Int. J. Technol. Diffusion最新文献

筛选
英文 中文
Smart Traffic Light Management Systems: A Systematic Literature Review 智能交通灯管理系统:系统文献综述
Int. J. Technol. Diffusion Pub Date : 2020-07-01 DOI: 10.4018/ijtd.2020070102
Aws A. Magableh, Mohanad A. Almakhadmeh, Nawaf O. Alsrehin, Ahmad F. Klaib
{"title":"Smart Traffic Light Management Systems: A Systematic Literature Review","authors":"Aws A. Magableh, Mohanad A. Almakhadmeh, Nawaf O. Alsrehin, Ahmad F. Klaib","doi":"10.4018/ijtd.2020070102","DOIUrl":"https://doi.org/10.4018/ijtd.2020070102","url":null,"abstract":"Traffic congestion is a major concern in many cities. Failure to heed signals, poor law enforcement, and bad traffic light management are main factors that have led to traffic congestion. One of the most important problems in cities is the difficulty of further expanding the existing infrastructures. Having that in mind, the main accessible and available alternatives that could provide better management of the traffic lights is to use technological systems. There are many methods available for traffic management such as video data analysis, infrared sensors, inductive loop detection, wireless sensor networks, and a few other technologies. This research is focused on reviewing all these existing methods and studies using a systematic literature review (SLR). The SLR was intended to improve the synthesis of research by introducing a systematic process. This article aims at analyzing and assessing the existing studies against selected factors of comparison. The study achieves these aims by analyzing 78 main studies. The research outcomes indicated that there are decent numbers of studies that have been proposed in the area of smart traffic light management. However, less attention has been paid on the possibility of investigating the use of live traffic data to improve the accuracy of traffic management.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133209056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Instagram as a Marketing Tool for Small and Medium Enterprises Instagram作为中小企业的营销工具
Int. J. Technol. Diffusion Pub Date : 2020-07-01 DOI: 10.4018/ijtd.2020070103
Z. Harun, Farzana Parveen Tajudeen
{"title":"Instagram as a Marketing Tool for Small and Medium Enterprises","authors":"Z. Harun, Farzana Parveen Tajudeen","doi":"10.4018/ijtd.2020070103","DOIUrl":"https://doi.org/10.4018/ijtd.2020070103","url":null,"abstract":"Technological changes have transformed traditional marketing methods. Instagram is one of the social media platforms which enables companies to reach their target groups of customers by means of a visual approach. Instagram is a popular social media application among Malaysians. With the growing popularity of Instagram and its potential to help businesses, this study aims to investigate the Instagram adoption among Malaysian small and medium enterprises (SMEs). A survey method was used to collect data. The results of the study found that relative advantage and collaboration are the significant dimensions influencing the adoption of Instagram. The study also found technology strategy as a significant moderator between relative advantage, interactiveness, collaboration, and Instagram adoption among SMEs. This study enhances the current knowledge on social media especially highlights the importance of Instagram as an excellent tool for marketing.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128098535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a Blockchain-Based Smart Contract Model for Child Labor Alleviation 基于区块链的童工缓解智能合约模型设计
Int. J. Technol. Diffusion Pub Date : 2020-07-01 DOI: 10.4018/ijtd.2020070104
Senou Mahugnon Rosaire Brice, Jules Degila
{"title":"Design of a Blockchain-Based Smart Contract Model for Child Labor Alleviation","authors":"Senou Mahugnon Rosaire Brice, Jules Degila","doi":"10.4018/ijtd.2020070104","DOIUrl":"https://doi.org/10.4018/ijtd.2020070104","url":null,"abstract":"The achievements of west and central Africa in producing more than 60% of the world's cocoa, and sub-Saharan Africa's achievement in producing 13% of the world's cotton, hide child labor. These significant levels of production often involve child exposure to issues such as a lack of education; pesticides; dangerous farming tools; work accidents; human trafficking; etc. Blockchain offers an immutable register that allows for digital transactions, smart contract creation, as well as end-to-end product traceability. The main aim of this article is to provide an intelligent contract framework that protects child labor in farming while further enlightening understandings of adoption-related challenges. This framework considers conditions that farmer associations need to satisfy and gives them a tool to improve children's welfare. A research model for the adoption of this tool has been proposed and validated through surveys in the cotton and cacao sectors.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a BPMN Security Extension for the Visualization of Cyber Security Requirements 面向网络安全需求可视化的BPMN安全扩展
Int. J. Technol. Diffusion Pub Date : 2020-04-01 DOI: 10.4018/ijtd.2020040101
M. Chergui, S. Benslimane
