The Internet and all other electronic means have changed our way of doing business.Today, many of our businesses and transactions are conducted online. Yet consumers' marketers fight for building trust between one other. In this Paper a new model would be suggested based on Fuzzy Logical System which depicts some of the hidden relationships between the critical factors such as security, familiarity, and designing in a B2C commercial website on one hand, and the competitive factor to other competitors on other hand. Then, the impacts of these factors on purchasing decision of consumers in B2C commercial websites are extracted. Also, the factor influence in B2C trading would be analyzed. We are going to find the impact of these factors on the decision-making process of people to buy through the B2C commercial websites, and we also will analyze how these factors influence the results of the B2C trading. The study also provides a device for sellers to improve their commercial websites; in addition, it provides a helping device for on-line customers to buy through the commercial websites. Two questionnaire were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was use to analyze the generated factors in the model.
The document is a project report on e-banking from 2010. It discusses the existing manual banking system and proposes developing a computerized e-banking system. The report outlines an analysis of the existing system, proposes a new system, and assesses the technical, operational, and economic feasibility of the new e-banking system. The proposed system would address issues like lack of security, reduce manual work, and allow for greater efficiency and control over banking transactions.
This document summarizes a research paper that predicts customer churn using logistic regression with regularization and optimization techniques. The paper applies these techniques to predict churn customers in the banking, e-commerce, and telecom sectors. It first discusses customer relationship management (CRM) and how data mining can be used for customer churn prediction. Then, it describes logistic regression and how the proposed method adds regularization and optimization to improve accuracy. The method is tested on datasets from the three sectors to classify customers as churners or non-churners. The paper finds that adding regularization and optimization to logistic regression enhances its performance in customer churn prediction.
This document presents a study that develops a framework for exploring factors affecting trust in mobile commerce using the Analytic Hierarchy Process (AHP). The study identifies four main factors (customer desires, mobile and wireless technology, security and privacy, and reputation) and 29 sub-criteria that influence trust in mobile commerce based on a literature review and expert opinions. An online questionnaire was used to evaluate the factors through AHP. The results found that customer desires is the most important main factor for building trust in mobile commerce. Security was identified as the most important sub-criterion under customer desires. The framework can help customers make informed decisions when shopping via mobile and address the trust issues that are hindering the growth of mobile commerce.
This document presents a study that develops a framework for exploring factors affecting trust in mobile commerce using the Analytic Hierarchy Process (AHP). The study identifies four main factors (customer desires, mobile and wireless technology, security and privacy, and reputation) and 29 sub-criteria that influence trust in mobile commerce based on a literature review and expert opinions. An online questionnaire was used to evaluate the factors through AHP. The results found that customer desires is the most important main factor for building trust in mobile commerce. Security was identified as the most important sub-criterion under customer desires. The framework can help customers make informed decisions when shopping via mobile and address the trust issues that are hindering the growth of mobile commerce.
The document is a comprehensive project report on online banking in India. It includes an introduction to online banking, an overview of services provided, advantages and disadvantages. It also discusses the online banking scenario in India, top banks providing services, a SWOT analysis, objectives of the study, literature review, research methodology used, data analysis and findings. The key findings are that online banking is popular among young adults for convenience, most rate services as good, and nearly all see it as a better alternative to traditional banking.
Presentation on research report of customer satisfaction from e banking servicespriyanka sarraf
This research report summarizes a study on customer satisfaction with e-banking services from HDFC and ICICI Bank. The report outlines the objectives, sample design, data collection methods, findings and conclusions from a survey of 133 customers. Key findings include that the main factors influencing customer perception are good services, cost charges and people's references. The majority of customers reported being satisfied or highly satisfied with e-banking services, though some faced issues with slow speeds, time-consuming transfers and difficulty for less educated users. The report provides recommendations to improve e-banking services and customer training.
IRJET- Ecommerce Transactions: Secure Gateway in Payment SystemIRJET Journal
The document discusses secure payment systems for e-commerce transactions. It describes how credit/debit card transactions currently work over the internet, noting security risks due to lack of authentication and encryption. The proposed work aims to explore using Secure Sockets Layer (SSL) protocol, Secure Electronic Transaction (SET) protocol, and secure communication tunnel techniques to securely transmit payment information. It provides flowcharts depicting the system flow and data flow between users, merchants and payment gateways. The secure payment system would encrypt transaction data and authenticate all parties to prevent fraud and theft of financial information online. A table compares the key security features of SET, SSL and secure tunnels for implementing a secure electronic payment system over the internet.
This document presents a framework for securely selecting the best distributor among multiple options in a business-to-business (B2B) e-commerce scenario. It proposes using a decision tree classification model to evaluate distributors based on attributes like forecast of purchase, marketing knowledge, payment history, manufacturer relationships, and advertising support. The framework involves distributors registering for bids, and the manufacturer running the bid process and selection using the decision tree model. The goal is to facilitate an informed and secure decision for choosing a distributor in B2B e-commerce.
The document is a project report on e-banking from 2010. It discusses the existing manual banking system and proposes developing a computerized e-banking system. The report outlines an analysis of the existing system, proposes a new system, and assesses the technical, operational, and economic feasibility of the new e-banking system. The proposed system would address issues like lack of security, reduce manual work, and allow for greater efficiency and control over banking transactions.
This document summarizes a research paper that predicts customer churn using logistic regression with regularization and optimization techniques. The paper applies these techniques to predict churn customers in the banking, e-commerce, and telecom sectors. It first discusses customer relationship management (CRM) and how data mining can be used for customer churn prediction. Then, it describes logistic regression and how the proposed method adds regularization and optimization to improve accuracy. The method is tested on datasets from the three sectors to classify customers as churners or non-churners. The paper finds that adding regularization and optimization to logistic regression enhances its performance in customer churn prediction.
This document presents a study that develops a framework for exploring factors affecting trust in mobile commerce using the Analytic Hierarchy Process (AHP). The study identifies four main factors (customer desires, mobile and wireless technology, security and privacy, and reputation) and 29 sub-criteria that influence trust in mobile commerce based on a literature review and expert opinions. An online questionnaire was used to evaluate the factors through AHP. The results found that customer desires is the most important main factor for building trust in mobile commerce. Security was identified as the most important sub-criterion under customer desires. The framework can help customers make informed decisions when shopping via mobile and address the trust issues that are hindering the growth of mobile commerce.
This document presents a study that develops a framework for exploring factors affecting trust in mobile commerce using the Analytic Hierarchy Process (AHP). The study identifies four main factors (customer desires, mobile and wireless technology, security and privacy, and reputation) and 29 sub-criteria that influence trust in mobile commerce based on a literature review and expert opinions. An online questionnaire was used to evaluate the factors through AHP. The results found that customer desires is the most important main factor for building trust in mobile commerce. Security was identified as the most important sub-criterion under customer desires. The framework can help customers make informed decisions when shopping via mobile and address the trust issues that are hindering the growth of mobile commerce.
The document is a comprehensive project report on online banking in India. It includes an introduction to online banking, an overview of services provided, advantages and disadvantages. It also discusses the online banking scenario in India, top banks providing services, a SWOT analysis, objectives of the study, literature review, research methodology used, data analysis and findings. The key findings are that online banking is popular among young adults for convenience, most rate services as good, and nearly all see it as a better alternative to traditional banking.
Presentation on research report of customer satisfaction from e banking servicespriyanka sarraf
This research report summarizes a study on customer satisfaction with e-banking services from HDFC and ICICI Bank. The report outlines the objectives, sample design, data collection methods, findings and conclusions from a survey of 133 customers. Key findings include that the main factors influencing customer perception are good services, cost charges and people's references. The majority of customers reported being satisfied or highly satisfied with e-banking services, though some faced issues with slow speeds, time-consuming transfers and difficulty for less educated users. The report provides recommendations to improve e-banking services and customer training.
IRJET- Ecommerce Transactions: Secure Gateway in Payment SystemIRJET Journal
The document discusses secure payment systems for e-commerce transactions. It describes how credit/debit card transactions currently work over the internet, noting security risks due to lack of authentication and encryption. The proposed work aims to explore using Secure Sockets Layer (SSL) protocol, Secure Electronic Transaction (SET) protocol, and secure communication tunnel techniques to securely transmit payment information. It provides flowcharts depicting the system flow and data flow between users, merchants and payment gateways. The secure payment system would encrypt transaction data and authenticate all parties to prevent fraud and theft of financial information online. A table compares the key security features of SET, SSL and secure tunnels for implementing a secure electronic payment system over the internet.
This document presents a framework for securely selecting the best distributor among multiple options in a business-to-business (B2B) e-commerce scenario. It proposes using a decision tree classification model to evaluate distributors based on attributes like forecast of purchase, marketing knowledge, payment history, manufacturer relationships, and advertising support. The framework involves distributors registering for bids, and the manufacturer running the bid process and selection using the decision tree model. The goal is to facilitate an informed and secure decision for choosing a distributor in B2B e-commerce.
Impact of Internet banking on Customer SatisfactionAshwani Kumar
I. The document discusses a study conducted on internet banking services of Bank of Maharashtra.
II. It aims to study customer awareness, satisfaction levels and problems faced regarding internet banking.
III. The survey found that most customers are aware of and use online banking, and are satisfied with security levels, ATM availability and fund transfer services. However, some face issues with login/logout processes.
A STUDY ON CUSTOMER SATISFACTION TOWARDS E-BANKING SERVICES-Arunraj Varunrajraiv
This document discusses customer satisfaction with e-banking services in India. It analyzes primary data collected through questionnaires and secondary sources on e-banking. The findings show that customers are generally satisfied with e-banking, with 41.5% of respondents using public sector bank services and feeling secure in electronic transactions. However, some customers still lack awareness of all available e-banking options beyond ATM use. The conclusion is that while customer satisfaction with e-banking is currently high, greater education is still needed on e-banking services to boost their success.
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...Eswar Publications
Background: banks, as the main components of any countries` economic backbone, perpetually try to satisfy the needs and expectations of their customers to increase customer satisfaction, since in today`s competitive world, gaining competitive advantage is a high priority for any organization. On the other hand, the emergence of information technology in the banking industry has provided speed, security, efficiency, and quality of services through electronic banking and electronic payment tools. Therefore, banks and credit firms are constantly trying to increase their quality of services to satisfy their customers and gain competitive advantage.
Objective: since customer satisfaction is a high priority as one of the goals of banks and credit firms, this study aims to investigate the role of e-payment tools and e-banking in customer satisfaction.
Methodology: this study is an applied research regarding goal and a correlation type descriptive-survey regarding methodology. The statistical population consists of 80 gold customers of Pasargad bank e-payment company and the sample size was determined 66.35 using Cochran`s equation. Moreover, a questionnaire s used to collect the information. This questionnaire was developed in two sections by the researcher. The validity of the questionnaire is confirmed by a group of experts, including professors and specialists of the field, and its trust is computed using Cronbach`s alpha (α=90%). Furthermore, SPSS software and Pearson`s correlation test were used to analyze the data. Results of the research indicate that there is a positive and significant relationship between e-payment tools and e-banking. Therefore, the results can help to identify effective factors of customer satisfaction and in turn providing competitive advantage for this and similar organizations.
Proposed ranking for point of sales using data mining for telecom operatorsijdms
This study helps telecom companies in making decisions that optimize its sales points to reduce costs, also
to identify profitable customers and churn ones. This study builds two research models; physical model for
continuous mining of database where ever it resides i.e., as we have On Line Analytic Processing (OLAP)
we must have On Line Data Mining (OLDM), and logical model using Technology Acceptance Model.
Previous Studies showed that using basic information of customers, call details and customer service
related data, a model can effectively achieve accurate prediction data.
This research gives a new definition and classification for telecommunication services from the data
mining point of view. Then this research proposed a formula for total rank a shop and each term of this
formula gives a sub rank. The proposed example shows that even a shop with lower numbers of population
and visitors, it still has higher rank.
This research suggested that telecom operators has to concentrate more on their e-shopping and epayment
as it is more cost effective and use data from shops for marketing issues. Some assumptions made
in this study need to be validated using surveys, also proposed ranking should be applied on live database.
Moderating Role of Brand Image With Relation to Internet Banking and Customer...Samar Rahi
Internet is of vital essence to excel and progress of organization growth. It has revolutionized the banking sector all over the world. A spectacular innovation in banking sector is to introduce Internet banking services. The aim of this study is to inspect the moderating relationship of Brand image between internet banking and customer loyalty. This study is conducted using positivism paradigm and deductive quantitative methods of inquiry. Data was collected in a survey from those customers who were using internet banking services in Pakistan. Questionnaire was adopted from research studies of Zeithaml et al. and Park et al. A theoretical framework is proposed to suggest the links among variables. The sample size selected for research constitutes of 437 respondents belongs to Lahore and Islamabad, from Pakistan. Simple and Moderating regression analysis is used to examine hypothesized relationship.
