17,636 research outputs found
The role of trust in e-government adoption: A systematic literature review
Electronic government (e-government) is a concept that has been adopted in most countries for the
purposes of providing government services digitally, improving transparency between government and
citizens and enabling additional communication channels with the government. Although e-government
readiness in most countries is at a high level, adoption of e-government services is still considered
tentative. A critical review of the literature suggests that this may be linked to citizens’ trust in
government and e-government. As such, there is a need to investigate the role of trust in e-government
adoption. For this purpose, a systematic literature review was conducted in order to observe research
design, methodologies and approaches adopted in these studies as well as limitations identified and
recommendation for future studies. The findings highlight that quantitative techniques and survey
research methods appear to have been much preferred over other available alternatives such as qualitative
techniques and interview methods or mixed methods in studies relating to trust in e-government
adoption
MODLEACH: A Variant of LEACH for WSNs
Wireless sensor networks are appearing as an emerging need for mankind.
Though, Such networks are still in research phase however, they have high
potential to be applied in almost every field of life. Lots of research is done
and a lot more is awaiting to be standardized. In this work, cluster based
routing in wireless sensor networks is studied precisely. Further, we modify
one of the most prominent wireless sensor network's routing protocol "LEACH" as
modified LEACH (MODLEACH) by introducing \emph{efficient cluster head
replacement scheme} and \emph{dual transmitting power levels}. Our modified
LEACH, in comparison with LEACH out performs it using metrics of cluster head
formation, through put and network life. Afterwards, hard and soft thresholds
are implemented on modified LEACH (MODLEACH) that boast the performance even
more. Finally a brief performance analysis of LEACH, Modified LEACH (MODLEACH),
MODLEACH with hard threshold (MODLEACHHT) and MODLEACH with soft threshold
(MODLEACHST) is undertaken considering metrics of throughput, network life and
cluster head replacements.Comment: IEEE 8th International Conference on Broadband and Wireless
Computing, Communication and Applications (BWCCA'13), Compiegne, Franc
Model based optimal bit allocation
Modeling of the operational rate-distortion characteristics of a signal can significantly reduce the computational complexity of an optimal bit allocation algorithm. In this report, such models are studied
Classification of colon biopsy samples by spatial analysis of a single spectral band from its hyperspectral cube
The histopathological analysis of colon biopsy samples is a very important part of screening for colorectal cancer. There is, however, significant inter-observer and even intra-observer variability in the results of such analysis due to its very subjective nature. Therefore, quantitative methods are required for the analysis of histopathological images to aid the histopatholgists in their diagnosis. In this paper, we exploit the shape and structure of the gland nuclei cells for the classification of colon biopsy samples using two-dimensional principal component analysis (2DPCA) and Support Vector Machine (SVM). We conclude that the use of textural features extracted from non-overlapping blocks of the histopathological images results in a non-linear decision boundary which can be efficiently exploited using a SVM with appropriate choice of parameters for its Gaussian kernel. The SVM classifier outperforms all the remaining methods by a clear margin
Mobile Application Security Platforms Survey
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy. This paper aims to introduce a consolidated report of thriving security on mobile application platforms and providing knowledge of vital threats to the users and enterprises. Furthermore, in this paper, various techniques as well as methods for security measurements, analysis and prioritization within the peak of mobile platforms will be presented. Additionally, increases understanding and awareness of security on mobile application platforms to avoid detection, forensics and countermeasures used by the operating systems. Finally, this study also discusses security extensions for popular mobile platforms and analysis for a survey within a recent research in the area of mobile platform security
Investigating the performance of Correspondence Algorithms in Vision based Driver-assistance in Indoor Environment
This paper presents the experimental comparison of fourteen stereo matching
algorithms in variant illumination conditions. Different adaptations of global
and local stereo matching techniques are chosen for evaluation The variant
strength and weakness of the chosen correspondence algorithms are explored by
employing the methodology of the prediction error strategy. The algorithms are
gauged on the basis of their performance on real world data set taken in
various indoor lighting conditions and at different times of the dayComment: 7 pages, 9 figures,Published with International Journal of Computer
Applications (IJCA
Human Resource Management And The Performance Of Selected Small And Medium Manufacturing Enterprises
Despite many studies on human resource management can be found in the literature, until recently, studies on the moderating effects of this factor on the relationship between innovation and firm performance are hardly existent. In filling the literature gap, this study attempts to address the questions of how HRM practices and its interactions with innovation affect the performance of SMEs. Two hundred eighty-four samples were obtained from the food and beverage, textile and clothing and wood-based small and medium manufacturing enterprises in Malaysia. Using the multiple regression analysis, this study found that human resource management practices in terms of employee and employer’s trainings interacted with innovation and significantly affected the performance of SMEs.
Keywords: Human Resource Management, Innovation, Firm Performance, Malaysi
- …
