You are on page 1of 91

ISSN 2380-5579 (Online)

International Journal of Scientific Research


in Information Systems and Engineering
(IJSRISE)

Volume 1, Issue 1, July 2015.

www.ijsrise.com

Publishers:
Anglo-American Publications LLC
Address: No 13, Subat Sokak, Orkoz 1 Apartment, Flat 3, KKTC, Via Mersin 99302,
Turkey.
Phone: +905338364632
www: www.ijsrise.com
E-mail: editor@ijsrise.com
For publishers:
Dr. Samson Oluwaseun Fadiya
Print:
Anglo American Publications LLC
Circulation:
100 Copies
Translator:
Dr. Diana Ada Agbo
Dr. Samson O. Fadiya
Management Information Systems
Girne American University
Karmi Campus,
Mersin 10 Via Turkey.
God is Able. Eph: 3:20

CONTENTS
THE IMPACT OF AGRICULTURE ON THE ECONOMIC DEVELOPMENT OF
NORTHERN CYPRUS
Acheme Okolobia Odeh...........................................................................................................1-8
UTILIZING ICT TO IMPROVE STUDENTS INTEREST IN CLOTHING FOR
ENHANCED CREATIVITY AND ENTREPRENEURSHIP FOR HOME ECONOMICS
GRADUATES
Diana A. Agbo........................................................................................................................9-15
DESIGN AND IMPLEMENTATION OF OBJECT-ORIENTED COMPUTER
SOFTWARE TO SOLVE SECOND ORDER ORDINARY DIFFERENTIAL
EQUATIONS WITH CONSTANT COEFFICIENTS
Atsaam, D. D., Odeh, A. Pius..............................................................................................17-28
BODY SIZE AND SHAPE CATEGORIZATION OF SOME ETHNIC GROUPS IN
BENUE STATE USING WAIST, BUST AND HIP MEASUREMENTS
Diana A. Agbo......................................................................................................................29-36
IMPORTANCE OF THE USE OF INFORMATION SYSTEMS BY FAR-MERS IN
AFRICA
Joshua Chibuike Sopuru........................................................................................................37-43
UNIVERSITY TIME-TABLE SCHEDULING SYSTEM: DATA-BASES DESIGN
Samson Oluwaseun Fadiya, Nwabuzor E. Iruoma...............................................................45-51
AN OVERVIEW OF HUMAN RESOURCE INFORMATION SYSTEMS (HRIS) AND
HOW BEHAVIORMETRICS PREDICT EMPLOYEE PERFORMANCE IN AN
ORGANIZATION
Vanye Zira Vanduhe, Desire Kemena Awoh..........................................................................53-60
AN EMPIRICAL STUDY OF AUTOMATED TELLER MACHINE SERVICE QUALITY ON CUSTOMER SATISFACTION, (A CASE STUDY OF UNITED BANK OF
AFRICA [UBA])
Adeleye Idowu Olusanya, Samson Oluwaseun Fadiya..........................................................61-68
THE IMPACT OF MOBILE MARKETING IN CONSUMER MARKET: A CASE
STUDY OF TURKEY
John Akpesiri Olotewo, Samson Oluwaseun Fadiya............................................................69-78
KNOWLEDGE-BASED AND ARTIFICIAL INTELLIGENCE SYSTEM
APPLICATION IN THE FUZZIFICATION AND DE-FUZZIFICATION OF
RISKS ASSOCIATED WITH MARITIME DRILLING FACILITIES

Ezurike B.O, Ezurike O, Okoronkwo C.A, Osueke G.O, Igbokwe J.O.................................................................79-82

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

THE IMPACT OF AGRICULTURE ON THE ECONOMIC


DEVELOPMENT OF NORTHERN CYPRUS
Acheme Okolobia Odeh, Management Information System (MSc), Girne American University, Mersin 10 via
Turkey, E-mail: odeh_acheme@yahoo.com
Received: May, 05.2015.
Accepted: June, 29.2015.
Articles
Abstract. This survey research was conducted
to investigate the impact of agriculture on the economic
development of Northern Cyprus. Data were collected
from scholarly articles, Journals, and the North Cyprus
Ministry of Agriculture and Natural Resources. The
analysis of the impact of agriculture on the economic
development of North Cyprus is a challenging task, but
critical considering the role agriculture plays in the economic development of countries and nations such as
Northern Cyprus. The significant finding of this study
shows that the agricultural sector of TRCN has a lot of
untapped potentials. The reasons for the dearth or decline
in the productivity of the agricultural sector is discussed
and analysed in this project.
A couple of recommendations, following the
challenges facing the promising agricultural sector of
Northern Cyprus included: increase in agricultural-based
research in the Ministry of Agriculture and in higher
educational levels, which will boost the industry a lot,
and encourage the discovery of new, better, and improved
agricultural practices; more foreign investors should be
allowed to come into the agricultural sector of TRNC;
The Government should set up a system to monitor and
evaluate the success of implementation of funds allocated
to the Ministry of Agriculture and Natural Resources; The
Introduction and Encouragement of Agriculture related
courses such as Agricultural Economics in Colleges &
Universities is also a sure way to alleviate the challenges
agriculture is facing currently in TRNC; lastly but not
the least, we recommend that the Government of TRNC
should consider an increase in the overall financial allocation to the agricultural sector, to boost its activities, and
encourage loan to farmers and further development in
the agricultural sector.
Keywords: Agriculture, Development, Economic,
Production, SWOT, System.

1. INTRODUCTION

From time immemorial till the date


agriculture has played a vital role in the development of nations and in supplying mans
basic nutritional and dietetic needs. The role
agriculture has played in the development of
nations cannot be overemphasized. The evolution of man according to early scientist and
historians has pinpointed agriculture as the
primary source of survival and occupation of
the first man, as well as the earliest commodity of trade amongst nations before the era of
civilization and industrialization.
The changes that overtook agriculture
over the last dozen or so years of the century
were nearly as dramatic as those transforming
industry[1]. Farming still made up a substantial part of the economy but is declining in
relative importance [1]. As a country develop
economically, the relative importance of agriculture declines. The main reason for the decline was illustrated by Ernst Engel, a German
statistician. Ernst Engel discovered in his experiment that as incomes increase the proportion of income spent on food declines relatively. For instance, if the income of a family were
to be increased by 100%, the amount it would
spend on food might subsequently increase
by 60%. Assuming the expenditure on food
was 50% of the familys budget before the
increase. After the increase, it would amount
to only 40 percent of its budget. Based on the
analogy given above, we can safely conclude
that, as incomes increase, a smaller fraction
of the total resources of society is required to
produce the amount of food demanded by the
population [2].
Corresponding Author
Acheme Okolobia Odeh, Management Information
The aim of this survey is to establish the
System (MSc), Girne American University, Mersin 10 facts and principles that must be known to anvia Turkey, E-mail: odeh_acheme@yahoo.com

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

alyse the effect of agriculture on the economic


development of North Cyprus. This would
lead to an understanding of how the agricultural sector of Northern Cyprus is performing,
and based on the findings, what can be done
to optimize the agricultural sector to its full
potentials for the economic benefit of TRNC.
This project also aims to address and
analyse the past and existing state of agriculture in North Cyprus. The future of farming
in North Cyprus is dealt with in this research.
The percentage of employment agriculture
offers in North Cyprus, the percentage share
of agriculture in the economy are some of
the vital areas of interest that this research
focuses and tries to analyse. Finally, an attempt is made to analyse the value added and
the SWOT analysis of the agricultural sector
of North Cyprus, recommendations as well as
suggestions are made at the end of the project
in regards to the findings.
The significance of this research cannot
be overemphasised, as the findings and recommendations will be of immense benefit to
the government of North Cyprus especially
the Ministry of Agriculture to proffer ways in
which the agricultural sector can be enhanced
to boost the economy of the country. This survey will serve as a source of reference to future research in the field of agriculture and the
economy of North Cyprus. The recommendations in this study will be of great benefits to
universities, colleges and the Cyprus Ministry of Education, to see areas where they can
make adjustment to their school curriculum
and subjects to incorporate courses aimed at
developing agriculture for the economic benefit of TRNC. Farmers are not left out of this
advantage. The suggestions will help farmers
know the importance or the role agriculture
plays in the economy of TRNC. Thereby putting in more effort to boost agriculture for the
larger populace. The recommendations presented, will also be of help to business specialist in the agro-industry, the statistical records
and analysis will show them how to predict
the future of agriculture and the economy as
a whole thereby make substantive and strategic plans for the present and the future. In a
nutshell, this report will be a great source of
reference and educational guide to students,
2

researchers and their like.

2. THE TERM AGRICULTURE


Agriculture is the science, art and occupation of cultivating the soil, producing
crops and raising livestock [3]. Agriculture is
the very basis of civilization; it is the food we
eat, the clothing we wear, the material of our
homes, the gardens around us, and many of
our traditions and values [3].
Agriculture also entails the processing,
marketing, distribution and financing of agricultural products; farm production supply and
service industries; health, nutrition and food
consumption; the use and conservation of land
and water resources; development and maintenance of recreational resources; and related
economic, sociological, political, environmental and cultural characteristics of the food
and fibre system [3].

2.1. Benefits of Agriculture


The necessity of food for our physical,
cultural and economic development makes
agriculture a crucial sector. There is strong
indication that only agriculture has the greatest tendency of meeting the worlds basic food
needs in the coming years.
Most of the products we use in our everyday life come from plant and animal byproducts. Some of these products include but
not limited to pharmaceutical products, ointments, surgical sutures, latex gloves, x-ray
films amongst other health care product. How
about manufacturing? Products such as lubricants, adhesives, detergents and polymers
are some of the derivatives of agriculture. To
the educational sector, agriculture provides
raw materials for production of crayons, textbooks, pencils and papers among several others. We cannot leave out Personal Care and
construction. Shampoo, lotions, cosmetics,
toothpaste, fingernail polish etc., are all personal care benefits derived from agriculture.
In the construction industry, agricultural products such as lumber, paints, tar paper, brushes,
drywall, particle boards etc., are all provided
to the building industry from the stable of ag-

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

riculture and its by-products.


Agriculture has built a partnership relationship with all of these industries over the
years. For instance in the health care industry,
families and livestock of farmers get health
care services from the health care industry,
and the healthcare industry makes us of finished products such as wools, produced from
agricultural commodities. We now have the
technology that provides computers for farmers for tracking market and information about
the weather. The manufacturing industry is not
left out in this partnership; they provide tools
and equipment for mechanized agriculture or
farming to the agricultural sector.
More so, agriculture offer by far the
worlds best and probably the only viable solution to the growing future challenges to protect the environment and to deal with global
climate change. Everyone benefits from agricultural research and operations. Agricultural
land provides food and habitat for 75% of
the nations wildlife [3]. Agriculture has been
greatly enhanced by the age of civilization and
technology to a great extent. Biotechnology
has contributed a great deal in helping towards
the development of new and better techniques
used to increase crop yields and farm productivity.
Lastly, only agriculture offers a reliable
chance of extending the food choices now
available to the wealthy and the worlds
growing middle class, as well as lower class.

The northern part of Cyprus has a surface area of 3,298 km2 that is about 35% of the
total area of the island. Out of this, the rural
area has a quite substantial share of 74,7% (CI
N3) of the area (2,465 km2) with diversified
resources [5]. The region has semi-arid climate
conditions and has been affected by the global
climate change over the last years with warmer seasons, less quantity of rain (25 to 30 %)
and higher temperatures that exceed 45 C in
comparison with the average. Extreme events
such as droughts and floods in North Cyprus
have also taken place increasing soil erosion
and landslides [5].
The overall population of North Cyprus
has increased by 11.5% between 2006 and
2011. The rural population is about 49.4% of
the total population with an amount of 141,475
residents. Although the natural growth rate
has been slightly decreased, the rural population has increased by 0,9% between 2006 and
2011 due to an increasing number of foreign
students (+6,27%) leaving in rural areas [5].
The rural population is not distributed evenly
throughout the territory with a highest share in
Kyrenia (30.72%) and Maria (21.98%) and a
lower share in Nicosia (15.44%) [5].

2.3. Agriculture in TRNC

Report produced by The State Planning Organisation Annual Statistics, Nicosia,


indicates that the agricultural sector is one of
the key areas of the economy of TRNC [4].
2.2. Turkish Republic of Northern Although the percentage contribution of agriculture to the GDP of TRNC shows a steady
Cyprus
decrease from as the year progresses with efCyprus is the third largest island in the fect from 2003 upwards, it is still of primary
Mediterranean Sea after Sicily and Sardinia importance, as far as its contribution to Gross
islands, with an area of 9,251 km2. The neigh- Domestic Product, general export of raw mabouring countries of Cyprus are Turkey in the terials, and employment, are concerned. The
north (60 km), Syria in the west (96 km), Egypt primary agricultural products farmed in TRNC
in the south (385 km), Greece in the east (380 include but not limited to animal breeding,
km), Lebanon and Israel [5]. After the failure fish & fish products, citrus, cereals, honey and
of the United Nations plan aiming at bringing vegetables.
a comprehensive solution to the Cyprus dispute, the island was virtually split within the
framework of the fifth enlargement of the EU
on May 1, 2004. The negotiations on resolving
the Cyprus dispute has restarted in 2014 [5].
www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

2.4 . Limitations to agricultural


development in TRNC
The greatest limitations to the
advancement of agriculture in TRNC may
be attributed to the unfavourable climatic
conditions of North Cyprus. The severe nature
of the soil, scarcity of water, natural disasters,
low financing of agriculture and the limitation
of TRNC in participating in international trade
due to its non-recognition by the international
community are issues of great concern in the
development of TRNC.

ii.

Population Growth

It has been observed over the years, and


from research reports that poorer countries
show a higher rate of population growth. According to the Economic Geography, a useful
way to see this is by using the Rule of 70
[9]. The rule of 70 is a way to apprise the number of years it takes for something to replicate
if you know the annual percentage growth rate
[9].
iii.

Occupational Structure
Labour Force

3. ECONOMIC DEVELOPMENT

of

the

Economic geographers divide economic


activities into primary activities, secondary
Economic development is the process
activities, and tertiary activities [9]. In the case
whereby simple, low-income national econoof LDCs, most of the people engage in major
mies are transformed into modern industrial
activities. Whereas in high MDCs most people
economies [6]. Although Economic Develare involved in tertiary activities.
opment is sometimes used interchangeably
with economic growth, it is used to indicate
a change in a countrys economy involving
iv. Urbanization
qualitative and quantitative improvements.
Urbanization is the percentage of a counAccording to Business Dictionary, Economic Development is a systematic examina- trys population who live in urban areas[9].
tion and evaluation of data or information, by
breaking it into its component parts to uncover
v. Consumption per capita
their interrelationships, thus providing basis
for problem solving and decision making [7].
It is assumed that the richer a country is,
the more the citizens of the country will consume [9]. A major consequence of consumption is pollution. When fossil fuels are used,
3.1. Measures of economic
Carbon dioxide (CO2) is emitted, as a result.
development

Countries in the world can be the place
in two broad categories: The Less Developed
Countries (LDCs) and The More Developed
Countries (MDCs). The measures employed
in placing countries in these categories are
discussed below:
i.

GNP per capita

Gross National Product (GNP) is defined as the total market value of all final
goods and services produced by a country in
one year [9].

vi.

Infrastructure

Infrastructure is the bed-rock of a society: networks, communications, urban


centres, energy distribution systems, transport, mines, farms, factories, mines, and
facilities such as hospitals, police, postal
services, and schools, defines the foundation of any society. The higher the development of infrastructure, the greater the degree of economic development is presumed.
vii.

Social Conditions
The rate of literacy, caloric intake,

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

infant mortality rate, the death rate, life expectancy, and others are social conditions of
concern when measuring the economic development of a Nation.
viii.

Human Development Index [HDI]

The United Nations Development Program (UNDP) computes a Human Development Index for each country year by year [9].
The human development index (HDI), is composed of three indicators: life expectancy, education (adult literacy and combined secondary
and tertiary school enrolment) and real GDP
per capita. The list of Human Development
Index for individual countries is published by
the UNDP here: http://www.undp.org/hdr2001/indicator/indic_10_1_1.html

Table 1. Statistical Pattern of the Share of


Agriculture

* EAP refers to economically active


population
(Source: Third draft document of the
overall analysis of the TC Rural Area by TC
experts)
In 2002 and 2003, the percentage of agricultural product exports was 41.6% of the
total domestic exports and 15.7% and 144.5%
respectively of the working population was
employed [4]. Agriculture sectors contribution to the total exports in 1990 was 45.5%
and 26.7% employment of the economically
active population during the same year [4].

4. FINDINGS AND DISCUSSION


The following conclusions are elaborated from the statistical documents and records made available by the Ministry of Agriculture, Natural Resources and Environment
of the Turkish Republic of Northern Cyprus
(TRNC).

Population Growth and Labour


Force

The contribution of people who are involved in agriculture activities to the general
population of Northern Cyprus has been on a
steady decline from 14,339 (14.5%) in 2003
to 3,614 (3.7%) in 2011 out of a total TRNC
population of 215,790 in 2003 and 291,609 in
2011. respectively. The statistics show a to GNP per capital
tal employment figure of 98,860 in 2003 and
Report produced by The State Plan- 97,103 in 2011, which is also on a decline. In
ning Organisation Annual Statistics, Nicosia, addition, the economic statistic of 2012. proindicates that the agricultural sector is one of vided by the TRNC Ministry of Finance shows
the key areas of the economy of TRNC [4]. that the overall population of people studying
Although the percentage contribution of agri- agriculture-related programs at the higher edculture to the GDP of TRNC shows a steady ucation level is also on a decrease from 2003
decrease from as the year progresses with ef- to 2011 [8].
fect from 2003 upwards, it is still of primary
importance, as far as its contribution to Gross
Infrastructure and Agricultural
Domestic Product, general export of raw mainvestments
terials, and employment, are concerned. The
contribution of the agricultural sector to the
Investment projects implemented by The
GDP increased from 619.3 million TL in 1977
to 1,005.3 million TL in 2003 at constant pric- Ministry of Agriculture and Natural Resources
es of 1977 with an annual average increase in 2012. where a total 19 projects amounting
of 1.2%. In 2003, this contribution stood at to a total expenditure of 21,820,808.21TL
10.6% of the GDP an increase from 9.2% in while the total subsidy paid to the agricul1990 [4]. However, the GDP contribution de- tural sector in 2012. amounted to a total of
clined from 10.6% from 2003 to 5.9% in 2011 109,034,216.24TL. This leaves us with a difaccording the TRNC Ministry of Finance [4]. ference of 87,213,408.03TL not accounted for
www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

or put into any agricultural development projects [8].