This document summarizes a research paper on the impact of electronic banking (e-banking) on customer satisfaction at Hatton National Bank PLC in Sri Lanka. The study used questionnaires and interviews with 210 customers and employees to assess how factors like convenience, reliability, responsiveness, security and costs associated with e-banking affect customer satisfaction. The results showed e-banking had a positive impact and that convenience, security and costs were the main factors influencing customer satisfaction. The study provided recommendations to help HNB PLC further enhance customer satisfaction with e-banking.
Problems encountered in e-banking in selected bank in Quezon CityLily Monilla
This document discusses electronic banking (e-banking) in the Philippines, including its history and development. It provides background on the introduction of ATMs and more recent innovations like internet and mobile banking. It then discusses some challenges faced by e-banking, including security issues. The document outlines a study that aims to determine problems encountered with e-banking in selected banks in Quezon City. It discusses the study's scope, significance and definitions of key terms.
The document is a student project report on e-banking in India. It includes an introduction that defines e-banking and discusses its background and development. It also outlines the objectives, methodology and limitations of the study. The conceptual framework section discusses how online banking works and its benefits to customers. The data analysis section examines how the internet and world wide web have enabled online banking services.
Impact of ICT (online services) on customer satisfaction: A study of Pakistan...faisalqau
This document outlines a study that will examine the impact of information and communication technologies (ICT), specifically online services, on customer satisfaction in Pakistan's banking sector. The study will select and survey 12 local and 12 foreign banks to test if ICT has a positive or negative impact on customer satisfaction. Statistical analysis will be used to analyze the data and draw conclusions. The results are intended to show if ICT online services increase customer satisfaction in the banking industry.
The document discusses the various information systems used by Maybank. It describes Maybank2u, the bank's online banking system which allows customers to perform transactions online. It also discusses the ATM machine system and MaybankPay mobile wallet system which allow customers to perform transactions remotely. The document then covers the bank's use of mobile banking and customer relationship management systems to improve customer service, as well as its use of e-commerce systems to facilitate online transactions between businesses and customers.
Determinants of Auditor Performance at the Regional Inspectorate Evidence fro...ijtsrd
Performance measurement is used as a basis for assessing the success and failure of implementing activities. Quality human resources affect the performance of each auditor. Quality of supervision must fulfill criterion under regulations is required. The research objective was to test whether responsibility, independence, expertise, and compliance with the code of ethics affected the inspectorate auditors performance in regional governments in East Java. Research data collection was carried out by the survey method by the snowball method to distribute questionnaires to respondents. Forty seven filled questionnaires were analyzed using partial least squares. There are four hypotheses tested. Based on the test results, it can be concluded that there is an influence of responsibility, independence, competence, and compliance on the regional inspectorate auditors performance. Auditors who comply with the code of ethics can increase auditor professionalism. The higher the professionalism, the better the auditor can consider finding possible deviations. The research implication is that adherence to the established standards improves the quality of audit performance. Therefore, continuous efforts are needed to enhance competence and compliance with the auditing apparatus standards to produce quality regional financial statements. Alwan Sri Kustono "Determinants of Auditor Performance at the Regional Inspectorate: Evidence from East Java – Indonesia" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35822.pdf Paper URL : https://www.ijtsrd.com/economics/accounting/35822/determinants-of-auditor-performance-at-the-regional-inspectorate-evidence-from-east-java-– -indonesia/alwan-sri-kustono
This document provides an outline for a research study on analyzing the effects of consumer risk perception on purchasing banking services through the internet. It includes an introduction on banking and online banking, the need for internet banking in India, and discusses various dimensions of risk perceived by consumers. The objectives are to understand the impact of risk perception and determine differences between users and non-users of internet banking. A literature review is presented on previous studies related to online banking quality, risk perception, and factors influencing internet banking usage. The methodology discusses using descriptive and exploratory research approaches through surveys and secondary data collection.
customer perception towards internet banking final reportjay prakash tyagi
The document discusses customer perception towards internet banking. It first defines internet banking as conducting banking transactions electronically from any location via the internet. It then discusses how banks offer internet banking and the benefits it provides customers in terms of convenience and reduced time and costs. The objectives of the study are then outlined as understanding the factors influencing customer perception, designing a measure to evaluate perception, and suggesting implications for banks.
Use of Automated Teller Machine (ATM) card in Dhaka City: A Survey to Reveal ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The document discusses internet banking of State Bank of India. It provides background on the author's motivation for the project topic. The objectives are to understand internet banking concepts, aspects of SBI's net banking, perform a SWOC analysis, and provide recommendations. Data will be collected from SBI officials and websites. The project contains 7 chapters covering the company profile, internet banking history, how SBI's works, analysis, and conclusions.
This document summarizes a research study on the uses and perceptions of e-banking among customers of HDFC Bank in India. The study used a survey of 100 HDFC Bank customers and found that employees, males aged 21-40 earning Rs. 15,000-20,000 per month mostly use e-banking for convenience and personal banking transactions. While e-banking usage could be increased among other groups, customers perceive it as convenient and easy to use. The document recommends the bank increase awareness programs, attract new customers, and customize e-banking services.
Online Banking is becoming an important aspect of worldwide commerce. Online Banking is also known as e-banking, cyber banking, virtual banking, net banking, and internet banking. Online banking includes various banking activities conducted from home business, instead of at a physical bank location Customer relationship management worked as a tool increased use of e-commerce makes CRM. Online banking is based on internet or web- based interaction to create a high volatile relationship in the banking sector .Questions are related to online banking in which given options are Satisfied, Unsatisfied ,Neutral, Yes, No . After analysis and comparison of traditional banking of online banking, it is revealed that it is quite difficult, if not impossible, to suggest that which online banking is best. Online banking provide the flexibility, efficiency of work, provide the better security of net banking than net banking incresed. The future of web-based e-banking in developed areas appears bright but consumers and merchants in developing countries face in number of barriers to successful e-banking, including less reliable telecommunications infrastructure and power supplies, less access to online payment mechanisms and relatively high costs for personal computers and Internet access . The Future scope of the study of Online banking is use to reduce transaction costs.
This document discusses the application of machine learning algorithms for fraud detection in the banking sector. It proposes using Classification and Regression Tree (CART), AdaBoost, LogitBoost, and Bagging algorithms to classify banking data and detect fraud. An experiment is conducted to analyze the performance of these algorithms on a banking data set. The results show that the Bagging algorithm has the lowest misclassification rate, indicating it performs better than the other algorithms at classifying banking data for fraud detection. In conclusion, the Bagging algorithm is deemed the best performing of the meta-learning algorithms analyzed for fraud detection in banking data.
Factors Affecting the Acceptance & Adoption of M-Commerce in PakistanSarmad Agha
This document discusses factors affecting the acceptance and adoption of mobile commerce (m-commerce) in Pakistan. It begins with an introduction that provides background on m-commerce and its growth. It then reviews relevant literature on m-commerce services and factors that influence behavioral intention to adopt m-commerce, such as perceived usefulness, ease of use, trust/privacy, and cost. The document describes the study's methodology, analysis of data collected, and discusses key findings. It concludes by providing recommendations for future research on m-commerce adoption in Pakistan.
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...Waqas Tariq
Robocup is an international competition for multi- agent research and related subject like: Artificial intelligence, Image processing, machine learning, robot path planning, control, and obstacle avoidance. In a soccer robot game, the environment is highly competitive and dynamic. In order to work in the dynamically changing environment, the decision-making system of a soccer robot system should have the features of flexibility and real-time adaptation. In this paper we will focus on the Middle Size Soccer Robot league (MSL). In this paper a new hierarchical hybrid fuzzy methods for decision making and action selection of a robot in Middle Size Soccer Robot league (MSL) are presented. First, the behaviors of an agent are introduced, implemented and classified in two layers, the Low_Level_Behaviors and the High_Level_Behaviors. In the second layer, a two phase mechanism for decision making is introduced. In phase one, some useful methods are implemented which check the robots situation for performing required behaviors. In the next phase, the team strategy, team formation, robots role and the robots positioning system are introduced. A fuzzy logical approach is employed to recognize the team strategy and further more to tell the player the best position to move. We believe that a Dynamic role engine is necessary for a successful team. Dynamic role engine and formation control during offensive or defensive play, help us to prevent collision avoidance among own players when attacking the ball and obstacle avoidance of the opponents. At last, we comprised our implemented algorithm in the Robocup2007 and 2008 and results showed the efficiency of the introduced methodology. The results are satisfactory which has already been successfully implemented in ADRO RoboCup team.
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
This paper presents recent research into methods used in Australian Indigenous Knowledge sharing and looks at how these can support the creation of suitable collaborative envi- ronments for timely organisational learning. The protocols and practices as used today and in the past by Indigenous communities are presented and discussed in relation to their relevance to a personalised system of knowledge sharing in modern organisational cultures. This research focuses on user models, knowledge acquisition and integration of data for constructivist learning in a networked repository of or- ganisational knowledge. The data collected in the repository is searched to provide collections of up-to-date and relevant material for training in a work environment. The aim is to improve knowledge collection and sharing in a team envi- ronment. This knowledge can then be collated into a story or workflow that represents the present knowledge in the organisation.
Impact of Internet banking on Customer SatisfactionAshwani Kumar
I. The document discusses a study conducted on internet banking services of Bank of Maharashtra.
II. It aims to study customer awareness, satisfaction levels and problems faced regarding internet banking.
III. The survey found that most customers are aware of and use online banking, and are satisfied with security levels, ATM availability and fund transfer services. However, some face issues with login/logout processes.
A STUDY ON CUSTOMER SATISFACTION TOWARDS E-BANKING SERVICES-Arunraj Varunrajraiv
This document discusses customer satisfaction with e-banking services in India. It analyzes primary data collected through questionnaires and secondary sources on e-banking. The findings show that customers are generally satisfied with e-banking, with 41.5% of respondents using public sector bank services and feeling secure in electronic transactions. However, some customers still lack awareness of all available e-banking options beyond ATM use. The conclusion is that while customer satisfaction with e-banking is currently high, greater education is still needed on e-banking services to boost their success.
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...Eswar Publications
Background: banks, as the main components of any countries` economic backbone, perpetually try to satisfy the needs and expectations of their customers to increase customer satisfaction, since in today`s competitive world, gaining competitive advantage is a high priority for any organization. On the other hand, the emergence of information technology in the banking industry has provided speed, security, efficiency, and quality of services through electronic banking and electronic payment tools. Therefore, banks and credit firms are constantly trying to increase their quality of services to satisfy their customers and gain competitive advantage.
Objective: since customer satisfaction is a high priority as one of the goals of banks and credit firms, this study aims to investigate the role of e-payment tools and e-banking in customer satisfaction.
Methodology: this study is an applied research regarding goal and a correlation type descriptive-survey regarding methodology. The statistical population consists of 80 gold customers of Pasargad bank e-payment company and the sample size was determined 66.35 using Cochran`s equation. Moreover, a questionnaire s used to collect the information. This questionnaire was developed in two sections by the researcher. The validity of the questionnaire is confirmed by a group of experts, including professors and specialists of the field, and its trust is computed using Cronbach`s alpha (α=90%). Furthermore, SPSS software and Pearson`s correlation test were used to analyze the data. Results of the research indicate that there is a positive and significant relationship between e-payment tools and e-banking. Therefore, the results can help to identify effective factors of customer satisfaction and in turn providing competitive advantage for this and similar organizations.
Proposed ranking for point of sales using data mining for telecom operatorsijdms
This study helps telecom companies in making decisions that optimize its sales points to reduce costs, also
to identify profitable customers and churn ones. This study builds two research models; physical model for
continuous mining of database where ever it resides i.e., as we have On Line Analytic Processing (OLAP)
we must have On Line Data Mining (OLDM), and logical model using Technology Acceptance Model.
Previous Studies showed that using basic information of customers, call details and customer service
related data, a model can effectively achieve accurate prediction data.
This research gives a new definition and classification for telecommunication services from the data
mining point of view. Then this research proposed a formula for total rank a shop and each term of this
formula gives a sub rank. The proposed example shows that even a shop with lower numbers of population
and visitors, it still has higher rank.
This research suggested that telecom operators has to concentrate more on their e-shopping and epayment
as it is more cost effective and use data from shops for marketing issues. Some assumptions made
in this study need to be validated using surveys, also proposed ranking should be applied on live database.
Moderating Role of Brand Image With Relation to Internet Banking and Customer...Samar Rahi
Internet is of vital essence to excel and progress of organization growth. It has revolutionized the banking sector all over the world. A spectacular innovation in banking sector is to introduce Internet banking services. The aim of this study is to inspect the moderating relationship of Brand image between internet banking and customer loyalty. This study is conducted using positivism paradigm and deductive quantitative methods of inquiry. Data was collected in a survey from those customers who were using internet banking services in Pakistan. Questionnaire was adopted from research studies of Zeithaml et al. and Park et al. A theoretical framework is proposed to suggest the links among variables. The sample size selected for research constitutes of 437 respondents belongs to Lahore and Islamabad, from Pakistan. Simple and Moderating regression analysis is used to examine hypothesized relationship.
