American Journal of Information Systems

ISSN (Print): 2374-1953

ISSN (Online): 2374-1988

Website: http://www.sciepub.com/journal/AJIS

Article

Cloud Computing: A New Era in the Field of Information Technology Applications and its Services

1Department of Computer Science and Engineering, MIT Mandsaur, Mandsaur, India

2Department Master of Computer Application, MIT Mandsaur, Mandsaur, India


American Journal of Information Systems. 2014, 2(1), 1-5
DOI: 10.12691/ajis-2-1-1
Copyright © 2013 Science and Education Publishing

Cite this paper:
Anwar Mohd. Mansuri, Prithviraj Singh Rathore. Cloud Computing: A New Era in the Field of Information Technology Applications and its Services. American Journal of Information Systems. 2014; 2(1):1-5. doi: 10.12691/ajis-2-1-1.

Correspondence to: Anwar  Mohd. Mansuri, Department of Computer Science and Engineering, MIT Mandsaur, Mandsaur, India. Email: anwar.iter@gmail.com

Abstract

Cloud computing is the computing that provides virtualized IT resources as a service by using Internet technology. In cloud computing, a customer lends IT resources as needed, uses them, get a support of real-time scalability according to service load, and pays as he/she goes. Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. Cloud computing uses the Internet and central remote servers to maintain data and applications. As know that at present the e- ccommercee services opportunity to utilize pay-as-you-go resources together with their own and shared resource in the fields of IT. In this paper shows that the cloud computing plays an important role in the fields of Information Technology services and its applications and it is helpful to provide the data to the customer. The results show that the comparison of cloud services and normal services of Information Technology applications.

Keywords

References

[1]  Vaquero L. M., Rodero-Merino L, Caceres J., Lindner M. A break in the clouds: towards a cloud definition. In: ACM SIGCOMM, editor. Computer communication review 2009. New York: ACM Press; 2009. p. 50-5.
 
[2]  Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing, 2009. http://www.ibm.com/developerswork/webspherezones/hipods/library. html.
 
[3]  Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing (Draft). NIST. 2011. http://www.production scale.com/home/2011/8/7/the-nist-definition-of-cloud-Computingdraft.html#axz z1X0xKZRuf.
 
[4]  Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing (v 2.1). Decemeber, 2009.
 
[5]  VMware. Inc. Understanding full virtualization, paravirtualization and hardware assist. Technical report, VMware, 2007.
 
Show More References
[6]  Amazon. Amazon elastic compute cloud (Amazon EC2). 2009. http://aws.amazon.com/ec2/.
 
[7]  SANJAY GHEMAWAT; HOWARD GOBIOFF; PSHUN-TAK LEUNG. The Google file system. Proceedings of the nineteenth ACM symposium on Operating systems principles. Oct. 2003.
 
[8]  Aymerich, F. M. Fenu, G. Surcis, S. An approach to a Cloud Computing network. Applications of Digital Informationand Web Technologies, 2008.
 
[9]  Anderson NR, Lee ES, Brockenbrough JS, Minie ME, Fuller S, Brinkley J, et al. Issues in biomedical research data management and analysis: needs and barriers. JAMIA 2007; 14: 478-88.
 
[10]  Foster I, Kesselman C. Globus: a metacomputing infrastructure toolkit. Int J Supercomput Appl 1998; 11: 115-29.
 
[11]  Moore RW, Rajasekar A, Wan M. Data grids, digital libraries, and persistent archives: an integrated approach to sharing, publishing, and archiving data. Proc. IEEE 2005; 93: 578-88.
 
[12]  Iskold A. Reaching for the sky through the compute clouds. Availableat: http://www.readwriteweb.com/archives/searching_for_the_sky_through_compute_clouds.php.
 
[13]  Amazon Web Services Simple Monthly Calculator. Available at: http://calculator.s3.amazonaws.com/calc5.html.
 
[14]  D. Owens, Securing elasticity in the cloud, Communications of the ACM 53 (2010) 46-51.
 
[15]  P. Watson, A multi-level security model for partitioning work flows over federated clouds, in: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, 2011, pp. 180 -188.
 
[16]  Webhosting Unleashed (2008), ‘Cloud Computing Services ComparisonGuideavailableat, http://www.webhostingunleashed.com/whitepaper/cloud computing comparison.
 
[17]  Golden, B (2009), ‘The Cloud as Innovation Platform: Early Examples’availableat, http://www.nytimes.com/external/idg/2009/06/18/18idg the cloud as innovation platform early- Examples 24294. html.
 
[18]  Armbrust, M; Fox, A; Griffith, R; Joseph, AD; Katz, RH; Konwinski, A; Lee, G; Patterson, DA; Rabkin, A; Stoica, I & Zaharia, M (2009), ‘Above the Clouds: A Berkel ey View of CloudComputing’.TechnicalReporNo.,UCB/EECS2009availableat, http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS200928.html.
 
[19]  Challengers (2009), ‘Final Research Agenda on Core and Forward Looking Technologies’ available at http://challengers org.eu/index.php/Download document/5701.CHALLENGERS Research Agenda and Roadm FinalVersio January 2009.html.
 
[20]  Wikipedia, ‘CloudComputing’availableat, http://en.wikipedia.org/wiki/Cloud_computing.
 
[21]  Golden; B. (2009), ‘Capex vs. Opex: Most People Miss the Point AboutCloudEconomics’availableat, http://www.cio.com/article/484429/Capex_vs._Opex_Most_People_Miss_ the_Point_About_Cloud_Economics.
 
[22]  Fellows, W. (2009), ‘The State of Play: Grid, Utility, Cloud’ availableat http://old.ogfeurope.,eu/uploads/Industry%20Expert%20Group/FELLOWS_CloudscapeJan09WF.pdf.
 
[23]  DeCandia, G.; Hastorun, D.; Jampani, M.; Kakulapati, G.; Lakshman, A.; Pilchin, A.; Sivasubramanian, S.; Vosshall, P. & Vogels, W. (2007), ‘Dynamo: Amazon’s Highly Available KeyvalueStore’availableat, http://s3.amazonaws.com/AllThingsDistributed/sosp/amazondynamososp2007.pdf.
 
