International Journal of Information Engineering and Electronic Business最新文献

筛选
英文 中文
A Novel Approach for Video Inpainting Using Autoencoders 一种利用自编码器进行视频补图的新方法
International Journal of Information Engineering and Electronic Business Pub Date : 2021-12-08 DOI: 10.5815/ijieeb.2021.06.05
Irfan A. Siddavatam, A. Dalvi, D. Pawade, A. Bhatt, Jyeshtha Vartak, Arnav Gupta
{"title":"A Novel Approach for Video Inpainting Using Autoencoders","authors":"Irfan A. Siddavatam, A. Dalvi, D. Pawade, A. Bhatt, Jyeshtha Vartak, Arnav Gupta","doi":"10.5815/ijieeb.2021.06.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.06.05","url":null,"abstract":"Inpainting is a task undertaken to fill in damaged or missing parts of an image or video frame, with believable content. The aim of this operation is to realistically complete images or frames of videos for a variety of applications such as conservation and restoration of art, editing images and videos for aesthetic purposes, but might cause malpractices such as evidence tampering. From the image and video editing perspective, inpainting is used mainly in the context of generating content to fill the gaps left after removing a particular object from the image or the video. Video Inpainting, an extension of Image Inpainting, is a much more challenging task due to the constraint added by the time dimension. Several techniques do exist that achieve the task of removing an object from a given video, but they are still in a nascent stage. The major objective of this paper is to study the available approaches of inpainting and propose a solution to the limitations of existing inpainting techniques. After studying existing inpainting techniques, we realized that most of them make use of a ground truth frame to generate plausible results. A 'ground truth' frame is an image without the target object or in other words, an image that provides maximum information about the background, which is then used to fill spaces after object removal. In this paper, we propose an approach where there is no requirement of a 'ground truth' frame, provided that the video has enough contexts available about the background that is to be recreated. We would be using frames from the video in hand, to gather context for the background. As the position of the target object to be removed will vary from one frame to the next, each subsequent frame will reveal the region that was initially behind the object, and provide more information about the background as a whole. Later, we have also discussed the potential limitations of our approach and some workarounds for the same, while showing the direction for further research.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131018136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile-based Attendance Monitoring System Using Face Tagging Technology 基于人脸标记技术的手机考勤监控系统
International Journal of Information Engineering and Electronic Business Pub Date : 2021-12-08 DOI: 10.5815/ijieeb.2021.06.03
Mariel Y. Cabrillas, Ruth G. Luciano, Maria Isidra P. Marcos, Jet C. Aquino, Ronnie Camilo F. Robles
{"title":"Mobile-based Attendance Monitoring System Using Face Tagging Technology","authors":"Mariel Y. Cabrillas, Ruth G. Luciano, Maria Isidra P. Marcos, Jet C. Aquino, Ronnie Camilo F. Robles","doi":"10.5815/ijieeb.2021.06.03","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.06.03","url":null,"abstract":"Manual checking of attendance may lead to inconsistency of data inputs and may generate unreliable attendance result. Hence, Radio Frequency Identification (RFID) system has been developed to solve this problem, but it allows only checking student’s attendance as they enter and exit the school premise only. In consequence, teachers in every subject still need to check and monitor students’ attendance manually. Nevertheless, due to a usual large number of students entering and existing the school premise as they are tapping their RFID card, there is always a possibility of proxy attendance. Thus, Mobile-Based Attendance Monitoring System Using Face Tagging Technology (MBAMSUFTT) was developed to provide an attendance monitoring system through biometric authentication such as face recognition. The system serves as a tool for teachers to check and monitor student’s attendance in most reliable and accurate way using their smart phones. The MBAMSUFTT generates attendance report intended for close monitoring and printing of student’s attendance result. But the reliability of the attendance result (output) of the system depends on the quality of picture (input) sent by the user. Camera specification, ambiance lighting condition, and proper position of students while taking photo is exclusively required. The server and the mobile part can only run together if Wireless Fidelity is on, otherwise, monitoring will not be executed. As a developmental research, this study used the Agile Model based on System Development Life Cycle (SDLC) intended for building a project that can adapt to change requests quickly. The MBAMSUFTT was evaluated based on the ISO/IEC 25010; MBAMSUFTT’s software quality characteristics by the IT experts, and its functionality, performance efficiency, and usability by the teachers. The analysis of the data revealed that the MBAMSUFTT serves its intended purpose in checking and monitoring students’ attendance per subject area with more accurate and reliable attendance results and has also met the ISO software quality standards.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Dominance of Organizational Culture towards the Effectiveness of System Based on Islamic Values 组织文化对基于伊斯兰价值观的制度有效性的主导作用
