Over the years, abuse in women and children is rising due to several technological, social environment, and psychological factors, however, abuse reporting system with analytics is relatively adopted and unexplored in...
详细信息
ISBN:
(纸本)9781728107585
Over the years, abuse in women and children is rising due to several technological, social environment, and psychological factors, however, abuse reporting system with analytics is relatively adopted and unexplored in developing countries, such as the Philippines. This study aims to investigate user acceptance of abuse reporting system with analytics. This study used the Unified Theory of Acceptance and Use of technology, as a lens to understand user acceptance, through a survey conducted in the Philippines. Hypotheses are tested using multiple regression and relationships among the constructs. This study found that performance expectancy, effort expectancy, and facilitating condition have a significant positive influence to predict behavioral intention to use the abuse reporting system with analytics, while, social influence has no significant positive influence on behavioral intention to use the abuse reporting systems with analytics. The moderating role of gender was observed for the relationships between effort expectancy, social influence, and behavioral intention. On the other hand, gender does not affect the relationships between performance expectancy, facilitating condition, and behavioral intention to use the abuse reporting system with analytics. Moreover, the moderating role of age was observed for the relationships between performance expectancy, effort expectancy, facilitating condition, and behavioral intention. However, the relationship between social influence and behavioral intention was not moderated by age. Practical and research implications are presented.
Due to the advanced technology development, digital technology used in maximum area of day-to-day life of working which are being developed for advancing technology for humanity. Digital technology in terms of compute...
详细信息
ISBN:
(纸本)9781479916252
Due to the advanced technology development, digital technology used in maximum area of day-to-day life of working which are being developed for advancing technology for humanity. Digital technology in terms of computer system has become an important part in education system of teaching and learning process. All other teaching and learning process or methods used in educational system are under the influence of computer technology and become a integral part of day-to-day life. In this research, it is going to discuss method of teaching with the help of education technology and computer technology helps the students in improving learning skills of computer science and engineering students related to programming subjects.
With the progress of society and development of the economy, the quality of people's life is improving, and the high-tech computer information technology has also been widely promoted and applied. The application ...
详细信息
ISBN:
(纸本)9781538665800
With the progress of society and development of the economy, the quality of people's life is improving, and the high-tech computer information technology has also been widely promoted and applied. The application of BIM technology in the construction field has enabled the original construction project cost management to have breakthrough progress. This article first introduces the BIM technology briefly and then analyzes specific applications of BIM technology in the power engineering construction management. Practice proves that the application of BIM technology facilitates the visualization, integration, and automation of power engineering construction management, improves the efficiency of power engineering management greatly, reduces management costs, and has high application value.
This paper deals with a reliability optimization problem for a series system with multiple-choice and budget constraints. Choosing one technology for each subsystem and for maximizing the reliability of the whole syst...
详细信息
ISBN:
(纸本)9781467329453
This paper deals with a reliability optimization problem for a series system with multiple-choice and budget constraints. Choosing one technology for each subsystem and for maximizing the reliability of the whole system subject to the available budget, the optimization criteria are in used. We develop an efficient genetic algorithm hybridized with a local search step to solve the problem. In the approach, constructed solutions are not guaranteed to be feasible;accordingly, with use of an appropriate procedure, an infeasible solution is replaced by a feasible one. Through evaluating the proposed approach with the existing metaheuristic one which is available in the literature, the results show a better performance in computation for the algorithm which has been introduced here.
The campus management service system uses the Visual C++ 6.0 to design graphical interface, and encapsulate the products to ensure the confidentiality of technology. As the time of student to school and leave school i...
详细信息
ISBN:
(纸本)9781424455690
The campus management service system uses the Visual C++ 6.0 to design graphical interface, and encapsulate the products to ensure the confidentiality of technology. As the time of student to school and leave school is more focused, the instant messaging of the SMS is very large, so to use a variety of technologies to enhance the generation, processing, sending and receiving speed of the SMS, this system intends to use SQL Sever database storage process technology to complete the SMS generation, use Visual C++ 6.0 and JAVA multi-threading technology to achieve the development of client-side campus management service system and server-side SMS value-added service platform, to enhance the speed of sending and receiving SMS, prevent SMS clogging.
