Department of Information Systems Engineering
Permanent URI for this collection
Browse
Browsing Department of Information Systems Engineering by Issue Date
Now showing 1 - 20 of 32
Results Per Page
Sort Options
Item A TASK FLOW DESIGN TOOL FOR SERIOUS GAMES: AN EXTENDED VERSION OF UML-AD (UML-ADE)(2014-10-06) TOPALOĞLU, Eda; ÇAĞILTAY, NergizBy improving technology, serious game is widely used by several areas such as defense, science, exploration, health care, emergency management, military management, city planning, engineering, religion and politics. However, development and design of these serious games is more important than playing them. Therefore, in order to create successful serious games, involving domain experts and end-users into the development process is important and necessary. During the development process, communication among those people is a very critical factor to better design and development of the game features according to the expected outcomes. In this study, UML Activity Diagram (UML-AD) is analyzed to represent the scenario flow of a serious game and document the serious game design. Additionally, for the design of serious game, an extension of UML-AD, named as UML-Activity Diagram Extended (UML-ADE), is proposed. The main purpose of the UML-ADE model is to improve the level of understandability of the UML-ADE with both the domain-experts, technicians and end-users. Therefore, the understandability level of the proposed UML-ADE model by technicians is investigated, evaluated experimentally. Results of this study show that the understandability level of proposed UML-ADE model is significantly higher than that of UML-AD.Item UNDERSTANDING THE EFFECT OF SERIOUS GAMES ON SURGICAL EDUCATION WITH RESPECT TO SIMULATION ENVIRONMENTS(2015-01-30) GÜNEY, Sinem; ÇAĞILTAY, NergizSerious games and simulations today are providing several benefits for areas such as education, training, health, military as well as commercial systems. However, the borderline between these environments is not very clear in literature. This information is important for designing more appropriate instructional systems according to the variations on learners’ behaviours and their expectations. Our main assumption is that, depending on their experience levels, knowledge levels and individual differences, learners may behave differently on simulation or game based educational systems. Then, as a part of neurosurgery Education Project (ECE), a simulation environment was developed in two versions by applying a gamification approach and simulation. Afterwards, an experimental study was conducted to better understand the effect of gamification on beginners of such an education program. The results of this study indicate that the success rates of the participants for performing assigned tasks in both versions of the application did not change significantly. On the other hand, the gamification group has spent significantly more time for performing the assigned tasks by rarely referring to the navigation feedback. This consequence is evidence showing that the participants’ behaviours have differed in simulation and game-based environments. The results of this study is expected to provide innovative perspectives to the instructional system designers for improving possible benefits of simulations and games in different fields and user groups.Item PRACTICAL MODEL BASED SOFTWARE TESTING(2015-07-26) ÇOŞKUN, Rengin; MISHRA, DeeptiIn this thesis, it is proposed a new approach using both manual and automated testing for MBT. The goal is to find successful test cases. Many different research papers are studied and UML sequence diagram examples of these research papers as a model are used in this thesis. Two new algorithms are written for manual testing. It is designed a new tree technique using depth first search path algorithm to find test path. It is written a new java junit testing code to find test paths automatically in automated testing. It is used same operation for both manual and automated testing and also, it is examined these two methods with same sequence diagram examples. However, effective results are not achieved because of determination of same results and errors in automated testing. Therefore, automated testing (java junit testing) code is improved using different methods. It is compared manual, improved automated method and research papers methods using same examples. Finally, it is obtained more successful test paths and test cases from the improved automated testing method according to the manual and research papers testing methods.Item STUDYING E-LEARNING ACTIVITIES IN A MOBILE PLATFORM DEVELOPING A COURSE APPLICATION(2017-01-04) Özden, Ahmet Yarkın; ERTÜRK, Korhan LeventMobile-learning advancements provides varied options into traditional learning in Universities. Mobile applications that been used for game-like learning in Universities provides powerful e-learning tools for students. In some research shows that, some courses might require a interactive way of communication to make courses more efficiently and keep success rate at high in courses. To be able to consider these essentials those applications should be developed with considering the point of view of the students and the instructors. However, there is limited number of research focusing on development