Professional Documents
Culture Documents
Ijsrise V1i1
Ijsrise V1i1
www.ijsrise.com
Publishers:
Anglo-American Publications LLC
Address: No 13, Subat Sokak, Orkoz 1 Apartment, Flat 3, KKTC, Via Mersin 99302,
Turkey.
Phone: +905338364632
www: www.ijsrise.com
E-mail: editor@ijsrise.com
For publishers:
Dr. Samson Oluwaseun Fadiya
Print:
Anglo American Publications LLC
Circulation:
100 Copies
Translator:
Dr. Diana Ada Agbo
Dr. Samson O. Fadiya
Management Information Systems
Girne American University
Karmi Campus,
Mersin 10 Via Turkey.
God is Able. Eph: 3:20
CONTENTS
THE IMPACT OF AGRICULTURE ON THE ECONOMIC DEVELOPMENT OF
NORTHERN CYPRUS
Acheme Okolobia Odeh...........................................................................................................1-8
UTILIZING ICT TO IMPROVE STUDENTS INTEREST IN CLOTHING FOR
ENHANCED CREATIVITY AND ENTREPRENEURSHIP FOR HOME ECONOMICS
GRADUATES
Diana A. Agbo........................................................................................................................9-15
DESIGN AND IMPLEMENTATION OF OBJECT-ORIENTED COMPUTER
SOFTWARE TO SOLVE SECOND ORDER ORDINARY DIFFERENTIAL
EQUATIONS WITH CONSTANT COEFFICIENTS
Atsaam, D. D., Odeh, A. Pius..............................................................................................17-28
BODY SIZE AND SHAPE CATEGORIZATION OF SOME ETHNIC GROUPS IN
BENUE STATE USING WAIST, BUST AND HIP MEASUREMENTS
Diana A. Agbo......................................................................................................................29-36
IMPORTANCE OF THE USE OF INFORMATION SYSTEMS BY FAR-MERS IN
AFRICA
Joshua Chibuike Sopuru........................................................................................................37-43
UNIVERSITY TIME-TABLE SCHEDULING SYSTEM: DATA-BASES DESIGN
Samson Oluwaseun Fadiya, Nwabuzor E. Iruoma...............................................................45-51
AN OVERVIEW OF HUMAN RESOURCE INFORMATION SYSTEMS (HRIS) AND
HOW BEHAVIORMETRICS PREDICT EMPLOYEE PERFORMANCE IN AN
ORGANIZATION
Vanye Zira Vanduhe, Desire Kemena Awoh..........................................................................53-60
AN EMPIRICAL STUDY OF AUTOMATED TELLER MACHINE SERVICE QUALITY ON CUSTOMER SATISFACTION, (A CASE STUDY OF UNITED BANK OF
AFRICA [UBA])
Adeleye Idowu Olusanya, Samson Oluwaseun Fadiya..........................................................61-68
THE IMPACT OF MOBILE MARKETING IN CONSUMER MARKET: A CASE
STUDY OF TURKEY
John Akpesiri Olotewo, Samson Oluwaseun Fadiya............................................................69-78
KNOWLEDGE-BASED AND ARTIFICIAL INTELLIGENCE SYSTEM
APPLICATION IN THE FUZZIFICATION AND DE-FUZZIFICATION OF
RISKS ASSOCIATED WITH MARITIME DRILLING FACILITIES
1. INTRODUCTION
www.ijsrise.com
www.ijsrise.com
The northern part of Cyprus has a surface area of 3,298 km2 that is about 35% of the
total area of the island. Out of this, the rural
area has a quite substantial share of 74,7% (CI
N3) of the area (2,465 km2) with diversified
resources [5]. The region has semi-arid climate
conditions and has been affected by the global
climate change over the last years with warmer seasons, less quantity of rain (25 to 30 %)
and higher temperatures that exceed 45 C in
comparison with the average. Extreme events
such as droughts and floods in North Cyprus
have also taken place increasing soil erosion
and landslides [5].
The overall population of North Cyprus
has increased by 11.5% between 2006 and
2011. The rural population is about 49.4% of
the total population with an amount of 141,475
residents. Although the natural growth rate
has been slightly decreased, the rural population has increased by 0,9% between 2006 and
2011 due to an increasing number of foreign
students (+6,27%) leaving in rural areas [5].
The rural population is not distributed evenly
throughout the territory with a highest share in
Kyrenia (30.72%) and Maria (21.98%) and a
lower share in Nicosia (15.44%) [5].
ii.
Population Growth
Occupational Structure
Labour Force
3. ECONOMIC DEVELOPMENT
of
the
Gross National Product (GNP) is defined as the total market value of all final
goods and services produced by a country in
one year [9].
vi.
Infrastructure
Social Conditions
The rate of literacy, caloric intake,
www.ijsrise.com
infant mortality rate, the death rate, life expectancy, and others are social conditions of
concern when measuring the economic development of a Nation.
viii.
The United Nations Development Program (UNDP) computes a Human Development Index for each country year by year [9].
The human development index (HDI), is composed of three indicators: life expectancy, education (adult literacy and combined secondary
and tertiary school enrolment) and real GDP
per capita. The list of Human Development
Index for individual countries is published by
the UNDP here: http://www.undp.org/hdr2001/indicator/indic_10_1_1.html
The contribution of people who are involved in agriculture activities to the general
population of Northern Cyprus has been on a
steady decline from 14,339 (14.5%) in 2003
to 3,614 (3.7%) in 2011 out of a total TRNC
population of 215,790 in 2003 and 291,609 in
2011. respectively. The statistics show a to GNP per capital
tal employment figure of 98,860 in 2003 and
Report produced by The State Plan- 97,103 in 2011, which is also on a decline. In
ning Organisation Annual Statistics, Nicosia, addition, the economic statistic of 2012. proindicates that the agricultural sector is one of vided by the TRNC Ministry of Finance shows
the key areas of the economy of TRNC [4]. that the overall population of people studying
Although the percentage contribution of agri- agriculture-related programs at the higher edculture to the GDP of TRNC shows a steady ucation level is also on a decrease from 2003
decrease from as the year progresses with ef- to 2011 [8].
fect from 2003 upwards, it is still of primary
importance, as far as its contribution to Gross
Infrastructure and Agricultural
Domestic Product, general export of raw mainvestments
terials, and employment, are concerned. The
contribution of the agricultural sector to the
Investment projects implemented by The
GDP increased from 619.3 million TL in 1977
to 1,005.3 million TL in 2003 at constant pric- Ministry of Agriculture and Natural Resources
es of 1977 with an annual average increase in 2012. where a total 19 projects amounting
of 1.2%. In 2003, this contribution stood at to a total expenditure of 21,820,808.21TL
10.6% of the GDP an increase from 9.2% in while the total subsidy paid to the agricul1990 [4]. However, the GDP contribution de- tural sector in 2012. amounted to a total of
clined from 10.6% from 2003 to 5.9% in 2011 109,034,216.24TL. This leaves us with a difaccording the TRNC Ministry of Finance [4]. ference of 87,213,408.03TL not accounted for
www.ijsrise.com
www.ijsrise.com
5. RECOMMENDATIONS
The significant finding of this study
shows that the agricultural sector of TRCN
has quite a lot of untapped potentials. Here are
some suggestions that can help put the agriculture sector on a productive side in order to
better the economic development of TRNC:
i. Agriculture based research: A sure
way to solve the challenges facing the agricultural sector of TRNC is to encourage
increase agricultural-based studies in the
Ministry of Agriculture and support same in
higher educational levels. This will boost
the industry a lot, and encourage the discovery of new, better, and improved agricultural
practices that will lead to productive and efficient farming methods, yielding significant
outputs, and enhancing better productivity.
ii. Foreign Investors: More foreign
investors should be allowed, encouraged to
come into the agricultural sector of TRNC.
The focus should be on investors with expertise and experience in the field of agriculture.
