State of the Art in E-Gov Research

2011 ◽  
pp. 3649-3669
Author(s):  
Åke Gronlund

This article assesses the maturity of the e-government (e-gov) field by examining the nature of 170 papers published at three major e-gov conferences using a straightforward maturity model. Papers were examined mainly for rigor but, to some extent, also for relevance. It was found that theory generation and theory testing are not frequent, while case stories (no theory, no structured data collection) and product descriptions (no analysis or test) are. Also, claims beyond what is reasonable, given the method used, are frequent. As for relevance, only a few of the cases where theories are either tested or generated concern the role and nature of government and governance; most concern general organizational issues that could well find a place within traditional IS conferences. On the positive side, involvement of various pertinent disciplines appears relevant, and global outreach goes far beyond the Atlantic shores. It is concluded that e-gov conferences need to address quality criteria, both rigor- and relevance-oriented, if e-gov is to develop into a mature research field.

Author(s):  
Shigeaki Sakurai

This chapter introduces a discovery method of attractive rules from the tabular structured data. The data is a set of examples composed of attributes and their attribute values. The method is included in the research field discovering frequent patterns from transactions composed of items. Here, the transaction and the item are a receipt and a sales item in the case of the retail business. The method focuses on relationships between the attributes and the attribute values in order to efficiently discover patterns based on their frequencies from the tabular structured data. Also, the method needs to deal with missing values. This is because parts of attribute values are missing due to the problems of data collection and data storage. Thus, this chapter introduces a method dealing with the missing values. The method defines two evaluation criteria related to the patterns and introduces a method that discovers the patterns based on the two-stepwise evaluation method. In addition, this chapter introduces evaluation criteria of the attractive rules in order to discover the rules from the patterns.


Author(s):  
Muhammad Yousaf ◽  
Petr Bris

A systematic literature review (SLR) from 1991 to 2019 is carried out about EFQM (European Foundation for Quality Management) excellence model in this paper. The aim of the paper is to present state of the art in quantitative research on the EFQM excellence model that will guide future research lines in this field. The articles were searched with the help of six strings and these six strings were executed in three popular databases i.e. Scopus, Web of Science, and Science Direct. Around 584 peer-reviewed articles examined, which are directly linked with the subject of quantitative research on the EFQM excellence model. About 108 papers were chosen finally, then the purpose, data collection, conclusion, contributions, and type of quantitative of the selected papers are discussed and analyzed briefly in this study. Thus, this study identifies the focus areas of the researchers and knowledge gaps in empirical quantitative literature on the EFQM excellence model. This article also presents the lines of future research.


2019 ◽  
Vol 15 (3) ◽  
pp. 216-230 ◽  
Author(s):  
Abbasali Emamjomeh ◽  
Javad Zahiri ◽  
Mehrdad Asadian ◽  
Mehrdad Behmanesh ◽  
Barat A. Fakheri ◽  
...  

Background:Noncoding RNAs (ncRNAs) which play an important role in various cellular processes are important in medicine as well as in drug design strategies. Different studies have shown that ncRNAs are dis-regulated in cancer cells and play an important role in human tumorigenesis. Therefore, it is important to identify and predict such molecules by experimental and computational methods, respectively. However, to avoid expensive experimental methods, computational algorithms have been developed for accurately and fast prediction of ncRNAs.Objective:The aim of this review was to introduce the experimental and computational methods to identify and predict ncRNAs structure. Also, we explained the ncRNA’s roles in cellular processes and drugs design, briefly.Method:In this survey, we will introduce ncRNAs and their roles in biological and medicinal processes. Then, some important laboratory techniques will be studied to identify ncRNAs. Finally, the state-of-the-art models and algorithms will be introduced along with important tools and databases.Results:The results showed that the integration of experimental and computational approaches improves to identify ncRNAs. Moreover, the high accurate databases, algorithms and tools were compared to predict the ncRNAs.Conclusion:ncRNAs prediction is an exciting research field, but there are different difficulties. It requires accurate and reliable algorithms and tools. Also, it should be mentioned that computational costs of such algorithm including running time and usage memory are very important. Finally, some suggestions were presented to improve computational methods of ncRNAs gene and structural prediction.