Other measures of finding that were not
considered in this research include: urbanization, consumption per capital and social conditions which are not analysed here due to limited data made available for analysis. However,
this will not significantly affect the outcome
of this survey.
Land distribution
The table below shows the land allocation in the Turkish Republic of Northern Cyprus
Table 2. Agricultural Land distribution (%)

Table 3. Farms distribution by areas intervals

4.1. SWOT Analysis

4.2. Discussion and Conclusion


The analysis of the impact of agriculture
on the economic development of Northern
Cyprus raises a couple of issues that must be
treated in order perfectly to understand the effect on the economy of TRNC. The state of
TRNCs economy is a very necessary consideration that cannot be overlooked. The various sectors that contribute to the economic
development of TRNC are yet other issues.
Agriculture alone cannot bring about the total development of the entire system (TRNC).
Other institutions and entities work together
to give us a better view of how agriculture
is doing and to what extent it is positively or
negatively affecting the economy of TRNC. Is
the government putting too many funds and
resources into the agricultural sector? Alternatively, NOT?
From statistical records made available
to us in the course of this survey, we can make
certain conclusions which are appropriate to
measuring the growth of the agricultural sector in relation to the economy of the Turkish Republic of Northern Cyprus. To discuss
some of the findings of this project, it is relevant to look at the economic status of TRNC
briefly.
To start with the population, the overall
population of Northern Cyprus has increased
by 11.5% from 2006-2011. The rural population is about 49.4% of the total population with
an amount of 141,475 residents [5]. Although
the natural growth rate slightly decreased, the
rural population increased by 0.9% during the
same period due to an increasing number of
foreign students (+6,27%) leaving in rural areas [5].
In terms of economic development, although North Cyprus GNP increased by 21%,
up to TL 5.6 Million in 2011, its GNP per
capita remained almost unchanged during the
period (2006 2011) to 14,703 USD which is
approximately twice less than the South Cyprus GNP with 27,500 USD in 2012 [5].
This is the environment in which the agricultural sector operates. It will be unrealistic
to us to expect too much contribution from the
agricultural sector towards the overall development of TRNC. Hence, this research tried

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

critically to analyse some of the key areas


where agriculture can make a greater impact,
such as, employment, percentage GDP contribution, infrastructure development and the
standard of living.
From the findings and discussion so far,
it is clear that the agricultural sector has made
great impact in the formulation of the economy of TRNC in the early years of 1999-2003
.as pictured in the statistical pattern of Agriculture sector in Table one. However, a sharp
decline from 2003-2011. was recorded by the
Ministry of Finance, as well as the Ministry of
Agricultures report. Part of this decline was
due to the economic recession of past years.
This made it a very difficult task for the government of TRNC to get back to its statusquo with reference to the agricultural sector,
or even step up on past achievements in this
area. The challenges facing this industry, notwithstanding, there are still a lot of prospects
in the agricultural industries if the government
can pay more attention to the area as it to other
sectors such as the construction and service
sectors. However, a couple of recommendations are offered in this research, based on the
findings and analysis.

5. RECOMMENDATIONS
The significant finding of this study
shows that the agricultural sector of TRCN
has quite a lot of untapped potentials. Here are
some suggestions that can help put the agriculture sector on a productive side in order to
better the economic development of TRNC:
i. Agriculture based research: A sure
way to solve the challenges facing the agricultural sector of TRNC is to encourage
increase agricultural-based studies in the
Ministry of Agriculture and support same in
higher educational levels. This will boost
the industry a lot, and encourage the discovery of new, better, and improved agricultural
practices that will lead to productive and efficient farming methods, yielding significant
outputs, and enhancing better productivity.
ii. Foreign Investors: More foreign
investors should be allowed, encouraged to
come into the agricultural sector of TRNC.

The focus should be on investors with expertise and experience in the field of agriculture.
Especially investors from countries where
their agricultural sector are known to be efficient and highly productive, leading to a
holistic national economic development. The
wealth of experience of such investors will be
a great asset to the Agricultural sector of the
Turkish Republic of Northern Cyprus. To do
this, the government of TRNC, should consider working on its international relations
with other countries. They should also work
towards a permanent solution to its recognition by the international community, either by
reaching a compromise with the South Cyprus
side, which would be the most better option,
or but in more efforts towards its attainment
of the status of a sovereign state that is recognized by the international community.
iii. Encouragement and introduction
of agriculture-related courses (programs)
in Colleges and Universities: The Introduction and Encouragement of Agriculture related courses such as Agricultural Economics in
Colleges & Universities is a sure way to alleviate the challenges agriculture is facing currently in TRNC, especially in the area of management, and industrialized agriculture. This
will increase the number of graduates in the
field of agriculture, and subsequently, increase
agricultures contribution to employment in
the country. As a result, people who have gainful employment in agriculture can attain a better economic status and standard of living. All
these will contribute towards a higher GDP for
the country.
iii. Monitoring System (Management
Information System): One of the most tangible and achievable recommendation of this
project, is for the government of TRNC to set
up a functional monitoring system to evaluate
the proper utilization of resource allocation to
the Ministry of Agriculture. A practical and
functional management information system
can be designed, developed and implemented
by the Ministry of Agriculture and other related ministries, which will monitor, evaluate
and provide relevantly and associated information to government decision makers. The
information supplied by the information system can be used to strategize better ways to

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

improve agriculture in TRNC for improved


productivity. This system will monitor the internal activities of the Ministry of Agriculture,
as well as external activities in relation to other major ministries such as the Ministry of Finance. The system will monitor how projects
are been distributed and implemented, the
various phases and how successful the Ministry of Agriculture implements a development
project. This way all resources allocated to the
Ministry of Agriculture can be accounted for
and properly appropriated. If this system is
successful, it can be deployed to other Ministry in the TRNC; this can lead to an overall
country development.
iv. Seminars and training program for
farmers: The government in collaboration to
internationally approved and known agricultural institutes and universities can organize
periodical seminars and training programs to
update farmers on latest practices in agriculture and keep farmers informed of best, and
healthy farming practices that will broaden the
scope of farmers on better agricultural techniques that can be implemented in their area
of specialization.
v. Reservation of arable land: In other
to encourage agriculture in TRNC, fertile lands
can be marked as Government Reserved
specifically for agriculture. The government
can also consider having a cluster of land area
dedicated to agriculture and other agricultural
activities. Lands can also be reserved for researchers and agricultural students for the purpose of research and industrial attachment for
both groups respectively.
vi. Financial allocation: Despite the
fact that the agricultural sector are not able to
completely utilize actually government fund
allocation to the unit in past years, we still find
it necessary to recommend that more financial allocation be considered for the agricultural sector. This is to boost its productivity,
enlargement, and future prospects that will
come up as a result of research findings. This
allocation is also necessary because the cost
of research in agriculture on the high sides. As
such, government should consider focusing its
allocation to the agricultural sector to agricultural education and establishment of structures
that will boost the industry. For instance, the
8

cost of designing, developing and implementing an information system for the agricultural
sector will be huge. The government can also
solicit support from the international agricultural research development bodies, and from
neighboring Turkish Republic.
Conflict of interests
Author declare no conflict of interest.

REFERENCE
[1] Agricultural Economy. American. Eras.
1997. Encyclopedia.com. (November 3, 2014). http://
www.encyclopedia.com/doc/1G22536601563.html
[2] D. Gale Johnson. Agricultural Economics.
Available at http://global.britannica.com/EBchecked/
topic/9573/agricultural-economics
[3] Regents of the University of California
DRAFT Version 5/2001
[4] Olgun, M.E., `Socio-Economic Profile of the
Turkish-Cypriot Community and the Main Issues to be
Addressed in Preparing for a Political Solution to
the Cyprus Problem, A Research Report prepared for
the UNDP - Development Support Services, published
by EMU, no: 0003-12-01-92, Nicosia, 1991. State
Planning Organisation Annual Statistics, Nicosia
[5] Third draft document of the overall analysis
of the TC Rural Area by TC experts
[6]http://global.britannica.com/EBchecked/
topic/178361/economic-development
[ 7 ] h t t p : / / w w w. b u s i n e s s d i c t i o n a r y. c o m /
definition/analysis.html#ixzz3I3TuF4JQ
[8] Ministry of Finance TRNC. Economic
statistics 2012
[9] Measures of Economic Development.
Available at: http://harpercollege.edu/mhealy/g101ilec/
intro/eco/ecomea/ecomeatx.htm

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

UTILIZING ICT TO IMPROVE STUDENTS INTEREST IN


CLOTHING FOR ENHANCED CREATIVITY AND
ENTREPRENEURSHIP FOR HOME ECONOMICS
GRADUATES
Dr. Diana A. Agbo, Victoria Igoli, Department of home science and management
College of food technology, University of agriculture, Makurdi
Email: drdianadagbo@gmail.com
Received: May, 05.2015.
Accepted: June, 29.2015.
Articles
Abstract. Constructed clothing refers to garments playing effective roles in national economic
and clothing items such as foot wears, head coverings, and technological growth and development
undergarments worn for various purposes. Clothing; a (Igbo, 1994 and Lemchi, 2001). Home Ecocourse offered under Home Economics in some tertiary
nomics a vocational course, is concerned with
educational institutions in Nigeria ensure provision of
skills for self-employment by graduates. The study was the acquisition and development of practical
done in Home Science and Management department, Fed- skill by its students; providing employment
eral University of Agriculture, Makurdi. Population for opportunities in occupations relating textiles
the study was 135 persons comprising students, lecturers designing and production, clothing designand laboratory technologists. The population formed the ing, construction, selection, care, economics
sample size for the study. The research design was survey. (Igbo,1994; Ezema ,1998, Olutola, 2000 and
Specifically, the study had following objectives:(1) Identification of factors hindering students Lemchi, 2001). Kaka (1998) observed that
interest in clothing (2) identification of more effec- for students to be able to perform creditably
tive methods of imparting skills of clothing construction and textile designing (3) assessment of students in clothing, the course content should be efknowledge about clothing career opportunities (4) To fectively taught. Howe (2002) noted that the
identify area of teaching clothing where use of ICT is extent of learning among students can be acmost required. Data were analyzed using percentages
and mean. Findings of the study include: parents poor celerated by the teacher and the application of
attitude and societal perception of clothing construc- teaching devices at his disposal. Realizing the
tors, lack of motivation by teachers; each with means relevance of effective teaching of clothing and
4.00, 3.90 and 2.73 respectively hinder students interest in clothing construction. Students awareness of Textiles, stimulating students interest and declothing career was high (X=3.98). Sale of products veloping their skill, there is need to identify
from practical by students (X=3.97), grouping of students with a leader (4.0) were indicated as ways of im- areas of difficulties in the teaching of the subproving students attitude to participating in practical. ject so as to proffer solutions.
CT is relevant in teaching learning of all Clothing and
The ability to access and effectively
Textile courses. Recommendations included (1) Institutional sponsorship of practical for ICT compliance. utilize information is no longer a luxury but
(2) Students should enjoy financial benefits from sold a necessity for development. There is no
practical products.

doubt that, Information and Communication


Keywords: ICT, Clothing Construction, Home Technology (ICT) provides the best possible
Economics, Income generation.
means for productive teaching and learning
in all educational fields in order to increase
pupils creative and intellectual resources.
1. INTRODUCTION
The simultaneous use of audio, text, multiThe mandate of tertiary education is to color images, graphics and motion, ICT, gives
produce skilled persons, who are capable of an ample and exceptional opportunity to the
student and teachers to develop capabilities
Corresponding Author
for high quality learning and teaching and to
Dr. Diana A. Agbo, Department of home science and increase their ability to be creative. The use
management, College of food technology, University of computer in color selection for textile designagriculture, Makurdi
ing, pattern designing and drafting, determinaEmail: drdianadagbo@gmail.com
www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

tion of fit of garments, have introduced speed


and accuracy.
Interest is the attraction which enables a
person to respond to a particular stimulates in
the midst of other competing stimuli (Okeye,
1998). Interest is a feeling which an individual has for something which is valuable and
beneficial. It is the mother of attention, once
there is direct attention, interest is guaranteed
and learning is assured (Okeye, 1998). Interest to my mind is aroused by what people see
and touch; ICT provides this opportunity for
teachers and learners.
Vocation or career choice is not a
smooth process. Certain prevailing factors
guide individuals while a choosing a career
and showing proficiency in it. These include
among others: personality, environment, experiences, religion, academic achievement,
family, socio-economic status. External factors such as interest and values like parents,
teachers, peer group, friends, radio, television
and books also affect the choice of an individual vocation. There are lots of causes and effect issues in life and in the field of vocational
choices. Valuing education is one of the essentials for making realistic vocational decisions
(Chauchan, 2011). Denga (2011) noted that
vocational interest of adolescents are strongly
influenced by the socio-economic inheritance
from their parents or guardians; which may
have a direct and greater effect upon the occupation open to him or which he finds attractive.
Income generation for sustainability is
the target of every business venture. Successful income generation hitches largely on competence, managerial skills, the environment
for the business and goodwill enjoyed by the
entrepreneur among other things. Ekpo (2010)
noted that entrepreneurship is vital route to
growth of individuals and the nation. It helps
to create wealth and reduce unemployment.
Entrenching creativity and entrepreneurship
into education will take education beyond economic life and earning a living to sustainable
communities and economies (Kembe, 2014).

10

2. STATEMENT OF PROBLEM
The poor awareness among students
about clothing has produced negative attitude towards it. Most of the knowledge about
clothing is reduced to just sewing of dresses
which is viewed as job for school drop-outs;
giving it a low social perception. The clothing
course demands time and diligence, however,
curriculum planners do not seem to allocate
adequate time for this course as it is usually
lumped with other courses on the time table.
Clothing is still being lumped together with
Textiles as one in some institutions of learning. Professionalism or specialization is not
adequately displayed by graduates of Home
Economics especially in Clothing entrepreneurship (Olugbaimgbe, 2009). The course
content in colleges of Agriculture, and other
tertiary institutions have remained the same
over several years hence students interest in
clothing in particular is very low. Therefore
very few graduates of Home Economics end
up as Clothing professionals. This has resulted
in influx of non-professionals in the business
of clothing construction, Textiles production.
Non-professionals sometimes produce poor
quality garments and clothing items. There
are lots of setbacks on availability and use of
instructional materials by teachers of clothing.
There is therefore need to strategize on
how to enhance the teaching and learning of
clothing to improve creativity and entrepreneurship among Home Economic graduates.
3. PURPOSE OF THE STUDY
The main purpose of the research is to
assess utilization of ICT to improve students
interest in clothing for enhanced creativity and
entrepreneurship for home economics graduates.
3.1. Research Questions
1. What are the factors hindering students interest in Clothing?
2. What is the status of students
knowledge on clothing career opportunities?

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

3. How can clothing be taught more effectively to improve students interests?


4. What are the areas of teaching clothing where use of ICT is most required?

The questionnaire consisted of two sections:


A and B. Section A deals with bio data of
respondents. Section B solicited information on general issues relating to the clothing
course, sociological and psychological variables. Each question contained four options
rated on a four point rating scale as follows:
Strongly Agree (SA) = 4, Agree (A) = 3, Disagree (D) =2, Strongly Disagree (SD) = 1.

3.2. Research Design


The design of this study is survey design. Survey was used since it required seeking opinion from a sample of respondents and
4.1. Validation of Instrument for Data
generalizing for a larger population (Trochim Collection
2006).
The instrument was validated by two
lecturers in department of Home Science and
Management. Suggested corrections especial3.3. Area of the Study
The research was carried out in the de- ly on the right people to respond to the quespartment of Home Science and Management, tionnaire were carried out.
College of Food Technology, Federal University of Agriculture, Makurdi. The department
4.2. Reliability of Instrument for Data
runs a four-year degree course. Academic
activity in the department comprise lectures, Collection
Reliability of instrument was tested uspractical work, seminars, exhibitions and excursions; with much emphasis on graduating ing Cronbach Coefficient alpha method. The
students with entrepreneurial skills and careers questionnaire was served to randomly select
for self-sustainability. The department has a fifty 300 and 400 level students of Benue
total of three hundred and thirty-nine regis- State University, who offer Home Economtered students in 100 to 400 levels (2010/2011 ics. Benue State University has similar environment with the University of Agriculture
academic session).
Makurdi. The items responded to were subjected to statistical analysis using SPSS (sta3.3.1. Population for the Study
tistical package for social science) version 16
The population for this research com- to estimate the internal consistency of the inprised all 300 and 400 level students of Home strument. The Cronbach Coefficient alpha is
Science and Management Department and 0. 72 indicating that the instrument has interall laboratory technologists working in the nal consistency and therefore reliable for what
Clothing laboratory of the department in the it set out to measure.
2010/2011 academic session totaling 135 persons.
4.3. Method of Data Collection
The researcher distributed the question3.3.2. Sample and Sampling Technique
naire personally and collected at stipulated
No sampling was undertaken. All the short period to avoid lose. Copies of questionpopulation was used for the study, since the naire were distributed to 300 and 400 levels
population was small.
student in their classrooms or laboratories and
to laboratory technologists in the clothing laboratory and collected at the same venue.
4. DATA ANALYSIS
Structured Questionnaire was the instrument for data collection for the study.

4.4. Method of Data Analysis


Sections A and B were analyzed using
means and percentages respectively. A mean

www.ijsrise.com

11

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

of 2.5 was considered as bench mark to determine acceptability or otherwise by respondents.

Table 2, shows that students awareness about functions of clothing as a course


performs is moderate since the highest mean
5. RESULTS AND DISCUSSION
is3.98 (clothing helps to reduce poverty among
university students).
Research Question Three: What are
Research Question One: What are the
factors that hinder students interest in cloth- the new practical ways of improving students
ing course? The response to this research skill and interest in clothing? The response to
this research question is in table 3.
question is in table 1.
Table 3: Responses of Students on the
Table 1: Responses of Students on FacNew
Practical
Ways of Improving Students
tors that Hinder Students Interest in Clothing.
Skill and interest in clothing

Table 1 shows that all the following factors; inadequate practical, inadequate period
on the school time table, lack of motivation by
teachers, societal perception of clothing constructors hinder students interest in clothing
since each of the means was higher than 2.50.
Inadequate period on the school time table (
X=3.90) has the highest mean while parent
attitude towards clothing has the lowest mean
(X=2.73).
Research Question Two: What is the
status of students knowledge on the importance of clothing as a career? The response to
this research question is in table 2.
Table 2: Status of Student Knowledge
on the Importance of clothing as a career.

12

Table 3, revealed that all the relevant


suggested methods of improving students
skill and interest in practical were acceptable
to the students. The item with the highest mean
(3.97) is students should sell the practical and
have a portion of the income generated. Clothing practical should be scheduled such that
theory and exams had the lowest mean (2.56).

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Responses of Laboratory Technologists



Research Question Four: What are
the factors that hinder students interest in
clothing as a course?
Table 4: Response of laboratory technologist on the factors that hinder students
interest in clothing as a course.

technologists. Grouping of students with a


leader and informing students about the requirements for the practical each has the highest mean of (X=4.00) respectively.
Table 6: Clothing and Textile courses
that require use of ICT

Responses in table 6 shows that all


course list require the use of ICT in teaching
In table 4 all the factors were accepted
and learning to arouse students interest and
since each of the mean was higher than 2.5.
improve on their choice of career.
The factor with the highest mean (X=4.00) for
parents attitude towards clothing and societal
6. DISCUSSION OF RESULT
perception of clothing constructors. While the
factor with the lowest mean (X=3.33) inadThe main factors hindering students inequate classes and poor method of teaching.
terest
in clothing indicated by students in the
Research Question Five: What are the
new practical ways of improving students and research were inadequate classes and inadequate period on the school time table for theskill and interest in clothing?
Table 5: Response of Laboratory Tech- ory (X=3.90), lack of motivation by teachers
nologists on the new practical ways of improv- (X=3.67) and parents attitude towards clothing (X=2.73). The factor hindering students
ing Students skills and interest in clothing
interest in clothing according Laboratory technologists are: parents attitude towards clothing
(X=4.00) and societal perception of clothing
constructors (X=4.00) and inadequate classes
and poor method of teaching (X=3.33).The
finding agrees with reports by Howe (2002),
who noted that the extent to which the rate of
learning among students generally can be accelerated, depends on the teacher and the extent to which he can apply the entire teaching
device at his disposal. The lack of students
on the subject interest can be very devastating on students. Kembe, (2008) noted that
clothing design and construction is generally
viewed by students to be very difficult. It is
viewed as the mathematics of Home Science
and Management (Kembe, 2008). It is generally dreaded and kills their interest.
The findings are supported by Olaitan
Table 6 shows that the eleven suggested (1994) who purported that factors hindering
methods of improving students interest in students interest in clothing include lack of
practical were acceptable by the laboratory
www.ijsrise.com

13

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

time, misconception of clothing by the society.


