Proceedings of the 6th International Conference on Information Technology and Multimedia最新文献

筛选
英文 中文
Software development methodologies: A perspective of different strategies linked to a similar goal 软件开发方法论:与相似目标相关联的不同策略的视角
S. Mohanarajah, M. Jabar
{"title":"Software development methodologies: A perspective of different strategies linked to a similar goal","authors":"S. Mohanarajah, M. Jabar","doi":"10.1109/ICIMU.2014.7066625","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066625","url":null,"abstract":"Software development initially used traditional methodologies which have been in the mainstream until the advent of agile methodologies. It is often thought that as traditional methods would be eventually replaced by new methods, it still remains the closest link to a naturally progressive route although the mind-set wants to get rid of the old and get in with the new. But it is not the replacement that is the variable to control. It has to be a dynamic approach which marries the two which is a hybrid methodology where a combination of the old and the new coexist. Interestingly a new strategy also seems to surface which looks at synergies and past pace scenarios, all within the realm of successful software project deliveries. The views and accepted norms from previous research papers are analysed with discussions provided on whether to discourage or encourage the practitioner from a perspective based on what works with and when a certain amount of caveat is imposed.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of ELM-PSO architectures for modelling surface roughness and power consumption in CNC turning operation ELM-PSO结构在数控车削加工中表面粗糙度和功耗建模中的性能分析
Tiagrajah V. Janahiraman, Nooraziah Ahmad
{"title":"Performance analysis of ELM-PSO architectures for modelling surface roughness and power consumption in CNC turning operation","authors":"Tiagrajah V. Janahiraman, Nooraziah Ahmad","doi":"10.1109/ICIMU.2014.7066649","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066649","url":null,"abstract":"The turning operation in the Computer Numerical Control (CNC) needs optimal machining parameters to achieve higher machining efficiency. The selection of machining parameters is very important to find the best performances in machining process. In this study, two different architectures of particle swarm optimization based extreme learning machine were analyzed for modelling inputs parameters: feed rate, cutting speed and depth of cut to output parameters: surface roughness and power consumption. The data were collected from 15 experiments using carbon steel AISI 1045 which were separated into training and testing dataset. Our experimental results shows that Architecture II is the most outstanding model with mean absolute percentage error (MAPE) of 0.0469 for predicting the training data and 0.204 for predicting the testing data.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122127096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting bad utility consumers in Malaysia 预测马来西亚的不良公用事业消费者
A. Hoe, J. Dhillon
{"title":"Predicting bad utility consumers in Malaysia","authors":"A. Hoe, J. Dhillon","doi":"10.1109/ICIMU.2014.7066636","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066636","url":null,"abstract":"In many organizations, especially in most utility companies including Company X, revenue collection is a major issue when customers face difficulties in paying their utility bills before the deadline. There are many reasons for this problem but it becomes a serious financial issue for the organizations when the cumulative amount of bad debts reached a staggering figure. This paper reports a study of this issue for Company X involving its customers based in Bangi and Kajang, totaling upto 1,525 customers. The study is conducted to identify the factors of customers who would default payment of their bills. The identification of such factors is important to enable Company X to identify these customers and implement the necessary measures to mitigate the problem. The CRISP-DM (Cross-Industry Standard Process for data mining) model was employed in conducting the study. The results provide an intial understanding of the issue and the solution model generated could be used to resolve the issue for other areas in Malaysia.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A preliminary study on online data privacy frameworks 网络数据隐私框架初步研究
Andrew Anthony Rao, L. Chen, J. Dhillon