Especially investors from countries where
their agricultural sector are known to be efficient and highly productive, leading to a
holistic national economic development. The
wealth of experience of such investors will be
a great asset to the Agricultural sector of the
Turkish Republic of Northern Cyprus. To do
this, the government of TRNC, should consider working on its international relations
with other countries. They should also work
towards a permanent solution to its recognition by the international community, either by
reaching a compromise with the South Cyprus
side, which would be the most better option,
or but in more efforts towards its attainment
of the status of a sovereign state that is recognized by the international community.
iii. Encouragement and introduction
of agriculture-related courses (programs)
in Colleges and Universities: The Introduction and Encouragement of Agriculture related courses such as Agricultural Economics in
Colleges & Universities is a sure way to alleviate the challenges agriculture is facing currently in TRNC, especially in the area of management, and industrialized agriculture. This
will increase the number of graduates in the
field of agriculture, and subsequently, increase
agricultures contribution to employment in
the country. As a result, people who have gainful employment in agriculture can attain a better economic status and standard of living. All
these will contribute towards a higher GDP for
the country.
iii. Monitoring System (Management
Information System): One of the most tangible and achievable recommendation of this
project, is for the government of TRNC to set
up a functional monitoring system to evaluate
the proper utilization of resource allocation to
the Ministry of Agriculture. A practical and
functional management information system
can be designed, developed and implemented
by the Ministry of Agriculture and other related ministries, which will monitor, evaluate
and provide relevantly and associated information to government decision makers. The
information supplied by the information system can be used to strategize better ways to
www.ijsrise.com
cost of designing, developing and implementing an information system for the agricultural
sector will be huge. The government can also
solicit support from the international agricultural research development bodies, and from
neighboring Turkish Republic.
Conflict of interests
Author declare no conflict of interest.
REFERENCE
[1] Agricultural Economy. American. Eras.
1997. Encyclopedia.com. (November 3, 2014). http://
www.encyclopedia.com/doc/1G22536601563.html
[2] D. Gale Johnson. Agricultural Economics.
Available at http://global.britannica.com/EBchecked/
topic/9573/agricultural-economics
[3] Regents of the University of California
DRAFT Version 5/2001
[4] Olgun, M.E., `Socio-Economic Profile of the
Turkish-Cypriot Community and the Main Issues to be
Addressed in Preparing for a Political Solution to
the Cyprus Problem, A Research Report prepared for
the UNDP - Development Support Services, published
by EMU, no: 0003-12-01-92, Nicosia, 1991. State
Planning Organisation Annual Statistics, Nicosia
[5] Third draft document of the overall analysis
of the TC Rural Area by TC experts
[6]http://global.britannica.com/EBchecked/
topic/178361/economic-development
[ 7 ] h t t p : / / w w w. b u s i n e s s d i c t i o n a r y. c o m /
definition/analysis.html#ixzz3I3TuF4JQ
[8] Ministry of Finance TRNC. Economic
statistics 2012
[9] Measures of Economic Development.
Available at: http://harpercollege.edu/mhealy/g101ilec/
intro/eco/ecomea/ecomeatx.htm
www.ijsrise.com
10
2. STATEMENT OF PROBLEM
The poor awareness among students
about clothing has produced negative attitude towards it. Most of the knowledge about
clothing is reduced to just sewing of dresses
which is viewed as job for school drop-outs;
giving it a low social perception. The clothing
course demands time and diligence, however,
curriculum planners do not seem to allocate
adequate time for this course as it is usually
lumped with other courses on the time table.
Clothing is still being lumped together with
Textiles as one in some institutions of learning. Professionalism or specialization is not
adequately displayed by graduates of Home
Economics especially in Clothing entrepreneurship (Olugbaimgbe, 2009). The course
content in colleges of Agriculture, and other
tertiary institutions have remained the same
over several years hence students interest in
clothing in particular is very low. Therefore
very few graduates of Home Economics end
up as Clothing professionals. This has resulted
in influx of non-professionals in the business
of clothing construction, Textiles production.
Non-professionals sometimes produce poor
quality garments and clothing items. There
are lots of setbacks on availability and use of
instructional materials by teachers of clothing.
There is therefore need to strategize on
how to enhance the teaching and learning of
clothing to improve creativity and entrepreneurship among Home Economic graduates.
3. PURPOSE OF THE STUDY
The main purpose of the research is to
assess utilization of ICT to improve students
interest in clothing for enhanced creativity and
entrepreneurship for home economics graduates.
3.1. Research Questions
1. What are the factors hindering students interest in Clothing?
2. What is the status of students
knowledge on clothing career opportunities?
www.ijsrise.com
www.ijsrise.com
11
Table 1 shows that all the following factors; inadequate practical, inadequate period
on the school time table, lack of motivation by
teachers, societal perception of clothing constructors hinder students interest in clothing
since each of the means was higher than 2.50.
Inadequate period on the school time table (
X=3.90) has the highest mean while parent
attitude towards clothing has the lowest mean
(X=2.73).
Research Question Two: What is the
status of students knowledge on the importance of clothing as a career? The response to
this research question is in table 2.
Table 2: Status of Student Knowledge
on the Importance of clothing as a career.
12
www.ijsrise.com
13
www.ijsrise.com
Conflict of interests
Author declare no conflict of interest.
REFERENCE
Bacon, J, (1993). Clothing as fixing status.Research issue in Home Economics.5, 45-47 Carroll, K.E
(2001). Introduction and improvisations: A study
in specialized disabilities. A published doctoral
dissertions. Virginia polytechnic institute and
state university.
Chase, R.W.& Quinn, M.D. (2003). Design without
limits: Designing and sewing for special needs
(revised ed) New York: Fairchild.
Chauchan, S. S (1996), Advance Psychology, NewDelhi; Vani Educational Books.
Denga, F. (1991). Vocational Choices.Journal of Educational Research.2, 45-47.
Ezema, P. (1998). Poverty Alleviation in Rural
Nigeria.The
Role
of
Home
Economics.Research Imperatives and chanllenges for Home Economics in Nigeria. P. 155162.
Ekpo, I. (2010). Poverty Reduction through Entrepreneurship Development in Nigeria, Being a paper
presented at the 2nd International conference on
Technology and Operations Management , 5-6th
, July, Bayview Hotel, Malawi.
Igbo, C. A. (1994). Identification of Tasks in clothing
construction for senior secondary students of
Textiles and clothing: A step Towards Achieving
Quality Education in Home Economics Education. Nigeria vocational journal. 7, 52-60
Kaka, H.J. (1998). Guidelines on needlework.Zaria:
Macmillan Publishing Company.
Kembe, E. M. (2008). Evaluation of the Business
Added Value of Home Economics Graduates in
Benue State Implications for Curriculum Innovations in Home Economics Education. Journal
of Home Economics Research. 9,1-10.
Kembe, E. M. (2014). Promoting Creativity and Entrepreneurship for Individuals and Families. Journal of Home Economics Research. 20,109-119.
Lemchi, S. (2001). Strategies for Reducing Stress From
Clothing Construction/Practical in secondary Schools. Journal of Home Economics Research.3 (2), 97-102
Olugbamigbe, A. O. (2009).Appraising Clothing and
Textile Aspects of Home Economics Education
for Enhanced Capacity Building for the Nigerian Youths.Nigerian Journal of Home Economics
(Nig.JHEC).A publication of Home Economics
Council of Nigeria(HECON).Pp 103-106 (1) No
1 July 2009. ISBN:- 978-37772-6-0
Olaitan, S. (1994). Analysis of Methodological Issues
and Challenges in Home Economics Research.
Research Issue in Home Economics.39-45.
Olutola, P. (2000). Environment Mattters.Journal of
Technical Education, 1, 103
Ossai R.U (2003). Clothing and Textile, occupation and
poverty alleviation.Journal of Home Economics
Research, 5 (1), 81-83.
Howe, M (2002). Learning infants and young children,
California: Stanford University Press.
www.ijsrise.com
15
16
www.ijsrise.com
E-mail: donatsaam@yahoo.co.uk
www.ijsrise.com
17
1.1. Terminologies
Equation: This is the relationship between the dependent and independent variables. An equal sign = is required in every
equation.
Comparing with (1.1), we have that
Differential Equation: Equations that
and
are real coninvolve dependent variables and their derivatives with respect to the independent variables. stants.
Giving examples of homogenous equaOrdinary Differential Equation: Differtions
with
constant coefficients according to
ential equations that involve only one indeZever (2012) as:
pendent variable.
Order: The order of a differential equa.
tion is the highest derivative that appears in
.
the differential equation.
Nonhomogeneous equations are equations of the form (1.1) with
Degree: The degree of a differential
written as
equation is the power of the highest derivative
term.
where
are constants and g is a conLinear: A differential equation is called
linear if there are no multiplications among tinuous function on the open interval .
