The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proposed socially oriented information technology is based on the integration of diversification and technological processes for the creation of additional products and infrastructure, by stepwise structural synthesis of waste processing and land reclamation. The technology relies on empirical assumptions, theoretical principles, models of the decrease in environmental impact, assessments of the...
Axiomatic design (AD) theory is a general framework for system design process based on mapping between several domains. In the AD theory, only the functional requirements (system functions) are considered in the design process, since the mapping between requirements and design parameters in AD does not include nonfunctional requirements (system attributes). This paper introduces an extended view of...
This paper considers the concept of building a high speed multivalued elements and structures, where the characteristics are defined by the basis vectors. Has been showed that any real device can be interpreted as a multi-valued electronic circuit, and can be explained by differential equations system in the most comprehensive view and allows exploring all aspects of the behavior of the device or...
In conditions of information technology growth, systems which are being developed to be used on multiple platforms, gain in importance and popularity. As a rule, such systems have client-server architecture and have strong security requirements for user authentication. In this paper the information technology of user authentication for cross-platform systems has been developed, which is characterized...
E3 AND SPECTRUM SUPPORTABILITY GUIDANCE FOR THE ACQUISITION PROCESS • Initial Draft of update is nearing completion • In Review at DSO 2017 • Expected completion early CY2018
The aspect of users' behavior (user acceptance) is one of the main factors that determine the successful application of information technology. Student Center Activity and Learning of Harapan Bangsa (Scalsa SHB) brings about transformation in the method of learning from the manual system to the electronic one, which results in the attitude and behavior of the users to accept and use it. This research...
With the recent development of Information Communication Technology (ICT) in every aspect in our life, cyber crime is also expanding and cyber crime investigation is maturing into a more challenging issue which needs to be confronted. In the early stages of the digital investigation of cyber crime case, digital evidence is inadequate, decentralized and fragmented. In this paper, we present a cyber...
This study draws on dedication/constraint mechanisms of social exchange theory to understand how knowledge outcomes are formed in relational virtual communities (RVCs). We propose a model to explain how knowledge outcomes are affected by interpersonal relationship development, which is in turn affected by information technology (IT)-supported environments. We conceptualize interpersonal relationship...
Employing the Theory of Planned Behavior (TPB), this study aims to find determinant factors that have influence over individuals' intention to cyberbully others. Using a scenario-based questionnaire, the data were collected from 96 students in Universiti Teknologi Malaysia. According to the results, only subjective norms reflected to be significant over cyberbullying intention, while the rest of variables...
Rain attenuation prediction models for link analysis are essential for satellite communications. The diurnal variations of the rain attenuation statistics are valuable for the effective system designs. In this work, a simple prediction model for diurnal rain attenuation statistics with its conversion scale is proposed. The method of calculating an approximated optimal constant conversion scale was...
E-Learning became an essential method for learning and is widely used in universities and educational institutions as an alternative learning environment for traditional learning that uses face-to-face meetings and paper-based assessment. One of the main features of e-Learning systems is that they provide the ability for conducting online assessments. This feature can be implemented by allowing students...
Online purchasing power has increased and beyond limitations once internet drives the mankind way of life. It has become an increasingly demanded platform since the existence of WWW in early 1990s. In conjunction with this trending, a study on insights on online purchasing where the study framework embedded the dimensions of information satisfaction, trust, convenience security and purchasing online...
The main focus of this work is to investigate the predictors of knowledge management (KM) behavior among university academics within the prevailing organizational climate. The KM behavior has been operationalized using SECI process (components of knowledge creation theory). A hypothetical research framework has been developed based on TRA, TPB and some related previous works. Survey based quantitative...
Evaluating and scoring essay questions is an exhausting, time consuming process and require a lot of effort. So, applying automated tools is essentially required to tackle these drawbacks. In this study, we propose an automated scoring approach for short answers to Arabic essay questions. The scoring process is based on the similarity between the student's answer and model answer, cosine similarity...
This paper deals with comparing different estimators of the two parameters of general failure exponential model as well as estimating reliability function, also with application to real data represent time to failure with certain electric products. The estimators obtained by applying different methods like maximum likelihood, moments, and ordinary least square, then the estimator's are obtained through...
The fuzzy T — norms and T — conorms offer alternatives to compute the classical structural polynomial of a complex circuit. The reliability of a special complex 4-node circuit were evaluated, and it is show that, among a certain family of classic T — norms, the Frank T-norm provides a T — map emerging from the structural polynomial, which proves to be the best estimate for this reliability. Illustrative...
In this age of information technology, reliable personnel identification is an essential need of contemporary life and the most reliable means of identifying an individual is using his/her intrinsic physical or behavioral traits called biometrics such as face, voice, hand writing, fingerprint, iris, gait etc. Based on these traits, the system can recognize the person based on “who” the person is and...
With the development of social network based applications, different service approaches to achieve these applications have emerged. Users' reporting and sharing of their consumption experience can be utilized to rate the quality of different approaches of online services. How to ensure the authenticity of users' reports and identify malicious ones with cheating reports become important issues to achieve...
The rapid advancement of information technology in today's digital era has made major changes and developments in shopping experience. Shopping online is a new trend of the market today in line with the development of technology. Mobile commerce is a new method of online shopping where purchasers can conduct transactions and direct purchase from a commerce portal through their handset. The purpose...
The firm performance constituted a serious problem for Indonesian Logistics Service Providers (LSP), so that the performance improvement is important and urgent matter for the companies particularly in the context of ASEAN Economic Community. Conceptually, some previous researches showed that the firm performance was influenced by innovative capability and the capability influenced by resources. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.