[24]  Amrhein, D. & Willenborg, R. (2009), ‘Cloud computing for the enterprise, Part 3: Using WebSphere CloudBurst to create private clouds’availableat http://www.ibm.com/,developerworks/websphere/techjournal/0906_amrhein/0906_amrhein.html.
 
[25]  CISCO, “Cisco Cloud Computing Data Center Strateg y, Architecture,andSolutions”, http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputing_WP.pdf.
 
[26]  Cloud Computing Use Cases White Paper, http://groups.google.com/group/cloud computing use cases.
 
[27]  D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Som an, L. Youseff, and D. Zagorodnov. Eucalyptus: A Technical Re- port on an Elastic Utility Computing Architecture Linking Your Programs to Useful Systems. Technical Report 2008-10, UCSBComputer Science, 2008.
 
[28]  C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machinesIn Proc. of NSDI’ 05, pages 273-286, Berkeley, CA, USA, 2005. USENIX Association.
 
[29]  yoob, I., Zarifoglu, E., Modh, M., Farooq, M. (2011) “Optimally Sourcing Services in Hybrid Cloud Environments”, US Patent Filed 13/373,162.
 
Show Less References

Article

Decision Making Problem in Division of Cognitive Labor with Parameter Inaccuracy: Case Studies

1School of Information Science and Engineering, Central South University, Changsha, Hunan, P.R. China


American Journal of Information Systems. 2014, 2(1), 6-10
DOI: 10.12691/ajis-2-1-2
Copyright © 2013 Science and Education Publishing

Cite this paper:
Jin Huan Zhang, Khin War War Htike, Ammar Oad, Hao Zhang. Decision Making Problem in Division of Cognitive Labor with Parameter Inaccuracy: Case Studies. American Journal of Information Systems. 2014; 2(1):6-10. doi: 10.12691/ajis-2-1-2.

Correspondence to: Hao  Zhang, School of Information Science and Engineering, Central South University, Changsha, Hunan, P.R. China. Email: hao@csu.edu.cn

Abstract

Scientific communities will be more effective for society if scientists effectively divide their cognitive labor. So one way to study how scientists divide their cognitive labor has become an important area of research in science. This problem was firstly discovered and studied by Kitcher. Later on, Kleinberg and Oren pointed out that the model proposed by Kitcher might not be realistic. We investigate the impact of the imprecise parameter in project selection results. In this paper, we further our study on this issue. We study the policy of decision making problem based on the modified division of cognitive labor model with the assumption that a scientist is aware of the existence of the imprecise parameters and provide the detailed analytical results. And we provide a decision rule to minimize the possible loss based on error probability estimation.

Keywords

References

[1]  P. Kitcher, “The division of cognitive labor, journal of philosophy,” The Journal of Philosophy, vol. 87, no. 1, pp. 5-22, 1990.
 
[2]  P. Kitcher, “The advancement of science,” New York: Oxford University Press, 1993.
 
[3]  M. Strevens, “The role of the priority rule in science”, Journal of Philosophy, vol. 100, no. 2, pp. 55-79, 2003.
 
[4]  M. Strevens, “The role of the matthew effect in science,” Studies in the History and Philosophy of Science, vol. 37, pp. 159-170, 2006.
 
[5]  D. Gilbert, “Buried by bad decisions,” Nature, pp. 275-277, 2011.
 
Show More References
[6]  V. Bala and S. Goyal, “Learning from neighbours,” Review of Economic Studies, pp. 595-621, 1998.
 
[7]  DL.Rogier and G.Matthias, “Standards and distribution of cognitive labor,” Logic Journal of the IGPL, 2009.
 
[8]  J.Kleinberg and S.Oren, “Mechanisms for (mis)allocating scientific credit,” Proceedings of the 43rd annual ACM symposium on Theory of Computing, 2011.
 
[9]  M. Weisberg and R. Muldoon, “Epistemic landscapes and the division of cognitive labor,” Philosophy of Science, pp. 37:159-170, 2009.
 
[10]  K. J. Zollman, “The communication structure of epistemic communities,” Philosophy of Science, vol. 74(5), pp. 574-587, 2007.
 
[11]  K. J. Zollman, “The epistemic benefit of transient diveristy,” Erkenn, vol. 72, pp. 17-35, 2010.
 
[12]  Bala, Venkatesh and Sanjeev Goyal. "Learning from neighbours." Review of Economic Studies, pp. 595-621, 1988.
 
[13]  Banerjee, A. V. "A simple model of herd behavior." The Quarterly Journal of Economics, 107 (3), pp. 797-817, 1992.
 
[14]  Welch, I. "Sequential sales, learning, and cascades." The Journal of Finance, 47(2), pp. 695-732, 1992.
 
[15]  M. H. DeGroot. "Reaching a consensus." J. American Statistical Association, 69, 118-121, 1974.
 
[16]  B. Golub and M.O. Jackson. "Naive learning in social networks: Convergence, influence and the wisdon of crowds." American Econ. J.: Microeconomics, 2000.
 
[17]  P. M. DeMarzo, D. Vayanos and J. Zweibel. "Persuasion bias, social influence, and unidimensional opinions." Auarterly Journal of Economics, 118(3), 2003.
 
[18]  M. O. Jackson. "Social and Economic Networks." Princeton University Press, 2008.
 
[19]  R. Muldoon and M.Weisberg, “Robustness and idealization in models of cognitive labor synthese,” Synthese, vol. 183, pp. 161-174, 2011.
 
[20]  K. W. W. Htike and H. Zhang, “Theoretical study of division of cognitive labor with imprecise model parameters,” CSSS, pp. 4094-4097, 2012.
 