{"title":"Towards a BPMN Security Extension for the Visualization of Cyber Security Requirements","authors":"M. Chergui, S. Benslimane","doi":"10.4018/ijtd.2020040101","DOIUrl":"https://doi.org/10.4018/ijtd.2020040101","url":null,"abstract":"Businessprocessmodelingnotation(BPMN)isawidelyusedbusinessmodelprocess.Theimportance ofsecurityisapparent,buttraditionally,itisconsideredafterthebusinessprocessesdefinition.Thereis aneedforintegratedtoolsandamethodologythatallowsforspecifyingandenforcingcomplianceand securityrequirementsforbusinessprocess-drivenenterprisesystems.Therefore,itisveryimportant tocapturethesecurityrequirementsatconceptualstageinordertoidentifythesecurityneeds.BPMN islackingtheabilitytomodelandpresentsecurityconcepts.Thiswillincreasethevulnerabilityof thesystemandmakethefuturedevelopmentofsecurityforthesystemmoredifficult.Thisarticle proposes a novel extension to BPMN notation based on cyber security ontologies. The authors incorporatevisualconstructsformodelingsecurityrequirements.Inordertoprovideacommonly usableextension,theseenhancementswereimplementedasBPMNmetamodelextension.Theauthors illustratecapabilitiesandbenefitsofextensionwithareal-lifeexample. KEywoRDS BPMN Extension, Business Process, Modeling, Security Requirements","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Real Time Entry Prohibition System for Coalmines 煤矿实时禁止入关系统
Int. J. Technol. Diffusion Pub Date : 2020-04-01 DOI: 10.4018/ijtd.2020040104
U. Shrawankar, Rahul Neware, Pranay Mangulkar
{"title":"Real Time Entry Prohibition System for Coalmines","authors":"U. Shrawankar, Rahul Neware, Pranay Mangulkar","doi":"10.4018/ijtd.2020040104","DOIUrl":"https://doi.org/10.4018/ijtd.2020040104","url":null,"abstract":"This article focuses on the hazardous conditions prevailing in underground coal mines and the decision to prohibit entry, when conditions are adverse. Thus, the ongoing observation framework is helpful for ascertaining the conditions for working in underground coal mines and for essential safety and well-being measures. The advancements in WSN lead to advancements in wireless communications. The various sensors are deployed at the location and sense the environment and provide recent activities of the underground coal mines. The sensors transmit the procured information to the base station, principally the A-D transformation. The sensors can be considered a hub to the base station. Wireless transmission is used to send the data to the user. The designed hardware and software systems are used for the identification of the parameters and as per the thresholds, the decision and the prohibition of workers before entering into the mine is decided. The ML system helps in checking the favorable conditions for working in underground mines. While experimenting, real-time sensor generated data is used.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Denial-of-Service Attack Detection and Mitigation for the Internet of Things 物联网分布式拒绝服务攻击检测与缓解
Int. J. Technol. Diffusion Pub Date : 2020-04-01 DOI: 10.4018/ijtd.2020040102
Opeyemi Peter Ojajuni, Y. Ismail, Albertha H. Lawson
{"title":"Distributed Denial-of-Service Attack Detection and Mitigation for the Internet of Things","authors":"Opeyemi Peter Ojajuni, Y. Ismail, Albertha H. Lawson","doi":"10.4018/ijtd.2020040102","DOIUrl":"https://doi.org/10.4018/ijtd.2020040102","url":null,"abstract":"The Internet of Things (IoT) allows different devices with internet protocol (IP) address to be connected together via the internet to collect, provide, store, and exchange data amongst themselves. The distributed denial of service (DDoS) attack is one of the inevitable challenges which should be addressed in the development of the IoT. A DDoS attack has the potential to render a victim's services unavailable, which can then lead to additional challenges such as website outage, financial loss, reputational damage and loss of confidential information. In this article, a framework of the SDN controller via an application programming interface (API) is compared to an existing framework. SDN provides a new architecture that can detect and mitigate a DDoS attack so that it makes the networking functionalities programmable via the API and also it centralizes the control management of the IoT devices. Experimental results show the capability of the SDN framework to analyze a real-time traffic of the SDN controller via the API by setting a control bandwidth usage threshold using the API.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133644798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Management Models for Business Incubators: A Systematic Review 企业孵化器的管理模式:系统回顾
Int. J. Technol. Diffusion Pub Date : 2020-04-01 DOI: 10.4018/ijtd.2020040103
A. Machado, Araci Hack Catapan, M. Sousa