Government agencies always need innovative technology solutions to cope with changes and manage critical processes, especially in creating policies and decision-making to benefit the vulnerable members of society. To ...
详细信息
ISBN:
(纸本)9781728107585
Government agencies always need innovative technology solutions to cope with changes and manage critical processes, especially in creating policies and decision-making to benefit the vulnerable members of society. To address these needs, information technology solutions with analytics are introduced to government institutions. This study explores the user acceptance of information technology solution with analytics to aid in decision-making in the areas of children at risk, children in conflict with the law and violence against women. This study used the technology Acceptance Model in assessing the users' acceptance through a survey conducted among professionals working in a social welfare and development agency in the Philippines. Results show that several variables have significant relationships. Perceived usefulness and perceived ease of used plays an essential role in users' intentions to use predictive analytics. Further, self efficacy and facilitating condition positively influences perceived of usefulness and perceived ease of use, while technological complexity is not a significant factor to perceived usefulness. However, it positively influences the perceived ease of use. Overall, the respondents positively accept the predictive analytics on violence against women and children at risk. This work contributes by providing an understanding of user acceptance of innovation used in social welfare and development agency in the Philippines. Practical and research implications are presented.
Much research effort is being expended in an effort to develop new concepts that can be used to solve the problem of managing systems of systems. This paper shows that from an information and knowledge management pers...
详细信息
ISBN:
(纸本)0780373855
Much research effort is being expended in an effort to develop new concepts that can be used to solve the problem of managing systems of systems. This paper shows that from an information and knowledge management perspective the system and software life cycle (SLC) for a single system is a multi-phased time-ordered parallel-processing recursive paradigm that is little different from the uncoordinated ad-hoc evolution of a system of systems. Hence, after providing the necessary coordination, information and knowledge management based tools and techniques may be used to control the SLC of each of the individual systems in the system of systems as well as the system of systems itself.
Cooperative network coding is a new approach that can increase the performance of the wireless transmission system. By placing the intermediate nodes between the source and destination, the security and transmission r...
详细信息
ISBN:
(纸本)9781538678138
Cooperative network coding is a new approach that can increase the performance of the wireless transmission system. By placing the intermediate nodes between the source and destination, the security and transmission reliability can be boosted if compared with the direct transmission. In this paper, we will take a look at the details for the protocol design for the fourth generation wireless communication system. This paper first introduces the architecture of the possible coding scheme, for example two-ways, multiple accesses and multicast the three networks coded cooperative relay schemes and the performances of all these schemes are evaluated.
Local binary pattern (LBP) features have been used widely in texture extraction because of its simplicity and high accuracy. In this paper, LBP as feature extraction is proposed with a modification of Huffman rule to ...
详细信息
ISBN:
(纸本)9781728107585
Local binary pattern (LBP) features have been used widely in texture extraction because of its simplicity and high accuracy. In this paper, LBP as feature extraction is proposed with a modification of Huffman rule to enhance the feature extraction by handling the losing texture information from LBP in low resolution image. The wide dimension of feature is reduced by using the principal component analysis (PCA) method. Feature extraction is developed with aims to get the better feature of biometric representative and improve performance of palm print recognition. Extensive experiments are tested on two public databases, PolyU and CASIA database. The experimental results in low resolution image, show that this method has better palm print biometric representative for machine perspective and has the ability to improve the recognition performance with accuracy of 97.5 % (PolyU) and 92.5 % (CASIA).
Virtual database (VDB) makes external data, such as the World Wide Web, behave as an extension of an enterprise's relational database system. Virtual data is scattered across Web sites, file systems, database syst...
详细信息
ISBN:
(纸本)0818682892
Virtual database (VDB) makes external data, such as the World Wide Web, behave as an extension of an enterprise's relational database system. Virtual data is scattered across Web sites, file systems, database systems, and legacy applications. Junglee's VDB technology can fundamentally transform enterprise computing by providing a solution to this data scatter problem. VDB technology lets applications ask powerful queries of data that is scattered over a variety of data sources. The VDB gathers, structures and integrates the data from these disparate data sources and provides the application programmer with the appearance of a single, unified relational database system.
暂无评论