Pub Date : 2019-07-01DOI: 10.4018/IJISSC.2019070105
B. Alhassan, J. Omran, F. Jrad
Building maintenance is gaining an increasing attention in the various fields of scientific research and there was a need for the use of new technologies in maintenance management, as the facility management deal with a large amount of information relating to maintenance, which includes drawings and specifications, lists, and reports, and the use of paper files leads to decrease the efficiency and create a shortage of data and information. The authors offer in this research tool to manage the maintenance process by using the BIM through linking deterioration models and three-dimensional model of the facility to be maintained and compensate the external investigation data for maintenance work in these models to get at the end of this research and with the help of the possibilities offered by Revit database to an upcoming maintenance items and arrange them according to their importance and impact on the facility and the estimated budget for the periodic maintenance and distribution of this budget on the various construction elements and the development of resources plan for next year.
{"title":"Maintenance Management for Public Buildings Using Building Information Modeling BIM","authors":"B. Alhassan, J. Omran, F. Jrad","doi":"10.4018/IJISSC.2019070105","DOIUrl":"https://doi.org/10.4018/IJISSC.2019070105","url":null,"abstract":"Building maintenance is gaining an increasing attention in the various fields of scientific research and there was a need for the use of new technologies in maintenance management, as the facility management deal with a large amount of information relating to maintenance, which includes drawings and specifications, lists, and reports, and the use of paper files leads to decrease the efficiency and create a shortage of data and information. The authors offer in this research tool to manage the maintenance process by using the BIM through linking deterioration models and three-dimensional model of the facility to be maintained and compensate the external investigation data for maintenance work in these models to get at the end of this research and with the help of the possibilities offered by Revit database to an upcoming maintenance items and arrange them according to their importance and impact on the facility and the estimated budget for the periodic maintenance and distribution of this budget on the various construction elements and the development of resources plan for next year.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128757532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.4018/IJISSC.2019070103
Hossam Mzrieb
Communication through the internet is one of the dominant methods of exchanging information. TCP and UDP are the transport layer protocols responsible for transit of nearly all Internet communications. Due to the growth of real-time audio and video applications, UDP is being used more frequently as a transport protocol, but unlike TCP, UDP has no mechanism for congestion control leading to wasted bandwidth and poor performance, so the DCCP protocol has appeared as a replacement for UDP. In this article, the author performs some simulations using NS2 for Drop Tail and RED queuing models to evaluate the performance of TCP, UDP, DCCP CCID2, and DCCP CCID3 protocols in congested wired networks. The performance metrics used are throughput, end to end delay, number of sent and lost packets. The obtained results show that the DCCP CCID2 performs the best throughput with the minimum of delay as compared to UDP, TCP, and DCCP CCID3.
{"title":"Performance Evaluation of UDP, DCCP and TCP in Congested Wired Networks","authors":"Hossam Mzrieb","doi":"10.4018/IJISSC.2019070103","DOIUrl":"https://doi.org/10.4018/IJISSC.2019070103","url":null,"abstract":"Communication through the internet is one of the dominant methods of exchanging information. TCP and UDP are the transport layer protocols responsible for transit of nearly all Internet communications. Due to the growth of real-time audio and video applications, UDP is being used more frequently as a transport protocol, but unlike TCP, UDP has no mechanism for congestion control leading to wasted bandwidth and poor performance, so the DCCP protocol has appeared as a replacement for UDP. In this article, the author performs some simulations using NS2 for Drop Tail and RED queuing models to evaluate the performance of TCP, UDP, DCCP CCID2, and DCCP CCID3 protocols in congested wired networks. The performance metrics used are throughput, end to end delay, number of sent and lost packets. The obtained results show that the DCCP CCID2 performs the best throughput with the minimum of delay as compared to UDP, TCP, and DCCP CCID3.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.4018/IJISSC.2019070104
M. Akel, O. Mohammad
The issue of disability is one of the most important social issues in all human societies. Disability has become particularly important as a result of the statistics done by many international organizations and bodies. These statistics have strikingly confirmed high rates of disabilities. It is worth noting that these high rates of disability are viewed as a real waste of human resources in the human society, where human resources are one of the most important elements of its development. Every child who is born in a family and diagnosed as a disabled child with one of the motor, mental, sensory or social disabilities makes changes in the social environment where he or she lives. The change starts in concepts and determinants of family members' understanding of the new situation.
