Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The application of business intelligence (BI) in data analytics helps organizations access critical information in finance, marketing, healthcare, retail, and other critical infrastructures. However, there is a dearth of strategies to... more
The application of business intelligence (BI) in data analytics helps organizations access critical information in finance, marketing, healthcare, retail, and other critical infrastructures. However, there is a dearth of strategies to effectively leverage BI to empower businesses to refine useful data, understand newer industry trends, and improve competitive intelligence strategy for effective decision-making. This study implemented predictive data analytics to determine how the subjective decision-making process of used dealerships conducts their sales of vehicles and other business variable decisions. Scouring over forty-five different aspects of typical vehicle items, the study randomly selected twelve (12) features considered important. The data points were classified on the machine learning algorithms using a Support Vector Machine (SVM) to find the hyperplane of the (N-dimensional) features number for the training supervision of the dataset, while the Contingency Table Method...
OBJECT-ORIENTED METHODS (Principles and Practices), New Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This textbook introduces the student to the basic concepts of... more
OBJECT-ORIENTED METHODS (Principles and Practices), New Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This textbook introduces the student to the basic concepts of object-oriented analysis and design. Use case modeling, class modeling and state modeling using common notations are covered. Completion of several exercises and a group project are required. The book also demonstrated the use of the concepts of abstraction, encapsulation, inheritance and aggregation in software development, the role of use cases in software development, the role of polymorphism and dynamic binding, determine suitable objects/classes and their relationships and draw a class diagram of a given problem, Identify states and state transitions and draw a state diagram for a given problem, construct sequence and collaboration diagrams for given use cases, assemble an activity diagram for a given OO problem solution, facilitate collaboratively within team environment a project with object oriented method goals and structure
This research examines the crises of attrition in the students’ population and study programs using descriptive statistics interpretation for solving social isolation for traditional face-to-face classroom education. The study used a... more
This research examines the crises of attrition in the students’ population and study programs using descriptive statistics interpretation for solving social isolation for traditional face-to-face classroom education. The study used a descriptive research design with ‘variable values’ to examine two-degree programs. The study used several testing methods to evaluate the statistical analysis of the social and academic characteristics of freshmen students in both the Informatics and Computer Science programs at the University of South Carolina Upstate from Fall 2018 to Fall 2019. The criterion variable was the student outcome (persistence or dropout), while the general structure matrix pattern was examined to validate the convergent factors. The methodology included a variance of the eigenfunction and values for interpreting the factor structure of the variable values. The findings suggest several mitigating factors which include improved persistence of “enrollment number, program deli...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at... more
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students support questions and answers can be requested directly from the author. Key features in this textbook include various security protocols and architecture definitions to understanding what Information Security and Assurance are. This book veered deeply into specifics of Network security in information processing and Management. This textbook teaches and focuses on the techniques, policies, operatio...
OBJECT-ORIENTED METHODS (A New Comprehensive Study). This is the Third Edition of the series with detailed updated topics. This textbook is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students.... more
OBJECT-ORIENTED METHODS (A New Comprehensive Study). This is the Third Edition of the series with detailed updated topics. This textbook is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This textbook introduces the student to the basic concepts of object-oriented Methodologies, Analysis and Design in clearer and simpler detail. Topics like Use case modeling, class modeling and state modeling using common notations are covered with clear simplicity. The book also demonstrated the use of the concepts of abstraction, encapsulation, inheritance and aggregation in software design and development, the role of use cases in software development, the role of polymorphism and dynamic binding, how to determine suitable objects/classes and their relationships and different class diagrams are included.
The number of vulnerability attacks and the ease with which an attack can be perpetrated have increased as the software industry and Internet use have grown. Researchers have discovered a lack of established procedures for analysis and... more
The number of vulnerability attacks and the ease with which an attack can be perpetrated have increased as the software industry and Internet use have grown. Researchers have discovered a lack of established procedures for analysis and collection of data errors generated during software development. Under such conditions, from a software developer’s perspective, the probability of releasing secured products may not be feasible, as vulnerabilities are likely to be discovered. Given the fact that there is no guaranteed vulnerability risk free software currently in existence, it is critical to understand vulnerability risks prediction and prevention measures. This study examines vulnerability risks using statistical predictive design measures based on software characteristics. The study tests the severity, frequency and diversity of vulnerability risks. Using a survey methodology to collect data from IT practitioners, and analyzing publicly available vulnerability risks information, pr...
