6 research outputs found

    Institutional-based customer relationship management (CRM) solution: The implementation success factors

    Get PDF
    It has become imperative for students of higher institutions of learning to be well managed and handled so as to present a good image of the institution to the students.Higher institution of learning nowadays now consider their students as their customers and thereby work towards ensuring the maximum possible customer satisfaction level similar to what is applicable in the real business environment.Many authors have concluded that it is high time all higher institutions of learning embraced the use of Customer Relationship Management (CRM) solutions in monitoring student-institution relationships from the time of enrolment to the alumnus stage. This paper reports a quantitative study conducted in a Nigerian university environment to determine the critical success factors for implementing any institutional-based CRM solution. The implementation factors are identified in order of their importance

    Survey of Video Encryption Algorithms

    Get PDF
    Research on security of digital video transmission and storage has been gaining attention from researchers in recent times because of its usage in various applications and transmission of sensitive information through the internet. This is as a result of the swift development in efficient video compression techniques and internet technologies. Encryption which is the widely used technique in securing video communication and storage secures video data in compressed formats. This paper presents a survey of some existing video encryption techniques with an explanation on the concept of video compression. The review which also explored the performance metrics used in the evaluation and comparison of the performance of video encryption algorithms is being believed to give readers a quick summary of some of the available encryption techniques

    Adoption of e-voting systems: A case study of Independent National Electoral Commission (INEC), Nigeria: A preliminary study

    Get PDF
    The trend in the technological development has made the use of computer and its supporting technologies mandatory in virtually all aspects of life.This is never an exception in the conventional voting process.Several issues have been revealed associated with the manual voting system which makes it inappropriate in the emerging technology-driven society. Several countries have successfully implemented an electronic voting technology. Considering Nigeria as a developing nation with quite a number of constraints regarding technological innovations, there is therefore the need to investigate the readiness on the part of the organization empowered to conduct elections in the country (INEC) so as to pave ways for its successful implementation.In this paper, the relationship among the variables of adoption evidenced from the previous literature was investigated using correlation coefficients and multiple linear regressions.As a pilot study, only 47 responses were captured from senior staffs of INEC. The results show that there is strong relationship between the variables examined

    An improved model for identifying influential bloggers on the web

    No full text
    With the introduction of Web 2.0 the Internet has take a new shape because many people are now have interest in finding materials and friends on the internet. Many users visit blog sites to read the posts and comment on them. Blog as been a way to influence others who read the blogs. Most people do read blog to gather information on things that are important before take major decision about them. Because blogger always share their experience on a topic for others to comments and through this others share their own experience. With the impact that influential blogger have in a community. The benefits of achieving competitive advantages in a blog community by identify influential blogger have created several research gaps and the popularity of these services has make the problem of identifying the most influential bloggers noteworthy, since its solution can lead to major benefits for the users of this services i.e. education, politic, participatory journalism, advertising, searching, commerce etc. The current works in this regard ignore some important aspects of the blogsphere. This paper discusses an hybrid method as an improvement to the existing methodologies. The results obtained confirm that current approach could significantly identify influential of bloggers on the web and the proposed model has better performance than other approaches. There are still a few of avenues for the future research. Future work can include more parameters like twitter shares, G+1s Pin shares etc into the literature and check for the behavior of the influence and future research can investigate more time in deciding weight parameter that is crucial for tuning between different influential factors.Keywords: Blog, Blogger, Social networks, Blogosphere, Influential bloggers, Influential, Model

    A PROMETHEE based evaluation of software defect predictors

    No full text
    A software defect is an error, flaw, mistake, or fault in a computer program or system that produces incorrect or unexpected results and the process of locating defective modules in software is software defect prediction. Defect prediction in software improves quality and testing efficiency by constructing predictive stand-alone classifier models or by the use of ensembles methods to identify fault-prone modules. Selection of the appropriate set of single classifier models or ensemble methods for the software defect prediction over the years has shown inconsistent results. In previous analysis, inconsistencies exist and the performance of learning algorithms varies using different performance measures. Therefore, there is need for more research in this field to evaluate the performance of single classifiers and ensemble algorithms in software defect prediction. This study assesses the quality of the ensemble methods alongside single classifier models in the software defect prediction using Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE), a multi criteria decision making (MCDM) approach. Using PROMETHEE, the performance of some popular ensemble methods based on 11 performance metrics over 10 public-domain software defect datasets from the NASA Metric Data Program (MDP) repository was evaluated. Noise is removed from the dataset by performing attribute selection. The classifiers and ensemble methods are applied on each dataset; Adaboostgave the best results. Boosted PART comes first followed by Naïve Bayes and then Bagged PART as the best models for mining of datasets.Keywords: Ensemble; Classification; Software Defect Prediction; PROMETHEE; MCD

    Survey of Video Encryption Algorithms

    No full text
    Research on security of digital video transmission and storage has been gaining attention from researchers in recent times because of its usage in various applications and transmission of sensitive information through the internet. This is as a result of the swift development in efficient video compression techniques and internet technologies. Encryption which is the widely used technique in securing video communication and storage secures video data in compressed formats. This paper presents a survey of some existing video encryption techniques with an explanation on the concept of video compression. The review which also explored the performance metrics used in the evaluation and comparison of the performance of video encryption algorithms is being believed to give readers a quick summary of some of the available encryption techniques
    corecore