ebook img

Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source) PDF

364 Pages·2009·6.77 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)

Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science Evon M. O. Abu-Taieh Civil Aviation Regulatory Commission, Jordan Asim A. El-Sheikh The Arab Academy for Banking and Financial Sciences, Jordan Jeihan Abu-Tayeh The World Bank, USA InformatIon scIence reference Hershey • New York Director of Editorial Content: Kristin Klinger Senior Managing Editor: Jamie Snavely Managing Editor: Jeff Ash Assistant Managing Editor: Carole Coulson Typesetter: Chris Hrobak Cover Design: Lisa Tosheff Printed at: Yurchak Printing Inc. Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com/reference and in the United Kingdom by Information Science Reference (an imprint of IGI Global) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609 Web site: http://www.eurospanbookstore.com Copyright © 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identi.cation purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Utilizing information technology systems across disciplines : advancements in the application of computer science / Evon Abu-Taieh, Asim A. El-Sheikh, and Jeihan Abu-Tayeh, editors. p. cm. Includes bibliographical references and index. Summary: "This book provides all aspects of information resources management, managerial and organizational applications, as well as implications of information technology"--Provided by publisher. ISBN 978-1-60566-616-7 (hardcover : alk. paper) -- ISBN 978-1-60566- 617-4 (ebook : alk. paper) 1. Information technology. 2. Information resources management. 3. Management information systems. I. Abu-Taieh, Evon, 1966- II. El-Sheikh, Asim A, 1956- III. Abu-Tayeh, Jeihan, 1980- T58.5.U88 2009 004--dc22 2008052437 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. If a library purchased a print copy of this publication, please go to http://www.igi-global.com/agreement for information on activating the library's complimentary electronic access to this publication. Editorial Advisory Board Walter Cazzola, University of Milano, Italy David Gamez, University of Essex, UK Gerrit K. Janssens, Hasselt University - Campus Diepenbeek, Belgium Terry T. Kidd, University of Texas Health Science Center, USA Alexander Kolker, Children’s Hospital of Wisconsin, USA Mohamed Marzouk, Cairo University, Egypt Istvan Molnar, Bloomsburg University of Pennsylvania, USA Roberto Revetria, University of Genoa, Italy Sabah Mohammed Abutayeh, Housing Bank, Jordan Jari Salo, University of Oulu, Finland Hessam S. Sarjoughian, Arizona State University, USA Petros Theodorou, Athens University of Economics & Business, Greece Andreas Tolk, Old Dominion University, USA Table of Contents Preface ................................................................................................................................................xiv Acknowledgment ...............................................................................................................................xix Chapter I Hybrid Artificial Intelligence Heuristics and Clustering Algorithm for Combinatorial Asymmetric Traveling Salesman Problem ..............................................................................................1 K. Ganesh, Manufacturing ISU, Tata Consultancy Services Limited, Mumbai, India R. Dhanlakshmi, D-Link India Ltd, Bangalore, India A. Thangavelu, Vellore Institute of Technology, Vellore, India P. Parthiban, National Institute of Technology, Tiruchirappalli, India Chapter II An Enhanced Text-Classification-Based Arabic Information Retrieval System ................................. 37 Sameh Ghwanmeh, Yarmouk University, Jordan Ghassan Kanaan, The Arab Academy for Banking and Financial Sciences, Jordan Riyad Al-Shalabi, The Arab Academy for Banking and Financial Sciences, Jordan Ahmad Ababneh, The Arab Academy for Banking and Financial Sciences, Jordan Chapter III Landmark-Based Shape Context for Recognition of Handwritten Digits ............................................45 Shyamanta M. Hazarika, Tezpur University, India Chapter IV Enhanced Information Retrieval Evaluation between Pseudo Relevance Feedback and Query Similarity Relevant Documents Methodology Applied on Arabic Text .............................56 Sameh Ghwanmeh, Yarmouk University, Jordan Ghassan Kanaan, The Arab Academy for Banking and Financial Sciences, Jordan Riyad Al-Shalabi, The Arab Academy for Banking and Financial Sciences, Jordan Chapter V New Technique to Detect CNP Fraudulent Transactions ......................................................................67 Adnan M. Al-Khatib, Yarmouk University, Jordan Ezz Hattab, The Arab Academy for Banking and Financial Sciences, Jordan Chapter VI Key Topics in the Ethics and Economics of Cyber Security ................................................................78 Sattar J. Aboud, Middle East University for Graduate Studies, Jordan-Amman Chapter VII Using Maturity Model to Govern Information Technology ..................................................................90 Asim El-Sheikh, The Arab Academy for Banking and Financial Sciences, Jordan Husam A. Abu Khadra, The Arab Academy for Banking and Financial Sciences, Jordan Chapter VIII The Critical Success Factors of Web-Based Supply Chain Collaboration Adoption: An Empirical Study .............................................................................................................................110 Saad Ghaleb Yaseen, Al-Zaytoonh University of Jordan, Jordan Khaled Saleh Al Omoush, Al-Zaytoonh University of Jordan, Jordan Chapter IX Web Engineering in Small Jordanian Web Development Firms: An XP Based Process