American Journal of Information Systems»Articles

Article

Application of Infrastructure as a Service in IT Education

1Math and Computer Science, University of Houston-Victoria, Victoria, United States


American Journal of Information Systems. 2014, 2(2), 42-48
DOI: 10.12691/ajis-2-2-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Li Chao. Application of Infrastructure as a Service in IT Education. American Journal of Information Systems. 2014; 2(2):42-48. doi: 10.12691/ajis-2-2-3.

Correspondence to: Li  Chao, Math and Computer Science, University of Houston-Victoria, Victoria, United States. Email: chaol@uhv.edu

Abstract

This paper considers cloud service development to support hands-on practice in IT education. For IT education, cloud services can be used to reduce cost, enhance security, and provide flexibility. This paper presents a case study to illustrate how cloud services can be used to support hands-on practice for IT courses. It also provides a five-step development strategy to develop cloud based computer labs for various types of IT courses.

Keywords

References

[[[[[[[[[
[[1]  ABET, “Criteria for accrediting engineering programs,” Available: http://www.abet.org/Linked%20Documents-UPDATE/Criteria%20and%20PP/05-06-EAC%20Criteria.pdf. [Accessed June 26, 2010.]
 
[[2]  Chang, V., and Guetl, C., “Generation Y learning in the 21st century: Integration of virtual worlds and cloud computing services.” In Z. Abas et al. (Eds.), Proceedings of Global Learn Asia Pacific 2010 (pp. 1888-1897). Chesapeake, VA: AACE. 2010.
 
[[3]  Chao, L, Strategies and technologies for developing online computer labs for technology-based courses. Hershey, PA: IGI Global, 2008.
 
[[4]  Fox, A, “Cloud computing in education,” Available: http://inews.berkeley.edu/articles/Spring2009/cloud-computing. [Accessed July 26, 2010.]
 
[[5]  Nicholson, J. L, “Cloud computing: Top issues for higher education,” Available: http://www.universitybusiness.com/viewarticle.aspx?articleid=1342 [Accessed July 26, 2010.]
 
Show More References
[6]  Stein, S., Ware, J., Laboy, J., & Schaffer, H. E, “Improving K-12 pedagogy via a Cloud designed for education,” International Journal of Information Management, 33 (1), 235-241. 2013.
 
[7]  Chao, L, Cloud technology and its application in IT education. In M. Koehler & P. Mishra (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference 2011 (pp. 3053-3056). Chesapeake, VA: AACE. 2011.
 
[8]  Cloud Weeks, “Cloud computing – demystifying SaaS, PaaS and IaaS,” Available: http://www.cloudtweaks.com/2010/05/cloud-computing-demystifying-saas-paas-and-iaas. [Accessed September 16, 2010.]
 
[9]  Velte, T., Velte, A., & Elsenpeter, R., Cloud computing, a practical approach. New York: McGraw-Hill Osborne Media. 2009.
 
[10]  Amazon, “AWS in Education,” Available: http://aws.amazon.com/education [Accessed July 15, 2011.]
 
[11]  Barr, J., “Amazon EC2 Beta.” http://aws.typepad.com/aws/2006/08/amazon_ec2_beta.html [Accessed July 16, 2009.]
 
[12]  Microsoft, “Cloud computing for education,” Available: http://www.microsoft.com/education/solutions/cloudcomputing.aspx. [Accessed July 15, 2011.]
 
[13]  IBM, “Introducing the IBM Cloud Academy,” Available: http://www.ibm.com/solutions/education/cloudacademy/us/en. [Accessed September 16, 2010.]
 
[14]  Google, “Gmail, Calendar, Docs and more,” Available: http://www.google.com/a/help/intl/en/edu/index.html [Accessed September 16, 2010.]
 
Show Less References

Article

Can Blind People Use Social Media Effectively? A Qualitative Field Study of Facebook Usability

1School of Information Studies, University of Wisconsin-Milwaukee Milwaukee, United States


American Journal of Information Systems. 2014, 2(2), 33-41
DOI: 10.12691/ajis-2-2-2
Copyright © 2014 Science and Education Publishing

Cite this paper:
Rakesh Babu. Can Blind People Use Social Media Effectively? A Qualitative Field Study of Facebook Usability. American Journal of Information Systems. 2014; 2(2):33-41. doi: 10.12691/ajis-2-2-2.

Correspondence to: Rakesh  Babu, School of Information Studies, University of Wisconsin-Milwaukee Milwaukee, United States. Email: babu@uwm.edu

Abstract

Social media allow people to communicate, collaborate and socialize for personal and professional matters. However, their sight-centered design can present access and usability problems for the blind. Existing quantitative approaches to usability testing do not provide in-depth assessment of the problem. This paper presents a qualitative approach to test social media usability, and illustrates its application to evaluate Facebook for the blind. Think-aloud observation of six blind participants generated verbal evidence of their Facebook interaction experiences. Verbal protocol analysis explained the nature of interaction challenges in performing common Facebook functions. Design standards analysis explained design errors in Facebook interface. It helped identify remedial measures to potentially improve Facebook usability. Findings demonstrate the utility of the qualitative approach to feasibly evaluate social media usability for blind users. It shows how blind users think, act and perceive in performing common social media functions non-visually. This has implications for the design of non-visual user interfaces to access social media through ‘Internet of Things’ and in multi-tasking situations.

Keywords

References

[[[[[[[[[[[[[[[
[[1]  Wentz B., and Lazar J., “Are separate interfaces inherently unequal? An evaluation with blind users of the usability of two interfaces for a social networking platform,” in Proceedings of the Conference 2011, ACM, 91-97.
 
[[2]  Qualman, E., “Social network user statistics,” Socialnomics, August 16, 2011. [Online]. Available: http://www.socialnomics.net/2011/08/16/social-network-users-statistics/. [Accessed September 18, 2013].
 
[[3]  Herman, J., “Social networks and government,” How To. gov, April 19, 2013. [Online]. Available: http://www.howto.gov/social-media/social-networks. [Accessed July 21, 2013].
 
[[4]  Jewell, M., “American Express, Twitter team up on retail deal,” Huffington Post, March 6, 2012. [Online]. Available: http://www.huffingtonpost.com/2012/03/07/american-express-twitter_n_1326342.html. [Accessed July 21, 2013].
 
[[5]  Babu, R., Developing an understanding of the accessibility and usability problems blind students face in web-enhanced instruction environments. [Doctoral Dissertation]. Pro Quest Dissertations and Theses. (Accession Order No. AAT 3473492), 2011.
 
Show More References
[6]  Babu, R., “Understanding challenges in non-visual interaction with travel sites: An exploratory field study with blind users,” First Monday, 18 (12), December 2013. Available: http://firstmonday.org/ojs/index.php/fm/article/view/4808. [Accessed February 2, 2014].
 
[7]  World Health Organization, “Visual impairment and blindness,” WHO. int, October 2013. [Online]. Available: http://www.who.int/mediacentre/factsheets/fs282/en/. [Accessed December 19, 2013].
 
[8]  Buzzi, M.C., Buzzi, M., Leporini, B., and Akhter, F., “Is Facebook really ‘open’ to all?” in IEEE International Symposium on Technology and Society (ISTAS), NSW, 327-36.
 
[9]  Mankoff, J., Fait, H., and Tran, T., “Is your Web page accessible? A comparative study of methods for assessing Web page accessibility for the blind,” in Proceedings from the CHI 2005, ACM, 41-50.
 
[10]  Isenberg, D.J., "Thinking and managing: A verbal protocol analysis of managerial problem solving," Academy of Management Journal, 29 (4), 775-788, August 1986.
 
[11]  Ericsson, K.A., and Simon, H.A., Protocol analysis: Verbal reports as data, MIT Press, Cambridge, MA, 1984.
 
[12]  Babu, R., and Singh, R., “Enhancing learning management systems utility for blind students: A task-oriented, user-centered, multimethod evaluation technique,” Journal of Information Technology and Education-Research, 12, 1-32, 2013. [Online]. Available: http://www.jite.org/documents/Vol12/JITEv12ResearchBabu001-032.pdf. [Accessed August 7, 2013].
 
[13]  Todd P., and Benbasat, I., “Process tracing methods in decision support systems: Exploring the black box,” Management Information Systems Quarterly, 11 (4), 493-512, December 1987.
 
[14]  Cotton, D., and Gresty, K., “Reflecting on the think-aloud method for evaluating E-learning,” British Journal of Educational Technology, 37 (1), 45-54, January 2006.
 
[15]  Babu, R., Singh, R., and Ganesh, J., “Understanding blind users' Web accessibility and usability problems,” AIS Transactions on Human Computer Interaction, 2 (3), 73-94, July 2010.
 
[16]  World Wide Web Consortium, “Web Content Accessibility Guidelines (WCAG) 2.0,” W3. Org, December 11, 2008. [Online]. Available: http://www.w3.org/TR/WCAG20. [Accessed January 9, 2014].
 
[17]  Norman, D.A., The design of everyday things, Basic Books, New York, 2002.
 
[18]  Nielsen, J. and Landauer, T.K., “A mathematical model of the finding of usability problems,” in Proceedings of the INTERACT' 93 and CHI' 93 conference on human factors in computing systems, ACM, 206-213.
 
[19]  Obrenovic, Z., Abascal, J., and Starcevic, D. "Universal accessibility as a multimodal design issue," Communications of the ACM, 50 (5), 83-88, May 2007.
 
[20]  Henry, S.L., Martinson, M.L. and Barnicle, K. “Beyond video: accessibility profiles, personas, and scenarios up close and personal,” in Proceedings of UPA, 2003.
 
Show Less References

Article

Business Intelligence as a Knowledge Management Tool in Providing Financial Consultancy Services

1Kulliyyah of Information and Communication Technology, International Islamic University Malaysia


American Journal of Information Systems. 2014, 2(2), 26-32
DOI: 10.12691/ajis-2-2-1
Copyright © 2014 Science and Education Publishing

Cite this paper:
Gul Muhammad, Jamaludin Ibrahim, Zeeshan Bhatti, Ahmad Waqas. Business Intelligence as a Knowledge Management Tool in Providing Financial Consultancy Services. American Journal of Information Systems. 2014; 2(2):26-32. doi: 10.12691/ajis-2-2-1.