Giving examples of non-homogenous
dependent variables and their derivatives. In
other words, all coefficients are functions of equations with constant coefficients according
to Zever (2012) as:
independent variables.
Non-linear: Differential equations that
do not satisfy the definition of linear.
Homogeneous: A differential equation is
homogeneous if every single term contains the
dependent variables or their derivatives.
Non-Homogeneous: Differential equations which do not satisfy the definition of homogeneous.
IVP: Initial Value Problem
.
.
.
Zever (2012) illustrated that an initial
value problem for second order differential
equations of
Consists of finding a solution of the
differential equation that also satisfies initial
conditions of the form
Richard and Gabriel (2006) stated that
a second order linear homogeneous differential equation with constant coefficient has the
18
www.ijsrise.com
form
(2.7)
(2.1)
According to Richard and Gabriel
Corresponding to the differential equa- (2006), this is applicable only if
of the
tion in (2.1) in which
and
are constants, general solution to the linear differential equais the algebraic equation
tion of the form
(2.2)
and all of its derivatives can be written
Which is obtained from equation (2.1) in terms of the same finite set of linearly indeby replacing
and
by
and pendent functions, which we denote by
, respectively. Equation (2.2) is called
{
}.
the characteristic equation of (2.1). The charThe method is initiated by assuming a
acteristic equation can be factored into
particular solution of the form
(2.3)
Richard and Gabriel (2006) also stated (3.0)
that the General Solution of (2.1) is obtained
where
denote arbitrary
from the roots of (2.3). Richard & Gabriel multiplicative constants. These arbitrary con(2006) considered the three cases below:
stants are then evaluated by substituting the
proposed solution into the given differential
CASE I:
and
both real and dis- equation and equating the coefficients of like
terms. The general solution of the method of
tinct:
undetermined coefficients of non-homogeTwo linearly independent solutions are neous differential equation is given as
and
CASE II:
number:
, a complex
(3.1)
Since
and
in (2.1) and (2.2) are
where
is a constant
assumed real, the roots of (2.2) must appear in to be determined (Richard and Gabriel, 2006)
conjugate pairs; thus the other root is
CASE II:
where
Two linearly independent solutions are
are known constants
and
, and the general complex solution is
Assume a solution of the form
(2.5)
and
(3.2)
where is a constant to be determined
(Richard and Gabriel, 2006).
CASE III:
Two linearly independent solutions are
and
, and the general solution is
www.ijsrise.com
CASE III:
and
where
19
is a constant.
www.ijsrise.com
CASE II:
where
and
are known constants,
satisfying the initial conditions of the form
CASE III:
and are known constants.
If conditions (Ia) and (Ib) holds then, the where
differential equation is solved using the genIf conditions (Ia) and (Id) holds then, the
eral equation which is gotten from the roots
differential
equation is solved by finding a soof the characteristic equation considering the
three different types of roots with their distinct lution of the differential equation that satisfies
general solutions: Both real and distinct roots, the initial condition.
complex roots and equal roots.
If conditions (Ia) and (Ic) holds then,
the differential equation is solved using the
method of undetermined coefficients solution
of non-homogenous linear differential equation with constant coefficients considering the
different cases for solving the equation which
are:
CASE I:
, an nth degree
polynomial in ,
www.ijsrise.com
21
22
www.ijsrise.com
www.ijsrise.com
23
24
www.ijsrise.com
www.ijsrise.com
25
4.
CODING,
TESTING
IMPLEMENTATION
OF
AND
THE
PROPOSED SYSTEM
The program was developed using Visual Basic 6.0 version. Visual basic offers
a graphical user interface (GUI) for all programs. It makes creation of widow-based application easy. The software was tested using
unit testing as well as system testing. The software provides solutions to second order linear
ordinary differential equations with constant
coefficients.
Appendix
Screen shot of the system Home Page
5. CONCLUSION AND
RECOMMENDATIONS
REFERENCES
26
www.ijsrise.com
Form
www.ijsrise.com
27
28
www.ijsrise.com
1. INTRODUCTION
Measurement is very important in garment production because it dictates accurate
fit of a garment on the wearer. The shape
and size of a person can be determined only
through measurement. Body proportions can
vary enormously. This is obvious from the
variety of body shapes that can be seen in
different people. It is essential that measurements are taken accurately; in the correct position and with an equal amount of tension
on the tape. Ganhada (2006) stated that body
measurement is an important role in clothing design ergonomics. Data collected from
measurements are used by garment producCorresponding Author
Dr. Diana A. Agbo, Department of home science and
management, College of food technology, University of
agriculture, Makurdi
Email: drdianadagbo@gmail.com
www.ijsrise.com
29
Figure Types
ure out what the ideal female body measurement is and to try to achieve it. Churchill and
Robert (2005) stated that female figures are
the cumulative product of a womans skeletal
structure, quantity and distribution of muscle
and fat on the body. There has been wide difference on what should be considered an ideal
or preferred body shape both for attractiveness and for health reasons. These have varied among cultures simultaneously with most
physical traits. There is a wide range of normality of female body shapes. Shannon and
Reich (1999) noted that human beings and
their cultures have perennially focused attention on the female body as a source of aesthetic pleasure, sexual attraction, fertility and
reproduction. The female figure is typically
narrower at the waist than at the bust and hips
and usually has one of the four basic shapes:
banana, pear, apple and hourglass.
1.1.1. Banana Shape: This shape is
characterized by wider hip and bust relative
to waist. There is usually a difference of less
than an inch (2.5cm). Fat is generally distributed more in the face, abdomen and buttocks
of this type of body shape. Females who have
this type of body shape usually have less estrogen than androgen (Patterson and Jessie,
1990).
1.1.2. Pear Shape: This body type
shows wider hip than the bust width (Markee
and Elain, 1991). Fat is distributed more in
the hip, thigh and buttocks area of the body.
Body fat begins to develop in the upper body
regions including abdomen as age increases.
1.1.3. Apple Shape: Shoulder and bust
measurement are larger than the width of the
hips. Women who have this shape have the
highest androgen level compared to any other
types of body shape (Markee and Elain, 1991).
1.1.4. Hourglass Shape: The bust and
hip are almost exactly the same in width.
Waist is very much narrower. This shape is
said to be most symmetrical and most perfect
female body shape in a majority of cultures.
www.ijsrise.com
31
Porter, 1999).The designer needs to meet with adults of Tiv, Etulo and Igede?
a pattern maker and sample maker to figure
2. What are the average sizes (small,
out if the sketch on paper can be brought to medium, large) of Tiv, Etulo and Igedefemale
life according to its vision, conception and adults?
production.
3. What are the predominant shapes of
Tiv, Etulo and Igede female adults?
2. STATEMENT OF PROBLEM
Unguarded weight and size lead to difficulty in choice of what to wear. Lack of
knowledge about individuals size and shape
leads to poor garment selection and dressing resulting in poor fit and discomfort for
garment users. Women tend to relax and become careless about their size and shape after
marriage and child delivery. Ready-to-wear
garment producers and importers face challenges of producing or ordering the right sizes
for female users where the sizes and shapes
or figures of the users in a particular locality
are unknown. There are no records of shapes
and sizes of adult females in Benue State. Indigenous standard garment sizes for various
localities including Benue State are unavailable. It therefore becomes pertinent to establish sizes of adult females in Benue State to
provide information for individuals to enhance
proper check on their health, indigenous garment constructors, garment importers and garment entrepreneurs especially in Benue State.
3. METHODOLOGY
3.1. Research Design
The research design was quasi experimental design. This involved selecting
groups upon which a variable was tested,
without any random pre-selection processes.
www.ijsrise.com
4. METHODS OF DATA
COLLECTION AND ANALYSIS
www.ijsrise.com
33
Research Question 2: What are the average sizes of Tiv, Etulo and Igede adult females?
(36.6%). The most predominant shape of Etulo adult females is the Banana shape (36.6%)
followed by the Pear shape (33.3%).The most
predominant shape of Igede adult females is
the Pear shape (30%).
5. DISCUSSION
www.ijsrise.com
7. RECOMMENDATION
1. Based on the findings, it is
recommended that adult females
make adult females should make
concerted efforts at reducing
accumulation of fat on the bust
and waist region since the apple
shape has bad health implication.
2. It is also recommended that Home
Economics extension worker be
involved in educating females of
child delivery age on how to achieve
desirable shapes in adulthood
(banana, pear and Hourglass).
