Pub Date : 2019-07-17DOI: 10.1109/ICDSA46371.2019.9404238
E. Tetteh, Benjamin Kwofie, Zhiguang Qin
The provision of computer-mediated communication (CMC) portal services through information technologies (IT) in higher educational institutions (HEIs) in developing countries should not be an impossible task considering the growth in information systems and an upsurge of internet users. There have been numerous efforts aimed at implementing CMC portals by HEIs but just a few could be said to be successful. The aim of this research is to develop a framework that can help to provide a better understanding of how to manage the entire implementation process so as to bring the expected advantages to institutions implementing it. Results of past research had been studied to develop the conceptual framework utilizing significant theories in the field of information system implementation and institutional change. The framework addresses the adoption, implementation as well as institutionalization stages of CMC portal implementation, and a number of institutional contextual factors influencing implementation efforts within the stages.
{"title":"An implementation framework for Computer-Mediated Communication portal in higher educational institutions","authors":"E. Tetteh, Benjamin Kwofie, Zhiguang Qin","doi":"10.1109/ICDSA46371.2019.9404238","DOIUrl":"https://doi.org/10.1109/ICDSA46371.2019.9404238","url":null,"abstract":"The provision of computer-mediated communication (CMC) portal services through information technologies (IT) in higher educational institutions (HEIs) in developing countries should not be an impossible task considering the growth in information systems and an upsurge of internet users. There have been numerous efforts aimed at implementing CMC portals by HEIs but just a few could be said to be successful. The aim of this research is to develop a framework that can help to provide a better understanding of how to manage the entire implementation process so as to bring the expected advantages to institutions implementing it. Results of past research had been studied to develop the conceptual framework utilizing significant theories in the field of information system implementation and institutional change. The framework addresses the adoption, implementation as well as institutionalization stages of CMC portal implementation, and a number of institutional contextual factors influencing implementation efforts within the stages.","PeriodicalId":143056,"journal":{"name":"2019 International Conference on Computer, Data Science and Applications (ICDSA)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122762363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-17DOI: 10.1109/ICDSA46371.2019.9404232
Ronald Esare Arthur, D. T. Ayitey, A. Acakpovi, A. Koomson, Isaac Eric Buah
Nurses response time to patients call has not been the best as a result of the stress and manual nursing call systems available in many hospitals. This situation has caused a lot of dissatisfaction among patients admitted. This study seeks to provide an improvement on already existing nurse call systems. Despite the existence of nurse call systems that make use of audible signal, nurses still need to manually search for patients who called for their assistance. Hence, this study designed and implemented an automatic nurse call system that uses an audiovisual signal to assist nurses find the location of the patient and reason for admission. An experimental approach was adopted while an electronic device based on Arduino board was designed and constructed. The system operates on 5VDC and can be powered with a DC source operating within the range of 9-32V. To test the communication efficiency of the design, systems data were recorded on system's response time. The average response time of 0.24 seconds was obtained with 15 sampled inputs.
{"title":"Innovative Nurse call System For Patients in Healthcare Centres","authors":"Ronald Esare Arthur, D. T. Ayitey, A. Acakpovi, A. Koomson, Isaac Eric Buah","doi":"10.1109/ICDSA46371.2019.9404232","DOIUrl":"https://doi.org/10.1109/ICDSA46371.2019.9404232","url":null,"abstract":"Nurses response time to patients call has not been the best as a result of the stress and manual nursing call systems available in many hospitals. This situation has caused a lot of dissatisfaction among patients admitted. This study seeks to provide an improvement on already existing nurse call systems. Despite the existence of nurse call systems that make use of audible signal, nurses still need to manually search for patients who called for their assistance. Hence, this study designed and implemented an automatic nurse call system that uses an audiovisual signal to assist nurses find the location of the patient and reason for admission. An experimental approach was adopted while an electronic device based on Arduino board was designed and constructed. The system operates on 5VDC and can be powered with a DC source operating within the range of 9-32V. To test the communication efficiency of the design, systems data were recorded on system's response time. The average response time of 0.24 seconds was obtained with 15 sampled inputs.","PeriodicalId":143056,"journal":{"name":"2019 International Conference on Computer, Data Science and Applications (ICDSA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116777649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-17DOI: 10.1109/ICDSA46371.2019.9404233
W. Brown-Acquaye, F. Lempogo, J. K. Arthur, Emeka Kenechukwu Anekwe
In this paper we use the fuzzy extent analytic hierarchy process (AHP) and the ArcGIS geographical information system to develop a decision support tool to aid stakeholders select the most suitable and sustainable site for a wind turbine farm in Zamfara State, Nigeria. We use fuzzy sets and fuzzy numbers to deal with vagueness of human thought in the selection process and develop the problem hierarchy with the various criteria which will be evaluated to obtain the fuzzy comparison matrices which are then used to calculate of fuzzy synthetic extents. The comparison of fuzzy synthetic extents, the evaluation of the minimum degree of possibilities. and normalization of weight vectors are done to aggregate the local weights to obtain scores and ranking of the alternative sites for the wind turbine. We then use the weighted linear combination technique in ARCGIS to generate raster suitability maps and produce a composite suitability map for the turbine sites as output.