Correspondence to: Zeeshan  Bhatti, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia. Email: zeeshan.bhatti@live.iium.edu.my

Abstract

The main objective of this paper is to elaborate how Business Intelligence (BI) as a knowledge management tool could help consultants in providing professional services to the financial sector. The Business Intelligence (BI) solution could be a competitive advantage for the consultants if they are able to exploit the Business Intelligence (BI) tools and technology such as Data Warehouse, Data Mining, On-Line Analytical Processing (OLAP) and Extraction Transformation Load (ETL). The consultants can use Business Intelligence (BI) solution to analyze the organizational data such as structures and business processes of the Financial Institution. By analyzing the organizational data, the financial institution can imp better rove and streamline functional efficiencies to not only bolster up sales and marketing strategies and better develop customer services program, but also mitigate risk by developing more appropriate risk management actions. In brief, by having this competitive advantage, the consultant will be able to withstand in the market, which is always changing.

Keywords

References

[[[[[[[[[[[[[[[[[[[
[[1]  Albescu, F., Pugna, I., & Paraschiv, D. (2008). Business Intelligence & Knowledge Management – Technological Support for Strategic Management in the Knowledge Based Economy. Revista Informatica Economică,, 6-12.
 
[[2]  Arora, E. (2011). Knowledge Management In Public Sector. Journal of Arts Science and Commerce.
 
[[3]  BMO Bank of Montreal Slices Costs, Time With Web-Based Reporting. (n.d.). Retrieved April 15, 2013, from http://www.informationbuilders.com/applications/bank_montr:
 
[[4]  Business Intelligence Helps SMBC Adapt to Dynamic Market. (n.d.). Retrieved April 15, 2013, from http://www.informationbuilders.com/solutions/banking.
 
[[5]  Business Intelligence Solution for Financial Services- microstrategy.com. (2011). Retrieved April 13, 2013, from http://www.microstrategy.com/bi-applications/solutions/: http://www.microstrategy.com/download/files/solutions/byindustry/Microstrategy-mobile-bi-financial
 
Show More References
[6]  Cheng, L., & Cheng, P. (2011). Integration: Knowledge Mangement and Business Intelligence. Fourth International Conference on Business Intelligence and FInancial Engineering.
 
[7]  Gartner. (2011). A step-by-step approach to successful Business Intelligence. Featuring research from Gartner.
 
[8]  Gartner. (2008). Gartner EXP Worldwide Survey of 1,500 CIOs Shows 85 Percent of CIOs Expect "Significant Change" Over Next Three Years. Retrieved from Gartner: http://www.gartner.com/newsroom/id/587309
 
[9]  Information Builders. (n.d.). WebFocus Business Intelligence. Retrieved from Information Builders: http://www.informationbuilders.com/products/webfocus
 
[10]  Joo, J., & Lee, S. M. (2006). Technical Limitation Factors of Knowledge Management Systems and a New Approach. Management Review: An International Journal, 4-16.
 
[11]  Kascelan, L. (2011). Advantages And Limitations In Implementation of Business Intelligence System In Montenegro: Case Study Telenor Montenegro. Journal of Economic and Business, 19-30.
 
[12]  Khan, R. A., & Quadri, S. K. (2012). Dovetailing of Business Intelligence and Knowledge Management: An Integrative Framework. Information and Knowledge Management.
 
[13]  KBase. (n.d.). ETL Services. Retrieved from KBase: http://www.kbase.com/etl.htm
 
[14]  McCarthy, S. (1999). Business Intelligence versus Knowledge Management. Retrieved from Inside Knowledge: http://www.ikmagazine.com/xq/asp/sid.0/articleid.6EEB9883-1D0D-4771-BC94-66F470A0F50E/eTitle.Business_Intelligence_versus_Knowledge_Management/qx/display.htm
 
[15]  MicroStrategy Incorporated. (2011). Business Intelligence Solution for Financial Services.
 
[16]  Nadeem, M., & Jaffri, S. A. (n.d.). Application of Business Intelligence in Banks (Pakistan).
 
[17]  Olszak, C. M., & Ziemba, E. (2007). Approach to Building and Implementing Business Intelligence Systems. Interdisciplinary Journal of Information, Knwoledge and Management.
 
[18]  Pant, P. (2009). Business Intelligence (BI): How to build successful BI strategy. Business Intelligence (BI): How to build successful BI strategy.
 
[19]  Skriletz, R. (2003). Business Intelligence in the Financial Services Industry. Retrieved from Information Management: http://www.information-management.com/issues/20030801/7152-1.html
 
[20]  Radonic, G. (2007). A Review of Business Intelligence Approaches to Key Business Factors in Banking. Journal of Knowledge Management.
 
[21]  Rao, G. K., & Kumar, R. (2011). Framework to Integrate Business Intelligence and Knowledge Management in Bankin Industry. Review of Business and Technology Research.
 
[22]  Ranjan, J. (2009). Business Intelligence: Concepts, Components,Techniques and Benefits. Journal of Theoretical and Applied Information Technology, 60-70. RBC Royal Bank Capitalizes on WebFOCUS for Operational Reporting. (n.d.). Retrieved April 15, 2013, from http://www.informationbuilders.com/applications/rbccanada:
 
[23]  Reinschmidt, J., & Francoise, A. (2000). Business Intelligence Certification Guide. IBM.
 
[24]  Wehinger, G. (2013). Banking in a challenging environment: Business models, ethics and approaches towards risks. OECD Journal: Financial Market Trends.
 
Show Less References

Article

The Method for Comparative Evaluation of Software Architecture with Accounting of Trade-offs

1Department of Computer Informational Technologies, National Aviation University, Kyiv, Ukraine

2Department of Computer Science, Ternopil Ivan Pul’uj National Technical University, Ternopil, Ukraine

3Department of Computer Engineering, Ternopil Ivan Pul’uj National Technical University, Ternopil, Ukraine


American Journal of Information Systems. 2014, 2(1), 20-25
DOI: 10.12691/ajis-2-1-5
Copyright © 2014 Science and Education Publishing

Cite this paper:
Alexander Kharchenko, Ihor Bodnarchuk, Vasyl Yatcyshyn. The Method for Comparative Evaluation of Software Architecture with Accounting of Trade-offs. American Journal of Information Systems. 2014; 2(1):20-25. doi: 10.12691/ajis-2-1-5.

Correspondence to: Ihor  Bodnarchuk, Department of Computer Science, Ternopil Ivan Pul’uj National Technical University, Ternopil, Ukraine. Email: bodnarchuk.io@gmail.com

Abstract

Since growing complexity of software systems it is more difficult to meet demands of quality during the process of their design. To solve this problem with minimal loss this process is transferred onto more early stages of design, particularly onto the design of architecture. The architecture is treated as the set of components that encapsulates the logic of calculations, and connections that ensure the interaction between components and create their configuration. Since the architecture of software system is a high-level abstract model for representation of system structure and key properties, its selection grounds the insurance of quality for software system. In the paper the questions of evaluation of architecture quality on the set of quality attributes with Analytic Hierarchic Process (AHP) with applying of optimization algorithm for estimating of weights of alternatives are discussed. The conflicts between quality indices and trade-offs between them are analyzed.

Keywords

References

[[[[[[[[
[[1]  Kazman, R. ATAM: Method for Architecture Evaluation / Rick Kazman, Mark Klein, Paul Clements. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, August 2000. CMU/SEI-2000-TR-004, ADA377385. 83 p.
 
[[2]  Kazman, R. Quantifying the costs and benefits of architectural decision/ Kazman, R., Asundi, J., and Klein // Proceedings of the 23rd International Conference on Software Engineering (ICSE), 2001. pp. 297-306
 
[[3]  Bengtsson, Perolof Architecture-level modifiability analysis (ALMA) / Perolof Bengtsson, Nico H. Lassing, Jan Bosch, Hans van Vliet // Journal of Systems and Software. 2004. Vol. 69, No. 1-2. pp. 129-147.
 
[[4]  L. Dobrica and E. Niemela. A Survey on Software Architecture Analysis Methods. IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 638-653, July 2002.
 
[[5]  T. Al-Naeem, I. Gorton, M.A. Babar, F. Rabhi, and B. Benatallah, “A quality driven systematic approach for architecting distributed software applications”, Proceedings of the 27th International Conference on Software Engineering(ICSE), St. Louis, USA, 2005. pp. 244-253.
 
Show More References
[6]  M. Svahnberg, C. Wholin, and L. Lundberg. A Quality-Driven Decision-Support Method for Identifying Software Architecture Candidates. // Int. Journal of Software Engineering and Knowledge Engineering, 2003. 13(5): pp. 547-573.
 
[7]  Harchenko Alexandr, Bodnarchuk Ihor, Halay Iryna. Stability of the Solutions of the Optimization Problem of Software Systems Architecture // Proceeding of VIIth International Scientific and Technical Conference CSIT 2012. pp. 47-48, Lviv, 2012.
 
[8]  AlexandrHarchenko. The Tool for Design of Software Systems Architecture // AlexandrHarchenko, Ihor Bodnarchuk, Iryna Halay, VasylYatcyshyn // Proceeding of XIIth International Conference CADSM' 2013. pp. 47-48, Lviv.
 
[9]  AlexandrHarchenko.DecisionSupportSystemofSoftwareArchitect // AlexandrHarchenko, Ihor Bodnarchuk, IrynaHalay // Proceeding of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1, pp. 265-269, Berlin.
 
[10]  Kharchenko O.H. Instrumentaljnyj zasib rozrobky ta komunikaciji vymogh jakosti do proghramnykh system / O.G. Kharchenko, V.V. Yatcyshyn, I.E. Rajchev // Inzhenerija proghramnogho zabezpechennja. Kyiv, – 2010. # 2. pp. 29-34.
 
[11]  Saaty T. Decision Making with the Analytic Network Process./ Saaty T. Vargas L.// – N.Y.: Springer, 2006. 278 p.
 
[12]  Pavlov A.A. Matematicheskie modelioptimizaciidljanahozhdenijavesov obyektov v metode parnyh sravnenij. Pavlov A.A, Lishchuk E.I., Kut V.I.// Sy`stemni doslidzhennya ta informacijni texnologiyi – Kyiv.: IASA (Institute for Applied System Analysis), 2007. #2, pp. 13-21.
 
[13]  Zgurovskij M.Z., Pavlov A.A., Shtankevich A.S. Modificirovannyj metod analiza ierarhij // Sy`stemni doslidzhennya ta informacijni texnologiyi – Kyiv.: IASA (Institute for Applied System Analysis),–2010. #1, pp. 7-25.
 
Show Less References

Article

Second Life: An Emerging Technology for 3D Websites

1Department of Computer Science, Sukkur Institute of Business Administration, Sukkur, Pakistan


American Journal of Information Systems. 2014, 2(1), 15-19
DOI: 10.12691/ajis-2-1-4
Copyright © 2014 Science and Education Publishing

Cite this paper:
Fabeha Waqar Shmasi, Ahmad Waqas. Second Life: An Emerging Technology for 3D Websites. American Journal of Information Systems. 2014; 2(1):15-19. doi: 10.12691/ajis-2-1-4.