International Journal of Information Engineering and Electronic Business Pub Date : 2021-12-08 DOI: 10.5815/ijieeb.2021.06.01
Syaifullah, Tengku Khairil Ahsyar
{"title":"The Dominance of Organizational Culture towards the Effectiveness of System Based on Islamic Values","authors":"Syaifullah, Tengku Khairil Ahsyar","doi":"10.5815/ijieeb.2021.06.01","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.06.01","url":null,"abstract":"Organizational culture is the dominant value or habit that becomes the driving force for an organization. Values, thoughts, and symbols based on Islam that influence the norms of behavior, attitudes, habits, and habits of a person in various fields become the culture of Islamic organizations that are believed to be true. The fundamental problem in this research is that organizations do not understand what the dominant organizational culture is today, how effective the system users are with these cultural conditions, and whether the current level of effectiveness of the dominant culture follows Islamic values. Previous research shows the relationship between organizational culture and effectiveness, while this study adds new variables, and proves the relationship of organizational culture dominance model with system effectiveness based on Islamic values on practical contribution, and creates a new model on theoretical contribution. The research phase begins with finding the current dominant organizational culture using the Organizational Culture Assessment Instrument and the Cultural Values Framework Instrument. Next, look for the relationship between the current dominant organizational culture and the effectiveness of the system by using the Delone and Mclean Is Success Model. Then combine the second model based on Islamic values using Structural Equation Modeling (SEM) Partial least square (PLS). The result of this research is that there is a relationship between the dominance of the current organizational culture and the effectiveness of information systems. This is because the dominant organization is a clan that is familial in reaching an agreement, commitment between members in communicating, increasing the intensity of members in using information systems, systems that are easy to reach and use, and the quality of information systems that are easy, effective, and accountable. Meanwhile, the dominance of organizational culture on the effectiveness of information systems based on Islamic values has not been fully proven. This means that the dominance of organizational culture on the effectiveness of the Islamic values information system still needs to be adjusted to the four indicators on the Islamic values variable showing the closeness of values.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Smote-based Model for Dyslexia Prediction 一个有效的基于smote的阅读障碍预测模型
International Journal of Information Engineering and Electronic Business Pub Date : 2021-12-08 DOI: 10.5815/ijieeb.2021.06.02
Vani Chakraborty, Meenatchi Sundaram
{"title":"An Efficient Smote-based Model for Dyslexia Prediction","authors":"Vani Chakraborty, Meenatchi Sundaram","doi":"10.5815/ijieeb.2021.06.02","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.06.02","url":null,"abstract":"Dyslexia is a learning disability which causes difficulty in an individual to read, write and spell and do simple mathematical calculations. It affects almost 10% of the global population and detecting it early is paramount for its effective handling. There are many different methods to detect the risk of Dyslexia. Some of these methods are using assessment tools, handwriting recognition, expert psychological help and also using the eye movement data recorded while reading. One of the other convenient and easy ways of detecting risk of dyslexia is to make an individual participate in a simple game related to phonological awareness, syllabic awareness, auditory discrimination, lexical awareness, visual working memory, and many more and recording the observations. The proposed research work presents an effective way of predicing the risk of dyslexia with high accuracy and reliability. It uses a dataset made available from the kaggle repository to predict the risk of dyslexia using various machine learning algorithms. Also it is observed that the dataset has an unequal distribution of positive and negative cases and so the classification accuracy is compromised if used directly. The proposed research work uses three