{"title":"Use of Fuzzy Extent AHP based Decision Support System and Geographic Information System to Site Wind Turbines in a Sustainable Manner","authors":"W. Brown-Acquaye, F. Lempogo, J. K. Arthur, Emeka Kenechukwu Anekwe","doi":"10.1109/ICDSA46371.2019.9404233","DOIUrl":"https://doi.org/10.1109/ICDSA46371.2019.9404233","url":null,"abstract":"In this paper we use the fuzzy extent analytic hierarchy process (AHP) and the ArcGIS geographical information system to develop a decision support tool to aid stakeholders select the most suitable and sustainable site for a wind turbine farm in Zamfara State, Nigeria. We use fuzzy sets and fuzzy numbers to deal with vagueness of human thought in the selection process and develop the problem hierarchy with the various criteria which will be evaluated to obtain the fuzzy comparison matrices which are then used to calculate of fuzzy synthetic extents. The comparison of fuzzy synthetic extents, the evaluation of the minimum degree of possibilities. and normalization of weight vectors are done to aggregate the local weights to obtain scores and ranking of the alternative sites for the wind turbine. We then use the weighted linear combination technique in ARCGIS to generate raster suitability maps and produce a composite suitability map for the turbine sites as output.","PeriodicalId":143056,"journal":{"name":"2019 International Conference on Computer, Data Science and Applications (ICDSA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122527236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-17DOI: 10.1109/ICDSA46371.2019.9404235
Isaac Baffour Senkyire, Q. Kester
Images are critical part of investigations, they are referred to and regarded, to gather information, document and create “memory” of a crime scene. Crime scene images are considered as vital criminal evidence in the court of law; hence, it is imperative that the authenticity of such images be maintained and that they be verifiable. The advancement in technology in this digitally proliferated era allows for easy doctoring of crime scene images. Digital watermarking, and blockchain have been used in other research works to authenticate and verify digital content or digital documents. In this paper we propose the use of watermarking and cryptographic blockchain to validate forensic crime scene images.
{"title":"Validation of Forensic Crime Scene Images Using Watermarking and Cryptographic Blockchain","authors":"Isaac Baffour Senkyire, Q. Kester","doi":"10.1109/ICDSA46371.2019.9404235","DOIUrl":"https://doi.org/10.1109/ICDSA46371.2019.9404235","url":null,"abstract":"Images are critical part of investigations, they are referred to and regarded, to gather information, document and create “memory” of a crime scene. Crime scene images are considered as vital criminal evidence in the court of law; hence, it is imperative that the authenticity of such images be maintained and that they be verifiable. The advancement in technology in this digitally proliferated era allows for easy doctoring of crime scene images. Digital watermarking, and blockchain have been used in other research works to authenticate and verify digital content or digital documents. In this paper we propose the use of watermarking and cryptographic blockchain to validate forensic crime scene images.","PeriodicalId":143056,"journal":{"name":"2019 International Conference on Computer, Data Science and Applications (ICDSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-17DOI: 10.1109/ICDSA46371.2019.9404237
Paul A. Agbodza
An algorithm to filter the jumps in the US Dollar-Ghana Cedi log-returns has been implemented with the help of machine learning tools in this paper. The algorithm is like a classifier. For a frontier market there is no known standard algorithm to filter and classify jumps. This new algorithm was developed to extract the jump dynamics to feed the new equation for modelling the US Dollar-Ghana Cedi log returns, the Correlated Multifactor Stochastic Variance Jump Diffusion (CMSVJD). The algorithm is based on the three-sigma rule of leverage statistics but here the recursion is truncated using a tolerance convergence level defined in a classifier or with the help of a convergence graph. The justification of the algorithm has been established and was implemented with the US Dollar-Ghana Cedi log-returns as a Lebesgue unimodal data. The jump dynamics show that the jump size and jump time are random and independent; jump size is time-invariant and jump time intervals obey the Markov chain property of time inhomogeneity. There were more positive jumps (depreciation of the cedi) than negative jumps (appreciation of the cedi) but the magnitude of the negative jumps is higher than that of the positive jumps.