{"title":"Management Models for Business Incubators: A Systematic Review","authors":"A. Machado, Araci Hack Catapan, M. Sousa","doi":"10.4018/ijtd.2020040103","DOIUrl":"https://doi.org/10.4018/ijtd.2020040103","url":null,"abstract":"The primary goal of this research is to do a systematic review about management models for business incubators. Management models are grounded in three basic pillars: people, processes, and technologies. In this scenario, the business incubator management model is fundamental because it is important for business incubators to meet the demands of new entrepreneurs and entrepreneurship. Therefore, the objective of this research is to map the light of the systematic review of business incubator management models on the world stage. To do so, the methodology used was the integrative review of the literature using the Scopus database and regulations, international and national documents. As a result, one of the problems found in these models was that most business incubator management models describe a business incubator as a transformation mechanism, but do not spell out details about the incubation process or models and best practices for business incubators. management for the continuous improvement of incubated enterprises.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ooredoo Rayek: A Business Decision Support System Based on Multi-Language Sentiment Analysis of Algerian Operator Telephones 基于阿尔及利亚运营商电话多语言情感分析的业务决策支持系统
Int. J. Technol. Diffusion Pub Date : 2020-04-01 DOI: 10.4018/ijtd.2020040105
B. Klouche, S. Benslimane, Sakina Rim Bennabi
{"title":"Ooredoo Rayek: A Business Decision Support System Based on Multi-Language Sentiment Analysis of Algerian Operator Telephones","authors":"B. Klouche, S. Benslimane, Sakina Rim Bennabi","doi":"10.4018/ijtd.2020040105","DOIUrl":"https://doi.org/10.4018/ijtd.2020040105","url":null,"abstract":"Sentiment analysis is one of the recent areas of emerging research in the classification of sentiment polarity and text mining, particularly with the considerable number of opinions available on social media. The Algerian Operator Telephone Ooredoo, as other operators, deploys in its new strategy to conquer new customers, by exploiting their opinions through a sentiments analysis. The purpose of this work is to set up a system called “Ooredoo Rayek”, whose objective is to collect, transliterate, translate and classify the textual data expressed by the Ooredoo operator's customers. This article developed a set of rules allowing the transliteration from Algerian Arabizi to Algerian dialect. Furthermore, the authors used Naïve Bayes (NB) and (Support Vector Machine) SVM classifiers to assign polarity tags to Facebook comments from the official pages of Ooredoo written in multilingual and multi-dialect context. Experimental results show that the system obtains good performance with 83% of accuracy.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132801392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Adoption of Security Control Apps among Smartphone Users in Tanzania 坦桑尼亚智能手机用户对安全控制应用程序的采用情况
Int. J. Technol. Diffusion Pub Date : 2019-10-01 DOI: 10.4018/ijtd.2019100101
D. Koloseni, E. Sedoyeka
{"title":"The Adoption of Security Control Apps among Smartphone Users in Tanzania","authors":"D. Koloseni, E. Sedoyeka","doi":"10.4018/ijtd.2019100101","DOIUrl":"https://doi.org/10.4018/ijtd.2019100101","url":null,"abstract":"Threats to mobile devices and smartphones, in particular, are on the rise, suggesting that data and information residing in the mobile device such as smartphones are in danger of being attacked. The current study employs an extended TBP as a theoretical framework to investigate the adoption of security control apps (i.e. antivirus) to safeguard against the attacks. A theoretical framework was tested using structural equation modelling (SEM) with data collected from 233 respondents. The study found that social influence, attitude and security awareness have an influence on the intention to adopt antivirus software while perceived behavioral control and individual risk propensity have no influence. Further security awareness has an influence on the attitude of smartphone users towards using antivirus software.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum Handoff Mechanism in the Framework of Mobility Management in Cognitive Radio Networks 认知无线网络中移动性管理框架下的频谱切换机制
Int. J. Technol. Diffusion Pub Date : 2019-10-01 DOI: 10.4018/ijtd.2019100102
Prince Semba Yawada, M. J. M. Kiki, M. Dong
{"title":"Spectrum Handoff Mechanism in the Framework of Mobility Management in Cognitive Radio Networks","authors":"Prince Semba Yawada, M. J. M. Kiki, M. Dong","doi":"10.4018/ijtd.2019100102","DOIUrl":"https://doi.org/10.4018/ijtd.2019100102","url":null,"abstract":"Cognitive radio appears as an innovative technology in the field of access to wireless systems, aimed at significantly improving the use of the radio spectrum by allowing an opportunistic access manner. This article deals with some of the important characteristics of the spectrum mobility in cognitive radio networks (CRNs).The new management approach to the mobility and the connection are designed to reduce the latency and loss of information during spectrum handoff. A list of channel safeguards are maintained in this effect, but the maintenance and updates are a challenge. In this article, the authors describe the reasons and mechanisms for spectrum handoff. Algorithms have been developed to illustrate this handoff mechanism and make the comparison between the different methods of spectrum handoff. The simulation results obtained confirm that the proposed method and the algorithms developed presents a better performance.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信