Correspondence to: Ahmad  Waqas, Department of Computer Science, Sukkur Institute of Business Administration, Sukkur, Pakistan. Email: ahmad.waqas@iba-suk.edu.pk

Abstract

Second Life is virtual reality based technology for designing 3D websites. This paper demonstrates the detailed process of creating a 3D website from scratch using Second Life. The steps required to make a 3D website are divided into sections to make things clear and understandable. The sections will be introducing the basic things that will need to be understood in order to make a website.

Keywords

References

[[[[[[[[
[[1]  “Active World.” [Online]. Available: https://www.activeworlds.com/index.html. [Accessed: 15-Nov-2013].
 
[[2]  “Cyber Town,” Cyber Town. [Online]. Available: http://en.wikipedia.org/wiki/CyberTown. [Accessed: 15-Nov-2013].
 
[[3]  A. Serrano, “Second Life,” IS Research Paper, 2010. [Online]. Available: http://misclassblog.com/is-research-paper/research-paper-second-life-by-alan-serrano/.
 
[[4]  P. R. Michael Rymaszewski, Wagner James Au, Mark Wallace, Catherine Winters, Cory Ondrejka, Benjamin Batstone-Cunningham, Second Life: The Official Guide. John Wiley & Sons, Inc., 2006.
 
[[5]  “Second Life.” [Online]. Available: http://en.wikipedia.org/wiki/Second_Life. [Accessed: 13-Nov-2013].
 
Show More References
[6]  P. R. Michael Rymaszewski, Wagner James Au, Mark Wallace, Catherine Winters, Cory Ondrejka, Benjamin Batstone-Cunningham, “Prims,” in in Second Life: The Official Guide, John Wiley & Sons, Inc., 2006, p. 132.
 
[7]  P. R. Michael Rymaszewski, Wagner James Au, Mark Wallace, Catherine Winters, Cory Ondrejka, Benjamin Batstone-Cunningham, “Linden Scripting Language,” in in Second Life: The Official Guide, John Wiley & Sons, Inc., 2006, p. 212.
 
[8]  “Standford University.” [Online]. Available: http://secondlife.com/destination/600. [Accessed: 15-Nov-2013].
 
[9]  “University of Texas.” [Online]. Available: http://secondlife.com/destination/university-of-texas. [Accessed: 15-Nov-2013].
 
[10]  “Dell Second Life.” [Online]. Available: ww.dell.com/secondlife. [Accessed: 08-Jan-2013].
 
[11]  “QAvimator.” [Online]. Available: http://qavimator.org/. [Accessed: 15-Nov-2013].
 
[12]  “GIMP.” [Online]. Available: http://www.gimp.org/. [Accessed: 15-Nov-2013].
 
[13]  “Economy of Second Life.” [Online]. Available: http://en.wikipedia.org/wiki/Economy_of_Second_Life. [Accessed: 15-Nov-2013].
 
Show Less References

Article

Structural-Functional Model of the Information Systems of City Planning

1Laboratory of Engineering Seismology, Center of Geophysical Investigations of VSC RAS and RNO-A, Vladikavkaz, Russia

2Laboratory of Instrumental Monitoring of Hazardous Natural-Technogenic Processes, Center of Geophysical Investigations of VSC RAS and RNO-A, Vladikavkaz, Russia


American Journal of Information Systems. 2014, 2(1), 11-14
DOI: 10.12691/ajis-2-1-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Vladislav ZAALISHVILI, Alexandr KANUKOV, Dmitry MELKOV. Structural-Functional Model of the Information Systems of City Planning. American Journal of Information Systems. 2014; 2(1):11-14. doi: 10.12691/ajis-2-1-3.

Correspondence to: Alexandr  KANUKOV, Laboratory of Instrumental Monitoring of Hazardous Natural-Technogenic Processes, Center of Geophysical Investigations of VSC RAS and RNO-A, Vladikavkaz, Russia. Email: akanukov@list.ru

Abstract

On the basis of modern the technologies information database of seismicity and seismic risks in information system designed for city planning is developed. System includes maps of detailed seismic zoning (DSZ) of North Ossetia-Alania and map of seismic microzonation (SMZ) of the territory of Vladikavkaz city.

Keywords

References

[[[[[[[[[[[[[[
[[1]  City planning code of the Russian Federation, 29.12.2004 N of 190-FZ (accepted by GD FS RF 22.12.2004), Parliamentary newspaper , N 5-6, 2005.
 
[[2]  Mamysheva E.G., Zagoruyko A.E. Survey of technological platforms for the formation ISOCP Control of the development of territory, 3. 2010, 70-72.
 
[[3]  Zaalishvili V.B., Arakelyan A.R., Makiev E, Melkov D.A. To a question of the seismic zonation of the republic North Osetia -Alaniya territory in the 1st international conference “dangerous natural and technogenic geological processes in the mountain and foothill territories of the North Caucasus”, Vladikavkaz, September 20-22, 2007, Vladikavkaz, 2008, 263-278.
 
[[4]  Zaalishvili V.B., Dzeranov B.V. Estimation of the seismic danger in the territory of RNO-Alania in Practical-scientific conference “Young scientists in the solution of the vital problems of science”, Vladikavkaz, 2010, 342345.
 
[[5]  Zaalishvili V.B., Melkov D.A., Dzeranov B.V., Kanukov A.S. The seismic danger assessment in the urbanized territory on the basis of contemporary methods of seismic microzonation (based on the Vladikavkaz city example) in Practical-scientific conference “Young scientists in the solution of the vital problems of science”, Vladikavkaz, 2010, 348-351.
 
Show More References
[6]  Zaalishvili V.B., Melkov D.A., Dzeranov B.V. Modern seismic hazard assessment methods (in example territory of Vladikavkaz-city) //Proceedings of 14th European conference of earthquake engineering. 30August –0 3 September, Ohrid, republic Macedonia, 2010, 8 pp.
 
[7]  Zaalishvili V.B. Rating estimation of the urbanized territories (theses of reports) in V Russian national conference on the earthquake-proof building and the seismic zonation with the international participation, Sochi, 2003, 64.
 
[8]  Zaalishvili V.B. Seismic risk in the estimation of the directions of the historical center of Tbilisi reconstruction The theory of construction and seismic stability. IBM&S, GAS, Vol. 1, Tbilisi, 2000, 189-194.
 
[9]  Zaalishvili V.B. Timchenko I.E., Chachava N.T., Lekveishvili M.N. Seismic risk and the reconstruction of historical center of Tbilisi (theses of reports) in The III national conference on the earthquake-proof building and the seismic zonation, Sochi, 1999, 140.
 
[10]  Zaalishvili V.B. Physical bases of seismic microzonation, UIPE RAS, Moscow, 2000. 367.
 
[11]  Zaalishvili V.B., Gogmachadze S.A., Zaalishvili Z.V., Otinashvili M.G., Shengeliya N.O. Method of the rating estimation of the territory for purposes of insurance in The IV national conference on the earthquake-proof building and the seismic zonation, Sochi, 2001, 166.
 
[12]  Zaalishvili V.B., Melkov D.A., Kanukov A.S. The information system of city planning on the basis of the information database of seismicity and seismic risk Informatization and connection. ISSN 2078-8320, 5, 2012, 14-8.
 
[13]  Zaalishvili Z.V., Melkov D.A., Korotkaia N.A., Dzeranov B.V. Rating estimation of the soil conditions of territory. Transactions of the I Caucasian International school-seminar of young scientists “Seismic danger and control of seismic risk in the Caucasus”. Vladikavkaz, 2006.
 
[14]  Geographical information system. URL: http://www.gisa.ru/13058.html (2.02.2011).
 
[15]  The OGC's Role in Government & Spatial Data Infrastructure URL: http://www.opengeospatial.org/domain/gov_and_sdi.
 
[16]  Balasanyan S.Yu., Nazaretyan S.N., Amirbekyan V.S. Seismic protection and its organization, Gyumri, “Eldorado” 2004, 436.
 
[17]  Gogmachadze S.A., Zaalishvili Z.V., Otinashvili M.G., Shengeliya N.V. Rating estimation of the urbanized territory for purposes of insurance. Theory of construction and seismic stability, IBM&S, GAS. Tbilisi, 2003, 3, 46-54.
 
[18]  OpenGIS® Web Map Server Implementation Specification. Version: 1.3.0. OpenGIS® Implementation Specification. OGC® 06-042. Ed. Jeff de la Beaujardiere. Date: 2006-03-15, 2006, 85. URL: http://portal.opengeospatial.org/files/?artifact_id=14416
 
[19]  Styled Layer Descriptor profile of the Web Map Service Implementation Specification. Version: 1.1.0 (revision 4). OGC® Implementation Specification OGC 05-078r4. Ed. Dr. Markus Lupp. Date: 2007-06-29, 2007, 53. URL: http://portal.opengeospatial.org/files/?artifact_id=22364.
 
Show Less References

Article

Decision Making Problem in Division of Cognitive Labor with Parameter Inaccuracy: Case Studies

1School of Information Science and Engineering, Central South University, Changsha, Hunan, P.R. China


American Journal of Information Systems. 2014, 2(1), 6-10
DOI: 10.12691/ajis-2-1-2
Copyright © 2013 Science and Education Publishing

Cite this paper:
Jin Huan Zhang, Khin War War Htike, Ammar Oad, Hao Zhang. Decision Making Problem in Division of Cognitive Labor with Parameter Inaccuracy: Case Studies. American Journal of Information Systems. 2014; 2(1):6-10. doi: 10.12691/ajis-2-1-2.

Correspondence to: Hao  Zhang, School of Information Science and Engineering, Central South University, Changsha, Hunan, P.R. China. Email: hao@csu.edu.cn

Abstract

Scientific communities will be more effective for society if scientists effectively divide their cognitive labor. So one way to study how scientists divide their cognitive labor has become an important area of research in science. This problem was firstly discovered and studied by Kitcher. Later on, Kleinberg and Oren pointed out that the model proposed by Kitcher might not be realistic. We investigate the impact of the imprecise parameter in project selection results. In this paper, we further our study on this issue. We study the policy of decision making problem based on the modified division of cognitive labor model with the assumption that a scientist is aware of the existence of the imprecise parameters and provide the detailed analytical results. And we provide a decision rule to minimize the possible loss based on error probability estimation.