2018 ◽  
Vol 7 (4) ◽  
pp. 603-622 ◽  
Author(s):  
Leonardo Gutiérrez-Gómez ◽  
Jean-Charles Delvenne

Abstract Several social, medical, engineering and biological challenges rely on discovering the functionality of networks from their structure and node metadata, when it is available. For example, in chemoinformatics one might want to detect whether a molecule is toxic based on structure and atomic types, or discover the research field of a scientific collaboration network. Existing techniques rely on counting or measuring structural patterns that are known to show large variations from network to network, such as the number of triangles, or the assortativity of node metadata. We introduce the concept of multi-hop assortativity, that captures the similarity of the nodes situated at the extremities of a randomly selected path of a given length. We show that multi-hop assortativity unifies various existing concepts and offers a versatile family of ‘fingerprints’ to characterize networks. These fingerprints allow in turn to recover the functionalities of a network, with the help of the machine learning toolbox. Our method is evaluated empirically on established social and chemoinformatic network benchmarks. Results reveal that our assortativity based features are competitive providing highly accurate results often outperforming state of the art methods for the network classification task.


2021 ◽  
Vol 2 (3) ◽  
pp. 59
Author(s):  
Susanti Krismon ◽  
Syukri Iska

This article discusses the implementation of wages in agriculture in Nagari Bukit Kandung Subdistrict X Koto Atas, Solok Regency in a review of muamalah fiqh. The type of research is field research (field research). The data sources consist of primary data sources, namely from farmers and farm laborers who were carried out to 8 people and 4 farm workers, while the secondary data were obtained from documents in the form of the Bukit Kandung Nagari Profile that were related to this research, which could provide information or data. Addition to strengthen the primary data. Data collection techniques that the author uses are observation, interviews and documentation. The data processing that the author uses is qualitative. Based on the results of this study, the implementation of wages in agriculture carried out in Nagari Bukit Kandung District X Koto Diatas Solok Regency is farm laborers who ask for their wages to be given in advance before they carry out their work without an agreement to give their wages at the beginning. Because farm laborers ask for their wages to be given at the beginning, many farm workers work not as expected by farmers and there are also farm workers who are not on time to do the work that should be done. According to the muamalah fiqh review, the implementation of wages in agriculture in Nagari Bukit Kandung is not allowed because there is an element of gharar in the contract and there are parties who are disadvantaged in the contract, namely the owner of the fields.


2021 ◽  
Vol 6 (1) ◽  
pp. 47
Author(s):  
Julian Schütt ◽  
Rico Illing ◽  
Oleksii Volkov ◽  
Tobias Kosub ◽  
Pablo Nicolás Granell ◽  
...  

The detection, manipulation, and tracking of magnetic nanoparticles is of major importance in the fields of biology, biotechnology, and biomedical applications as labels as well as in drug delivery, (bio-)detection, and tissue engineering. In this regard, the trend goes towards improvements of existing state-of-the-art methodologies in the spirit of timesaving, high-throughput analysis at ultra-low volumes. Here, microfluidics offers vast advantages to address these requirements, as it deals with the control and manipulation of liquids in confined microchannels. This conjunction of microfluidics and magnetism, namely micro-magnetofluidics, is a dynamic research field, which requires novel sensor solutions to boost the detection limit of tiny quantities of magnetized objects. We present a sensing strategy relying on planar Hall effect (PHE) sensors in droplet-based micro-magnetofluidics for the detection of a multiphase liquid flow, i.e., superparamagnetic aqueous droplets in an oil carrier phase. The high resolution of the sensor allows the detection of nanoliter-sized superparamagnetic droplets with a concentration of 0.58 mg cm−3, even when they are only biased in a geomagnetic field. The limit of detection can be boosted another order of magnitude, reaching 0.04 mg cm−³ (1.4 million particles in a single 100 nL droplet) when a magnetic field of 5 mT is applied to bias the droplets. With this performance, our sensing platform outperforms the state-of-the-art solutions in droplet-based micro-magnetofluidics by a factor of 100. This allows us to detect ferrofluid droplets in clinically and biologically relevant concentrations, and even in lower concentrations, without the need of externally applied magnetic fields.


