Pub Date : 2019-02-01DOI: 10.1109/ICFIR.2019.8894779
M. Allaymoun, O. Hamid
The trade base mode of finance widely used in Islamic banking sector, which is known as Murabaha, can be adopted as an instrument, to conduct the on line trade transactions that significantly contribute in activating the E-commerce service that recently become an essential in global financial environment. the added value of this proposed system,is the legal applying all the Sharia rules regarding the Murabaha contract,this can achieved with the system through different digital orders, the client can view the item available on the bank’s website and directly select the item and reviews its details. The system executes digitally the negotiation with client in regards to the cost price of commodity and the agreed margin of profit, and method of payment which is applying the necessary transparency and disclosure to give the transaction the Sharia legality. The system properly can executes the last stage of the transaction, the process of selling and delivery which takes place after the client has agreed to all the required details of the contract subject matter. The system, assume the bank establishes a commercial website where all the goods are available, so the transaction operates between two parties with the necessary offers and acceptance as component of valid contract from the Sharia perspective, and the disclosure in cost price and selling price The systems offer a new addition to E-commerce, in the Islamic way, and provide significant development in both e-trading and finance structures compliant with Sharia.
{"title":"Integrated System (E-Murabaha) A new Approach to E-Commerce","authors":"M. Allaymoun, O. Hamid","doi":"10.1109/ICFIR.2019.8894779","DOIUrl":"https://doi.org/10.1109/ICFIR.2019.8894779","url":null,"abstract":"The trade base mode of finance widely used in Islamic banking sector, which is known as Murabaha, can be adopted as an instrument, to conduct the on line trade transactions that significantly contribute in activating the E-commerce service that recently become an essential in global financial environment. the added value of this proposed system,is the legal applying all the Sharia rules regarding the Murabaha contract,this can achieved with the system through different digital orders, the client can view the item available on the bank’s website and directly select the item and reviews its details. The system executes digitally the negotiation with client in regards to the cost price of commodity and the agreed margin of profit, and method of payment which is applying the necessary transparency and disclosure to give the transaction the Sharia legality. The system properly can executes the last stage of the transaction, the process of selling and delivery which takes place after the client has agreed to all the required details of the contract subject matter. The system, assume the bank establishes a commercial website where all the goods are available, so the transaction operates between two parties with the necessary offers and acceptance as component of valid contract from the Sharia perspective, and the disclosure in cost price and selling price The systems offer a new addition to E-commerce, in the Islamic way, and provide significant development in both e-trading and finance structures compliant with Sharia.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126075604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICFIR.2019.8894774
W. Abdelhameed
The paper starts with a question about the industrial revolution: is there a new model of the industrial revolution in front of us? If yes, what is the effect on architecture and architectural design. New construction methods, associated with new building materials, have been innovated and used in the architecture field. In the current digital age, even the designing tasks have been altered and modified in order to cope with and benefit from the potentials of the new designing methods appeared and made a way of themselves into the conventional design process. Architecture is a huge domain; therefore, the paper focuses on three main areas of architecture namely, building materials, construction methods, and conceptual design phases. The paper applies the methodological tool of synthesizing and extracting from the literature review of the related research areas. Utilizing the theoretical –secondary-data, the paper explores the effect of fourth industrial revolution on the three main categories of architecture previously listed. The paper, moreover, examines the knowledge and skills required for the architectural education in the investigated areas. This exploration and examination will basically help the academia equip the graduates for the job market and the career profession.
{"title":"Industrial Revolution Effect on the Architectural Design","authors":"W. Abdelhameed","doi":"10.1109/ICFIR.2019.8894774","DOIUrl":"https://doi.org/10.1109/ICFIR.2019.8894774","url":null,"abstract":"The paper starts with a question about the industrial revolution: is there a new model of the industrial revolution in front of us? If yes, what is the effect on architecture and architectural design. New construction methods, associated with new building materials, have been innovated and used in the architecture field. In the current digital age, even the designing tasks have been altered and modified in order to cope with and benefit from the potentials of the new designing methods appeared and made a way of themselves into the conventional design process. Architecture is a huge domain; therefore, the paper focuses on three main areas of architecture namely, building materials, construction methods, and conceptual design phases. The paper applies the methodological tool of synthesizing and extracting from the literature review of the related research areas. Utilizing the theoretical –secondary-data, the paper explores the effect of fourth industrial revolution on the three main categories of architecture previously listed. The paper, moreover, examines the knowledge and skills required for the architectural education in the investigated areas. This exploration and examination will basically help the academia equip the graduates for the job market and the career profession.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129575140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICFIR.2019.8894782
H. Ahmed
Millions of air conditioning units consume about 60-64 % of total produced electrical energy in GCC Countries in the summer season. Conditioning the air involves taking the heat out and also extracts moisture (humidity) out of the air. This dehumidification process utilizing the evaporator of air conditioning units could be an alternative and sufficient means to obtain fresh distilled water. There is a strong potential for condensate collection technology to impact water shortages in the regions of the world where suitable conditions exist.This paper presents case study analysis of experimental investigation and practical application of the amount of condensed fresh water can be collected and utilized from the discharge pipe of a two tones of refrigeration indoor air conditioning unit installed in a house during the summer season in the Kingdom of Bahrain. Up to 7 liters/hour of freshwater was obtained with an overall average rate of 2.07 Liters/hour. The study gives a good prediction of the amount of condensed fresh water output for particular indoor relative humidity.