This document summarizes a research paper on the impact of electronic banking (e-banking) on customer satisfaction at Hatton National Bank PLC in Sri Lanka. The study used questionnaires and interviews with 210 customers and employees to assess how factors like convenience, reliability, responsiveness, security and costs associated with e-banking affect customer satisfaction. The results showed e-banking had a positive impact and that convenience, security and costs were the main factors influencing customer satisfaction. The study provided recommendations to help HNB PLC further enhance customer satisfaction with e-banking.
Problems encountered in e-banking in selected bank in Quezon CityLily Monilla
This document discusses electronic banking (e-banking) in the Philippines, including its history and development. It provides background on the introduction of ATMs and more recent innovations like internet and mobile banking. It then discusses some challenges faced by e-banking, including security issues. The document outlines a study that aims to determine problems encountered with e-banking in selected banks in Quezon City. It discusses the study's scope, significance and definitions of key terms.
The document is a student project report on e-banking in India. It includes an introduction that defines e-banking and discusses its background and development. It also outlines the objectives, methodology and limitations of the study. The conceptual framework section discusses how online banking works and its benefits to customers. The data analysis section examines how the internet and world wide web have enabled online banking services.
Impact of ICT (online services) on customer satisfaction: A study of Pakistan...faisalqau
This document outlines a study that will examine the impact of information and communication technologies (ICT), specifically online services, on customer satisfaction in Pakistan's banking sector. The study will select and survey 12 local and 12 foreign banks to test if ICT has a positive or negative impact on customer satisfaction. Statistical analysis will be used to analyze the data and draw conclusions. The results are intended to show if ICT online services increase customer satisfaction in the banking industry.
The document discusses the various information systems used by Maybank. It describes Maybank2u, the bank's online banking system which allows customers to perform transactions online. It also discusses the ATM machine system and MaybankPay mobile wallet system which allow customers to perform transactions remotely. The document then covers the bank's use of mobile banking and customer relationship management systems to improve customer service, as well as its use of e-commerce systems to facilitate online transactions between businesses and customers.
Determinants of Auditor Performance at the Regional Inspectorate Evidence fro...ijtsrd
Performance measurement is used as a basis for assessing the success and failure of implementing activities. Quality human resources affect the performance of each auditor. Quality of supervision must fulfill criterion under regulations is required. The research objective was to test whether responsibility, independence, expertise, and compliance with the code of ethics affected the inspectorate auditors performance in regional governments in East Java. Research data collection was carried out by the survey method by the snowball method to distribute questionnaires to respondents. Forty seven filled questionnaires were analyzed using partial least squares. There are four hypotheses tested. Based on the test results, it can be concluded that there is an influence of responsibility, independence, competence, and compliance on the regional inspectorate auditors performance. Auditors who comply with the code of ethics can increase auditor professionalism. The higher the professionalism, the better the auditor can consider finding possible deviations. The research implication is that adherence to the established standards improves the quality of audit performance. Therefore, continuous efforts are needed to enhance competence and compliance with the auditing apparatus standards to produce quality regional financial statements. Alwan Sri Kustono "Determinants of Auditor Performance at the Regional Inspectorate: Evidence from East Java – Indonesia" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35822.pdf Paper URL : https://www.ijtsrd.com/economics/accounting/35822/determinants-of-auditor-performance-at-the-regional-inspectorate-evidence-from-east-java-– -indonesia/alwan-sri-kustono
This document provides an outline for a research study on analyzing the effects of consumer risk perception on purchasing banking services through the internet. It includes an introduction on banking and online banking, the need for internet banking in India, and discusses various dimensions of risk perceived by consumers. The objectives are to understand the impact of risk perception and determine differences between users and non-users of internet banking. A literature review is presented on previous studies related to online banking quality, risk perception, and factors influencing internet banking usage. The methodology discusses using descriptive and exploratory research approaches through surveys and secondary data collection.
customer perception towards internet banking final reportjay prakash tyagi
The document discusses customer perception towards internet banking. It first defines internet banking as conducting banking transactions electronically from any location via the internet. It then discusses how banks offer internet banking and the benefits it provides customers in terms of convenience and reduced time and costs. The objectives of the study are then outlined as understanding the factors influencing customer perception, designing a measure to evaluate perception, and suggesting implications for banks.
Use of Automated Teller Machine (ATM) card in Dhaka City: A Survey to Reveal ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The document discusses internet banking of State Bank of India. It provides background on the author's motivation for the project topic. The objectives are to understand internet banking concepts, aspects of SBI's net banking, perform a SWOC analysis, and provide recommendations. Data will be collected from SBI officials and websites. The project contains 7 chapters covering the company profile, internet banking history, how SBI's works, analysis, and conclusions.
This document summarizes a research study on the uses and perceptions of e-banking among customers of HDFC Bank in India. The study used a survey of 100 HDFC Bank customers and found that employees, males aged 21-40 earning Rs. 15,000-20,000 per month mostly use e-banking for convenience and personal banking transactions. While e-banking usage could be increased among other groups, customers perceive it as convenient and easy to use. The document recommends the bank increase awareness programs, attract new customers, and customize e-banking services.
Online Banking is becoming an important aspect of worldwide commerce. Online Banking is also known as e-banking, cyber banking, virtual banking, net banking, and internet banking. Online banking includes various banking activities conducted from home business, instead of at a physical bank location Customer relationship management worked as a tool increased use of e-commerce makes CRM. Online banking is based on internet or web- based interaction to create a high volatile relationship in the banking sector .Questions are related to online banking in which given options are Satisfied, Unsatisfied ,Neutral, Yes, No . After analysis and comparison of traditional banking of online banking, it is revealed that it is quite difficult, if not impossible, to suggest that which online banking is best. Online banking provide the flexibility, efficiency of work, provide the better security of net banking than net banking incresed. The future of web-based e-banking in developed areas appears bright but consumers and merchants in developing countries face in number of barriers to successful e-banking, including less reliable telecommunications infrastructure and power supplies, less access to online payment mechanisms and relatively high costs for personal computers and Internet access . The Future scope of the study of Online banking is use to reduce transaction costs.
This document discusses the application of machine learning algorithms for fraud detection in the banking sector. It proposes using Classification and Regression Tree (CART), AdaBoost, LogitBoost, and Bagging algorithms to classify banking data and detect fraud. An experiment is conducted to analyze the performance of these algorithms on a banking data set. The results show that the Bagging algorithm has the lowest misclassification rate, indicating it performs better than the other algorithms at classifying banking data for fraud detection. In conclusion, the Bagging algorithm is deemed the best performing of the meta-learning algorithms analyzed for fraud detection in banking data.
Factors Affecting the Acceptance & Adoption of M-Commerce in PakistanSarmad Agha
This document discusses factors affecting the acceptance and adoption of mobile commerce (m-commerce) in Pakistan. It begins with an introduction that provides background on m-commerce and its growth. It then reviews relevant literature on m-commerce services and factors that influence behavioral intention to adopt m-commerce, such as perceived usefulness, ease of use, trust/privacy, and cost. The document describes the study's methodology, analysis of data collected, and discusses key findings. It concludes by providing recommendations for future research on m-commerce adoption in Pakistan.
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...Waqas Tariq
Robocup is an international competition for multi- agent research and related subject like: Artificial intelligence, Image processing, machine learning, robot path planning, control, and obstacle avoidance. In a soccer robot game, the environment is highly competitive and dynamic. In order to work in the dynamically changing environment, the decision-making system of a soccer robot system should have the features of flexibility and real-time adaptation. In this paper we will focus on the Middle Size Soccer Robot league (MSL). In this paper a new hierarchical hybrid fuzzy methods for decision making and action selection of a robot in Middle Size Soccer Robot league (MSL) are presented. First, the behaviors of an agent are introduced, implemented and classified in two layers, the Low_Level_Behaviors and the High_Level_Behaviors. In the second layer, a two phase mechanism for decision making is introduced. In phase one, some useful methods are implemented which check the robots situation for performing required behaviors. In the next phase, the team strategy, team formation, robots role and the robots positioning system are introduced. A fuzzy logical approach is employed to recognize the team strategy and further more to tell the player the best position to move. We believe that a Dynamic role engine is necessary for a successful team. Dynamic role engine and formation control during offensive or defensive play, help us to prevent collision avoidance among own players when attacking the ball and obstacle avoidance of the opponents. At last, we comprised our implemented algorithm in the Robocup2007 and 2008 and results showed the efficiency of the introduced methodology. The results are satisfactory which has already been successfully implemented in ADRO RoboCup team.
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
This paper presents recent research into methods used in Australian Indigenous Knowledge sharing and looks at how these can support the creation of suitable collaborative envi- ronments for timely organisational learning. The protocols and practices as used today and in the past by Indigenous communities are presented and discussed in relation to their relevance to a personalised system of knowledge sharing in modern organisational cultures. This research focuses on user models, knowledge acquisition and integration of data for constructivist learning in a networked repository of or- ganisational knowledge. The data collected in the repository is searched to provide collections of up-to-date and relevant material for training in a work environment. The aim is to improve knowledge collection and sharing in a team envi- ronment. This knowledge can then be collated into a story or workflow that represents the present knowledge in the organisation.
A New Estimate Sliding Mode Fuzzy Controller for Robotic ManipulatorWaqas Tariq
One of the most active research areas in field of robotics is control of robot manipulator because this system has highly nonlinear dynamic parameters and most of dynamic parameters are unknown so design an acceptable controller is the main goal in this work. To solve this challenge position new estimation sliding mode fuzzy controller is introduced and applied to robot manipulator. This controller can solve to most important challenge in classical sliding mode controller in presence of highly uncertainty, namely; chattering phenomenon based on fuzzy estimator and online tuning and equivalent nonlinear dynamic based on estimation. Proposed method has acceptable performance in presence of uncertainty (e.g., overshoot=0%, rise time=0.8 s, steady state error = 1e-9 and RMS error=0.0001632).
Performance and Profit Evaluations of a Stochastic Model on Centrifuge System...Waqas Tariq
The paper formulates a stochastic model for a single unit centrifuge system on the basis of the real data collected from the Thermal Power Plant, Panipat (Haryana). Various faults observed in the system are classified as minor, major and neglected faults wherein the occurrence of a minor fault leads to degradation whereas occurrence of a major fault leads to failure of the system. Neglected faults are taken as those faults that are neglected /delayed for repair during operation of the system until the system goes to complete failure such as vibration, abnormal sound, etc. However these faults may lead to failure of the system. There is assumed to be single repair team that on complete failure of the system, first inspects whether the fault is repairable or non repairable and accordingly carries out repairs/replacements. Various measures of system performance are obtained using Markov processes and regenerative point technique. Using these measures profit of the system is evaluated. The conclusions regarding the reliability and profit of the system are drawn on the basis of the graphical studies.
Optimization of Thin Adhesive Layer Based on Colonial Competitive AlgorithmWaqas Tariq
In this paper a novel evolutionary global search strategy called colonial competitive algorithm (CCA) is utilized to determine an optimal imperfect transmission condition for a thin intermediate layer which reveal between two bonded materials in a dissimilar strip with a temperature-dependent source or sink formulation. Recently introduced CCA has proven its excellent capabilities such as faster convergence and better global optimum achievement. Finally the results of CCA are compared with finite element analysis. Comparison is shown the success of CCA for design of adhesive joints.
Improved Count Suffix Trees for Natural Language DataWaqas Tariq
With more and more text data stored in databases, the problem of handling natural language query predicates becomes highly important. Closely related to query optimization for these predicates is the (sub)string estimation problem, i.e., estimating the selectivity of query terms before query execution based on small summary statistics. The Count Suffix Trees (CST) is the data structure commonly used to address this problem. While selectivity estimates based on CST tend to be good, they are computationally expensive to build and require a large amount of memory for storage. To fit CST into the data dictionary of database systems, they have to be pruned severely. Pruning techniques proposed so far are based on term (suffix) frequency or on the tree depth of nodes. In this paper, we propose new filtering and pruning techniques that reduce the building cost and the size of CST over natural-language texts. The core idea is to exploit the features of the natural language data over which the CST is built. In particular, we aim at regarding only those suffixes that are useful in a linguistic sense. We use (wellknown) IR techniques to identify them. The most important innovations are as follows: (a) We propose and use a new optimistic syllabification technique to filter out suffixes. (b) We introduce a new affix and prefix stripping procedure that is more aggressive than conventional stemming techniques, which are commonly used to reduce the size of indices. (c) We observe that misspellings and other language anomalies like foreign words incur an over-proportional growth of the CST. We apply state-of-the-art trigram techniques as well as a new syllable-based non-word detection mechanism to filter out such substrings. – Our evaluation with large English text corpora shows that our new mechanisms in combination decrease the size of a CST by up to 80%, already during construction, and at the same time increase the accuracy of selectivity estimates computed from the final CST by up to 70%.