of mobile learning application for university undergraduate context. In this thesis develop an Android mobile application by using Unity 3D software platform as a tool in order to discuss and study on e-learning activities in bachelor‘s and master‘s theses at the Atilim University, and to make recommendations for students who are currently studying or will be studied in course ISE 102 which is called Introduction to Management Information Systems. The current study aims to answer questions about what non-functional requirements of m-learning enviornments might be and how evaluation will be accomplished while studying in m-learning environment for universities undergraduate courses. In addition to that, seeking an answer for viability of applications in universites undergraduate program. For further improvement and necessery data collection an application evaluation testing with purposeful sampling made by ten participants. Addtionally referred model introduction and phases that included in methodology were explained. Research results show that, non-functional requirements for m-learning environments show great importance. Application's modifiability feature among in non-functional requirements might be resultant option for an application. Be able to adjust the contents for different course materials will provide circumstances that will benefical for implementing these application into universities undergraduate courses. In addition to that, scalability as a non-functional requirement can be considered as a essential improvement for an application. According to needs for students and instructors, the content can be scaled up or down. Due to evaluation of this application for this study is a relative subject, students perspective and point of view must be taking into consideration in order to measure the application level. Not only students, however also instructors of these courses perspective, feedbacks should be taken into considertation as a future work.Item COMPARISON OF FACE RECOGNITION METHODS(2017-01-07) Alaisawi, Salem Khalifa Mohamed; Şengül, GökhanMany studies and researches were conducted in the field of face recognition in order to get the best accuracy to attain and provide superior results. However, these studies achieved disparate results in terms of performance and accuracy, thus making it necessary to conduct studies that compare face recognition algorithms and emerge with results that demonstrate which of these algorithms give the best results. This study aims to compare three face recognition method, namely Principle Component Analysis (PCA), Speeded Up Robust Features (SURF), and Gray-Level Co-occurrence Matrix (GLCM). This comparison was tested on four images databases ORL, YALE, FEI, and FERET. The experimental results of this study showed that PCA outperformed the other two methods SURF and GLCM when tested on ORL, YALE, FEI, and FERET databases. The results of GLCM were less accurate and showed low performance as compared to the rest.Item A SYSTEM PROPOSAL FOR COUNTING THE NUMBER OF PEOPLE IN STILL IMAGES(2017-01-07) AL-ZUBAIDI, Waleed; KOYUNCU, Murat; information technologyCounting people in images is a challenging task in the computer vison. This thesis targets to estimate the number of people in images accurately. Our focus is on implementing a robust counting algorithm that depends on different approaches together to detect humans having different appearances in images. Three different approaches are taken as the base of the proposed people counting method. These approaches are frontal face detection, human whole body detection, and people head detection. The main contribution of this thesis is using different approaches together for counting people in still images. We have done that by using Viola-Jones algorithm for face detection, the HOG features and SVM classifier for human body detection, and Hough transform and morphological image processing for head detection in crowded images. Any image is processed by three detectors in parallel and detected people are counted. Then, their results are combined for a final decision. The proposed method is implemented in the C++ language with the help of the OpenCV image processing library. The proposed method is tested and compared with some other approaches. The experimental results show that the proposed method achieves more successful results compared to other approaches when test dataset includes various image categories.Item DETECTION OF FORBIDDEN OBJECTS IN X-RAY IMAGES(2017-04-02) ALZEYADI, HaiderDetection of forbidden objects in x-ray scan images has become an important issue for customs border and airport security. Most border screening depends on the manual detection of possible forbidden objects by human experts. In this thesis, we present a system for detection of possible forbidden objects in x-ray scan images with minimal amounts of missing object (false negatives) and false alarms (false positives). Firstly, pre-processing steps are applied to obtain a clearer image. Then, segmentation is used to locate the potential objects in images. Feature extraction with two algorithms, local binary pattern and histogram oriented gradients, and classification with support vector machine are next steps in the system. The system is tested using handguns as the forbidden objects