Keywords

References

[[[[[[[[[[[[[[[
[[1]  P. Kitcher, “The division of cognitive labor, journal of philosophy,” The Journal of Philosophy, vol. 87, no. 1, pp. 5-22, 1990.
 
[[2]  P. Kitcher, “The advancement of science,” New York: Oxford University Press, 1993.
 
[[3]  M. Strevens, “The role of the priority rule in science”, Journal of Philosophy, vol. 100, no. 2, pp. 55-79, 2003.
 
[[4]  M. Strevens, “The role of the matthew effect in science,” Studies in the History and Philosophy of Science, vol. 37, pp. 159-170, 2006.
 
[[5]  D. Gilbert, “Buried by bad decisions,” Nature, pp. 275-277, 2011.
 
Show More References
[6]  V. Bala and S. Goyal, “Learning from neighbours,” Review of Economic Studies, pp. 595-621, 1998.
 
[7]  DL.Rogier and G.Matthias, “Standards and distribution of cognitive labor,” Logic Journal of the IGPL, 2009.
 
[8]  J.Kleinberg and S.Oren, “Mechanisms for (mis)allocating scientific credit,” Proceedings of the 43rd annual ACM symposium on Theory of Computing, 2011.
 
[9]  M. Weisberg and R. Muldoon, “Epistemic landscapes and the division of cognitive labor,” Philosophy of Science, pp. 37:159-170, 2009.
 
[10]  K. J. Zollman, “The communication structure of epistemic communities,” Philosophy of Science, vol. 74(5), pp. 574-587, 2007.
 
[11]  K. J. Zollman, “The epistemic benefit of transient diveristy,” Erkenn, vol. 72, pp. 17-35, 2010.
 
[12]  Bala, Venkatesh and Sanjeev Goyal. "Learning from neighbours." Review of Economic Studies, pp. 595-621, 1988.
 
[13]  Banerjee, A. V. "A simple model of herd behavior." The Quarterly Journal of Economics, 107 (3), pp. 797-817, 1992.
 
[14]  Welch, I. "Sequential sales, learning, and cascades." The Journal of Finance, 47(2), pp. 695-732, 1992.
 
[15]  M. H. DeGroot. "Reaching a consensus." J. American Statistical Association, 69, 118-121, 1974.
 
[16]  B. Golub and M.O. Jackson. "Naive learning in social networks: Convergence, influence and the wisdon of crowds." American Econ. J.: Microeconomics, 2000.
 
[17]  P. M. DeMarzo, D. Vayanos and J. Zweibel. "Persuasion bias, social influence, and unidimensional opinions." Auarterly Journal of Economics, 118(3), 2003.
 
[18]  M. O. Jackson. "Social and Economic Networks." Princeton University Press, 2008.
 
[19]  R. Muldoon and M.Weisberg, “Robustness and idealization in models of cognitive labor synthese,” Synthese, vol. 183, pp. 161-174, 2011.
 
[20]  K. W. W. Htike and H. Zhang, “Theoretical study of division of cognitive labor with imprecise model parameters,” CSSS, pp. 4094-4097, 2012.
 
Show Less References

Article

Cloud Computing: A New Era in the Field of Information Technology Applications and its Services

1Department of Computer Science and Engineering, MIT Mandsaur, Mandsaur, India

2Department Master of Computer Application, MIT Mandsaur, Mandsaur, India


American Journal of Information Systems. 2014, 2(1), 1-5
DOI: 10.12691/ajis-2-1-1
Copyright © 2013 Science and Education Publishing

Cite this paper:
Anwar Mohd. Mansuri, Prithviraj Singh Rathore. Cloud Computing: A New Era in the Field of Information Technology Applications and its Services. American Journal of Information Systems. 2014; 2(1):1-5. doi: 10.12691/ajis-2-1-1.

Correspondence to: Anwar  Mohd. Mansuri, Department of Computer Science and Engineering, MIT Mandsaur, Mandsaur, India. Email: anwar.iter@gmail.com

Abstract

Cloud computing is the computing that provides virtualized IT resources as a service by using Internet technology. In cloud computing, a customer lends IT resources as needed, uses them, get a support of real-time scalability according to service load, and pays as he/she goes. Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. Cloud computing uses the Internet and central remote servers to maintain data and applications. As know that at present the e- ccommercee services opportunity to utilize pay-as-you-go resources together with their own and shared resource in the fields of IT. In this paper shows that the cloud computing plays an important role in the fields of Information Technology services and its applications and it is helpful to provide the data to the customer. The results show that the comparison of cloud services and normal services of Information Technology applications.

Keywords

References

[[[[[[[[[[[[[[[[[[[[[[[[
[[1]  Vaquero L. M., Rodero-Merino L, Caceres J., Lindner M. A break in the clouds: towards a cloud definition. In: ACM SIGCOMM, editor. Computer communication review 2009. New York: ACM Press; 2009. p. 50-5.
 
[[2]  Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing, 2009. http://www.ibm.com/developerswork/webspherezones/hipods/library. html.
 
[[3]  Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing (Draft). NIST. 2011. http://www.production scale.com/home/2011/8/7/the-nist-definition-of-cloud-Computingdraft.html#axz z1X0xKZRuf.
 
[[4]  Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing (v 2.1). Decemeber, 2009.
 
[[5]  VMware. Inc. Understanding full virtualization, paravirtualization and hardware assist. Technical report, VMware, 2007.
 
Show More References
[6]  Amazon. Amazon elastic compute cloud (Amazon EC2). 2009. http://aws.amazon.com/ec2/.
 
[7]  SANJAY GHEMAWAT; HOWARD GOBIOFF; PSHUN-TAK LEUNG. The Google file system. Proceedings of the nineteenth ACM symposium on Operating systems principles. Oct. 2003.
 
[8]  Aymerich, F. M. Fenu, G. Surcis, S. An approach to a Cloud Computing network. Applications of Digital Informationand Web Technologies, 2008.
 
[9]  Anderson NR, Lee ES, Brockenbrough JS, Minie ME, Fuller S, Brinkley J, et al. Issues in biomedical research data management and analysis: needs and barriers. JAMIA 2007; 14: 478-88.
 
[10]  Foster I, Kesselman C. Globus: a metacomputing infrastructure toolkit. Int J Supercomput Appl 1998; 11: 115-29.
 
[11]  Moore RW, Rajasekar A, Wan M. Data grids, digital libraries, and persistent archives: an integrated approach to sharing, publishing, and archiving data. Proc. IEEE 2005; 93: 578-88.
 
[12]  Iskold A. Reaching for the sky through the compute clouds. Availableat: http://www.readwriteweb.com/archives/searching_for_the_sky_through_compute_clouds.php.
 
[13]  Amazon Web Services Simple Monthly Calculator. Available at: http://calculator.s3.amazonaws.com/calc5.html.
 
[14]  D. Owens, Securing elasticity in the cloud, Communications of the ACM 53 (2010) 46-51.
 
[15]  P. Watson, A multi-level security model for partitioning work flows over federated clouds, in: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, 2011, pp. 180 -188.
 
[16]  Webhosting Unleashed (2008), ‘Cloud Computing Services ComparisonGuideavailableat, http://www.webhostingunleashed.com/whitepaper/cloud computing comparison.
 
[17]  Golden, B (2009), ‘The Cloud as Innovation Platform: Early Examples’availableat, http://www.nytimes.com/external/idg/2009/06/18/18idg the cloud as innovation platform early- Examples 24294. html.
 
[18]  Armbrust, M; Fox, A; Griffith, R; Joseph, AD; Katz, RH; Konwinski, A; Lee, G; Patterson, DA; Rabkin, A; Stoica, I & Zaharia, M (2009), ‘Above the Clouds: A Berkel ey View of CloudComputing’.TechnicalReporNo.,UCB/EECS2009availableat, http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS200928.html.
 
[19]  Challengers (2009), ‘Final Research Agenda on Core and Forward Looking Technologies’ available at http://challengers org.eu/index.php/Download document/5701.CHALLENGERS Research Agenda and Roadm FinalVersio January 2009.html.
 
[20]  Wikipedia, ‘CloudComputing’availableat, http://en.wikipedia.org/wiki/Cloud_computing.
 
[21]  Golden; B. (2009), ‘Capex vs. Opex: Most People Miss the Point AboutCloudEconomics’availableat, http://www.cio.com/article/484429/Capex_vs._Opex_Most_People_Miss_ the_Point_About_Cloud_Economics.
 
[22]  Fellows, W. (2009), ‘The State of Play: Grid, Utility, Cloud’ availableat http://old.ogfeurope.,eu/uploads/Industry%20Expert%20Group/FELLOWS_CloudscapeJan09WF.pdf.
 
[23]  DeCandia, G.; Hastorun, D.; Jampani, M.; Kakulapati, G.; Lakshman, A.; Pilchin, A.; Sivasubramanian, S.; Vosshall, P. & Vogels, W. (2007), ‘Dynamo: Amazon’s Highly Available KeyvalueStore’availableat, http://s3.amazonaws.com/AllThingsDistributed/sosp/amazondynamososp2007.pdf.
 
[24]  Amrhein, D. & Willenborg, R. (2009), ‘Cloud computing for the enterprise, Part 3: Using WebSphere CloudBurst to create private clouds’availableat http://www.ibm.com/,developerworks/websphere/techjournal/0906_amrhein/0906_amrhein.html.
 
[25]  CISCO, “Cisco Cloud Computing Data Center Strateg y, Architecture,andSolutions”, http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputing_WP.pdf.
 
[26]  Cloud Computing Use Cases White Paper, http://groups.google.com/group/cloud computing use cases.
 
[27]  D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Som an, L. Youseff, and D. Zagorodnov. Eucalyptus: A Technical Re- port on an Elastic Utility Computing Architecture Linking Your Programs to Useful Systems. Technical Report 2008-10, UCSBComputer Science, 2008.
 
[28]  C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machinesIn Proc. of NSDI’ 05, pages 273-286, Berkeley, CA, USA, 2005. USENIX Association.
 
[29]  yoob, I., Zarifoglu, E., Modh, M., Farooq, M. (2011) “Optimally Sourcing Services in Hybrid Cloud Environments”, US Patent Filed 13/373,162.
 
Show Less References

Article

A Survey on Multi Criteria Decision Making Methods and Its Applications

1Department of Banking Technology, Pondicherry University, Puducherry, India

2Department of Computer Science, Research and Development Centre, Bharathiyar University, Coimbatore, India


American Journal of Information Systems. 2013, 1(1), 31-43
DOI: 10.12691/ajis-1-1-5
Copyright © 2013 Science and Education Publishing

Cite this paper:
Martin Aruldoss, T. Miranda Lakshmi, V. Prasanna Venkatesan. A Survey on Multi Criteria Decision Making Methods and Its Applications. American Journal of Information Systems. 2013; 1(1):31-43. doi: 10.12691/ajis-1-1-5.