Where enough time is not allocated for clothing practical, teachers or laboratory technologist may not be able to supervise the students
adequately. Students left to them to complete
their practical may not produce the best clothing items. Products with poor finishes cannot
compare well with other products in the market.
According to Stage (1991), and Steinberg (1993) other factors that cause poor interest include low socio economic status of
the family, parental education amongst others. Students knowledge on the importance of
clothing as a career is high; clothing helps reduce poverty among university students, provide employment opportunity, produces graduate with saleable skill and career in clothing
is useful for health therapy. Several career opportunities abound in clothing for graduates of
Home Economics. Ezema (1998) had noted
that clothing equips students in tertiary institutions with saleable skills and thus poses the
capacity of helping in the reduction of poverty
problem among university graduates. With
this awareness, it is necessary to device means
of encouraging full participation of students in
clothing. Clothing of various forms is gaining
popularity in providing health therapy for the
sick; expanding career opportunities in clothing. For instance the use of wrist bangles, neck
chains and ankle chains for treatment of diabetes, high blood pressure etc. Carrol( 2001),
Chase and Quinn (2003) noted the role correct
clothing play in enhancing a feeling of wellness in sick people. One of the new practical
ways of improving students interest in clothing suggested by students in table 3 was clothing should be taught to only those interested
in the course. It should not be a compulsory
course. Direct interest is achieved when the
learner pays attention without compulsion.
This is so because the subject under study will
be so attractive and interesting to the students
who do not have to make any concerted effort
to understand it.
However, the curriculum for home
economics in the University of Agriculture
Makurdi and probably in some Universities in
Nigeria does not permit course selection. Another factor suggested is the use of video as
14

an instructional material. The use of video is


one of the recent strategies for enhancing students interest in learning. Due to the financial
implications of this it poses a challenge especially in the department Home Science and
Management. Another strategy suggested by
students is grouping of student to reduce number of students per lecturer for their practical.
This agrees with the findings of Ossai (2003)
that grouping enhances closer contact between
teachers and students resulting in better learning process. This is only possible if student to
lecturer ratio is low (6:1) and both have ample
time at their disposal. In a situation where the
class population is very high, space small,
equipment few and number of lecturers are
few, the lecturers will be over worked and productivity will remain low. The ICT will help
for coverage by lecturers.
7. CONCLUSION
The importance of clothing course in
providing career opportunities for graduates
of Home Economics is known to students
however, students interest in this course is
hampered by some factors emanating from
the school system and the outer society. The
proffered solutions will enhance the learning
process by students of Home Economics and
consequently reflect on their career choice on
graduation. Application of ICT for teaching
and learning is a well come development by
most of the students.
8. RECOMMENDATIONS
Based on the findings of the research,
the following are recommended:
1. More time on the time table should
be allocated to practical and theory
classes in Clothing.
2. During clothing practical, students
should be grouped with a leader, few
students per group.
3. Students who produce saleable items
should enjoy financial benefits to encourage better participation.

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Conflict of interests
Author declare no conflict of interest.

REFERENCE

Stage, O. (1991). Poor learning by student.Journal of


technical education.Stanford university press.
Steinberg, L.(1993). The varieties and effect of work
during adolescence. 3, 1-37. Hilldale.LawrenceEribaum.
Trochim, W. M. K. (2006). Types of research design. Retrieved August 24 from http:/www.
socialresearchmethods.net/kb/order.php

Bacon, J, (1993). Clothing as fixing status.Research issue in Home Economics.5, 45-47 Carroll, K.E
(2001). Introduction and improvisations: A study
in specialized disabilities. A published doctoral
dissertions. Virginia polytechnic institute and
state university.
Chase, R.W.& Quinn, M.D. (2003). Design without
limits: Designing and sewing for special needs
(revised ed) New York: Fairchild.
Chauchan, S. S (1996), Advance Psychology, NewDelhi; Vani Educational Books.
Denga, F. (1991). Vocational Choices.Journal of Educational Research.2, 45-47.
Ezema, P. (1998). Poverty Alleviation in Rural
Nigeria.The
Role
of
Home
Economics.Research Imperatives and chanllenges for Home Economics in Nigeria. P. 155162.
Ekpo, I. (2010). Poverty Reduction through Entrepreneurship Development in Nigeria, Being a paper
presented at the 2nd International conference on
Technology and Operations Management , 5-6th
, July, Bayview Hotel, Malawi.
Igbo, C. A. (1994). Identification of Tasks in clothing
construction for senior secondary students of
Textiles and clothing: A step Towards Achieving
Quality Education in Home Economics Education. Nigeria vocational journal. 7, 52-60
Kaka, H.J. (1998). Guidelines on needlework.Zaria:
Macmillan Publishing Company.
Kembe, E. M. (2008). Evaluation of the Business
Added Value of Home Economics Graduates in
Benue State Implications for Curriculum Innovations in Home Economics Education. Journal
of Home Economics Research. 9,1-10.
Kembe, E. M. (2014). Promoting Creativity and Entrepreneurship for Individuals and Families. Journal of Home Economics Research. 20,109-119.
Lemchi, S. (2001). Strategies for Reducing Stress From
Clothing Construction/Practical in secondary Schools. Journal of Home Economics Research.3 (2), 97-102
Olugbamigbe, A. O. (2009).Appraising Clothing and
Textile Aspects of Home Economics Education
for Enhanced Capacity Building for the Nigerian Youths.Nigerian Journal of Home Economics
(Nig.JHEC).A publication of Home Economics
Council of Nigeria(HECON).Pp 103-106 (1) No
1 July 2009. ISBN:- 978-37772-6-0
Olaitan, S. (1994). Analysis of Methodological Issues
and Challenges in Home Economics Research.
Research Issue in Home Economics.39-45.
Olutola, P. (2000). Environment Mattters.Journal of
Technical Education, 1, 103
Ossai R.U (2003). Clothing and Textile, occupation and
poverty alleviation.Journal of Home Economics
Research, 5 (1), 81-83.
Howe, M (2002). Learning infants and young children,
California: Stanford University Press.
www.ijsrise.com

15

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

16

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

DESIGN AND IMPLEMENTATION OF OBJECT-ORIENTED


COMPUTER SOFTWARE TO SOLVE SECOND ORDER
ORDINARY DIFFERENTIAL EQUATIONS WITH CONSTANT
COEFFICIENTS
Atsaam, D. D., Department of Mathematics/Statistics/Computer Science, Federal University of Agriculture,
Makurdi, Nigeria, E-mail: donatsaam@yahoo.co.uk
Odeh, A. Pius, Department of Mathematics/Statistics/Computer Science, Federal University of Agriculture,
Makurdi, Nigeria, E-mail: odehpius@yahoo.com
Received: April, 30. 2015.
Accepted: July, 01. 2015.
Articles

nomics, and other disciplines, specifically


whenever a deterministic relation involving
some continuously varying quantities (modeled by functions) and their rates of change in
space and/or time (expressed as derivatives) is
known or postulated. This is illustrated in classical mechanics, where the motion of a body
is described by its position and velocity as the
time value varies. Newtons laws allow one
(given the position, velocity, acceleration and
various forces acting on the body) to express
these variables dynamically as a differential
equation for the unknown position of the body
as a function of time.
An example of modeling a real world
problem using differential equations is the
determination of the velocity of a ball falling
through the air, considering only gravity and
air resistance. The balls acceleration towards
the ground is the acceleration due to gravity
1. INTRODUCTION
minus the deceleration due to air resistance.
Wikipedia Encyclopedia defines a dif- Gravity is considered constant, and air resisferential equation as a mathematical equation tance may be modeled as proportional to the
for an unknown function of one or several balls velocity. This means that the balls acvariables that relates the values of the function celeration, which is a derivative of its velocity, depends on the velocity (and the velocity
itself and its derivatives of various orders.
Differential equations arise in many depends on time). Finding the velocity as a
areas of science and technology as it plays a function of time involves solving a differenprominent role in engineering, physics, eco- tial equation.
The problem we seek to solve in this
work is that of developing an automated
(computer application) solution which solves
Corresponding Author
Atsaam, D. D., Department of Mathematics/Statistics/ second order linear ordinary differential equaComputer Science, Federal University of Agriculture, tions with constant coefficients.
Makurdi, Nigeria,
Linear differential equation is one of the
Abstract. With the advent of computers, a lot has
been achievable including the use of computers to solve
Mathematics and Mathematically related problems. In this
work an appraisal of the solution to second order linear
ordinary differential equations with constant coefficients
is done. Methods of solution of homogeneous second
order ordinary differential equations, Initial Value Problem inclusive are described, considering three cases: distinct roots, repeated roots and complex roots. Non-homogeneous differential equations, IVP inclusive are also
treated using the method of undetermined coefficients.
Object oriented software is developed to solve
these second order linear ordinary differential equations
with constant coefficients. The core essence of this work is
to develop a system which would be user-friendly, reliable
(accurate in solution), fast and timely to meet the demands
which are not achievable by the traditional method.
Keywords: Differential Equation, Homogeneous,
Initial Value Problem, Nonhomogeneous, Object Oriented
Software.

E-mail: donatsaam@yahoo.co.uk

www.ijsrise.com

17

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

fundamental equations used in solving dif- 1.2. Theoretical Framework


ferential equations, many of which have real
life applications. Hence studying it will be of
According to Zever (2012), if given the
prime importance. Additionally, the system general form of a second order differential
developed would help in reducing the time equation as
spent manually in solving differential equa(1.1)
tion problems.
Equation (1.1) can be classified as either
homogenous or non-homogeneous differential equation.
Homogenous equations are equations of
the form

1.1. Terminologies

Equation: This is the relationship between the dependent and independent variables. An equal sign = is required in every
equation.
Comparing with (1.1), we have that
Differential Equation: Equations that
and
are real coninvolve dependent variables and their derivatives with respect to the independent variables. stants.
Giving examples of homogenous equaOrdinary Differential Equation: Differtions
with
constant coefficients according to
ential equations that involve only one indeZever (2012) as:
pendent variable.
Order: The order of a differential equa.
tion is the highest derivative that appears in
.
the differential equation.
Nonhomogeneous equations are equations of the form (1.1) with
Degree: The degree of a differential
written as
equation is the power of the highest derivative
term.
where
are constants and g is a conLinear: A differential equation is called
linear if there are no multiplications among tinuous function on the open interval .
Giving examples of non-homogenous
dependent variables and their derivatives. In
other words, all coefficients are functions of equations with constant coefficients according
to Zever (2012) as:
independent variables.
Non-linear: Differential equations that
do not satisfy the definition of linear.
Homogeneous: A differential equation is
homogeneous if every single term contains the
dependent variables or their derivatives.
Non-Homogeneous: Differential equations which do not satisfy the definition of homogeneous.
IVP: Initial Value Problem

.
.
.
Zever (2012) illustrated that an initial
value problem for second order differential
equations of
Consists of finding a solution of the
differential equation that also satisfies initial
conditions of the form
Richard and Gabriel (2006) stated that
a second order linear homogeneous differential equation with constant coefficient has the

18

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

form

(2.7)
(2.1)
According to Richard and Gabriel
Corresponding to the differential equa- (2006), this is applicable only if
of the
tion in (2.1) in which
and
are constants, general solution to the linear differential equais the algebraic equation
tion of the form
(2.2)
and all of its derivatives can be written
Which is obtained from equation (2.1) in terms of the same finite set of linearly indeby replacing
and
by
and pendent functions, which we denote by
, respectively. Equation (2.2) is called
{
}.
the characteristic equation of (2.1). The charThe method is initiated by assuming a
acteristic equation can be factored into
particular solution of the form
(2.3)
Richard and Gabriel (2006) also stated (3.0)
that the General Solution of (2.1) is obtained
where
denote arbitrary
from the roots of (2.3). Richard & Gabriel multiplicative constants. These arbitrary con(2006) considered the three cases below:
stants are then evaluated by substituting the
proposed solution into the given differential
CASE I:
and
both real and dis- equation and equating the coefficients of like
terms. The general solution of the method of
tinct:
undetermined coefficients of non-homogeTwo linearly independent solutions are neous differential equation is given as
and

and the general solution is


(2.4)
In the special case
, the solution (2.4) can be written as

CASE II:
number:

Richard and Gabriel (2006) considered


the three cases stated below:
CASE I:
an nth degree polynomial in

Assume a solution of the form

, a complex
(3.1)

Since
and
in (2.1) and (2.2) are
where
is a constant
assumed real, the roots of (2.2) must appear in to be determined (Richard and Gabriel, 2006)
conjugate pairs; thus the other root is
CASE II:
where
Two linearly independent solutions are
are known constants
and
, and the general complex solution is
Assume a solution of the form
(2.5)

which is algebraically equivalent to


(2.6)

and

(3.2)
where is a constant to be determined
(Richard and Gabriel, 2006).

CASE III:
Two linearly independent solutions are
and
, and the general solution is
www.ijsrise.com

CASE III:
and

are known constants

where

19

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Assume a solution of the form


(3.3)
where
and
are constants to be
determined. (Richard and Gabriel 2006).
Kreyszig (2006) stated that the development of engineering phenomenon in solving
fluid mechanics, heat transmission, wave motion or electromagnetic can only be successfully carried out using second order ordinary
differential equations. Linear ordinary differential equations of second order are the most
important ones because of their application in
mechanical and electrical engineering.
Boyce and Diprima (2001) have talked
about the use of series methods in solving differential equations with particular emphasis
on second order linear homogenous differential equation. One of such is Bessels equation
of the form
where

is a constant.

Feasibility study: This is a preliminary


study to determine how the solution to second
order linear ordinary differential equations
with constant coefficients will be feasible with
respect to economic, technical and operational
considerations.
Economically computerizing the method of solution to second order linear ordinary
differential equations with constant coefficients will save time which is normally used
in solving manual method and as is popularly
said time is money. It will lead to increased
interaction with the computer by users thereby
increasing computer awareness. Technically,
the predominance of microcomputers and
with the growing cheap computing powers
makes it easy for the game to be easily available. Operationally, the proposed system if
computerized will be readily accepted by its
numerous users who currently use the traditional method.

2. ANALYSIS OF THE EXISTING


SYSTEM

1.3. Materials and method


The minimum hardware and software
needed for the implementation of the system
which solves second order linear ordinary differential equations with constant coefficients
are shown in Table 1.
Table 1. Minimum hardware and software for
the proposed system

The existing system is a manually based


system where, second order linear ordinary
differential equations with constant coefficients are solved manually, i.e making use of
paper and pen to find the solutions to these
systems. The analysis of an existing system
of second order linear ordinary differential
equation with constant coefficients can be described in the four steps below:
Identification of the differential equation under the following conditions:
If it is a second order linear differential
equation with constant coefficient of the form

The Structured System Analysis and


Design methodology was used. The method
has the following stages:
If it is a homogenous differential equaProblem Definition: The problem idention
of
the form
tified was that some scientist still solve second
order linear ordinary differential equations
If it is a non-homogenous differential
with constant coefficients using the traditionequation
of the form
al method and not all are have been able to
develop user-friendly applications (for those
who have software to do this) hence, the need
where
to develop high quality software for solving
If it is an initial value problem (IVP) of
these differential equations.
the form
20

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

CASE II:
where
and
are known constants,
satisfying the initial conditions of the form
CASE III:
and are known constants.
If conditions (Ia) and (Ib) holds then, the where
differential equation is solved using the genIf conditions (Ia) and (Id) holds then, the
eral equation which is gotten from the roots
differential
equation is solved by finding a soof the characteristic equation considering the
three different types of roots with their distinct lution of the differential equation that satisfies
general solutions: Both real and distinct roots, the initial condition.
complex roots and equal roots.
If conditions (Ia) and (Ic) holds then,
the differential equation is solved using the
method of undetermined coefficients solution
of non-homogenous linear differential equation with constant coefficients considering the
different cases for solving the equation which
are:
CASE I:
, an nth degree
polynomial in ,

3. THE PROPOSED SYSTEM


After going through the feasibility studies and analysis of the system, the following algorithm which will adequately and efficiently replace the existing traditional method was arrived
at.
3.1. Algorithm for the Proposed System
The algorithm to solve second order linear ordinary differential equation with constant
coefficients is given below:

www.ijsrise.com

21

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

22

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

www.ijsrise.com

23

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

24

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

The above algorithm is illustrated in the flow


chart below:

www.ijsrise.com

25

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

4.

CODING,

TESTING

IMPLEMENTATION

OF

AND
THE

PROPOSED SYSTEM
The program was developed using Visual Basic 6.0 version. Visual basic offers
a graphical user interface (GUI) for all programs. It makes creation of widow-based application easy. The software was tested using
unit testing as well as system testing. The software provides solutions to second order linear
ordinary differential equations with constant
coefficients.

1. Boyce, W. E. and Diprima, R. C. (2001). Elementary


differential equation and boundary value problems. John Wiley and Sons Inc. New York.
2. Kreyszig, E. (2006). Advanced engineering mathematics. John Wiley and Sons Inc. New York.
3. Richard, B. and Gabriel, C. (2006). Differential
equations. McGraw - Hill Companies Inc. New
York.Wikipedia Encyclopedia (2014)..Differential equation. [Online]. Available at: <http://
en.wikipedia.org/wiki/Differential_equation>
[Accessed 27 May 2014].
4. Zever, I. (2012). Solution of second order ordinary
differential equations with constant coefficients.
A project work submitted to the department
of Mathematics/Statistics/Computer Science,
College of Science, University of Agriculture,
Makurdi.

Appendix
Screen shot of the system Home Page

5. CONCLUSION AND
RECOMMENDATIONS

It is pertinent to note that the transformation of the traditional method of solving


second order linear ordinary differential equation with constant coefficients into an automated system is important and necessary due
to the reliability, accessibility, accuracy, speed
and efficiency provided by the automated system. This can only be manifest if the autoScreen shot of the Homogenous Form
mated system meets its requirement. It is also
apparent that despite the advantages that will
be gained by the use of the automated system;
there would still be few persons who would
prefer the traditional system. Helping them to
understand the advantages of this new system
would go a long way.
The researcher of this paper recommends
that the developed system be implemented in
tertiary institutions for the purpose of teaching
and learning, especially for students offering
Mathematics and Computer Science as well as
lectures in these fields. This research work has
Screen shot of the Homogenous Initial
some limitations and it is recommended that Value Problem (IVP) Form
further work be done in order to meet these
limitations.
Conflict of interests
Author declare no conflict of interest.

REFERENCES

26

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Form

Screen shot of the Non-Homogenous

Screen shot of the Non-Homogenous Initial


Value Problem (IVP) Form

www.ijsrise.com

27

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

28

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

BODY SIZE AND SHAPE CATEGORIZATION OF SOME


ETHNIC GROUPS IN BENUE STATE USING WAIST, BUST
AND HIP MEASUREMENTS
Dr. Diana A. Agbo, Victoria Igoli, Department of home science and management
College of food technology, University of agriculture, Makurdi
Email: drdianadagbo@gmail.com
Received: May, 05.2015.
Accepted: June, 29.2015.
Articles
Abstract. The study was carried out in Benue
State to determine body size and shape of adult females
of Tiv, Etulo and Igede ethnic groups. The sample size
was 90 adult females. The research design was quasi
experimental design. Data were analyzed using percentages. The study revealed that many variations existed
in the sizes within members of same ethnic group and
between the different ethnic groups. Predominant shape
of adult females of Tiv, are (Pear 36.6%, Apple 36.6%),
Etulo (Banana36.6%) and Igede(Pear 30.0%).
The study revealed that no adult female has the
ideal body size characteristics of (90x65x90)cm. Recommendations include: Home economic extension workers
should educate females of child delivery age to achieve
desirable shapes in adulthood (pear and Hourglass). Garments designers and constructors should utilize size chart
for different ethnic groups to ensure perfect garment fit.
Keyword: Adoption, Fabrics, Garment, Size
System, Shape.

