the available on-campus mental support services. A cross-sectional study with a purposive sampling method was performed on 280 international students at Universiti Kebangsaan Malaysia (UKM) between the age of 18 and 35 years. The Depression Anxiety Stress Scale-21 (DASS-21) questionnaire was used anonymously to assess the mental health of students. Socio-demographic, help-seeking behavior, and awareness data were obtained. Independent sample t-test, one-way ANOVA test, and multiple linear regression were used to explore associated factors. The overall prevalence of depression, anxiety, and stress among international students were 58.9%, 71.8%, and 53.9%, respectively. Age was significantly associated with depression and anxiety. Ethnicity showed a significant association with depression and stress. No other factors were found to be significantly associated with psychological distress. Only 9.6% of the international students had sought help from on-campus mental support services. Students who were aware of the presence of such services were only 21.4% of the participants. In conclusion, this study addressed the gap in the literature on the mental health of international students and provided data that could be used in intervention programs to improve the mental health of the increasing number of international students in Malaysia.

Keywords: Anxiety, depression, stress, help-seeking behavior, students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 725
846 An Approach for the Integration of the Existing Wireless Networks

Authors: Rajkumar Samanta, Abhishek Pal

Abstract:

The demand of high quality services has fueled dimensional research and development in wireless communications and networking. As a result, different wireless technologies like Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and satellite networks etc. have emerged in the last two decades. Future networks capable of carrying multimedia traffic need IP convergence, portability, seamless roaming and scalability among the existing networking technologies without changing the core part of the existing communications networks. To fulfill these goals, the present networking systems are required to work in cooperation to ensure technological independence, seamless roaming, high security and authentication, guaranteed Quality of Services (QoS). In this paper, a conceptual framework for a cooperative network (CN) is proposed for integration of heterogeneous existing networks to meet out the requirements of the next generation wireless networks.

Keywords: Cooperative Network, Wireless Network, Integration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2365
845 Use of Novel Algorithms MAJE4 and MACJER-320 for Achieving Confidentiality and Message Authentication in SSL and TLS

Authors: Sheena Mathew, K. Poulose Jacob

Abstract:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Keywords: Confidentiality, HMAC, Integrity, MACJER-320, MAJE4, RC4, Secure Socket Layer

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1879
844 Exploring Customer Trust in B2C Mobile Payments – A Qualitative Study

Authors: Ahmed Shuhaiber, Hans Lehmann

Abstract:

Mobile payments have been deployed by businesses for more than a decade. Customers use mobile payments if they trust in this relatively new payment method, have a belief and confidence in, as well as reliance on its services and applications. Despite its potential, the current literature shows that there is lack of customer trust in B2C mobile payments, and a lack of studies that determine the factors that influence their trust in these payments; which make these factors yet to be understood, especially in the Middle East region. Thus, this study aims to explore the factors that influence customer trust in mobile payments. The empirical data for this explorative study was collected by establishing four focus group sessions in the UAE. The results indicate that the explored significant factors can be classified into five main groups: customer characteristics, environmental (social and cultural) influences, provider characteristics, mobile-device characteristics, and perceived risks.

Keywords: B2C mobile payments, Mobile commerce, Mobile payment services and application, Trust in mobile payments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2723
843 Integrating Computational Intelligence Techniques and Assessment Agents in ELearning Environments

Authors: Konstantinos C. Giotopoulos, Christos E. Alexakos, Grigorios N. Beligiannis, Spiridon D.Likothanassis

Abstract:

In this contribution an innovative platform is being presented that integrates intelligent agents and evolutionary computation techniques in legacy e-learning environments. It introduces the design and development of a scalable and interoperable integration platform supporting: I) various assessment agents for e-learning environments, II) a specific resource retrieval agent for the provision of additional information from Internet sources matching the needs and profile of the specific user and III) a genetic algorithm designed to extract efficient information (classifying rules) based on the students- answering input data. The agents are implemented in order to provide intelligent assessment services based on computational intelligence techniques such as Bayesian Networks and Genetic Algorithms. The proposed Genetic Algorithm (GA) is used in order to extract efficient information (classifying rules) based on the students- answering input data. The idea of using a GA in order to fulfil this difficult task came from the fact that GAs have been widely used in applications including classification of unknown data. The utilization of new and emerging technologies like web services allows integrating the provided services to any web based legacy e-learning environment.