{"title":"Obstacles to Work of Social Worker in School Considering Advancement of Information Technology","authors":"M. Akel, O. Mohammad","doi":"10.4018/IJISSC.2019070104","DOIUrl":"https://doi.org/10.4018/IJISSC.2019070104","url":null,"abstract":"The issue of disability is one of the most important social issues in all human societies. Disability has become particularly important as a result of the statistics done by many international organizations and bodies. These statistics have strikingly confirmed high rates of disabilities. It is worth noting that these high rates of disability are viewed as a real waste of human resources in the human society, where human resources are one of the most important elements of its development. Every child who is born in a family and diagnosed as a disabled child with one of the motor, mental, sensory or social disabilities makes changes in the social environment where he or she lives. The change starts in concepts and determinants of family members' understanding of the new situation.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.4018/IJISSC.2019070101
B. Alhassan, J. Omran, F. Jrad
Building maintenance is gaining increased attention in the various fields of scientific research, Building information modelling (BIM) is used in the maintenance management and has helped facility management to handle a large volume of maintenance information, including drawings, specifications, lists and reports. BIM proved its effectiveness as a repository for various types of data in buildings maintenance and a tool to support decision making in maintenance. stepping the best decision at the facility is not only based on quantitative data but also on the knowledge and experience acquired by the company and the employees. this experience may be lost forever due to resignation and retirement if they are not documented. In this research work the authors provide a methodology for obtaining knowledge while performing maintenance of public buildings using BIM and DYNAMO applications, where parametric models provide us with a high-central frame for storing information and by adopting of visual programming, which provides great capabilities for processing, extraction, classification and the export of data from the BIM model to organize the knowledge management process extensively. This serves to facilitate decision-making through the BIM dependent knowledge base which helps to obtain and re-use of generated knowledge.
{"title":"Enhancing Public Buildings Maintenance Using Integration Between Knowledge Management and BIM","authors":"B. Alhassan, J. Omran, F. Jrad","doi":"10.4018/IJISSC.2019070101","DOIUrl":"https://doi.org/10.4018/IJISSC.2019070101","url":null,"abstract":"Building maintenance is gaining increased attention in the various fields of scientific research, Building information modelling (BIM) is used in the maintenance management and has helped facility management to handle a large volume of maintenance information, including drawings, specifications, lists and reports. BIM proved its effectiveness as a repository for various types of data in buildings maintenance and a tool to support decision making in maintenance. stepping the best decision at the facility is not only based on quantitative data but also on the knowledge and experience acquired by the company and the employees. this experience may be lost forever due to resignation and retirement if they are not documented. In this research work the authors provide a methodology for obtaining knowledge while performing maintenance of public buildings using BIM and DYNAMO applications, where parametric models provide us with a high-central frame for storing information and by adopting of visual programming, which provides great capabilities for processing, extraction, classification and the export of data from the BIM model to organize the knowledge management process extensively. This serves to facilitate decision-making through the BIM dependent knowledge base which helps to obtain and re-use of generated knowledge.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114379016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.4018/IJISSC.2019070102
M. Akel, O. Mohammad
Volunteering is one of the various social activities that human societies have known and practiced since their inception. It is not the outcome of the last decades of the life of these societies, but it was present in almost every human civilization in its various forms and methods. Voluntary work is of great importance as far as individuals and societies are concerned. It is a symbol of solidarity among the members of the community and all its institutions. It positively affects people's lives as well as the community at large. It symbolizes the meanings of good, giving, and help. Accordingly, volunteering has become a cornerstone in building society and social cohesion among its members. In this regard, voluntary work is of great importance. It necessitates the need to spread this culture in the society and to promote and develop volunteerism among young people using all available and possible methods.