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security... more
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and computer damage. In this dissertation, I examine the reasons users choose email client sites. The study begins with description of email clients and social networking sites which are part of web-based communication tools. This description is complemented by a survey of web-based communication tools to gain an understanding of the users' selection criteria, the types of human relationship information available, and how users made their choice of these communication tools. The computational problem of users' behavior in choosing the best web-based communication tool is to determine what prompted these users in their choice and why? I pre...
The increasing adoption of open source operating system (OS) platforms, such as Android and iOS, have opened up new security vulnerabilities and threats to mobile devices and other wireless access technologies. Recent statistics show that... more
The increasing adoption of open source operating system (OS) platforms, such as Android and iOS, have opened up new security vulnerabilities and threats to mobile devices and other wireless access technologies. Recent statistics show that mobile networks around the globe “generate exceedingly over 86 exabytes of traffic annually”. Thus, mobile security vulnerabilities and threats such as SMS spam, rogue apps, adware, malware, cyber-attacks and unlawful eavesdropping have become an ever-increasing problem for mobile users around the world. This paper proposes a quantitative research survey to investigate mobile device security and the implications of security application recommendations for its users. The objective is to identify increased security risks, and recommend best security practices for mobile users. To obtain quantitative values, webbased questionnaires using the Likert scale were used, and data processed by factor analysis, ANOVA and multiple regression analysis tabulated...
Network Systems Management, Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. The book started from the meaning of computer systems to understanding what Network systems and... more
Network Systems Management, Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. The book started from the meaning of computer systems to understanding what Network systems and security represents in information processing. This textbook teaches the TCP/IP Protocol Suite, TCP/IP Concept Example, Ports, Servers and Standards, types of Computer Network Systems Models- Peer to Peer and Client/Server Models. It discusses the Improved Internet Technologies and Client/Server Computer Network Model; the Classification Of Computer Networks, the hub, Router and network Switch are illustrated with diagrams. The book also highlights the General Benefits of Network Switching, how to replace a Central Hub with a Switch and design for maximum benefit. In addition, the use of Servers was examined. This textbook also examines the different Types of WLAN, WLAN standards,WPA2/802.11i, explains how the Metropolitan Area Network (MAN) as a com...
The success of consumer e-commerce is perhaps based on its attractions. Increasingly diversified products create even more reason for consumers to be attracted to online purchasing. However, the proliferation of e-commerce has created a... more
The success of consumer e-commerce is perhaps based on its attractions. Increasingly diversified products create even more reason for consumers to be attracted to online purchasing. However, the proliferation of e-commerce has created a dilemma in determinant factors that drive consumer decisions. Using a survey methodology (N = 125), this study examines the correlations of known “antecedents to consumer acceptance of online shopping” in the United Arab Emirates (UAE). A binary logistic regression analysis is performed to predict how consumer attitudes, perceptions of website quality, and gender influence consumer e-commerce intentions. A positive correlation is revealed between perceived ease of website navigation and increased consumer trust in using the website. Additionally, perceived quality of the site is statistically significant to online purchasing. Consumer attitude toward e-commerce also correlates positively to e-purchase intentions. This study also reveals that consumer...
Cyber Deterrence could be the United States' best counterintelligence defense against cyber aggression and industrial espionage on the Critical Infrastructure and Key Resources (CIKR) and Cyber Threats on US consumers. As technology... more
Cyber Deterrence could be the United States' best counterintelligence defense against cyber aggression and industrial espionage on the Critical Infrastructure and Key Resources (CIKR) and Cyber Threats on US consumers. As technology improves and global trade and interconnectivity extend beyond comprehension, accountability, ideology and culture, the need to provide fool-proof security to protect US consumers is essential for public safety and national defense. This study involves data collections, which examined the relationship between reliability and validity of different perspectives regarding cyber deterrence. A descriptive statistical investigation using survey methodologies was employed to ascertain concerns of 150 victims of cyber “hacktivism” on their finances through banking systems or retail merchants as well as to determine the framework of implementing cyber deterrence as an acceptable institutionalized cyber-counterintelligence. Theory integration models via obtaine...