3. It is also recommended that garments
constructors should establish a
standardized garments size chart
for the ethnic groups to eliminate
the problems of garment fit.
Conflict of interests
Author declare no conflict of interest.
REFERENCES
Abend, J. (1993). Apparel Manufacturer and Retailer Effort to Reduce Child Labour: An
Ethics of Virtual Perspective on Codes
of
Conduct.
Ctr.
Sagepub.com/./183.
Doi:10.1177/0887302x02000402.Clothing and
Textiles Research Journal(20), 4, 183-194.
Anikweze, G. U. (2003). Development of dress patterns
for women with figure problems in Enugustate.
www.ijsrise.com
35
www.ijsrise.com
1. INTRODUCTION
37
ture of the farm would be the ever flabbergasting dynamism nature faces. No matter what
we compare the farm to, a proper understanding of the problems facing the implementation
of information system to the farm, would result in a solution for better design and implementation which will in turn lead to overall
efficiency. This article aims at uncovering the
importance of IS systems to agriculture and
highlighting possible reasons that have led to
the poor implementation of information technology in Agriculture, especially in Africa. To
achieve this, we will work following the traditional methods of system design and implementation processes.
computer.
User needs: Pay in money into a bank
account access funds balance online
Here the needs of the user are clearly
defined. No complicated situations are referenced. Thus, a user case diagram can be easily
created as shown in figure 2 below.
www.ijsrise.com
39
40
Farmers have different types of information needs during each stage of the process.
This need ranges from pest attacks, weather
forecasts, cultivation practices, inputs, pest
and prices and disease management. Information systems are designed to provide farmers
with these information needs.
Farmers can obtain information from a
number of different sources, including, among
fellow farmers, trial and error, members of
same social network, etc. While traditional
economic theory assumes that information is
costless, information is rarely symmetric or
costless in developing countries. This is partly
due to the high cost of obtaining information
via traditional means, such as travel, radio or
newspaper. As a result, information asymmetries can be a significant barrier to agricultural
technology adoption in developing countries.
The role of IS in agriculture is also to address
information asymmetries and create a level
playground for stakeholders.
Information system plays a imperative
role in coordinating the activities of agriculture extensions and providing reliable information from reliable sources to farmers.
Agricultural extension has been put
forth since the 1960s as a means of reducing information asymmetries as it relates to
technology adoption in different countries. In
general, agricultural extension is the delivery
of information inputs to farmers (Anderson
and Feder 2007) [6]. The general extension
approach uses specialists to provide different
services to farmers, ranging from technology
transfers to advisory services and human resource development. In some cases, it provides a platform that connects researchers directly to the farmer in order to ensure that new
www.ijsrise.com
www.ijsrise.com
41
www.ijsrise.com
handled.
Conflict of interests
Author declare no conflict of interest.
REFERENCES
[1] Anthony G. Muriithi, Eric Bett, Sarah A. Ogaleh.
Information Technology for Agriculture and Rural Development in Africa: Experiences from
KenyaTropentag 2009, University of Hamburg,
October 6-8, 2009.
[2] Masters, William A. 2009. Africas Turn: From
Crisis to Opportunity in African Agriculture.
David Lee, editor. The Food and Financial Crisis
in sub-Saharan Africa.
[3] Feder, Gershon & Richard E. Just & David Zilberman. 1985. Adoption of Agricultural Innovations in Developing Countries: A Survey,
Economic Development and Cultural Change,
33(2): 255-98.
[4] Cristina Echevarra.1997.A three-factor agricultural production function: the case of canada.
Instituto Valenciano de Investigaciones conmicas, S.A.
[5] Rajender Verma, Shimla and Himachal Pradesh.
June, 2012.Role of Information Technology in
Development of Rural Himachal. .No.- 172027
[6] Anderson, Jock R., Gershon Feder and Sushma
Ganguly. 2006. The rise and fall of training
and visit extension: an Asian mini-drama with
an African epilogue. World Bank Policy Research Working Paper 3928.
[7] Christian Funch. 2008. Information and communication technologies (ICTs) & society. University of Westminster, Communication and Media
Research Institute,School of Media, Arts and
Design.
[8] Fakhreddine K., Milad A., Jamil A., and Monours
A., March 2008, Human-Computer Interaction: Overview on state of the art, International
journal on smart sensing and intelligent systems, vol. 1, no. 1, march 2008
www.ijsrise.com
43
44
www.ijsrise.com
1. INTRODUCTION
A multi-continental university in different countries is very robust in nature and in
handling files. The most popular of its faculties and also the biggest of them is the business faculty which has a huge number of students and even more coming each year. With
the large number of students and also the business and engineering faculty sharing some of
the same classes and even some of other faculties taking some of its courses in the same
facility, the preparation of the business faculty
timetable could be very hectic and tiresome
because of the manual way it is being done.
Some of this Universities uses a manual
system for the selection of courses and preparation of timetables, thereby resulting in clashes when done by the lecturers. But with the
increasing number of students every semester,
this doesnt just cause clashes but also wastes
time.
Corresponding Author
Dr. Samson Oluwaseun Fadiya, Management Information System, Girne American University, Mersin 10 via
Turkey, Email: samsonfadiya.gau.edu.tr
2. DESIGN
A database package would be needed in
order to store all the details about the lecturer,
students, classes, etc. For the back end there
are many possibilities for the database such as
Microsoft Access, MySql, SQL etc.
MySql is popular for handling very
powerful and large databases but it also has a
couple of setbacks some of which are it does
not support transactions or concurrent update
of complex table which if used would have become a huge hindrance to the development of
the system in the making. Oracle is very well
known for the use of SQL statements. It is one
of the most expensive databases on the market.
There is no graphical interface for creation or
modification of tables. This implies that the
use of this database is very time consuming
But for the database of this project we
would be making use ofMicrosoft SQL. SQL
is preferred out of the other databases due to
some reasons. Being one of the database pioneers, SQL has become more easy to use as
well as learning because of this it make developing a new database system much quicker
compared to others such as Oracle, My sql etc.
It is a cheaper software and also more affordable. Also it is easier to learn.
For the front end of this project, we
would be making use of Visual C#, this is because visual C# is a wIDely available, commercial interpreter that are available for most
personal computers. Also the interface includes very familiar GUI controls such as list
boxes, buttons, combo boxes, etc. and with
just a few mouse clicks, one could add a combination of these GUI controls to the program
www.ijsrise.com
45
making it easier and faster to design the user Table 3. Lecturer Table
interface of the program.
2.1. Database Design
The database would consist of eight (8)
entities;
FACULTY,
DEPARTMENT,
LECTURER,
CLASSROOM,
CLASS,
COURSES,
LOCATION,
USERS.
46
www.ijsrise.com
noon or Evening.
Then there is an add button that is
being clicked on only when all the
details are being inputted unless it
brings an error message.
Search, edit, and delete a lecturer:
This page is to search, edit or delete
a lecturer
Here one can search for a lecturer either with the lecturers ID or name.
Then the list of the lecturers are displayed on a table under
To edit a lecturers details, you have
to click on it and change the details
and then click on the edit button.
To delete a lecturers details, one has
to click on the lecturers details and
click on the delete button.
www.ijsrise.com
47
To delete a classrooms details; click course code, classroom and lecturer is being
on the details and click on the delete chosen for that slot. Whenever a constraint is
button.
being breached, an error message is displayed
2.3.4. Courses Icon
www.ijsrise.com
Figure 9. Timetable
49
Functional Testing
50
www.ijsrise.com
System Testing
When the testing is complete, a whole
range of tests is conducted to ensure that the
whole system is working properly.
Recovery Testing
Here we would reboot the computer
while the database is open; this is to check that
in case of a power failure the data would not
be lost.
Acceptance Testing
In this case, the user is brought in and
asked to check the entire program to make sure
all the functionalities is present and working
properly as planned. This kind of testing might
result to further changes depending on the user.
2.4.9.4. Security
The whole program is properly secured
and the Database could be secured by adding
a password in the SQL program.
3. CONCLUSION
The teaching staffs usually spend a lot of
time intimetable generationandtimetable management. The aim of this project is to enable the
process of timetable generation to be done faster and more efficient. There are so many ways
the program could be developed to become a
better application to be used in the university.
Conflict of interests
Author declare no conflict of interest.
