The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is paradigm that has emerged to deliver IT services to consumers as a utility service over the Internet. In developing countries, particularly Saudi Arabia, cloud computing is still not widely adopted. As a result, this study seeks to investigate the most influential factors that can encourage an organisation to use the cloud or which might impede them from moving to it. This research...
This paper proposes a new Self-Healing scheme based on Cluster Controlled Mobility (SH-CCM) for UWSNs. The proposed SH-CCM scheme uses the idea of mobility within a cluster of sick sensors beside the idea of the hybrid cooperation between both reactive and proactive peers and these sick sensors. This increases the chance of finding health neighbours and as a result it enhances both data security and...
Web service composition refers to the process of combining several web services to provide a value-added service. However, the component web services can't ensure reliable execution, because some services developed and operated by independent organizations may be deviate from the specification. In this paper, we propose a method that checks services reliability and ensures the best QoS combination...
Business continuity analysis is basic of guaranteeing the system effectiveness and reliability. Normally, It emphasizes formal language description, while non-dynamic formal analysis method. This paper analyzes the composing factor of business continuity in information system safety management, with the key elements to prove the business continuity services, it is based on the SPN theory and uses...
Even though online education is a very important pillar of lifelong education, institutions are still reluctant to wager for a fully online educational model. At the end, they keep relying on on-site assessment systems, mainly because fully virtual alternatives do not have the deserved social recognition or credibility. Thus, the design of virtual assessment systems that are able to provide effective...
The information construction of colleges and universities is the universities high attention problems. It has become the important measures to strengthen school force and improve the level of school-running. In addition, it is one of the important criteria to evaluate education modernization level and comprehensive strength of school-running. In colleges and universities information construction,...
Goal of this talk…○ IC design and system building techniques that enable new wireless sensors ○ A few case studies ○ Challenge: thin-film integration of complex systems.
This study extends research on factors that contribute to abusive supervision, one form of nonphysical aggression, and the results of such abuse on subordinates' performance. We utilize research on personal values theory and general aggression model to formulate our hypotheses. Results from 206 matched leader-subordinate dyads support the idea that leader's self-transcendence values were positively...
Based on service quality theory and relevant literatures, this study establishes a research model of consumers' post-transaction general trust in B2C e-business. The empirical research finds that: at the post-purchase stage, familiarity, perceived safety, product quality and especially service quality significantly positively affects consumers' general trust in web-vendor; nevertheless, the effect...
The literature study indicates that the number of empirical studies on the relationship between work values and job performance of employees are very low, and the results are not complimentary. Although many scholars provide a considerable amount of research regarding the relationship between the work values of an employee and his job performance, few studies take the influence an enterprise environment...
This paper presents the development of PHP and MySQL based online examination system with power failure handling and drop box capability. To the best of author's knowledge these shortcomings were not properly addressed in the previous systems developed in PHP and MySQL. Power failure is an important factor that directly affects the efficiency of the online examination system in most of the developing...
This study examined the effect of E-bank service on E-Trust with E-Security approach. So this research discusses the issue based on Theoretical frame work of marketing and E-Banking. Then a questionnaire was designed to evaluate the variables and finally with certainty of Reliability and Validity of evaluation device, was administered among 260 customers of Iran Melli Bank. Results of the research...
To solve the trustworthiness of reusable test cases, a trustworthiness framework of reusable test cases is proposed in this paper, including the analysis of trustworthiness attributes and trustworthiness evidence. Furthermore, the trustworthiness assurance processes related are presented to support management activities of reusable test case.
Focusing on the fact that the grid users may require various QoS and have quite different preferences on each QoS, a User Preference Driven Approach(UPDA) is proposed to schedule grid tasks with multi-QoS constraints. In UPDA, user's needs and preferences are modeled into matrixes to serve as the basis of scheduling and Analytical Hierarchy Process(AHP) method is adopted to perform a pair wise comparison...
In this paper we discuss the way to identify various design patterns, their types and about the methods involved in the re-designing process. We also propose to evaluate the identified patterns considering various quality attributes (e.g, maintainability, security, availability, reliability) beside the quantitative character. Our proposal is to identify the design patterns with respect to the internet...
Reputation aggregation methods are used in unstructured peer-to-peer (P2P) networks to evaluate the trustworthiness of participating peers and to combat malicious peer's behaviors. In reputation aggregation methods, each peer collects local scores by each transaction and calculates global scores by aggregating local scores. Using the global scores, individual peer can interact with reliable peers...
For companies offering complex and professional products, customer education will be useful to gain competitive advantage. but the unresolved customer education paradox has hampered the strategic decision on customer education. through introduction of motivation-opportunity-ability model and investigation of fund investor, the result demonstrates that, customer education is a double-edged sword. on...
Indian National eGovernance plan (NeGP) aims to deliver the e-services to the door step of the rural folk for better governance, particularly to reach rural poor. For providing a better reach, it envisages the idea of Common Service Centers (CSC) which acts as a one stop service delivery center. The present paper examines and proposes a reliable and secured framework for CSC for a better, reliable...
The open applications makes P2P network has many security problems. In order to improve the performance of network, and to ensure the quality of services, this paper proposes a trust model for fault-tolerant and intrusion-tolerant Mechanism of P2P networks. In this model, a new trust evaluation and management mechanism have been studied, and an updating method of the trust degree has been described...
Along with the rapid development of Web services, user always want to make select decision according to their special preference demands of security attributes. This paper address the problem of service selection based on the Web services security assessment. First we use questionnaire to obtain the semantic and fuzzy information of user security attributes preferences. And then language fuzzy scale...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.