The proposed work developed critical strategy to solve basic problem; the Violation performance of individual services by constructing attack graphs, and automatic extraction and verification (analysis) properties of this graph allows to... more
The proposed work developed critical strategy to solve basic problem; the Violation performance of individual services by constructing attack graphs, and automatic extraction and verification (analysis) properties of this graph allows to partially solve such problems .Furthermore describes the security architecture, processes and organization structure of security analysis system (SAS), for the Ministry of Regional Municipalities and Water Resources (MRMWR) in sultanate of Oman. The proposed architecture is derived based on the current state assessment of the IT infrastructure, the future strategic direction and leading practices principles that consider the development of architecture, models and security analysis system (SAS), based on the formation of attack graph and the calculation of a variety of security metrics.
This work developed two Schema for distributed computing environment based on cloud computing technology to organize a dynamic load balancing in complex virtual computing . As well as analyzed and discussed problems, characteristics,... more
This work developed two Schema for distributed computing environment based on cloud computing technology to organize a dynamic load balancing in complex virtual computing . As well as analyzed and discussed problems, characteristics, architectures and applications of various approaches to building the operating environment for user access and for running applications in a distributed computing environment based on cloud computing technology. The aim of this work is to improve the efficiency of distributed computing in the cloud system, to introduce an approach to represent the operating environment for the organization of secure user access to computing control and development principles that run demanding applications in a distributed computing environment based on cloud computing technology. To achieve this goal, new methodology have been developed for running applications in the cloud, allowing to increase the overall performance of heterogeneous software and hardware systems .Th...
Network Systems and Security (Principles and Practice), New Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. The book started from the meaning of computer systems to understanding... more
Network Systems and Security (Principles and Practice), New Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. The book started from the meaning of computer systems to understanding what Network systems and security represents in information processing and security. This textbook teaches the TCP/IP Protocol Suite, TCP/IP Concept Example, Ports, Servers and Standards, types of Computer Network Systems Models- Peer to Peer and Client/Server Models. The book also examines the different types of WLAN, WLAN standards, Security Standards, WPA2/802.11i, the steps in Calculating the Subnet of an IP on Networks in both IPv4 and IPv6. This textbook also focuses on the techniques, policies, operational procedures, and technologies needed to design, implement, administer, secure, and troubleshoot Computer Networks and common Security Procedures and Protocols.
Recruitment and retention of students are multifaceted problems involving two parties-the student and the institution. This paper draws on surveys conducted in spring 2016 which examined factors linked to attrition rates and retention... more
Recruitment and retention of students are multifaceted problems involving two parties-the student and the institution. This paper draws on surveys conducted in spring 2016 which examined factors linked to attrition rates and retention ratio with implications on what motivates students to continue learning in an Information Technology (IT) program. During the initial evaluation, several areas of potential relevance were analyzed, including the geo-demographic characteristics of students and their achievements once enrolled in the program. Two particular factors were clearly correlated with attrition: the course teaching methodology/preferences of students and the default instructional mode of course delivery. The study analyzes the academic and demographic characteristics of admitted, matriculated degree-seeking students (N = 150) from spring to summer 2016 and limited to four-year baccalaureate degrees with setting at a regional University in Ajman, UAE. Demographic variables analyz...
Mobile phone usage is growing at an unprecedented rate. The ability to remain connected, the ease of smart phone use and declining mobile costs have allowed this technology to expand at a very high rate globally. The study aimed to... more
Mobile phone usage is growing at an unprecedented rate. The ability to remain connected, the ease of smart phone use and declining mobile costs have allowed this technology to expand at a very high rate globally. The study aimed to quantitatively determine the reasons for inactive practice of security measures of smart-phone usage among college students in the United States. The study also examined the Consideration of Future Consequences (CFC) level in relation to the level of smart-phone security measures, determined the levels of security measures on smart-phone (SP) by users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students. Using a quantitative research survey and simple random sampling procedure, the methodology focused on analyzing data through testing of hypotheses. The t-test, Pearson’s correlation, regression coefficients and their respective p-values. The results showed 69.8% of college students set PI...