Keywords: Bayesian Networks, Computational Intelligencetechniques, E-learning legacy systems, Service Oriented Integration, Intelligent Agents, Genetic Algorithms.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1744
842 Rescue Emergency Drone for Fast Response to Medical Emergencies Due to Traffic Accidents

Authors: Anders S. Kristensen, Dewan Ahsan, Saqib Mehmood, Shakeel Ahmed

Abstract:

Traffic accidents are a result of the convergence of hazards, malfunctioning of vehicles and human negligence that have adverse economic and health impacts and effects. Unfortunately, avoiding them completely is very difficult, but with quick response to rescue and first aid, the mortality rate of inflicted persons can be reduced significantly. Smart and innovative technologies can play a pivotal role to respond faster to traffic crash emergencies comparing conventional means of transportation. For instance, Rescue Emergency Drone (RED) can provide faster and real-time crash site risk assessment to emergency medical services, thereby helping them to quickly and accurately assess a situation, dispatch the right equipment and assist bystanders to treat inflicted person properly. To conduct a research in this regard, the case of a traffic roundabout that is prone to frequent traffic accidents on the outskirts of Esbjerg, a town located on western coast of Denmark is hypothetically considered. Along with manual calculations, Emergency Disaster Management Simulation (EDMSIM) has been used to verify the response time of RED from a fire station of the town to the presumed crash site. The results of the study demonstrate the robustness of RED into emergency services to help save lives. 

Keywords: Automated external defibrillator, medical emergency, fire and rescue services, response time, unmanned aerial system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1763
841 An Improved Scheduling Strategy in Cloud Using Trust Based Mechanism

Authors: D. Sumathi, P. Poongodi

Abstract:

Cloud Computing refers to applications delivered as services over the internet, and the datacenters that provide those services with hardware and systems software. These were earlier referred to as Software as a Service (SaaS). Scheduling is justified by job components (called tasks), lack of information. In fact, in a large fraction of jobs from machine learning, bio-computing, and image processing domains, it is possible to estimate the maximum time required for a task in the job. This study focuses on Trust based scheduling to improve cloud security by modifying Heterogeneous Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT (Trust Reputation HEFT) which is then compared to Dynamic Load Scheduling.

Keywords: Software as a Service (SaaS), Trust, Heterogeneous Earliest Finish Time (HEFT) algorithm, Dynamic Load Scheduling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2195
840 Comparison of the H-Index of Researchers of Google Scholar and Scopus

Authors: Adian Fatchur Rochim, Abdul Muis, Riri Fitri Sari

Abstract:

H-index has been widely used as a performance indicator of researchers around the world especially in Indonesia. The Government uses Scopus and Google scholar as indexing references in providing recognition and appreciation. However, those two indexing services yield to different H-index values. For that purpose, this paper evaluates the difference of the H-index from those services. Researchers indexed by Webometrics, are used as reference’s data in this paper. Currently, Webometrics only uses H-index from Google Scholar. This paper observed and compared corresponding researchers’ data from Scopus to get their H-index score. Subsequently, some researchers with huge differences in score are observed in more detail on their paper’s publisher. This paper shows that the H-index of researchers in Google Scholar is approximately 2.45 times of their Scopus H-Index. Most difference exists due to the existence of uncertified publishers, which is considered in Google Scholar but not in Scopus.

