3,442 research outputs found
THE SMART CITY INFRASTRUCTURE DEVELOPMENT & MONITORING
The smart city infrastructure is the introductory step for establishing the overall smart city framework and architecture. Very few smart cities are recently established across the world. Some examples are: Dubai, Malta, Kochi (India), Singapore. The scope of these cities is mainly limited to construct a technology park converting the industrial real estate to state of the art information technology using the evolution in the telecom and IP networks including insignificant asset management automation system. The development background is to create an operational platform that would manage the power consumption and operational resources in order to reduce the overall running operational cost. This paper will debate the smart infrastructure development framework and the surveying positional accuracy of locating the assets as a base of the smart city development architecture integrated with all the facilities and systems related to the smart city framework. The paper will discuss also the main advantages of the proposed architecture including the quantifiable and non quantifiable benefits.Smart Infrastructure, GIS, Smart City, Geopsatial application, Infrastructure Development, Infrastructure Monitoring.
Penetration testing model for mobile cloud computing applications / Ahmad Salah Mahmoud Al-Ahmad
Mobile cloud computing (MCC) technology possess features mitigating mobile limitations and enhancing cloud services. MCC application penetration testing issues are complex and unique which make the testing difficult for junior penetration testers. It is complex as MCC applications have three intersecting vulnerability domains, namely mobile, web, and cloud. The offloading process adds uniqueness and complexity to the MCC application penetration testing in terms of generating, selecting and executing test cases. To solve these issues, this thesis constructs a model for MCC application penetration testing that reduces the complexity, tackles the uniqueness and assists junior testers in conducting penetration tests on MCC applications more effectively and efficiently. The main objectives of this thesis are to discover the issues in conducting penetration testing on MCC applications and to construct and evaluate MCC application penetration testing model. Design science research methodology is applied with four phases: (i) Theoretical framework construction phase (ii) Model construction phase entails designing the components and processes of MCC application penetration to reduce the complexity and address offloading; (iii) Model implementation phase implements the components and processes of the model into model guidelines and integrated tool called PT2-MCC. This tool manages the repositories, generates and selects test cases, and implements the mobile agent component; (iv) Model evaluation phase applies case study approach and uses an evaluation framework to evaluate the model against selected testing quality and performance attributes. In model evaluation phase, a junior penetration tester conducted two case studies on two MCC applications built by extending two open source native mobile applications
The Effects Of A Training Program In Improving Instructional Competencies For Special Education Resource Room Teachers In Jordan
Tujuan utama kajian ini adalah untuk menilai keberkesanan suatu program
latihan dalam meningkatkan kemahiran pengajaran untuk guru-guru bilik sumber
pendidikan khas di Jordan.
The purposes of this study were to construct a training program based on
instructional competencies and to measure its effects in improving these
competencies for special education resource room teachers in Jordan
Disseminating Training Courses Information Using SMS
In these days most media acknowledge the importance of SMS news and web in reaching and interacting with their users. However, there is much discussion regarding the effectiveness when it comes to SMS news. This project to help the students and staff prepared to accept, reading using SMS messages: effective is SMS news compared to traditional news communications. The goal of this study is to investigate the use of SMS news compared to traditional ways distribute in news in different aspects and on the other hand, to develop prototype by using web and SMS
technology to apply this system and extent users are willing to accept commercial messages on their mobile phone, since the effectiveness of SMS news highly depends on this willing. The results of this project indicate that the use of the web and SMS for the benefit of disseminating
UTLC center training Courses information by extending web technology to SMS using WLAN for students and staff
The Effects Of A Training Program In Improving Instructional Competencies For Special Education Resource Room Teachers In Jordan [LB1028.35. Z91 2007 f rb].
Tujuan utama kajian ini adalah untuk menilai keberkesanan suatu program latihan dalam meningkatkan kemahiran pengajaran untuk guru-guru bilik sumber pendidikan khas di Jordan.