resampling techniques to reduce the imbalance in the dataset. The resampling techniques used are undersampling using near-miss algorithm, oversampling using SMOTE and ADASYN. After applying the undersampling near-miss algorithm, best accuracy was given by SVC classifier with the value of 81.63%. All the other classifiers used in the experiment produced accuracy in the range of 64% to 79.08%. After using the oversampling algorithm SMOTE, the classifiers produced very good results in the evaluation metrics of accuracy,CV score, F1 Score and recall. The maximum accuracy was given by RandomForest with a value of 96.37% and closely followed by XGBBoosting and GradientBoosting with an accuracy of 95.14%. Decision tree, SVC and ADABoost got an accuracy of 91.26%, 93.36% and 93.48% respectively. Even the values of CV score, F1 and recall were considerably high for all these classifiers. After applying the oversampling technique of ADASYN, RandomForest algorithm generated maximum accuracy of 96.25%. Between the two oversampling techniques, SMOTE algorithm performed slightly better in producing better evaluation metrics than ADASYN. The proposed system has very high reliability and so can be effectively used for detecting the risk of dyslexia.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121842863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Innovative Approach in Electronic Voting System Based on Fingerprint and Visual Semagram 一种基于指纹和视觉符号的电子投票系统创新方法
International Journal of Information Engineering and Electronic Business Pub Date : 2021-10-08 DOI: 10.5815/ijieeb.2021.05.03
Adewale Olumide S., B. Olutayo K., Salako E. Adekunle
{"title":"An Innovative Approach in Electronic Voting System Based on Fingerprint and Visual Semagram","authors":"Adewale Olumide S., B. Olutayo K., Salako E. Adekunle","doi":"10.5815/ijieeb.2021.05.03","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.05.03","url":null,"abstract":": An election is a formal procedure through which a group of individuals decides on an individual or multiple individual to be in a position of authority using mechanical, paper-based and electronic methods. Despite the measures to secure the voting systems from fraudulent activities among corrupt politicians and election officers, attackers have been compromising the security measures thereby, providing illegitimate opportunities for unwanted contestants to win elections. This research was on the development of an electronic voting system using fingerprint and visual semagram techniques. The proposed e-voting model had six modules for effectiveness in the e-voting system. It was implemented using Java in Android Studio and C-Sharp (C#) in Microsoft Visual Studio, and was tested in an official deanship election of five faculties in a tertiary institution. Every illegible staff was enrolled and presented with a voter identification number (VIN) card. The voter's fingerprint and VIN were the fundamental credentials required for authentication and to poll a legitimate vote to a preferred contestant at a designated polling centre. The sensitive results were firstly encrypted and secondly concealed in an image to produce \"Vimago\" using the visual semagram technique. The \"Vimago\" was subjected to steganalysis and concealed results were not detected. An Equal Error Rate of 0.0019, a sensitivity of 0.9962 and an accuracy of 99.81% were obtained from the experiment. Based on the experimental results, the proposed e-voting model is highly recommended for use by various electoral commissions for voting and security agencies for the dissemination of sensitive information through the public network, the manufacturers of electronic voting machines are hereby offered a model for use in the development and securing of a fingerprint-based platform for a voting system were made among other recommendations.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129882161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Folding Bicycle Prospective Buyer Prediction Model 折叠自行车潜在买家预测模型
International Journal of Information Engineering and Electronic Business Pub Date : 2021-10-08 DOI: 10.5815/ijieeb.2021.05.01
Trianggoro Wiradinata
{"title":"Folding Bicycle Prospective Buyer Prediction Model","authors":"Trianggoro Wiradinata","doi":"10.5815/ijieeb.2021.05.01","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.05.01","url":null,"abstract":"The trend of bicycle exercise during the pandemic has resulted in increased sales and even scarcity of bicycle stock in some shops. The phenomenon has raised attention from both the bicycle industry and government to provide necessary responses toward the trends. Even though it is a trend, many prospective buyers are still confused about their choices. The types of bicycles that sell the most on the market are folding bikes, mountain bikes, and racing bikes. The research data were collected from 242 bicycle users who came from various bicycle communities in major cities of Java Island, Indonesia. Some of the predictors used were