405 research outputs found

    Effect of Trust and Ease Of Popularity of Interest Transaction System to Improve Online Website PT KAI (A Study on Passenger Train in Semarang Tawang Station)

    Get PDF
    The purpose of this research is to Investigate the Effects of Trust, Easy of System, Popularity System and the effect the popularity of the system on an on-line transaction. The study was conducted at passengers KAI Semarang Tawang Station, the sample size is about 125 passengers. The data is processed using the Structural Equation Modeling (SEM) roomates assisted by the application program of Analysis of Moment Structure (AMOS) version 18.0. According to the analysis, it is concluded as the followings: easy of system has a positive effect on the popularity of the system; trust has a positive effect on the popularity of the system; popularity of the system has a positive effect on the on-line transaction; easy of sytem has a positive effect on the on-line transaction; trust has a not effect on the on-line transaction

    Interaction effects on prediction of children weight at school entry using model averaging

    Get PDF
    Model selection introduce uncertainty to the model building process, therefore model averaging was introduced as an alternative to overcome the problem of underestimate of standards error in model selection. This research also focused on using selection criteria between Corrected Akaike's Information Criteria (AICC) and Bayesian Information Criteria (BIC) as weight for model averaging when involving interaction effects. Mean squared error of prediction (MSE(P)) was used in order to determine the best model for model averaging. Gateshead Millennium Study (GMS) data on children weight used to illustrate the comparison between AICC and BIC. The results showed that model selection criterion AICC performs better than BIC when there are small sample and large number of parameters included in the model. The presence of interaction variable in the model is not significant compared to the main factor variables due to the lower coefficient value of interaction variables. In conclusion, interaction variables give less information to the model as it coefficient value is lower than main factor

    Adaptive Mobility Management Scheme for Mobile IP using Ad Hoc Networks.

    Get PDF
    Mobile IP has been developed to handle global mobility of mobile hosts. Mobile IP suffers from a number of drawbacks such as frequent location update, high signaling overhead, high handover latency, high packet loss rate, and requirement of infrastructure change. To treat these problems, we propose a new mobility management scheme by constructing dynamic service regions of Ad Hoc networks for roaming mobile host without location update to reduce signaling overhead and packets loss. Analytical analysis and simulation results are shown in this paper to demonstrate that the proposed scheme performs better performance than other schemes

    Research on the Application of E-commerce to Small and Medium Enterprises (SMEs): the Case of India

    Full text link
    SMEs account for a large proportion and play an important role in the development of each country in the world, including India. The globalization will bring many advantages for enterprises however SMEs will face fierce competition at the local, national and International level. In order to maintain and promote the important role of SMEs in the context of increased competition, SMEs have to change and adopt new technologies. E-commerce and digital technologies are bringing opportunities to help SMEs improve their competitiveness, narrow the gap with big enterprises thanks to their fairness and flexibility of the digital business environment.       According to UNIDO (2017), India is one of the countries successfully applying e-commerce to SMEs. Contributing to this success is the important role of the Indian government. Therefore, this paper focuses on researching the application of e-commerce to SMEs in terms of the role of government in promoting and creating an ecosystem for SMEs and e-commerce development

    A soa-based e-government data integration

    Get PDF
    Data Integration presents a core issue in the Palestinian e-Government Technical Framework. The currently used data integration model relies on the Integrated Central Database which lacks quality attributes such as: interoperability and flexibility. We purpose a SOA-based approach for data integration that achieves the above attributes. We present and analyze the current architecture and implementation of the Palestinian e-Government Integrated Central Database model. We transform the current model into a SOA framework that is realized using Enterprise Service Bus (ESB) and Web Services. The proposed framework offers database replication and connectivity functionalities for the Central Database. The proposed framework is evaluated using a scenario-based software architecture evaluation method and proves that it achieves the framework goals of quality attributes: interoperability and flexibility. Moreover, a prototype of the framework is implemented and validates the framework correctness. A specific usage is presented and further proves that the framework accomplishes its functionality and quality attributes

    ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM

    Get PDF
    Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :). The question supposes that the two methods could be compared on completely the same indicators – well, from my point of view, the comparison is not very relevant. Encryption specialists have demonstrated that the sizes of public key encrypted messages are much bigger than the encrypted message using private key algorithms. From this point of view, we can say that private key algorithms are more efficient than their newer counterparts. Looking at the issue through the eyeglass of the security level, the public key encryption have a great advantage of the private key variants, their level of protection, in the most pessimistic scenarios, being at least 35 time higher. As a general rule, each type of algorithm has managed to find its own market niche where could be applicable as a best solution and be more efficient than the other encryption model.Encryption, decryption, key, cryptanalysis, brute-force, linear, differential, algebra
    • …
    corecore