{"title":"Machine Learning of Jump Dynamics in US Dollar-Ghana Cedi Exchange Returns","authors":"Paul A. Agbodza","doi":"10.1109/ICDSA46371.2019.9404237","DOIUrl":"https://doi.org/10.1109/ICDSA46371.2019.9404237","url":null,"abstract":"An algorithm to filter the jumps in the US Dollar-Ghana Cedi log-returns has been implemented with the help of machine learning tools in this paper. The algorithm is like a classifier. For a frontier market there is no known standard algorithm to filter and classify jumps. This new algorithm was developed to extract the jump dynamics to feed the new equation for modelling the US Dollar-Ghana Cedi log returns, the Correlated Multifactor Stochastic Variance Jump Diffusion (CMSVJD). The algorithm is based on the three-sigma rule of leverage statistics but here the recursion is truncated using a tolerance convergence level defined in a classifier or with the help of a convergence graph. The justification of the algorithm has been established and was implemented with the US Dollar-Ghana Cedi log-returns as a Lebesgue unimodal data. The jump dynamics show that the jump size and jump time are random and independent; jump size is time-invariant and jump time intervals obey the Markov chain property of time inhomogeneity. There were more positive jumps (depreciation of the cedi) than negative jumps (appreciation of the cedi) but the magnitude of the negative jumps is higher than that of the positive jumps.","PeriodicalId":143056,"journal":{"name":"2019 International Conference on Computer, Data Science and Applications (ICDSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126846483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-17DOI: 10.1109/ICDSA46371.2019.9404236
F. Lempogo, W. Brown-Acquaye, J. K. Arthur, Richard Asante Antwi
The mobile telecommunication industry is one of the most competitive in the world today. As telecommunication companies battle to gain competitive advantage and to improve revenue, it has become standard practice in Ghana for telecom companies to use Managed Service Providers (MSPs) to handle the management of technological business risk and uncertainty, as well as to the enhance the agility and to control cost while at the same time maintaining their core business objectives. This paper explores the relationship between manage services and the operations of mobile telecommunications in Ghana. The study focused on one of the prominent telecommunications companies in Ghana and its managed service providers. Using primary and secondary data obtained from interviews and incident dashboard from service Management tool of MSPs respectively, studies were conducted on the cooperation of MSPs, their adherence to SLAs and cost savings as a means to measure the impact of managed services on the business operations of Mobile Telecommunication Companies in Ghana. The results revealed that the level of cooperation between MSPs towards service delivery is generally good. However, the MSPs level of adherence to Service Level Agreements (SLAs) is low according to the Case company respondents although the MSPs claimed their adherence to SLA was high. Service dashboard data on the other hand confirmed that the MSPs are in fact meeting the SLAs. Lastly, both company respondents and dashboard data confirmed that there are cost savings in the operations from the use of Managed Services. The results also showed some benefits in the area of sound technical support and expertise, better human resource management and opportunity to focus on core business.
{"title":"The Impact of Managed Services on the QoS and Operations of the Mobile Telecommunications Industry in Ghana","authors":"F. Lempogo, W. Brown-Acquaye, J. K. Arthur, Richard Asante Antwi","doi":"10.1109/ICDSA46371.2019.9404236","DOIUrl":"https://doi.org/10.1109/ICDSA46371.2019.9404236","url":null,"abstract":"The mobile telecommunication industry is one of the most competitive in the world today. As telecommunication companies battle to gain competitive advantage and to improve revenue, it has become standard practice in Ghana for telecom companies to use Managed Service Providers (MSPs) to handle the management of technological business risk and uncertainty, as well as to the enhance the agility and to control cost while at the same time maintaining their core business objectives. This paper explores the relationship between manage services and the operations of mobile telecommunications in Ghana. The study focused on one of the prominent telecommunications companies in Ghana and its managed service providers. Using primary and secondary data obtained from interviews and incident dashboard from service Management tool of MSPs respectively, studies were conducted on the cooperation of MSPs, their adherence to SLAs and cost savings as a means to measure the impact of managed services on the business operations of Mobile Telecommunication Companies in Ghana. The results revealed that the level of cooperation between MSPs towards service delivery is generally good. However, the MSPs level of adherence to Service Level Agreements (SLAs) is low according to the Case company respondents although the MSPs claimed their adherence to SLA was high. Service dashboard data on the other hand confirmed that the MSPs are in fact meeting the SLAs. Lastly, both company respondents and dashboard data confirmed that there are cost savings in the operations from the use of Managed Services. The results also showed some benefits in the area of sound technical support and expertise, better human resource management and opportunity to focus on core business.","PeriodicalId":143056,"journal":{"name":"2019 International Conference on Computer, Data Science and Applications (ICDSA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127237511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-17DOI: 10.1109/ICDSA46371.2019.9404234
P. Danquah, Q. Kester
This paper sets out to contribute to the general body of knowledge in the area of vulnerability assessment to support the efforts in enhancing efficiency and effectiveness of vulnerability assessment and penetration tests for Unstructured Supplementary Service Data (USSD) based applications. Upon a review of literature about various security issues on the subject, a proposal is made to enhance the approach to assessing the security of USSD applications. The proposal ensures that all aspects of the USSD based application are assessed for security.
{"title":"Enhanced Security Assessment Method for USSD Based Mobile Applications","authors":"P. Danquah, Q. Kester","doi":"10.1109/ICDSA46371.2019.9404234","DOIUrl":"https://doi.org/10.1109/ICDSA46371.2019.9404234","url":null,"abstract":"This paper sets out to contribute to the general body of knowledge in the area of vulnerability assessment to support the efforts in enhancing efficiency and effectiveness of vulnerability assessment and penetration tests for Unstructured Supplementary Service Data (USSD) based applications. Upon a review of literature about various security issues on the subject, a proposal is made to enhance the approach to assessing the security of USSD applications. The proposal ensures that all aspects of the USSD based application are assessed for security.","PeriodicalId":143056,"journal":{"name":"2019 International Conference on Computer, Data Science and Applications (ICDSA)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}