age, gender, height, weight, and cycling speed. The target variable is the type of bicycle whose data is categorical. Predictor variables consist of nominal and ordinal variables, so preprocessing needs to be done using Python's Sklearn library. To test the accuracy of the model, the data was broken down into training data and test data with a test size of 20%. Several methods are used to form a classification model, including K-NN, Naive Bayes, Support Vector Machine, Decision Tree, and Random Forest. The results of the classification model evaluation show that the Support Vector Machine and Decision Tree have the highest accuracy of 90%, while Naive Bayes has the lowest accuracy of 73%. The model formed can be a predictive tool for potential bicycle buyers in order to be able to choose the right type of bicycle.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127370404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extended Proxy Mobile IPv6 Scheme Using Global Local Mobility Anchor 基于全局本地移动锚的扩展代理移动IPv6方案
International Journal of Information Engineering and Electronic Business Pub Date : 2021-10-08 DOI: 10.5815/ijieeb.2021.05.04
Eshraga Hussien Elfadil, TajElsir Hassan Suliman, Ahmed Hamza Osman
{"title":"Extended Proxy Mobile IPv6 Scheme Using Global Local Mobility Anchor","authors":"Eshraga Hussien Elfadil, TajElsir Hassan Suliman, Ahmed Hamza Osman","doi":"10.5815/ijieeb.2021.05.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.05.04","url":null,"abstract":"The internet was basically designed for the static nodes, but with the development of mobile nodes such as smart phones, that have wireless capabilities, the first design was insufficient. MNs change their point of attachment while they are roaming (traveling) in the internet, to maintain the survival of ongoing sessions for these mobile nodes, the internet requires techniques for managing mobility.. Currently, there are two types of mobility management protocols, host-based protocols and network-based protocols, the involvement of MN in the mobility process is must in the first type, while is unnecessary in the second type. The IETF standardized the Proxy Mobile IPv6 (PMIPv6) protocol in 2004, to overcome the limitations experienced by the host-based protocol, Mobile IPv6 (MIPv6) such as sub-optimal routing, handover latency, packet loss and single point of failure, however, the biggest drawback of PMIPv6 is the lack of inter-domain handover. This paper provides an efficient scheme based on standard PMIPv6 called (E-PMIPv6) to support inter-domain handover by introducing a new entity called (GLMA) which enables MN to traverse different domains while keeping the ongoing sessions, additionally; we use buffering techniques to preemptively lighten packet losses. The ultimate goal for the suggested scheme is to solve the scalability problem for the PMIPv6 and it is extensions to encourage network operators to deploy E-PMIPv6 for large networks. Results of preliminary analysis of handover latencies and related packet losses favored (E-PMIPv6) over two of the leading contenders.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of an Intelligent Tutoring System for English Reading Comprehension: Design Based on Philippine Public School Flexible Learning Experience 基于菲律宾公立学校灵活学习经验的英语阅读理解智能辅导系统的开发
International Journal of Information Engineering and Electronic Business Pub Date : 2021-10-08 DOI: 10.5815/ijieeb.2021.05.02
Day Bert R. Mariñas, Roberto R. Coloma, Lin V. Tadeja, Shaira Marie J. Castillo, Katherine D. Tan, Frederick F. Patacsil
{"title":"Development of an Intelligent Tutoring System for English Reading Comprehension: Design Based on Philippine Public School Flexible Learning Experience","authors":"Day Bert R. Mariñas, Roberto R. Coloma, Lin V. Tadeja, Shaira Marie J. Castillo, Katherine D. Tan, Frederick F. Patacsil","doi":"10.5815/ijieeb.2021.05.02","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.05.02","url":null,"abstract":": This paper presents an intelligent tutoring system as seen to be successful in assisting in the instruction of basic skill, particularly, reading comprehension. The goal of the study is to develop an Intelligent Tutoring System that will greatly help the Grade 7. The system adapted considerable instructional needs of learners from early development to advanced reading comprehension skills. The developed system provided an immediate feedback to learners upon completion of an activity without requiring intervention from a Teacher. To improve the system, learners and teachers filled out survey questionnaires. The result reveals that teachers and students want the system to be user-friendly, have a user log-in, lesson content with text, audio and video as well as various types of questions in quizzes. They also perceived that the developed ITS is useful and the content is valid thus is very acceptable to be utilized by the learners. In addition, result reveals that student’s reading comprehension could be improved and developed by the proposed ITS.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132312823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Afaan Oromo Named Entity Recognition with Multiple Methods 多方法增强阿法安奥罗莫命名实体识别