REFRENCE
[1] Bouvier. Versions and standards of HTML ACM
SIGAPP Applied Computing Review, 3:9-15,
1995.
[2] F. Sueychyun, University Course Scheduling System (UCSS): A UML Application with Database
and Visual Programming, Journal of Computing
Sciences in Colleges, 20:160-169, 2005.
[3] G. M. White. Constrained satisfaction not so constrainted satisfaction and the timetabling problem. In PATAT00, volume 1, Konztanz, Germany, August 2000.
www.ijsrise.com
51
52
www.ijsrise.com
1. INTRODUCTION
Organizations in the world are currently
being faced with intensive pressure due to the
exponential increase in consumer demand,
environmental influence, government regulaCorresponding Author
Vanye Zira Vanduhe, Department of Management
Information system, Cyprus International University,
Haspolat -Mersin 10-Turkey, North Cyprus,
Email: vanyeb4u@gmail.com
www.ijsrise.com
2. Capabilities of HRIS
Data maintenance: this prevent data
redundancy, updating of the module in cases like when new office
is opened or increase in staff salary
and change in address of staff. Moreover, Davenport and Short (1990)
explained that companies should
adapt systems that can move along
with the change in the technology,
such as the upgrade of the internet
Ipv6 for Ipv4, 3G to 4G. In other for
organization to have stable system
backup of the internet and the stor53
54
3. Literature review
In order to present the theoretical and
methodological underlying principles of this
research, we base on literatures on Human
Resource Information Systems (HRIS) best
practices, implementation HRIS, HRIS, why
HRIS fails and how HRM can forecast employee productivity through behaviormetrics.
Theoretical background will show the effects
of synchronizing Information Systems with
Human Resource with behaviormetrics system framework and how it increases the organizational performance. Notwithstanding using fuzzy data mining which is a tool the HR
uses for staff appraisal and as well talent as
part of performance structure of HRIS (Jing,
H 2009 and Samson Oluwaseun 2014).
HRIS are set of computerized platform
used for communication within and outside an
organization whereby every staff have access
to the computer device which enables staff to
communicate automatically to all aspect of
the organization. (Tannenbaum, 1990)T cited
that, HRIS is a framework used to procure,
store, control, examine, recover and disseminate error free data across HR department of
an organization. (Hoch, 2013) also contribut-
www.ijsrise.com
www.ijsrise.com
55
chain at large.
7. Training: training of staff of technical ad hoc team and towards the end
of the implementation of the HRIS,
managers will be trained on how to
evaluate dealings per time period
and source information from it.
8. Tailoring the system: this stage involves adapting the system and configuring it in accordance to the organizational needs.
9. Data collection: before the system
will be kicked-up, data has to me
entered into the system. Data such
as employee datagrams, accounting
imputation format etc.
10. System testing: this is to see if the
system output best fits the organizational basic requirements and to
analyses is accuracy.
11. Starting up: start-up process is done
to identify some additional errors.
This kick-up begins when all data
are being manipulated into the system. Startups are advised to be done
at odd working time such as weekends.
12. Parallel running: this involves systematically running the old HR and
the HRIS to accurately determine
the output of the new system.
13. Maintenance: in adoption of new
systems are ways of doing things
losses are meant to be incurred,
however, such provision is given
in months or years. Errors could be
remaining and destruction of configured interface could to perpetrated,
therefore, there is need to correction
14. Evaluation: when the system has
been in use for a period of time, the
HRIS need to be evaluated to see if
it is working according to the initial
plan.
IT programs are deemed to work successfully, poor planning are the reasons that
brings about failure in the system, effective
plan should on the database that different department will use should be made in accor2) Why the system fails
dance with the organizational objectives and
70% of business fail in adopting HRIS ways of data inputting should be specified.
because the fail to continuously manage and
Define all business needs, vital obcontrol the system, unstructured objectives,
jectives, and business process that
installing system that cannot be upgraded and
the HRIS will have effect on before
56
www.ijsrise.com
any result is chosen so that the management will evaluate its end result
and see if it has justified their want/
needs.
Under any situation do not incorporate a bad method into your HRIS,
set out time to look over the current
HRIS and the formal before taking
action.
an organization. System that uses this system identifies who an individual is, who he/
she claims to be and how he/she responds in
a repetitive situation in an organization Taru
(Khatri 2013). However, this system records
repetitive behaviors of individuals in an organization using enhanced biometric cameras to
capture voice signature verification, computer
keystroke and mouse dynamics, gait, smile
and face recognition, lips movement, individual odor, eye blinking pattern, and biological
4 Failure to Administer Data signals (Jiang Zhuyz 2013).
Security Properly
For the purpose of this study already
installed biometric system in an organization
Information security issues in private can be used for predicting or forecasting emand public companies security are getting to ployee productivity. Behaviormetrics creates a
be more predominant and critical concern to profile system for the entire employee in an
cloud-based HRIS results specifically. HRIS organization which stores happy, sad, angry
that work through the web can give full data suppressed and fearful mood (Chuan-Yu Chang
control to 3rd party via cloud computing.
2010). Happy or sad profiling will be used for
This can give feedback about en- the purpose of this study. Happy will denote
cryption levels, detection capabili- sad face and sad will denote angry or sad faties, security documentation, secu- cial emotional recognition.
rity staff, and review logs before
A. Properties of Behaviormetrics System
determination and also,
Using the seven qualities of properties
Set aside some time to itemize balance between security and adapt- of the system, we will see how it helps in the
implementation and the synchronization of
ability.
behaviormetrics in human resource information system.
5 Failure to Understand Legal
a) Universality every staff in an orgaRequirements
nization should have general idea of the system and its characteristics and can be accessed
At last, the greatest HRIS mistake made
anywhere.
by organizations is the failure to comprehend
b) Uniqueness every individual must
to the laid down rules for data inputting and
have different biometric features and characinformation retrieval. Management should be
teristics.
aware of the implication of violating the spec) Permanence individual biometcific law.
ric features and characteristics vary, in that it
could be used for assessment.
4. Behaviormetrics
d) Collectability the characteristics
and features must be modeled in an easy to
TechNavio reported an exponential in- acquire and accessed way, quantitative meacrease of the use of biometric system with the surable way and must be measurable quantitagrowth of 22% forecast of voice and facial tively and easy to acquire.
recognition biometric identification within the
e) Performance biometric model for
period of 2012 -2016 (Magazine 2013). Be- measurement must be accurate and the level
haviormetrics is the human behavioral phycol- of fault acceptance must be stated
ogy as seen in this field of studies is refers to
f) Acceptabilitythe acceptance level
as the study human emotional subconscious of biometric system could be ascertained.
and conscious action skills and emotion in
Human face has been proven to as a way
www.ijsrise.com
57
5. Methodology
A. System Design
The already in use architectural biometric
system for authentication of security access using human individual phycology
and behaviors will be harnessed. Behavioral biometrics is already in use. Figure
1 below shows the facial emotion tracking
system (Agrawal U. 2013).
Video camera input: this is the enrolment
stage of each staff in the biometric system,
whereby at the approach of the camera the
video captures scan the face of the individual Khatri 2013.
Processing the image using YCbCr tool
extract facial color components from image, video collected from a digital system.
This tool cleans a picture because it deals
with contrast and brightness of a picture.
58
expression algorithm
www.ijsrise.com
Conclusion
With this data being encapsulated in individual employee database records, the system framework captures individual behavioral
phycology in two ways which are when happy
or sad. When happy explain the probability
of individual best performance output while
when sad explains the probability of low output. HR Manager now with the help of the system compiles the result of the entire employee
in an hour of work resumption in a day. With
this the manager could ascertain daily output
performance and as well predict monthly output with the help of history.
Recommendation
This system is recommended at all
sectors such as education, government, retail organization, production and manufacturing organization, transport, truism etc.
This can only work in an organization that
has an already running biometric system.
www.ijsrise.com
59
Conflict of interests
Author declare no conflict of interest.
References
Khatri, T., and Jindal, A. (2013). Behavioral Biometrics: Extending Keystroke Dynamics to Finger
Dynamics. International Research Journal of
Computers and Electronics Engineering 1 (1),
14 - 23
Arya, G. J., Ajish, K. S., and Rajasree, R. (2014). Synthesize of Emotional Facial Expressions through
Manipulating Facial Parameters. International
Conference on Control, Instrumentation, Communication and Computational Technologies.