In cellular networks, the contradiction between traffic demands and network resources is very prominent, also mobile users can move inside the heterogeneous networks from cell to another cell. Aiming at solving these issues, efficient... more
In cellular networks, the contradiction between traffic demands and network resources is very prominent, also mobile users can move inside the heterogeneous networks from cell to another cell. Aiming at solving these issues, efficient handover (HO) mechanisms are more and more concerned to enhance mobility management. In this paper a new handover optimization algorithm for long term evaluation (LTE) network based on fuzzy logic is presented, named Fuzzy Logic for LTE Handover (FLLH). It consists of finding the optimum handover margin (HOM) required for handover process and also finding appropriate time to trigger (TTT) to perform a success handover using fuzzy logic. FLLH handover optimization technique is evaluated and compared with the four well-known handover algorithms. The proposed handover optimization technique achieves minimum average number of handover per user and also have maximum throughput than the self-optimization technique.
Research Interests:
ABSTRACT
Research Interests:
-Most freshmen have found a selection of major subjects of study at universities to be challenging due to lack of a specific predictive data analytic criteria upon which they can choose their specialization majors. Researchers have... more
-Most freshmen have found a selection of major subjects of study at universities to be challenging due to lack of a specific predictive data analytic criteria upon which they can choose their specialization majors. Researchers have studied the influence of various factors on the selection criteria of study programs and choice of major subjects of study in programs like in business, engineering, health science, applied science,andhumanities. However,there is a dearth of research on factors influencing undergraduate freshmenin their choice of study programs and selection of major courses of study in programs like data science and analytics, informatics, information management and systems, and computer science. Thisstudy examined the predictive data analytical relationship between the students' characteristics and their learning environmental factors on one hand and the selection criteria of study programs and choice of major subjects of study on the other hand.The research used descriptive survey design (N=211)for data collection and statistical analysis for means, standard deviations and frequencies as well as logistic regression coefficients in answering the research questions. The study found and concluded that age, gender, and ethnicity have no significant influence on selection criteria of study programs and the choice of major subjects of study. The study also found that overall SAT/ACT score, social integration, and self-assessment on mathematical skills, credits attempted, credits completed score, first semester GPA score, self-commitment to complete degree course and self-assessment on degree satisfaction had a statistically significant influence on the choice of study programs and selection of major courses.
 Abstract-The research paper developed a new software metric methodology for evaluating the analyzability indicator for software products. The proposed research methodology provided an objective and quantitative assessment in accordance... more
 Abstract-The research paper developed a new software metric methodology for evaluating the analyzability indicator for software products. The proposed research methodology provided an objective and quantitative assessment in accordance with the requirements, limitations, purpose and specific features of software products. Forty-one (41) java programs were analyzed to extract and evaluate the software metrics described in 'Halstead metrics. The mathematical classification model was developed to replace the expert output in the evaluating process as related to the software metric indicators. The output of the algorithm was applied to identify the metrics with the greatest analyzability influence. The result indicated that 13 measured metrics with 98% of "analyzability" are relevant to seven (7) software code metrics with the remaining six (6) metrics making up only ~ 5% of "analyzability". The analyzed ROC-curves were similarly computed to test the performance of the proposed methodology compared to the expert's metric evaluation. The ROC-curves indicator for the proposed methodology showed resultant scores of ROC = 7.4 as compared to 7.3 from the experts' evaluation. However, both methods were correlated effectively after analytical computations with a resultant performance which showed that the proposed method outperforms the expert's evaluation.
Given the utility of big data analytic tools for Information systems in corporate decision making, there are growing concerns about the dearth or paucity of t-shaped graduates in the discipline. Thus, there is a need for effective... more
Given the utility of big data analytic tools for Information systems in corporate decision making, there are growing concerns about the dearth or paucity of t-shaped graduates in the discipline. Thus, there is a need for effective information management collaboration between corporations and universities in producing adequate t-shaped business and data analytics (DA/BA) graduates. The current study examines attitudes and perceptions of four groups (i.e., t-shaped graduates, corporate leaders, supervisors and college instructors) on the need for information management collaborations between universities and corporations to achieve readiness of graduates to fill DA/BA jobs.Using a structured online questionnaire,a random sample of 100 respondents provided data about their perceptions, attitudes, and experiences on collaborative DA/BA training. Data collected were analyzed using descriptive statistics and principal component analysis. Findings showed a need to have training relationships between DA/BA employers and universities in order to promote trainees' attitudes on the job(i) organizational culture, (ii) skills required and (iii) business and data analytical duties using an effective information management structure.The corporate leaders indicated that the training responsibilities should not be the solerole of the Universities and there is a need to promote interdisciplinary information systems, management, and training between companies and universities.