International Journal of Information Engineering and Electronic Business Pub Date : 2021-10-08 DOI: 10.5815/ijieeb.2021.05.05
Abdo Ababor Abafogi
{"title":"Boosting Afaan Oromo Named Entity Recognition with Multiple Methods","authors":"Abdo Ababor Abafogi","doi":"10.5815/ijieeb.2021.05.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.05.05","url":null,"abstract":": Named Entity Recognizer (NER) is a widely used method of Information extraction (IE) in Natural language processing (NLP) and Information Retrieval (IR) aimed at predicting and categorizing words of a given text into predefined classes of Named Entities like a person, date/time, organization, location, etc. This paper adopts boosting NER for Afaan Oromo by using multiple methods. Combinations of approaches such as machine learning, the stored rules, and pattern matching make a system more efficient and accurate to recognize candidates name entities (NEs). It takes the strongest points from each method to boost the system performance by voting a candidate NE which is detected in more than 1 entity category or out of context because of word ambiguity, it penalized by Word senses disambiguation. Subsequent NEs tagged with identical tags merged as a single tag before the final output. The evaluation shows the system is outperformed. Finally, the future direction is forwarded a hybrid approach of rule-based with unsupervised zero-resource cross-lingual to enhance more. The proposed approach integrates ML approaches based on a CRF algorithm, rule-based and pattern matching all together to improve the performance of Afaan Oromo NER during the learning and prediction process. It is capable of recognizing seven named entities location name, organization name, person name, currency, date time, percentage, and cardinal number. Voting and disambiguation are performed by comparing the classified candidates to select the most correct NEs type from the contemporary approaches and to penalize as well. The chunking combining two or more subsequent NEs having a similar entity category to be considered as a phrase and assigned a single tag. A wide-range experiment has been conducted on a token of around 40,000 on different features to achieve state-of-the-art performance [6]. To summarize the performance of AOroNER in F1-measure: Person, Organization, and Location name entity category are 83.9%, 83.9%, and 85.8% respectively. Likewise, the numeric and temporal expression such as Date/time, Currency, Percent, and Cardinal number is 88.5%, 85.5%, 88.5%, and 86% performed respectively. the voting of better result. I can conclude that rule base and pattern matching is performs well on numeric entities.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessment of Knowledge Management Application in Banking Sector of Sudan: Case Study Farmer’s Commercial Bank 苏丹银行业知识管理应用评估——以农民商业银行为例
International Journal of Information Engineering and Electronic Business Pub Date : 2021-08-08 DOI: 10.5815/ijieeb.2021.04.01
Rayan Abdelgader Elhassan, A. Yousif, TajElsir Hassan Suliman
{"title":"Assessment of Knowledge Management Application in Banking Sector of Sudan: Case Study Farmer’s Commercial Bank","authors":"Rayan Abdelgader Elhassan, A. Yousif, TajElsir Hassan Suliman","doi":"10.5815/ijieeb.2021.04.01","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.04.01","url":null,"abstract":": Knowledge management is one of the contemporary developments that ensure today’s ‎institutions generate, distribute ‎and apply knowledge to help in administrative ‎decision making, encourage creativity, increasing competitiveness and ‎improving their ‎performance. The study aimed to identify the degree of application of knowledge ‎management concept in ‎Sudanese banks, \"Case study: Commercial Farmer's Bank\". ‎The study focuses on knowledge management and the ‎statistical differences related to ‎gender, age, academic qualification and period of service at the bank. To achieve the ‎aim ‎of the study, the descriptive analytical approach was used. The research relied on ‎the questionnaire as the main tool for ‎data collection. The study population consisted ‎of bank employees in their various positions. A total of 60 questionnaires ‎were ‎distributed, of which 58 were returned for statistical analysis. The results of the study followed standard methodology based on the state of the arts researches. The study found that ‎the degree of application of ‎knowledge management was medium in the field of ‎knowledge creation and acquisition, reaching 68% and high in the ‎field of knowledge ‎storage 74%, knowledge sharing 76% and knowledge application 77%. The results ‎also showed that ‎there were no statistical differences related to gender, age, academic ‎qualification and period of service. ‎","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131446388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信