1. INTRODUCTION
Measurement is very important in garment production because it dictates accurate
fit of a garment on the wearer. The shape
and size of a person can be determined only
through measurement. Body proportions can
vary enormously. This is obvious from the
variety of body shapes that can be seen in
different people. It is essential that measurements are taken accurately; in the correct position and with an equal amount of tension
on the tape. Ganhada (2006) stated that body
measurement is an important role in clothing design ergonomics. Data collected from
measurements are used by garment producCorresponding Author
Dr. Diana A. Agbo, Department of home science and
management, College of food technology, University of
agriculture, Makurdi
Email: drdianadagbo@gmail.com

ers to establish shape and size of persons in


garment production (Ashdown and Delong
1995). Nutrition and ethnic composition of
populations lead to changes in the distribution
of dimension, and require regular updating of
anthropometric data collections. According to
Ganhada (2006) measurements are taken for
the following reasons in garment designing:
To ascertain the size of the figure, to determine the proportions of the various parts of
the figure, to ensure that garment fits perfectively on the wearer and to show if the garment meets the specifications claimed by its
manufacturer.
The bust, waist and hips are called inflection points and the ratios of their circumferences define basic shape. Usually the bust area
will depend on the persons weight and height.
It is said that female body usually inflects inward towards the waist around the middle of
the abdomen between the costal margins and
the pelvic crests. The waist is smaller than the
bust and hips, unless there is a high proportion
of body fat distributed around it (Lane 1992).
Every single individual has different shape
from another (John 2005).
A size is an item having specified measurements along certain dimension or magnitude. The purpose of an ideal sizing system
is to divide a varied population into homogeneous subgroups. Members of a subgroup are
similar to each other in body size and shape,
so that a single garment can adequately fit
each of them (Woodson and Henry, 1990).Females bodies come in all shapes and sizes and
it is not possible to divide them on the basis of
simple averages which lead to unrealistic sizes corresponding to the so called standard

www.ijsrise.com

29

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

or ideal body measurements (Delong and


Karin, 1993). What is needed is a completely
random system, which can yield an optimum
number of body sizes reflecting the true body
measurements and proportions existing in the
target population (Delong and Karin, 1993).
Fit of a garment depends on the correlation
between garment measurements and the body
measurement for which it is intended. In general, very little correlation exists among the
human body measurement, (Ashdown and
Delong, 1995).
1.1.

Figure Types

Markee and Elain, (1991) indicated that


each woman is born with her own special figure type and body shape, which is why you
would be hard pressed to find two females
with the exact measurement. Some females
look beautiful even with a smaller or bulkier
shape. Other women look stunning even if
they are petite or average in height. However,
many believe that women who are skinny are
all beautiful. Different people have different
ideas of which shape is the most ideal female
form. Tamburrino, (1992) said that experts
in the world of beauty and fashion, as well
as experts in the health and fitness industries
have claimed that the perfect measurements
that look best in nearly every type of clothing and situation are of 36 inches (90cm)
bust, a 26inches (65cm) waist and 36 inches (90cm) hips. So far many, the 36 x 26 x
36inches(90x65x90)cm measurement is considered to be the most ideal measurement. A
bend (1993) said that, ironically less than 5%
of all the females in the world have achieved
these so called perfect body measurement.
It is ridiculous to try to force your body to
achieve such a shape, unfortunately most females work their entire lines on a newer ending guest to try and get the perfect body size
and shape, but just because a 32 x 34 x 36
inches(80 x 85 x 90) cm body shape is not
perfectly symmetrical does not mean that it is
not beautiful.
The most beautiful female in the world
probably does not have perfect body measurement. True beauty is how an individual feels
about herself. It is not wrong to try and fig30

ure out what the ideal female body measurement is and to try to achieve it. Churchill and
Robert (2005) stated that female figures are
the cumulative product of a womans skeletal
structure, quantity and distribution of muscle
and fat on the body. There has been wide difference on what should be considered an ideal
or preferred body shape both for attractiveness and for health reasons. These have varied among cultures simultaneously with most
physical traits. There is a wide range of normality of female body shapes. Shannon and
Reich (1999) noted that human beings and
their cultures have perennially focused attention on the female body as a source of aesthetic pleasure, sexual attraction, fertility and
reproduction. The female figure is typically
narrower at the waist than at the bust and hips
and usually has one of the four basic shapes:
banana, pear, apple and hourglass.
1.1.1. Banana Shape: This shape is
characterized by wider hip and bust relative
to waist. There is usually a difference of less
than an inch (2.5cm). Fat is generally distributed more in the face, abdomen and buttocks
of this type of body shape. Females who have
this type of body shape usually have less estrogen than androgen (Patterson and Jessie,
1990).
1.1.2. Pear Shape: This body type
shows wider hip than the bust width (Markee
and Elain, 1991). Fat is distributed more in
the hip, thigh and buttocks area of the body.
Body fat begins to develop in the upper body
regions including abdomen as age increases.
1.1.3. Apple Shape: Shoulder and bust
measurement are larger than the width of the
hips. Women who have this shape have the
highest androgen level compared to any other
types of body shape (Markee and Elain, 1991).
1.1.4. Hourglass Shape: The bust and
hip are almost exactly the same in width.
Waist is very much narrower. This shape is
said to be most symmetrical and most perfect
female body shape in a majority of cultures.

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Fig. 1: The four figures show the four


major body shapes of females. Source: Salusso, (1992)

of body measurements or sizes from all over


the world. Various statistical methods ranging
from simple percentiles to complex combination of multivariate and regression analysis
have been employed for distribution of population into subgroups; more recently powerful
mathematical techniques have been employed
with good results. Vanity sizing merely reflects the increasing prevalence of obesity.
Garment ease should allow for comfort and
mobility, too much or too little ease can result in a garment that is uncomfortable and restrictive to movement. Ashdown and Delong
(1995) states that, fit of a garment depends
1.2. Sizing in Garment Construction
on the correlation between garment measurements and the body measurements for which
Garment size refers to the label sizes it is intended. The concept of garment fit is
used for ready-to-wear garments sold out. captured by the distance measure, which is
Woodson and Henry (1990) stated that siz- calculated from the discrepancies between the
ing is the measurement of an individual body body measurements of an individual in the
for a perfect fit of garment on the figure. He sample and the prototype design values of a
also stated that the sorter sorts the patterns ac- size.
cording to size and design and makes bundles
of them; it requires much precision because
1.3. Garment Designing
making bundles of mismatched patterns can
create severe problems. On each bundle there
Rodwell, (2000) stated that garment deare specifications of the style size. Workman signing is the art of the application of design
(1991), remarked that sizing in garment con- and aesthetics or natural beauty to clothing
struction determine the fit of the garment on and accessories. In garment construction, Dethe wearer. The size and fit of a garment are signing is the first step in garments construcfactors which can affect both the protective tion (Rodwell, 2000). For this purpose the
aspects of a garment as well as its comfort. designer first draw several rough sketches in
Proper garment fit depends on the relation- the sketch book. The designer draws inspiship of the size of the garment. Size inflation ration from different sources such as natural
is used to refer to the phenomenon of ready- objects, existing pictures in magazines and
to-wear clothing of the same nominal size be- albums. Fashion designers attempt to design
coming larger over time. Vanity sizing tends garment which are functional as well as aesto occur in several places where clothing siz- thetically pleasing. They must consider who is
es are not standardized. Although within the likely to wear a garment and the situations in
United States it occurs far more frequently in which it will be worn. The designers have a
womens apparel than in mens apparel partly wide range and combinations of materials to
due to the widespread and far earlier adoption work with and a wide range of colors, patterns
of standardize measurement for mens apparel and styles to choose from. Today most garfor military uniforms (wherefore example, a ments are designed for the mass market espepair of trousers with a 32 inches waist and a 32 cially casual and everyday wear. Agbo (2013)
inches inseam must be labeled as such regard- however documented that garment designers
must take cognizance of people with figure
less of who made it).
Clauser and Pearl (2005) stated that the flaws and those with peculiar body shapes to
last decade has seen a remarkable surge in accommodate their garment needs in the marthe number of studies reported on the subject ket. The fit of the finished garment depends
on the accuracy of the designer (Bonney and
www.ijsrise.com

31

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Porter, 1999).The designer needs to meet with adults of Tiv, Etulo and Igede?
a pattern maker and sample maker to figure
2. What are the average sizes (small,
out if the sketch on paper can be brought to medium, large) of Tiv, Etulo and Igedefemale
life according to its vision, conception and adults?
production.
3. What are the predominant shapes of
Tiv, Etulo and Igede female adults?
2. STATEMENT OF PROBLEM
Unguarded weight and size lead to difficulty in choice of what to wear. Lack of
knowledge about individuals size and shape
leads to poor garment selection and dressing resulting in poor fit and discomfort for
garment users. Women tend to relax and become careless about their size and shape after
marriage and child delivery. Ready-to-wear
garment producers and importers face challenges of producing or ordering the right sizes
for female users where the sizes and shapes
or figures of the users in a particular locality
are unknown. There are no records of shapes
and sizes of adult females in Benue State. Indigenous standard garment sizes for various
localities including Benue State are unavailable. It therefore becomes pertinent to establish sizes of adult females in Benue State to
provide information for individuals to enhance
proper check on their health, indigenous garment constructors, garment importers and garment entrepreneurs especially in Benue State.

3. METHODOLOGY
3.1. Research Design
The research design was quasi experimental design. This involved selecting
groups upon which a variable was tested,
without any random pre-selection processes.

3.2. Population of the Study


The population for this study is146,239
comprising all female adults of Tiv, Etulo
andIgede.

3.3. Sample and Sampling Techniques

Three out of the four major ethnic groups


in the State were purposely selected for the
study. The sample size was 90 adult females.
2.1. Purpose of the Study
In each ethnic group, 30 adult females were
randomly selected from among those residing
The purpose of this study is to determine in the major local government headquarters
body size and shape using waist, bust and hip namely: Gboko for Tiv, KatsinaAla for Etulo
measurements for effective garment designing and Oju for Igede. Each of the participants anfor adult females in Benue State.
thropometric measurements were taken and
documented.
Specifically, objectives of the study included:
1. Taking measurements of female adults
3.4. Instruments
of three major ethnic groups in Benue State.
2. Categorizing measurements of adult
The instruments for data collection were
females to three average sizes (small, medium measuring tape, note book, pencils, biros, reand large).
tractable metal tape and oral interview.
3. Identifying predominant shapes of the
adult females using the measurements.
Research Question
1. What are the measurements of female
32

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

4. METHODS OF DATA
COLLECTION AND ANALYSIS

and have her height measured. The age of each


respondent were taken by oral interview. Data
were analyzed using percentage and mean

Anthropometric measurements of each


4.1. Result
of the respondents were taken. Measurements
were obtained for bust, waist and hip using
The results for the study is discussed
fabric measuring tape by the researcher, assisted by two research assistants. The mea- based on the research questions.
surement (Bust, Waist and Hip) for each seResearch Question 1: What are the
lected respondent was taken in early hours
of the day for uniformity. The corresponding measurements of female adults of Tiv, Etulo
height of individuals was taken using the re- and Igede?
tractable metal tape. Each respondent was
asked to stand against a clean wall on barefoot
Table 1. Size measurement chart for Tiv, Etulo and Igede Adult female

Table 1 shows that the shortest height of


Tiv adult female is 1.29 meters and tallest is
1.5 meters. The shortest Etulo adult female is
1.26 meters and tallest is 1.44 meters, while
the shortest Igede adult female is 1.26 meters
and tallest is 1.50 meters. The least bust size
for Tivand Etulo adult females is83cm respectivelywhile the least bust size for Igede adult
female is 78cm. Both Tiv and Etulo adult females have 76cm as lowest bust sizes. The
lowest bust size of Igede adult female is low-

er than those of Tiv and Etulo adult females


(71cm). Tiv, Etulo and Igede adult females
have similar highest values for waist measurement (127cm each). The least size of hip for
Etulo adult females (88cm) is larger than those
for Tiv (63cm) and Igede (83cm). The largest
size of hip for Tiv adult females (127cm) is
larger than those of Etulo (121cm ) and Igede
(114cm).

www.ijsrise.com

33

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Research Question 2: What are the average sizes of Tiv, Etulo and Igede adult females?

Table 2. Average sizes of Tiv,Etuloand Igede adult females

Table 2 shows size categorization


based on data obtained from field. The table
shows that higher proportions of Tiv, Etulo
and Igede adult females belong to small bust
size range :46.67%Tiv, 50.00 % Etulo and
76.67% Igede respectively. Most 50.00 %
Etuloand 56.67% Igede adult females small
size waist range while more of Tiv adult females (43.30%) possess medium size waist.
Majority 73.30%Etulo adult females have
small hips.
Research Question 3: What are the predominant shapes of Tiv, Etulo and Igede adult
females?
Table 3. Predominant shapes of Tiv,
Etulo and Igede adult females.

(36.6%). The most predominant shape of Etulo adult females is the Banana shape (36.6%)
followed by the Pear shape (33.3%).The most
predominant shape of Igede adult females is
the Pear shape (30%).

5. DISCUSSION

Although Abend (1993), stated that the


ideal body size of females are of 91cm bust,
66cm waist, and 91cm hips, this research revealed that none of the respondents belong to
the ideal size documented by Abend (1993).
The finding buttress the claims by Abend
(1993) that less than 5% of all the females in
the world have achieved these so called perfect body measurement. This study revealed
that there is no correlation between sizes of
different sizes of body parts of adult females;
the size of bust of an adult female may not be
deducible from the height or size of the waist
or hip and vis versa.
The most predominant shape identified
in this study among the respondents was Pear
represented asTiv (36.6 %), Etulo (33.3%) and
Table 3 revealed that the two predomiIgede (30.0%).This body type shows wider
nant shapes of adult females among the Tiv
hip than the bust width as noted by Markee
adult females are Pear (36.6%) and Apple
34

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

and Elain(1991). Fat is distributed more in


the hip, thigh and buttocks area of the body.
Body fat begins to develop in the upper body
regions including abdomen as age increases.
The findings buttress the claims by Mallum
and Kembe (2011) that most females exhibit
increase in size especially along the waist line
and abdomen tremendously during pregnancy.
If deliberate effort is not made at controlling
the enlargement of abdomen after delivery,
the increase lingers on in life. Fat deposition
on abdomen, hip and buttocks increase with
increase in age among females. The implication of the predominance of this shape to the
garment designer and garment merchant is
that garment for adult females in Benue State
should large enough to accommodate the extra
fat deposits.
Apple and banana shaped adult females
have higher health risk of heart disease due
to the fat stored in the chest region. Pear and
Hour glass shaped adult females due to the
body fat building around the waist and hip and
not on the chest have lowest risk of heart disease. A garment that is meant to be fitted at the
waist cannot fit a female that is apple shaped
or the banana shaped adult.
There is variation in shape within the
three ethnic groups studied. Table 3 revealed
that the predominant shape among Tiv adult
females are apple 36.6% and banana 36.6%.
The predominant shape among Etulo adult females are banana 36.6% and pear 33.3% while
the predominant shape among Igede adult females is pear 30.0%. This finding agrees with
the assertionsby Iloeje (1995), Anikweze
(2003) and Agbo (2013) that size and shape
variations exist among adult females in different localities and within the same locality.
These shape and size variations will also pose
challenges for the garment designer especially
in production of garments for consumers. For
instance, a garment designed for the Tiv adult
females may not serve for the Etulo or Igede
adult females appropriately.
6. CONCLUSION
This study has shown that variations
in shape and size exist among females from
the three ethnic groups as well as within adult

females in each ethnic group in Benue State.


Based on the findings of this study, body size
and shape have no direct or inverse relationship with height of an adult female. There are
differences in the body measurement chart
between the three ethnic groups. No adult female possesses the ideal size of 90x65x90cm.
Garment designers and constructors who
produce ready-to-wear garments should take
particular note of size and shape of individuals especially female adults in specific environment to enhance good fit of the garments
on the wearers. Due to variations in size and
shape of female adults, custom-made- garments may achieve better fit than ready- to
-wear garments which may essentially require
adjustments on purchase.

7. RECOMMENDATION
1. Based on the findings, it is
recommended that adult females
make adult females should make
concerted efforts at reducing
accumulation of fat on the bust
and waist region since the apple
shape has bad health implication.
2. It is also recommended that Home
Economics extension worker be
involved in educating females of
child delivery age on how to achieve
desirable shapes in adulthood
(banana, pear and Hourglass).
3. It is also recommended that garments
constructors should establish a
standardized garments size chart
for the ethnic groups to eliminate
the problems of garment fit.
Conflict of interests
Author declare no conflict of interest.

REFERENCES
Abend, J. (1993). Apparel Manufacturer and Retailer Effort to Reduce Child Labour: An
Ethics of Virtual Perspective on Codes
of
Conduct.
Ctr.
Sagepub.com/./183.
Doi:10.1177/0887302x02000402.Clothing and
Textiles Research Journal(20), 4, 183-194.
Anikweze, G. U. (2003). Development of dress patterns
for women with figure problems in Enugustate.

www.ijsrise.com

35

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.
Unpublished Mastersthesis. University of Nigeria, Nsukka.
Agbo, D.A. (2013). Development of functional garments for physically challenged wheelchair and
bedridden females in Benue State. Anunpublished doctoral thesis. University of Nigeria
Nsukka, Nigeria.
Ashdown, S. P. and Delong, M. R. (1995). An Exploratory Study of the Validity of Visual Fit
Assessment from three Dimensional Scans.
DOI10.1177/0887302*10376411. Clothing and
Textiles Research Journal. October, 2010 (28)
4,263-278.
Bonney, M. C. and Porter, J. M. (1999). User Needs in
Computerized Man Models, NATO. Symposium
on Anthropometry and Biomechanics Theory
and Application.
Churchill, E. T. and Robert, W. M. (2005). Anthropometry of Women of the U.S. Army Report
No.2-The Basic Univariate Statistics U.S. Army
Natick Technical Report
Clauser, C. E., andPearl, E. T. (2005). Anthropometry
of Air Force Women. Aerospace Medical Research Laboratory Technical Report.
Delong, M., and Karin, F. T. (1993). Data
specification
needed
for
apparel
production using computers. Clothing and TextilesResearch Journal, 11,(3) 1-7.
Dreyfuss, H. (1991). The Measure of Man: Human
factors in Design. Whitney Library of Design,
New York 1967. Published under The Design
Soceity- Creative Commons Attrition- http://
CreativeCommons.org/licences/by-nc-sa.30.
Ganhada, G. T. (2006). Developing body measurement charts for garment manufacture based
on a linear programming approach.Journal of
Textile and Apparel, Technology and Management (5)1.www.tx.ncsu.edu/jtetm/vol5.1ssue 1/
articles/gupta/gupta-sull-142/05.pdf
Iloeje, I. C. (1995). Establishment of average body measurement and development of block patterns for
female adolescent in EnuguState. Unpublished
M.Ed thesis, University of Nigeria, Nsukka.
John, M.T. (2005). Anthropometry in sizing and design.Anthropometry for designersVol1. National Aeronautics and Space Administration,
Scientific and Technical Information office.
VE-77-87.
Lane, M. (1992). PreliminaryFindings of Study: Explanations why Clothes do not fit some women55 and Older (All figure types). American International Standard Tables of Body
Measurement(ASTM).Retrieved April, 5 2013
from
http/Ldgd.lupoo.com/upload/media/
ASTM%20D 5580-01:pdf
Mallum, J.O. and Kembe, E.M. (2011). Introduction to
home and family health care services. Jos, Nigeria. Clestinno Press.
Markee, N. L. andElain, L. P. (1991). Developing Realistic Stimuli for Assessing Observers Perceptions of Male and Female Body Types. 72,603610.
Patterson, C. A. and Jessie, W. (1990). Selected Body
Measurements of Women Aged Sixty five and
Older. Clothing and TextilesResearch Journal.2, 23-31.
Rodwell, W. (2000). Metrication as it will affect the
Clothing Industry, Clothing Institute Journal. 4,
131-143.
Salusso, D. (1992). Amultivariate Method of Classify36

ing Body form Variation for Sizing Womens


Apparel. Clothing and Textile Research Journal.
4, (l) 38-45.
Shannon, E. and Reich, N. (1999). European Study
Tour Review of Clothing and Textile Comfort.
The Research Association of College, Professors
of Textiles and Clothing Proceedings. 197-204.
Tamburrino, N. (1992A). Apparel Sizing Issues Part 1.
33 (8) 44-59. Bobbin publishers.
Woodson, E. M. and Henry, P. E. (1990). Apparel Sizing
As it Relates to Women Age Sixty-five. Clothing
and Textile Research Journal. 8 (4)7-13.
Workman, J. E. (1991). Body Measurement Specifications for Fit Modes as a Factor in Clothing Size
Variation. Clothing and Textile Research Journal, (10) l, 31-36.