{"title":"The Amount of Fresh Water Wasted as by Product of Air Conditioning Systems: Case Study in the Kingdom of Bahrain","authors":"H. Ahmed","doi":"10.1109/ICFIR.2019.8894782","DOIUrl":"https://doi.org/10.1109/ICFIR.2019.8894782","url":null,"abstract":"Millions of air conditioning units consume about 60-64 % of total produced electrical energy in GCC Countries in the summer season. Conditioning the air involves taking the heat out and also extracts moisture (humidity) out of the air. This dehumidification process utilizing the evaporator of air conditioning units could be an alternative and sufficient means to obtain fresh distilled water. There is a strong potential for condensate collection technology to impact water shortages in the regions of the world where suitable conditions exist.This paper presents case study analysis of experimental investigation and practical application of the amount of condensed fresh water can be collected and utilized from the discharge pipe of a two tones of refrigeration indoor air conditioning unit installed in a house during the summer season in the Kingdom of Bahrain. Up to 7 liters/hour of freshwater was obtained with an overall average rate of 2.07 Liters/hour. The study gives a good prediction of the amount of condensed fresh water output for particular indoor relative humidity.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"177 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICFIR.2019.8894794
K. Al-Saedi, M. Al-Emran, E. Abusham, Sahar A. El Rahman
Recently, Mobile payment (M-payment) is fast becoming an essential research field in the information technology domain. Although numerous sectors have adopted the M-payment in different contexts, the factors that affect its adoption is still not apparent. Different information systems (IS) theories/models were developed in order to study the adoption of a specific new technology. One of the most commonly used and validated models in empirical studies is the Unified Theory of Acceptance and Use of Technology (UTAUT) model. Based on the literature, research neglects to review the M-payment adoption studies. The main objective of this study is to systematically review the M-payment adoption studies that involve the UTAUT as the theoretical model. In that, a total of 25 research articles were synthesized and analyzed. The major findings include that 48% of the analyzed studies were conducted in the industrial sectors. Additionally, 80% of the analyzed studies were mainly relied on questionnaire surveys for data collection. Besides, our results revealed that perceived risk and perceived trust are regarded as the most frequent factors that were used to extend the UTAUT to study the M-payment adoption. These findings provide a comprehensive reference for researchers who intend to conduct further research in M-payment.
{"title":"Mobile Payment Adoption: A Systematic Review of the UTAUT Model","authors":"K. Al-Saedi, M. Al-Emran, E. Abusham, Sahar A. El Rahman","doi":"10.1109/ICFIR.2019.8894794","DOIUrl":"https://doi.org/10.1109/ICFIR.2019.8894794","url":null,"abstract":"Recently, Mobile payment (M-payment) is fast becoming an essential research field in the information technology domain. Although numerous sectors have adopted the M-payment in different contexts, the factors that affect its adoption is still not apparent. Different information systems (IS) theories/models were developed in order to study the adoption of a specific new technology. One of the most commonly used and validated models in empirical studies is the Unified Theory of Acceptance and Use of Technology (UTAUT) model. Based on the literature, research neglects to review the M-payment adoption studies. The main objective of this study is to systematically review the M-payment adoption studies that involve the UTAUT as the theoretical model. In that, a total of 25 research articles were synthesized and analyzed. The major findings include that 48% of the analyzed studies were conducted in the industrial sectors. Additionally, 80% of the analyzed studies were mainly relied on questionnaire surveys for data collection. Besides, our results revealed that perceived risk and perceived trust are regarded as the most frequent factors that were used to extend the UTAUT to study the M-payment adoption. These findings provide a comprehensive reference for researchers who intend to conduct further research in M-payment.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICFIR.2019.8894773
Elsa Kuriakose
A Cost Effective School Management system (CESMS) for disadvantaged schools in South Africa using the Software as a Service (SaaS) delivery model was created to collect comprehensive data of a student and present it before educators. The CESMS aims to bring parents, educators and the administrators together on a virtual platform to showcase the progress of students. A forum is provided in the CESMS where educators and administrators can discuss and solve the challenges they face as well. The system has been successful in implementing its inception requirements. The drawback however is that CESMS does not address the issue of safety of a student. The beginning of a school day is when a student leaves home and ends when the student returns home. Parents are in the dark throughout this period. Over the years there have been many incidents where children have been kidnapped on-route to school or abused in the school premises itself. This paper aims to improve a student’s security by suggesting the development of a device that uniquely identifies a child and relays their location periodically. Through the pillars of industry 4.0 (I.4.0) the development of a sensor device is suggested. Using Internet of Things (IoT), one of the pillars of (I.4.0), a sensor that automatically identifies a student and transmits they’re location at intervals will be designed. This is a work in progress paper and aims to showcase what has been achieved thus far and how the study can be progressed.