(1) 2, 911 916.
Agrawal, U., Giripunje, S., and Bajaj, P. (2013). Emotion and Gesture Recognition with Soft Computing Tool for Drivers Assistance System in
Human Centered Transportation. IEEE International Conference on Systems, Man, and Cybernetics (4) 9.
Hong, K., Chalup, S. K., and King, A. R. (2013). A
Component Based Approach for Classifying the
Seven Universal Facial Expressions of Emotion. IEEE Symposium on Computational Intelligence for Creativity and Affective Computing
(1)4, 1-4
Magazine (2013). Biometric Technology Today
Zhuyz, J., Huz, H., Huy, S., Wuy, P., and Zhangy, J.
Y. (2013). Mobile Behaviometrics: Models
and Applications. 2nd IEEE/CIC International
Conference on Communication (1)9, 1- 8
Lou B. P., Ang, E. F., Belen, R. A., Bernardo, J. R.,
Boongaling, G. H., and Jonathan, B. C. (2004).
Facial Expression Recognition through Pattern
Analysis of Facial Muscle Movements Utilizing
Electromyogram Sensors. IEEE TENCON, 600
603.
Chang, C., and Huang, V. (2010). Personalized Facial Expression Recognition in Indoor Environments. IEEE, (1) 2.
Zafeiriouy, S., and Pantic, M. (2010). Facial Behaviometrics: the Case of Facial Deformation in
Spontaneous Smile/Laughter
Agrawal, U., Giripunje, S., and Bajaj, P. (2013). Emotion and Gesture Recognition with Soft Computing Tool for Drivers Assistance System in Human
Centered Transportation. IEEE International
Conference on Systems, Man, and Cybernetic
s(1)9, 4612 - 4616.
Oziem, D, Gralewski, L., Campbell, N., Dalton, C., Gibson, D., Thomas, B. (2004). Synthesising Facial
Emotions. Proceedings of the Theory and Practice of Computer Graphics, IEEE computer society 0-7695-2137-1
Dao, T. T. (2013). Knowledge-based personalized
search engine for the Web-based Human Musculoskeletal System Resources (HMSR) in biomechanics. Journal of Biomedical Informatics 46,
160173.
Davenport, T., and Short (1990). The new Industrial
60
www.ijsrise.com
1. INTRODUCTION
www.ijsrise.com
61
2. LITERATURE REVIEW
www.ijsrise.com
4. METHODOLOGY
Section B contains the four dimensions; security and privacy dimension contains 4 (items);
Efficiency of operation contains 4 (items);
Speed of operation contains 4(items); Convenience contains 6 (items); Cost involved in
the use of ATM contains 3(items); Effective
service delivery contains 5(items); Reliability
contains 5 (items) and Accessibility contains 3
(items). The questions that were contained in
the questionnaire were all in close ended.
Hypothesis 1
H0: Security and privacy of ATM does
not affect cost involved in the use of ATM.
H1: Security and privacy affects cost involved in the use of ATM
Hypothesis 2
H0: Efficiency of operation does not
have a significant impact on effectiveness of
service delivery.
H1: Efficiency of operation has a significant impact on the effectiveness of service delivery.
Hypothesis 3
H0: There is no relationship between
speed of operation and reliability of service
provided.
H1: There is a relationship between speed
of operation and reliability of service provided
Hypothesis 4
H0: There is no relationship between
convenience and the accessibility of the ATM.
H1: There is a relationship between convenience
and the accessibility of the ATM.
4.1. Test Used For Data Analysis
www.ijsrise.com
Hypothesis 1
H0: Security and privacy of ATM does
63
R
R Square
.333a
.111
Adjusted
R Square
.093
Std. Error of
the Estimate
1.854
Regression
Residual
Total
Sum of
Squares
83.536
670.059
753.595
df
4
195
199
Mean Square
20.884
3.436
F
6.078
Sig.
.000a
64
Coefficientsa
Model
1
(Constant)
I FEEL SAVE WHILE
MAKING USE OF THE
ATM AT ANYTIME OF THE
DAY
THE LOCATION OF THE
ATM IS SECURE FOR
TRANSACTION
MY ACCOUNT CAN ONLY
BE ACCESSED BY ME
THERE IS NO
INTRUTION WHILE I
MAKE TRANSACTION
Unstandardized
Coefficients
B
Std. Error
9.900
.684
Standardized
Coefficients
Beta
t
14.463
Sig.
.000
.043
.161
.022
.268
.789
.452
.164
.221
2.753
.006
.382
.140
.215
2.726
.007
-.297
.136
-.175
-2.187
.030
Model
1
Table 3: Coefficients
The B coefficient shows a positive relationship between security and privacy and
the cost involved in the use of ATM. The table shows which of the variables included in
the model contributed to the prediction of the
dependent variable; therefore beta values are
used for the comparison. In this table, the largest beta coefficient is 0.221 which shows that
the location of the ATM is secure for transaction. This means that the location of the banks
ATM will determine the security of customers when using the machine. This is because it
makes the strongest unique contribution to explaining the dependent variable (cost involved
in the use of the ATM).
Decision: based on the analysis above
for which all calculated values are above the
critical values, the null hypothesis (H0) is
therefore rejected while the alternative hypothesis (H1) is accepted; which states that security and privacy affects cost involved in the
use of ATM.
Hypothesis 2
H0: Efficiency of operation does not
have a significant impact on effectiveness of
service delivery.
H1: Efficiency of operation has a significant impact on the effectiveness of service delivery.
Objective: the standard multiple regression was used to generate results that will indicate how well the set of variables representing
efficiency of operation and its impact on the
effectiveness of service delivery.
www.ijsrise.com
R
.471a
R Square
.222
Adjusted
R Square
.206
Std. Error of
the Estimate
3.494
The model summary. It shows how
much of the variance in the dependent variable
(efficiency of operation) is explained by the
model (the efficiency of the ATM is a determinant of customer satisfaction, the ATM functions perfectly, the ATM often breakdown,
the user-friendliness of the ATM as an effect
on your perception of service quality). In this
case the R square value is 0.222 expressed in
a percentage; this explains 22.2% of the variance in the efficiency of operation.
Table 5: ANOVA
ANOVAb
Model
1
Regression
Residual
Total
Sum of
Squares
677.451
2380.369
3057.820
df
4
195
199
Mean Square
169.363
12.207
F
13.874
Sig.
.000a
Model
1
(Constant)
THE
USER-FRIENDLINESS
OF THE ATM AS AN
EFFECT ON YOUR
PERCEPTION OF
SERVICE QUALITY
THE ATM OFTEN
BREAKDOWN
THE ATM FUNCTIONS
PERFECTLY
THE EFFECIENCY OF
THE ATM IS A
DETERMINANT OF
CUSTOMER
SATISFACTION
Unstandardized
Coefficients
B
Std. Error
8.972
1.911
Standardized
Coefficients
Beta
.467
.317
.102
t
4.695
Sig.
.000
1.474
.142
-.231
.274
-.055
-.842
.401
1.235
.210
.392
5.883
.000
.435
.280
.104
1.556
.121
Correlations
SPEED OF
OPERATION RELIABILITY
1
.178*
.011
200
200
.178*
1
.011
200
200
www.ijsrise.com
65
CONVENIENCE
Pearson Correlation
Sig. (2-tailed)
N
ACCESSIBILITY Pearson Correlation
Sig. (2-tailed)
N
CONVENI
ENCE
1
ACCESSI
BILITY
.282**
.000
200
200
.282**
1
.000
200
200
66
www.ijsrise.com
CONCLUSION AND
IMPLICATION
POLICY
The rapid increase in number of automated delivery channels and customers preference to use ATM because of multifaceted
attributes are placing pressure on banks to
respond aggressively to meet the customers
needs. The study provides necessary input to
the bank management to increase customers
satisfaction through improving ATM service
quality. The focus should not be on ATM
service quality dimensions only. This aspect
should be augmented and integrated with other aspects of the service quality of banks for
satisfaction of customers.
The rapid diffusion of ICT in Nigerian
banking sector provides a platform to use innovative technologies to enhance operational
efficiency and quality of service to attain and
retain customers. The rapid growth in use of
ATMs in Nigeria offers opportunities to banks
to use customers passion for this innovative
service for strategic advantage. The banks
should proactively monitor customers preferences with regard to use of this delivery channel for effective response. Bank should also
focus on important aspects of security and privacy as well as efficient operation of ATMs. In
conclusion the banks should also augment and
diversify their offerings through ATM and use
this medium to build a strong and sustained
relationship with customers.