in question. The experimental results show that the system can effectively detect the handguns in x-ray scan images with minimal amounts of missing objects automatically.Item A CASE STUDY FOR DESIGNING AN ADAPTIVE LEARNING ENVIRONMENT BY APPLYING VARK MODEL(2017-05-02) Jaballa, Rabieaa Abdusalam Massaud; Eryılmaz, MeltemThe styles of learning are personal traits that affect how students relate with their learning environment, peers, and instructor. Four of the most popular are reading / writing, visual, auditory and kinetic, which used by students to gain information. Number of students is visual learners, while others are kinesthetic or audio or read /write learners. While some other students use a combination all of them to gain information, they seem to have preferences in how to learn better. Teachers must teach as more of these preferences as possible, in order to assist students learn. Teachers can put together these learning styles into core curriculum activities so that students can succeed in their classes. This study shows some parts of development framework to identify students learning styles and combination it automatically. This system is based on VARK learning style model and VARK questionnaire to measure students’ learning styles, it is hosting by internet to help students to use it. This study has used a sample of participants that consisted of 50 of engineering students from Atilim University. In addition, this study contain, an experimental design with a pre-post test Control group was utilized. Accordingly analysis of the data, the results show that distribution for t-test for two groups (Control group and Experimental group) was normality distribution and it was determined that the difference in mean scores between the Experimental group and the Control group was significantly in help of the Experimental group and the achievement level in the Experimental group, which applied the VARK teaching model, was higher compared to the Control group. In addition, student satisfaction questionnaire instrument, 10-items that measure students’ satisfaction by using the system, as the results found that students’ satisfaction with the system was significant very high.Item THE IMPACT OF SOCIAL MEDIA MARKETING STRATEGIES ON CONSUMER BUYING BEHAVIOR(2017-05-02) Zarroug, Seham; Ertürk, Korhan LeventSocial media marketing presents new changes in the consumer buying behavior to wards purchasing of brand product or service. The utilization of the social media has become most important and an effective tool that perceived to improve the consumer decision making, increase trust and awareness as well as more satisfaction for brand’s profit and market sales growth. The main purpose of the research is to analyze how social media marketing tool has an impact on the consumer purchase decision mak ing process, how social media improve the customer trust and awareness about brand products or services. A research methodology was based on descriptive statistical approach (questionnaire) in which total 202 participants’ responses from people from Libya who are actively engaged with social media and buying products or services. The findings of the present study is indicating that social media marketing have a positive impact on the consumer buying behavior, awareness, trust, communication and improve the pro ductivity of sales growth respectively and there are some factors can affect customer buying decisions through social media.Item A COMPARATIVE STUDY OF CYBER SECURITY POLICIES(2017-06-02) Bderi,Haithem ABD Esharf; Mishra, AlokThe cyberspace is expanding faster than ever and with it cyber threats are also increasing making it imperative to have a strong cyber-security policy. Cyber-attacks don‘t only affect individual users and organization but can also cause national security issues. The different policies of different countries make it possible for hackers and intruders to carry cyber-attack while making it impossible for authorities to trace back offenders. It is important to develop a comprehensive Cyber-security policy to address all kinds of cyber threats so that every offender can be traced back and penalized accordingly. This research work examines and compares different attributes of cyber-security policies of selected countries. This research work identifies some important attributes which can help to develop an all-inclusive cyber security policy.Item ENHANCEMENTS IN FINGERPRINT AUTHENTICATION(2017-06-02) Alsubaihawi, Mohammed Abdulraheem Taqi; BOSTAN, AtilaFingerprint identification and verification tasks are among the most challenging tasks in image processing and machine learning domains. Fingerprint processing presents a key issue in the biometric technologies and information security. According to the fraction of the people population based on the complete detection of the biometric fingerprint feature such as ridge structure, incomplete (portion) fingerprint image identification and verification task is very difficult to be accomplished. The main challenge in this problem is that the partial loss of the ridge structure in the incomplete fingerprint image. In this thesis, we studied the effectiveness of global feature approach in fingerprint identification and verification task that can deal with the partial image loss or incomplete fingerprint