Rule-based Information Extraction from Disease Outbreak ReportsWaqas Tariq
Information extraction (IE) systems serve as the front end and core stage in different natural language programming tasks. As IE has proved its efficiency in domain-specific tasks, this project focused on one domain: disease outbreak reports. Several reports from the World Health Organization were carefully examined to formulate the extraction tasks: named-entities, such as disease name, date and location; the location of the reporting authority; and the outbreak incident. Extraction rules were then designed, based on a study of the textual expressions and elements found in the text that appeared before and after the target text.
The experiment resulted in very high performance scores for all the tasks in general. The training corpora and the testing corpora were tested separately. The system performed with higher accuracy with entities and events extraction than with relationship extraction.
It can be concluded that the rule-based approach has been proven capable of delivering reliable IE, with extremely high accuracy and coverage results. However, this approach requires an extensive, time-consuming, manual study of word classes and phrases.
Rapid Prediction of Extractives and Polyphenolic Contents in Pinus caribaea B...Waqas Tariq
The potential of near infrared reflectance spectroscopy (NIRS) for rapidly and accurately determining the extractives and polyphenol contents in Pinus caribaea bark extracts was assessed. Pinus caribaea bark samples were obtained from 110 trees in plantation stands at different locations of Ghana and were then scanned by NIRS. Their extractives and polyphenol contents reference values were obtained by TAPPI T204 om-88 and Folin-Ciocalteu methods respectively. These reference values were regressed against different spectral transformations using partial least square (PLS) regression. First derivative transformation equation of the raw spectral data, resulted in a coefficient of determination r2 in the external validation of 0.91 and 0.97 respectively for extractives content and polyphenol content. The calibration samples covered a wide range of extractives content from 34 – 45% and polyphenolic content from 16 – 23.5%. The standard deviation to root mean square error of cross validation ratio (SD/RMSECV), root mean square error of calibration to standard deviation ratio (RMSEC/SD), RMSECV/RMSEC and r2 for both extractives and polyphenol models were indicative of good prediction equations. The predicted values were thus highly correlated with time-consuming wet chemical measured values of extractives content and polyphenol content. The use of NIRS for the determination of the extractives and polyphenol contents in Pinus caribaea bark thus provides an advantage of time saving and cost of analysis.
Extended Performance Appraise of Image Retrieval Using the Feature Vector as ...Waqas Tariq
This document summarizes the results of testing an image retrieval technique that uses row means of transformed image columns as a feature vector on a database of 1000 images across 11 categories. Seven different transforms were tested, including DCT, DST, Haar, Walsh, Kekre, Slant, and Hartley. For each transform, precision and recall were calculated with and without including the DC component in the feature vector. The technique was tested on both gray and color versions of the database. In general, the technique produced higher precision and recall than using the full transform or simple row means, especially when including the DC component. For gray images, the best performing transforms were DST, Haar, Hartley, DCT,
EMG Investigations Regarding Handle Size, Grip Force and Stroke Rotation In S...Waqas Tariq
The present study investigated the effect of handle size (35mm and 40mm), grip type (loose grip and tight grip) and supine stroke rotation (30 ? , 45 ? and 60 ? ) on electromyography i.e. EMG activity of forearm muscles for a screwing task in an experimental simulation. The eight participants performed the screw driving task for a 2 minutes duration (supination). The EMG activities of forearm muscles were recorded during this task. The muscles selected for EMG recording were FCR, FCU, FDS and ECRB muscles. The results showed that the flexor muscles were more activated than extensor muscles. Among giving conditions, 40mm handle size using loose grip with 60 ? stroke was most comfortable.
Mining of Prevalent Ailments in a Health Database Using Fp-Growth AlgorithmWaqas Tariq
Health databases are characterised by large number of attributes such as personal biological and diagnosis information, health history, prescription, billing information and so on. The increasing need for providing enhanced medical system has necessitated the need for adopting an efficient data mining technique for extracting hidden and useful information from health database. In the past, many data mining algorithms such as Apriori, Eclat, H-Mine have been developed with deficiency in time-space trade off. In this work, an enhanced FP-growth frequent pattern mining algorithm coined FP-Ail is applied to students’ health database with a view to provide information about prevalent ailments and suggestions for managing the identified ailments. FP-Ail is tested on a student’s health database of a tertiary institution in Nigeria and the results obtained could be used by the management of the health centre for enhanced strategic decision making about health care. FP-Ail also provides the possibility to refine the minimum support threshold interactively, and to see the changes instantly.
Design Mathematical Tunable Gain PID-Like Sliding Mode Fuzzy Controller With ...Waqas Tariq
In this study, a mathematical tunable gain model free PID-like sliding mode fuzzy controller (GTSMFC) is designed to rich the best performance. Sliding mode fuzzy controller is studied because of its model free, stable and high performance. Today, most of systems (e.g., robot manipulators) are used in unknown and unstructured environment and caused to provide sophisticated systems, therefore strong mathematical tools (e.g., nonlinear sliding mode controller) are used in artificial intelligent control methodologies to design model free nonlinear robust controller with high performance (e.g., minimum error, good trajectory, disturbance rejection). Non linear classical theories have been applied successfully in many applications, but they also have some limitation. One of the best nonlinear robust controller which can be used in uncertainty nonlinear systems, are sliding mode controller but pure sliding mode controller has some disadvantages therefore this research focuses on applied sliding mode controller in fuzzy logic theory to solve the limitation in fuzzy logic controller and sliding mode controller. One of the most important challenging in pure sliding mode controller and sliding mode fuzzy controller is sliding surface slope. This paper focuses on adjusting the gain updating factor and sliding surface slope in PID like sliding mode fuzzy controller to have the best performance and reduce the limitation.
Novel Navigation Strategy Study on Autonomous Mobile RobotsWaqas Tariq
Potential field method bas been widely used in obstacle avoidance for mobile robots because of its elegance and simplicity. However, this method has inherent drawbacks. Considering this, this paper introduces a new behaviour-based navigation strategy. Aiming at a mobile robot SDLG-1 developed by the authors, the kinematics model is built based on its motion structure. Using twelve sonar sensors, the strategy algorithm of behaviour-based navigation control is brought forth. Based on the algorithm, software simulations and experimental evaluations have been conducted. Both results indicate the navigation strategy proposed in this paper is effective.
Evaluation of QoS based Web- Service Selection Techniques for Service Composi...Waqas Tariq
This document discusses quality of service (QoS) based techniques for selecting web services for service composition. It begins by providing background on service-oriented computing and defining service composition. The document then reviews three approaches to web service selection: functional, non-functional, and user-based. It focuses on non-functional (QoS-based) service selection, describing the specifications of QoS-based service selection techniques, including QoS modeling, categorization, user preferences, evaluation criteria, and aggregating evaluation results. The document aims to evaluate various QoS-based service selection techniques and identify criteria for comparing them.
Intervention of Ergonomics in Hand Driven Cotton Spinning OperationWaqas Tariq
Cotton spinning is an important operation in small scale and cottage textile industries in India. A large number of women workers in these industries perform cotton spinning task adopting squatting posture in traditional workshops.. Forty operators were questioned regarding work related musculoskeletal disorders WMSDs. Among the operators, severe cervical and lumber joint problems along with knee, joint pains and shoulders were more prevalent compared to other body regions. Based on the problems found, a new workstation was developed and ten operators were asked to work in the same workstation. Certain aspects regarding the ergonomic evaluation for those workers are discussed in this study. They were observed and evaluated with the RULA technique and there opinion on the improvement was asked based on the task, most frequent, they performed. It is revealed that the suggested workstation improves working posture and results in reduced postural stress on operators’ bodies and, consequently, reduce prevalence of MSDs symptoms.
Attitude Formation of Benefits Satisfaction: Knowledge and Fit of BenefitsWaqas Tariq
Using the theoretical framework of the Theory of Reasoned Action [6], we examine benefits satisfaction as an attitude formed by the beliefs about benefits (i.e., benefits knowledge) and the perceived value of these benefits (i.e., fit of benefits to individual needs). We use questionnaires to gather data from a random sample of 591 employees in a large county agency in the South-eastern United States. The data support that knowledge of benefits is associated with enhanced benefits satisfaction and mediates the effect of explanations about benefits on satisfaction. The results provide strong evidence that benefits perceived to suit employee needs generate highest benefits satisfaction. Employees satisfied with their benefits are less likely to consider leaving the organization. The tested model is a starting point for future studies to apply the extended Theory of Reasoned Action [1] and incorporate perceived behavioural control and subjective norms (i.e., co-workers’ attitudes) in forming benefits satisfaction. Understanding employees’ affective and cognitive reactions to compensation, including benefits, can render better practices. Companies should use information campaigns to improve employee beliefs about benefits. Better attentiveness to individual needs and preferences can maximize the utility of a benefits plan and improve its acceptance. We replicate and extend past research in a parsimonious model of benefits satisfaction with a random sample of public sector employees.
An Experimental Study of the Effect of Partial Premixing Level on the Interac...Waqas Tariq
Flame kernels in spark-ignited combustion systems dominate the flame propagation and combustion stability, performance and emissions. The aim of the present work is to investigate the flow field associated with flame kernel propagation history in partial premixing natural gas turbulent flames. The main parameters under investigation are the degree of partial premixing and jet velocity. Three different degrees of partial premixing and five values of jet velocity between10 and 20 m/s have been selected for the present work at an equivalence ratio of 2. The mean flow field and turbulence intensity are measured using two-dimensional Planar Imaging Velocimetry (PIV). A pulsed Nd: YAG laser is used for flame ignition. The turbulent flow field is captured after the ignition at several time intervals between, 150, and 2500 ?s after ignition. The results show that the flame kernel does not show any significant effect on the scale of mean flow field. On the other hand, the flame kernel increases the global turbulence intensity in flames in comparison with the isothermal cases. The flame kernel propagation is associated with a steep increase in the centerline turbulence intensity of the jet flow. An increase in the degree of partial premixing and/or the jet velocity increases the centerline turbulence intensity accompanying the flame kernel propagation. This leads to break-up of the degree of partial premixing of the flame structure, and hence, decreased flame stability. Also, the higher the degree of partial premixing or the higher the jet velocity leads to more rapid flame kernel extinction. The results show that the rate of flame kernel propagation is very fast at the early stage of the kernel propagation up to the first 300 ?s and then it slows down afterwards.
The Identification Level of Security, usability and Transparency Effects on T...Waqas Tariq
This paper presents an Expert E-Commerce Trust System (EECTS), showing a possibility to confidence e-business processes by Adaptive Neuro-Fuzzy Inference Systems. The research has empirically tested the critical factors that influence an individual’s decision in the process of buying products or services online. The proposed model applies Adaptive Neuro-Fuzzy model to converging business processes to get the desired results. The system is adaptive since it uses neural network learning ability for its adaptation. The results of this study show that the security, web site design and familiarity, directly influence user’s trust in e-businesses since these factors lie the closest to the user and are deciding factors for the users and influence their decisions regarding transactions in e-commerce. These results can be of importance for vendors since they show how the customers perceive trust and which factors can directly influence their trust in a vendor and their experience with e-commerce and that the factors can play a deciding role on whether or not a customer will make a purchase. The study also provides a device for sellers to improve their commercial websites. The data was collected via interviews, surveys and B2C websites. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was used to analyze the generated factors in the model. New method was compared with previous Expert E-Commerce Trust System (EECTS) that developed by Fuzzy Logic system too.
Offering A Model Of Evaluation Of Trust Suggesting Between Customers And E-St...Waqas Tariq
to succeed in the e-commerce depends on lots of factors; one of the important and vital ones is trust. In this Paper, we will suggest a model of Fuzzy Logical System which depicts some of the hidden relationships between the critical factors such as security, familiarity, and designing in a B2C commercial website on the one hand, and the competitive factor to other competitors on the other hand. We are going to find the impact of these factors on the decision-making process of people to buy through the B2C commercial websites, and we also will analyze how these factors influence the results of the B2C trading. The study also provides a device to sellers in order to improve their commercial websites; in addition, it provides on-line customers a helping device to buy through the commercial websites. In the study, the sample in the first questionnaire was the investigation of experts of e-commerce, and in the second one was the customers of commercial websites. Also, we have used the Expert Choice software to determine the priority of factors in the first questionnaire, and the SPSS and Excel software for sampling and analysis procedures to find the Fuzzy rules. Finally, we used the Fuzzy logical kit in the MATLAB software to analyze the factors which generate the model.
Machine learning based recommender system for e-commerceIAESIJAI
Nowadays, e-commerce is becoming an essential part of business for many reasons, including the simplicity, availability, richness and diversity of products and services, flexibility of payment methods and the convenience of shopping remotely without losing time. These benefits have greatly optimized the lives of users, especially with the technological development of mobile devices and the availability of the Internet anytime and anywhere. Because of their direct impact on the revenue of e-commerce companies, recommender systems are considered a must in this field. Recommender systems detect items that match the customer's needs based on the customer's previous actions and make them appear in an interesting way. Such a customized experience helps to increase customer engagement and purchase rates as the suggested items are tailored to the customer's interests. Therefore, perfecting recommendation systems that allow for more personalized and accurate item recommendations is a major challenge in the e-marketing world. In our study, we succeeded in developing an algorithm to suggest personal recommendations to customers using association rules via the Frequent-Pattern-Growth algorithm. Our technique generated good results with a high average probability of purchasing the next product suggested by the recommendation system.
IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...IRJET Journal
This document presents a proposed system architecture for implementing a social customer relationship management (CRM) system for an online grocery shopping platform using customer reviews and sentiment analysis. The proposed architecture involves collecting customer reviews from social media, preprocessing and analyzing the data using natural language processing techniques like stemming, and storing the results in a database. Sentiment analysis is performed to categorize reviews by aspects and sentiment. The analyzed data is then presented to users through an interface to help the online grocery shopping platform better understand customer needs and improve products/services based on feedback.
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...IRJET Journal
The document discusses implementing a social customer relationship management (CRM) system for an online grocery shopping platform using customer reviews. It proposes collecting customer reviews from social media and other sources, refining the data, analyzing it using natural language processing and machine learning techniques, and storing the results in a database. This would allow the platform to better understand customer sentiment and needs to improve products, services and the customer experience.
This document discusses tips and tricks for successful ecommerce integration. It emphasizes finding where your current ecommerce capabilities are, addressing any issues with your existing systems, and establishing the right team and stakeholder support. It also stresses the importance of user-friendly design, data synchronization across systems, and establishing automatic interactions between different parts of the ecommerce process. The overall goal is to streamline the flow of information to provide a seamless customer experience and real-time access to key business data.
ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...Nathan Mathis
This document presents an architecture and prototype for integrating point of sale (POS) terminals with financial institutions through web services. Currently, POS terminals communicate directly with local financial institutions via dedicated lines, limiting vendors' flexibility. The proposed architecture allows POS transactions over the internet using web services. This gives vendors more freedom to choose providers globally and negotiate better rates. A literature review covers conventional POS payment methods and the benefits of web services. The document then presents the developed prototype and architecture in detail, evaluating its ability to provide competitive transaction fees and performance to existing methods while increasing vendor flexibility.
The document is a study report on customer expectations from online marketing with respect to Flipkart.com. It includes:
1. An acknowledgement section thanking the guiding professor and institution.
2. An executive summary briefly outlining that the study analyzes customer expectations from Flipkart's online marketing techniques and concludes they have made online shopping simple and attracted more customers.
3. An industry analysis section covering the history and development of e-commerce globally and in India, including statistics on market size and key players.
How analytical hierarchy process prioritizing internet banking influencing fa...IJECEIAES
Internet banking is a method for conducting financial transactions online that makes use of the internet as a platform. Customers could transact at any time and from any location. Numerous aspects relating to the adoption of internet banking have been analyzed and studied in recent in-depth studies from the literature. This paper will merge these numerous predefined factors into a model by drawing on the various ideas related to the acceptance model. It was decided to adapt the analytical hierarchy process (AHP) method for finding the important numerous components for the model. The finest mathematical calculation method is AHP, which enables decision-makers to prioritize their ranking in order to satisfy various criteria. The goal of this research is to rank the elements that influence the use of online banking. Three main factors such as technical information, website and service availability were chosen as the main factors of the model based on the literature review. Sub-factors such as ease of use, responsiveness, privacy, reliability, security, communication and efficiency were also suggested and combined into a single integrated framework. Utilizing the systematic literature review (SLR) methodology, several factors were found. As a result, the article will enhance understanding of the unique elements supporting the adoption of internet banking.
Designing an Agent for Information Extraction from Persian E-shopsTELKOMNIKA JOURNAL
E-shops are among the most conventional applications of Electronic Commerce. In these shops,
the buyers search for their goods through key words or classifications and read the product description
provided by the sellers. Though, when the number of items is high, this gets to be difficult for the users. On
the one hand, there are too many e-shops, and browsing in these shops to find the best and most
appropriate goods is a difficult and time-consuming process. On the other hand, product descriptions are
not the same in different websites, and there are different product forms. This study investigates about
products and sellers in various websites based on the conditions and user requirements through software
agents which present the extracted information in the form of a table to the users which enables them to
compare prices and each seller’s conditions without spending too much time for browsing. Using this
method increases precision and recall indices comparing to a conventional user browsing
IRJET- E-Commerce Recommender System using Data Mining AlgorithmsIRJET Journal
This document summarizes a research paper that proposes improvements to recommender systems for e-commerce businesses. It addresses issues like limited product availability, new customers with no purchase history, and timeliness of data. The authors propose a hybrid algorithm using collaborative filtering to recommend limited products, and a random algorithm to recommend products to new customers based on other customers with similar interests. The system was developed using ASP.NET, C#, and SQL Server. Experimental results showed the approaches helped address cold start situations and provide personalized recommendations. The authors conclude the techniques can improve e-commerce business efficiency and effectiveness.
Enterprise Information SystemsTopic .docxkhanpaulita
Enterprise Information Systems
Topic 6 – Overview
Topic’s learning objectives:
· Yunnan Lucky Air Case Study
· An Empirical Study in Selecting Enterprise Resource Planning Systems
6.1 Yunnan Lucky Air Case Study
Read the case study ‘E-commerce at Yunnan Lucky Air’ by Berenguer et al 2008 and answer the following questions. The article can be found on the module website.
Questions:
i. Why is it important for Lucky Air to be a leader in IT?
ii. Consider that you worked for Yunnan Lucky Air in a role that involved technology and strategy. You have been asked to outline their future IT strategy to best utilize Web 2.0. Based on the information presented in the case study and the course material what solutions would you rcommend?
iii. Some of the advantages of using Paypal for an airline have been discussed. What could be the disadvantages?
iv. Based on what is discussed in the article and the course material how can the conversion rates of browsing and researching online be improved with a better CRM?
(
Pause for thought
Yunnan Lucky Air operated as a low cost carrier modelling itself on the American airline Soutwest. Does this mean it should also model its
IT
on Soutwest or should
it
customise it to their environment?
)
6.2 An empirical study in selecting Enterprise Resource Planning Systems
Read the case study ‘An empirical study in selecting Enterprise Resource Planning Systems Article: The relation between some of the variables involve on it. Size and Investment.’ by Pacheco-Comer and Gonzalez-Castolo, 2012, and answer the following questions. The article can be found on the module website.
Questions:
i. Explain the ‘ERP anatomy’ illustrated in figure 1. Are there alternative anatomies of an ERP?
ii. What were the empirical goals of this survey? Would you add anything to these?
iii. What were the findings of this research? Does this agree with other research on this topic?
(
Pause for thought
We have seen in a number of articles how the size of an organization impacts the choice and implementation of an ERP. We have also seen in the Lucky Air case study how IT may be important strategically. Do you believe that it is the size of the company or the
business strategy that is the deciding factor for the MIS strategy?
)
Further reading
Rainer R.K., Watson H.J. (2012) Management Information Systems: Moving Business Forward, Wiley.
Gunasekaran, A., Shea, T. (2009) Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments: IGI Global
Motiwalla, L. And Thompson, J. (2012) Enterprise Systems for Management: International Version, 2/E, Pearson Higher Education
Magal, S. R. and Word, J. (2012) Integrated Business Processes with ERP Systems, Wiley Plus course
Cruz-Cunha, M. M. (2009) Social, Managerial, and Organizational Dimensions of Enterprise Information Systems, IGI Global
Obrien, J. and Marakas G. (2007): ‘Enterprise Information Systems’.
“Electronic Shopping Website with Recommendation System”IRJET Journal
This paper proposes a recommendation system for a small e-commerce retailer. It discusses the challenges small retailers face in implementing sophisticated recommendation algorithms like large companies due to limited computing resources and data. The proposed system aims to develop an effective recommendation model that can work with modest system requirements and entire available data. It analyzes customer behavior features to generate personalized product recommendations close to customer preferences. The system architecture and technical requirements are outlined. Experimental results showed better performance than other systems. Future work could involve collecting customer feedback to improve the system.
This document discusses drivers of internet shopping based on a study conducted by the authors. The study applied a behavioral model to identify key factors influencing online purchasing. A survey was conducted with over 700 respondents to assess intentions and actual shopping behavior. The results showed that facilitating conditions, like site accessibility and transaction efficiency, had a stronger influence on shopping behavior than intentions alone. Intentions were influenced most by perceived consequences like cheaper prices and security concerns. The findings provide implications for improving online shopping strategies and site design.
This document discusses e-retailing in India and provides an overview of how to start an e-retailing business. It defines different types of e-commerce models like B2C, B2B, C2C, and m-commerce. To start an e-retailing venture, one needs a unique product idea, a solid business plan, technology infrastructure like a website and payment gateway, and back-office systems to manage orders, inventory, and customers. The document outlines the key steps in an online shopping process from a customer finding a website, selecting products, making a payment through a gateway, and receiving order confirmation and delivery.
Product Comparison Website using Web scraping and Machine learning.IRJET Journal
This document describes the development of a product comparison website using web scraping and machine learning techniques. The website extracts data like price, features and ratings from multiple e-commerce websites using web scraping. A machine learning algorithm then compares the collected data and provides personalized recommendations to users. The implementation demonstrated that web scraping is effective for collecting product data for comparison. Future work may involve incorporating deep learning models and external data sources to improve recommendations.
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
Running head: PROJECT PLAN INCEPTION 1
PROJECT PLAN INCEPTION 2
Information Technology and Business
Babatunde Ogunade
CIS499: Information System Capston
Professor Reddy Urimindi
October 13, 2019
Information Technology and Business
Project Introduction
The very core operation of this company involves the collection and analysis of data through a currently limited technological infrastructure. The basis of this business may focus on leadership structure, the type of industry, business culture, core vision and mission including objectives. The company has a Chief Executive Officer (CEO) as the highest rank, four Information Technology experts and other employees. Marketing can, therefore, categorize this company as a service industry company with a core vision of a 60 percent growth in the next eighteen months and mission of redesigning its information technology to fulfill its organizational needs.
Product features, new market product, differentiation techniques, and value addition defines the type of business which the company is operating. The assessment of its product features which involves data indicate that the opportunities focus on marketing. In the continued operations of the company, the management is not foreseeing any shift from its original product but is rather fixing a differentiation technique within six months. An addition in product value should be achieved by employing an exclusively new technology based on a hybrid model, hosted solution or on-site solution.
The idea of integrating technologies from other partners to realize cost-effective outcomes and best operations outlines the outsourcing policies as far as new technology is concerned. Consequently, future intentions to acquire services such as Software-as-a-Service (SaaS) and cloud computing technologies may involve the adoption of knowledge and skills from outside the country, therefore, describing offshoring activities. As asserted by Aithal, (2017), the success of fulfilling the effective company operation, these activities are important.
One of the skilled personnel in the company is the Chief Information Officer (CIO) whose basic role is to keep a charge on the computer systems and information technology (IT) necessary in ensuring a company’s goals and objectives. Additionally, the CEO has devolved the responsibility of security protocols to the CIO in the process of more digitized frameworks. Other personnel includes the company CEO tasked with communicating to partners, creating the company mission and vision, and generally heading the implementation of both long term and short term objectives. The other information technician is mandated in both the installation and configuration of computer hardware and software.
Based on the current collection and analysis method, data on the customer, marketing, lifecycle, website engagement, and funnel analytics. In broad-spectrum, funnel analytics provide customer information through registration, ...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
The Job selection process in today’s globally competitive economy can be a daunting task for prospective
employees no matter their experience level. Although many years of research has been devoted to job
search and application resulting in good integration with information technology including the internet and
intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas
include the quality of jobs associated with applicants in the job search by profiling the needs of employers
against the needs of prospective employees and the security and verifications schemes integrated to reduce
the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography
technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and
increased security. With this in mind we propose the intelligent mobile agents instead of human agents to
perform the Job search using fuzzy preferences which is been published elsewhere and application
operations incorporating the use of agents with a trust authority to establish employer trust and validate
applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP
and Android to provide a robust, secure, user friendly solution.
Online job placement system project report.pdfKamal Acharya
Our project Expert.Com Job Placement System has been designed to help the millions of unemployed youth to get in touch with the major companies which would help them in getting the right kind of jobs and would also help the companies to get the appropriate candidates for appropriate jobs.
This document discusses enhancing CMS-based e-commerce solutions with cross-platform mobile apps. It covers the spiral model methodology, introduction to e-commerce including architecture and growth, content management systems including WordPress features, cross-platform mobile development frameworks, present mobile app market share, and developing a CMS-based e-commerce solution called "Muktopata" with both website and mobile app versions. The goal is to equip students with skills for e-commerce system development through lectures, tutorials, projects and research focusing on analysis, design, implementation and deployment techniques.