Correspondence to: Martin  Aruldoss, Department of Banking Technology, Pondicherry University, Puducherry, India. Email: jayamartin@yahoo.com, cudmartin@gmail.com

Abstract

Multi Criteria Decision Making (MCDM) provides strong decision making in domains where selection of best alternative is highly complex. This survey paper reviews the main streams of consideration in multi criteria decision making theory and practice in detail. The main purpose is to identify various applications and the approaches, and to suggest approaches which are most robustly and effectively useable to identify best alternative. This survey work also addresses the problem in fuzzy multi criteria decision making techniques. Multi criteria decision making have been applied in many domains. MCDM method helps to choose the best alternatives where many criteria have come into existence, the best one can be obtained by analyzing the different scope for the criteria, weights for the criteria and the choose the optimum ones using any multi criteria decision making techniques. This survey provides the comprehensive developments of various methods of FMCDM and its applications.

Keywords

References

[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[1]  Albayrak, E., Erensal, Y. C. (2005). “A study bank selection decision in Turkey using the extended fuzzy AHP method”. Proceeding of 35th International conference on computers and industrial engineering, Istanbul, Turkey.
 
[[2]  Albayrak, E., &Erensal, Y. C. (2005). A study bank selection decision in Turkey using the extended fuzzy AHP method. In 35th International conference on computers and industrial engineering, Istanbul, Turkey.
 
[[3]  Aldlaigan, A., & Buttle, F. A. (2002). SYSTRA-SQ: A new measure of bank service quality. International Journal of Service Industry Management, 13, 38-362.
 
[[4]  Aldlaigan, A.,Buttle, F.A.(2002). “A new measure of bank service quality”. International Journal of Service Industry Management, Vol. 13, pp. 38-362.
 
[[5]  Business Credits (2006). “Non-financial data can predict future profitability”. BusinessCredits, Vol 108, Nbr. (4), pp.57.
 
Show More References
[6]  Anderson, W., Jr., Cox, J. E. P., & Fulcher, D. (1976). Bank selection decisions and marketing segmentation. Journal of Marketing, 40(1), 40-45.
 
[7]  Anonymous (2006). Non-financial data can predict future profitability. Business Credits, 108(4), 57.
 
[8]  Nikoomaram.H, M.Mohammadi, M. JavadTaghipouria and Y. Taghipourian(2009). “Training Performance Evaluation of Administration Sciences Instructors by Fuzzy MCDM Approach”. Tehran, Iran.
 
[9]  Yusuf TanselIç, (2012) “Development of a credit limit allocation model for banks using an integrated Fuzzy TOPSIS and linear programming”. Expert System with Applications. Vol. 39(5), pp. 5309-5316.
 
[10]  Arshadi, N., & Lawrence, E. C. (1987). An empirical investigation of new bank performance. Journal of Banking and Finance, 11(1), 33-48.
 
[11]  Ashton, C. (1998). Balanced scorecard benefits Nat West Bank. International Journal of Retail and Distribution Management, 26(10), 400-407.
 
[12]  TuncayOzcan, NumanCelebi,(2011) “Comparative analysis of multi-criteria decision making methodologies and implementation of a warehouse location selection problem”. Vol. 38, pp.9773-9779.
 
[13]  Mohammad SaeedZaeri, Amir Sadeghi, Amir Naderi,etal.,(2011). “Application of multi criteria decision making technique to evaluation suppliers in supply chain management”, African Journal of Mathematics and Computer Science Research Vol. 4 (3), pp.100-106.
 
[14]  Athanassopoulos, A., & Giokas, D. (2000). On-going use of data envelopment analysis in banking institutions: evidence from the Commercial Bank of Greece. Interfaces, 30(2), 81-95.
 
[15]  Anjali Awasthia,∗, S.S. Chauhanb, S.K. Goyalb A multi-criteria decision making approach for location planning for urban distribution centers under uncertainty a CIISE, Concordia University, Montreal, Canada b Decision Sciences, JMSB, Concordia University, Montreal, Canada.
 
[16]  Schinas O.(2007) “Examining the use and application of Multi -Criteria DecisionMaking Techniques in Safety Assessment”, International Symposium on Maritime Safety, Security & Environmental Protection, Athens.
 
[17]  Anjali Awasthia, S.S. Chauhanb, S.K. Goyalb(2000). “A multi-criteria decision making approach for location planning for urban distribution centers under uncertainty” CIISE, Montreal, Canada.
 
[18]  Bauer, P. W., Berger, A. N., Ferrier, G. D., & Humphrey, D. B. (1998). Consistencyconditions for regulatory analysis of financial institutions: A comparison offrontier efficiency methods. Journal of Economic and Business, 50(2), 85-114.
 
[19]  Beccalli, A. (2007). Does IT investment improve bank performance? Evidence from Europe. Journal of Banking & Finance, 31, 2205-2230.
 
[20]  T.C. Chu, (2002) “Facility location selection using fuzzy TOPSIS under group decisions”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems Vol. 10 (6), pp. 687-701.
 
[21]  MahdiZarghami, FerencSzidarovszky(2011) “Revising the OWA operator for multi criteria decision making problems under uncertainty a Faculty of Civil Engineering ”, Tabriz 51666-16471, Iran.
 
[22]  Caballero, R., Cerda, E., Munoz, M.M., Rey, L., 2004. Stochastic approach versus multiobjective approach for obtaining efficient solutions in stochastic multiobjective programming problems. European Journal of Operational Research 158, 633-648.
 
[23]  Changchit, C., Terrell, M. P., 1993. A multi-objective reservoir operation model with stochastic inflows. Computers and Industrial Engineering 24 (2), 303-313.
 
[24]  DoraidDalalah, Mohammed Hayajneh, FarhanBatieha,(2011) .“A fuzzy multi-criteria decision making model for supplier selection”, Expert Systems with Applications Vol. 38, pp. 8384-8391.
 
[25]  Yong-Sheng Ding, Zhi-HuaHu, Wen-Bin Zhang,(2011). “ Multi-criteria decision making approach based on immune co-evolutionary algorithm with application to garment matching problem”, Expert Systems with Applications Vol. 38, pp.10377-10383.
 
[26]  Chen, C. W. E., 2000. Extensions of the TOPSIS for group decision-making under fuzzy environment. Fuzzy Sets and Systems 114, 1-9.
 
[27]  Chen, S. J., Hwang, C. L., 1991. Fuzzy Multiple Attribute Decision making. Springer- Verlag, Berlin.
 
[28]  Yi Peng, Yong Zhang, Yu Tang, Shiming Li, (2011). “An incident information management framework based on data integration, datamining, and multi-criteria decision making ”, Decision Support Systems Vol. 51, pp.316-327.
 
[29]  MehtapDursun, E. ErtugrulKarsak,MelisAlmulaKaradayi,(2011). “Assessment of health-care waste treatment alternatives using fuzzymulti-criteria decision making approaches”, Expert Systems with Applications Vol. 38, pp.10377-10383.
 
[30]  H. Nikoomaram1*, M. Mohammadi 1, M. Javad Taghipourian1 and Y. Taghipourian 2 .Training Performance Evaluation of Administration. Sciences Instructors by Fuzzy MCDM Approach. Department of AccountingIslamic Azad University-Science and Research Branch, Tehran, Iran Department of Accounting, Islamic Azad University - Chalous, Tehran, Iran.
 
[31]  Hung-Yi Wua,*, Gwo-HshiungTzenga, b, Yi-Hsuan Chen c. A fuzzy MCDM approach for evaluating banking performance based on Balanced Scorecard a Department of Business and Entrepreneurial Management, Kainan University, No. 1, Kainan Road, Luchu, Taoyuan 338, Taiwan.
 
[32]  SaharRezaiana, Seyed Ali Joziba,(2012) “Health- Safety and Environmental Risk Assessment of Refineries Using of Multi Criteria Decision Making Method”, APCBEE Procedia Vol.3 , pp. 235-238.
 
[33]  KeivanSadeghzadeh, Mohammad BagherSalehi (2011). “Mathematical analysis of fuel cell strategic technologies development solutions in the automotive industry by the TOPSIS multi-criteria decision making method” , International journal of hydrogen energy Vol. 3 6, pp.13272-13280.
 
[34]  MaherAburrous,*, M.A. Hossain a, KeshavDahal a, FadiThabtahb. Intelligent phishing detection system for e-banking using fuzzy data mining .Department of Computing University of Bradford, Bradford, UK. MIS Department Philadelphia University Amman, Jordan.
 
[35]  MahdiZarghami *, FerencSzidarovszky. Revising the OWA operator for multi criteria decision making problems under uncertainty a Faculty of Civil Engineering, University of Tabriz, Tabriz 51666-16471, Iran. b Systems and Industrial Engineering Department, University of Arizona, Tucson, AZ 85721-0020, USA.
 
[36]  Hung-Yi Wua, Gwo-HshiungTzenga,b, Yi-Hsuan Chen c(2011). “A fuzzy MCDM approach for evaluating banking performance based on Balanced Scorecard”, Taiwan.
 
[37]  Nese YalcınSecme, Ali Bayrakdaroglu, CengizKahramanb, (2007). “Fuzzy performance evaluation in Turkish Banking Sector using AnalyticHierarchy Process and TOPSIS”. Expert Systems with Applications, Vol. 36, pp.11699-11709.
 
[38]  Mohammad Saeed Zaeri*, Amir Sadeghi, Amir Naderi. Application of multicriteriadecisionmakingtechniqueto evaluation suppliersinsupplychain management. Department of Industrial Engineering, Islamic Azad University (KarajBranch), Tehran, Iran. Department of Management Information Technology, FarabiInstitute of Higher Education, Iran.
 
[39]  Nes_eYalcınSecme a,*, Ali Bayrakdarog˘lu a, CengizKahramanb Fuzzy performance evaluation in Turkish Banking Sector using Analytic Hierarchy Process and TOPSIS. a Department of Business Administration, Nevs_ehir University, 50300 Nevs_ehir, Turkey . Institute of Management of Technology, National Chiao-Tung University, 1001 Ta-Hsueh Road, Hsinchu 300, Taiwan Division of Global Purchasing, JI-EE Industry Co., Ltd., No. 498, Sec. 2, Bentian St., An Nan Dist., Tainan 709, Taiwan.
 