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

IMPORTANCE OF THE USE OF INFORMATION SYSTEMS


BY FARMERS IN AFRICA
Joshua Chibuike Sopuru, Management Information System (MSc)
Girne American University, Mersin 10 via Turkey, Email: sopuru.joshua250@gmail.com
Received: April, 29.2015.
Accepted: June, 29.2015.
Articles
Abstract. The desire of every nation is to provide
goods and services that can actually satisfy citizens and
also be enough for export in other to acquire foreign
exchange. Due to scarce resources and diversity in human
behavior, proper strategizing and planning built on Positive and negative science need to be considered. Human
behavior cannot be determined with concrete certainty;
we can only make assumptions based on certain conditions or occurrences. These assumptions help managers
in managing limited resources. This goes a long way in
helping a nation plan its production in matters of; what
to produce, the quantity to produce and whom to produce
for. The task of decision making, a must for every nation
is one of the most difficult and unpredictable task faced
by managers. However, with the advent of information
Systems supported with decision support tools, managers can now to a greater extent make proper decisions.
Information system is a collection and integration
of components for data collection, storing, and processing
in other to deliver information, knowledge, and digital
products. Businesses and cooperation rely on Information
systems to carry out operations, manage staff, and even
lead customers. There is no doubt information systems
have revolutionized virtually every sector of the economy
it has been applied in. For example, in developed countries like the USA, Information systems have decongested
highways through traffic management. Despite all the
success stories resulting from the implementation of
information systems, Agriculture in developing countries still struggles with implementation of information
systems. With the design of several Farm management
information systems (FMIS), one should have predicted
an end to the shortage of Agricultural products in Africa,
mismanagement of the farm or an end to the high rate
of loss in agricultural commodities as a result of disease
outbreak. However, this is not the case in Africa because;
the implementation of information systems in Agriculture
is faced with numerous design/implementation problems
ranging from designers ignorance to end-users illiteracy.
We are interested in uncovering the importance of
information system in Agricultural farms in Africa and

highlighting some limitations facing its implementation.


Keywords: Activity diagram, data, Information,
management Technology.

1. INTRODUCTION

In this present age of Technology, it will


be off place to discover a sector in the economy that is totally eluded from benefiting from
the advantages of information technology. A
major importance of technology to any sector is the efficiency in production. This information technology seeks to achieve. The unstructured nature of farm lands in Agriculture
makes it difficult for information technology
to be easily applied. Agriculture (farming), is
however not the only sector that can be seen
as unstructured. The Transportation sector,
which witnesses the mass movement of people from different startup locations to different
destinations, moving in patterns that are difficult to predict can also be seen as unstructured. Despite limitations of its unstructured
model, information system has been successfully implemented. The product of this implementation can be seen from the use of Global
Positioning Systems know as GPS, the InSync
adaptive traffic control system which enables
traffic signals adapt to actual traffic demands,
traffic signal presumption that allows normal flow of traffic light to be preempted, etc.
Because of these technologies, there is a resultant change in traffic and human behavior
(responds) to traffic. The transportation sector
also has witnessed significant transformation
resulting from the implementation of Information technology different from the ones menCorresponding Author
tioned above. One may argue that the transJoshua Chibuike Sopuru, Management Information
System (MSc), Girne American University, Mersin 10 portation sector is not as unstructured as the
Agricultural sector is. So, therefore, a better
via Turkey
comparison in relation to the unstructured naEmail: sopuru.joshua250@gmail.com
www.ijsrise.com

37

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

ture of the farm would be the ever flabbergasting dynamism nature faces. No matter what
we compare the farm to, a proper understanding of the problems facing the implementation
of information system to the farm, would result in a solution for better design and implementation which will in turn lead to overall
efficiency. This article aims at uncovering the
importance of IS systems to agriculture and
highlighting possible reasons that have led to
the poor implementation of information technology in Agriculture, especially in Africa. To
achieve this, we will work following the traditional methods of system design and implementation processes.

computer.
User needs: Pay in money into a bank
account access funds balance online
Here the needs of the user are clearly
defined. No complicated situations are referenced. Thus, a user case diagram can be easily
created as shown in figure 2 below.

1.1. Brief Explanation of traditional system


design and implementation Processes
In system design, the system development life cycle (SDLC) methodology has been
followed over the years. The primary cycle
involves a five (5) step process consisting of
Analysis to the implementation process. Figure 1. show this cycle.

Figure 1.0 System development life cycle

Also, Users abilities are also considered


here. For example, user language, educational
level, ethical variations, etc. When these factors are successfully considered, and Analysis
of system requirements is done based on these
factors and many others, an essential knowledge of system requirement have been developed. A fundamental process that is important
in the analysis of system is referred to as the
business process.
The business process lists and links as
simple as possible the internal and external
logics behind the system development. In precise terms, a business process can be seen as
steps to achieving a solution. For example, if a
robot were to be programmed to pull out a bad
electric bulb, the business process would be
the steps needed to be followed by the robot
to achieve its mission. Successfully defining
the business process is a problem half solved.
For our above example, the business
process can be defined based on two (2) different headings; these headings are derived
from the users requirements:

Pay in money into a bank account

Access fund balance online

Using this cycle, we will discuss an


example of how a simple fund transfer system
can be designed and implemented. This is
done in other to create an understanding
of how this cycle works. We will focus
on the analysis stage of the SDLC.
Example 1: design of a simple online
account balance access system.
This system will provide end users the
functionality of accessing funds online.
Phase 1: Analysis: Under analysis, we
seek to discover the needs of the users. That is,
Pay in money into a bank account:
what users expect of the fund transfer system.
In practice, the steps in paying money
These requirements are analyzed and translainto the bank involve all or some of the folted into logical patterns as understood by the
lowing:
38

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

1. Customer fills a deposit slip


2. Submits the slip to a teller
3. Teller collects and verifies the money
and records the information on the slip against
the stated account number.

successful design of a system. However, this


is not the only determinant to the successful
implementation of a system. Other factors that
include behavioral, educational, cultural, social, structural, etc. can determine to a great
extent the success of a system especially in
Access fund balance online:
relation to different sectors. The Agricultural
To access funds balance online, several sector is one of these sectors.
things need to be considered. This includes the
Developing a business process for the
banks processes of accessing funds balance Agricultural sector is quite different from the
(not online). Using this as a base, the designer process developed above. This difference is
can then create a business process on access- greatly because of its unstructured pattern as
ing funds balance online. First knowledge on we shall discuss below. With this knowledge,
how fund balances are accessed in banks:
one can infer the reasons for implementation
1. Customer fills an account inquiry slip problems in Agriculture.
(balance)
2. Submits the slip to a teller
2. FARM STRUCTURE,
3. Teller accesses customers account
PRACTICES AND BUSINESS
(using account number, name, etc.)
PROCESSES
4. Presents account balance to the customer on a slip
Most farmlands in Africa are managed
as family businesses. This method results in
With the successful analysis of these
an extremely unorganized system of managebusiness processes, the logics behind how the
ment. Over the years, farming has many been
systems should work can now be quickly decarried out on subsistence levels. The idea of
veloped.
producing food for just once immediate famProcess A
ily has made farm practices nothing different
Access fund balance online (System
from food cooking. Despite the evolution of
Logic)
farming from subsistence to commercial agInterpreting business process to enable
riculture, most farmers still retain the unstruccoding:
tured farming practices developed over the
1. Customer fills an account inquiry slip
years. Some of these unstructured farming
(balance): A digital mind slip is generated that
processes include planting decisions; land uswill be filled online by customers
age, resource allocation, etc.
2. Submits the slip to a teller: account
Most Commercial farmers in Africa
slip on completion is presented for query
farm at large scales. Large quantity of output
3. Teller accesses customers account (usis gotten from farm lands with varying qualing account number, name etc): Based on sucity. Yield (quantity and quality) prediction is
cessful queries, account details are retrieved.
near impossible because of the varying farm
4. Presents account balance to the cuspractices applied as a result of this structure.
tomer on a slip: System outputs account balThis also leads to the unavailability of Agriance to the customer on screen.
cultural information as farmers do not know
the farming method that worked best since difPhase 2 to 5: Based on the business proferent farming methods are applied at random.
cess, a flowchart is designed, and subsequent
This limitation of the availability of agriculcoding is carried out to achieve the logics detural information limits the rising agricultural
fined by the enterprise process. After these
productivity among small scale holders [1].
stages, the developed system is implemented
However, information and communication
with maintenance performed as required.
technology (ICT) provides a possible pathway
As observed in the example above, gento ameliorate this scenario.
erating a business process is the bedrock to the
www.ijsrise.com

39

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

2.1. The role of information system in


Agriculture
As population increase and the need for
agricultural products raised, the importance of
proper management of agricultural produce
and real-time information access by agriculture stakeholders have become paramount. Information is very vital in modern farming as
a marker is to a lecturer. Due to illiteracy and
lack of sensitization, information access, and
proper dissemination is still a significant problem for stakeholders in agriculture especially
in Africa. Information system plays a vital
role in agriculture as it aids in providing and
delivering information to stakeholders in agriculture. A focus on the importance of information management in agriculture, as it relates to
economic development, has been carried out
by researchers.
According to Masters Williams, 2009,
Agricultural yields have only shown slight
increases in sub-Saharan Africa and Latin
America since the 1960s [2], despite advances
in agricultural innovations during that time.
In addition, data collected using improved agricultural technologies paint a picture of low
levels of adoption in developing countries.
The low rates of adoption in developing
countries have been adequately documented,
and there is widespread theoretical and empirical literature identifying the determinants of
agricultural technology adoption in different
contexts [3]. Poor Information management
practices have led to poor performance of agriculture in the economy.
According to Cristina Echevarria (A
three-factor Agricultural production function)
[4] agricultural production function implies
that farmers need information on several topics, at a variety of stages, before adopting a
new technology. Figure 3 shows the information access of a farmer with the help of an
information system in place [5].

40

Farmers have different types of information needs during each stage of the process.
This need ranges from pest attacks, weather
forecasts, cultivation practices, inputs, pest
and prices and disease management. Information systems are designed to provide farmers
with these information needs.
Farmers can obtain information from a
number of different sources, including, among
fellow farmers, trial and error, members of
same social network, etc. While traditional
economic theory assumes that information is
costless, information is rarely symmetric or
costless in developing countries. This is partly
due to the high cost of obtaining information
via traditional means, such as travel, radio or
newspaper. As a result, information asymmetries can be a significant barrier to agricultural
technology adoption in developing countries.
The role of IS in agriculture is also to address
information asymmetries and create a level
playground for stakeholders.
Information system plays a imperative
role in coordinating the activities of agriculture extensions and providing reliable information from reliable sources to farmers.
Agricultural extension has been put
forth since the 1960s as a means of reducing information asymmetries as it relates to
technology adoption in different countries. In
general, agricultural extension is the delivery
of information inputs to farmers (Anderson
and Feder 2007) [6]. The general extension
approach uses specialists to provide different
services to farmers, ranging from technology
transfers to advisory services and human resource development. In some cases, it provides a platform that connects researchers directly to the farmer in order to ensure that new

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

technologies are better targeted to the specific


conditions of agricultural communities.
Agricultural extension models can take
several forms. The most common approaches are Training/Visit (T&V), Farmer Field
Schools (FFS) and fee-for-service [6]. In
Training and visit plan, specialists/field staff
provides technical information and village
visits to communities selected. In many cases,
field agents train and work with contact farmers, or farmers who have successfully adopted
new technologies and can train others. World
Bank promoted T&V and applied in more
than 70 countries between 1975 and 1995 [6].
Farmer field schools (FFS), designed specifically to replace integrated pest management
(IPM) methods around Asia. FFS also utilize
contact farmers, relies on participatory training methods and builds farmer capacities.
Fee-for-service extension comprises both public and private initiatives and public funding.
Farmer groups contract extension agents with
accurate information and service requests.
2.2. Areas of application of information system in Agriculture
Information Systems can be applied
in various fields of agriculture as researched
by many researchers. Some researchers have
come up with different lists of areas of IS application in agriculture. Some of these fields
are:
I. IS should be used for demand and
supply monitoring in the field of agricultural
inputs. Based on the annual crop plan, the requirement for the agro-inputs can be estimated, and accordingly supply can be monitored.
The information on availability of seeds, fertilizers and pesticides in a different region can
be made available to the farmers. This will
help him in speedy procurement of inputs at a
cheaper rate.
II. Information on availability of quality planting material of horticultural species at
various government nurseries and Agriculture
Universities should also be regularly made
known to farmers through IS
III. Agriculture Universities and other
National Institutions are regularly releasing
improved varieties of different crops. The es-

sential features of these varieties such as its


performance, disease resistance and adaptability should be made known to farmers through
IS.
IV. The prompt identification and control
of pest and diseases of the cash crops is essential in reducing further damage to the harvest.
Audio-visual clips of the causative organism
and affected/diseased plant part with its control measure should be made know to farmers
through IS. This would assist the farmers in
remote areas to identify the pest/disease and
take corrective action.
V. Weather plays a significant role in incidences of particular pest and diseases. A disease-forecasting module for advance intimation on likely occurrences of pest and diseases
and preventive measures to be taken needs to
be developed to reduce the economic loss.
VI. Soil survey section of many Agriculture Department possesses around 28000
soil survey maps, which need to be digitized
to preserve them permanently and for extracting needful information using GIS technique.
VII. Primary data pertaining to agriculture can be generated through remote sensing
& GIS where attributes such as ownership,
soil fertility, cropping pattern, etc. can be attached to the survey numbers in maps. This
data could be integrated and analyzed at different levels to help decision-making. This
data could also be shared with various line
departments.
VIII. Integrated information systems
for various components of watershed development programs needs to be developed for
making active Watershed development projects assisted by the Agriculture Department
and these can be monitored at different levels
if appropriate monitoring and evaluation software is developed.
IX. Use of satellite imaging data analysis for forecasting agriculture related information should be adopted for forecasting rainfall,
area under different crops, yield estimations,
and soil properties.
X. Interactive module needs to be prepared to assist farmers in preparing crop budget, which will help them in documenting data
on cultivation cost and make them aware of
the profitability.

www.ijsrise.com

41

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

According to Christian Fuchs, 2008, a


sustainable information society is a society
that makes use of ICT and knowledge for fostering a healthy life for all human beings of
current and future generations [7]. He advocates the structuring of information systems
that would stand the test time.

adaptation by man. Figure 2.3 describes HCI


approaches that can be used in modeling an
IS system. This system will focus as much as
possible to satisfy the following HCI conditions:
Safety
Utility
Effectiveness
Efficiency
3. SUMMARY OF FINDINGS
Usability
Appeal
Implementation of Information Systems
This will as much as possible ensure the
has always been an issue of concern in agriculture in Africa. Ever since the discovery of usability of IS systems. Usable for all class of
farming, whether people are growing crops, farmers: Ranging from the most educated to
raising livestock or fishing, people sought in- the least educated.
formation from one another on better ways
to perform their farming. Information on the
most efficient planting strategy, where to
buy improved seed or feed for animals; how
to acquire the land title, the highest price in
the market, funding from governments credit
program, etc. It is usually very difficult for
farmers to find answers to such question. Time
taken in search of answers to these issues also
amounted to waste of resources, if somewhere
replied to in a given year; different similar issues arise every year but might have different
answers in different year due to time and seasons as it relates to farming.
With an effort to tackle the problem of
information systems and improving producUsing the HCI approach, developers are
tion, different methods have been proposed
more concerned with the way users view and
and designed. It is observed that most systems
interact with the system. Cultural differences,
designed for agriculture have not been fully
languages, social status/classes are all put into
implemented. With a critical review of works
consideration in designing systems. Ease of
done in this area, we found that most devellearning and ease of use are major concerns
opment is centered on programming logic and
for developers using this approach. Questions
not on the clients. For example, the structure
like: Can I use the basic functions of a new
used in the design of an IS system for a top
system without reading the manual? Does the
business organization should not be the same
software facilitate us to learn new features
structure that is used for industry full of unquickly? Etc. are significant questions that
educated employees. With this knowledge, it
must be answered before a software is conis appropriate that designers should focus on
sidered Human-friendly. The poor attitude of
the human aspect of the design of an IS sysfarmers in using Information Systems could
tem for agriculture to aid in implementation
be enhanced by the complexity of IS systems
feasibility.
compared to the educational level or language
The Human-computer Interaction (HCI)
of the end users. We believe that if systems are
guides system analysts/designers in modeling
structured as simple as possible, many of the
systems that can interact appropriately with
limitations to the implementation of Informahumans [8]. Systems are designed for easy
tion Systems in agriculture in Africa will be
42

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

handled.
Conflict of interests
Author declare no conflict of interest.