Similar to Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive Neuro-Fuzzy Inference System (20)
The Use of Java Swing’s Components to Develop a WidgetWaqas Tariq
Widget is a kind of application provides a single service such as a map, news feed, simple clock, battery-life indicators, etc. This kind of interactive software object has been developed to facilitate user interface (UI) design. A user interface (UI) function may be implemented using different widgets with the same function. In this article, we present the widget as a platform that is generally used in various applications, such as in desktop, web browser, and mobile phone. We also describe a visual menu of Java Swing’s components that will be used to establish widget. It will assume that we have successfully compiled and run a program that uses Swing components.
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
Camera mouse has been widely used for handicap person to interact with computer. The utmost important of the use of camera mouse is must be able to replace all roles of typical mouse and keyboard. It must be able to provide all mouse click events and keyboard functions (include all shortcut keys) when it is used by handicap person. Also, the use of camera mouse must allow users troubleshooting by themselves. Moreover, it must be able to eliminate neck fatigue effect when it is used during long period. In this paper, we propose camera mouse system with timer as left click event and blinking as right click event. Also, we modify original screen keyboard layout by add two additional buttons (button “drag/ drop” is used to do drag and drop of mouse events and another button is used to call task manager (for troubleshooting)) and change behavior of CTRL, ALT, SHIFT, and CAPS LOCK keys in order to provide shortcut keys of keyboard. Also, we develop recovery method which allows users go from camera and then come back again in order to eliminate neck fatigue effect. The experiments which involve several users have been done in our laboratory. The results show that the use of our camera mouse able to allow users do typing, left and right click events, drag and drop events, and troubleshooting without hand. By implement this system, handicap person can use computer more comfortable and reduce the dryness of eyes.
A Proposed Web Accessibility Framework for the Arab DisabledWaqas Tariq
The Web is providing unprecedented access to information and interaction for people with disabilities. This paper presents a Web accessibility framework which offers the ease of the Web accessing for the disabled Arab users and facilitates their lifelong learning as well. The proposed framework system provides the disabled Arab user with an easy means of access using their mother language so they don’t have to overcome the barrier of learning the target-spoken language. This framework is based on analyzing the web page meta-language, extracting its content and reformulating it in a suitable format for the disabled users. The basic objective of this framework is supporting the equal rights of the Arab disabled people for their access to the education and training with non disabled people. Key Words : Arabic Moon code, Arabic Sign Language, Deaf, Deaf-blind, E-learning Interactivity, Moon code, Web accessibility , Web framework , Web System, WWW.
Real Time Blinking Detection Based on Gabor FilterWaqas Tariq
The document proposes a new method for real-time blinking detection based on Gabor filters. It begins by reviewing existing methods and their limitations in dealing with noise, variations in eye shape, and blinking speed. The proposed method uses a Gabor filter to extract the top and bottom arcs of the eye from an image. It then measures the distance between these arcs and compares it to a threshold: a distance below the threshold indicates a closed eye, while a distance above indicates an open eye. The document claims this Gabor filter-based approach is robust to noise, variations in eye shape and blinking speed. It presents experimental results showing the method can accurately detect blinking across different users.
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Waqas Tariq
A method for computer input with human eyes-only using two Purkinje images which works in a real time basis without calibration is proposed. Experimental results shows that cornea curvature can be estimated by using two light sources derived Purkinje images so that no calibration for reducing person-to-person difference of cornea curvature. It is found that the proposed system allows usersf movements of 30 degrees in roll direction and 15 degrees in pitch direction utilizing detected face attitude which is derived from the face plane consisting three feature points on the face, two eyes and nose or mouth. Also it is found that the proposed system does work in a real time basis.
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Waqas Tariq
Mobile multimedia service is relatively new but has quickly dominated people¡¯s lives, especially among young people. To explain this popularity, this study applies and modifies the Technology Acceptance Model (TAM) to propose a research model and conduct an empirical study. The goal of study is to examine the role of Perceived Enjoyment (PE) and what determinants can contribute to PE in the context of using mobile multimedia service. The result indicates that PE is influencing on Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) and directly Behavior Intention (BI). Aesthetics and flow are key determinants to explain Perceived Enjoyment (PE) in mobile multimedia usage.
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
The main aim of this paper is to build a system that is capable of detecting and recognizing the hand gesture in an image captured by using a camera. The system is built based on Altera’s FPGA DE2 board, which contains a Nios II soft core processor. Image processing techniques and a simple but effective algorithm are implemented to achieve this purpose. Image processing techniques are used to smooth the image in order to ease the subsequent processes in translating the hand sign signal. The algorithm is built for translating the numerical hand sign signal and the result are displayed on the seven segment display. Altera’s Quartus II, SOPC Builder and Nios II EDS software are used to construct the system. By using SOPC Builder, the related components on the DE2 board can be interconnected easily and orderly compared to traditional method that requires lengthy source code and time consuming. Quartus II is used to compile and download the design to the DE2 board. Then, under Nios II EDS, C programming language is used to code the hand sign translation algorithm. Being able to recognize the hand sign signal from images can helps human in controlling a robot and other applications which require only a simple set of instructions provided a CMOS sensor is included in the system.
An overview on Advanced Research Works on Brain-Computer InterfaceWaqas Tariq
A brain–computer interface (BCI) is a proficient result in the research field of human- computer synergy, where direct articulation between brain and an external device occurs resulting in augmenting, assisting and repairing human cognitive. Advanced works like generating brain-computer interface switch technologies for intermittent (or asynchronous) control in natural environments or developing brain-computer interface by Fuzzy logic Systems or by implementing wavelet theory to drive its efficacies are still going on and some useful results has also been found out. The requirements to develop this brain machine interface is also growing day by day i.e. like neuropsychological rehabilitation, emotion control, etc. An overview on the control theory and some advanced works on the field of brain machine interface are shown in this paper.
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Waqas Tariq
There is growing ageing phenomena with the rise of ageing population throughout the world. According to the World Health Organization (2002), the growing ageing population indicates 694 million, or 223% is expected for people aged 60 and over, since 1970 and 2025.The growth is especially significant in some advanced countries such as North America, Japan, Italy, Germany, United Kingdom and so forth. This growing older adult population has significantly impact the social-culture, lifestyle, healthcare system, economy, infrastructure and government policy of a nation. However, there are limited research studies on the perception and usage of a mobile phone and its service for senior citizens in a developing nation like Malaysia. This paper explores the relationship between mobile phones and senior citizens in Malaysia from the perspective of a developing country. We conducted an exploratory study using contextual interviews with 5 senior citizens of how they perceive their mobile phones. This paper reveals 4 interesting themes from this preliminary study, in addition to the findings of the desirable mobile requirements for local senior citizens with respect of health, safety and communication purposes. The findings of this study bring interesting insight to local telecommunication industries as a whole, and will also serve as groundwork for more in-depth study in the future.
Principles of Good Screen Design in WebsitesWaqas Tariq
Visual techniques for proper arrangement of the elements on the user screen have helped the designers to make the screen look good and attractive. Several visual techniques emphasize the arrangement and ordering of the screen elements based on particular criteria for best appearance of the screen. This paper investigates few significant visual techniques in various web user interfaces and showcases the results for better understanding and their presence.
This document discusses the progress of virtual teams in Albania. It provides context on virtual teams and how they differ from traditional teams in their reliance on technology for communication across distances. The document then examines the use of virtual teams in Albania, noting the growing infrastructure and technology usage that enables virtual collaboration. It highlights some virtual team examples in Albanian government and academic projects.
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
It is a well established fact that the Web-Applications require frequent maintenance because of cutting– edge business competitions. The authors have worked on quality evaluation of web-site of Indian ecommerce domain. As a result of that work they have made a quality-wise ranking of these sites. According to their work and also the survey done by various other groups Futurebazaar web-site is considered to be one of the best Indian e-shopping sites. In this research paper the authors are assessing the maintenance of the same site by incorporating the problems incurred during this evaluation. This exercise gives a real world maintainability problem of web-sites. This work will give a clear picture of all the quality metrics which are directly or indirectly related with the maintainability of the web-site.
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...Waqas Tariq
A paradox has been observed whereby web site usability is proven to be an essential element in a web site, yet at the same time there exist an abundance of web pages with poor usability. This discrepancy is the result of limitations that are currently preventing web developers in the commercial sector from producing usable web sites. In this paper we propose a framework whose objective is to alleviate this problem by automating certain aspects of the usability evaluation process. Mainstreaming comes as a result of automation, therefore enabling a non-expert in the field of usability to conduct the evaluation. This results in reducing the costs associated with such evaluation. Additionally, the framework allows the flexibility of adding, modifying or deleting guidelines without altering the code that references them since the guidelines and the code are two separate components. A comparison of the evaluation results carried out using the framework against published evaluations of web sites carried out by web site usability professionals reveals that the framework is able to automatically identify the majority of usability violations. Due to the consistency with which it evaluates, it identified additional guideline-related violations that were not identified by the human evaluators.
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Waqas Tariq
A robot arm utilized having meal support system based on computer input by human eyes only is proposed. The proposed system is developed for handicap/disabled persons as well as elderly persons and tested with able persons with several shapes and size of eyes under a variety of illumination conditions. The test results with normal persons show the proposed system does work well for selection of the desired foods and for retrieve the foods as appropriate as usersf requirements. It is found that the proposed system is 21% much faster than the manually controlled robotics.
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorWaqas Tariq
In recent decades speech interactive systems have gained increasing importance. Performance of an ASR system mainly depends on the availability of large corpus of speech. The conventional method of building a large vocabulary speech recognizer for any language uses a top-down approach to speech. This approach requires large speech corpus with sentence or phoneme level transcription of the speech utterances. The transcriptions must also include different speech order so that the recognizer can build models for all the sounds present. But, for Telugu language, because of its complex nature, a very large, well annotated speech database is very difficult to build. It is very difficult, if not impossible, to cover all the words of any Indian language, where each word may have thousands and millions of word forms. A significant part of grammar that is handled by syntax in English (and other similar languages) is handled within morphology in Telugu. Phrases including several words (that is, tokens) in English would be mapped on to a single word in Telugu.Telugu language is phonetic in nature in addition to rich in morphology. That is why the speech technology developed for English cannot be applied to Telugu language. This paper highlights the work carried out in an attempt to build a voice enabled text editor with capability of automatic term suggestion. Main claim of the paper is the recognition enhancement process developed by us for suitability of highly inflecting, rich morphological languages. This method results in increased speech recognition accuracy with very much reduction in corpus size. It also adapts Telugu words to the database dynamically, resulting in growth of the corpus.
An Improved Approach for Word Ambiguity RemovalWaqas Tariq
Word ambiguity removal is a task of removing ambiguity from a word, i.e. correct sense of word is identified from ambiguous sentences. This paper describes a model that uses Part of Speech tagger and three categories for word sense disambiguation (WSD). Human Computer Interaction is very needful to improve interactions between users and computers. For this, the Supervised and Unsupervised methods are combined. The WSD algorithm is used to find the efficient and accurate sense of a word based on domain information. The accuracy of this work is evaluated with the aim of finding best suitable domain of word. Keywords: Human Computer Interaction, Supervised Training, Unsupervised Learning, Word Ambiguity, Word sense disambiguation
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
From the existing research it has been observed that many techniques and methodologies are available for performing every step of Automatic Speech Recognition (ASR) system, but the performance (Minimization of Word Error Recognition-WER and Maximization of Word Accuracy Rate- WAR) of the methodology is not dependent on the only technique applied in that method. The research work indicates that, performance mainly depends on the category of the noise, the level of the noise and the variable size of the window, frame, frame overlap etc is considered in the existing methods. The main aim of the work presented in this paper is to use variable size of parameters like window size, frame size and frame overlap percentage to observe the performance of algorithms for various categories of noise with different levels and also train the system for all size of parameters and category of real world noisy environment to improve the performance of the speech recognition system. This paper presents the results of Signal-to-Noise Ratio (SNR) and Accuracy test by applying variable size of parameters. It is observed that, it is really very hard to evaluate test results and decide parameter size for ASR performance improvement for its resultant optimization. Hence, this study further suggests the feasible and optimum parameter size using Fuzzy Inference System (FIS) for enhancing resultant accuracy in adverse real world noisy environmental conditions. This work will be helpful to give discriminative training of ubiquitous ASR system for better Human Computer Interaction (HCI). Keywords: ASR Performance, ASR Parameters Optimization, Multi-Environmental Training, Fuzzy Inference System for ASR, ubiquitous ASR system, Human Computer Interaction (HCI)
Interface on Usability Testing Indonesia Official Tourism WebsiteWaqas Tariq
Ministry of Tourism and Creative Economy of The Republic of Indonesia must meet the wide audience various needs and should reach people from all levels of society around the world to provide Indonesia tourism and travel information. This article will gives the details in the evolution of one important component of Indonesia Official Tourism Website as it has grown in functionality and usefulness over several years of use by a live, unrestricted community. We chose this website to see the website interface design and usability and to popularize Indonesia tourism and travel highlights. The analysis done by looking at the criteria specified for usability testing. Usability testing measures are the ease of use (effectiveness, efficiency, consistency and interface design), easy to learn, errors and syntax which is related to the human computer interaction. The purpose of this article is to test the usability level of the website, analyze the website interface design, and provide suggestions for improvements in Indonesia Official Tourism Website of analysis we have done before.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive Neuro-Fuzzy Inference System
1. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 1
Propose a Model for Customer Purchase Decision in B2C
Websites Using Adaptive Neuro-Fuzzy Inference System
Mehrbakhsh Nilashi Nilashidotnet@yahoo.com
Computer Engineering Department
Islamic Azad University of Roudsar and Amlash
Roudsar, Iran
Mohammad Fathian Fathian@iust.ac.ir
Associate Professor, School of Industrial Engineering
Iran University of Science & Technology
Tehran,Iran
Mohammad Reza Gholamian Gholamian@iust.ac.ir
Assistant Professor, School of Industrial Engineering
Iran University of Science & Technology
Tehran, Iran
Othman Bin Ibrahim Othmanibrahim@utm.my
Faculty of Computer Science and Information Systems
University Teknologi Malaysia
Johor , Malaysia
Abstract
If companies are to enjoy long-term success in the Internet marketplace, they must effectively
manage the complex, multidimensional process of building online consumer trust. The online
environment and the quality and usability of websites help the browser and consumer to be
attracted and accessible to the information and the product and services available online. In this
Paper a new model would be suggested based on neuro-fuzzy System which depicts some of the
hidden relationships between the critical factors such as security, familiarity, and designing in a
B2C commercial website on other hand, and the competitive factor to other competitors on other
hand. Then, the impacts of these factors on purchasing decision of consumers in B2C
commercial websites are extracted. We are going to find the impact of these factors on the
decision-making process of people to buy through the B2C commercial websites, and we also will
analyze how these factors influence the results of the B2C trading. The study also provides a
device for sellers to improve their commercial websites. Two questionnaires were used in this
study. The first questionnaire was developed for e-commerce experts, and the second one was
designed for the customers of commercial websites. Also, Expert Choice is used to determine the
priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the
Fuzzy rules. Finally, the Fuzzy logical kit was use to analyze the generated factors in the model.
