{"title":"Survey on Factors Affecting University-Industry Knowledge Sharing Practices: The Case of Addis Ababa University College of Veterinary Medicine","authors":"Fikru Minwalkulet, Temtim Assef","doi":"10.4172/2165-7866.1000249","DOIUrl":"https://doi.org/10.4172/2165-7866.1000249","url":null,"abstract":"Knowledge is an asset for organizations that brings competitive advantage if it is created, acquired, shared and applied properly. Knowledge sharing is a process that may take place across individuals as well as groups, departments and organizations to bring organizational competitiveness. Although knowledge sharing has significant importance for organizational competitiveness, the knowledge sharing process might be very complex due to different factors. Thus, the purpose of this study was to assess factors that affect university-industry knowledge sharing practices taking Addis Ababa University College of Veterinary Medicine (AAU-CVM) as a specific case. A cross sectional study design was applied to conduct the study during December, 2018 to May, 2018 and to select study participants simple random sampling was used. The source population consists of academic staff working in Addis Ababa University College of Veterinary Medicine. Study subjects those who consent to participate on the study were included using simple random sampling technique. The sample size required was calculated using Krejcie and Morgan sample determination table. Accordingly, from a total population of 80 academic staff in the college, 66 respondents were selected. The result [1] of the study revealed that individual factors willingness (correlation coefficient=.581), trust (.612), motivation to share knowledge (correlation coefficient =.545) and awareness of KS as duties (correlation coefficient =.513); organizational factors (periodic plan for sharing knowledge (correlation coefficient =.346); and technological factors availability of up-to-date ICT infrastructure(correlation coefficient =.331) and updated website for sharing knowledge(correlation coefficient =.443) were identified as having significant impact on knowledge sharing practices. Thus, college of veterinary medicine should work on these identified significant knowledge sharing factors to get the most out of knowledge sharing with industry stakeholders.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"08 1","pages":"0-0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000249","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Value Creation through Blockchain Technology in Supply Chain Management","authors":"S. Koul","doi":"10.4172/2165-7866.1000248","DOIUrl":"https://doi.org/10.4172/2165-7866.1000248","url":null,"abstract":"In the last several years, digitization in supply chain management (SCM) has been primarily focused. The digital transformation has brought tremendous value to the supply chain organizations. As published in the article “How to Achieve Six-Figure Benefits from Digitizing Paper-Based Supply Chain Operations, 2018”, it has been proven that digital transformation has improved efficiencies and productivity in the supply chain operations by leaps and bounds. With the foundation of the Digital transformation now the current era of fast communication needs to use the blockchain technology in SCM. The primary objective of this paper is to focus on what values Blockchain in SCM can add for the customer and the business community. Using blockchain in SCM provides an incredible advantage of securing /retaining the origin of multiple entities (data), help detecting fraud, improve inventory management, detect the issues earlier in the SCM cycle, help in fast-tracking of goods (Logistics), and build the customer trust. As an example blockchain in the food industry will help to track every step in the supply chain cycle and improve the visibility of goods, can help to improve the efficiency and have less wastage/loss because of the shelf-life and inconsistencies in the SCM and provide real value-added information to the consumer. For example, by reading a simple QR code with a smartphone, data such as an animal’s date of birth, use of antibiotics, vaccinations, and location where the livestock was harvested can easily be conveyed to the consumer. In food, for example, a retailer would know with whom his supplier has had dealings. Additionally, since transactions are not stored in any single location, it is almost impossible to hack the information.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"08 1","pages":"0-0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70697007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Information Retrieval: A Survey","authors":"Rabia Tehseen","doi":"10.4172/2165-7866.1000241","DOIUrl":"https://doi.org/10.4172/2165-7866.1000241","url":null,"abstract":"","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"08 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000241","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on IOT and Block Chain: Security and Challenges","authors":"N. PhaniKumar, Venkat Krishna Ch, Seshu Kiran Tv","doi":"10.4172/2165-7866.1000251","DOIUrl":"https://doi.org/10.4172/2165-7866.1000251","url":null,"abstract":"The Internet of Things (IoT) is a biological system of regularly expanding multifaceted nature; it's the following flood of development that will adapt each question in our life, and it is the following dimension of robotization for each protest we use. IoT is bringing an ever increasing number of things into the computerized overlay each day, which will probably make IoT a multi-trillion-dollar industry sooner rather than later. To comprehend the size of enthusiasm for the web of things (IoT), simply check what number of meetings, articles and studies have been led about IoT as of late. This intrigue has hit fever contribute point 2016 the same number of organizations see huge chance and trust that IoT holds the guarantee to extend and enhance organizations forms and quicken development. Nonetheless, the quick advancement of the IoT advertise has caused a blast in the number and assortment of IoT arrangements, which made genuine difficulties as the business develops, mostly, the earnest requirement for a safe IoT model to perform basic assignments, for example, detecting, preparing, stockpiling, and conveying. Building up that model will never be a simple errand by any stretch of the creative ability, there are numerous obstacles and difficulties confronting a genuine secure IoT demonstrate. The greatest test confronting IoT security is originating from the plain design of the current IoT environment; it's everything dependent on a brought together model known as the server/client display. All gadgets are distinguished, validated and associated through cloud servers that help enormous handling and capacity limits. The association between gadgets should experience the cloud, regardless of whether they happen to be a couple of feet separated. While this model has associated registering gadgets for quite a long time and will keep on supporting today IoT systems, it won't have the capacity to react to the developing needs of the enormous IoT biological systems of tomorrow.