image. Global feature vector extraction is the main global approach that we contribute in this thesis. In this case, we implemented global geometrics based feature extraction for fingerprint identification and verification task. A set of global features (seven-moment values) were extracted from the partial fingerprint (incomplete fingerprint image). The study shows that global feature vector can more efficiently deal with incomplete fingerprint recognition problem when compared with the classical approach to the fingerprint identification and verification problem which is based on extracting minutia features from the fingerprint rides as well as the pores in different feature extraction levels. The studied system has been tested using a database that was randomly generated out of some random incomplete fingerprint images. Randomly generated incomplete fingerprint images were sorted into 10 groups according to the size of the missing part in each image. Then we randomly selected random images from each group to compose a new challenge dataset to be tested in two different approaches which are global, and Local feature extraction approaches. The experimental results show that global approach has about 87% while the local approach has 17% of identification and verification effectiveness. This means global approach improves the performance of the fingerprint identification and verification system on partial (incomplete) fingerprint images by 70% more than the classical approach.Item THE FACTORS IMPACTING E-READING MEDIA PREFERENCES(2022-01-10) ALBASRI, ANEES BASIL ABDULKAREEM; TOKER, SACİPE-reading has been a thing in its simple form since computers were introduced; the use of devices to read text (for leisure or professional purposes) has been drastically increasing over the years, especially in the recent ones, so much that it has become somewhat of a necessity for many people, due to the advantages it provides. It is considered a highly dense topic to research on since there is an increasing demand for it. Nowadays, all smart devices offer the ability to read books etc. and not just computers, as well as the introduction of the dedicated e-readers such as Kindle. Our study revolves around the factors that have an impact over the specific e-reading media preference. We discuss advantages and disadvantages of e-reading, how e reading is compared to paper reading, and mental effort associated with reading from screen among other things as well. The study is conducted by creating a questionnaire for an online survey, in which 331 people voluntarily participated, from different countries and age groups. Results are extracted and analysed to discover the relation between each factor and specific media preference using correlation analysis. The study results show consistency to previous research work about the topic, a general preference towards reading from paper can be seen, while males showing more interest in e-reading than females. Smartphones were the most available device to users, but nonetheless paper had the dominance of preference for iv most materials. Thinking skills and other factors were also discussed and showed relation to the type of reading and preference. All study findings were discussed as well as limitations to the study and ideas for future work. ÖZET E-okuma, bilgisayarların tanıtılmasından bu yana basit formlu bir şey olmuştur; (eğlence veya profesyonel amaçlar için) metin okumak için cihazların kullanımı, özellikle son zamanlarda olmak üzere, yıllar içinde büyük ölçüde artmış ve sağladığı avantajlar nedeniyle birçok insan için neredeyse bir zorunluluk haline gelmiştir. E okumaya artan bir talep söz konusu olduğu için araştırma açısından oldukça yoğun bir konu olarak kabul edilir. Kindle gibi özel e-okuyucuların tanıtılmasının yanı sıra, günümüzde sadece bilgisayarlar değil tüm akıllı cihazlar kitap vb. okuma olanakları sunmaktadır. Çalışmamız, belirli e-okuma ortamı tercihi üzerinde etkisi olan faktörlere odaklanmaktadır. Çalışmada E-okumanın avantajları ve dezavantajları, e okumanın kağıttan okumaya kıyasla nasıl olduğu ve diğer şeylerin yanı sıra ekrandan okumaya ilişkin zihinsel çabaya ele alınmıştır. Çalışma, farklı ülke ve yaş gruplarından 331 kişinin gönüllü olarak katıldığı çevrimiçi bir anket yapılarak gerçekleştirilmiştir. Elde edilen sonuçlar korelasyon analizi kullanılarak her bir faktör ile belirli ortam tercihi arasındaki ilişkiyi keşfetmek için analiz edilmiştir. Çalışma sonuçları, konuyla ilgili önceki araştırma çalışmalarıyla tutarlılık göstermektedir, genel olarak kağıttan okumaya yönelik bir tercih görülebilirken, erkeklerin e-okumaya kadınlara göre daha fazla ilgi gösterdiği görülmektedir. Akıllı telefonların kullanıcılar için en ulaşılabilir cihaz olmasına rağmen, yine de kağıt, vi çoğu materyal için tercih üstünlüğüne sahip olmuştur. Düşünme becerileri ve diğer faktörler de tartışılmış ve okuma türü ve tercihi ile ilişkisi gösterilmiştir. Tüm çalışma bulgularının yanı sıra, çalışmanın sınırlılıkları ve gelecekteki çalışmalar için fikirler de ele alınmıştır.Item DETECTING RESEARCH THEMES AND TRENDS IN MOBILE LEARNING FROM ITS EXISTENCE TO TODAY, USING TOPIC MODELING(2022-01-11) ALGABSI, SALAH EDDIN; Ekin, Cansu ÇiğdemNowadays, a mobile phone is more than just a phone; it is a smart device that can be used to