Keywords: Anfis, Clustering, E-commerce, Trust, Rules.
1. INTRODUCTION
The lack of trust in different components of the most e-commerce applications is known as one of
the main reasons which may lead to some e-commerce companies to fail [3, 4].
If companies are to enjoy long-term success in the online market place, they must effectively
manage the complex, multidimensional process of building online consumer trust. Trust exists in
many forms, across multiple domains, and at variety of levels [8].
2. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 2
Trust, according to Fukuyama, is the lubricant of trade and, this way, determines the wealth of
nations. The relative paucity of regulations and customs on the internet makes consumer
familiarity and trust especially important in the case of e-commerce [9]. Yet the lack of an
interpersonal exchange and the one-time nature of the typical business transaction on the
internet make the unique conditions on this kind of consumer trust, because trust relates to the
other people and this nourished through interactions with them [10].
Trust is an interpersonal determinant of behavior that deals with beliefs about the integrity,
benevolence, ability and predictability of other people [11]. However, in contrast of face-to-face
commerce and other applications of trust in the literature, there are typically no interpersonal
interactions in e-commerce directly or implied. Such interactions, or even cues relating to them,
are notably missing from e-commerce website [12].
The detailed information on trust and the security system that is implemented by companies for
secure transactions are important attributes in B2C e-commerce. According to Lightner the
rewards of B2C e-commerce are realized partially through well-designed websites, since they act
as the primary contact with customers. There are some factors for consumers trust in online
buying when they plan to buy, and also there are more factors and matter of interactions when
they are on the buying process in online and after one[13].
Website designers must consider factors, in a website allowing the emergence of confidence
between an online seller and a customer. A website is the first factor that influences on the
reliability of the seller into the mind of customer, and this strongly effect can affect on the initial
trust of customers [5, 7].
Lightner states, B2C websites allow companies to present their unique advantages, as long as
they provide the necessary services for customers. While there are many factors for determining
the success or failure of an e-commerce website, the service level provided for customers may
serve as an indication of user satisfaction in transaction with a website. The aim is to specify what
factors in the online environment really we should take in our main consideration and how online
customer services help to build trust step-by-step [13]. Singh says that it is also necessary for
customers to have trust in electronic commerce infrastructure and environment [14].
Marsh and Mitch in their plan, entitled as the Call to arms, have challenged the website designers
and asked them to think of this point that how they can easily make the trust possible between an
online website and its customers in the early stages of their partnership. They claim that websites
can be designed in a special fashion so that the trust not only becomes the indivisible part of the
plan, but also it can be considered as a further thought.
Furthermore, the decision about online purchase must be available based on the accurate and
correct information rather than focusing on the partial insight, general concepts and individual
experiences [1, 2].
Moreover, a lot of trust models have been presented. Most of them are mentally active, effect as
unclear and ambiguous confidence in e-commerce websites, and don’t involve the experience
and understanding of customers during performing online transactions [6].
Therefore, in summary, the following objectives are achievable:
• To identify trust factors between the customer and sale agents.
• To measure the effect of a factor on confidence in contrast to other factors by fuzzy logic.
• To identify factors or security components that considerably affects the customer
confidentiality upon the online purchase.
• To help customers when shopping online.
• To help designers of e-commerce website to use important factors in designing
commercial websites.
• To help online enterprises for finding the customer needs.
• To detect the level of transaction on a commercial website by the sale agency.
3. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 3
2. ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM (ANFIS)
In 1993 Roger Jang, suggested Adaptive Neuro Fuzzy Inference system (ANFIS). ANFIS can
serve as a basis for constructing a set of fuzzy ‘if-then’ rules with appropriate membership
functions to generate the stipulated input-output pairs. Here, the membership functions are tuned
to the input-output data and excellent results are possible.
Fundamentally, ANFIS is about taking an initial fuzzy inference (FIS) system and tuning it with a
back propagation algorithm based on the collection of input-output data. The basic structure of a
fuzzy inference system consists of three conceptual components: A rule base, which contains a
selection of fuzzy rules; a database, which defines the membership functions used in the fuzzy
rules; and a reasoning mechanism, which performs the inference procedure upon the rules and
the given facts to derive a reasonable output or conclusion [15].
These intelligent systems combine knowledge, techniques and methodologies from various
sources. They possess human-like expertise within a specific domain - adapt themselves and
learn to do better in changing environments. In ANFIS, neural networks recognize patterns, and
help adaptation to environments. Fuzzy inference systems incorporate human knowledge and
perform interfacing and decision-making. ANFIS is tuned with a back propagation algorithm
based on the collection of input–output data [15].
The adaptive network based fuzzy inference system (ANFIS) is a useful neural network approach
for the solution of function approximation problems [17]. An ANFIS gives the mapping relation
between the input and output data by using hybrid learning method to determine the optimal
distribution of membership functions [19]. Both artificial neural network (ANN) and fuzzy logic (FL)
are used in ANFIS architecture [18]. Such framework makes the ANFIS modeling more
systematic and less reliant on expert knowledge [16]. Basically, five layers are used to construct
this inference system. Each ANFIS layer consists of several nodes described by the node
function. The inputs of present layers are obtained from the nodes in the previous layers. To
illustrate the procedures of an ANFIS, for simplicity, it is assumed those two inputs (x, y) and one
output (fi) are used in this system. The rule base of ANFIS contains fuzzy if-then rules of Sugeno
type. For a first order two-rule Sugeno fuzzy inference system, the two rules may be stated as:
• Rule 1: If x is A1 and y is B1 then z is f1(x, y)
• Rule 2: If x is A2 and y is B2 then z is f2(x, y)
Where x and y are the inputs of ANFIS, A and B are the fuzzy sets fi (x, y) is a first order
polynomial and represents the outputs of the first order Sugeno fuzzy inference system[17].The
ANFIS architecture is shown in figure1. The circular nodes represent nodes that are fixed
whereas the square nodes are nodes that have parameters to be learnt [17].
Layer 1 Layer 2 Layer 3 Layer 4 Layer 5
1w 1w 11fw
X
∑ F
Y 2w 2w 22 fw
A1
A2
B1
B2
FIGURE 1: An ANFIS architecture for a two rule Sugeno system
4. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 4
A Two Rule Sugeno ANFIS has rules of the form:
111111 ryqxpfTHENBisyandAisxIf ++=
222222 ryqxpfTHENBisyandAisxIf ++=
For the training of the network, there is a forward pass and a backward pass. We now look at
each layer in turn for the forward pass. The forward pass propagates the input vector through the
network layer by layer. In the backward pass, the error is sent back through the network in a
similar manner to back propagation [20].
Layer 1:
The output of each node shown in equation 1:
2,1)(,1 =µ= iforxO iAi
4,3)(2,1 == −
iforyO iBi µ
So, the )(,1 xO i
is essentially the membership grade for x and y.
The membership functions could be anything but for illustration purposes we will use the bell
shaped function given by equation 2:
ib
i
i
A
a
cx
x 2
1
1
)(
−
+
=µ
Where iii cba ,, are parameters to be learnt. These are the premise parameters.
Layer 2:
Every node in this layer is fixed. This is where the t-norm is used to ‘AND’ the membership
grades - for example the product shown in equation 3:
2,1),()(,2 === iyxwO ii BAii µµ
Layer 3:
Layer 3 contains fixed nodes which calculate the ratio of the firing strengths of the rules shown in
equation 4:
21
,3
ww
w
wO i
ii
+
==
Layer 4:
The nodes in this layer are adaptive and perform the consequent of the rules shown in equation
5:
)(,4 iiiiiii ryqxpwfwO ++==
(1)
(2)
(3)
(4)
(5)
5. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 5
The parameters in this layer ( iii rqp ,, ) are to be determined and are referred to as the consequent
parameters
Layer 5
There is a single node here that computes the overall output shown in equation 6:
∑
∑
∑ ==
i i
i ii
i
i
ii
w
fw
fwO ,5
This then is how, typically, the input vector is fed through the network layer by layer. We now
consider how the ANFIS learns the premise and consequent parameters for the membership
functions and the rules.
There are a number of possible approaches but we will discuss the hybrid learning algorithm
proposed by Jang, Sun and Mizutani which uses a combination of Steepest Descent and Least
Squares Estimation (LSE).
It can be shown that for the network described if the premise parameters are fixed the output is
linear in the consequent parameters.
We split the total parameter set into three:
S = set of total parameters 1S = set of premise (nonlinear) parameters 2S = set of consequent
(linear) parameters
So, ANFIS uses a two pass learning algorithm:
Forward Pass: Here 1S is unmodified and 2S is computed using a LSE algorithm.
Backward Pass:
Here 2S is unmodified and 1S is computed using a gradient descent algorithm such as
backpropagation.
So, the hybrid learning algorithm uses a combination of steepest descent and least squares to
adapt the parameters in the adaptive network [17].
The summary of the process is given below:
The Forward Pass:
1. Present the input vector.
2. Calculate the node outputs layer by layer.
3. Repeat for all data A→ and y formed.
4. Identify parameters in 2S using Least Squares Compute the error measure for each
training pair.
(6)
6. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 6
Backward Pass:
1. Use steepest descent algorithm to update parameters in 1S (back propagation).
2. For given fixed values of 1S the parameters in 2S found by this approach are guaranteed
to be the global optimum point.
3. RESEARCH METHODOLOGY
The proposed model has been established based on this principle that each real level of
transactions in B2C websites includes two factors as follows:
1. Trust (T) level in B2C web site.
2. Competitive (C) in b2c web site for purchasing purposes.
Therefore, we propose to investigate into the truthfulness of the equations 7:
),(
),,(
2 CTGL
DFSHT
CB =
= (7)
The first part of equation 7 ( ),,( DFSHT = ) that has three inputs, S is as the level of security, F is
as the level of familiarity and D is as the level of design and Level of trust obtains of these three
parameters performance.
The second part of equation 7 ( ),(2 CTGL CB = ) that has two inputs, T is as the level of trust, and
D is as the level of design and Level of B2C obtains of these two parameters performance. Figure
2 shows the structure of trust model.
4. DATA COLLECTION AND ANALYSIS
This study used a web-based survey because of its advantages such as convenience; viable,
effective way to access difficult-to-reach respondents [7]. The selected population in this study
was included in two groups. The first group was included ten experts in the field of e-commerce
and the Second group was included 150 numbers of E-Commerce and IT students. The first
group completed the first questionnaire and after obtaining results from the first questionnaire and
the second group completed the second. After collecting answer of first questionnaire and finding
factors with higher priority, the second questionnaire was designed .it involves 4 major groups,
too the method of scoring was chosen based on the likert scale of 5 degrees and 18 given
questions in questionnaire were scored like 5 selections and in order of intensity of factor in each
group from 0 to 4, like (0) very low (1) low (2) moderate (3) high (4) very high. In this
questionnaire 16 questions are relative to 4 major groups, and 2 questions have been observed
relative to the trust level and b2c level of website. Determining the credit of questionnaire has
been done by counting kronbach's Alpha which has credit coefficient in accordance with table 1.