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"08 1","pages":"0-0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000251","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70697067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Do We Measure Project Success? A Survey","authors":"Al Shaaby A, Ahmed A","doi":"10.4172/2175-7866.1000229","DOIUrl":"https://doi.org/10.4172/2175-7866.1000229","url":null,"abstract":"In fact, the principal objective of all projects is to be successful. Doubts often arise about what and who actually determine project success. Many success criteria (SC) have been proposed and considered in the previous years to handle the project success issue. The main purpose of this paper is to explore success criteria of the project from various perspectives of people looking at the project. A comprehensive technical survey of the recent papers which identified the success criteria of the project was conducted. An analysis of this survey yields many criteria which can be used to determine if the project is successful or unsuccessful. Findings show that the most important criteria to measure the successful of the project are four criteria listed in order of their significance as Time, Quality, Cost, and Scope.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2175-7866.1000229","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70878356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted Nonlinear Least Squares Technique for Parameters Estimation of the NHPP Gompertz Model","authors":"L. A. Turk","doi":"10.4172/2175-7866.1000231","DOIUrl":"https://doi.org/10.4172/2175-7866.1000231","url":null,"abstract":"With the problem of heteroscedasticity an alternative precise estimation method of the nonlinear least squares (NLS) technique is needed. Weighted nonlinear least squares estimation (WNLSE) technique is an alternative that may increase the accuracy of parameters estimation by assigning suitable weights to the time between failures data. In the present study, the traditional maximum likelihood (ML), nonlinear least squares (NLS), and weighted nonlinear least squares (WNLS) techniques are formulated to estimate the three parameters of the NHPP Gompertz model. Empirical weighting method is investigated in NHPP Gompertz model prediction process. Three real software failure data examples are provided to analyze the performance of the three considered methods of estimation. The results of this numerical study indicate the preferences to the WNLSE method with respect to the NHPP Gompertz model’s performance, also the value of the weighting factors which give the optimum solution differ according to the nature of software failure data.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70878514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mostafa Jabbari, M. Lundin, Mohammad Hatamvand, M. Skrifvars, M. Taherzadeh
{"title":"Computer-aided theoretical solvent selection using the simplex method based on Hansen solubility parameters","authors":"Mostafa Jabbari, M. Lundin, Mohammad Hatamvand, M. Skrifvars, M. Taherzadeh","doi":"10.4172/2165-7866.1000242","DOIUrl":"https://doi.org/10.4172/2165-7866.1000242","url":null,"abstract":"Solvent selection is a crucial step in all solvent-involved processes. Using the Hansen solubility parameters (HSPs)could provide a solvent/solvent-mixture, but there are two main challenges: 1) Wh ...","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000242","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Data Mining Techniques in the Analysis of Acoustic Sound Characteristics","authors":"Mojtaba Talafi Daryani, Hossein Khabiri, Zahra Yamini","doi":"10.4172/2165-7866.1000238","DOIUrl":"https://doi.org/10.4172/2165-7866.1000238","url":null,"abstract":"In recent years, the analysis of acoustic characteristics of speech and sound has been one of the areas that data mining has found its way through. The present research study is also related to this topic which aims to detect the gender of the speaker by using the acoustic feature of his voice. In this research, the data set includes 3,168 recorded voice samples gathered from female and male speakers. Through acoustic analysis, 20 characteristics along with the desired labels were extracted and prepared for the data mining process. Finally, using Python programming language tools, 6 different techniques were used to construct an appropriate problem-solving model. These techniques were: support vector machines, logistic regression, random forest, regression and classification trees, adaptive boosting, and K-nearest neighbor. The accuracy of the models was also compared with each other. The obtained results revealed that the accuracy of all these techniques was sufficiently high (above 90%) for solving the problem and the model made by them had the necessary efficiency for classification. Moreover, the obtained model was specifically evaluated through decision tree and some principles and rules existing in the model were extracted. As a result, it was revealed that average fundamental frequency measured across the audio signal is the key characteristic of the sound for the evaluation of the voice gender to the extent that it plays a key role in data classification.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"08 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shankareppagol Lm, C. AkshayBajirao, J. YuvrajPraksh, P. RadhikaRamesh, S. SamruddhiSuryawanshi, H. SuhasShankarrao
{"title":"Review on IoT Based Dam Parameters Monitoring Syste","authors":"Shankareppagol Lm, C. AkshayBajirao, J. YuvrajPraksh, P. RadhikaRamesh, S. SamruddhiSuryawanshi, H. SuhasShankarrao","doi":"10.4172/2165-7866.1000247","DOIUrl":"https://doi.org/10.4172/2165-7866.1000247","url":null,"abstract":"Dam plays a major role in our life as they are used for purpose such as irrigation flood control and mainly generation of electricity. There are approximately 4200 major/minor dams in India. When it comes to monitoring the parameters of dam such as Water Level, Gate Position, Water Discharge and Seepage tank level the manual method fails. This project will help out to automatically measure as well as display the data parameters. The sensors connected to Raspberry pi 3 measures the parameters and shares the data through IoT to Website. The development of this project not only help to dam authority and disaster management to control the parameters as well as common people to know.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"08 1","pages":"0-0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}