{"title":"A preliminary study on online data privacy frameworks","authors":"Andrew Anthony Rao, L. Chen, J. Dhillon","doi":"10.1109/ICIMU.2014.7066596","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066596","url":null,"abstract":"It cannot be doubted that having a successful framework for an online environment is an exigent task due to the data privacy infringement occurring all around the globe; identities such as the leaking of personal photos, stealing online identities, online scams, bank frauds and the list keeps going and on. Do we want such a predicament to strike us while online? Is our online data privacy out of our reach? Thus ensuring online data privacy is a must for all web users due to the highly valuable personal data conveyed in identifying an individual. In this paper, we critically review three existing online privacy frameworks with regard to their applicability and the manner in which its usage can be brought into the Malaysian online environment. We discuss the strengths and weaknesses of these frameworks and envision a comprehensive framework that would help us in providing a clear path to reduce the major concerns and problems associated with online data privacy in Malaysia. Results from our analyses of existing frameworks indicate that they are not fully being utilized to their fullest potential. The results therein concur different objectives which mostly favour online companies instead of web users.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel execution of SVM using Symmetrical Multi-Processor (LIBSVM-OMP) 基于对称多处理器的支持向量机并行执行
N. S. Md Salleh, Amirul Shafiq Bin Mohamad Shariff, Muhammad Ikhwan Afiq Bin Kamsani, S. Nazeri
{"title":"Parallel execution of SVM using Symmetrical Multi-Processor (LIBSVM-OMP)","authors":"N. S. Md Salleh, Amirul Shafiq Bin Mohamad Shariff, Muhammad Ikhwan Afiq Bin Kamsani, S. Nazeri","doi":"10.1109/ICIMU.2014.7066610","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066610","url":null,"abstract":"Parallel computing is a simultaneous use of multiple compute resources such as processors to solve difficult computational problems. It has been used in high-end computing areas such as pattern recognition, defense, web search engine, and medical diagnosis. This paper focuses on the implementation of pattern classification technique, Support Vector Machine (SVM) using Symmetric Multi-Processor (SMP) approach. We have carried out a performance analysis to benchmark the sequential SVM program against the SMP approach. The result shows that the parallelization of SVM training achieves a better performance than the sequential code speed-ups by 15.9s.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective and efficient attendance tracking system using secret code 有效和高效的考勤系统使用密码
Teh Jian Zhi, Zailani Ibrahim, Hazleen Aris
{"title":"Effective and efficient attendance tracking system using secret code","authors":"Teh Jian Zhi, Zailani Ibrahim, Hazleen Aris","doi":"10.1109/ICIMU.2014.7066613","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066613","url":null,"abstract":"Students' attendance taking and tracking are important in order to monitor students' performance in class. More often than not, students' performance is closely related to their attendance. Good attendance usually leads to good performance and vice versa. Therefore, any problems related to students' attendance should be identified as early as possible so that appropriate measures can be taken to address them. However, tracking students' attendance, especially if done manually, can be tedious and time consuming, especially for classes will large number of students. Not to mention issues related to attendance taking such as signatures forgery where other students are signing on behalf of their absence friends. To address this issue, a unique and secure attendance tracking system is proposed. The system automates most of the steps involved in tracking students' attendance. To address the issue of signature forgery, secret code using MD5 hashing algorithm is implemented as part of the system so that each student will be given a unique code each day to be used for signing attendance. Implementation of the system shows that the time taken to track students' attendance using this system can be significantly reduced and the secret code is able to prevent signature forgery amongst students.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The stakeholders satisfaction about the using social networks in Jordanian hospitals for knowledge sharing 利益相关者对约旦医院使用社会网络进行知识共享的满意度
Zainuddin Bin Hj Hassan, Zaid T. Alhalhouli
{"title":"The stakeholders satisfaction about the using social networks in Jordanian hospitals for knowledge sharing","authors":"Zainuddin Bin Hj Hassan, Zaid T. Alhalhouli","doi":"10.1109/ICIMU.2014.7066623","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066623","url":null,"abstract":"User Satisfaction is one of the most important factors studied by many researchers to develop effective application. This paper presents the user satisfaction evaluation of social networks named as Jordanian Medical Social Network (JMSN) which was designed for staff at Jordanian hospitals. This prototype was used and designed based on the enhanced TPB model of knowledge sharing behavior. A survey was conducted with the stakeholders in the Jordanian hospitals, to get their viewpoints about their satisfaction level on JMSN. Usability and User Experience (USE) questionnaires were distributed to 172 stakeholders who used the social networks. The results from the survey indicate that the prototype achieved higher degree of satisfaction among the stakeholders.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Antecedents for safety in health IT: An exploratory investigation 健康信息技术安全的先行因素:一项探索性调查
L. Salahuddin, Z. Ismail