The purposes of this study were to construct a training program based on instructional competencies and to measure its effects in improving these competencies for special education resource room teachers in Jordan
The Relationship Between Contingency Factors and Accounting Information System, and Its Subsequent Impact on Information Technology Benefits: A Survey on Jordanian Listed Companies
The relationships between contingency factors and information technology (IT) or between contingency factors and accounting information systems (AIS) have been discussed in the literature, both in accounting and information systems disciplines. However, very little is known about the relationship between IT sophistication and
AIS design, and the impact of AIS design on IT benefits. Most prior studies also treated IT as a unidimensional variable and focuses on the technological sophistication only. Researchers also measured IT differently. To fill this gap, this study first examines the relationships between three dominant contingency factors found in the literature (IT sophistication, environmental conditions, and business strategy) and the sophistication of AIS design. Second, it examines the impact of AIS design on IT benefits. Importantly, this study focuses on four dimensions of IT sophistication, i.e. technological, informational, functional, and managerial to measure the impact of IT on AIS design. This study also focuses on two dimensions of business strategy, i.e. cost leadership strategy and innovation differentiation strategy. To achieve the objectives of this study, data were collected from 182 companies listed in Jordanian Stock Exchange, which represents about 83% response rate. Initial tests show that the assumptions of reliability,multicollinearity, normality,linearity, and homoscedasticity were met. Multiple regression analysis was then conducted to examine the relationship between contingency factors and AIS design.
The results reveal significant and positive relationships between four dimensions of IT sophistication and AIS design, and between two business strategies and AIS
design. While most organizations focus on the technical aspect in information systems project, findings from this study suggest managerial, informational, and functional IT sophistication are more important than the technological aspect in influencing AIS design. Furthermore, cost leadership strategy was found to be more important than innovation differentiation strategy in influencing AIS design. Overall,cost leadership strategy is the most important factor that influence the sophistication
of AIS design, followed by, in descending order of importance, managerial IT sophistication, informational IT sophistication, functional IT sophistication,innovative differentiation strategy, and technological IT sophistication. Furthermore,no significant relationship was found between environmental conditions and sophistication of AIS design. Finally, results from linear regression indicate a significant and positive relationship between AIS design and IT benefits. Findings of this study imply that organizations need to have a sophisticated AIS design in order to achieve greater IT benefits. On the other hand, the sophistication of AIS design can be achieved by investing not only in the technological IT sophistication but more importantly the managerial, informational, functional sophistication. Furthermore,business strategies especially cost leadership strategy adopted by organizations would also determined the sophistication of AIS design. In summary, this study has deepened current understanding of AIS design and its influence factors, and has provided useful insights into the sophistication of IT development in Jordan. More importantly, it opens up possibilities for further studies of AIS in Jordan and other
Middle East countries, and on a global basis
Mobile laser scanning, for monitoring polythylene city infrastructure network.
This research discusses a more efficient geospatial monitoring technique for city infrastructure
networks. It will concentrate on polyethylene city infrastructure materials, where power, water and
communication networks are covered or protected by polyethylene materials. A technical comparison
is conducted between current and proposed geospatial monitoring techniques in order to develop an
overall performance evaluation. The mobile laser scanning technology achieved the best performance
evaluation, where detailed data analysis and collection, mobile laser missions, modeling and
interpretation, and system geometrical corrections for location and orientation have also been
conducted. Prior to conducting the performance evaluation, the research investigates mobile laser
behavior and recognition capabilities with respect to Polyethylene City infrastructure materials. After
analyzing the mobile laser pulses behavior, and its correlations with the mission ground speed and
exposed scanned surface, it is concluded that the mobile laser pulses response is constant for the
Polyethylene City infrastructure materials. The concluded mobile laser pulses constant is utilized to
develop a mathematical model for re-planning the mobile laser scanning missions to obtain the best
model for monitoring the Polyethylene City infrastructure networks
The use of accounting information systems in analytical procedures for the audit process, from the point of view of internal and external audit in the public sector (a case study of public universities)
This study sought to measure and assesses the use of accounting information systems in analytical procedures for the audit process, from the point of view internal and external audit in the public sector (a case study of public universities) and their role in promoting evidence in the audit results and its availability in Jordanian public universities, as well as to determine the extent of the use of analytical procedures in the audit process, from the point of view of both the internal in observation and auditing services workers at Jordanian universities and external auditors for these universities and how consensus the study sample answers in answering the study questions. Researchers have developed a study tool (questionnaire) based on the conceptual framework and previous studies, (100) questionnaire were distributed on a sample of the population of the study which is consisted of the internal observation units services workers in Jordanian public universities and external auditors for these universities. Using