[40]  Ashton, C. (1998). “Balanced scorecard benefits Nat West Bank”. International Journal of Retail and Distribution Management, Vol. 26(10), pp.400-407.
 
[41]  Tsai, W. H., Yang, C. C., Leu, J. D., Lee, Y. F., & Yang, C. H. (2001). “An Integrated Group Decision Making Support Model for Corporate Financing Decisions”. Group Decision and Negotiation, 1-25.C.T. Chen, A fuzzy approach to select the location of the distribution center, Fuzzy Sets and Systems ,Vol. 118 , pp. 65-73.
 
[42]  Oresti Schinas ,Assistant Professor of Maritime Studies, Frederick University of Cyprus, Limassol, Cyprus .Examining the use and application of Multi-Criteria Decision Making Techniques in Safety Assessment and CEO, Transmart Consulting, Athens, Greece ,schinaso@transmartconsulting.gr.
 
[43]  C.T. Chen, A fuzzy approach to select the location of the distribution center, Fuzzy Sets and Systems 118 (2001) 65-73.
 
[44]  S.Y. Chou, Y.H. Chang, C.Y. Shen, (2008). “A fuzzy simple additive weighting system under group decision making for facility location selection with objective/subjective attributes”, European Journal of Operational Research Vol. 189 (1) 132-145.
 
[45]  Avijit Mazumdar (2010) “Application of multi-criteria decision Making (MCDM) approaches on teachers Performance evaluation and appraisal”.
 
[46]  S.Y. Chou, Y. H. Chang, C. Y. Shen, A fuzzy simple additive weighting system under group decision making for facility location selection with objective/subjective attributes, European Journal of Operational Research 189 (1) (2008) 132-145.
 
[47]  T.C. Chu, Facility location selection using fuzzy TOPSIS under group decisions, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (6) (2002) 687-701.
 
[48]  Chen, C.W.E.,( 2000). “Extensions of the TOPSIS for group decision-making under fuzzy environment”. Fuzzy Sets and Systems vol. 114, pp.1-9.
 
[49]  RabahMedjoudj, DjamilAissan, Klaus Dieter Haim, (2013).” Power customer satisfaction and profitability analysis using multi-criteria decision making methods”,Electrical Power and Energy Systems Vol. 45 , pp.331-339.
 
[50]  Kuo-Liang Lee, Shu-Chen Lin, A fuzzy quantified SWOT procedure for environmental evaluation of an international distribution center, Information Sciences 178 (2) (2008) 531-549.
 
[51]  J.J. Buckley, Ranking alternatives using fuzzy numbers, Fuzzy Sets Systems 15 (1) (1985) 21-31.
 
[52]  V. Lakshmana Gomathi Nayagam, S. Murali krishnan , Geetha Sivaraman,(2011). “Multi-criteria decision-making method based on interval-valued intuitionistic fuzzy sets”, pp.1464-1467.
 
[53]  H.C.W. Lau, Christina W.Y. Wong,, P.K.H. Lau, K.F. Pun, B. Jiang, K.S. Chin (2003) “A fuzzy multi-criteria decision support procedure for enhancing information delivery in extended enterprise networks.”,Vol.16,pp.1-9.
 
[54]  Teghem, J., Dufrane, D., Thauvoye, M., Kunsch, P., 1986. STRANGE: An interactive method for multi-objective linear programming under uncertainty. European Journal of Operational Research 26, 65-82.
 
[55]  Torra, V., Godo, L., 1997. Averaging continuous distributions with the WOWA operator. In: Proceedings of EFDAN’ 97, Dortmund, Germany.
 
[56]  Shu-Hsien Liao, and Kuo-Chung Lu (2002), “Evaluating Anti-Armor Weapon Using Ranking Fuzzy Numbers”, Vol. 11(1), pp.33-48.
 
[57]  Mahammad Haghighi, Ali Divandari, Masoud Keimasi(2010) “The impact of 3D e-readiness on e-banking development in Iran: A fuzzy AHP analysis.” Vol. (37), Issue 6, pp.4084-4093.
 
[58]  Torra, V., Narukawa, Y., 2007. Modeling Decisions: Information Fusion and Aggregation Operators. Springer, Berlin.
 
[59]  YusufTansel _Iç. Development of a credit limit allocation model for banks using an integrated Fuzzy. TOPSIS and linear programming.Department of Industrial Engineering, Faculty of Engineering, Baskent University, 06810 Baglica, Etimesgut, Ankara, Turkey.
 
[60]  Anderson, W., Jr., Cox, J. E. P., &Fulcher, D. (1976). “Bank selection decisions and marketing segmentation”. Journal of Marketing, Vol. 40(1), pp. 40-45.
 
[61]  Arshadi, N., Lawrence, E. C. (1987). “An empirical investigation of new bank performance”. Journal of Banking and Finance, Vol. 11(1), pp.33-48.
 
[62]  Ashton, C. (1998). “Balanced scorecard benefits Nat West Bank”. International Journal of Retail and Distribution Management, Vol. 26(10), pp.400-407.
 
[63]  Athanassopoulos, Giokas, D. (2000). “On-going use of data envelopment analysis in banking institutions”. Evidence from the Commercial Bank of Greece. Interfaces, Vol. 30(2), pp.81-95.
 
[64]  Bauer, P. W., Berger, A. N., Ferrier, G. D., & Humphrey, D. B. (1998). “Consistency conditions for regulatory analysis of financial institutions”: A comparison of frontier efficiency methods. Journal of Economic and Business, Vol. 50(2), pp.85-114.
 
[65]  Beccalli, A. (2007). “Does IT investment improve bank performance? Evidence from Europe”. Journal of Banking & Finance, Vol. 31, pp.2205-2230.
 
[66]  Caballero, R., Cerda, E., Munoz, M.M., Rey, L., (2004). “Stochastic approach versus multi objective approach for obtaining efficient solutions in stochastic multi objective programming problems”. European Journal of Operational Research 158, pp.633-648.
 
[67]  Changchit, C., Terrell, M.P., (1993).“A multi-objective reservoir operation model with stochastic inflows”. Computers and Industrial Engineering Vol. 24 (2), pp.303-313.
 
[68]  Chen, S.J., Hwang, C.L., (1991). “Fuzzy Multiple Attribute Decision making”. Springer- Verlag, Berlin.
 
[69]  MaherAburrous, M.A. Hossain, Keshav Dahal, FadiThabtah(2008). “Intelligent phishing detection system for e-banking using fuzzy data mining “. Jordan.
 
[70]  Kuo-Liang Lee, Shu-Chen Lin, (2008) “A fuzzy quantified SWOT procedure for environmental evaluation of an international distribution centre”, Information Sciences Vol. 178 (2), pp.531-549.
 
[71]  J.J. Buckley, (1985). “Ranking alternatives using fuzzy numbers”, Fuzzy Sets Systems Vol. 15 (1), pp. 21-31.
 
[72]  Torra, V., Godo, L., (1997). “Averaging continuous distributions with the WOWA operator”. EFDAN’ 97, Germany.
 
[73]  Torra, V., Narukawa, Y., (2007). “Modelling Decisions: Information Fusion and Aggregation Operators”. Springer, Berlin.
 
[74]  Yusuf TanselIç, (2012) “Development of a credit limit allocation model for banks using an integrated Fuzzy TOPSIS and linear programming”. Expert System with Applications. Vol. 39(5), pp. 5309-5316.
 
[75]  ErgünEraslan, Yusuf TanselIç, (2011). “A Multi-Criteria Approach for Determination of Investment Regions: Turkish Case”. Industrial Management and Data Systems Vol. 111(6).
 
[76]  Yusuf TanselIç, Mustafa Yurdakul,(2010). “Development of a quick credibility scoring decision support system using fuzzy TOPSIS”. Expert Systems with Applications Vol. 37(1), pp. 567-574.
 
Show Less References

Article

Adapt Clustering Methods for Arabic Documents

1Computer science and Information Technology Department, Mazoon College, “University College”, Muscat, Sultanate of Oman


American Journal of Information Systems. 2013, 1(1), 26-30
DOI: 10.12691/ajis-1-1-4
Copyright © 2013 Science and Education Publishing

Cite this paper:
Boumedyen Shannaq. Adapt Clustering Methods for Arabic Documents. American Journal of Information Systems. 2013; 1(1):26-30. doi: 10.12691/ajis-1-1-4.

Correspondence to: Boumedyen  Shannaq, Computer science and Information Technology Department, Mazoon College, “University College”, Muscat, Sultanate of Oman. Email: aboumedyen@gmail.com

Abstract

This research paper develops new clustering method (FWC) and further proposes a new approach to filtering data collected from internet resources. The focus of this research paper is clustering groups’ data instances into subsets in such a manner that similar instances are grouped together, while different instances belong to different groups. The instances are thereby organized into an efficient representation that characterizes the population being sampled thereby reducing the gigantic size of retrieved data. This has been done by removing dissimilar text files, and grouping similar documents into homogeneous clusters. Arabic text files of 974 MB has been collected, processed, analyzed and filtered by using common clustering methods. This new clustering methods are presented, divided into: hierarchical, partitioning, density-based, model-based and soft-computing methods. Following the methods, the challenges of performing clustering in large data sets are discussed and tested by the proposed new clustering method. Two experiments were conducted to establish the effectiveness of FWC methods and the obtained results show that the new FCW method suggested in this paper produced better results and outperformed existing clustering methods.

Keywords

References

[[[[[[[[[[[[[
[[1]  Allen J., Aslam J., Belkin N., Buckley C., CallanJ.,“Challenges in information retrieval and language modeling”, Special Interest Group on Information Retrieval(SIGIR), Vol 37,No. 1, pp. 31-47, 2003.
 
[[2]  Shannaq B., Aleksandrov V.,“ Clustering the Arabic Documents(CAD)”, Universal Journal of Applied computer Science and Technology (UNIASCIT), Vol. 1 No. 3, pp. 90-94, 2011.
 
[[3]  Araujo M.,Navarro G., Zivani N.,“ Large text searching allowing errors”, 4th South American Workshop on String Processing (WSP '97), pp. 2-24, 1997.
 
[[4]  Allan J.,Carterette B., LewisJ., “When will information retrieval be “good enough?”, Proceedings of the ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 443-440, 2005.
 
[[5]  Shannaq B., “ Using Russian and English Ontology In Expanding The Arabic Query”, Universal Journal of Applied computer Science and Technology (UNIASCIT ), Vol. 1 No. 3,pp. 95-100, 2011.
 
Show More References
[6]  Shannaq B., Aleksandrov V., “Using Product Similarity for Adding BusinessValue and Returning Customers” , Global Journal of Computer Science and Technology, Vol. 10, No. 12. pp. 2-8, 2010.
 