Keywords: Google Scholar, H-index, Scopus.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2152
839 Household Demand for Solid Waste Disposal Options in Malaysia

Authors: Pek Chuen-Khee, Jamal Othman

Abstract:

This paper estimates the economic values of household preference for enhanced solid waste disposal services in Malaysia. The contingent valuation (CV) method estimates an average additional monthly willingness-to-pay (WTP) in solid waste management charges of Ôé¼0.77 to 0.80 for improved waste disposal services quality. The finding of a slightly higher WTP from the generic CV question than that of label-specific, further reveals a higher WTP for sanitary landfill, at Ôé¼0.90, than incineration, at Ôé¼0.63. This suggests that sanitary landfill is a more preferred alternative. The logistic regression estimation procedure reveals that household-s concern of where their rubbish is disposed, age, ownership of house, household income and format of CV question are significant factors in influencing WTP.

Keywords: contingent valuation, logistic regression, solid waste disposal, willingness-to-pay.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2608
838 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: Embedded computing, internet of things, mobile computing, and wireless technologies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1320
837 Providing On-Demand Path and Arrival Time Information Considering Realtime Delays of Buses

Authors: Yoshifumi Ishizaki, Naoki Kanatani, Masaki Ito, Toshihiko Sasama, Takao Kawamura, Kazunori Sugahara

Abstract:

This paper demonstrates the bus location system for the route bus through the experiment in the real environment. A bus location system is a system that provides information such as the bus delay and positions. This system uses actual services and positions data of buses, and those information should match data on the database. The system has two possible problems. One, the system could cost high in preparing devices to get bus positions. Two, it could be difficult to match services data of buses. To avoid these problems, we have developed this system at low cost and short time by using the smart phone with GPS and the bus route system. This system realizes the path planning considering bus delay and displaying position of buses on the map. The bus location system was demonstrated on route buses with smart phones for two months.

Keywords: Route Bus, Path Planning System, GPS, Smart Phone.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1449
836 Knowledge Management (KM) Practices - A Study of KM Adoption among Doctors in Kuwait

Authors: B. Alajmi, L. Marouf, A. S. Chaudhry

Abstract:

Knowledge management is considered as an important factor in improving health care services. KM facilitates the transfer of existing knowledge and the development of new knowledge in hospitals. This paper reviews practices adopted by doctors in Kuwait for capturing, sharing, and generating knowledge. It also discusses the perceived impact of KM practices on performance of hospitals. Based on a survey of 277 doctors, the study found that KM practices among doctors in the sampled hospitals were not very effective. Little attention was paid to the main activities that support the transfer of expertise among doctors in hospitals. However, as predicted by previous studies, good km practices were perceived by doctors to have a positive impact on performance of hospitals. It was concluded that through effective KM practices hospitals could improve the services they provide. Documentation of best practices and capturing of lessons learnt for re-use of knowledge could help transform the hospitals into learning organizations.

Keywords: Health Sector, Hospitals, Knowledge Management, Kuwait, Tools and Practices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3525
835 User Requirements Analysis for the Development of Assistive Navigation Mobile Apps for Blind and Visually Impaired People

Authors: Paraskevi Theodorou, Apostolos Meliones

Abstract:

In the context of the development process of two assistive navigation mobile apps for blind and visually impaired people (BVI) an extensive qualitative analysis of the requirements of potential users has been conducted. The analysis was based on interviews with BVIs and aimed to elicit not only their needs with respect to autonomous navigation but also their preferences on specific features of the apps under development. The elicited requirements were structured into four main categories, namely, requirements concerning the capabilities, functionality and usability of the apps, as well as compatibility requirements with respect to other apps and services. The main categories were then further divided into nine sub-categories. This classification, along with its content, aims to become a useful tool for the researcher or the developer who is involved in the development of digital services for BVI.