Modern telecommunication companies have developed or installed high-speed data plan services to convey information in the form of a stream of networks that relay data or information faster than the typical data delivery. Multi-hop relay... more
Modern telecommunication companies have developed or installed high-speed data plan services to convey information in the form of a stream of networks that relay data or information faster than the typical data delivery. Multi-hop relay (MHR) enhanced WiMAX networks are conceivably the most promising Radio Access Technology set up to provide high-speed broadband connectivity to large geographical locations. This research provides an assessment of the challenges of enhanced WiMAX network concepts and its impact in offering reliability within the LTE-Advanced framework. The study identified common physical components, technologies, and wireless standards of enhanced WiMAX networks, establish the effectiveness of Quality of service (QoS) in enhanced WiMAX networks, interpret the challenges of enhanced WiMAX network concepts in LTE-Advanced framework, and analyze the determining factors thataffects enhanced WiMAX network in offering reliability within the LTE-Advanced framework. The study adopted a research survey design byusing a simple random sampling that focused on Collection of data through online questionnaires and analyzing the data to generate specific findings using descriptive statistics, Analysis of Variance (ANOVA), and Principal component analysis. The study found several challenges including; coverage holes due to 'shadowing' (r=-0.642), poor signal to interference and noise ratio (SINR) for the SSs' with respect to Base Stations, BS (r=919), cost of servicing few Subscribers Stations (SSs) or few users (r=-0.719), reliability problems still persist on in-band relaying with respect to out-of-band relaying (r=0.817) and technical and non-technical support services (r=0.854), werefound to be statistically significant in the enhancement of WiMAX networks. The study findings created framework for the implementation of policies on communication technology enhancements that would spearhead infrastructural development towards improvement in multi-hop relay enhanced networks on WiMAX and provide a reliable LTE-Advanced framework.
Research Interests:
Mobile phone usage is growing at an unprecedented rate. The ability to remain connected, the ease of smart phone use and declining mobile costs have allowed this technology to expand at a very high rate globally. The study aimed to... more
Mobile phone usage is growing at an unprecedented rate. The ability to remain connected, the ease of smart phone use and declining mobile costs have allowed this technology to expand at a very high rate globally. The study aimed to quantitatively determine the reasons for inactive practice of security measures of smart-phone usage among college students in the United States. The study also examined the Consideration of Future Consequences (CFC) level in relation to the level of smart-phone security measures, determined the levels of security measures on smart-phone (SP) by users, and establish the relationship between CFC level and the levels of smart-phone security measures among college students. Using a quantitative research survey and simple random sampling procedure, the methodology focused on analyzing data through testing of hypotheses. The t-test, Pearson's correlation, regression coefficients and their respective p-values. The results showed 69.8% of college students set PIN, password and screen lock on their smart phones while 74.8% were cautious with smart phone applications and 6.2% practiced on setting of security software including rooting services. On the other hand, 35.4% protected their SP data through encryption, 47.4% had data checks and security alert while 46.2% had set Bluetooth applications and 41.4% had used backup storage for sensitive data. Use of Biometrics or other security unknown security adoptions were not included in the study. The study also found that lack of knowledge about technology or applications for SP security, lack of security habits and practices, rigorous involvement of setting SP security details like backups, encryption, security software etc., assumptions that SP are security and tamper-proof as well as lack of training, guidance and after sale services on SP security are significant reasons for lack of security measures practices concerning smart-phone usage by college students.