{"title":"The Culture of Volunteerism and the Role of Social Media in its Development","authors":"M. Akel, O. Mohammad","doi":"10.4018/IJISSC.2019070102","DOIUrl":"https://doi.org/10.4018/IJISSC.2019070102","url":null,"abstract":"Volunteering is one of the various social activities that human societies have known and practiced since their inception. It is not the outcome of the last decades of the life of these societies, but it was present in almost every human civilization in its various forms and methods. Voluntary work is of great importance as far as individuals and societies are concerned. It is a symbol of solidarity among the members of the community and all its institutions. It positively affects people's lives as well as the community at large. It symbolizes the meanings of good, giving, and help. Accordingly, volunteering has become a cornerstone in building society and social cohesion among its members. In this regard, voluntary work is of great importance. It necessitates the need to spread this culture in the society and to promote and develop volunteerism among young people using all available and possible methods.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.4018/IJISSC.2019040102
S. R. M. Sekhar, G. Siddesh, Swapnil Kalra, Shaswat Anand
Blockchain technology is an emerging and rapidly growing technology in the current world scenario. It is a collection of records connected through cryptography. They play a vital role in smart contracts. Smart contracts are present in blockchains which are self-controlled and trustable. It can be integrated across various domains like healthcare, finance, self-sovereign identity, governance, logistics management and home care, etc. The purpose of this article is to analyze the various use cases of smart contracts in different domains and come up with a model which may be used in the future. Subsequently, a detailed description of a smart contract and blockchain is provided. Next, different case-studies related to five different domains is discussed with the help of use case diagrams. Finally, a solution for natural disaster management has been proposed by integrating smart contract, digital identity, policies and blockchain technologies, which can be used effectively for providing relief to victims during times of natural disaster.
{"title":"A Study of Use Cases for Smart Contracts Using Blockchain Technology","authors":"S. R. M. Sekhar, G. Siddesh, Swapnil Kalra, Shaswat Anand","doi":"10.4018/IJISSC.2019040102","DOIUrl":"https://doi.org/10.4018/IJISSC.2019040102","url":null,"abstract":"Blockchain technology is an emerging and rapidly growing technology in the current world scenario. It is a collection of records connected through cryptography. They play a vital role in smart contracts. Smart contracts are present in blockchains which are self-controlled and trustable. It can be integrated across various domains like healthcare, finance, self-sovereign identity, governance, logistics management and home care, etc. The purpose of this article is to analyze the various use cases of smart contracts in different domains and come up with a model which may be used in the future. Subsequently, a detailed description of a smart contract and blockchain is provided. Next, different case-studies related to five different domains is discussed with the help of use case diagrams. Finally, a solution for natural disaster management has been proposed by integrating smart contract, digital identity, policies and blockchain technologies, which can be used effectively for providing relief to victims during times of natural disaster.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.4018/IJISSC.2019040103
Ki-Bum Kim, Taewon Kang
Blockchain technology is an electronic ledger of digital records that is distributed over a network of computers rather than located on single or multiple servers. As the technology is by itself transparent and secure even without a trusted third party involvement, many applications are being developed as a means of eliminating corruption around the world. This article examines how the blockchain technology could be used to curb corruption and take integrity to higher standards at a firm level, within-country level and cross-country level. Possible risks and challenges related to the technology were identified and found that without considering the data governance and security issues, the blockchain technology may not always lead to a socio-economic benefit.
{"title":"Will Blockchain Bring an End to Corruption?: Areas of Applications and Potential Challenges","authors":"Ki-Bum Kim, Taewon Kang","doi":"10.4018/IJISSC.2019040103","DOIUrl":"https://doi.org/10.4018/IJISSC.2019040103","url":null,"abstract":"Blockchain technology is an electronic ledger of digital records that is distributed over a network of computers rather than located on single or multiple servers. As the technology is by itself transparent and secure even without a trusted third party involvement, many applications are being developed as a means of eliminating corruption around the world. This article examines how the blockchain technology could be used to curb corruption and take integrity to higher standards at a firm level, within-country level and cross-country level. Possible risks and challenges related to the technology were identified and found that without considering the data governance and security issues, the blockchain technology may not always lead to a socio-economic benefit.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.4018/IJISSC.2019040105
S. Pani, Rajdeep Chatterjee, N. Mahapatra
The learning process has evolved with time. The primary change that technologies have brought into the learning process is more structure and activity based. It has become a necessity and a mandate as well to keep a track of details of educational activities so that it can be referred back to at any point in time. Moreover, it requires a secure protocol which is trustworthy, transparent, less vulnerable and requires near zero involvement of mediators. Blockchain technology has a tremendous potential to disrupt the education sector. Its implementation will help to maintain time-stamped record keeping that can be validated for all types of activities involved in the professional education system. This article proposes a blockchain-based model for professional education systems. The model not only ensures digital identity, verifiable records, but also motivates learning process by rewarding B-coins for learning activities. It inherits the security, robustness of underlying blockchain technology and eliminates the need for verification by an intermediate agency.