REFERENCES
[1] Anthony G. Muriithi, Eric Bett, Sarah A. Ogaleh.
Information Technology for Agriculture and Rural Development in Africa: Experiences from
KenyaTropentag 2009, University of Hamburg,
October 6-8, 2009.
[2] Masters, William A. 2009. Africas Turn: From
Crisis to Opportunity in African Agriculture.
David Lee, editor. The Food and Financial Crisis
in sub-Saharan Africa.
[3] Feder, Gershon & Richard E. Just & David Zilberman. 1985. Adoption of Agricultural Innovations in Developing Countries: A Survey,
Economic Development and Cultural Change,
33(2): 255-98.
[4] Cristina Echevarra.1997.A three-factor agricultural production function: the case of canada.
Instituto Valenciano de Investigaciones conmicas, S.A.
[5] Rajender Verma, Shimla and Himachal Pradesh.
June, 2012.Role of Information Technology in
Development of Rural Himachal. .No.- 172027
[6] Anderson, Jock R., Gershon Feder and Sushma
Ganguly. 2006. The rise and fall of training
and visit extension: an Asian mini-drama with
an African epilogue. World Bank Policy Research Working Paper 3928.
[7] Christian Funch. 2008. Information and communication technologies (ICTs) & society. University of Westminster, Communication and Media
Research Institute,School of Media, Arts and
Design.
[8] Fakhreddine K., Milad A., Jamil A., and Monours
A., March 2008, Human-Computer Interaction: Overview on state of the art, International
journal on smart sensing and intelligent systems, vol. 1, no. 1, march 2008

www.ijsrise.com

43

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

44

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

UNIVERSITY TIME-TABLE SCHEDULING SYSTEM: DATABASES DESIGN


Dr. Samson Oluwaseun Fadiya, Management Information System (PhD)
Girne American University, Mersin 10 via Turkey, Email: samsonfadiya.gau.edu.tr
Nwabuzor E. Iruoma, Management Information System (BSc)
Girne American University, Mersin 10 via Turkey, Email: iruoma@gmail.com
Received: April, 25.2015.
Accepted: June, 29.2015.
Articles
Abstract. Automated System Preparing Time-tables (ASPT) system was designed to assist the organizations in organising and maximizing their time. Interactive
system ASPT forms a part of a bigger project that concerns time-table scheduling system in higher learning.
The aim of this project is to prepare a computerized and automated system of preparing timetables
for the business faculty in order to save time, prevent
clashes, ensure maximum use of the facilities and also
create a better learning environment for the student and
a more suitable teaching environment for the lecturers.
Keyword: Automation, database, SQL, schedule,
system, management.

1. INTRODUCTION
A multi-continental university in different countries is very robust in nature and in
handling files. The most popular of its faculties and also the biggest of them is the business faculty which has a huge number of students and even more coming each year. With
the large number of students and also the business and engineering faculty sharing some of
the same classes and even some of other faculties taking some of its courses in the same
facility, the preparation of the business faculty
timetable could be very hectic and tiresome
because of the manual way it is being done.
Some of this Universities uses a manual
system for the selection of courses and preparation of timetables, thereby resulting in clashes when done by the lecturers. But with the
increasing number of students every semester,
this doesnt just cause clashes but also wastes
time.
Corresponding Author
Dr. Samson Oluwaseun Fadiya, Management Information System, Girne American University, Mersin 10 via
Turkey, Email: samsonfadiya.gau.edu.tr

2. DESIGN
A database package would be needed in
order to store all the details about the lecturer,
students, classes, etc. For the back end there
are many possibilities for the database such as
Microsoft Access, MySql, SQL etc.
MySql is popular for handling very
powerful and large databases but it also has a
couple of setbacks some of which are it does
not support transactions or concurrent update
of complex table which if used would have become a huge hindrance to the development of
the system in the making. Oracle is very well
known for the use of SQL statements. It is one
of the most expensive databases on the market.
There is no graphical interface for creation or
modification of tables. This implies that the
use of this database is very time consuming
But for the database of this project we
would be making use ofMicrosoft SQL. SQL
is preferred out of the other databases due to
some reasons. Being one of the database pioneers, SQL has become more easy to use as
well as learning because of this it make developing a new database system much quicker
compared to others such as Oracle, My sql etc.
It is a cheaper software and also more affordable. Also it is easier to learn.
For the front end of this project, we
would be making use of Visual C#, this is because visual C# is a wIDely available, commercial interpreter that are available for most
personal computers. Also the interface includes very familiar GUI controls such as list
boxes, buttons, combo boxes, etc. and with
just a few mouse clicks, one could add a combination of these GUI controls to the program

www.ijsrise.com

45

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

making it easier and faster to design the user Table 3. Lecturer Table
interface of the program.
2.1. Database Design
The database would consist of eight (8)
entities;
FACULTY,
DEPARTMENT,
LECTURER,
CLASSROOM,
CLASS,
COURSES,
LOCATION,
USERS.

Table 4. Course Table

Table 5. Location Table

Table 6. Classroom Table

Figure 1. Database Diagram

2.2. Definition of Data Requirements


Table 1. Faculty Table

Table 7. Class Table

Table 2. Department Table

Table 8. Users Table

46

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

noon or Evening.
Then there is an add button that is
being clicked on only when all the
details are being inputted unless it
brings an error message.

Search, edit, and delete a lecturer:
This page is to search, edit or delete
a lecturer
Here one can search for a lecturer either with the lecturers ID or name.
Then the list of the lecturers are displayed on a table under
To edit a lecturers details, you have
to click on it and change the details
and then click on the edit button.
To delete a lecturers details, one has
to click on the lecturers details and
click on the delete button.

2.3. Design of Pages


2.3.1. Login Page
This page is used for the login of the
Admin (who is in charge of the program).
The admin is strictly in charge of the preparation of the timetable and the editing of
the data that would be used in the preparation of the timetable. He is the only one
for now who makes use of the software.
2.3.2. Lecturers Icon
In this icon we have three controls under it, one of it is to add lecturers, the other is
to view lecturers and the last one is to search
for a lecturer and either edit or delete the lecturers details from the database.
Adding lecturers: This form would be used
for several purposes:
To input a lecturers ID: this is
validated to only input a maximum
amount of numbers.
To input a lecturers initials:
To input a lecturers title: that could
either be PHD, Asst, Dr. and the
likes. There would be a drop down
menu where the admin can choose
from.
To input a lecturers name
To input a lecturers surname
To input a lecturers department:
here there is also a drop down menu
where the lecturer can choose his or
her department.
To input a lecturers preferable
days: also here the lecturer can only
choose one preferable day he wishes
to teach.
To input a lecturers preferable
time: also here the lecturer can only
choose one preferable time he wishes to teach either; Morning, After-

2.3.3. Classroom Icon


In this icon we have two controls under
it also either to add a classroom or to search/
edit or delete a classroom.
Adding a classroom: This form would
be used for several purposes
To input a classroom name: here the
admin enters a unique classroom
name for a class
To input a classroom location: this
is to input where the classroom is
located in the school either techno
park or spectrum etc.
To select if it is a lab or not.
To input the capacity of each classroom.
Search, edit, and delete a lecturer: This
page is to search, edit or delete a lecturer
Here one can search for a classroom
with the classrooms name.
Then the lists of the classroom are
displayed on a table below.
To edit a classrooms details, you
have to click on it and change the
details and then click on the edit button.

www.ijsrise.com

47

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

To delete a classrooms details; click course code, classroom and lecturer is being
on the details and click on the delete chosen for that slot. Whenever a constraint is
button.
being breached, an error message is displayed
2.3.4. Courses Icon

2.4. Diagrams of Pages

In this icon we have two controls under


it either to add courses or to search/edit or delete a course.
Adding courses: This form would be
used for several purposes
To input a course code: this is validated to only input a unique course
code.
To input course name: here, the
name of the course is being inputted.
To input the number of sections: this
is to select how many sections this
course would have
To input the maximum number of
students: Here the maximum number of students for the course is inputted
To input the total teaching hours: The
total teaching hours for the course is
selected, usually its a maximum of
three hours and a minimum of one
hour.
To input a course department: This
is used to select which department
the course falls under.
Search, edit, and delete a course: This
page is to search, edit or delete a course
Here one can search for a course either
with the course ID or name.
Then the course/courses are displayed
on a table below
To edit a course details, you have to click
on it and change the details and then click on
the edit button.
To delete a course details; click on the
course details and click on the delete button.

2.4.1. Login Page

Figure 2. Login Page


2.4.2. Add Courses Page

Figure 3. Add Courses Page

2.4.3. Search Courses Page

Figure 4. Search courses Page

2.4.4. Add Lecturers Page

2.3.5. Timetable Icon


Here the time slots are shown, and
when a slot is selected, if it for the time one
can choose the start or end time, if it is for the Figure 5. Add Lecturers Page
courses, a popup menu comes up and then the
48

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

2.4.5. Search Lecturers Page

2.4.8. Timetable page

Figure 6. Search Lecturers Page

Figure 9. Timetable

2.4.6. Add classroom page

2.4.9. Popup menus for add class

Figure 7. Add Classroom Page

2.4.7. Search Classroom Page

Figure 10. Popup menu for editing a


class information
2.4.9.1. Use Case Diagram
USE CASE DIAGRAM: UNIVERSITY TIMETABLE SCHEDULING

Figure 7. Add Classroom Page

Figure 8. Search Classroom Page

Figure 11. Use Case Diagram


www.ijsrise.com

49

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

2.4.9.2. Menu Design

Functional Testing

In the design of the menu, all items are


linked to each other; one can connect to any
other page from any page. But on the Timetable page you can only log out. You cant go
back to adding courses again.

I will write test cases for the menu


and toolbar user interface to test that:
The menu and toolbar options are
displayed correctly
All options on the menu and toolbar
can be selected
Invalid selections are dimmed or rejected with an error message
Logical Testing

Figure 12. Menu Design

2.4.9.3. Test Strategy


I will use user feedback, valid data, invalid data, special cases/unusual values and
boundary value testing to reveal the existence
of errors.
I plan to test the user interface first.
I will elicit feedback on the appropriateness of the user interface from
potential users:
Is colour scheme appropriate?
Is structure of layout appropriate?
Can the elements that make up the
user interface be read easily?
Does the user interface offer sufficient guidance on its use for the
given task?
I will test the effectiveness of the security
on the user interface:
Valid password gains access to the
system
Invalid password rejected and system access denied

50

I will write test cases that will:


Check that the correct input screen is
produced for each option
Check that the data can be entered
as expected
Check that invalid data is rejected/
check that valid data is accepted
Check that when output from the
system is expected that output is
produced
Check that an appropriate error message is displayed when the user attempts an invalid operation or tries
to enter invalid data
I will also write test cases to test that:
Details for each lecturer, course and
classroom can be entered and then
stored
It is possible to select for viewing/
editing/updating the details of a
course, lecturer and classroom
It is possible to delete a lecturer,
course or a classroom from the database
Department, faculties and lecturers
are automatically generated in the
drop down box after they are being
added.
Timetables can be printed and
viewed
Constraints for a lecturer is being
checked
Constraints for classrooms are observed
Constraints for courses and their
sections are being observed.

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

System Testing
When the testing is complete, a whole
range of tests is conducted to ensure that the
whole system is working properly.
Recovery Testing
Here we would reboot the computer
while the database is open; this is to check that
in case of a power failure the data would not
be lost.
Acceptance Testing
In this case, the user is brought in and
asked to check the entire program to make sure
all the functionalities is present and working
properly as planned. This kind of testing might
result to further changes depending on the user.
2.4.9.4. Security
The whole program is properly secured
and the Database could be secured by adding
a password in the SQL program.

3. CONCLUSION
The teaching staffs usually spend a lot of
time intimetable generationandtimetable management. The aim of this project is to enable the
process of timetable generation to be done faster and more efficient. There are so many ways
the program could be developed to become a
better application to be used in the university.
Conflict of interests
Author declare no conflict of interest.

REFRENCE
[1] Bouvier. Versions and standards of HTML ACM
SIGAPP Applied Computing Review, 3:9-15,
1995.
[2] F. Sueychyun, University Course Scheduling System (UCSS): A UML Application with Database
and Visual Programming, Journal of Computing
Sciences in Colleges, 20:160-169, 2005.
[3] G. M. White. Constrained satisfaction not so constrainted satisfaction and the timetabling problem. In PATAT00, volume 1, Konztanz, Germany, August 2000.
www.ijsrise.com

51

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

52

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

AN OVERVIEW OF HUMAN RESOURCE


INFORMATION SYSTEMS (HRIS) AND HOW
BEHAVIORMETRICS PREDICT EMPLOYEE
PERFORMANCE IN AN ORGANIZATION
Vanye Zira Vanduhe, Department of Management Information system, Cyprus International University,
Haspolat -Mersin 10-Turkey, North Cyprus, Email: vanyeb4u@gmail.com
Desire Kemena Awoh, Department of Environmental Engineering, Cyprus International University, Haspolat
-Mersin 10-Turkey, North Cyprus, Email: Kemena2001@yahoo.com
Received: May, 05.2015.
Accepted: June, 29.2015.
Articles
Abstract. Organization faces computation due
to technological ideas that is put in place to satisfy their
customers. Therefore, the Human Resource has to be
on the move to make sure employee work had to make
sure customers meet their needs. Organization need
to know their performance capacity in other to make
arraignment on when a product or service could be ready.
This paper provide possible way by the use of HRIS
being synchronized with behaviormetrics to study the
capacity of employee production when sad or happy
mood. Also, steps in of implementing Human resource
information system in an organization and possible ways
why the system fails is been discussed in this paper. Due
to the uniqueness of human conscious and sub-conscious
behavioral action profiling of this action are being created
to have history of staff emotion study are managed. At
the end study, sad and angry mood facial expression
is analyzed in a way that it affects human productivity
in an organization. Furthermore, with this HRM could
forecast employee performance at the end of the day.
Keywords: HRIS; behaviormetrics; organizational
performance; biometrics; Hman Resource; happyand
sad facial expression

tions, and competition. Due to the resent trend


and the capabilities of information systems,
organizations tend to use the opportunity that
comes with it to buy time for strategic decision
making. Human resource information systems
is an online solution client/server application
the compiles data entry, tracking of data, store,
retrieve, manipulate and give accurate information about human resource of an organization.
HRIS also keeps tracks of all the staff working
in an organization, helps in appraisal and notwithstanding computers doing work that couple of employee will do. HRIS covers every
aspect of the organization such as employee
training, attendance analysis and report, financial planning and forecast, whistleblowing,
management strategic planning, and security.

1. INTRODUCTION
Organizations in the world are currently
being faced with intensive pressure due to the
exponential increase in consumer demand,
environmental influence, government regulaCorresponding Author
Vanye Zira Vanduhe, Department of Management
Information system, Cyprus International University,
Haspolat -Mersin 10-Turkey, North Cyprus,
Email: vanyeb4u@gmail.com
www.ijsrise.com

2. Capabilities of HRIS
Data maintenance: this prevent data
redundancy, updating of the module in cases like when new office
is opened or increase in staff salary
and change in address of staff. Moreover, Davenport and Short (1990)
explained that companies should
adapt systems that can move along
with the change in the technology,
such as the upgrade of the internet
Ipv6 for Ipv4, 3G to 4G. In other for
organization to have stable system
backup of the internet and the stor53

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

54

age hard drive need to be in place.


Output system: this form aspect of
using the information derived from
the previous input. These are the display of report of current summary of
dealings of a process of production,
to obtain history for future planning.
Create jobs to disable, they are not
left out, they tend to be objective and
effective than the abled workers.
HRIS has made communication to
be effective in all aspect of the organization, help solve language problems in the organization.
Equal employment opportunities to
the abled and disabled
Downsizing: this system reduces
number of dormant employee as
well as carrying out jobs of different
people. An enhanced computer system is capable of taking over three to
five jobs of staff and however, reduces cost of labor to the organization.
With the internet and information
system, young or small companies
do not fear large companies, consultancy companies like Accenture
Plc. which is one of the world leading companies in consultancy and
outsourcing which has just an office
in Dublin, Ireland. Accenture has
more than 250,000 employees that
work without having an office, with
a personal digital assistance (Samsung Tab, IPod) employee could
give report and be trained in Nigeria
from outside. Therefore it gives the
human resource managers administrative work and as well allows the
manager to think of possible was to
gain optimal productivity in an organization. With this HRIS reduces
administrative cost, it substituted
whole office, a branch office could
be in a computer device in which the
cost of the device cannot be traced in
account statement because of its low
price Newell (2003). HRIS facilitates business to business communication and customer to customer
communication. For e-governance,

it brings the whole world to an office with few mouse clicks.


Outsourcing of HRIS by an organization is the best way of incorporating the HRIS
in an organization. This research is aimed at
synchronizing HRIS with behavioral biometric system which is called behaviormetrics
(Arya Khatri 2013).
Outsourcing of HRIS by an organization is the best way of incorporating the HRIS
in an organization. This research is aimed at
synchronizing HRIS with behavioral biometric system which is called behaviormetrics
(Stefanos Zafeiriouy 2010). Biometrics is a system that analysis human behavioral and physiological semantics which is used for enhanced
security access. However, notwithstanding
physical and behavioral authentication access,
behavioral metrics is being used for security
access as well.

3. Literature review
In order to present the theoretical and
methodological underlying principles of this
research, we base on literatures on Human
Resource Information Systems (HRIS) best
practices, implementation HRIS, HRIS, why
HRIS fails and how HRM can forecast employee productivity through behaviormetrics.
Theoretical background will show the effects
of synchronizing Information Systems with
Human Resource with behaviormetrics system framework and how it increases the organizational performance. Notwithstanding using fuzzy data mining which is a tool the HR
uses for staff appraisal and as well talent as
part of performance structure of HRIS (Jing,
H 2009 and Samson Oluwaseun 2014).
HRIS are set of computerized platform
used for communication within and outside an
organization whereby every staff have access
to the computer device which enables staff to
communicate automatically to all aspect of
the organization. (Tannenbaum, 1990)T cited
that, HRIS is a framework used to procure,
store, control, examine, recover and disseminate error free data across HR department of
an organization. (Hoch, 2013) also contribut-

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

ed that HRIS as an incorporated system used


to accumulate, store and process and analyze
data with respect to an organization HR department. IS has promoted the involvement of
management and is used as medium for HRM,
the integration of IS to HRM can manage data
in relation to the selecting, staffing, advancement, recompense, health and workplace
safety, training and improvement. This IS
digitalizes the management enterprise, standardize internal and external system, make the
organization work in scientific way, network
based and however increase labor productivity
and performance. The other aspect of knowing
the employee and forecast employee productivity by the human resource manager can be
extracted by the use of behaviormetrics.
Behaviormetrics is derived for biometrics which is a statistical expression of
human biological and medical analysis that
deals with unique features that discriminate a
person form another (Zhu., J. 2013). Behavioral biometrics is an aspect of that study human conscious and sub-conscious behavioral
trait. Behavioral biometrics entails studying
the emotion of staff in an organization which
classifies emotion into basic human facial expression mood such as happy, sad, and angry
and fear (Urvashi Agrawal 2013). The basic human emotion that was found in this research is
happy and sad, therefore, this mood of expression affect the performance of some. When
happy high performance will be expected and
when sad poor and lower under expected performance will be expected by the staff (David
Oziem 2004).
1) Implementation of Human Resource
Information System
According (Newell 2012) and (Chlivickas 2014), these scholars recommended
some steps for implementing HRIS as well as
biometric system. Organization need to build
up clear objective such as cost reduction, error
reduction in the business value chain, loss of
files, redundancy etc. Also identify specific areas that need to adopt the information system
such as specific organization department like,
sales, admin, marketing, finance, monitoring
etc. as contributed by (Byars L. L., 2007) he
explain 13 steps of implementation of HRIS
are described by using simple steps, in select-

ing best technology to suit the organizational


environment, culture, ethics or social, that
could be implemented life.
Some steps of implementation of HRIS
are described by using simple steps, in selecting best technology to suit the organizational
environment, culture, ethics or social life.
1. Ideas generation: the inception for
idea generation saw the need and
report of what HRM in an organization need HRIS to. This design
needs management attention and
it has to identify clearly HRIS can
assist management in decision making.
2. Feasibility studies: this study deals
with accessing the potentials of
HRIS benefits in reducing cost labor, increase in accuracy, with few
errors. However, feasibility studies
will always recommend HRIS because of its great potentials to organizations at large.
3. Management support: the results of
the feasibility studies are being sent
to the management for them to assess its importance and they give
their support for the HRIS project to
be carried on.
4. Selecting an ad hoc project team
which will include HRM representative, technical experts and with a
payroll staff.
5. Defining and designing requirements: this identifies specific duties
of what HIRS will eventually do. L.
L. Byars (2004) show some required
statements which are; description
of how users collect and prepare
data, obtain approvals, complete
forms, retrieve data, and perform
other non-technical task associated
with HRIS use the main aim is mo
match the mission of the HRIS to the
specific needs of the organization.
6. Software and hardware selection:
many computer programmers are
developed, therefor, organization
just need to identify the one that
best fits to the organizational needs
in relation to payroll, business value

www.ijsrise.com

55

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

chain at large.
7. Training: training of staff of technical ad hoc team and towards the end
of the implementation of the HRIS,
managers will be trained on how to
evaluate dealings per time period
and source information from it.
8. Tailoring the system: this stage involves adapting the system and configuring it in accordance to the organizational needs.
9. Data collection: before the system
will be kicked-up, data has to me
entered into the system. Data such
as employee datagrams, accounting
imputation format etc.
10. System testing: this is to see if the
system output best fits the organizational basic requirements and to
analyses is accuracy.
11. Starting up: start-up process is done
to identify some additional errors.
This kick-up begins when all data
are being manipulated into the system. Startups are advised to be done
at odd working time such as weekends.
12. Parallel running: this involves systematically running the old HR and
the HRIS to accurately determine
the output of the new system.
13. Maintenance: in adoption of new
systems are ways of doing things
losses are meant to be incurred,
however, such provision is given
in months or years. Errors could be
remaining and destruction of configured interface could to perpetrated,
therefore, there is need to correction
14. Evaluation: when the system has
been in use for a period of time, the
HRIS need to be evaluated to see if
it is working according to the initial
plan.

having less database storage capacity.