Keywords: Accessibility, assistive mobile apps, blind and visually impaired people, user requirements analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 947
834 Identifying Business Opportunities Based on Patent and Trademark Portfolios: A Technology-Based Service Industry Case

Authors: Mingook Lee, Sungjoo Lee

Abstract:

As technology-based service industries grow drastically worldwide; companies are recognizing the importance of market preoccupancy and have made an effort to capture a large market to gain the upper hand. To this end, a focus on patents can be used to determine the properties of a technology, as well as to capture advantages in technical skills, in comparison with the firm’s competitors. However, technology-based services largely depend not only on their technological value but also their economic value, due to the recognized worth that is passed to a plurality of users. Thus, it is important to determine whether there are any competitors in the target areas and what services they provide in any field. Despite this importance, little effort has been made to systematically benchmark competitors in order to identify business opportunities. Thus, this study aims to not only identify each position of technology-centered service companies in complex market dynamics, but also to discover new business opportunities. For this, we try to consider both technology and market environments simultaneously by utilizing patent data as a representative proxy for technology and trademark dates as an index for a firm’s target goods and services. Theoretically, this is one of the earliest attempts to combine patent data and trademark data to analyze corporate strategies. In practice, the research results are expected to be used as a decision criterion to diagnose the economic value that companies can obtain by entering the market, as well as the technological value to be passed onto their customers. Thus, the proposed approach can be useful to support effective technology and business strategies in a firm.

Keywords: Business opportunity, patent, Portfolio analysis, trademark.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1532
833 eTransformation Framework for the Cognitive Systems

Authors: Ana Hol

Abstract:

Digital systems are in the Cognitive wave of the eTransformations and are now extensively aimed at meeting the individuals’ demands, both those of customers requiring services and those of service providers. It is also apparent that successful future systems will not just simply open doors to the traditional owners/users to offer and receive services such as Uber, for example, does today, but will in the future require more customized and cognitively enabled infrastructures that will be responsive to the system user’s needs. To be able to identify what is required for such systems this research reviews the historical and the current effects of the eTransformation process by studying: 1. eTransitions of company websites and mobile applications, 2. Emergence of new shared economy business models such as Uber, and 3. New requirements for demand driven, cognitive systems capable of learning and just-in-time decision-making. Based on the analysis, this study proposes a Cognitive eTransformation Framework capable of guiding implementations of new responsive and user aware systems.

Keywords: System implementations, AI supported systems, cognitive systems, eTransformation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 952
832 A Social Decision Support Mechanism for Group Purchasing

Authors: Lien-Fa Lin, Yung-Ming Li, Fu-Shun Hsieh

Abstract:

With the advancement of information technology and development of group commerce, people have obviously changed in their lifestyle. However, group commerce faces some challenging problems. The products or services provided by vendors do not satisfactorily reflect customers’ opinions, so that the sale and revenue of group commerce gradually become lower. On the other hand, the process for a formed customer group to reach group-purchasing consensus is time-consuming and the final decision is not the best choice for each group members. In this paper, we design a social decision support mechanism, by using group discussion message to recommend suitable options for group members and we consider social influence and personal preference to generate option ranking list. The proposed mechanism can enhance the group purchasing decision making efficiently and effectively and venders can provide group products or services according to the group option ranking list.

Keywords: Social network, group decision, text mining, group commerce.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1390
831 Tourist Satisfaction and Loyalty toward Service Quality of the Online Tourism Enterprises

Authors: Wanida Suwunniponth

Abstract:

The objectives of this research paper were to study the expectation and satisfaction of tourists in five tourism service quality dimensions, namely, website quality, service ability, trust ability, customer empathy, and responsiveness to customer and also to study the influences of satisfaction affecting loyalty toward quality service of the online tourism enterprises located in Bangkok Thailand. This research utilized both quantitative and qualitative research methods. In terms of quantitative method, a questionnaire was used as a tool to collect data from 400 tourists who were using in online travel services. Statistics analysis included descriptive statistics, t-test and Multiple Regression Analysis. In terms of qualitative analysis, an in-depth interview and content analysis were used along with 10 individual management levels of e-commerce enterprises.

The results revealed that the respondents had higher expectations than their level of satisfaction in all five categories. However, the respondents were more satisfied with online travel services than without online service. The demographic factors such as gender and age had no influence on the level of satisfaction whereas the demographic factors of education, occupation, and income had influenced the level of satisfaction. The test results also indicated that the level of satisfaction from responsiveness to customer had the highest influence on the loyalty of tourists who used online travel. The level of satisfaction from customer empathy had the highest influence on the tourists to recommend others to use online travel services. Also, the level of satisfaction from service ability had the highest influence on tourists to take an actual trip.