Research Interests:
ARTICLE INFO ABSTRACT Information Technology (IT) job satisfaction can be influenced by factors categorized into two broad groups of predictive factors. First, the intrinsic factors about the employee's recruitment and retention which... more
ARTICLE INFO ABSTRACT Information Technology (IT) job satisfaction can be influenced by factors categorized into two broad groups of predictive factors. First, the intrinsic factors about the employee's recruitment and retention which includes; career plateau (the work itself) and advancement opportunities within organizations. Secondly, the extrinsic factors based on the employer's support like; remuneration, management's support and coworker relations. This study assesses the predictive factors of IT professionals' job satisfaction to determine influence of job satisfaction in the United States. Adopting a 'Simple Random Sampling' technique using survey methodology, and with settings in the State of Texas, the study also examined the relationship between: IT professionals' work attitudes and IT job satisfaction. Variables include influence of IT job advancement opportunities, Company's policies on work requirements, professional development and remuneration rate conditions on IT job satisfaction. The study found that IT job satisfaction is significantly influenced by the three predictive variables like IT professionals' work attitudes (B=0.434), cordial working relationships (B=0.356) and management support (B=0.391). Other variables like IT job advancement opportunities (B=0.004) and IT professionals' remuneration conditions (B=0.043) did not have significant statistical predictive outcomes on IT job satisfaction. Analysis was not conducted to raise the assumptions of predictor level of 'organizational performance comparison' using statistical factors like presence of outliers, factorability, linearity, and multi collinearity because of the low number sample size (N=120). The effectiveness of this study is determined by the significance of the link between effective IT professional work activities and their job satisfaction.
Research Interests:
The number of vulnerability attacks and the ease with which an attack can be perpetrated have increased as the software industry and Internet use have grown. Researchers have discovered a lack of established procedures for analysis and... more
The number of vulnerability attacks and the ease with which an attack can be perpetrated have increased as the software industry and Internet use have grown. Researchers have discovered a lack of established procedures for analysis and collection of data errors generated during software development. Under such conditions, from a software developer’s perspective, the probability of releasing secured products may not be feasible, as vulnerabilities are likely to be discovered. Given the fact that there is no guaranteed vulnerability risk free software currently in existence, it is critical to understand vulnerability risks prediction and prevention measures. This study examines vulnerability risks using statistical predictive design measures based on software characteristics. The study tests the severity, frequency and diversity of vulnerability risks. Using a survey methodology to collect data from IT practitioners, and analyzing publicly available vulnerability risks information, prediction capabilities were examined and tested. The study showed cogent insights and provided clear perspectives of vulnerability risks and how software characteristics can be used as predictive measures to identify security holes. The study will ultimately help IT and Information Security experts to understand frequency and severity of vulnerability risks and proffer solutions during software development.
Research Interests:
This study explores functionalities of the Dedicated Short Range Communication architecture, and provides V2V safety information systems which provide warnings on crash avoidance. An application (DSRC) of traffic safety is tested for... more
This study explores functionalities of the Dedicated Short Range Communication architecture, and provides V2V safety information systems which provide warnings on crash avoidance. An application (DSRC) of traffic safety is tested for congesting. This study is based on Short Range Communication (DSRC) standard, which has become an emerging vehicular safety application. A MAT-LAB simulation experiment is performed using wireless spectrum, layering of routing protocols to determine the ability to mitigate vehicle to vehicle communication congestion within Vehicle-to-Vehicle (V2V) signal phase communications. The objective was to have a support transition from a prototype-level to a deployment-level system. Cite This Article: Richmond Adebiaye, " Analysis on Mitigation of Intelli-drive Communication Congestion: Broadcasted Signal Phase in Vehicle-to-Vehicle (V2V) Safety Features Using DSRC IEEE 802.11p Standard. "
Research Interests:
The number of vulnerability attacks and the ease with which an attack can be perpetrated have increased as the software industry and Internet use have grown. Researchers have discovered a lack of established procedures for analysis and... more
The number of vulnerability attacks and the ease with which an attack can be perpetrated have increased as the software industry and Internet use have grown. Researchers have discovered a lack of established procedures for analysis and collection of data errors generated during software development. Under such conditions, from a software developer’s perspective, the probability of releasing secured products may not be feasible, as vulnerabilities are likely to be discovered. Given the fact that there is no guaranteed vulnerability risk free software currently in existence, it is critical to understand vulnerability risks prediction and prevention measures. This study examines vulnerability risks using statistical predictive design measures based on software characteristics. The study tests the severity, frequency and diversity of vulnerability risks. Using a survey methodology to collect data from IT practitioners, and analyzing publicly available vulnerability risks information, prediction capabilities were examined and tested. The study showed cogent insights and provided clear perspectives of vulnerability risks and how software characteristics can be used as predictive measures to identify security holes. The study will ultimately help IT and Information Security experts to understand frequency and severity of vulnerability risks and proffer solutions during software development.