Show Less References

Article

Structural-Functional Model of the Information Systems of City Planning

1Laboratory of Engineering Seismology, Center of Geophysical Investigations of VSC RAS and RNO-A, Vladikavkaz, Russia

2Laboratory of Instrumental Monitoring of Hazardous Natural-Technogenic Processes, Center of Geophysical Investigations of VSC RAS and RNO-A, Vladikavkaz, Russia


American Journal of Information Systems. 2014, 2(1), 11-14
DOI: 10.12691/ajis-2-1-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Vladislav ZAALISHVILI, Alexandr KANUKOV, Dmitry MELKOV. Structural-Functional Model of the Information Systems of City Planning. American Journal of Information Systems. 2014; 2(1):11-14. doi: 10.12691/ajis-2-1-3.

Correspondence to: Alexandr  KANUKOV, Laboratory of Instrumental Monitoring of Hazardous Natural-Technogenic Processes, Center of Geophysical Investigations of VSC RAS and RNO-A, Vladikavkaz, Russia. Email: akanukov@list.ru

Abstract

On the basis of modern the technologies information database of seismicity and seismic risks in information system designed for city planning is developed. System includes maps of detailed seismic zoning (DSZ) of North Ossetia-Alania and map of seismic microzonation (SMZ) of the territory of Vladikavkaz city.

Keywords

References

[1]  City planning code of the Russian Federation, 29.12.2004 N of 190-FZ (accepted by GD FS RF 22.12.2004), Parliamentary newspaper , N 5-6, 2005.
 
[2]  Mamysheva E.G., Zagoruyko A.E. Survey of technological platforms for the formation ISOCP Control of the development of territory, 3. 2010, 70-72.
 
[3]  Zaalishvili V.B., Arakelyan A.R., Makiev E, Melkov D.A. To a question of the seismic zonation of the republic North Osetia -Alaniya territory in the 1st international conference “dangerous natural and technogenic geological processes in the mountain and foothill territories of the North Caucasus”, Vladikavkaz, September 20-22, 2007, Vladikavkaz, 2008, 263-278.
 
[4]  Zaalishvili V.B., Dzeranov B.V. Estimation of the seismic danger in the territory of RNO-Alania in Practical-scientific conference “Young scientists in the solution of the vital problems of science”, Vladikavkaz, 2010, 342345.
 
[5]  Zaalishvili V.B., Melkov D.A., Dzeranov B.V., Kanukov A.S. The seismic danger assessment in the urbanized territory on the basis of contemporary methods of seismic microzonation (based on the Vladikavkaz city example) in Practical-scientific conference “Young scientists in the solution of the vital problems of science”, Vladikavkaz, 2010, 348-351.
 
Show More References
[6]  Zaalishvili V.B., Melkov D.A., Dzeranov B.V. Modern seismic hazard assessment methods (in example territory of Vladikavkaz-city) //Proceedings of 14th European conference of earthquake engineering. 30August –0 3 September, Ohrid, republic Macedonia, 2010, 8 pp.
 
[7]  Zaalishvili V.B. Rating estimation of the urbanized territories (theses of reports) in V Russian national conference on the earthquake-proof building and the seismic zonation with the international participation, Sochi, 2003, 64.
 
[8]  Zaalishvili V.B. Seismic risk in the estimation of the directions of the historical center of Tbilisi reconstruction The theory of construction and seismic stability. IBM&S, GAS, Vol. 1, Tbilisi, 2000, 189-194.
 
[9]  Zaalishvili V.B. Timchenko I.E., Chachava N.T., Lekveishvili M.N. Seismic risk and the reconstruction of historical center of Tbilisi (theses of reports) in The III national conference on the earthquake-proof building and the seismic zonation, Sochi, 1999, 140.
 
[10]  Zaalishvili V.B. Physical bases of seismic microzonation, UIPE RAS, Moscow, 2000. 367.
 
[11]  Zaalishvili V.B., Gogmachadze S.A., Zaalishvili Z.V., Otinashvili M.G., Shengeliya N.O. Method of the rating estimation of the territory for purposes of insurance in The IV national conference on the earthquake-proof building and the seismic zonation, Sochi, 2001, 166.
 
[12]  Zaalishvili V.B., Melkov D.A., Kanukov A.S. The information system of city planning on the basis of the information database of seismicity and seismic risk Informatization and connection. ISSN 2078-8320, 5, 2012, 14-8.
 
[13]  Zaalishvili Z.V., Melkov D.A., Korotkaia N.A., Dzeranov B.V. Rating estimation of the soil conditions of territory. Transactions of the I Caucasian International school-seminar of young scientists “Seismic danger and control of seismic risk in the Caucasus”. Vladikavkaz, 2006.
 
[14]  Geographical information system. URL: http://www.gisa.ru/13058.html (2.02.2011).
 
[15]  The OGC's Role in Government & Spatial Data Infrastructure URL: http://www.opengeospatial.org/domain/gov_and_sdi.
 
[16]  Balasanyan S.Yu., Nazaretyan S.N., Amirbekyan V.S. Seismic protection and its organization, Gyumri, “Eldorado” 2004, 436.
 
[17]  Gogmachadze S.A., Zaalishvili Z.V., Otinashvili M.G., Shengeliya N.V. Rating estimation of the urbanized territory for purposes of insurance. Theory of construction and seismic stability, IBM&S, GAS. Tbilisi, 2003, 3, 46-54.
 
[18]  OpenGIS® Web Map Server Implementation Specification. Version: 1.3.0. OpenGIS® Implementation Specification. OGC® 06-042. Ed. Jeff de la Beaujardiere. Date: 2006-03-15, 2006, 85. URL: http://portal.opengeospatial.org/files/?artifact_id=14416
 
[19]  Styled Layer Descriptor profile of the Web Map Service Implementation Specification. Version: 1.1.0 (revision 4). OGC® Implementation Specification OGC 05-078r4. Ed. Dr. Markus Lupp. Date: 2007-06-29, 2007, 53. URL: http://portal.opengeospatial.org/files/?artifact_id=22364.
 
Show Less References

Article

Second Life: An Emerging Technology for 3D Websites

1Department of Computer Science, Sukkur Institute of Business Administration, Sukkur, Pakistan


American Journal of Information Systems. 2014, 2(1), 15-19
DOI: 10.12691/ajis-2-1-4
Copyright © 2014 Science and Education Publishing

Cite this paper:
Fabeha Waqar Shmasi, Ahmad Waqas. Second Life: An Emerging Technology for 3D Websites. American Journal of Information Systems. 2014; 2(1):15-19. doi: 10.12691/ajis-2-1-4.

Correspondence to: Ahmad  Waqas, Department of Computer Science, Sukkur Institute of Business Administration, Sukkur, Pakistan. Email: ahmad.waqas@iba-suk.edu.pk

Abstract

Second Life is virtual reality based technology for designing 3D websites. This paper demonstrates the detailed process of creating a 3D website from scratch using Second Life. The steps required to make a 3D website are divided into sections to make things clear and understandable. The sections will be introducing the basic things that will need to be understood in order to make a website.

Keywords

References

[1]  “Active World.” [Online]. Available: https://www.activeworlds.com/index.html. [Accessed: 15-Nov-2013].
 
[2]  “Cyber Town,” Cyber Town. [Online]. Available: http://en.wikipedia.org/wiki/CyberTown. [Accessed: 15-Nov-2013].
 
[3]  A. Serrano, “Second Life,” IS Research Paper, 2010. [Online]. Available: http://misclassblog.com/is-research-paper/research-paper-second-life-by-alan-serrano/.
 
[4]  P. R. Michael Rymaszewski, Wagner James Au, Mark Wallace, Catherine Winters, Cory Ondrejka, Benjamin Batstone-Cunningham, Second Life: The Official Guide. John Wiley & Sons, Inc., 2006.
 
[5]  “Second Life.” [Online]. Available: http://en.wikipedia.org/wiki/Second_Life. [Accessed: 13-Nov-2013].
 
Show More References
[6]  P. R. Michael Rymaszewski, Wagner James Au, Mark Wallace, Catherine Winters, Cory Ondrejka, Benjamin Batstone-Cunningham, “Prims,” in in Second Life: The Official Guide, John Wiley & Sons, Inc., 2006, p. 132.
 
[7]  P. R. Michael Rymaszewski, Wagner James Au, Mark Wallace, Catherine Winters, Cory Ondrejka, Benjamin Batstone-Cunningham, “Linden Scripting Language,” in in Second Life: The Official Guide, John Wiley & Sons, Inc., 2006, p. 212.
 
[8]  “Standford University.” [Online]. Available: http://secondlife.com/destination/600. [Accessed: 15-Nov-2013].
 
[9]  “University of Texas.” [Online]. Available: http://secondlife.com/destination/university-of-texas. [Accessed: 15-Nov-2013].
 
[10]  “Dell Second Life.” [Online]. Available: ww.dell.com/secondlife. [Accessed: 08-Jan-2013].
 
[11]  “QAvimator.” [Online]. Available: http://qavimator.org/. [Accessed: 15-Nov-2013].
 
[12]  “GIMP.” [Online]. Available: http://www.gimp.org/. [Accessed: 15-Nov-2013].
 
[13]  “Economy of Second Life.” [Online]. Available: http://en.wikipedia.org/wiki/Economy_of_Second_Life. [Accessed: 15-Nov-2013].
 
Show Less References

Article

The Method for Comparative Evaluation of Software Architecture with Accounting of Trade-offs

1Department of Computer Informational Technologies, National Aviation University, Kyiv, Ukraine

2Department of Computer Science, Ternopil Ivan Pul’uj National Technical University, Ternopil, Ukraine

3Department of Computer Engineering, Ternopil Ivan Pul’uj National Technical University, Ternopil, Ukraine


American Journal of Information Systems. 2014, 2(1), 20-25
DOI: 10.12691/ajis-2-1-5
Copyright © 2014 Science and Education Publishing

Cite this paper:
Alexander Kharchenko, Ihor Bodnarchuk, Vasyl Yatcyshyn. The Method for Comparative Evaluation of Software Architecture with Accounting of Trade-offs. American Journal of Information Systems. 2014; 2(1):20-25. doi: 10.12691/ajis-2-1-5.

Correspondence to: Ihor  Bodnarchuk, Department of Computer Science, Ternopil Ivan Pul’uj National Technical University, Ternopil, Ukraine. Email: bodnarchuk.io@gmail.com

Abstract

Since growing complexity of software systems it is more difficult to meet demands of quality during the process of their design. To solve this problem with minimal loss this process is transferred onto more early stages of design, particularly onto the design of architecture. The architecture is treated as the set of components that encapsulates the logic of calculations, and connections that ensure the interaction between components and create their configuration. Since the architecture of software system is a high-level abstract model for representation of system structure and key properties, its selection grounds the insurance of quality for software system. In the paper the questions of evaluation of architecture quality on the set of quality attributes with Analytic Hierarchic Process (AHP) with applying of optimization algorithm for estimating of weights of alternatives are discussed. The conflicts between quality indices and trade-offs between them are analyzed.

Keywords

References

[1]  Kazman, R. ATAM: Method for Architecture Evaluation / Rick Kazman, Mark Klein, Paul Clements. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, August 2000. CMU/SEI-2000-TR-004, ADA377385. 83 p.
 
[2]  Kazman, R. Quantifying the costs and benefits of architectural decision/ Kazman, R., Asundi, J., and Klein // Proceedings of the 23rd International Conference on Software Engineering (ICSE), 2001. pp. 297-306
 
[3]  Bengtsson, Perolof Architecture-level modifiability analysis (ALMA) / Perolof Bengtsson, Nico H. Lassing, Jan Bosch, Hans van Vliet // Journal of Systems and Software. 2004. Vol. 69, No. 1-2. pp. 129-147.
 
[4]  L. Dobrica and E. Niemela. A Survey on Software Architecture Analysis Methods. IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 638-653, July 2002.
 
[5]  T. Al-Naeem, I. Gorton, M.A. Babar, F. Rabhi, and B. Benatallah, “A quality driven systematic approach for architecting distributed software applications”, Proceedings of the 27th International Conference on Software Engineering(ICSE), St. Louis, USA, 2005. pp. 244-253.
 
Show More References
[6]  M. Svahnberg, C. Wholin, and L. Lundberg. A Quality-Driven Decision-Support Method for Identifying Software Architecture Candidates. // Int. Journal of Software Engineering and Knowledge Engineering, 2003. 13(5): pp. 547-573.
 