{"title":"Antecedents for safety in health IT: An exploratory investigation","authors":"L. Salahuddin, Z. Ismail","doi":"10.1109/ICIMU.2014.7066600","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066600","url":null,"abstract":"Most of the accidental harm in the healthcare process related to patient safety leads to medical errors. One of the recommendations to prevent medical errors is through information technology (IT). Health IT has the potential to improve the quality of the healthcare services and essentially patient safety. It suggests the healthcare provider to collect, store, retrieve and transfer patient's information electronically. Nevertheless, there are also growing evidence that the health IT can also post a risk to patient safety when it is poorly designed, implemented or adopted. Previous studies primarily focused on the errors or unintended consequences introduced by the health IT. The root cause of the medical errors due to health IT is multifaceted and originated from numerous factors. In spite of that, little focus has been given on the antecedents that influence the safety of health IT. In order to address this gap, this study investigates the antecedents that influence the safety of health IT. Systematic literature review was conducted to identify articles pertinent to safety of health IT. Science Direct database was searched for reviews relevance articles. Thirteen full articles met the eligibility criteria for further analysis. Usability, availability, compatibility, communication, workaround and knowledge were discerned as the significance antecedents influencing safety in health IT. This study may be of significance in providing useful information on how to safely implement health IT adoption. Various stakeholders such as policy makers, government agencies, healthcare providers, health IT developers and researchers may find this study useful for their respective needs.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Content Management technologies supporting unified businesses 支持统一业务的企业内容管理技术
N. Arshad, S. Milton, R. Bosua, M. Mehat
{"title":"Enterprise Content Management technologies supporting unified businesses","authors":"N. Arshad, S. Milton, R. Bosua, M. Mehat","doi":"10.1109/ICIMU.2014.7066627","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066627","url":null,"abstract":"This paper provides a new perspective on Enterprise Content Management Systems (ECMS)-use and identify novel ways in which these technologies can be used to support organizations' unified business processes. The main objective of this study is to understand and explain how unified businesses that employs highly integrated and standardized business operations could use ECMS to support their work operations. Consequently, empirical investigations using a qualitative research design were conducted in two unified organizations. Empirical evidence of the two cases were brought together in a cross-case analysis and the synthesis resulted in four modes of ECMS-use that could support unified businesses, that is, to: (1) collaborate among units on projects, (2) approve project documents and monitor project progress, (3) access standard operating procedures, and (4) provide links and access to information systems. This research fills the gap in the literature on the topic of ECMS-use and extends prior studies by reporting on organizations' experiences in using ECMS and focusing on how ECMS-use can support business processes. Business and IT managers will have a better understanding on how to maximize and gain benefit from this kind of technologies by embedding the use of it to their daily business operations.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review on IT outsourcing practices for e-business transformation among SMEs in Malaysia 马来西亚中小企业电子商务转型的IT外包实践综述
S. M. Sabri, R. Sulaiman, Azhana Ahmad, Alicia Tang
{"title":"A review on IT outsourcing practices for e-business transformation among SMEs in Malaysia","authors":"S. M. Sabri, R. Sulaiman, Azhana Ahmad, Alicia Tang","doi":"10.1109/ICIMU.2014.7066616","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066616","url":null,"abstract":"SMEs are major contributors to the Malaysia's economic growth. They constitute about 99.2% of registered companies in Malaysia. E-business is believed could help to increase the SMEs competitiveness by venturing into global and virtual marketplace. However, it is reported that only 20% of SMEs have an Internet presence but not fully e-business. Among the limitations that the SMEs faced are lack of IT skills and resources, thus IT outsourcing is seen as one of potential solutions. This research aims to investigate factors that influence the decision to deploy IT outsourcing approach for e-business transformation among the SMEs. This paper discusses the literature review on e-business and IT outsourcing practices for SMEs. A qualitative method via case study approach is used to gather in-depth understanding of the situation. The expected outcomes from this research will be an IT outsourcing model to assist e-business transformation for SMEs. However, this paper will only discuss findings from the literature review.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信