Information technology (IT) investment and aligning methodologies require thorough understanding of analyses on different parallel present values and strong internal rates of return. E-commerce has given a new dimension to IT investing... more
Information technology (IT) investment and aligning methodologies require thorough understanding of analyses on different parallel present values and strong internal rates of return. E-commerce has given a new dimension to IT investing that elevates the role of strong IT performance as a driver of corporate strategy. Stakeholders concerned with maximizing IT return on investment (ROI) recognize the importance of central, comprehensive information resources to effective strategic business planning. Alignment of corporate and IT strategies is now a vital element of business success. To empirically support this conclusion, this study measures the relationship between strategic alignment of IT investment returns and corporate performance. A Descriptive research design using survey methodology was employed. The study included analyses of variable values involving stakeholders in banks, such as new customers and employees. A Simple Percentage Method, chi-square tests, Tables and weighted average were used to analyze data of at least five (5) banks in Ajman Emirates of UAE to determine the degree of alignment and its impact on the two strategic dimensions. A binary logistic regression analysis using Chan's STROIS model incorporated with Venkatraman's STROBE model was proposed to collect survey data and determine the extent of the strategic alignment. The research results provide empirical evidence that supports the hypothesis that closer alignment between corporate and IT strategies leads to increased IT ROI and improved corporate performance. This relationship holds true for all firms regardless of strategic intent for IT. The study also shows a positive correlation between early adoption of newly emergent technologies and business competitive advantage which leads to positive conclusions that strategic competition is imperative towards corporate performances.
Research Interests:
The success of consumer e-commerce is perhaps based on its attractions. Increasingly diversified products create even more reason for consumers to be attracted to online purchasing. However, the proliferation of e-commerce has created a... more
The success of consumer e-commerce is perhaps based on its attractions. Increasingly diversified products create even more reason for consumers to be attracted to online purchasing. However, the proliferation of e-commerce has created a dilemma in determinant factors that drive consumer decisions. Using a survey methodology (N = 125), this study examines the correlations of known " antecedents to consumer acceptance of online shopping " in the United Arab Emirates (UAE). A binary logistic regression analysis is performed to predict how consumer attitudes, perceptions of website quality, and gender influence consumer e-commerce intentions. A positive correlation is revealed between perceived ease of website navigation and increased consumer trust in using the website. Additionally, perceived quality of the site is statistically significant to online purchasing. Consumer attitude toward e-commerce also correlates positively to e-purchase intentions. This study also reveals that consumer gender was not an influencing factor with any of the variables examined and to purchase intentions. Results from this study suggest the important influential relationship between consumer behavior patterns and consumer e-shopping decisions.
Research Interests:
This study explores functionalities of the Dedicated Short Range Communication architecture, and provides V2V safety information systems which provide warnings on crash avoidance. An application (DSRC) of traffic safety is tested for... more
This study explores functionalities of the Dedicated Short Range Communication architecture, and provides V2V safety information systems which provide warnings on crash avoidance. An application (DSRC) of traffic safety is tested for congesting. This study is based on Short Range Communication (DSRC) standard, which has become an emerging vehicular safety application. A MAT-LAB simulation experiment is performed using wireless spectrum, layering of routing protocols to determine the ability to mitigate vehicle to vehicle communication congestion within Vehicle-to-Vehicle (V2V) signal phase communications. The objective was to have a support transition from a prototype-level to a deployment-level system. Cite This Article: Richmond Adebiaye, " Analysis on Mitigation of Intelli-drive Communication Congestion: Broadcasted Signal Phase in Vehicle-to-Vehicle (V2V) Safety Features Using DSRC IEEE 802.11p Standard. "
Research Interests:
This study evaluates hidden crisis of attrition prevalent amongst students and programs with descriptive interpretation for solving social isolation. A Descriptive research design was adopted for this study with a variable values covering... more
This study evaluates hidden crisis of attrition prevalent amongst students and programs with descriptive interpretation for solving social isolation. A Descriptive research design was adopted for this study with a variable values covering three (3) undergraduate degree programs. A Simple Percentage Method, chi-square tests, Tables and weighted average were used to get clear picture of analysis, of the academic and social characteristics of newly admitted undergraduate degree seeking students (N = 45) in the College of Business and Technology at Parker University, Dallas, Texas, United States from Fall 2013 to Fall 2014. A binary logistic regression analysis is proposed and performed to predict the probability of a student dropping out. A principal component factor analysis with descriptive analysis was performed on the twelve (12) questionnaire items used for data analysis. Student outcome (persistence or dropout) was the criterion variable. Analysis was not conducted to raise the assumptions of (adequacy of sample size, presence of outliers, factorability, linearity, and multi collinearity) because of the low number sample size (N=45). However, the general structure matrix pattern was examined for item loadings of three (3) programs in the undergraduate degree plan, in order to determine the number of factors to retain for convergent validity. Methods include Eigen functions, eigen values greater than one rule, scree test and total variance utilized to interpret factor structure coherent to the variable values. Mitigating factor analysis includes pertinence of program delivery mode, course design, enrollment number, number of students attending at end of the first year, undergraduate grade point average at time of dropout or completion, admission requirement criteria if any/test scores and number of sections to degree completion or number of courses completed at time of dropout.
