8 research outputs found

    Systematic Literature Review: Taxonomy Of Services In E-Government

    Get PDF
    In the context of e-Government, the modality of e-Government Services is a popular research area since it modulates the effectiveness of facilitating services to users. Here we classify the characteristics of services in e-Government into five groups: services orientation, services attributes, services organizations, levels of services adoption, and services of communication technology forms. We identify these groups by analyzing e-Government services characteristics through mapping between services characteristics, and use a systematic review of e-Government services characteristics. This study includes a discussion of the results of the taxonomy that we built and some recommendations to improve the taxonomy further. Some limitations are described. This taxonomy differs from other taxonomies by focusing on governmental services characteristics rather than governmental and nongovernmental organizations and their municipalities. In Conclusion, the taxonomy proposed here will aid decision-makers and practitioners in developing e-Government systems to facilitate communicating between supplier-side and demand-side

    The Development Of A Postgraduate Management System (PG-MS)

    Get PDF
    This study aims to develop a prototype system for postgraduate students in UUM especially students in the Graduate Department of Information Technology, Computer Science and Multimedia, focusing on the entry requirements for the final project. Because of the increasing number of postgraduate students in this department, it usually takes quite a long time to fill the application manually and to do the processing of the application after it has been submitted. The system development life cycle (SDLC) methodology will be used in this study and it considers the general methodology to develop the system

    A Pervasive Computational Intelligence based Cognitive Security Co-design Framework for Hype-connected Embedded Industrial IoT

    Get PDF
    The amplified connectivity of routine IoT entities can expose various security trajectories for cybercriminals to execute malevolent attacks. These dangers are even amplified by the source limitations and heterogeneity of low-budget IoT/IIoT nodes, which create existing multitude-centered and fixed perimeter-oriented security tools inappropriate for vibrant IoT settings. The offered emulation assessment exemplifies the remunerations of implementing context aware co-design oriented cognitive security method in assimilated IIoT settings and delivers exciting understandings in the strategy execution to drive forthcoming study. The innovative features of our system is in its capability to get by with irregular system connectivity as well as node limitations in terms of scares computational ability, limited buffer (at edge node), and finite energy. Based on real-time analytical data, projected scheme select the paramount probable end-to-end security system possibility that ties with an agreed set of node constraints. The paper achieves its goals by recognizing some gaps in the security explicit to node subclass that is vital to our system’s operations

    Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions

    No full text
    IoT devised the modern world of technology into a world where different objects are joining the global network, exchanging, storing and processing the data using different surrounding environments and actively intercede. Enormous number of services can be visualized and put into reality by using the basic concepts of IoT. Since IoT devices are resource constrained, the concept of edge computing also termed as fog computing was proposed to assist IoT devices in handling and delivery information. The centralized cloud is not replaced by fog but enhances its functionality, accessibility and reliability in many means by distributing its principles and technologies through the CoT continuation, specifically at edge of network. The nearness of the fog and IoT nodes enables many distinctive features that should be available and protected always even during the movement of IoT devices through different places. This article discusses the main challenges by analyzing the concept of providing mobility support in a fog environment

    Mixed Integer Linear Programming Models to Solve a Real-Life Vehicle Routing Problem with Pickup and Delivery

    No full text
    This paper presents multiple readings to solve a vehicle routing problem with pickup and delivery (VRPPD) based on a real-life case study. Compared to theoretical problems, real-life ones are more difficult to address due to their richness and complexity. To handle multiple points of view in modeling our problem, we developed three different Mixed Integer Linear Programming (MILP) models, where each model covers particular constraints. The suggested models are designed for a mega poultry company in Tunisia, called CHAHIA. Our mission was to develop a prototype for CHAHIA that helps decision-makers find the best path for simultaneously delivering the company’s products and collecting the empty boxes. Based on data provided by CHAHIA, we conducted computational experiments, which have shown interesting and promising results

    Design Research Insights on Text Mining Analysis: Establishing the Most Used and Trends in Keywords of Design Research Journals

    No full text
    Design research topics attract exponentially more attention and consideration among researchers. This study is the first research article that endeavors to analyze selected design research publications using an advanced approach called “text mining”. This approach speculates its results depending on the existence of a research term (i.e., keywords), which can be more robust than other methods/approaches that rely on contextual data or authors’ perspectives. The main aim of this research paper is to expand knowledge and familiarity with design research and explore future research directions by addressing the gaps in the literature; relying on the literature review, it can be stated that the research area in the design domain still not built-up a theory, which can unify the field. In general, text mining with these features allows increased validity and generalization as compared to other approaches in the literature. We used a text mining technique to collect data and analyzed 3553 articles collected in 10 journals using 17,487 keywords. New topics were investigated in the domain of design concepts, which included attracting researchers, practitioners, and journal editorial boards. Such issues as co-innovation, ethical design, social practice design, conceptual thinking, collaborative design, creativity, and generative methods and tools were subject to additional research. On the other hand, researchers pursued topics such as collaborative design, human-centered design, interdisciplinary design, design education, participatory design, design practice, collaborative design, design development, collaboration, design theories, design administration, and service/product design areas. The key categories investigated and reported in this paper helped in determining what fields are flourishing and what fields are eroding
    corecore