2018 ◽  
Vol 56 (4) ◽  
pp. 698-740 ◽  
Author(s):  
Feifei Zheng ◽  
Ruoling Tao ◽  
Holger R. Maier ◽  
Linda See ◽  
Dragan Savic ◽  
...  

2021 ◽  
Vol 7 (2) ◽  
pp. 157
Author(s):  
Muhammad Ali . ◽  
Uswatun Hasanah ◽  
Beko Hendro

This article discusses the implementation of the reading of Surah al-Mulk at the Raudhotul Ilmi Palembang Ta'lim Assembly and the views of the Raudhotul Ilmi Palembang Ta'lim congregation on the reading of Surah al-Mulk as well as an analysis of Max Weber on the recitation of surah al-Mulk at the Raudhotul Ilmi Palembang Ta'lim Assembly. This type of research is a field research (Field Research), the type of data used is qualitative with the study of living hadith. This study uses Max Weber's theory of social action related to four actions, namely, traditional action, affective action, value rationality action and instrumental rationality action. The subjects of this research are caregivers, administrators, ustaz and Jama'ah Majelis Ta'lim Raudhotul Ilmi Palembang. The data collection technique used observation by observing and paying attention to the implementation of the tradition of reading surah al-Mulk at the Raudhotul Ilmi Palembang Ta'lim Assembly. While the interview data, the researchers interviewed twelve Jama'ah as respondents, while the documentation was equipped with books, photos and books related to the research. Meanwhile, data analysis uses descriptions and explanations. This study found that the Jama'ah of the Raudhotul Ilmi Palembang Ta'lim Assembly was enthusiastic about the tradition of reciting surah al-Mulk in the Assembly. The congregation of the assembly is of the view that having the reading of Surah al-Mulk before starting the assembly is a good and good thing as a form of imitating the Prophet Muhammad. The congregation of the assembly supported this activity because of the benefits of reading it as a barrier from the torment of the grave and there were some congregations who routinely read Surah al-Mulk. It can be said that the response of the congregation of the assembly tends to know the values ​​contained in the hadith of reading surah al-Mulk. This shows that the living hadith in the congregation of the assembly was carried out and the Raudhotul Ilmi Palembang Ta'lim Assembly fulfilled Max Weber's theory of social action.


2018 ◽  
Vol 2 (2) ◽  
Author(s):  
Orin Gusta Andini

The purpose of this research is to know the vague of crime perpetrator identity by journalist from law number 40/1990 on Pers and Penal Code Perspective and to know the rule of police in enforcing the law related to vague of crime perpetrator identity in observuing journalist investigation result. The type of this research field is filed research in which data collection done by interviewing several parties related to research. Besides, writer also make literature research through related data and books. Then, data taken is analysed qualitatively and explained descriptively.Based on analysis, writer conclude that: very side interpretation on rejection right is legal weakness that can be used by journalist to do action which vague identity if crime perpetrator. The action of vague crime perpetrator identity fey on Artivle 165 Indonesia Penal Code which oblige every citizen to report known to police officer. The usage of rejection right by journalist not suit to article 165 Indonesia Penal Code that can be used to vague informan identity who is witness, child crime perpetrator and rape victim as journalist ethic code. Keywords: The Vague of Perpetrator Identity, Journalist, Law Number 40/1999 on Pers, Indonesian Penal Code.


Sign in / Sign up

Export Citation Format

Share Document