Main five missteps that organizations
experience with HRIS execution with tested
tips to help you evade some of those same
pitfalls.
1 - Failure to Effectively Manage Change
Changes in the implantation of HRIS
can affect the system; the change should be
proportional to employee needs.
Before take a step in the implementation of the new system, the impact
of the change and laid down steps on
how to effectively use the most be
stated.
Communicate as often as possible
specific ways of addressing staff
needs/concerns/suppositions on the
change
2 Failure to Define, Validate, and Support
Data Quality
Quality choices hail from quality data.
That data needs to be legitimate, solid, opportune, and above all functional, information
quality is synonymous with data quality, since
poor information quality brings about mistaken data and poor business execution.
Create clear cut steps of inputting
data into the core HRIS functional
areas and potential data entry defilement zones.
Identify ways when and how data
will be approved, defining method
that will be used in correcting inadequacies.

3 - Failure to Properly Plan

IT programs are deemed to work successfully, poor planning are the reasons that
brings about failure in the system, effective
plan should on the database that different department will use should be made in accor2) Why the system fails
dance with the organizational objectives and
70% of business fail in adopting HRIS ways of data inputting should be specified.
because the fail to continuously manage and
Define all business needs, vital obcontrol the system, unstructured objectives,
jectives, and business process that
installing system that cannot be upgraded and
the HRIS will have effect on before
56

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

any result is chosen so that the management will evaluate its end result
and see if it has justified their want/
needs.
Under any situation do not incorporate a bad method into your HRIS,
set out time to look over the current
HRIS and the formal before taking
action.

an organization. System that uses this system identifies who an individual is, who he/
she claims to be and how he/she responds in
a repetitive situation in an organization Taru
(Khatri 2013). However, this system records
repetitive behaviors of individuals in an organization using enhanced biometric cameras to
capture voice signature verification, computer
keystroke and mouse dynamics, gait, smile
and face recognition, lips movement, individual odor, eye blinking pattern, and biological
4 Failure to Administer Data signals (Jiang Zhuyz 2013).
Security Properly
For the purpose of this study already
installed biometric system in an organization
Information security issues in private can be used for predicting or forecasting emand public companies security are getting to ployee productivity. Behaviormetrics creates a
be more predominant and critical concern to profile system for the entire employee in an
cloud-based HRIS results specifically. HRIS organization which stores happy, sad, angry
that work through the web can give full data suppressed and fearful mood (Chuan-Yu Chang
control to 3rd party via cloud computing.
2010). Happy or sad profiling will be used for
This can give feedback about en- the purpose of this study. Happy will denote
cryption levels, detection capabili- sad face and sad will denote angry or sad faties, security documentation, secu- cial emotional recognition.
rity staff, and review logs before
A. Properties of Behaviormetrics System
determination and also,
Using the seven qualities of properties
Set aside some time to itemize balance between security and adapt- of the system, we will see how it helps in the
implementation and the synchronization of
ability.
behaviormetrics in human resource information system.
5 Failure to Understand Legal
a) Universality every staff in an orgaRequirements
nization should have general idea of the system and its characteristics and can be accessed
At last, the greatest HRIS mistake made
anywhere.
by organizations is the failure to comprehend
b) Uniqueness every individual must
to the laid down rules for data inputting and
have different biometric features and characinformation retrieval. Management should be
teristics.
aware of the implication of violating the spec) Permanence individual biometcific law.
ric features and characteristics vary, in that it
could be used for assessment.
4. Behaviormetrics
d) Collectability the characteristics
and features must be modeled in an easy to
TechNavio reported an exponential in- acquire and accessed way, quantitative meacrease of the use of biometric system with the surable way and must be measurable quantitagrowth of 22% forecast of voice and facial tively and easy to acquire.
recognition biometric identification within the
e) Performance biometric model for
period of 2012 -2016 (Magazine 2013). Be- measurement must be accurate and the level
haviormetrics is the human behavioral phycol- of fault acceptance must be stated
ogy as seen in this field of studies is refers to
f) Acceptabilitythe acceptance level
as the study human emotional subconscious of biometric system could be ascertained.
and conscious action skills and emotion in
Human face has been proven to as a way
www.ijsrise.com

57

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

of knowing someone emotional expression


or a way of transmitting someone emotional
expression (Urvashi 2013) Agrawal. This facial expression movement or motion beneath
the skin of the face communicates social expression of an individual and emotional status
(Arya G. J. 2014).
Smile and Sad Recognition
For this system to be effective, powerful cameras with high fast photography and
zooming leans ability is needed to generate
series of smile and moody face maps. Facial
maps are composed of underplaying structural
deformation of relevant muscles that moves
with the fashion of someones smile are sad
face (Lou Benedict 2004). These facial underplaying wrinkles and muscle forms part of
each staff profiling in the biometric system
(Kenny Hong 2013).
B.

5. Methodology
A. System Design
The already in use architectural biometric
system for authentication of security access using human individual phycology
and behaviors will be harnessed. Behavioral biometrics is already in use. Figure
1 below shows the facial emotion tracking
system (Agrawal U. 2013).
Video camera input: this is the enrolment
stage of each staff in the biometric system,
whereby at the approach of the camera the
video captures scan the face of the individual Khatri 2013.
Processing the image using YCbCr tool
extract facial color components from image, video collected from a digital system.
This tool cleans a picture because it deals
with contrast and brightness of a picture.

Skin color segmentation that is converting the color input of GRB


(green red and blue) image to a gray
link structure, this gets the picture
ready for face texture extracting.
Area of identification: this scans the
gray like image in group its pixels connectivity based feature. Pixels group
features are grouped into the emotional
structure of the face. Gabor filter gave
an age of filtering human textures representation and discrimination features.
Facial texture extraction: this identifies
the eyes, lips features which is used to
determine the facial human emotion
(Arya G J 2014). These expressions are
stored in the organizational data base
which can be referred in the future for
predicting employee performance (Samson Oluwaseun 2014). This facial expression trait are being recorded so as the
system will get used to each staff and its
emotion. This stage of expression identifies the happy and sad mood of facial
image using the facial processing identification texture of the behavioral biometrics system installed in an organization
(Arya G J 2014), figure 2 shows the algorithm of facial expression schematics.

Figure 2. Showing the modeling of facial context used


for emotion generation (Arya G. J. 2014).
C. Facial

Figure 1. Showing the process of expression generation

58

expression algorithm

Extract the facial feature points identifying


the nose, chin, lips, down to the jour.
Analysis on the expression change on the

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

image stating set of requirements.


State the mean value of the corresponding facial expression generation
Mesh facial wrapping algorithm bilinear
inscription coding. This creates models
representing the facial texture as indicated in figure 2 above using alphabets to
represent the facial quadrangle and schematics. A , B, C, and D representing the
vertex part of the quadrangle and E, F, G,
and H denote show the vertex part of the
face mapping (George Wolberg 1998)..
This is the monitoring stage in that it repeats step 4 so as to obtain in time modification of the quadrangle mapping of the
face. Moreover, match the present and
the concurrent mapping obtained.
This algorithm manipulate the geometrical mapping and schematics the face so as to
generate the facial gesture emotion. Figure 3
show the bilinear outcome of happy facial expression denoting eye corners expanding, the
lips rising. Figure 5 show the sad expression
in that the eye side and the lips will contrast.
This could obtain all the facial expression, but
due to the aim and objectives of this stud we
are limited to only sad and happy mood.

Figure 3. Showing happy mood of facial expression


generated by behaviormetrics system (Arya G. J. 2014).

Figure 4. Showing sad mood of facial expression


generated by behaviormetrics system (Arya G. J. 2014).

This study try to find possible way a


manager through behavioral biometric system forecast employee productivity in certain
rang of time. When employee productivity
cannot be forecasted, it becomes a problem to
the management. This proposed system could
proffer cost effective and reasonable solution
by providing a computerized way to study employee activates and productivity.

Conclusion
With this data being encapsulated in individual employee database records, the system framework captures individual behavioral
phycology in two ways which are when happy
or sad. When happy explain the probability
of individual best performance output while
when sad explains the probability of low output. HR Manager now with the help of the system compiles the result of the entire employee
in an hour of work resumption in a day. With
this the manager could ascertain daily output
performance and as well predict monthly output with the help of history.

Recommendation
This system is recommended at all
sectors such as education, government, retail organization, production and manufacturing organization, transport, truism etc.
This can only work in an organization that
has an already running biometric system.
www.ijsrise.com

59

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.
Engineering: Information Technology and BusiWith this the HR could intensively know the
ness process redesign. Center for Information
all the employee performance capacity and
Systems Research, 3190.
how he/she could motivate the employee. Newell, S. (2012). Implementing enterprise resource

Conflict of interests
Author declare no conflict of interest.

References
Khatri, T., and Jindal, A. (2013). Behavioral Biometrics: Extending Keystroke Dynamics to Finger
Dynamics. International Research Journal of
Computers and Electronics Engineering 1 (1),
14 - 23
Arya, G. J., Ajish, K. S., and Rajasree, R. (2014). Synthesize of Emotional Facial Expressions through
Manipulating Facial Parameters. International
Conference on Control, Instrumentation, Communication and Computational Technologies.
(1) 2, 911 916.
Agrawal, U., Giripunje, S., and Bajaj, P. (2013). Emotion and Gesture Recognition with Soft Computing Tool for Drivers Assistance System in
Human Centered Transportation. IEEE International Conference on Systems, Man, and Cybernetics (4) 9.
Hong, K., Chalup, S. K., and King, A. R. (2013). A
Component Based Approach for Classifying the
Seven Universal Facial Expressions of Emotion. IEEE Symposium on Computational Intelligence for Creativity and Affective Computing
(1)4, 1-4
Magazine (2013). Biometric Technology Today
Zhuyz, J., Huz, H., Huy, S., Wuy, P., and Zhangy, J.
Y. (2013). Mobile Behaviometrics: Models
and Applications. 2nd IEEE/CIC International
Conference on Communication (1)9, 1- 8
Lou B. P., Ang, E. F., Belen, R. A., Bernardo, J. R.,
Boongaling, G. H., and Jonathan, B. C. (2004).
Facial Expression Recognition through Pattern
Analysis of Facial Muscle Movements Utilizing
Electromyogram Sensors. IEEE TENCON, 600
603.
Chang, C., and Huang, V. (2010). Personalized Facial Expression Recognition in Indoor Environments. IEEE, (1) 2.
Zafeiriouy, S., and Pantic, M. (2010). Facial Behaviometrics: the Case of Facial Deformation in
Spontaneous Smile/Laughter
Agrawal, U., Giripunje, S., and Bajaj, P. (2013). Emotion and Gesture Recognition with Soft Computing Tool for Drivers Assistance System in Human
Centered Transportation. IEEE International
Conference on Systems, Man, and Cybernetic
s(1)9, 4612 - 4616.
Oziem, D, Gralewski, L., Campbell, N., Dalton, C., Gibson, D., Thomas, B. (2004). Synthesising Facial
Emotions. Proceedings of the Theory and Practice of Computer Graphics, IEEE computer society 0-7695-2137-1
Dao, T. T. (2013). Knowledge-based personalized
search engine for the Web-based Human Musculoskeletal System Resources (HMSR) in biomechanics. Journal of Biomedical Informatics 46,
160173.
Davenport, T., and Short (1990). The new Industrial

60

planning and knowledge management systems


in tandem: fostering efficiency and innovation
complementarity. Pergamon Information and
Organization 13, 2552.
Wolberg, W. (1998). Image morphing: a survey. The
Visual Computer 1, 360-372
Oluwaseun, S., and Fadiyaa, S. S., and Vanduhe, V. Z.
(2014). Advancing big data for humanitarian
needs . Elsevier Procedia Engineering 78,88
95.
Tannenbaum, S. (1990). Human Resource Information
Systems: User Group Implications. Journal of
Systems Management, 41, 27-32.
Hoch, J. E. (2013). Shared leadership in enterprise resource planning and human resource management system implementation. Human Resource
Management Review, 23, 114125.
Chlivickas, E. (2014). Contemporary Issues in Business,
Management and Education International cooperation and innovations for developing human
resources system. Social and Behavioral Sciences, 110, 276 283.
Byars L. L., a. R. (2007). Human Resource Management (9 b.). Corell: McGrow-Hill.

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

AN EMPIRICAL STUDY OF AUTOMATED TELLER


MACHINE SERVICE QUALITY ON CUSTOMER
SATISFACTION
(A CASE STUDY OF UNITED BANK OF AFRICA [UBA])
Adeleye Idowu Olusanya, Department of Management Information system
Cyprus International University
Haspolat -Mersin 10-Turkey, North Cyprus
E-mail: richarddw6@gmail.com
Samson Oluwaseun Fadiya, Department of Management Information system
Girne American University
Girne-Mersin 10-Turkey, North Cyprus
E-mail: greaterachiever@yahoo.com

Abstratct. The Nigerian Banking sector over


the years has been experiencing significant changes and
development in its Information and Communication
Technology. Among the development is the introduction of Automated Teller Machine (ATM) that intends
to reduce the number of customers in the banking halls
as customers now can go to the closest ATM to do their
banking transactions such as: withdrawals, deposits,
bill payments, and funds transfer. The purpose of this
paper was to measure customer satisfaction as regards to
ATM services. The research was carried through survey
design which questioned respondents on ATM services.
The population of study mainly constituted of customers
of United Bank for Africa within Lagos. The sample in
this study consisted of 200 respondents who are users of
the ATM services. The data collected was analyzed by
use of multiple logistic regression analysis and Pearson
correlation. The findings revealed that, necessary input
to the bank management to increase customers satisfaction through improving ATM service quality. The
focus should not be on ATM service quality dimensions
only. This aspect should be augmented and integrated
with other aspects of the service quality of banks for
satisfaction of customers. This research concentrated on
determinants of ATM service quality and its impact on
consumer loyalty. Notwithstanding, the exploration did
not examine the relationship between consumer loyalty
and customer retention.
Keyword: Accessibility, ATM, Customer, HCI,
Reliability, Quality.
Corresponding Author
Adeleye Idowu Olusanya, Department of Management
Information system, Cyprus International University
Haspolat -Mersin 10-Turkey, North Cyprus
E-mail: richarddw6@gmail.com

Received: April, 29.2015.


Accepted: June, 29.2015.
Case Study

1. INTRODUCTION

In recent years, banks have made their


services increasingly convenient through electronic banking. Electronic banking service
makes use of computers to do money transactions. Donell (2003) viewed electronic banking service as a service that consumers can
access, by using Network framework or an Internet service to a banks computer center, to
perform banking tasks, receive and pay bills,
and so forth. Many other financial services can
be gained access through the Internet. To most
people, electronic banking service means 24hour access to cash through an ATM or paychecks deposited directly into checking or
savings accounts (Hillier, 2002). Diniz (1998)
in his view states that Electronic banking encompasses a broad range of established and
emerging technologies. Some are front end
products and services that consumers choose,
such as ATM cards and electronic banking
services; others are back end technologies
used by financial institutions to process money transactions. Some are tied to a consumer
bank account; others are indifferent to a bank
account but on the other hand store monetary
value in a data warehouse or directly on a card.

www.ijsrise.com

61

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

2. LITERATURE REVIEW

from a comparison of customer expectation


with actual service performance and service
In Nigeria the deployment of ATM by quality is a measure of how well the service
banks and its use by bank customers is just level delivered matches customer expectation.
gaining ground and has burgeoned in recently.
This happened after the recent consolidation
2.2. Concept of Customer Satisfaction
of banks, which has in all probability, made
it possible for more banks to afford to deThe academic literature postulates that
ploy ATMs or at least become part of shared customer satisfaction is a function of the disnetworks (Fasan, 2007). The increased de- crepancy between a consumers prior expectaployment of ATMs in the banking sector has tions and his or her perception regarding the
made the issue of technology relevance im- purchase (Churchill and Surprenant, 1982; Olportant. ATM awareness also ranked higher iver, 1977; Tse and Wilton, 1988; Yi, 1990).
than awareness level about current accounts At the point when an experience is superior to
slightly below savings account (Omankhan- what the customers expects, there is thought
len, 2007).
to be certain disconfirmation of the desire, and
In order to encourage customers to em- an ideal client assessment is anticipated.
brace the technology and overcome their fears
of putting their checks into a machines slot
3. OBJECTIVE OF THE STUDY
rather than a tellers hand, banks originally did
not charge customers any fees for using ATMs.
An automated teller machine (ATM)
In time, some banks started charging customservice continues to grow in importance in the
ers for not using ATMs, through so-called hubanking sector. From the customers perspecman teller fees- a charge for each time a custive ATM services has significantly reduced
tomer uses a teller for a service that could be
the amount of queues in banks, time spent, and
performed by an ATM. Banks that embraced
cost of searching for a particular bank to make
the ATM profited handsomely, often growing
transaction and also increased convenience.
far faster. At first, a banks ATMs could only
The satisfaction of customers is of great imbe used by customers who already had current
portance to any organization. Many commeror savings accounts with that bank, through
cial banks now make use of ATM service as
the banks proprietary ATM network (Ugwu,
a means of satisfying their customer through
2008).
convenience and availability of services. The
A recent study by Intermarc Consulting
objective of the study
Limited showed that ATM services provided
1. One of the objectives of the study
by banks and non-financial institutions stood
is to understand the expectations of
as the most popular e-business platform in Nithe customers as regards to creating
geria (Intermarc, 2007).
a secure environment and ensure
that there is a level of privacy for
2.1. Service Quality
the purpose of reducing the cost involved in using the ATM.
The definition of service quality involves
2. Another objective is constructing
determining whether perceived service delivthe automated teller machine in the
ery meets, exceeds or fail to meet customer
most simple and easiest way to use
expectation. Ladda and Sukhothai (2007). Acby every customer. According to
cording to Parauraman, Zeithmal and Berry
Preece (1994) he explains that us(1988) service quality is the degree and direcability is concerned with making
tion of discrepancy between the customers
systems easy to learn and easy to
perception and expectation or the extent to
use. (Preece, 1994) also states Huwhich a service meets or exceeds customer
man-Computer Interaction (HCI) is
expectations. Service quality perception result
about designing computer systems
62

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

that support people so that they can


carry out their activities productively and safely. Therefore it will be a
wise decision if commercial banks
can make their ATM machines more
users friendly to ensure efficiency of
operation which will in turn yield an
effective service delivery.
3. Determine whether the speed of operation of the automated teller machine has an effect on its reliability
to customers.
4. To examine how the ease in accessing the location of the automated
teller machine will be of convenience to the bank customers.
3.1. Scope of The Study
The area of coverage for this study is
limited to employees and customers of United
Bank of Nigeria (UBA) that have an ATM card
and make use of the ATM operating in Opebi,
Ikeja, Lagos state of Nigeria and within the
period ATM became prominent among commercial banks in Nigeria. The rationale behind
the choice of Opebi, Ikeja, Lagos state is to
have a reasonable amount of respondent and
to enable ease in administering the questionnaire. The operational period of 2007-2010
was chosen because it was the peak period
when the automated teller machine (ATM) became prominent in Nigeria.