7. SUGGESTION FOR FURTHER
STUDIES
This research concentrated on determinants of ATM service quality and its impact
on consumer loyalty. Notwithstanding, the
exploration did not examine the relationship
between consumer loyalty and customer retention. Additional research may well explore
the relationship between these two constructs.
The formation of satisfaction process takes
place overtime (Andreasen, 1977). The conclusions of the study relates to a specific time
in present. Additional study should be done on
longitudinal basis to address the interactive
and technological dimensions of ATM service
quality that affect the dissatisfaction level of
customers.
Age has a critical impact on the example
of utilization of innovation based administrations. By and large the young want to utilize
imaginative and innovation based conveyance
channel like ATM that offer different advantages and self-governance of executing transactions (Wan et al., 2005). The old age people
are generally shy of use of ATM because of
perceived risk of failure, complexity, security,
and lack of personalized service (Moutinho,
1992). Future research should explore the association between age and attitude and determine its effects on the ATM service quality
and customers satisfaction.
The price is an essential aspect that affects the customers perception of ATM service quality (Surjadjaja et al. 2003; Iqbal et al.
2003). The fee charge identifies with the impression of non-competitiveness and injustice
and may lead to change in service provider
banks (Colgate and Hedge, 2001). The prevailing economic conditions in Pakistan have
made the people more prices sensitive. This
aspect needs further exploration as essential
dimension affecting ATM service quality and
customers satisfaction.
Conflict of interests
Author declare no conflict of interest.
REFERENCES
ANDREASEN, A. R. (1977). A Taxonomy of Consumer Satisfaction/Dissatisfaction Measures,
Journal of Consumer Affairs, 11(2), pp. 1124.
Churchill, G. A. and Surprenant, C. (1982). An Investigation into the Determinants of Customer Satisfaction, Journal of Marketing Research, 19(4).
Colgate, M. and Hedge, R. (2001). An investigation
into the switching process in retail banking services, International Journal of Bank Marketing, 19(5), pp. 201212.
Donnell, Y. K. (2003). New System of banking. 24-25.
Available from iist.org/Vol6//SITv6, P373-393,
olatokun63.pdf.
Fasan, O. (2007). The Adoption of ATM in Nigerian
www.ijsrise.com
67
68
www.ijsrise.com
1. INTRODUCTION
69
In-game advertising is also growing in popularity, where companies sponsor the development of particular games and then put up
advertisements in between the levels (Cadin,
2006).
4.2. Rationale for mobile advertising
The fact that different homesteads have
mobile phones forms a basis to the argument
that mobile advertising is efficient in a companys advertisement of its products. The current wave of technological growth has contracted the world to global village and there
is increased connectivity between individuals
and companies thus making mobile marketing
a viable endeavor. The advancement in mobile
technology further makes the use of mobile
phones for advertising highly viable in the
contemporary world.
Before giving your customers the option
of mobile advertising, there are several questions you need to factor in:
Are your prospective customers in
possession of mobile phones or devices?
How can you create a cost effective
wireless tether so as to keep the
customers in a continuous loop of
communication?
Will the messages that you will send
open up new opportunities in business?
In a study conducted by Forester, the
findings were that by year 2005, sixty seen
per cent of the American citizens had at least
each a mobile phone in their homes (Business Communications Review, 2005). Most
of the homes had up to four phones. By the
year 2009 the mobile contracts had risen up to
4.6 billion worldwide, justifying the increase
of mobile phones (Pelau & Zegreanu, 2010).
the observance of this trend made the marketers to maximize on the usage of the phones.
Use of mobile phones enhanced communication to the potential and existing customers.
The mobile phones are highly flexible and
one can convey messages any time and any
place. Through advanced technology, marketers can send even photos and videos of their
products to the consumers. At one fell swoop,
www.ijsrise.com
www.ijsrise.com
71
4.5. The potential of mobile marketing and to remove in their adverts. The positive attivalue creation
tude also comes in handy as the marketer will
be guided or be in a position to measure his
Mobile marketing promises to elevate work and estimated outcomes.
business communication through increased
The attitude factor is in most cases afconvenience and more targeted marketing and fected by the threats to the consumers privacy
can thus be considered a potentially valuable in: identity, information, choice and location
form of marketing. Mobile marketing is well annoying (Sultan & Rohm, 2008; Barutu,
known for its ability to overcome barriers of 2007). The customers are in perpetual fear
distance and time in that users can receive because they feel that when they expose their
promotional messages from wherever they are information, it is going to be accessed by the
and that they may receive the messages at any hackers. A study conducted in USA for ages
time as opposed to traditional methods where between 16 and 30 showed that just a51 %
a person for example would have to watch TV were satisfied by the mobile marketing while
or read a newspaper in order to know about 42% percent were not satisfied at all. The
a particular product (McCarthy, 2005). Mo- other cause of negative attitude is the volbile marketing therefore has potential due to umes of messages that are received on a daily
increased convenience and ease in use which basis. They are intrusive into people lies and
makes it highly preferred by marketers. The thus cause people to form a negative attitude
fact that mobile marketing can be used to con- in mobile marketing (Sultan & Rohm, 2008;
duct targeted marketing through concentrating Barutu, 2007).
on one region of the market denotes that moMost of the adults are no longer interbile marketing is highly useful where market ested with the mobile marketing messages,
segmentation has been done. Marketing also this is because the impromptu messages conpromises to reach a considerable number of tain content that is not pleasing to the adults
people due to the increased popularity of mo- or the brands being advertised are not in line
bile phones and mobile internet thus indicat- with what the adults want. On the contrary, the
ing that mobile marketing has great potential young generation is much welcoming the mes(Pelau & Zegreanu, 2010). Mobile marketing sages. This is an indication that the adults who
is expected to create value for companies that are one in position of purchasing the brands
use it to advertise in that it will ensure that the have a negative attitude towards the channels
messages reach the targeted markets at the used to advertise the brands (Barutu, 2007).
most cost effective manner. Notably, mobile
The attitude is determined by the fact
marketing is cheaper than traditional forms of that, a mobile phone ca not detects the differadvertisement because marketers mostly use ence between spam and genuine communiSMS and MMS that can be sent as broadcast cation. This ends up irritating customers and
messages. Accordingly, the marketers are able forces them want to refrain from the mobile
to reach a considerable number of people at a marketing messages. If the customer is interlow cost.
rupted in his/her daily routine or work, he develops hatred towards the brand. He would to
4.6. Customer attitudes towards mobile have a specific time to receive the messages
marketing (Acceptance)
or frequency to receive the messages in the
agreed time.
The fact that the customers have varying
The consumer attitudes differ in so
attitudes when it comes to accepting mobile many factors. This is influenced by so many
marketing affects the viability of mobile mar- factors: age, level of income or education.
keting. This affects the role of permission and Older people as opposed to younger generaacceptance in mobile marketing. The negative tion are not that welcoming to mobile marattitudes portrayed by the customers are not to keting. The younger people are appreciative
be neglected for they help the company repre- to the mobile marketing messages although
sentatives to know what to improve and what they do not have a higher purchasing power.
72
www.ijsrise.com
www.ijsrise.com
73
www.ijsrise.com
Data collection
The results of the research indicated
that there mobile users in Turkey generally
have a positive outlook on mobile marketing and its potential in enhancing advertisement. 57% of the respondents noted that mobile marketing was bound to be effective in
advertising a company and that it could be
used as an alternative to traditional media.
As a matter of fact, they appreciated the mobile marketing messages sent to them because
they helped them to get adequate information
about the existing trends in the market. 49%
of them preferred to get promotional messages on their phones so that they would know
where to shop and where to find discounts.
Asked whether they would recommend
businesses to use mobile marketing in order
to reach their clients, 71% of the respondents
considered mobile marketing an effective tool
for advertising. The various reasons given
for their responses were that mobile marketing was a method that could reach the clients
wherever they are; mobile marketing is less
costly; mobile marketing messages are easy to
understand because they are simple and brief;
and that mobile marketing reaches a significant number of people among other factors.
In this regard, businesses could use mobile
marketing as their means of advertising the
companys products as opposed to placing advertisements in other traditional media such
as newspapers, radio and television; or as a
complimentary form of marketing within the
company.