TABLE 1: The counted credit coefficient of second questionnaire
kronbach's alpha coefficient for each website
Parsim.comTobuy.irIrshop.ir
0.830.830.85
7. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 7
The inserted credit coefficient in table 1 shows the acceptance of second questionnaire credit.
After that customers referred to special website for experimental buying, it was asked the
respondents to analyze 3 websites as parsim.com, tobuy.ir, irshop.ir.
FIGURE 2: The structure of trust model.
During this process, they should answer some questions in security groups, familiarity groups,
design groups, competitiveness groups, and trust and b2c level.
Finally respondents should determine the trust level competitiveness and b2c level of website
after analyzing website and answering the questions.
The order of answering the questions is that first of all the respondents should analyze the
website and answer the questions in security groups, familiarity, design and then they were asked
8. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 8
Sub Security_Ind_Prot_Auth ()
Dim i as Integer
Dim col As Integer
Dim x as String
Worksheets ("security").Activate
For col = 2 To 6 Step 2
For i = 4 To 153 Step 1
Cells (i, col).Select
ActiveCell.Value = Trim ((ActiveCell.Value))
If StrComp (ActiveCell.Value, "very low",
vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 0
End If
If StrComp (ActiveCell.Value, "low", vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 1
End If
If StrComp (ActiveCell.Value, "moderate", vbTextCompare) = 0
Then
ActiveCell.Offset (0, 1).Value = 2
End If
If StrComp (ActiveCell.Value, "high", vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 3
End If
If StrComp (ActiveCell.Value, "very high", vbTextCompare) = 0
Then
ActiveCell.Offset (0, 1).Value = 4
End If
Next i
Next col
End Sub
to count the trust level and after that the it was weighted respondents were asked to evaluate the
selective website for b2c dealings based on their expectation level of trust and competitiveness.
Counting the Level of Security
To count the level of security one sheet was created in EXCEL (security sheet) and linguistic
values questionnaire were changed to numerical values. Actually it was related numerical value
to each linguistic value (0, 1, 2, 3 and 4) in order to count the level of security the counted level of
security is made by adding these values for each factor whose maximum for four factors is
number 16.Also, its percent for level of security was counted that has been in table 2, and in
general second equation has been used for level of security .the decided levels of design factor
and familiarity are like table 2 too.
∑ =
=
4
1i ixeveldSecurityLAccumulate
=OfMaximumPercentage 100*)16
)( eveldSecurityLAccumulate
Linguistic valuedomain of values percent
low0-33
moderate34-66
high66-100
TABLE 2: linguistic and numeric values for security level
Some Pseudo code for counting the level of factors was written with vba programming in excel
software. The sample Pseudo code for counting the level of security is shown in following:
(9)
(8)
9. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 9
The Prioritize Factors Resulted From AHP Method
The priority of counted factors in security groups, design, familiarity, and competitiveness has
been noted in figure 2.
Refining and Relative to Rule of the Level of Trust and B2C and Creating Member
Functions.
For refining and finding the rules of fuzzy model, it has been the clustering technique, and the
kind of clustering has been chosen the fuzzy C-means (FCM) clustering in MATLAB software.
Equation 10 is as a major function in clustering k-means.
Where m is any real number greater than 1, uij is the degree of membership of Xj in the cluster i,
Xj is the jth of d-dimensional measured data, Vi is the d-dimension center of the cluster, and ||*||
is any norm expressed the similarity between any measured data and the center.
Fuzzy partition is carried out through an iterative optimization of Equation 8 with the update of
membership uij and the cluster centers Vi by Equation 11 and 12:
The criteria in this iteration will stop when ε<
−
−
ijijij uumax , where ε is a termination criterion
between 0 and 1 [21].All clustering activities were done in MATLAB software.
For example 27 centers of clusters for counting the level of trust is shown in figure 3 .after obtain
the centers of clusters and save into DAT files, the centers of cluster were loaded into ANFIS. In
fact this data is used as training data in ANFIS model.
(10)
(11)
(12)
10. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 10
FIGURE 3: 27 centers of clusters for counting the level of security
Expert ANFIS System
The ANFIS system based on Expert knowledge contains 27 rules, 3 inputs and one single output
for trust level. The structure of expert ANFIS is shown in figure 4.The fuzzy logic toolbox using the
MATLAB software is employed to create the ANFIS model. In fuzzy logic tool box, relevant fis for
trust model is created. In this model type of fis is selected Sugeno type.
FIGURE 4: Expert ANFIS structure.
11. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 11
Membership Function for Expert ANFIS
Gaussmf are used to build the expert ANFIS model. The shape of membership functions after
training the AFNIS for 100 epochs is shown figure 5.
FIGURE 5: Memberhip Function for ANFIS
ANFIS was proposed in an effort to formalize a systematic approach to generating fuzzy rules
from an input-output data set. In ANFIS model 27 rules for trust level and 15 rules for B2C level is
used. Table 3 shows number of rules of trust and B2C model.
B2C LEVELTRUST
NUMBER OF RULES
1527
TABLE 3: number of rules of the fuzzy system model obtained from FCM clustering
The rules describing the trust level are based on the degree of security, familiarity, and design
that these degrees have been formulated like linguistic variable .similarly, the degree for trust
level has been graded from very low to very high in 5 distinctive fuzzy, collections .these rules
have been reached from the users ' answers after ordering, analyzing, and clustering .One of the
collection rules of confidence level can be like following:
If (security = high and familiarity = low and design = moderate) then (trust =moderate).
Trust has been shown like a five fuzzy collections, while competitiveness and B2C level has been
shown as 3 linguistic variables for fuzzy collection. One rule of the collection of b2c level rules
can be like following:
12. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 12
If (trust = low and competitiveness = highly) then (b2c level = moderate).
Totally there are 27 rules for trust that has been created by clustering the user's answers.
Also, the rules of the b2c level are 15 numbers. The rules from base of resultant system that
consist of 2 separate and relative systems in order that the b2c level is gained despite the
security inputs, familiarity inputs, design inputs, and competitiveness level of website.
Training Data for Trust Level
The entire data set of trust level is 27 samples. They are referred to as training data, testing data
and checking data. Upon training, the ANFIS shows the training error which reflects the how good
the mapping function is. To validate the model, we further apply the testing data to see how the
ANFIS behaves for known data. ANFIS maps the function onto the testing data as per the
training. Having created the data set the next step is to train the network. This means we create a
new FIS to fit the data into membership functions. Using the grid partitioning method, the ANFIS
automatically selects the membership function and also generates the new FIS. Figure 6 shows
training and testing data in ANFIS network that is loaded.
FIGURE 6: training and testing data in ANFIS network.
In figure 7, the course of error during the training of adaptive network is shown.
13. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 13
FIGURE 7: course of error during the training of adaptive network.
At the end of 100 training epochs, the network error (mean square error) convergence course of
each ANFIS was derived. From the curve, the final convergence value is 3.6671e−007.
5. B2C AND TRUST LEVELS IN THE DEVELOPED FUZZY SYSTEM
After discovering the rules related to trust level, relevant inputs and outputs for earning trust level
in fuzzy tool box to be organized and were created relevant membership for input and output
figure 8 shows the fuzzy system that can be used to derive the trust level.
FIGURE 8: Fuzzy system to obtain trust level based on security, familiarity and design inputs
14. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 14
Also after that discovering the rules related to b2c level, relevant inputs and outputs for earning
b2c level in fuzzy tool box were organized and were created relevant membership function for
input and output. Figure 9 shows the fuzzy system that can be used to derive the b2c level.
FIGURE 9: Fuzzy system to obtain B2C level based on trust, competitiveness inputs
6. ANALYSIS OF TRUST VERSUS SECURITY FACTOR
For complete understanding of participation needed in trust level, it is necessary to separately
test the participation of each factor.
The Figure 10 shows contribution to Trust of a given Website originating from the Security.
Therefore, the contribution from Familiarity and Design has been kept constant at three levels,
namely: low, moderate and high corresponding to numeric values for Familiarity and Design of
(1–7 and 15).Figure 4 shows that Trust level is monotonically increasing for increasing perceived
security of a website for any given level of Familiarity and Design. However when both F and D is
‘High’ (numeric value of 15) the Trust level is at its maximum for maximum Security. The three
curves have one common feature that they exhibit a ‘staircase shaped’ curvature.
Trust Versus security factor
0.0645
0.0701
0.102 0.202
0.204
0.273
0.776
0.799
0.799
0.2 0.2 0.21
0.467 0.5
0.526
0.885
0.952
0.966
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 2 4 6 8 10 12 14 16
Security
Trust
Low
Moderate
High
FIGURE 10: Trust versus security factor
15. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 15
7. ANALYSIS OF TRUST VERSUS SECURITY AND DESIGN FACTOR
In this section Trust level is depicted as a continuous function of its input parameters as security
and familiarity. Figure 10 intends to depicture variation of Trust as encapsulated in the rules for
Trust. The highest gradient for Trust is when Familiarity is ‘moderate’ and Security is ‘moderate’
to ‘high’. This suggest that when people are somewhat familiar with a website then a small
increase in security levels from between moderate to high security will boost their trust in a
significant way. Looking at Figure 11 diagonally from (low, low) to (high, high) levels of Security
and Familiarity one observes three plateaus where the last one is around 0.966, and remains at
that level even when the input factors are increased further. This result is somehow unexpected
and may be due to the fuzzy nature of the expert system where a ‘Trust’ level of 100% is
unrealistic.
FIGURE 11: Trust level is positively related to levels of security and familiarity.
16. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 16
8. SIMULATE FUZZY TRUST MODEL THROUGH MATLAB SOFTWARE
Simulink is a tool used to visually program a dynamic system and look at results. Any logic circuit
or a control system for a dynamic system can be built by using standard BUILDING BLOCKS
available in Simulink Libraries. Various toolboxes for different techniques, such as Fuzzy Logic,
Neural Networks, DSP, Statistics etc. are available with Simulink, which enhance the processing
power of the tool. The main advantage is the availability of templates / building blocks, which
avoid the necessity of typing code for small mathematical processes.
The model equations were implemented in MATLAB/ SIMULINK with standard blocks in a sub
model. SIMULINK offers a block to include a Fuzzy controller designed by the MATLAB Fuzzy
Toolbox.
After obtain of trust FIS, fuzzy trust model was simulated in MATLAB software. Figure 12 shows
the simulation fuzzy trust model. A Simulink model shown in figure 12 is developed which has 2
fuzzy logic controllers with a rule viewer, a process, 2 multiplexer, difference element, 4 constant
blocks, and a display window.
FIGURE 12: Block Diagram of fuzzy trust model.
9. CONCLUSION
Trust to B2C website depends on different factors. From our observation we have found that the
easiest way to be reliable and trusted to the Customers is to maintain an easy and simple image
in online environment.
The results of this research will be useful to online companies who are investing huge amounts of
money on developing ecommerce web sites. Results show that trustworthiness plays a
moderately important role in success of B2C e-commerce web sites. In addition, we used the
AHP method to analyze the gathered data. By using AHP method and completing questionnaire
through face to face meeting we finally were able to provide ranking of all factors and sub-factors.
This ranking shows the relative importance of success factors compared to each other. This will
18. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian & Othman bin Ibrahim
International Journal of Business Research and Management (IJBRM), Volume (2) : Issue (1) : 2011 18
13. Lightner, Nancy. J. (2004). Evaluating e-Commerce functionality with a focus on customer
Service. Communications of the ACM, Vol. 47 Issue 10, p.88, 5p; (AN 14523142).
14. Singh, M.,Costtabile, A., Paull, S. (2001). E-commerce and customer relationship
management (eCRM), heidelberg press, Melbourne, pp.95-108.
15. Ciji Pearl Kurian , V.I.George, Jayadev Bhat & Radhakrishna S Aithal Manipal Institute of
Technology Manipal – 576104, India"Anfis Model For The Time Series Prediction Of Interior
Daylight Illuminance"
16. Sengur, A. (2008a). Wavelet transform and adaptive neuro-fuzzy inference system for color
texture classification. Expert Systems with Applications, 34, 2120–2128.
17. Buragohain, M., & Mahanta, C. (2008). A novel approach for ANFIS modeling based on full
factorial design. Applied Soft Computing, 8, 609–625.
18. Avci, E. (2008). Comparison of wavelet families for texture classification by using wavelet
packet entropy adaptive network based fuzzy inference system. Applied Soft Computing, 8,
225–231.
19. Ying, L. C., & Pan, M. C. (2008). Using adaptive network based fuzzy inferencesystem to
forecast regional electricity loads. Energy Conversation and Management, 49, 205–211.
20. Kosko, B., (1992). Neural Networks and Fuzzy systems: A Dynamical Systems Approach to
Machine Intelligence. Prentice-Hall, Englewood Cliffs, NJ.
21. Bezdek, J.C., 1981. Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum,
New York.