Model.........130 Haroon Altarawneh, Albalqa’ Applied University, Jordan Asim El-Sheikh, The Arab Academy for Banking and Financial Sciences, Jordan Chapter X A Proposed Theoretical Framework for Assessing Quality of E-Commerce Systems .......................142 Sattam Alamro, Albalqa’ Applied University, Jordan Asim El-Sheikh, The Arab Academy for Banking and Financial Sciences, Jordan Chapter XI Information Technology and Aviation Industry: Marriage of Convenience .......................................153 Evon M. O. Abu-Taieh, The Arab Academy for Banking and Financial Sciences, Jordan Chapter XII Dynamic Channel Allocation Scheme in Cellular Communication Networks ...................................165 Hussein Al-Bahadili, The Arab Academy for Banking and Financial Sciences, Jordan Arafat Abu Mallouh, The Hashemite University, Zarqa, Jordan Chapter XIII Discovering Knowledge Channels in Learning Organization: Case Study of Jordan ........................190 Maha T. El-Mahied, The Arab Academy for Banking and Financial Sciences, Jordan Firas Alkhaldi, The Arab Academy for Banking and Financial Sciences, Jordan Evon M. O. Abu-Taieh, The Arab Academy for Banking and Financial Sciences, Jordan Chapter XIV Performance Optimization of DWT-Based Image Watermarking Using Genetic Algorithms ...........210 Ali Al-Haj, Princess Sumaya University for Technology, Jordan Aymen Abu-Errub, The Arab Academy for Financial and Banking Sciences, Jordan Chapter XV Internet Banking System in South Asian Countries: Preliminary Findings ........................................222 Farrukh Amin, Institute of Business Management, Pakistan Chapter XVI Computer Simulation of Particle Packing in Bituminous Concrete ...................................................243 Kasthurirangan Gopalakrishnan, Iowa State University, USA Naga Shashidhar, Corning Inc., USA Chapter XVII Information Technology as a Service ..................................................................................................261 Robin G. Qiu, The Pennsylvania State University, USA Chapter XVIII The Impact of Sociocultural Factors in Multicultural Communication Environments: A Case Example from an Australian University’s Provision of Distance Education in the Global Classroom. ...............................................................................................................................279 Angela T. Ragusa, Charles Sturt University, Australia Chapter XIX Adaptive Computation Paradigm in Knowledge Representation: Traditional and Emerging Applications ..............................................................................................301 Marina L. Gavrilova, University of Calgary, Canada Compilation of References ...............................................................................................................315 About the Contributors ....................................................................................................................334 Index ...................................................................................................................................................340 Detailed Table of Contents Preface ................................................................................................................................................xiv Acknowledgment ...............................................................................................................................xix Chapter I Hybrid Artificial Intelligence Heuristics and Clustering Algorithm for Combinatorial Asymmetric Traveling Salesman Problem ..............................................................................................1 K. Ganesh, Manufacturing ISU, Tata Consultancy Services Limited, Mumbai, India R. Dhanlakshmi, D-Link India Ltd, Bangalore, India A. Thangavelu, Vellore Institute of Technology, Vellore, India P. Parthiban, National Institute of Technology, Tiruchirappalli, India Chapter I, Hybrid Arti.cial Intelligence Heuristics and Clustering Algorithm for Combinatorial Asym- metric Traveling Salesman Problem, develops a set of meta-heuristics genetic algorithms (GA), simu- lated annealing (SA) and hybrid GA-SA to solve a variant of combinatorial optimization problem called asymmetric traveling salesman problem. The set of met heuristics is compared with clustering based heuristic and the results are encouraging. Chapter II An Enhanced Text-Classification-Based Arabic Information Retrieval System ................................. 37 Sameh Ghwanmeh, Yarmouk University, Jordan Ghassan Kanaan, The Arab Academy for Banking and Financial Sciences, Jordan Riyad Al-Shalabi, The Arab Academy for Banking and Financial Sciences, Jordan Ahmad Ababneh, The Arab Academy for Banking and Financial Sciences, Jordan Chapter II, An Enhanced Text-Classification-Based Arabic Information Retrieval System, presents enhanced, effective and simple approach to text classification. The approach uses an algorithm to auto- matically classifying documents. The effects of the Arabic text classification on Information Retrieval have been investigated. Chapter III Landmark-Based Shape Context for Recognition of Handwritten Digits ............................................45 Shyamanta M. Hazarika, Tezpur University, India Chapter III, Landmark-Based Shape Context for Recognition of Handwritten Digits, introduces a new handwriting methodology based on landmark shapes. The primary contribution is a robust and simple algorithm for finding correspondence between handwritten digits using a variant of shapes. In this chapter, an approach to recognizing handwritten digits based on shape similarity computed through landmark-based shape context is