Research Interests:
Students are the future of any country, and there are many information technology tools employed for improving the knowledge of students. The Green Education as new information technology tools highlights the importance of green... more
Students are the future of any country, and there are many information technology tools employed for improving the knowledge of students. The Green Education as new information technology tools highlights the importance of green information technology tools in improving current systems. This case study aims to investigate a novel ideas for future strategic planning that could help and add new values in developing country. Such initiative tends to prepare and develop students to meet future challenges. The study selects a University’s database which contains information about instructional learning. The study filters the database based on the instructors’ information on non-electronic teaching style (papers, communication) and instructors who included Green instructional system in their curriculum to highlight the pros of using green education .Data mining and statistical methods have been used as scientific tools to implement the experiments and justify the proposed idea. We believe...
A chiropractor is considered a Professional as well as a Businessperson. The history of chiropractic profession has been shaped with myriad of specific claims within healthcare environment which led to desire to ‘fit into the perceived... more
A chiropractor is considered a Professional as well as a Businessperson. The history of chiropractic profession has been shaped with myriad of specific claims within healthcare environment which led to desire to ‘fit into the perceived exigencies and requirements of the health care system’. However, the strategy to organize ethics within a profession exemplifies the need to be compliant with professional requirements and to exhibit integrity within the context of that profession. This study investigates the relationship between successful chiropractic practice and attainment of a Master of Business Administration (MBA) degree. A survey was completed by 150 practicing chiropractors in four (4) states of Texas, Tennessee, Oklahoma, and New York combined using an online survey instrument. Questions about additional earned degree in Business, its impact on financial and physical growth of business practices and establishments were quantified in order to rank the individual chiropractors as highly successful, having strains on practice (moderately successful), and no growth (least successful). Each of the independent variable responses from the research questions was analyzed for each success group of Chiropractors to determine whether the success level was related to any of the independent variables. Correlation analysis, coefficient of determination, and chi-square tests of independence were performed on the independent variables and on the demographic variables of age of respondent, location of business, cost of practice, attainment of an earned MBA degree, implication of the earned degree to progress of the practice and length of time in practice. Significant statistical findings were obtained and significant statistical correlation was found between the success variables and most of the independent variables. Relationships between attainment of an MBA using certain demographic factors and success level were also significant. The research provided answers to questions regarding attainment of an additional MBA degree and success aspect of a chiropractic business practice.
Research Interests:
The context of this paper is concentrated using the Text Summarization Application (TSA), which is an analysis and design software for complex structures, a smart-based environment implemented with C# programming language. In this paper,... more
The context of this paper is concentrated using the Text Summarization Application (TSA), which is an
analysis and design software for complex structures, a smart-based environment implemented with C# programming
language. In this paper, important aspects of the implementation of the smart-based environment in TSA are presented
to solve problems of highlighting the central keywords of text summarization, thereby presenting a very suitable
interpretation of Analytic-Synthetic Processing of Information. It is necessary to utilize the indexing procedure which
translates the text in a convenient manner for accurate representation, as well as easy processing of information
retrieval. The novelty of this work in using different approaches would be found in the format of extracting different
terms as well as in the methods of determining the weightof the terms
Research Interests:
Research Interests: