In the information technology age coupled with computer advances, the information systems have become an integral part of many disciplines;
accordingly, business, marketing, medicine, communication, banking, geography, physics, chemistry, aviation, pilots, forensics, agricultural, even traffic lights have one thing in common called computers. Interdisciplinary Information technology systems are called different names: Decision Support Systems (DSS), Geographic Information Systems (GIS), Knowledge Management Systems (KM), Management Information Systems (MIS), Data Mining (DM), Simulation and Modeling (SM), Artificial Intelligence (AI) etc. All the aforementioned systems are based on computer science whether that may be in terms of; hardware, software, software engineering, and hardware engineering.
The goal of this book is not to look at computer science from traditional perspectives, but to illustrate the benefits and issues that arise from the application of computer science within other disciplines. This book focuses on major breakthroughs within the technological arena, with particular concentration on the accelerating principles, concepts and applications.
The book catered to the needs of scholars, PhD candidates, researchers, as well as, graduate level students of computer science, operations research, and economics disciplines. The target audience for this book also includes academic libraries throughout the world that are interested in cutting edge research. Another important segment of readers are students of Master of Business Administration (MBA) and Master of Public Affairs (MPA) programs, which include information systems components as part of their curriculum. To make the book accessible to all, a companion website was developed that can reached through the link (http://www.computercrossroad.org/).
As such, computer science has cross cutting edge along with many disciplines, whether that may be geography, linguistics, hand writing, security and the web industry, communications, Knowledge management and simulation. Within this context, this book is organized in 16 chapters. On the whole, the chapters of this book fall into five categories, while crossing paths with different disciplines, of which the first concentrates on Artificial Intelligence technology, while the second concentrates on Security: Interior, Exterior, and Security Standards, whereas the third section concentrates on web based industry: assessing quality, web engineering, and critical success factors, in addition to the fourth section that sheds light on computer science implementation in the business arena: aviation industry, learning organizations, multimedia, communications, banking, construction. The Fifth section is suggested readings of different authors. Aiming to enrich this book with others knowledge, experience, thought and insight.
Chapter I, Hybrid Artificial Intelligence Heuristics and Clustering Algorithm for Combinatorial Asymmetric Traveling Salesman Problem, develops a set of meta-heuristics Genetic algorithms (GA), Simulated Annealing (SA) and Hybrid GA-SA to solve a variant of combinatorial optimization problem called Asymmetric Traveling Salesman Problem. The set of met heuristics is compared with clustering based heuristic and the results are encouraging.
Chapter II, An Enhanced Text-Classification-Based Arabic Information Retrieval System, presents enhanced, effective and simple approach to text classification. The approach uses an algorithm to automatically classifying documents. The effects of the Arabic text classification on Information Retrieval have been investigated.
Chapter III, Landmark-based Shape Context for Recognition of Handwritten Digits, introduces a new handwriting methodology based on landmark shapes. The primary contribution is a robust and simple algorithm for finding correspondence between handwritten digits using a variant of shapes. In this chapter, an approach to recognizing handwritten digits based on shape similarity computed through landmark-based shape context is presented. Shape context based object recognition being an iterative process; the reduction in the number of sample points provides a basis for faster recognition.
Chapter IV, Enhanced Information Retrieval Evaluation between Pseudo relevance feedback and Query Similarity Relevant Documents Methodology Applied on Arabic Text, introduces an Enhanced Information Retrieval Evaluation between Pseudo relevance feedback and Query Similarity Relevant Documents Methodology Applied on Arabic Text. The new method uses global feedback information for query expansion in contrast to local feedback information.
The second section concentrates on security: interior, exterior, and security standards, where it is covered in chapter five through seven as follows:
Chapter V, New Technique to Detect CNP Fraudulent Transactions, presents comprehensive frameworks that mines and detect fraudulent transactions of Card-Not-Present (CNP) in the e-payment systems with a high degree of accuracy. The motivation for a comprehensive framework is that money in the e-commerce network is really bits and bytes. Which in turn, make digital crime within banking and financial systems happen very fast and may cost billions of dollars each year-undetected and unreported.
Chapter VI, Key Topics in the Ethics and Economics of Cyber Security, studies key topics in a nascent literature on a cyber security. The chapters first concentrate on how inducements influence the major topics in information security. Three significant topics pertinent for a cyber security concerns are: an exterior security, the internet consequence and information sharing which make effect in the information security. The budding literature has started to study the relationships between vulnerability revelation, patching, manufactured goods prices and profits.
Chapter VII, Using Maturity Model to Govern Information Technology Empirical study applied on the Jordanian Industrial Companies, introduces the COBiTs’ maturity model as a mean of studying the information technology (IT) governance and its affect on the perceived Security Threats. It argues that IT governance using the maturity model offers a probable influence on the level of security breaches frequency; such evidence would be extracted through a complex quantitative and qualitative approach, offers a better understanding of intricate relationships between different factors. Moreover, the authors aimed at understanding the influence of using the maturity model will not only inform the researchers of a better design for IT governance and defining implementation pitfalls, but also assist in the understanding of IT governance practices trend in the Jordanian environment.
The third part of the book concentrates on web based industry: assessing quality of, web engineering, and critical success factors. The chapters eight through ten cover this part as follows:
Chapter VIII, The Critical Success Factors of Web-Based Supply Chain Collaboration Adoption: An Empirical Study, identify the Critical Success Factors (CSFs) and outcomes of Web-based Supply Chain Collaboration (SCC). The study is conducted on seven manufacturing firms in Jordan that use Web systems to collaborate with supply chain members. The results showed that top management support, IT infrastructure, training and education, business processes reengineering, trust among partners, open information sharing, and performance measurement are critical factors for Web-based SCC implementation success. In addition, this study revealed that Web-based SCC implementation is positively related to supply chain relationship quality, performance effectiveness, and performance efficiency.
Chapter IX, Web Engineering in Small Jordanian Web Development Firms: An XP based Process Model, proposes a theoretical model for small web project development and its special features in the context small web firms, which are capable of being 'tailor able' to the particular stage of organizational development of small web firms .
Chapter X, A Proposed theoretical Framework for Assessing Quality of E-commerce Systems, suggests Framework for Assessing Quality of E-commerce Systems. The proposed framework consisted of new indicators that are clear, measurable, and flexible to the possibility of its application on all sites and services, regardless of the nature of the company or institution. Consequently, the proposed framework can be applied easily to evaluate the quality of any system.
The fourth part of this book sheds light on computer science implementation in the business arena: aviation industry, learning organizations, multimedia, communications, banking, construction. The chapters eleven through sixteen will cover such topics:
Chapter XI, Information technology and aviation industry: Marriage of convenience, pinpoints the affects of information technology on the aviation industry, specifically on the Airline ticket prices. The chapter first introduces the different costs that comprise the airline ticket. Then the chapter introduces the different information technology systems that are used in the aviation industry which in turn reduces the price of the airline ticket.
Chapter XII, A Distributed Dynamic Channel Allocation Scheme in Cellular Communication Networks, presents a description and performance evaluation of an efficient distributed dynamic channels allocation (DDCA) scheme, which can be used for channel allocation in cellular communication networks (CCNs), such as the global system for mobile communication (GSM). The scheme utilizes a well known distributed artificial intelligence (DAI) algorithm, namely, the asynchronous weak-commitment (AWC) algorithm, in which a complete solution is established by extensive communication among a group of neighboring collaborative cells forming a pattern, where each cell in the pattern uses a unique set of channels. To minimize communication overhead among cells, a token based mechanism was introduced.
Chapter XIII, Discovering Knowledge Channels in Learning Organization Case study of Jordan, aims to discover the knowledge channels in the learning organization in Jordan. The research studied three aspects of the trusted knowledge channels: first studied the worker perspective and understanding of the TRUST issue. Second the research studied the worker perspectives of the knowledge channels, finding that the worker consider boss, colleague, and assistant as the most important sources of knowledge in the organization. Third the research studied how the organization by providing the right environment will encourage knowledge sharing.
Chapter XIV, Performance Optimization of DWT-Based Image Watermarking Using Genetic Algorithms, applies Genetic algorithms to locate the optimal discrete wavelet transform (DWT) sub-band and the corresponding watermark amplification factor that will lead to maximum imperceptible and robustness. The motivation for such researcher is the widespread of the Internet and the continuous advancements in computer technology have facilitated the unauthorized manipulation and reproduction of original digital multimedia products. The audio-visual industry has been the main victim of such illegal reproduction, and consequently, the design and development of effective digital multimedia copyright protection methods have become necessary more than ever.
Chapter XV, Internet Banking System in South Asian Countries – Preliminary Findings, studies internet banking systems in South Asian Countries and concentrates on Pakistan as an example. The preliminary results indicate that Pakistani banks have been successful in the introductory phase of web based banking. The authors suggest that Pakistani web based banking to move forward with a view of conducting real financial transactions and improving electronic customer relationship. The results and recommendations can be generalized to banks in developing economies, which can no longer ignore the internet as a strategic weapon and distribution channel for their services. The study had are threefold: Examine the extent to which web based banking is practiced in Pakistan; Identify barrier to Internet banking and Offer future directions for both practice and research.
Chapter XVI, Computer Simulation of Particle Packing in Bituminous Concrete, applies particle packing simulation concepts to study aggregate structure in asphalt pavements, in conjunction with the recent advances in nondestructive imaging techniques and Discrete Element Method simulations have tremendous potential to help develop a deeper understanding of the aggregate structure in asphalt concrete, develop and optimize the various parameters that describe the aggregate structure and relate them to the performance of pavements in a scientific way. Which in turn provide s the foundations to building more durable and long-lasting pavements.
The fifth section of this book is made of 3 chapters as suggested readings. In chapter XVII, Information Technology as a Service, the discussion focuses on IT as a service. The author, presents IT development, research, and outsourcing as a knowledge service; on the other hand, argues that IT as a service helps enterprises align their business operations, workforce, and technologies to maximize their profits by continuously improving their performance. Numerous research and development aspects of service-enterprise engineering from a business perspective will be briefly explored, and then computing methodologies and technologies to enable adaptive enterprise service computing in support of service-enterprise engineering will be simply studied and analyzed. Finally, future development and research avenues in this emerging interdisciplinary field will also be highlighted.
In Chapter XVIII, The Impact of Sociocultural Factors in Multicultural Communication Environments: A Case Example from an Australian University’s Provision of Distance Education in the Global Classroom, by providing insight on the impact multiple sociocultural and communicative norms have on virtual communication, this research uses qualitative discursive analysis of case examples to examine how variance in the structure and delivery of virtual communication environments at a leading distance education university in Australia affects student satisfaction, perception, and learning outcomes. Whereas previous research fails to include a theoretical or conceptual framework, this work draws upon interdisciplinary work from the fields of sociology, education, and science and technology studies. How “cyberspace” changes interaction rituals, masks cultural norms, and alters entrenched social expectations by creating new sensitivities is discussed, along with the ramifications of variation in technological availability, competence, and expectations in global classrooms. In sum, ideas for informing change in policy, administration, and the delivery of distance education and virtual communication in global environments are discussed to equip leaders and participants with skills to foster effective communicative and interaction strategies.
Chapter XIX, Adaptive Computation Paradigm in Knowledge Representation: Traditional and Emerging Applications, is survey article discusses the new paradigm of the algorithmic models of intelligence, based on the adaptive hierarchical model of computation, and presents the algorithms and applications utilizing this paradigm in data-intensive, collaborative environment. Examples from the various areas include references to adaptive paradigm in biometric technologies, evolutionary computing, swarm intelligence, robotics, networks, e-learning, knowledge representation and information system design. Special topics related to adaptive models design and geometric computing are also included in the survey.
As mentioned earlier, this book is not meant to look at computer science from traditional perspectives, but to illustrate the benefits and issues that arise from the application of computer science within other disciplines. This book focuses on major breakthroughs within the technological arena, with particular concentration on the accelerating principles, concepts and applications.
As such, through this book, the reader will conclude that computer science crosses paths with many disciplines: geography, linguistics, hand writing, security and the web industry, communications, Knowledge management and simulation. Generally the chapters of this book fall into four categories while intersecting with different disciplines. The first section of the book, chapters one through four, concentrates on Artificial Intelligence technology. The second section, chapters five through seven, concentrates on security: interior, exterior, and security standards. The third part of the book, chapters eight through ten, concentrates on web based industry: assessing quality of, web engineering, and critical success factors. The fourth part, chapters eleven through sixteen, discusses computer science implementation in the business arena: aviation industry, learning organizations, multimedia, communications, banking, construction. The fifth part of the book, chapter seventeen to nineteen are chapter of suggested readings.