{"title":"Towards Trusted, Transparent and Motivational Professional Education System Through Blockchain","authors":"S. Pani, Rajdeep Chatterjee, N. Mahapatra","doi":"10.4018/IJISSC.2019040105","DOIUrl":"https://doi.org/10.4018/IJISSC.2019040105","url":null,"abstract":"The learning process has evolved with time. The primary change that technologies have brought into the learning process is more structure and activity based. It has become a necessity and a mandate as well to keep a track of details of educational activities so that it can be referred back to at any point in time. Moreover, it requires a secure protocol which is trustworthy, transparent, less vulnerable and requires near zero involvement of mediators. Blockchain technology has a tremendous potential to disrupt the education sector. Its implementation will help to maintain time-stamped record keeping that can be validated for all types of activities involved in the professional education system. This article proposes a blockchain-based model for professional education systems. The model not only ensures digital identity, verifiable records, but also motivates learning process by rewarding B-coins for learning activities. It inherits the security, robustness of underlying blockchain technology and eliminates the need for verification by an intermediate agency.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.4018/IJISSC.2019040101
R. S. Bhadoria, Vaibhav Agasti
The invention of blockchain technology has paved the way for the decentralization of existing systems. Blockchains have consistently delivered prominent applications, particularly in the finance sector. The most popular application of blockchain is cryptocurrency. Blockchain technology however has a variety of applications beyond cryptocurrencies. This article discusses the basics of blockchain technology along with some of its potential applications. With the rising use of this technology, the security of these systems is a major concern. The security threats and risks to blockchain systems are also reviewed along with the tools and methodologies to prevent and handle it in more sophisticated manner.
{"title":"The Paradigms of Blockchain Technology: Myths, Facts & Future","authors":"R. S. Bhadoria, Vaibhav Agasti","doi":"10.4018/IJISSC.2019040101","DOIUrl":"https://doi.org/10.4018/IJISSC.2019040101","url":null,"abstract":"The invention of blockchain technology has paved the way for the decentralization of existing systems. Blockchains have consistently delivered prominent applications, particularly in the finance sector. The most popular application of blockchain is cryptocurrency. Blockchain technology however has a variety of applications beyond cryptocurrencies. This article discusses the basics of blockchain technology along with some of its potential applications. With the rising use of this technology, the security of these systems is a major concern. The security threats and risks to blockchain systems are also reviewed along with the tools and methodologies to prevent and handle it in more sophisticated manner.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/IJISSC.2019010104
S. Valsamidis, A. Mandilas, Eirini I Mosxou, L. Tsourgiannis
Nowadays, companies have as key element for their marketing techniques the customer relationship management (CRM) systems. The purpose of this study is to examine the factors that affect the implementation of CRM in a business. A survey was conducted with the completion of structured questionnaires by collecting data from business in the area of Eastern Macedonia and Thrace (EMT). The findings showed that companies of EMT implement satisfactorily strategic methods relating to CRM, putting their customers at the heart of their business. Moreover, they invest heavily in the management of their customers, wanting to gain a long-term relationship with them and simultaneously to integrate customer-oriented approach to the culture and the structure of the company. The external and internal factors that act strongly in maintaining and developing the customer relationship with the business, were identified. The number of employees and the year of foundation are critical factors in the implementation of CRM.
{"title":"CRM Systems in the Area of Eastern Macedonia and Thrace","authors":"S. Valsamidis, A. Mandilas, Eirini I Mosxou, L. Tsourgiannis","doi":"10.4018/IJISSC.2019010104","DOIUrl":"https://doi.org/10.4018/IJISSC.2019010104","url":null,"abstract":"Nowadays, companies have as key element for their marketing techniques the customer relationship management (CRM) systems. The purpose of this study is to examine the factors that affect the implementation of CRM in a business. A survey was conducted with the completion of structured questionnaires by collecting data from business in the area of Eastern Macedonia and Thrace (EMT). The findings showed that companies of EMT implement satisfactorily strategic methods relating to CRM, putting their customers at the heart of their business. Moreover, they invest heavily in the management of their customers, wanting to gain a long-term relationship with them and simultaneously to integrate customer-oriented approach to the culture and the structure of the company. The external and internal factors that act strongly in maintaining and developing the customer relationship with the business, were identified. The number of employees and the year of foundation are critical factors in the implementation of CRM.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121069834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}