[7]  MorleyD., Parker C., “Understanding Computers Today and Tomorrow Comprehensive” 13th edition, 2010.
 
[8]  Shaw W., Burgin R., Howell P., “Performance standards and evaluations in IR test collections: Cluster-based retrieval models”. Information Processing and Management, Vol. 33, No. 1, pp. 1-14, 1997.
 
[9]  Baeza R., Ribeiro B., “Modren Information Retrieval”, ACM Press, New York, 1999.
 
[10]  Mason, Oliver, Berglund, Ylva, “Low-level parameters reflecting the naturalness of texts”. Proceedings of JADT2002, 6th International Conference on Textual Data Statistical Analysis, Saint Malo, March 13-15. Vol.2, pp. 507-516, 2002.
 
[11]  Giinther R., Levitin L., Chapiro B., Wagner P.,“Zipf's law and the act of ranking on probability distributions”, International Journal of Theoretical Physics, Vol. 35, pp. 395-417, 1996.
 
[12]  Shannaq, Boumedyen. “Investigating the Distribution of Arabic and English Keywords and Their Progress Over Different Text File Formats”. American Journal of Computing Research Repository 1.1 (2013): 1-5.
 
[13]  Kokorin P.,Shannaq B., “Algorithm of Normalization and Ontological Clusters Texts”, Information-measuring and operating systems Journal, Vol. 7, No. 8,pp 60-64, 2010.
 
[14]  Shannaq B., Aleksandrov V., “Super Arabic Morphological Analyzer (SAMA1)”, information-measuring and operating systems Journal, Vol.11, No. 7,pp. 60-63, 2009.
 
[15]  Witten H., Frank E., “Data Mining & Practical Machine Learning Tools and Techniques”,Elsevier,2005.
 
[16]  Giudici P., “Applied Data Mining, Staistical Methods for Business and Industry”, Wiley,England, 2003.
 
[17]  Boumedyen Shannaq,“Methods and Algorithms for Searching Arabic Name Entity”, International Journal of Computer Applications, Vol.82 - Number 8, 2013.
 
[18]  Boumedyen Shannaq, Kaneez Fatima, “Hierarchy Concept Analysis in Accounting Ontology”, Asian Journal Of Computer Science And Information Technology, Vol.2: 2, 2012 13-20.
 
Show Less References

Article

Sindhi Academic Informatic Portal

1Institute of Information and communication Technology, University of Sindh, Jamshoro


American Journal of Information Systems. 2013, 1(1), 21-25
DOI: 10.12691/ajis-1-1-3
Copyright © 2013 Science and Education Publishing

Cite this paper:
Zeeshan Bhatti, Dil Nawaz Hakro, Aamir Ali Jarwar. Sindhi Academic Informatic Portal. American Journal of Information Systems. 2013; 1(1):21-25. doi: 10.12691/ajis-1-1-3.

Correspondence to: Zeeshan  Bhatti, Institute of Information and communication Technology, University of Sindh, Jamshoro. Email: zeeshan.bhatti@usindh.edu.pk

Abstract

The Information and Communication Technology has been an integral part of development of any country. Sindhi Academic Informatics Portal plays a very important vital role in this context for Sindhi Speaking community. Our country is in the phase of economic development process; therefore it badly needs to build software market for the Sindhi users. The development of software products, which fulfill the Sindhi people requirements in the form of community while sharing ideas, pictures, knowledge, creative content, etc. are extremely essential and high in demand. The idea of developing this type of software can be building block of Sindhi Language revolution and it leads towards the Sindhi peoples. This academic web portal system is based on three tier architecture and follows the principle design features of Content Management System for the server side. This software is developed in PHP, JavaScript, Adobe Flash CS3, HTML, Ajax and MySQL, compatible with all operating system. The main object of this system is to provide a generalized academic and management based knowledge sharing of department to Sindhi students on the internet.

Keywords

References

[[[[[
[[1]  Wikipedia, “Web Portal” retrieved on ; December, 2012, URL: http://en.wikipedia.org/wiki/Web_portal.
 
[[2]  Luca, V., Epicoco, I., Lezzi, D., and Aloisio, G., A web API framework for developing grid portals, procedia computer science 4, pp. 392-401, 2011.
 
[[3]  Bringula, R., Influence of faculty- and web portal design- related factors on web portal usability: A hierarchical regression analysis, computer & education 68, pp. 187-198, 2013.
 
[[4]  Hassan, Y. F. (2013) “Cellular Automata For Adaptive Web Portal Structure In Egyptian Universities”.International Journal of Engineering Sciences & Emerging Technologies, Volume 6, Issue 2, pp: 133-141.
 
[[5]  Liu, S. (2008). Engaging users: the future of academic library web sites.College & Research Libraries, 69(1), 6-27.
 
Show More References
[6]  Brantley, S., Armstrong, A., & Lewis, K. M. (2006). Usability testing of a customizable library web portal. College & Research Libraries, 67(2), 146-163.
 
[7]  Lin, C. S., Wu, S., & Tsai, R. J. (2005). Integrating perceived playfulness into expectation-confirmation model for web portal context. Information & Management, 42(5), 683-693.
 
[8]  Gant, J. P., & Gant, D. B. (2002, January). Web portal functionality and State government E-service. In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on (pp. 1627-1636). IEEE.
 
[9]  Wikipedia, “Unified Modeling Language” retrieved on December, 2012, URL: http://en.wikipedia.org/wiki/Unified_Modeling_Language.
 
[10]  Wikipedia, “Iterative and incremental development”, retrieved on; December, 2012, URL: http://en.wikipedia.org/wiki/Iterative_and_incremental_development.
 
Show Less References

Article

Analyse the Risks of Ad Hoc Programming in Web Development and Develop a Metrics of Appropriate Tools

1The University of Northampton, Northampton, United Kingdom


American Journal of Information Systems. 2013, 1(1), 9-20
DOI: 10.12691/ajis-1-1-2
Copyright © 2013 Science and Education Publishing

Cite this paper:
Manish Gubhaju, Ali Al-Sherbaz. Analyse the Risks of Ad Hoc Programming in Web Development and Develop a Metrics of Appropriate Tools. American Journal of Information Systems. 2013; 1(1):9-20. doi: 10.12691/ajis-1-1-2.

Correspondence to: Manish  Gubhaju, The University of Northampton, Northampton, United Kingdom. Email: manishgubaju@hotmail.com

Abstract

Today the World Wide Web has become one of the most powerful tools for business promotion and social networking. As the use of websites and web applications to promote the businesses has increased drastically over the past few years, the complexity of managing them and protecting them from security threats has become a complicated task for the organizations. On the other hand, most of the web projects are at risk and less secure due to lack of quality programming. Although there are plenty of frameworks available for free in the market to improve the quality of programming, most of the programmers use ad hoc programming rather than using frameworks which could save their time and repeated work. The research identifies the different frameworks in PHP and .NET programming, and evaluates their benefits and drawbacks in the web application development. The research aims to help web development companies to minimize the risks involved in developing large web projects and develop a metrics of appropriate frameworks to be used for the specific projects. The study examined the way web applications were developed in different software companies and the advantages of using frameworks while developing them. The findings of the results show that it was not only the experience of developers that motivated them to use frameworks. The major conclusions and recommendations drawn from this research were that the main reasons behind web developers avoiding frameworks are that they are difficult to learn and implement. Also, the motivations factors for programmers towards using frameworks were self-efficiency, habit of learning new things and awareness about the benefits of frameworks. The research recommended companies to use appropriate frameworks to protect their projects against security threats like SQL injection and RSS injection.

Keywords

References

[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[1]  Shah, D. N. (2009) A Complete Guide to Internet and Web Programming. New Delhi: Dreamtech Press.
 
[[2]  Kappel, G., Prill, B., Reich, S. and Retschitzegger, W. (2006) Web engineering: the discipline of systematic development of web applications. Chichester: John Wiley and Sons, Ltd.
 
[[3]  Lu, M.T. and Yeung, W.l. (1998) A framework for effective commercial Web application development. Internet Research: Electronic Networking Applications and Policy. 8 (2), 166-73.
 
[[4]  Henney, K. (2010) 97 Things Every Programmer Should Know [e-book] Sebastopol: O'Reilly Media. Available from: University of Northampton website <http://www.northampton.ac.uk> [Accessed 5th August 2011].
 
[[5]  Kappel, G., Prill, B., Reich, S. and Retschitzegger, W. (2006) Web engineering: the discipline of systematic development of web applications. Chichester: John Wiley and Sons, Ltd.
 
Show More References
[6]  Todd, S. (1999) A guide to the Internet and World Wide Web. Structural Survey. 17 (1), 36-41.
 
[7]  Ingram, P. (1996) Web developments and the Internet. Computers and Geosciences. 22 (5), 579-84.
 
[8]  Gralla, P. (1998) How the Internet works. 4th ed. Indianapolis: Que Corporation.
 
[9]  Banks, M. (2005) OCR AS GCE Applied ICT Double Award. Oxford: Heinemann Educational Publishers.
 
[10]  Camilleri, M. and Sollars, V. (2003) Information and communication technologies and young language learners. Kapfenberg: Council of Europe Publishing.
 
[11]  Severdia, R. and Crowder, K. (2009) Using Joomla: Building Powerful and Efficient Web Sites. Sebastopol: O'Reilly Media.
 
[12]  Bari, A. and Syam, A. (2008) CakePHP Application Development. Birmingham: Packt Publishing.
 
[13]  Vaswani, V. (2010) Zend Framework, A Beginner's Guide. New York: McGraw-Hill Companies.
 
[14]  Coggeshall, J. and Tocker, M. (2009) Zend Enterprise PHP Patterns. New York: Springer-Verlag.
 
[15]  Taft, D.K. (2005) Zend delivers PHP Intelligence. eWeek. 22 (3), 30.
 
[16]  Thomas, M. (2008) Professional CodeIgniter. Indianapolis: Wiley Publishing, Inc.
 
[17]  Argudo, J. and Upton, D. (2009) CodeIgniter 1.7. Birmingham: Packt Publishing.
 
[18]  Iglesias, M. (2011) CakePHP 1.3 Application Development Cookbook. Birmingham: Packt Publishing.
 
[19]  Golding, D. (2008) Beginning CakePHP: From Novice to Professional. New York: Springer-Verlag.
 
[20]  Freeman, A. and Sanderson, S. (2009) Pro ASP.NET MVC 3 Framework. New York: Springer Science Business Media.
 