presented. Shape context based object recognition being an iterative process; the reduction in the number of sample points provides a basis for faster recognition. Chapter IV Enhanced Information Retrieval Evaluation between Pseudo Relevance Feedback and Query Similarity Relevant Documents Methodology Applied on Arabic Text .............................56 Sameh Ghwanmeh, Yarmouk University, Jordan Ghassan Kanaan, The Arab Academy for Banking and Financial Sciences, Jordan Riyad Al-Shalabi, The Arab Academy for Banking and Financial Sciences, Jordan Chapter IV, Enhanced Information Retrieval Evaluation between Pseudo Relevance Feedback and Query Similarity Relevant Documents Methodology Applied on Arabic Text, introduces an enhanced informa- tion retrieval evaluation between pseudo relevance feedback and query similarity relevant documents methodology applied on Arabic text. The new method uses global feedback information for query expansion in contrast to local feedback information. Chapter V New Technique to Detect CNP Fraudulent Transactions ......................................................................67 Adnan M. Al-Khatib, Yarmouk University, Jordan Ezz Hattab, The Arab Academy for Banking and Financial Sciences, Jordan Chapter V, New Technique to Detect CNP Fraudulent Transactions, presents comprehensive frameworks that mines and detect fraudulent transactions of Card-Not-Present (CNP) in the e-payment systems with a high degree of accuracy. The motivation for a comprehensive framework is that money in the e-com- merce network is really bits and bytes. Which in turn, make digital crime within banking and financial systems happen very fast and may cost billions of dollars each year-undetected and unreported. Chapter VI Key Topics in the Ethics and Economics of Cyber Security ................................................................78 Sattar J. Aboud, Middle East University for Graduate Studies, Jordan-Amman Chapter VI, Key Topics in the Ethics and Economics of Cyber Security, studies key topics in a nascent literature on a cyber security. The chapters first concentrate on how inducements influence the major topics in information security. Three significant topics pertinent for a cyber security concerns are: an exterior security, the internet consequence and information sharing which make effect in the information security. The budding literature has started to study the relationships between vulnerability revelation, patching, manufactured goods prices and profits. Chapter VII Using Maturity Model to Govern Information Technology ..................................................................90 Asim El-Sheikh, The Arab Academy for Banking and Financial Sciences, Jordan Husam A. Abu Khadra, The Arab Academy for Banking and Financial Sciences, Jordan Chapter VII, Using Maturity Model to Govern Information Technology , introduces the COBiTs’ maturity model as a mean of studying the information technology (IT) governance and its affect on the perceived security threats. It argues that IT governance using the maturity model offers a probable influence on the level of security breaches frequency; such evidence would be extracted through a complex quantitative and qualitative approach, offers a better understanding of intricate relationships between different fac- tors. Moreover, the authors aimed at understanding the influence of using the maturity model will not only inform the researchers of a better design for IT governance and defining implementation pitfalls, but also assist in the understanding of IT governance practices trend in the Jordanian environment. Chapter VIII The Critical Success Factors of Web-Based Supply Chain Collaboration Adoption: An Empirical Study .............................................................................................................................110 Saad Ghaleb Yaseen, Al-Zaytoonh University of Jordan, Jordan Khaled Saleh Al Omoush, Al-Zaytoonh University of Jordan, Jordan Chapter VIII, The Critical Success Factors of Web-Based Supply Chain Collaboration Adoption: An Empirical Study, identify the critical success factors (CSFs) and outcomes of Web-based supply chain collaboration (SCC). The study is conducted on seven manufacturing firms in Jordan that use Web systems to collaborate with supply chain members. The results showed that top management support, IT infrastructure, training and education, business processes reengineering, trust among partners, open information sharing, and performance measurement are critical factors for Web-based SCC implementa- tion success. In addition, this study revealed that Web-based SCC implementation is positively related to supply chain relationship quality, performance effectiveness, and performance efficiency. Chapter IX Web Engineering in Small Jordanian Web Development Firms: An XP Based Process Model.........130 Haroon Altarawneh, Albalqa’ Applied University, Jordan Asim El-Sheikh, The Arab Academy for Banking and Financial Sciences, Jordan Chapter IX, Web Engineering in Small Jordanian Web Development Firms: An XP Based Process Model, proposes a theoretical model for small Web project development and its special features in the con- text small Web firms, which are capable of being ‘tailor able’ to the particular stage of organizational development of small Web firms.

Description:
With continual computer advances in the information technology age, information systems have become an integral part of many disciplines. Business, medicine, geography, aviation, forensics, agriculture, even traffic lights all have one thing in common - computers. Utilizing Information Technology Sy
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.