educate individuals, enabling enhanced features for learning, and leading to an increased interest by scholars in leveraging mobile devices to develop a new paradigm of modern education. Recently, with the spread out of the Covid-19 pandemic, countries worldwide have become more orientated towards developing distance learning technologies, specifically online/e-learning, resulting in the emergence of Mobile Learning domain (m-learning) that becomes attractive and pervasive globally. This study aims to detect the longitudinal research trends of mobile learning from its existence to today. First, the study conducted a wide-spectrum literature review on the former studies in m-learning to evaluate the former state of the domain knowledge. Second, the study applied text mining techniques using Latent Dirichlet Allocation (LDA) Topic Modeling to the mobile learning publications content. The main findings of this study concluded 12 dominant topics in m-learning. The Top Three Topics were: “Learn with Mobile Technology”, “Student Language Learn”, and “Learning Design”Item THE IMPACT OF TYPES OF CYBERLOAFING, METACOGNITION, COGNITIVE STYLE, PERSONALITY AND SMARTPHONE USE ON COLLEGE STUDENTS’ ACADEMIC SUCCESS(2022-01-14) MUŞABAK, GÖKBERK İLKER; TOKER, SacipToday’s one of the raised problems is Cyberloafing. The explanation of “cyber” is doing something with smart devices on the internet and “loafing” means wasting time in an aimless way. The combination of these two words is Cyberloafing, which means people who have a tendency to do anything about non-related work while they are at work or school. For this reason, we could say that working or studying can be affected by cyberloafing. The reason why cyberloafing increased is that people can access whatever they need, wherever they are and whenever they are by their smart devices such as smartphones, tablets, laptops and so on. In most of researches focused on how cyberloafing affects employee’s performance on producing in a work environment and just few of them focused on academic success in education. The results shows that there is both pros and cons related to cyberloafing at work and school. In our study investigates that how college students’ academic success (e.g., GPA) influenced by types of cyberloafing, metacognition, cognitive style and need, personality and smartphone use motives or demotives. This study conducted by quantitative process methodology which includes data collection and analysis. The quantitative data was collected by survey questionnaire. It was analyzed by IBM SPSS STATISTIC version 26 and IBM SPSS AMOS version 24 for social science software. The model examined using hierarchical multiple regression. Data collected by survey from Atılım University students who are studying in engineering departments. The research was conducted with 231 undergraduate students. The age of students is between 18 and 25 years old. They were selected by a convenience sampling method. To conclude, this study shows that which factors can directly or indirectly influence academic success positively or negatively.Item THE IMPACT OF DESIGN AESTHETICS, PERSONALITY TRAITS, AND COGNITIVE REFLECTION ON PERCEIVED USABILITY, PRIVACY, TRUST AND CUSTOMERS LOYALTY(2022-01-17) Akinyemi, Olabode Felix; Toker, SacipUsability and human personal characteristics are central issues for internet (both website and mobile apps) users, as users need to access various functionalities through a limited user interface while cognitive reflection and personality traits differ. This study proposes some key determinants of internet usability and assess their significant influence in three empirical settings. In addition, this study examines the impact of design aesthetics, traits and user’s cognitive reflection on usability, privacy, and customer loyalty, and provides a holistic view of the causal relationship between the adopted human factors and some important organizational variables for building and maintaining long term consumer relationships. The study was conducted using survey questionnaire data collected from 338 students of Atilim University, Turkey. The findings of the study confirmed that simplicity and high level interactive platform design, privacy and users’ cognitive reflections are the significant determinants of internet usability, and that interface simplicity is an important prerequisite for a positive usability experience. Also, the findings showed that trust, usability, design aesthetics and personality traits are the vital determinants of consumer loyalty, which shows that trust and guarantee of users’ information on the platform are what drives satisfaction which formulate customers loyalty in the brand. Contributions and limitations of study were also discussed.Item FPGA BASED PACKET HEADER CLASSIFICATION FOR NETWORK INTRUSION DETECTION SYSTEM USING SNORT RULES(2022-01-17) AL BEHAADILI, YOUSIF HOSAIN DAKHIL; Özbek, Mehmet EfeIn data communication through internet, network security became an influential issue. One way to support it is by classifying and filtering incoming packets within devices of network. Packet header classification is an essential task for network devices such as Intrusion Detection System (IDS), it is an important technique for secure networking and communication. Internet services and security