[7]  Harchenko Alexandr, Bodnarchuk Ihor, Halay Iryna. Stability of the Solutions of the Optimization Problem of Software Systems Architecture // Proceeding of VIIth International Scientific and Technical Conference CSIT 2012. pp. 47-48, Lviv, 2012.
 
[8]  AlexandrHarchenko. The Tool for Design of Software Systems Architecture // AlexandrHarchenko, Ihor Bodnarchuk, Iryna Halay, VasylYatcyshyn // Proceeding of XIIth International Conference CADSM' 2013. pp. 47-48, Lviv.
 
[9]  AlexandrHarchenko.DecisionSupportSystemofSoftwareArchitect // AlexandrHarchenko, Ihor Bodnarchuk, IrynaHalay // Proceeding of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1, pp. 265-269, Berlin.
 
[10]  Kharchenko O.H. Instrumentaljnyj zasib rozrobky ta komunikaciji vymogh jakosti do proghramnykh system / O.G. Kharchenko, V.V. Yatcyshyn, I.E. Rajchev // Inzhenerija proghramnogho zabezpechennja. Kyiv, – 2010. # 2. pp. 29-34.
 
[11]  Saaty T. Decision Making with the Analytic Network Process./ Saaty T. Vargas L.// – N.Y.: Springer, 2006. 278 p.
 
[12]  Pavlov A.A. Matematicheskie modelioptimizaciidljanahozhdenijavesov obyektov v metode parnyh sravnenij. Pavlov A.A, Lishchuk E.I., Kut V.I.// Sy`stemni doslidzhennya ta informacijni texnologiyi – Kyiv.: IASA (Institute for Applied System Analysis), 2007. #2, pp. 13-21.
 
[13]  Zgurovskij M.Z., Pavlov A.A., Shtankevich A.S. Modificirovannyj metod analiza ierarhij // Sy`stemni doslidzhennya ta informacijni texnologiyi – Kyiv.: IASA (Institute for Applied System Analysis),–2010. #1, pp. 7-25.
 
Show Less References

Article

Business Intelligence as a Knowledge Management Tool in Providing Financial Consultancy Services

1Kulliyyah of Information and Communication Technology, International Islamic University Malaysia


American Journal of Information Systems. 2014, 2(2), 26-32
DOI: 10.12691/ajis-2-2-1
Copyright © 2014 Science and Education Publishing

Cite this paper:
Gul Muhammad, Jamaludin Ibrahim, Zeeshan Bhatti, Ahmad Waqas. Business Intelligence as a Knowledge Management Tool in Providing Financial Consultancy Services. American Journal of Information Systems. 2014; 2(2):26-32. doi: 10.12691/ajis-2-2-1.

Correspondence to: Zeeshan  Bhatti, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia. Email: zeeshan.bhatti@live.iium.edu.my

Abstract

The main objective of this paper is to elaborate how Business Intelligence (BI) as a knowledge management tool could help consultants in providing professional services to the financial sector. The Business Intelligence (BI) solution could be a competitive advantage for the consultants if they are able to exploit the Business Intelligence (BI) tools and technology such as Data Warehouse, Data Mining, On-Line Analytical Processing (OLAP) and Extraction Transformation Load (ETL). The consultants can use Business Intelligence (BI) solution to analyze the organizational data such as structures and business processes of the Financial Institution. By analyzing the organizational data, the financial institution can imp better rove and streamline functional efficiencies to not only bolster up sales and marketing strategies and better develop customer services program, but also mitigate risk by developing more appropriate risk management actions. In brief, by having this competitive advantage, the consultant will be able to withstand in the market, which is always changing.

Keywords

References

[1]  Albescu, F., Pugna, I., & Paraschiv, D. (2008). Business Intelligence & Knowledge Management – Technological Support for Strategic Management in the Knowledge Based Economy. Revista Informatica Economică,, 6-12.
 
[2]  Arora, E. (2011). Knowledge Management In Public Sector. Journal of Arts Science and Commerce.
 
[3]  BMO Bank of Montreal Slices Costs, Time With Web-Based Reporting. (n.d.). Retrieved April 15, 2013, from http://www.informationbuilders.com/applications/bank_montr:
 
[4]  Business Intelligence Helps SMBC Adapt to Dynamic Market. (n.d.). Retrieved April 15, 2013, from http://www.informationbuilders.com/solutions/banking.
 
[5]  Business Intelligence Solution for Financial Services- microstrategy.com. (2011). Retrieved April 13, 2013, from http://www.microstrategy.com/bi-applications/solutions/: http://www.microstrategy.com/download/files/solutions/byindustry/Microstrategy-mobile-bi-financial
 
Show More References
[6]  Cheng, L., & Cheng, P. (2011). Integration: Knowledge Mangement and Business Intelligence. Fourth International Conference on Business Intelligence and FInancial Engineering.
 
[7]  Gartner. (2011). A step-by-step approach to successful Business Intelligence. Featuring research from Gartner.
 
[8]  Gartner. (2008). Gartner EXP Worldwide Survey of 1,500 CIOs Shows 85 Percent of CIOs Expect "Significant Change" Over Next Three Years. Retrieved from Gartner: http://www.gartner.com/newsroom/id/587309
 
[9]  Information Builders. (n.d.). WebFocus Business Intelligence. Retrieved from Information Builders: http://www.informationbuilders.com/products/webfocus
 
[10]  Joo, J., & Lee, S. M. (2006). Technical Limitation Factors of Knowledge Management Systems and a New Approach. Management Review: An International Journal, 4-16.
 
[11]  Kascelan, L. (2011). Advantages And Limitations In Implementation of Business Intelligence System In Montenegro: Case Study Telenor Montenegro. Journal of Economic and Business, 19-30.
 
[12]  Khan, R. A., & Quadri, S. K. (2012). Dovetailing of Business Intelligence and Knowledge Management: An Integrative Framework. Information and Knowledge Management.
 
[13]  KBase. (n.d.). ETL Services. Retrieved from KBase: http://www.kbase.com/etl.htm
 
[14]  McCarthy, S. (1999). Business Intelligence versus Knowledge Management. Retrieved from Inside Knowledge: http://www.ikmagazine.com/xq/asp/sid.0/articleid.6EEB9883-1D0D-4771-BC94-66F470A0F50E/eTitle.Business_Intelligence_versus_Knowledge_Management/qx/display.htm
 
[15]  MicroStrategy Incorporated. (2011). Business Intelligence Solution for Financial Services.
 
[16]  Nadeem, M., & Jaffri, S. A. (n.d.). Application of Business Intelligence in Banks (Pakistan).
 
[17]  Olszak, C. M., & Ziemba, E. (2007). Approach to Building and Implementing Business Intelligence Systems. Interdisciplinary Journal of Information, Knwoledge and Management.
 
[18]  Pant, P. (2009). Business Intelligence (BI): How to build successful BI strategy. Business Intelligence (BI): How to build successful BI strategy.
 
[19]  Skriletz, R. (2003). Business Intelligence in the Financial Services Industry. Retrieved from Information Management: http://www.information-management.com/issues/20030801/7152-1.html
 
[20]  Radonic, G. (2007). A Review of Business Intelligence Approaches to Key Business Factors in Banking. Journal of Knowledge Management.
 
[21]  Rao, G. K., & Kumar, R. (2011). Framework to Integrate Business Intelligence and Knowledge Management in Bankin Industry. Review of Business and Technology Research.
 
[22]  Ranjan, J. (2009). Business Intelligence: Concepts, Components,Techniques and Benefits. Journal of Theoretical and Applied Information Technology, 60-70. RBC Royal Bank Capitalizes on WebFOCUS for Operational Reporting. (n.d.). Retrieved April 15, 2013, from http://www.informationbuilders.com/applications/rbccanada:
 
[23]  Reinschmidt, J., & Francoise, A. (2000). Business Intelligence Certification Guide. IBM.
 
[24]  Wehinger, G. (2013). Banking in a challenging environment: Business models, ethics and approaches towards risks. OECD Journal: Financial Market Trends.
 
Show Less References

Article

Can Blind People Use Social Media Effectively? A Qualitative Field Study of Facebook Usability

1School of Information Studies, University of Wisconsin-Milwaukee Milwaukee, United States


American Journal of Information Systems. 2014, 2(2), 33-41
DOI: 10.12691/ajis-2-2-2
Copyright © 2014 Science and Education Publishing

Cite this paper:
Rakesh Babu. Can Blind People Use Social Media Effectively? A Qualitative Field Study of Facebook Usability. American Journal of Information Systems. 2014; 2(2):33-41. doi: 10.12691/ajis-2-2-2.

Correspondence to: Rakesh  Babu, School of Information Studies, University of Wisconsin-Milwaukee Milwaukee, United States. Email: babu@uwm.edu

Abstract

Social media allow people to communicate, collaborate and socialize for personal and professional matters. However, their sight-centered design can present access and usability problems for the blind. Existing quantitative approaches to usability testing do not provide in-depth assessment of the problem. This paper presents a qualitative approach to test social media usability, and illustrates its application to evaluate Facebook for the blind. Think-aloud observation of six blind participants generated verbal evidence of their Facebook interaction experiences. Verbal protocol analysis explained the nature of interaction challenges in performing common Facebook functions. Design standards analysis explained design errors in Facebook interface. It helped identify remedial measures to potentially improve Facebook usability. Findings demonstrate the utility of the qualitative approach to feasibly evaluate social media usability for blind users. It shows how blind users think, act and perceive in performing common social media functions non-visually. This has implications for the design of non-visual user interfaces to access social media through ‘Internet of Things’ and in multi-tasking situations.

Keywords

References

[1]  Wentz B., and Lazar J., “Are separate interfaces inherently unequal? An evaluation with blind users of the usability of two interfaces for a social networking platform,” in Proceedings of the Conference 2011, ACM, 91-97.
 
[2]  Qualman, E., “Social network user statistics,” Socialnomics, August 16, 2011. [Online]. Available: http://www.socialnomics.net/2011/08/16/social-network-users-statistics/. [Accessed September 18, 2013].
 
[3]  Herman, J., “Social networks and government,” How To. gov, April 19, 2013. [Online]. Available: http://www.howto.gov/social-media/social-networks. [Accessed July 21, 2013].
 
[4]  Jewell, M., “American Express, Twitter team up on retail deal,” Huffington Post, March 6, 2012. [Online]. Available: http://www.huffingtonpost.com/2012/03/07/american-express-twitter_n_1326342.html. [Accessed July 21, 2013].
 
[5]  Babu, R., Developing an understanding of the accessibility and usability problems blind students face in web-enhanced instruction environments. [Doctoral Dissertation]. Pro Quest Dissertations and Theses. (Accession Order No. AAT 3473492), 2011.
 
Show More References
[6]  Babu, R., “Understanding challenges in non-visual interaction with travel sites: An exploratory field study with blind users,” First Monday, 18 (12), December 2013. Available: http://firstmonday.org/ojs/index.php/fm/article/view/4808. [Accessed February 2, 2014].
 
[7]  World Health Organization, “Visual impairment and blindness,” WHO. int, October 2013. [Online]. Available: http://www.who.int/mediacentre/factsheets/fs282/en/. [Accessed December 19, 2013].
 
[8]  Buzzi, M.C., Buzzi, M., Leporini, B., and Akhter, F., “Is Facebook really ‘open’ to all?” in IEEE International Symposium on Technology and Society (ISTAS), NSW, 327-36.
 
[9]  Mankoff, J., Fait, H., and Tran, T., “Is your Web page accessible? A comparative study of methods for assessing Web page accessibility for the blind,” in Proceedings from the CHI 2005, ACM, 41-50.
 
[10]  Isenberg, D.J., "Thinking and managing: A verbal protocol analysis of managerial problem solving," Academy of Management Journal, 29 (4), 775-788, August 1986.
 
