76 research outputs found

    Motivation-based IS evaluation strategy : a perspective of marketing information systems

    Get PDF
    The article describes the importance of motivational factors through an analysis of the core TAM constructs in the context of marketing IS evaluation. We argue that our findings compliment current IS evaluation strategy, specially for measuring motivational elements for online IS. The study consequently provides an empirical validation of the importance of motivational and behavioural factors. Through an experimental analysis we evaluated the relative importance of perceived enjoyment with perceived usefulness of using an online website for shopping purposes and found that enjoyment was by far the dominant predictor of attitude towards online shopping. The result illustrates that in terms of IS evaluation online environments have moved from being functional online applications to being functional, engaging and interactive online IS (e.g. websites).<br /

    Identity-based encryption and digital signature schemes using extended chaotic maps

    Get PDF
    This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identity-based digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the ECM-IBE scheme is based on the hardness assumption of chaotic maps-based decisional Diffie–Hellman (CDDH) problem, whereas the ECM-IDS scheme is secure based on the difficulties of chaotic maps-based discrete logarithm (CDL) problem

    Design of identity-based digital signature schemes using extended chaotic maps

    Get PDF
    Inspired from the Identity-based cryptosystem proposed by Adi Shamir, and Boneh and Franklin, this paper designed a new Identity-based digital signature (ECM-IDS) scheme using extended chaotic maps. The ECM-IDS scheme is secure based on the difficulties of integer factorization problem

    A software agent enabled biometric security algorithm for secure file access in consumer storage devices

    Get PDF
    In order to resist unauthorized access, consumer storage devices are typically protected using a low entropy password. However, storage devices are not fully protected against an adversary because the adversary can utilize an off-line dictionary attack to find the correct password and/or run an existing algorithm for resetting the existing password. In addition, a password protected device may also be stolen or misplaced allowing an adversary to easily retrieve all the stored confidential information from a removable storage device. In order to protect the consumer’s confidential information that has been stored, this paper proposes a mutual authentication and key negotiation protocol that can be used to protect the confidential information in the device. The functionality of the protocol enables the storage device to be secure against relevant security attacks. A formal security analysis using Burrows-Abadi-Needham (BAN) logic is presented to verify the presented algorithm. In addition, a performance analysis of the proposed protocol reveals a significantly reduced communication overhead compared to the relevant literature

    DAWM: cost-aware asset claim analysis approach on big data analytic computation model for cloud data centre.

    Get PDF
    The heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. Most of the existing approaches consider task deadline violation rate rather than performance cost and server size ratio during profit estimation, which impacts CSP revenue and causes high service cost. To address this issue, we develop two algorithms for profit maximization and adequate service reliability. First, a belief propagation-influenced cost-aware asset scheduling approach is derived based on the data analytic weight measurement (DAWM) model for effective performance and server size optimization. Second, the multiobjective heuristic user service demand (MHUSD) approach is formulated based on the CPS profit estimation model and the user service demand (USD) model with dynamic acyclic graph (DAG) phenomena for adequate service reliability. The DAWM model classifies prominent servers to preserve the server resource usage and cost during an effective resource slicing process by considering each machine execution factor (remaining energy, energy and service cost, workload execution rate, service deadline violation rate, cloud server configuration (CSC), service requirement rate, and service level agreement violation (SLAV) penalty rate). The MHUSD algorithm measures the user demand service rate and cost based on the USD and CSP profit estimation models by considering service demand weight, tenant cost, and energy cost. The simulation results show that the proposed system has accomplished the average revenue gain of 35%, cost of 51%, and profit of 39% than the state-of-the-art approaches

    Maternal Pregnancy Intention and Antenatal Care Seeking Behaviors in Bangladesh: Evidence From Bangladesh Demographic and Health Survey, 2018

    Get PDF
    Objective: This study aimed to examine the association between pregnancy intention and antenatal care (ANC)-seeking behaviors among women in Bangladesh.Methods: ANC-related data of 5,012 women, from the 2018 Bangladesh Demographic and Health Survey (BDHS), who had a live birth within 3 years preceding the survey were analyzed in the study. Multivariate logistic regression models were used to assess the association of pregnancy intention with ANC utilization.Results: Approximately one-fifth (20.9%) of the women had unintended pregnancy. Among all the women, 40.4% received their first ANC visit within the first three months of pregnancies, 47% had at least four ANC visits, 26.1% received all the components of ANC services, and 22.2% received an adequate dosage of supplementary iron-folic acid tablets/syrup. Women with unintended pregnancy were less likely to receive their first ANC visit within the first 3 months, four or more ANC visits, and all ANC services than those with intended pregnancy.Conclusion: Unintended pregnancy was inversely associated with the proper utilization of ANC among women in Bangladesh. Appropriate measures to reduce unintended pregnancy might foster the utilization of optimum antenatal care