tools utilize technique of packet classification which includes checking of each incoming packets against predefined rules. In this research, a new algorithm for packet header classification of network intrusion detection system based on Field Programmable Gate Array (FPGA) has been presented using finite state Machine (FSM) technique. The presented algorithm compares the header fields of incoming packet with predefined rules that stored in block ROM FPGA memory to finding the matching between them and applying some snort actions on them to classify the incoming packet. The FPGA platform has been chosen for this research because of its high speed and quality in processing especially in digital system design. The proposed packet header classification algorithm described in Verilog language and then implemented in Xc7a100tcsg324-1 FPGA board using Xilinx_Vivado 18.2 software. The simulation result show the proposed architecture can classify the incoming packet successfully as desired and the maximum throughput of more than 100 Mbps was achieved.Item THE IMPACT OF PRIVACY AND SECURITY, UBIQUITY AND ATTITUDES ON M-COMMERCE CONSUMER BEHAVIOURS AND ADOPTION(2022-01-18) Ibrahim, Abubakar; Toker, SacipThe advancement in mobile technologies and the rapid penetration of mobile device users is revolutionizing the e-commerce and resulting to the wide use of mobile commerce which appears to be the future of online purchasing. However, in spite of the latest growth and advancements in mobile technologies and m-commerce related activities, there is a corresponding increase in issues such as privacy, security and risk which poses a threat to both consumers and m-commerce service providers or practitioners alike. Hence, there is a need to investigate the factors that influences consumer behaviour, attitude and behaviour intention towards m-commerce in order to proffer some useful suggestion to stakeholder. This research fills the gap by developing a conceptual model based on the Technology Acceptance Model (TAM) variables (perceived usefulness and perceived ease of use) and using external variables or factors such as privacy, security, and ubiquity is employed. A total of 311 questionnaires were distributed to smartphone users in Atilim University. The Structural Equation Modelling (SEM) and path analysis was used to test the model of the study. Based in our findings, we made recommendations and guidelines which were. Consequently, make recommendations from the findings that would be beneficiary to the stakeholders in the mobile commerce industry. The result of findings of this study reveals the positive significance of privacy, security, perceived usefulness, perceived ease of use, ubiquity and their impact on consumer behaviour, altitude and behavioural intention towards the actual use of m-commerce in turkey. The findings of this study will contribute to the current understanding of the subject matter and will be of beneficial as guide and reference to stakeholders that involve in m-commerce activities such as brand managers, retailers, providers and consumers. Additionally, the study will also be beneficial to researchers and students who which to undergo similar study in the context of m-commerce use in Turkey and beyond.Item FACTORS AFFECTING THE INTENTION TO ADOPT CLOUD COMPUTING AMONG COLLEGE STUDENTS IN IRAQI HIGHER EDUCATION INSTITUTIONS(2022-01-20) Fadhil, Estabraq Abbas; Toker, SacipCloud computing is a revolutionary technology that has remodeled many fields, including education, health, government organizations and business. This technology offers numerous on-demand options for organizations to boost their performance and to reduce the cost of production, infrastructure and applications. However, many academics have investigated the topic of cloud computing with regard to factors that influence the adoption decision, especially in developed countries. But, the study still at an immature stage in emerging countries, especially in Iraq. Furthermore, many of the current problems have not been fully researched, particularly in the higher education institutions. As it is known cloud computing is based on services managed by third-party providers. For that reason, trust in cloud services and the perception of possible threats, such as privacy and security concerns, are critical to ensuring the efficient adoption of the appropriate cloud. On the other hand, most studies have researched the technological dimensions of cloud based systems, such as cloud virtualization and scalability. Even though, it is claimed that the biggest challenge to cloud computing is not technical, but instead cognitive or attitudinal. Accordingly, and in an attempt to close this gap, this study investigates the influences that impact the acceptance of cloud technologies by Iraqi universities. This study is focused on the modified Technology Acceptance Model (TAM) as a framework for the creation of the study model. Based on the factors of the proposed modified TAM, research questions are investigated. The factors are: Perceived Usefulness (PU), Perceived Ease of Use (PEOU), Attitudes toward the cloud (ATT), Behavioral Intention (BI), Perceived Risks (PR), Trust (TR), Anxiety (ANX), Actual Use (AU), Perceived Benefit (PB), Perceived Overall Concern (POC), Perceived Cost of Usage (PCU), Perceived