[11]  Ericsson, K.A., and Simon, H.A., Protocol analysis: Verbal reports as data, MIT Press, Cambridge, MA, 1984.
 
[12]  Babu, R., and Singh, R., “Enhancing learning management systems utility for blind students: A task-oriented, user-centered, multimethod evaluation technique,” Journal of Information Technology and Education-Research, 12, 1-32, 2013. [Online]. Available: http://www.jite.org/documents/Vol12/JITEv12ResearchBabu001-032.pdf. [Accessed August 7, 2013].
 
[13]  Todd P., and Benbasat, I., “Process tracing methods in decision support systems: Exploring the black box,” Management Information Systems Quarterly, 11 (4), 493-512, December 1987.
 
[14]  Cotton, D., and Gresty, K., “Reflecting on the think-aloud method for evaluating E-learning,” British Journal of Educational Technology, 37 (1), 45-54, January 2006.
 
[15]  Babu, R., Singh, R., and Ganesh, J., “Understanding blind users' Web accessibility and usability problems,” AIS Transactions on Human Computer Interaction, 2 (3), 73-94, July 2010.
 
[16]  World Wide Web Consortium, “Web Content Accessibility Guidelines (WCAG) 2.0,” W3. Org, December 11, 2008. [Online]. Available: http://www.w3.org/TR/WCAG20. [Accessed January 9, 2014].
 
[17]  Norman, D.A., The design of everyday things, Basic Books, New York, 2002.
 
[18]  Nielsen, J. and Landauer, T.K., “A mathematical model of the finding of usability problems,” in Proceedings of the INTERACT' 93 and CHI' 93 conference on human factors in computing systems, ACM, 206-213.
 
[19]  Obrenovic, Z., Abascal, J., and Starcevic, D. "Universal accessibility as a multimodal design issue," Communications of the ACM, 50 (5), 83-88, May 2007.
 
[20]  Henry, S.L., Martinson, M.L. and Barnicle, K. “Beyond video: accessibility profiles, personas, and scenarios up close and personal,” in Proceedings of UPA, 2003.
 
Show Less References

Article

Application of Infrastructure as a Service in IT Education

1Math and Computer Science, University of Houston-Victoria, Victoria, United States


American Journal of Information Systems. 2014, 2(2), 42-48
DOI: 10.12691/ajis-2-2-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Li Chao. Application of Infrastructure as a Service in IT Education. American Journal of Information Systems. 2014; 2(2):42-48. doi: 10.12691/ajis-2-2-3.

Correspondence to: Li  Chao, Math and Computer Science, University of Houston-Victoria, Victoria, United States. Email: chaol@uhv.edu

Abstract

This paper considers cloud service development to support hands-on practice in IT education. For IT education, cloud services can be used to reduce cost, enhance security, and provide flexibility. This paper presents a case study to illustrate how cloud services can be used to support hands-on practice for IT courses. It also provides a five-step development strategy to develop cloud based computer labs for various types of IT courses.

Keywords

References

[1]  ABET, “Criteria for accrediting engineering programs,” Available: http://www.abet.org/Linked%20Documents-UPDATE/Criteria%20and%20PP/05-06-EAC%20Criteria.pdf. [Accessed June 26, 2010.]
 
[2]  Chang, V., and Guetl, C., “Generation Y learning in the 21st century: Integration of virtual worlds and cloud computing services.” In Z. Abas et al. (Eds.), Proceedings of Global Learn Asia Pacific 2010 (pp. 1888-1897). Chesapeake, VA: AACE. 2010.
 
[3]  Chao, L, Strategies and technologies for developing online computer labs for technology-based courses. Hershey, PA: IGI Global, 2008.
 
[4]  Fox, A, “Cloud computing in education,” Available: http://inews.berkeley.edu/articles/Spring2009/cloud-computing. [Accessed July 26, 2010.]
 
[5]  Nicholson, J. L, “Cloud computing: Top issues for higher education,” Available: http://www.universitybusiness.com/viewarticle.aspx?articleid=1342 [Accessed July 26, 2010.]
 
Show More References
[6]  Stein, S., Ware, J., Laboy, J., & Schaffer, H. E, “Improving K-12 pedagogy via a Cloud designed for education,” International Journal of Information Management, 33 (1), 235-241. 2013.
 
[7]  Chao, L, Cloud technology and its application in IT education. In M. Koehler & P. Mishra (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference 2011 (pp. 3053-3056). Chesapeake, VA: AACE. 2011.
 
[8]  Cloud Weeks, “Cloud computing – demystifying SaaS, PaaS and IaaS,” Available: http://www.cloudtweaks.com/2010/05/cloud-computing-demystifying-saas-paas-and-iaas. [Accessed September 16, 2010.]
 
[9]  Velte, T., Velte, A., & Elsenpeter, R., Cloud computing, a practical approach. New York: McGraw-Hill Osborne Media. 2009.
 
[10]  Amazon, “AWS in Education,” Available: http://aws.amazon.com/education [Accessed July 15, 2011.]
 
[11]  Barr, J., “Amazon EC2 Beta.” http://aws.typepad.com/aws/2006/08/amazon_ec2_beta.html [Accessed July 16, 2009.]
 
[12]  Microsoft, “Cloud computing for education,” Available: http://www.microsoft.com/education/solutions/cloudcomputing.aspx. [Accessed July 15, 2011.]
 
[13]  IBM, “Introducing the IBM Cloud Academy,” Available: http://www.ibm.com/solutions/education/cloudacademy/us/en. [Accessed September 16, 2010.]
 
[14]  Google, “Gmail, Calendar, Docs and more,” Available: http://www.google.com/a/help/intl/en/edu/index.html [Accessed September 16, 2010.]
 
Show Less References

Article

Computer System Users are like Fish

1Drexel University, Philadelphia, PA


American Journal of Information Systems. 2014, 2(3), 49-51
DOI: 10.12691/ajis-2-3-1
Copyright © 2014 Science and Education Publishing

Cite this paper:
Ralph M. DeFrangesco. Computer System Users are like Fish. American Journal of Information Systems. 2014; 2(3):49-51. doi: 10.12691/ajis-2-3-1.