appropriate statistical analysis tools for the study data (arithmetic means, standard deviations and One way ANOVA). It was concluded that there are no significant statically differences between the views of the internal observation services staff in public universities and external auditors for these universities on the importance of using analytical procedures in auditing ? There are no significant differences between the views of the two sample study for these universities to the auditors use of analytical procedures in audits, and the study showed that the use of analytical review methods was moderate by internal and external auditors, while the advanced analytical review methods are used less ? Because they need the skills of statistical analysis, the study also revealed that there are obstacles limiting the use of analytical procedures in the field of work, and most of these obstacles are the absence of clear criteria for analytical procedures issued by the INTOSAI Organization and the organizers of the audit profession, lack of skills in the field of analytical measure. Although the constraints that limit the application of analytical procedures did not have any statistically significant and material impact on increasing the efficiency of the audit performance. In the light of the analysis results the researchers presented a set of recommendations that they consider them necessary to improve and strengthen the evidence in the audit results and availability in Jordanian public universities, as well as to determine the extent of the use of analytical procedures in the audit process, and reduce the risk of control to gain an understanding of the business and its environment. Key Words: Accounting Information Systems, Internal auditing, External auditing
Multilayer Cyberattacks Identification and Classification Using Machine Learning in Internet of Blockchain (IoBC)-Based Energy Networks
The world's need for energy is rising due to factors like population growth, economic expansion, and technological breakthroughs. However, there are major consequences when gas and coal are burnt to meet this surge in energy needs. Although these fossil fuels are still essential for meeting energy demands, their combustion releases a large amount of carbon dioxide and other pollutants into the atmosphere. This significantly jeopardizes community health in addition to exacerbating climate change, thus it is essential need to move swiftly to incorporate renewable energy sources by employing advanced information and communication technologies. However, this change brings up several security issues emphasizing the need for innovative cyber threats detection and prevention solutions. Consequently, this study presents bigdata sets obtained from the solar and wind powered distributed energy systems through the blockchain-based energy networks in the smart grid (SG). A hybrid machine learning (HML) model that combines both the Deep Learning (DL) and Long-Short-Term-Memory (LSTM) models characteristics is developed and applied to identify the unique patterns of Denial of Service (DoS) and Distributed Denial of Service (DDoS) cyberattacks in the power generation, transmission, and distribution processes. The presented big datasets are essential and significantly helps in identifying and classifying cyberattacks, leading to predicting the accurate energy systems behavior in the SG.© 2024 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)fi=vertaisarvioitu|en=peerReviewed
The use of accounting information systems in analytical procedures for the audit process, from the point of view of internal and external audit in the public sector (a case study of public universities)
This study sought to measure and assesses the use of accounting information systems in analytical procedures for the audit process, from the point of view internal and external audit in the public sector (a case study of public universities) and their role in promoting evidence in the audit results and its availability in Jordanian public universities, as well as to determine the extent of the use of analytical procedures in the audit process, from the point of view of both the internal in observation and auditing services workers at Jordanian universities and external auditors for these universities and how consensus the study sample answers in answering the study questions. Researchers have developed a study tool (questionnaire) based on the conceptual framework and previous studies, (100) questionnaire were distributed on a sample of the population of the study which is consisted of the internal observation units services workers in Jordanian public universities and external auditors for these universities. Using appropriate statistical analysis tools for the study data (arithmetic means, standard deviations and One way ANOVA). It was concluded that there are no significant statically differences between the views of the internal observation services staff in public universities and external auditors for these universities on the importance of using analytical procedures in auditing ? There are no significant differences between the views of the two sample study for these universities to the auditors use of analytical procedures in audits, and the study showed that the use of analytical review methods was moderate by internal and external auditors, while the advanced analytical review methods are used less ? Because they need the skills of statistical analysis, the study also revealed that there are obstacles limiting the use of analytical procedures in the field of work, and most of these obstacles are the absence of clear criteria for analytical procedures issued by the INTOSAI Organization and the organizers of the audit profession, lack of skills in the field of analytical measure. Although the constraints that limit the application of analytical procedures did not have any statistically significant and material impact on increasing the efficiency of the audit performance. In the light of the analysis results the researchers presented a set of recommendations that they consider them necessary to improve and strengthen the evidence in the audit results and availability in Jordanian public universities, as well as to determine the extent of the use of analytical procedures in the audit process, and reduce the risk of control to gain an understanding of the business and its environment. Key Words: Accounting Information Systems, Internal auditing, External auditing
- …