17,636 research outputs found

    The role of trust in e-government adoption: A systematic literature review

    Get PDF
    Electronic government (e-government) is a concept that has been adopted in most countries for the purposes of providing government services digitally, improving transparency between government and citizens and enabling additional communication channels with the government. Although e-government readiness in most countries is at a high level, adoption of e-government services is still considered tentative. A critical review of the literature suggests that this may be linked to citizens’ trust in government and e-government. As such, there is a need to investigate the role of trust in e-government adoption. For this purpose, a systematic literature review was conducted in order to observe research design, methodologies and approaches adopted in these studies as well as limitations identified and recommendation for future studies. The findings highlight that quantitative techniques and survey research methods appear to have been much preferred over other available alternatives such as qualitative techniques and interview methods or mixed methods in studies relating to trust in e-government adoption

    MODLEACH: A Variant of LEACH for WSNs

    Full text link
    Wireless sensor networks are appearing as an emerging need for mankind. Though, Such networks are still in research phase however, they have high potential to be applied in almost every field of life. Lots of research is done and a lot more is awaiting to be standardized. In this work, cluster based routing in wireless sensor networks is studied precisely. Further, we modify one of the most prominent wireless sensor network's routing protocol "LEACH" as modified LEACH (MODLEACH) by introducing \emph{efficient cluster head replacement scheme} and \emph{dual transmitting power levels}. Our modified LEACH, in comparison with LEACH out performs it using metrics of cluster head formation, through put and network life. Afterwards, hard and soft thresholds are implemented on modified LEACH (MODLEACH) that boast the performance even more. Finally a brief performance analysis of LEACH, Modified LEACH (MODLEACH), MODLEACH with hard threshold (MODLEACHHT) and MODLEACH with soft threshold (MODLEACHST) is undertaken considering metrics of throughput, network life and cluster head replacements.Comment: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, Franc

    Model based optimal bit allocation

    Get PDF
    Modeling of the operational rate-distortion characteristics of a signal can significantly reduce the computational complexity of an optimal bit allocation algorithm. In this report, such models are studied

    Classification of colon biopsy samples by spatial analysis of a single spectral band from its hyperspectral cube

    Get PDF
    The histopathological analysis of colon biopsy samples is a very important part of screening for colorectal cancer. There is, however, significant inter-observer and even intra-observer variability in the results of such analysis due to its very subjective nature. Therefore, quantitative methods are required for the analysis of histopathological images to aid the histopatholgists in their diagnosis. In this paper, we exploit the shape and structure of the gland nuclei cells for the classification of colon biopsy samples using two-dimensional principal component analysis (2DPCA) and Support Vector Machine (SVM). We conclude that the use of textural features extracted from non-overlapping blocks of the histopathological images results in a non-linear decision boundary which can be efficiently exploited using a SVM with appropriate choice of parameters for its Gaussian kernel. The SVM classifier outperforms all the remaining methods by a clear margin

    Mobile Application Security Platforms Survey

    Get PDF
    Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy. This paper aims to introduce a consolidated report of thriving security on mobile application platforms and providing knowledge of vital threats to the users and enterprises. Furthermore, in this paper, various techniques as well as methods for security measurements, analysis and prioritization within the peak of mobile platforms will be presented. Additionally, increases understanding and awareness of security on mobile application platforms to avoid detection, forensics and countermeasures used by the operating systems. Finally, this study also discusses security extensions for popular mobile platforms and analysis for a survey within a recent research in the area of mobile platform security

    Investigating the performance of Correspondence Algorithms in Vision based Driver-assistance in Indoor Environment

    Full text link
    This paper presents the experimental comparison of fourteen stereo matching algorithms in variant illumination conditions. Different adaptations of global and local stereo matching techniques are chosen for evaluation The variant strength and weakness of the chosen correspondence algorithms are explored by employing the methodology of the prediction error strategy. The algorithms are gauged on the basis of their performance on real world data set taken in various indoor lighting conditions and at different times of the dayComment: 7 pages, 9 figures,Published with International Journal of Computer Applications (IJCA

    Human Resource Management And The Performance Of Selected Small And Medium Manufacturing Enterprises

    Get PDF
    Despite many studies on human resource management can be found in the literature, until recently, studies on the moderating effects of this factor on the relationship between innovation and firm performance are hardly existent. In filling the literature gap, this study attempts to address the questions of how HRM practices and its interactions with innovation affect the performance of SMEs. Two hundred eighty-four samples were obtained from the food and beverage, textile and clothing and wood-based small and medium manufacturing enterprises in Malaysia. Using the multiple regression analysis, this study found that human resource management practices in terms of employee and employer’s trainings interacted with innovation and significantly affected the performance of SMEs. Keywords: Human Resource Management, Innovation, Firm Performance, Malaysi
    corecore