Keywords: Satisfaction, Loyalty, Service Quality, Online Tourism Enterprises.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3879
830 Tax Innovation, Administration and Revenue Generation in Nigeria: Case of Cross River State

Authors: Ifere, Eugene Okoi, Eko, Eko Omini

Abstract:

Taxation as a potent fiscal policy instrument through which infrastructures and social services that drive the development process of any society has been ineffective in Nigeria. The adoption of appropriate measures is, however, a requirement for the generation of adequate tax revenue. This study set out to investigates efficiency and effectiveness in the administration of tax in Nigeria, using Cross River State as a case-study. The methodology to achieve this objective is a qualitative technique using structured questionnaires to survey the three senatorial districts in the state; the central limit theory is adopted as our analytical technique. Result showed a significant degree of inefficiency in the administration of taxes. It is recommended that periodic review and update of tax policy will bring innovation and effectiveness in the administration of taxes. Also proper appropriation of tax revenue will drive development in needed infrastructural and social services.

Keywords: Administration, Efficiency, Effectiveness, Taxation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4564
829 A Review on Cloud Computing and Internet of Things

Authors: Sahar S. Tabrizi, Dogan Ibrahim

Abstract:

Cloud Computing is a convenient model for on-demand networks that uses shared pools of virtual configurable computing resources, such as servers, networks, storage devices, applications, etc. The cloud serves as an environment for companies and organizations to use infrastructure resources without making any purchases and they can access such resources wherever and whenever they need. Cloud computing is useful to overcome a number of problems in various Information Technology (IT) domains such as Geographical Information Systems (GIS), Scientific Research, e-Governance Systems, Decision Support Systems, ERP, Web Application Development, Mobile Technology, etc. Companies can use Cloud Computing services to store large amounts of data that can be accessed from anywhere on Earth and also at any time. Such services are rented by the client companies where the actual rent depends upon the amount of data stored on the cloud and also the amount of processing power used in a given time period. The resources offered by the cloud service companies are flexible in the sense that the user companies can increase or decrease their storage requirements or the processing power requirements at any time, thus minimizing the overall rental cost of the service they receive. In addition, the Cloud Computing service providers offer fast processors and applications software that can be shared by their clients. This is especially important for small companies with limited budgets which cannot afford to purchase their own expensive hardware and software. This paper is an overview of the Cloud Computing, giving its types, principles, advantages, and disadvantages. In addition, the paper gives some example engineering applications of Cloud Computing and makes suggestions for possible future applications in the field of engineering.

Keywords: Cloud computing, cloud services, IaaS, PaaS, SaaS, IoT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1390
828 Personalization and the Universal Communications Identifier Concept

Authors: Françoise Petersen, Mike Pluke, Tatiana Kovacikova, Giovanni Bartolomeo

Abstract:

As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.

Keywords: Interoperability, Next Generation Network (NGN), Personalization, Universal Communications Identifier (UCI), User Profile Management (UPM)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1582
827 Government Responses to the Survivors of Trafficking in Human Beings: A Study of Albania

Authors: Irida Agolli Nasufi, Anxhela Bruci

Abstract:

This paper presents Albanian government policies regarding the reintegration process for returning Albanian survivors of trafficking in human beings. Focusing on an in-depth analysis of governmental, non-governmental documents and semi-structured qualitative interviews conducted with service providers and trafficking survivors. Furthermore, this paper will especially focus on the governmental efforts to provide support to the survivors, focusing on their needs and challenges. This study explores the conditions and actual services provided to the survivors of trafficking in human beings that are in the reintegration process in Albania. Moreover, it examines the responsible mechanisms accountable for the reintegration process, by analysing synergies between governmental and non-governmental organisations. Also, this paper explores the governmental approach towards trafficking survivors and apprises policymakers to undertake changes and reforms in their future actions.