[21]  Walther, S. (2010) ASP.NET MVC Framework Unleashed. New York: Pearson Education, Inc.
 
[22]  Bella, L.L. (2011) Careers in Web Development. New York: The Rosen Publishing Group.
 
[23]  Schwabe, D., Rossi, G., Esmeraldo, L. and Lyardet, F. (2001) Web Design Frameworks: An Approach to Improve Reuse in Web Applications. Web Engineering 2000. 2016 (10), 335-52.
 
[24]  Hasan, S.S. and Issac, R.K. (2011) An integrated approach of MAS-CommonKADS, Model–View–Controller and web application optimization strategies for web-based expert system development. Expert Systems with Applications. 38 (1), 417-28.
 
[25]  Khare, R. (2006) Network Security and Ethical Hacking. Beckington: Luniver Press.
 
[26]  Clarke, J. (2010) Web Application Security. New York: Springer-Verlag.
 
[27]  Softcov (2008) Softcov [online] Available from: http://www.softcov.com/programming-and-testing/advantages-and-disadvantages-of-several-major.html [Accessed 29th October 2011].
 
[28]  Trejder (2010) Advantages and Disadvantages of Framework Programming - Yii Framework Forum [online] Available from: http://www.yiiframework.com/forum/index.php?/topic/14300-advantages-and-disadvantages-of-framework-programming/ [Accessed 29th October 2011].
 
[29]  Feathers, M.C. (2005) Working Effectively with Legacy Code. New Jersey: Pearson Education.
 
[30]  Sinnott, R.O. (1998) Frameworks: the future of formal software development?. Computer Standards and Interfaces. 19 (7), 375-385.
 
[31]  Dawson, C.W. (2005) Projects in Computing and Information Systems. Harlow: Pearson Education Limited.
 
[32]  Ghauri, P. and Gronhaug, K. (2010) Research Methods in Business Studies. Harlow: Pearson Education Limited.
 
[33]  Saunders, M., Lewis, P. and Thornhill, A. (2003) Research Methods for Business Students. Harlow: Pearson Education Limited.
 
[34]  Lodico, M.G., Spaulding, D.T. and Voegtle, K.H. (2010) Methods in Educational Research: From Theory to Practice. 2nd ed. San Francisco: Jossey-Bass.
 
[35]  Thomas, R.M. (2003) Blending qualitative and quantitative research methods in theses and dissertations. California: Corwin Press.
 
[36]  Golafshani, N. (2003) Understanding Reliability and Validity in Qualitative Research. The Qualitative Report. 8 (4), 597-607.
 
Show Less References

Article

Citation of Court Cases with Shift-Or Pattern Matching

1Department of Computer Science, Federal University of Technology, Akure, Nigeria


American Journal of Information Systems. 2013, 1(1), 1-8
DOI: 10.12691/ajis-1-1-1
Copyright © 2013 Science and Education Publishing

Cite this paper:
Omisore O. M., Samuel O. W. Citation of Court Cases with Shift-Or Pattern Matching. American Journal of Information Systems. 2013; 1(1):1-8. doi: 10.12691/ajis-1-1-1.

Correspondence to: Omisore O. M., Department of Computer Science, Federal University of Technology, Akure, Nigeria. Email: ootsorewilly@gmail.com

Abstract

Parties often appear in law courts with cases that have festered for long periods of time at great expense. This makes judges to face the challenge of overcoming impasses that frequently occur during adjudication. In developing countries, reports on previous judgments are kept piece meal in file cabinets and thereby giving edge to manual citation of court cases. This citation form had posed a great deal of problem such as, lengthened period between the time a case is opened and when accurate judgment is delivered, in the administration of Law and Justice. The advent of digital computers has made the routine use of pattern-matching possible in various applications and has also stimulated the development of many algorithms. In this study, a model that adopts Shift-Or Pattern Matching technique is proposed for citing authorities during legal jurisdiction. The model is implemented on Windows Vista Home Premium and WAMP APACHE as the web server. Record of court cases decided upon in the Ondo State High Court (OSHC), Akure between 2000 and 2012 was used to evaluate the performance of the system.

Keywords

References

[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[1]  Omisore M. Olatunji and Samuel O. Williams, Design of Internet Model for Court Case Citation, Journal of Communication and Computer, “In Press”.
 
[[2]  Walker David, The Oxford Companion to Law, Oxford University Press, Pg. 301, 1980.
 
[[3]  Morton Denlow Breaking Impasses in Judicial Settlement Conferences: Seven (More) Techniques for Resolution, Court Review - The Journal of the American Judges Association, Vol 46, Issue 4, Pg 130-4, 2009.
 
[[4]  Morton Denlow, Breaking Impasses In Settlement Conferences: Five Techniques for Resolution, JUDGES’ J., Fall 2000.
 
[[5]  Fredric I. Lederer, Courtroom Technology from the Judge’s Perspective, Journal of the American Judges Association, American Judges Association Vol. 35, No. 1, Pg. 20-24, 1998.
 
Show More References
[6]  James A. Maher, National Center for State Courts, Do Video Transcripts Affect the Scope of Appellate Review? An Evaluation in the Kentucky Court of Appeals, 1990.
 
[7]  Jurgen Hollatz, Analogy Making in Legal Reasoning with Neural Networks and Fuzzy Logic, Artificial Intelligence and Law, Kluwer Academic Publishers, Netherlands, Vol. 7, Pg. 289-301, 1999.
 
[8]  Jack Rugh and Julia Lennen, Using Fuzzy Logic to Create Links: Resolving References to Court Decisions, Idea Alliance, Senior Publishing Specialist, Media and Publications Division, pg 1-14, 2003.
 
[9]  Hellyer Paul, Assessing the Influence of Computer-Assisted Legal Research, Law Library Journal, San Jose University, Vol. 97, No 2, Pg. 285-298, 2005.
 
[10]  Savory, S. E.,Artificial Intelligence and Expert Systems, Ellis Horword Series in Artificial Intelligence, Halsted Press, a division of Wiley, Chichester, England, pp. 28-29, August, 2006.
 
[11]  Samuel, O. W., Omisore, M. O., and Ojokoh, B. A., A Web Based Decision Support System Driven By Fuzzy Logic for the Diagnosis of Typhoid Fever, Expert Systems with Applications 40 (2013) 4164-4171.
 
[12]  Sheik, S., Aggarwal S., Poddar A., Balakrishnan N., and Sekar K., A FAST Pattern Matching Algorithm, J. Chem. Inf. Comput. Sci., Vol. 44, pp. 1251-1256, 2004.
 
[13]  Oladipupo B., Law Information System: Searching and Retrieval of Legal Materials, Computer Based Law Database on Compact Disc, Private Communications, 2001.
 
[14]  Irene Baghoomians and Frederick Schauer (2009), Thinking Like a Lawyer: A New Introduction to Legal Reasoning, Harvard University Press, Cambridge (Ma), pp239.
 
[15]  Akinyokun O. Charles, Computer Aided System for Monitoring and Citation of Court Cases, Law and Practice Journal; Nigerian Law School, Abuja, Nigeria, 2006.
 
[16]  Adegoke M. A. (2004), Development and Implementation of a Computer-Aided System for Monitoring and Citation of Court Cases, Master Thesis, Federal University of Technology, Akure.
 
[17]  Belkin N. J., Oddy R. N., and Brooks H. M. (1982), ASK for Information Retrieval: Background and Theory, Journal of Documentation, vol. 3 issue 8, Pg. 61-71.
 
[18]  Morten Hertzum, Henrik Soes, and Erik Frokaer, Information Retrieval Systems for Professionals: A Case Study of Computer Supported Legal Research, European Journal of Information Systems, vol. 2, No. 4, pp. 296-303, 1993.
 
[19]  Tenopir C, Full-Text Databases, Annual Review of Information Science and Technology vol .19, 215-246, 1984.
 
[20]  Foskett D J, Thesaurus. In Subject and Information Analysis (DYM E D, Ed.), pp. 270-316. Marcel Dekker, New York, 1985.
 
[21]  Harrington, supra note 1, at 546.
 
[22]  Lucille M. Ponle, Michigan Cyber Court - Bold Experiment in the Development of the First Public Virtual Courthouse, North Carolina Journal of Law and Technology, University of Michigan, Vol. 4, Issue:1, Pg: 51-60, 2002.
 
[23]  Samuel, O. W. and Omisore M. O., Hybrid Intelligent System for the Diagnosis of Typhoid Fever, Journal of Computer Engineering and Information Technology, Journal of Computer Engineering and Information Technology, vol. 2, issue 2, 2013.
 
[24]  Gwenn M. K., From the Internet to Court: Exercising Jurisdiction over World Wide Web Communications, Fordham Law Review, Vol. 65, No. 5, Article 8, Pg. 4-25, 1997.
 
[25]  Vidya SaiKrishna1, Akhtar Rasool, and Nilay Khare, String Matching and its Applications in Diversified Fields, International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, 1694-0814, 2012.
 
[26]  Knuth Donald, Morris James, and Pratt Vaughan, Fast Pattern Matching in Strings, SIAM J. COMPUT., Vol. 6, No. 2, 1977.
 
[27]  Maxime Crochemore and Thierry Lecroq, Pattern Matching and Text Compression Algorithms, Technical Report, Institut Gaspard Monge, Universite´ de Marne la Valle´e, 2 rue de la Butte Verte, F-93166 Noisy-le-Grand, Cedex, France.
 
[28]  Wu, S. and Manber, U., Fast Text Searching Allowing Errors, Communication of ACM, vol 35, Issue 10, pp. 83-91, 1992.
 
[29]  Baeza-Yates, R. A., Gonnet, G. H., A New Approach to Text Searching. Communication of ACM vol. 35, no. 10, pp. 74-82, 1992.
 
[30]  Robert G. Fuller and Laurie Ann Ulrich (2004), HTML in 10 Simple Steps or Less, Wiley Publishing, Inc, Indianapolis.
 
[31]  Danny Goodman, JavaScript Bible, 4th Edition, Hungry Minds Publishing Inc, Indianapolis (United States), 2001, pp. 3-4.
 
[32]  Greenspan Jay and Brad Bulger (2001), MySQL-PHP Database Applications, M&T Books Worldwide, Inc. New York, pp. 71-94
 
[33]  Maslakowski Mark and Butcher Tony (2000), Teach Yourself MySQL in 21 Days, Sams Publishing, New Jersey, United States.
 
[34]  Herlocker, J. L., J. A. Konstan, A. Borchers, and J. Riedl, An Algorithmic Framework for Performing Collaborative Filtering, In Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’99).
 
Show Less References