    Anonymity preserving and lightweight multi-medical server authentication protocol for telecare medical information system

    Get PDF
    Electronic health systems, such as Telecare Medical Information System (TMIS), allow patients to exchange their health information with a medical center/doctor for diagnosis in real-time, and across borders. Given the sensitive nature of health information/medical data, ensuring the security of such systems is crucial. In this paper, we revisit Das et al.'s authentication protocol, which is designed to ensure patient anonymity and untraceability. Then, we demonstrate that the security claims are invalid, by showing how both security features (i.e., patient anonymity and untraceability) can be compromised. We also demonstrate that the protocol suffers from smartcard launch attacks. To mitigate such design flaws, we propose a new lightweight authentication protocol using the cryptographic hash function for TMIS. We then analyze the security of the proposed protocol using AVISPA and Scyther, two widely used formal specification tools. The performance analysis demonstrates that our protocol is more efficient than other competing protocols

    Evaluation of performances and selection response of three indigenous chicken genotypes at seventh-generation

    Get PDF
    The present study was conducted to assessed the performances of three native chicken genotypes under intensive management. A total of 1042 day-old chicks comprising of 3 types of chicken, namely Naked Neck (NN-381), Hilly (HI-313), and Non-descript Deshi (ND-348), were Hatched for this study. The seventh generation, selection was practiced at 40 weeks of age according to 40-week body weight (BW), egg production (EP) up to 40-week, egg weight (EW) at 40 weeks, and age at maturity (ASM). The data were analyzed in a CRD. Day-old chick weight was significantly (P &lt; 0.001) highest in HI (32.52 ± 0.32 g). Significant (P &lt; 0.001) body weight differences among the genotypes were observed at the 12th week of age. Genotype had a significant effect on chick mortality. The average age at the first egg of ND 145.54days was 8.81 days earlier than that of HI 154.35days. Hatchability on fertile eggs differed significantly (P &lt; 0.05) among the genotypes. The percentage of dead germ was affected (P &lt; 0.001) by genotype. Feed consumption from 9 to 16 weeks showed a significant (P &lt; 0.001) variation in feed intake among the native chicken genotypes. EP of ND, HI, and NN birds were expected to increase by 0.875, 1.585, and 0.255 %, respectively. The EW of ND, HI, and NN birds were expected to increase by 0.205, 0.250, and 0.015g, respectively. Responses to selection for EP and EW for three genotypes (ND, HI, and NN) were expected to be positive (increase). It is concluded that the Hilly genotype may be chosen for meat production and the Non-descript Deshi genotype for egg production

    Association of clinico-epidemiological features with locally advanced stage of cervical cancer patients presenting at Bangabandhu Sheikh Mujib Medical University, Bangladesh

    Get PDF
    Cervical cancer is one of the most prevalent gynecological cancers in women in Bangladesh. The objective of this study was to assess the clincoepidemiological association with the histology of locally advanced cervical cancer. We have done this observational study in the department of Clinical Oncology at Bangabandhu Sheikh Mujib Medical University from July to December 2019. Sixty-six biopsy-proven locally advanced (stage IIB to IVA) squamous cell carcinoma of uterine cervix were included in this study. The mean age of patients at diagnosis was 48.5 (±8.6) years. Commonly observed epidemiological characteristics of locally advanced carcinoma cervix were illiteracy (46.9%), oral contraceptive use (62.1%), multi para (78.7%) and early marriage (74.2%). Most frequent clinical presentation was post-coital bleeding (37.87%). Most patients presented in stage IIB (65.1%). The association of the stages of the disease with age, parity, oral contraceptive use, age at marriage and clinical presentation were statistically nonsignificant, whereas illiteracy was statistically significant. Most women had poor awareness regarding their need for routine check-up and screening as indicated by the late medical care seeking. Social stigma might have played some role. Relevant programmes should create awareness among women, especially those with socioeconomic deprivation. BSMMU J 2022; 15(3): 175-17
    • …
    corecore