Keywords: Policies, social services, service user, trafficking in human beings, government.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 761
826 Empirical Study on the Student Satisfaction in Higher Education: Importance-Satisfaction Analysis

Authors: Silva, Fátima, Fernandes, Paula Odete

Abstract:

The future of Higher Education Institutions (HEI) depend on their ability to attract and retain students, increase recognition and prestige. In order to respond to the 'customers' increasingly demanding, HEI need to identify the key factors that influence the satisfaction of a 'customers', thereby creating competitive advantages. These determinants of satisfaction are important elements that guide the strategy of an institution and allow the successful achievement of strategic plans, both teaching and administrative, to offer their ‘costumers’ services and products with higher quality. Following this way of thinking, the purpose of this study was to evaluate the satisfaction with the service quality of the School of Technology and Management of Bragança (ESTiG), of the Polytechnic Institute of Bragança, identifying, thus, the dimensions related to the quality of services that might influence students' satisfaction. The results showed that, in general, the students are satisfied with the performance of ESTiG.

Keywords: Customer Satisfaction, Higher Education Institutions, Importance-Satisfaction Model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2867
825 Value Analysis of Islamic Banking and Conventional Banking to Measure Value Co-creation

Authors: Amna Javed, Hisashi Masuda, Youji Kohda

Abstract:

This study examines the value analysis in Islamic and conventional banking services in Pakistan. Many scholars have focused on co-creation of values in services but mainly economic values not non-economic. As Islamic banking is based on Islamic principles that are more concerned with non-economic values (well-being, partnership, fairness, trust worthy, and justice) than economic values as money in terms of interest.  This study is important to know the providers point of view about the co-created values, because, it may be more sustainable and appropriate for today’s unpredictable socio-economic environment. Data were collected from 4 banks (2 Islamic and 2 conventional banks). Text mining technique is applied for data analysis, and values with 100% occurrences in Islamic banking are chosen. The results reflect that Islamic banking is more centric towards non-economic values than economic values and it promotes team work and partnership concept by applying Islamic spirit and trust worthiness concept.

Keywords: Economic values, Islamic banking, Non-economic values, Value system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3257
824 Analysis of the Ambient Media Approach of Advertisement Samples from the Adman Awards and Symposium under the Category of Outdoor and Ambience

Authors: Chanthana Poninthawong

Abstract:

This research is to study the types of products and services that employs 'ambient media and respective techniques in its advertisement materials. Data collection has been done via analyses of a total of 62 advertisements that employed ambient media approach in Thailand during the years 2004 to 2011. The 62 advertisement were qualifying advertisements of the Adman Awards & Symposium under the category of Outdoor & Ambience. Analysis results reveal that there is a total of 14 products and services that chooses to utilize ambient media in its advertisement. Amongst all ambient media techniques, 'intrusion' uses the value of a medium in its representation of content most often. Following intrusion is 'interaction', where consumers are invited to participate and interact with the advertising materials. 'Illusion' ranks third in its ability to subject the viewers to distortions of reality that makes the division between reality and fantasy less clear.

Keywords: Ambient media, Adman Awards, advertising, Out of Home media.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2428
823 Combining Mobile Intelligence with Formation Mechanism for Group Commerce

Authors: Lien Fa Lin, Yung Ming Li, Hsin Chen Hsieh

Abstract:

The rise of smartphones brings new concept So-Lo-Mo (social-local-mobile) in mobile commerce area in recent years. However, current So-Lo-Mo services only focus on individual users but not a group of users, and the development of group commerce is not enough to satisfy the demand of real-time group buying and less to think about the social relationship between customers. In this research, we integrate mobile intelligence with group commerce and consider customers' preference, real-time context, and social influence as components in the mechanism. With the support of this mechanism, customers are able to gather near customers with the same potential purchase willingness through mobile devices when he/she wants to purchase products or services to have a real-time group-buying. By matching the demand and supply of mobile group-buying market, this research improves the business value of mobile commerce and group commerce further.

Keywords: Group formation, group commerce, mobile commerce, So-Lo-Mo, social influence.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1429