Correspondence to: Ralph  M. DeFrangesco, Drexel University, Philadelphia, PA. Email: rd337@drexel.edu

Abstract

This paper has looked at the habits of computer users when faced with a slow system and has drawn a direct correlation between how they react and fish population dynamics. A survey has been presented that supports the proposed theory.

Keywords

References

[1]  Eero, M., Lindegren, M. & Koster, F. (2011). The state and relative importance of drivers Of fish population dynamics: An indicator-based approach. Ecological Indicators 15 (2012) 248-252.
 
[2]  Kerr, L., Cadrin, S., & Secor, D. (2010). The role of spatial dynamics in the stability, Resilience, and productivity of an estuarine fish population. Ecological Applications, 20(2), 2010, pp. 497-507.
 
[3]  Griffiths, R.A. (1997). Temporary ponds as amphibian habitats. Aquatic Conservation: Marine and Freshwater Ecosystems, Vol. 7, 119-126.
 

Article

Estimating Plans along with Cost in Multiple Query Processing Environments by Applying Particle Swarm Optimization Technique

1Deaprtment of Computer Sc.&Engg., Ajay Binay Institute of Technology, Cuttack

2S.O.A. University, Bhubaneswar

3Government College of Engineering, Bhawanipatna


American Journal of Information Systems. 2014, 2(3), 52-55
DOI: 10.12691/ajis-2-3-2
Copyright © 2014 Science and Education Publishing

Cite this paper:
Sambit Kumar Mishra, Srikanta Pattnaik, Dulu patnaik. Estimating Plans along with Cost in Multiple Query Processing Environments by Applying Particle Swarm Optimization Technique. American Journal of Information Systems. 2014; 2(3):52-55. doi: 10.12691/ajis-2-3-2.

Correspondence to: Sambit  Kumar Mishra, Deaprtment of Computer Sc.&Engg., Ajay Binay Institute of Technology, Cuttack. Email: sambit_pr@rediffmail.com

Abstract

The Main idea of multiple query processing is to optimize a set of queries together and execute the common operations once. Major tasks in multiple query processing are common operation or expression identification and global execution plan construction. Query plans are generally derived from registered continuous queries. They are composed of operators, which perform the actual data processing, queries which buffer data as it moves between operators to hold state of operators. The complex part is to decompose queries and query plans and rearrange the sub queries and query plans on the network. The main functions to achieve an optimal query distribution are usually minimizing network usage and minimizing response time of queries. While dealing with query distribution problem, the challenges like modeling topology of the network, decomposing queries into some sub queries and sub query placement may be occurred. Operators are the basic data processing units in a query plan. An operator takes one or more streams as input and produces a stream as output. As in the traditional database management system, a plan for query connects a set of operators in a tree. The output of a child operator forms an input of its parent operator. In this paper it is aimed to retrieve the cost of query plans as well as cost of particles of swarm in multiple query processing environments by applying particle swarm optimization techniques.

Keywords

References

[1]  Y.E. Ioannidis and Y.C. Kang, “Randomized algorithms for optimizing large join queries, ACM 1990.
 
[2]  M. Jarke and J. Koch, “Query optimization in database systems,” ACM Computing Surveys, volume 16, no. 2, pp. 111-152, June 1984.
 
[3]  L. P. Mahalingam and K. S. Candan, Multi-Criteria Query Optimization in the Presence of Result Size and Quality Tradeoffs, Multimedia Tools and Applications Journal 23(3) (2004), 167-183.
 
[4]  Ch. Li, Kevin Ch.-Ch. Chang, I. F. Ilyas, and S. Song, RankSQL: query algebra and optimization for relational top-k queries. In: F. Ozcan, editor, SIGMOD Conference. ACM, 2005, 131-142.
 
[5]  Stefan Riezler, Statistical Machine Translation for Query Expansion in Answer Retrieval, Proceedings of the 45th Annual Meeting of the Association of Computational Linguistics, pages 464-471, Prague, Czech Republic, June 2007.
 
Show More References
[6]  Raymond T. Ng and V. S. Subrahmanian. Probabilistic logic programming. Information and Computation, 101(2):150-201, 1992.
 
[7]  Norbert Fuhr and Thomas Rolleke. A probabilistic relational algebra for the integration of information retrieval and database systems. ACM Trans. Inf. Syst., 15(1):32-66, 1997.
 
[8]  Praveen Seshadri, Hamid Pirahesh, and T. Y. Cliff Leung. Complex query decorrelation. In Intl. Conf. on Data Engineering, 1996.
 
[9]  Subbu N. Subramanian and Shivakumar Venkataraman. Cost based optimization of decision support queries using transient views. In SIGMOD Intl. Conf. on Management of Data, Seattle, WA, 1998.
 
[10]  A. Pérez-Uribe and B. Hirsbrunner,―Learning and foraging in robot-bees‖, in Meyer, Berthoz, Floreano, Roitblat andWilson (eds.)’, SAB2000 Proceedings Supplement Book, Intermit. Soc. For Adaptive Behavior, Honolulu, Hawaii, pp. 185-194.
 
[11]  K. Bennett, M.C. Ferris, and Y.E. Ioannidis, ―A genetic algorithm for database query optimization‖, In Proc. of the 4th International Conference on Genetic Algorithms, 400-407, 1991.
 
[12]  M.J. Franklin, S.R. Jeffery, S. Krishnamurthy, F. Reiss, S. Rizvi, et al., ―Design considerations for high fan-in systems: the HiFi approach‖, In Proc. Of the CIDR Conf., Jan. 2005.
 
[13]  A. Sokolov and D. Whitley, “Unbiased Tournament Selection,” in proceedings of the 2005 conference on Genetic and Evolutionary Computation, pp. 1131-1138, 2005
 
[14]  T.V. VijayKumar, Vikram Singh and Ajay Kumar Verma, “Generating Distributed Query Processing Plans using Genetic Algorithm”, In the proceedings of the International Conference on Data Storage and Data Engineering (DSDE 2010), Bangalore, February 9-10, 2010, pp. 173-177, 2010.
 
Show Less References