The most common views on mobile
marketing were identified as follows. The
percentage indicates the proportion of respondents who mentioned the views presented.
www.ijsrise.com
75
7. DISCUSSION
76
www.ijsrise.com
8. CONCLUSION
This paper establishes that mobile marketing in the Turkish consumer market has a
huge potential for growth and this trend may
continue unless the marketers do not adhere
to the ethical rules of mobile marketing. It is
established that the ethics of mobile marketing
to a significant level impact on the ability of
the mobile marketing to perform the expected
functions. This is mostly associated with the
privacy of customer information, issues with
frequent messaging and sending messages that
are considered irrelevant to customers. The
issue of marketing to children is also taken
very seriously as far as mobile marketing is
concerned. In Turkey, mobile marketing has
had the impact of enhancing communication
between the customers and companies such
that customers can easily present their concerns. Mobile marketing has played the role of
keeping customers more informed about new
trends in the market thus making the purchasing process easier. It is notable that as mobile
technology advances, the use of internet marketing is no longer confined to computer use
and that individuals can access advertisements
placed on the internet through browsing websites and social networking sites. This in turn
insinuates that the potential for mobile marketing has grown significantly. In conclusion,
this paper establishes that the place of mobile
marketing in the Turkish consumer market
is growing tremendously and that businesses
could tap this potential to enhance profitability.
www.ijsrise.com
77
Conflict of interests
Authors declare no conflict of interest.
REFERENCES
Turkish Statistical Institute-Telecommunication (TurkStat). (2007). Statistics. Retrieved April 18, 2007
from http://www.turkstat.gov.tr/Start.do;jsessio
nid=1gTTNKJNWs2vT9Q7byXVW4yD2sTM
zQJGRpp2y2hynlKSlST1QmkY!2104946810
www.ijsrise.com
www.ijsrise.com
79
following sections.
As mentioned above, there are many
forms of safety management systems but the
most commonly used ones are (i) the traditional method of safety and, (ii) the proactive
methods and philosophies of quality in conjunction with safety. Safety professionals in
companies adopting the traditional method
of safety directly ensure that workers comply
with the expected company safety standards
and regulations as well as enforce laws and
government regulations. They are informed
on new regulations, devoted to impose rules
and regulations to their employees, carry out
inspections, audit the system, direct investigations of accidents and injuries, and establish recommendations in order to prevent accidents and injuries in future. For the safety
professionals, adhering to this concept means
modifying the behavior of the workers, motivating them, and using prizes and incentives
to help them work in a safer way. Rewards
are given only to those workers or departments that meet the pre-set safety objectives
(Council, 1989). The traditional safety management programmes do not always improve
the results of safety because they are centered
exclusively on the technical requirements and
achievement of short-term results. It has been
observed that organizations adopting the traditional safety management only respond after
occurrence of accidents or injuries.
Another shortcoming of the traditional
safety management program is that the program is isolated and most times disconnected
with the rest of the functions of an organization. The common elements of traditional
safety management structure include: safety
director, safety committee meetings relating to
safety, list of rules pertaining to safety, posting
of slogans, posters, and programs of safety incentives. The responsibility of the safety program falls on the safety director, who occupies
a position inside the organization of the company and, in many cases, does not have the
authority to make changes (Council, 1989).
80
www.ijsrise.com
An
As we have already pointed out the defuzzification process is more complicated than
the fuzzification and consists of four basic
iterative stages which include the iteration,
max-min computation, categorization and inference realization .
The aggregate output fuzzy set is used as
input for the defuzzification process to obtain
an output in a single number. Although fuzziness is required during the intermediate steps
for the evaluation of the rule, the defuzzification is still necessary in order to determine a
crisp value of the output.
81
Conflict of interests
Authors declare no conflict of interest.
REFERENCES
where;
n = the number of aggregated risk level
conclusions
yi = the support value at which the i-th
membership function reaches its maximum
value
uagg ( yi ) = the degree of truth of the
i-th membership function ydef = the Weighted
Mean value of Maximum conclusion
2. ANALYSIS AND CONCLUSION
As mentioned earlier, Fuzzy algorithm,
like every other artificial intelligence model
have been built upon the tools and techniques
of many different disciplines, including formal logic, probability theory, decision theory,
management science, linguistics and philosophy. This is a modernized approach to solving
risk problems. Due to the extreme difficulty
in conducting probabilistic risk assessment in
analyzing and estimating the occurrence likelihood of hazards and the magnitudes of their
possible consequences because of the uncertainty in the risk data, however, the application of FRA in risk assessment may fill the gap
created by other methods due to the following
advantages (An, 2007).
The risk can be evaluated directly by
using qualitative descriptors;
It is tolerant of imprecise data and
ambiguous information;
It gives a more flexible structure
for combining qualitative as well as
quantitative information.
It focuses on qualitative descriptors
in natural language and aims to provide fundamentals for approximate
reasoning with imprecise propositions.
82
Tsadiras AK, Margaritis KG, Using Certainly Neurons in Fuzzy Cognitive Maps. Neural Network
World, Vol.6, 1996, pp.719-728
Tsadiras AK, Kouskouvelis I, Margaritis KG, Making
Political Decision using Fuzzy Cognitive Maps:
The FYROM crisis. Proceedings of the 8th Panhellenic Conference on Informatics,Vol.1, 2001,
pp.501-510
Zadeh LA, An introduction to fuzzy logic applications
in intelligent systems,1st edn. Kluwer Academic
Publisher, Boston, 1992
An, M. (2003b). Application of a knowledge- based
intelligent safety prediction. A Lecture note for
construction management course, University of
Birmingham.
An, M., Wang, J. &Ruxton, T (2000a).The development
of fuzzy linguistic risk level for analysis of offshore engineering products using approximate
reasoning approach. Proceedings of OMAE
2000, the 19th International Conference of offshore mechanics and Arctic Engineering. New
Orleans, USA. pp.321-329.
Bazovesky, I. (1961). Reliability theory and practice.
New Jersey, Prentice Hall, Eaglewood Cliffs.
Bojadziev, G. Bojadziev., M (1995). Fuzzy sets, Fuzzy
logic, Applications. Singapore, World Scientific.
www.ijsrise.com
AUTHOR GUIDELINES
Types of contributions
Original Research, Review Articles, Studies and articles, Book Reviews, Case Studies
and Monographic studies.
Submission declaration and verification
Submit your article
Please submit your article via
http://ijsrise.com/index.php/ijsrise/about/submissions#onlineSubmissions
NEW SUBMISSIONS
Manuscripts must submit only online, proceeds are totally online and you will be guided
stepwise through the creation and uploading of your files. Electronic submission reduces the
editorial processing and reviewing times and reduces the time of submission to publication.
You have to use IJSRISE template to prepare your article and this version upload via
http://ijsrise.com/index.php/ijsrise/about/submissions#onlineSubmissions
Formatting requirements
The prepared article should be formatted with IJSRISE template. There is some parameters for authors.
If your article includes any Videos and/or other Supplementary material, this should be
included in your initial submission for peer review purposes.
Divide the article into clearly defined sections.
Structure of Manuscripts
Title Page
The title page should include:
The name(s) of the author(s)
A concise and informative title
The affiliation(s) and address(es) of the author(s)
The e-mail address of the corresponding author
Abstract
Abstract should contain a maximum of 250 words. The abstracts should avoid any abbreviations and mathematical formulas.
Keywords should include 4-6 keywords.
Text Formatting
Manuscripts should be submitted in Word, A4, Times New Roman, 10-point for abstract
and keywords and 12-points for text.
A complete manuscript falls need to be maximum 8,000 words excluding references,
tables, and figures. Depending on the research and work purposes, the editor decides the acceptance of a larger number of pages
For numerations of pages use the automatic page numbering function.
In the text for emphasis use italics.
The use of abbreviations should be avoided. If using the first Abbreviations should be
used throughout the text the same.
For headings use maximum three levels.
Footnotes should be avoided. If used, footnotes should only contain additional text (comment), and not information about sources used.
Acknowledgments should be placed in a separate section before the reference list.
Introduction State the objectives of the work and provide an adequate background,
avoiding a detailed literature survey or a summary of the results.
Materials and Methods Provide sufficient detail to allow the work to be reproduced.
www.ijsrise.com
83
84
www.ijsrise.com