Speed of Access (PSA), Social Influence (SI), Culture Context Issues (CCI) and External Storage (ES). These variables are determined through the use of verified items from previous studies. This study employed a quantitative process methodology including data collection and analysis. The suggested model is reviewed and validated using a questionnaire survey conducted online in Iraqi universities groups. Amidst 601 responses received, 576 are valid for data analysis. The questionnaire is divided into two parts: the first set for participants who use cloud computing, and the second directed for the one who do not use cloud computing. The IBM SPSS Statistical Package and the Analysis of Moment Structures (AMOS ver. 24) software are used for data analysis. The suggested model was empirically examined using hierarchical multiple linear regression alongside the Structural Equation Model (SEM). The findings of this study indicate that factors such as Perceived cost, Perceived speed, Social Influence to use cloud computing, a general positive feeling about clouds, variables, that play a significant role in motivating students to adopt cloud computing as part of their core curriculum. On the contrary, factors such as a general negative feeling about clouds, Availability of information and Using External storage It has proven to have a negative impact on the student's intention to adopt cloud computing. Such factors proved to play a significant role in preventing students from embracing cloud computing as part of their education. In conclusion, this study has led to a greater comprehension of the students' intention to use cloud computing at Iraqi universities. This offered deeper insight into the key factors that affect students ' decision to accept and use cloud computing services. As well as, the proposed model, including such factors, has been demonstrated to be a true predictor of user intentions, within the context of Iraq.Item LOGISTICS SYSTEM TRANSITION TOWARDS ENTERPRISE RESOURCE PLANNING: A CASE STUDY(2022-01-25) Alansari, Saeeda; MISHRA, AlokToday, in order to achieve a competitive advantage organization should implement supply chain effectively and have such a product in logistics services. Otherwise, the traditional way of this process causes a problem of not covering everything and it is releasing the risk in organization of missing invoices yearly and not recording it. The director needs to have statistics recorded and accounting payment for every purchase and inventory. In the traditional way, the clerk enroll the data by using excel sheet and count manually by hand with old calculation methods which is very risky for he company. Further more, old machine can be damaged or crash from different reasons an example of that, viruses‘ issues in hard disk that crash the machine then all the data will be lost. Moreover, only one clerk is responsible so if the clerk gets sick the all works for purchases and inventory risk to be delayed. To perform activities effectively and value chain for organization competitiveness it is required to run supply chain in best manner by logistic services information system. Supply chain management has two purposes, firstly product reaches to the end users for multiple departments of the organization, secondly to deliver product to the final customer because it provides many benefits in managing product with coordination and monitoring everyday materials management. To improve the departments in terms of best strategic information system and avoid all the associated risks it is required to have a specific system for inventory control system. Therefore, the main objective of this thesis is to illustrate transition of existing system towards Enterprise Resource Planning Systems (ERP). It also explains inception plan to develop the software and search towards the best system keeping in view many organizational constraints. This also include survey outcome to measure the relationship between management models and organizational innovation in internal processes as part of management efforts towards new system planning.Item A LITERATURE SURVEY ABOUT VERTICAL AND HORIZONTAL SCALABILITY IN CLOUD COMPUTING(2022-02-14) TAYEB, Abdulsalam Salim Tayeb; KOYUNCU, MuratCloud computing has gained popularity in the industry due to the expansion of data generation from various domains such as physics, sciences, business and so on. Scalability can play an essential role in clouds and can improve their performance. The importance of scalability lies in its ability to cope with the increasing workloads by adding additional resources when demand increases. Typically, there are two types of scalability, namely horizontal scalability and vertical scalability. Hence, there are different classifications of scalability in the literature. This thesis is intended to be a comprehensive survey covering all available scalability techniques in cloud including different classifications based on different criteria. This study basically investigated vertical and horizontal scalability methods. In addition, it explores the used technologies for both of them. Moreover, it determines the amount of research publications related to scalability from different perspectives. To reach the specified goal, a systematic mapping study has been done about scalability.