{"title":"A Smart Sensor School Management System That Improves Security Of Student","authors":"Elsa Kuriakose","doi":"10.1109/ICFIR.2019.8894773","DOIUrl":"https://doi.org/10.1109/ICFIR.2019.8894773","url":null,"abstract":"A Cost Effective School Management system (CESMS) for disadvantaged schools in South Africa using the Software as a Service (SaaS) delivery model was created to collect comprehensive data of a student and present it before educators. The CESMS aims to bring parents, educators and the administrators together on a virtual platform to showcase the progress of students. A forum is provided in the CESMS where educators and administrators can discuss and solve the challenges they face as well. The system has been successful in implementing its inception requirements. The drawback however is that CESMS does not address the issue of safety of a student. The beginning of a school day is when a student leaves home and ends when the student returns home. Parents are in the dark throughout this period. Over the years there have been many incidents where children have been kidnapped on-route to school or abused in the school premises itself. This paper aims to improve a student’s security by suggesting the development of a device that uniquely identifies a child and relays their location periodically. Through the pillars of industry 4.0 (I.4.0) the development of a sensor device is suggested. Using Internet of Things (IoT), one of the pillars of (I.4.0), a sensor that automatically identifies a student and transmits they’re location at intervals will be designed. This is a work in progress paper and aims to showcase what has been achieved thus far and how the study can be progressed.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125215862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICFIR.2019.8894783
G. Farsi, J. Jabbar, R. M. Tawafak
Face verification has a huge impact in different types of media purpose, like security access control, monitoring and control, retrieval of images, etc. They are used in many domains such as banks, airplanes, police areas and others. On the other hand, the presence of variable illumination, pretense, facial look, aging and other unsystematic reasons regularly cause identification errors. Moreover, increase the level of controlling and executing of the face verification methods is not only difficult but also a critical sense of function. The aim of this research is to make a review on some selected researcher’s work, the methods used by them for face verifications, their findings and to see which one is optimal and for what it is used. Anyway, there is no specific protocol to judge these methods and also there is no 100% accuracy of them.
{"title":"A Review on Models of Human Face Verification Techniques","authors":"G. Farsi, J. Jabbar, R. M. Tawafak","doi":"10.1109/ICFIR.2019.8894783","DOIUrl":"https://doi.org/10.1109/ICFIR.2019.8894783","url":null,"abstract":"Face verification has a huge impact in different types of media purpose, like security access control, monitoring and control, retrieval of images, etc. They are used in many domains such as banks, airplanes, police areas and others. On the other hand, the presence of variable illumination, pretense, facial look, aging and other unsystematic reasons regularly cause identification errors. Moreover, increase the level of controlling and executing of the face verification methods is not only difficult but also a critical sense of function. The aim of this research is to make a review on some selected researcher’s work, the methods used by them for face verifications, their findings and to see which one is optimal and for what it is used. Anyway, there is no specific protocol to judge these methods and also there is no 100% accuracy of them.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"136 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICFIR.2019.8894793
Aws Y. Fidaeldin, A. Abdulrazzaq
Reducing HTTP request times is considered one of the essential areas in website performance. The study focused on the importance of utilizing BGP to enhance HTTP requests and response. Addressing and highlighting some factors found in previous studies that will assist in proper implementation of BGP on the internet. The bandwidth, load balancing, implementing CDN to reduce long distances requests, and merging several related JS and CSS files to reduce HTTP requests will ultimately produce enhanced rendering time. Variety of experiments were conducted and useful results have been produced.
{"title":"Reducing HTTP Request times through Utilizing BGP: An Experimental Study","authors":"Aws Y. Fidaeldin, A. Abdulrazzaq","doi":"10.1109/ICFIR.2019.8894793","DOIUrl":"https://doi.org/10.1109/ICFIR.2019.8894793","url":null,"abstract":"Reducing HTTP request times is considered one of the essential areas in website performance. The study focused on the importance of utilizing BGP to enhance HTTP requests and response. Addressing and highlighting some factors found in previous studies that will assist in proper implementation of BGP on the internet. The bandwidth, load balancing, implementing CDN to reduce long distances requests, and merging several related JS and CSS files to reduce HTTP requests will ultimately produce enhanced rendering time. Variety of experiments were conducted and useful results have been produced.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128698296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}