4. METHODOLOGY

Section B contains the four dimensions; security and privacy dimension contains 4 (items);
Efficiency of operation contains 4 (items);
Speed of operation contains 4(items); Convenience contains 6 (items); Cost involved in
the use of ATM contains 3(items); Effective
service delivery contains 5(items); Reliability
contains 5 (items) and Accessibility contains 3
(items). The questions that were contained in
the questionnaire were all in close ended.
Hypothesis 1
H0: Security and privacy of ATM does
not affect cost involved in the use of ATM.
H1: Security and privacy affects cost involved in the use of ATM
Hypothesis 2
H0: Efficiency of operation does not
have a significant impact on effectiveness of
service delivery.
H1: Efficiency of operation has a significant impact on the effectiveness of service delivery.
Hypothesis 3
H0: There is no relationship between
speed of operation and reliability of service
provided.
H1: There is a relationship between speed
of operation and reliability of service provided
Hypothesis 4
H0: There is no relationship between
convenience and the accessibility of the ATM.
H1: There is a relationship between convenience
and the accessibility of the ATM.
4.1. Test Used For Data Analysis

For this research, administering of questionnaire to commercial bank customers that


hold ATM cards would be considered the most
appropriate data collection instrument. For
the purpose of this study a newly formulated
questionnaire will be adopted. The variables
used in this study was measured on a five point
likert scale anchored by 1(strongly disagree),
2(disagree), 3(undecided), 4(Agree), 5(strong
agree). The questionnaire will be divided into
different sections which measured four dimensions of ATM service quality and its effect on
customer satisfaction; Section A contains information about the respondents background.

SPSS (Statistical Package for Social


Science) version 21.0 was used to compute
and analyze the data.
4.2. Result And Analysis
The Pearson correlation was used to establish the relationship between the dependent
and independent variables. The regression
analysis measured the contribution of the independent variable to the dependent variable.

www.ijsrise.com

Hypothesis 1
H0: Security and privacy of ATM does
63

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

not affect cost involved in the use of ATM.


H1: Security and privacy affects cost involved in the use of ATM
Objective: the standard multiple regression was used to generate results that will indicate how well the set of variables representing
security and privacy of ATM and how it will
affect the cost involve in the use of the ATM.
Table 1: Model Summary
Model Summary
Model
1

R
R Square
.333a
.111

Adjusted
R Square
.093

Std. Error of
the Estimate
1.854

The model summary. It shows how much


of the variance in the dependent variable (cost
involved in the use of the ATM) is explained
by the model (there is no intrusion while I
make transaction, the location of the ATM is
secure for transaction, my account can only be
accessed by me, I feel save while making use
of the ATM at any time of the day). In this case
the R square is 0.111 expressed by a percentage, this explains 11.1% of the variance in the
cost involved in the use of the ATM.
Table 2: ANOVA
ANOVAb

Regression
Residual
Total

Sum of
Squares
83.536
670.059
753.595

df
4
195
199

Mean Square
20.884
3.436

F
6.078

Sig.
.000a

a. Predictors: (Constant), THERE IS NO INTRUTION WHILE I MAKE TRANSACTION,


THE LOCATION OF THE ATM IS SECURE FOR TRANSACTION, MY ACCOUNT CAN
ONLY BE ACCESSED BY ME, I FEEL SAVE WHILE MAKING USE OF THE ATM AT
ANYTIME OF THE DAY
b. Dependent Variable: COST INVOLVED IN THE USE OF THE ATM

Dependent Variable; cost involved in


the use of the ATM
Since F cal (6.078) > (1.97) at 0.000
level of significance, therefore we accept our
alternative hypothesis H1 and reject the null
hypothesis H0. This implies that security and
privacy affects cost involved in the use of
ATM.

64

Coefficientsa

Model
1

(Constant)
I FEEL SAVE WHILE
MAKING USE OF THE
ATM AT ANYTIME OF THE
DAY
THE LOCATION OF THE
ATM IS SECURE FOR
TRANSACTION
MY ACCOUNT CAN ONLY
BE ACCESSED BY ME
THERE IS NO
INTRUTION WHILE I
MAKE TRANSACTION

Unstandardized
Coefficients
B
Std. Error
9.900
.684

Standardized
Coefficients
Beta

t
14.463

Sig.
.000

.043

.161

.022

.268

.789

.452

.164

.221

2.753

.006

.382

.140

.215

2.726

.007

-.297

.136

-.175

-2.187

.030

a. Dependent Variable: COST INVOLVED IN THE USE OF THE ATM

a. Predictors: (Constant), THERE IS NO INTRUTION


WHILE I MAKE TRANSACTION, THE LOCATION OF
THE ATM IS SECURE FOR TRANSACTION, MY
ACCOUNT CAN ONLY BE ACCESSED BY ME, I FEEL
SAVE WHILE MAKING USE OF THE ATM AT ANYTIME
OF THE DAY

Model
1

Table 3: Coefficients

The B coefficient shows a positive relationship between security and privacy and
the cost involved in the use of ATM. The table shows which of the variables included in
the model contributed to the prediction of the
dependent variable; therefore beta values are
used for the comparison. In this table, the largest beta coefficient is 0.221 which shows that
the location of the ATM is secure for transaction. This means that the location of the banks
ATM will determine the security of customers when using the machine. This is because it
makes the strongest unique contribution to explaining the dependent variable (cost involved
in the use of the ATM).
Decision: based on the analysis above
for which all calculated values are above the
critical values, the null hypothesis (H0) is
therefore rejected while the alternative hypothesis (H1) is accepted; which states that security and privacy affects cost involved in the
use of ATM.
Hypothesis 2
H0: Efficiency of operation does not
have a significant impact on effectiveness of
service delivery.
H1: Efficiency of operation has a significant impact on the effectiveness of service delivery.
Objective: the standard multiple regression was used to generate results that will indicate how well the set of variables representing
efficiency of operation and its impact on the
effectiveness of service delivery.

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Table 4: Model Summary


Model Summary
Model
1

R
.471a

R Square
.222

Adjusted
R Square
.206

Std. Error of
the Estimate
3.494

a. Predictors: (Constant), THE EFFECIENCY OF THE


ATM IS A DETERMINANT OF CUSTOMER
SATISFACTION, THE ATM FUNCTIONS PERFECTLY,
THE ATM OFTEN BREAKDOWN, THE
USER-FRIENDLINESS OF THE ATM AS AN EFFECT
ON YOUR PERCEPTION OF SERVICE QUALITY



The model summary. It shows how
much of the variance in the dependent variable
(efficiency of operation) is explained by the
model (the efficiency of the ATM is a determinant of customer satisfaction, the ATM functions perfectly, the ATM often breakdown,
the user-friendliness of the ATM as an effect
on your perception of service quality). In this
case the R square value is 0.222 expressed in
a percentage; this explains 22.2% of the variance in the efficiency of operation.
Table 5: ANOVA
ANOVAb
Model
1

Regression
Residual
Total

Sum of
Squares
677.451
2380.369
3057.820

df
4
195
199

Mean Square
169.363
12.207

F
13.874

Sig.
.000a

a. Predictors: (Constant), THE EFFECIENCY OF THE ATM IS A DETERMINANT OF


CUSTOMER SATISFACTION, THE ATM FUNCTIONS PERFECTLY, THE ATM
OFTEN BREAKDOWN, THE USER-FRIENDLINESS OF THE ATM AS AN EFFECT
ON YOUR PERCEPTION OF SERVICE QUALITY

lationship between effective service delivery


and efficiency of operation. The table shows
which of the variables included in the model
contributed to the prediction of the dependent
variable; therefore beta values are used for the
comparison. In this table, the largest beta coefficient is 0.392 which shows that the ATM
functions perfectly. This means that the ATM
functions at a level that satisfies the customers.
This is because it makes the strongest unique
contribution to explaining the dependent variable (effective service delivery).
Decision: based on the analysis above
for which all calculated values are above the
critical values, the null hypothesis (H0) is
therefore rejected while the alternative hypothesis (H1) is accepted; Efficiency of operation has a significant impact on the effectiveness of service delivery.

Hypothesis 3
H0: There is no relationship between
speed of operation and reliability of service
provided.
H1: There is a relationship between
speed of operation and reliability of service
provided.

Table 7: Correlation

b. Dependent Variable: EFFECTIVE SERVICE DELIVERY

Dependent Variable; effective service


delivery
Since F cal (13.874) > (1.97) at 0.000
level of significance, therefore we accept our
alternative hypothesis H1 and reject the null
hypothesis H0. This implies that efficiency of
operation has a significant impact on the effectiveness of service delivery.
Table 6: Coefficients
Coefficientsa

Model
1

(Constant)
THE
USER-FRIENDLINESS
OF THE ATM AS AN
EFFECT ON YOUR
PERCEPTION OF
SERVICE QUALITY
THE ATM OFTEN
BREAKDOWN
THE ATM FUNCTIONS
PERFECTLY
THE EFFECIENCY OF
THE ATM IS A
DETERMINANT OF
CUSTOMER
SATISFACTION

Unstandardized
Coefficients
B
Std. Error
8.972
1.911

Standardized
Coefficients
Beta

.467

.317

.102

t
4.695

Sig.
.000

1.474

.142

-.231

.274

-.055

-.842

.401

1.235

.210

.392

5.883

.000

.435

.280

.104

1.556

.121

a. Dependent Variable: EFFECTIVE SERVICE DELIVERY

The B coefficient shows a positive re-

Correlations

SPEED OF OPERATION Pearson Correlation


Sig. (2-tailed)
N
RELIABILITY
Pearson Correlation
Sig. (2-tailed)
N

SPEED OF
OPERATION RELIABILITY
1
.178*
.011
200
200
.178*
1
.011
200
200

*. Correlation is significant at the 0.05 level (2-tailed).

The correlation r = 0.178 means that


3.17% shared variance between reliability and
speed of operation. This means that reliability
helps to explain 3.17% of variance in the respondents scores.
Interpretation: the significant relationship between reliability and speed of operation
was investigated using the Pearsons correlation coefficient. There is a positive relationship between the two variables (r = 0.178, n =
200), with significant level of reliability being
associated with the speed of operation.
Decision: the correlation (r = 0.178*),

www.ijsrise.com

65

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

between reliability and speed of operation is


significant at 0.05 level, thus we reject null
hypothesis (H0) and accept alternative hypothesis (H1). This implies that there is a significant relationship between reliability and speed
of operation.
Discussion of result: from the above
hypothesis tested, it is evident that a positive
and significant relationship exists between the
two variables; therefore servicing the ATM often is advised to be adopted in order to make
the service to be provided on time and faster.
Hypothesis 4
H0: There is no relationship between
convenience and the accessibility of the ATM.
H1: There is a relationship between convenience and the accessibility of the ATM.

Table 8: Correlation
Correlations

CONVENIENCE

Pearson Correlation
Sig. (2-tailed)
N
ACCESSIBILITY Pearson Correlation
Sig. (2-tailed)
N

CONVENI
ENCE
1

ACCESSI
BILITY
.282**
.000
200
200
.282**
1
.000
200
200

**. Correlation is significant at the 0.01 level (2-tailed).

The correlation r = 0.282 means


that 7.95% shared variance between accessibility and convenience. This means
that accessibility helps to explain 7.955
of variance in the respondents score.
Interpretation: the significant relationship between accessibility and convenience
was investigated using Pearsons correlation coefficient. There is a positive correlation between the two variables (r = 0.282,
n = 200), with significant level of accessibility being associated with convenience.
Decision: the correlation (r = 0.282), between accessibility and convenience is highly
significant at 0.01 level, thus we reject null hypothesis (H0) and accept the alternative hypothesis (H1). This implies that there is a relationship between convenience and accessibility.

66

4.3. Discussion of Results


The result of the above tested hypothesis shows that there is a positive relationship
between accessibility and convenience, therefore creating accessible point of making use of
the ATM will make transaction convenient for
the customers.
5. RECOMMENDATION
Based on the findings of this research
work, the following recommendation has been
drawn up to help enhance service quality of
automated teller machines (ATM).
1. To reduce the customers concerns
about perceived risk because of security and privacy concerns, the
bank should improve the quality of
interaction with the customers to alleviate these apprehensions with a
view to improve ATM service quality (Merrilees, 2002).
2. To further improve the service quality, it is recommended that the ATM
service should be able to provide
enhanced interactivity, diversified
offerings, and facilitate customers to
participate in improving the service
encounter with ATM and make it a
memorable and pleasant experience.
3. The banks should focus not only on
the satisfaction of ATM users, but
also aim at delighting them to ensure
their retention.
4. It is evident that convenience, efficient operation, security and privacy, reliability and responsiveness
are not the only characteristics that
influence customers satisfaction.
The other factors that contribute
to customer satisfaction include
trust, value, and image of the bank,
(Ranaweera and Prabhu, 2003).
Bank management should monitor the environment and identify
the trends through marketing intelligence. They need to constantly
up-date and differentiate their ATM
service quality dimensions to ensure

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

continuous satisfaction and retention of customers, and optimize their


limited resources.
6.

CONCLUSION AND
IMPLICATION

POLICY

The rapid increase in number of automated delivery channels and customers preference to use ATM because of multifaceted
attributes are placing pressure on banks to
respond aggressively to meet the customers
needs. The study provides necessary input to
the bank management to increase customers
satisfaction through improving ATM service
quality. The focus should not be on ATM
service quality dimensions only. This aspect
should be augmented and integrated with other aspects of the service quality of banks for
satisfaction of customers.
The rapid diffusion of ICT in Nigerian
banking sector provides a platform to use innovative technologies to enhance operational
efficiency and quality of service to attain and
retain customers. The rapid growth in use of
ATMs in Nigeria offers opportunities to banks
to use customers passion for this innovative
service for strategic advantage. The banks
should proactively monitor customers preferences with regard to use of this delivery channel for effective response. Bank should also
focus on important aspects of security and privacy as well as efficient operation of ATMs. In
conclusion the banks should also augment and
diversify their offerings through ATM and use
this medium to build a strong and sustained
relationship with customers.
7. SUGGESTION FOR FURTHER
STUDIES
This research concentrated on determinants of ATM service quality and its impact
on consumer loyalty. Notwithstanding, the
exploration did not examine the relationship
between consumer loyalty and customer retention. Additional research may well explore
the relationship between these two constructs.
The formation of satisfaction process takes

place overtime (Andreasen, 1977). The conclusions of the study relates to a specific time
in present. Additional study should be done on
longitudinal basis to address the interactive
and technological dimensions of ATM service
quality that affect the dissatisfaction level of
customers.
Age has a critical impact on the example
of utilization of innovation based administrations. By and large the young want to utilize
imaginative and innovation based conveyance
channel like ATM that offer different advantages and self-governance of executing transactions (Wan et al., 2005). The old age people
are generally shy of use of ATM because of
perceived risk of failure, complexity, security,
and lack of personalized service (Moutinho,
1992). Future research should explore the association between age and attitude and determine its effects on the ATM service quality
and customers satisfaction.
The price is an essential aspect that affects the customers perception of ATM service quality (Surjadjaja et al. 2003; Iqbal et al.
2003). The fee charge identifies with the impression of non-competitiveness and injustice
and may lead to change in service provider
banks (Colgate and Hedge, 2001). The prevailing economic conditions in Pakistan have
made the people more prices sensitive. This
aspect needs further exploration as essential
dimension affecting ATM service quality and
customers satisfaction.
Conflict of interests
Author declare no conflict of interest.
REFERENCES
ANDREASEN, A. R. (1977). A Taxonomy of Consumer Satisfaction/Dissatisfaction Measures,
Journal of Consumer Affairs, 11(2), pp. 1124.
Churchill, G. A. and Surprenant, C. (1982). An Investigation into the Determinants of Customer Satisfaction, Journal of Marketing Research, 19(4).
Colgate, M. and Hedge, R. (2001). An investigation
into the switching process in retail banking services, International Journal of Bank Marketing, 19(5), pp. 201212.
Donnell, Y. K. (2003). New System of banking. 24-25.
Available from iist.org/Vol6//SITv6, P373-393,
olatokun63.pdf.
Fasan, O. (2007). The Adoption of ATM in Nigerian

www.ijsrise.com

67

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.
Hillier, D. (2002). Money Transmission and the Payments Market. United Kingdom: Financial
World Publishing
Intermarc Consulting Limited (2007). Nigeria e-banking customer survey on cards, ATM and PoS.
Available at: http://www.thenationonlineng.
com/dynamicpage.asp?id=36290 (Accessed: 23
April 2015)
Ladda, V. and Sukhothai, T. (2007). The Impact of Service Quality and Consumer Decision Factors on
Brand Equity, International Business & Economics Research Journal, 6(3).
Merrilees, B. (2002). Interactivity Design as the Key to
Managing Customer Relations in E-Commerce,
Journal of Relationship Marketing, 1(3-4), pp.
111126.
Moutinho, L. (1992). Customer Satisfaction Measurement: Prolonged Satisfaction with ATMs, International Journal of Bank Marketing, 10(7), pp.
3037.
Oliver, R. L. (1993). A conceptual model of service
quality and service satisfaction: Compatible
goals, different concepts, Advances in Service
Marketing and Management, 2pp. 6585.
Omankhanlen, O. (2009). ATM fraud rises: Nigerians
groan in Nigeria
Parasuraman, A., Zeithaml, V. A. and Berry, L. L.
(1994). Reassessment of Expectations as a
Comparison Standard in Measuring Service
Quality: Implications for Further Research,
Journal of Marketing, 58(1).
Preece, J., Benyon, D., Carey, T., Holland, S. and Rogers, Y. (1994). Human-Computer Interaction:
Concepts and Design. Reading, MA: AddisonWesley Educational Publishers
Ranaweera, C. and Prabhu, J. (2003). The influence of
satisfaction, trust and switching barriers on customer retention in a continuous purchasing setting, International Journal of Service Industry
Management, 14(4), pp. 374395.
Surjadjaja, H., Ghosh, S. and Antony, J. (2003). Determining and assessing the determinants of eservice operations, Managing Service Quality: An
International Journal, 13(1), pp. 3953.
Tse, D. K. and Wilton, P. C. (1988). Models of Consumer Satisfaction Formation: An Extension,
Journal of Marketing Research, 25(2).
Ugwu, E. (2008). CBN, banks to tackle ATMs hitches.
Available at: http://www.guardiannewsngr.com
(Accessed: 24 April 2015)
Wan, W. W. N., Luk, C. and Chow, C. W. C. (2005).
Customers adoption of banking channels in
Hong Kong, International Journal of Bank
Marketing, 23(3), pp. 255272.

68

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

THE IMPACT OF MOBILE MARKETING IN CONSUMER


MARKET: A CASE STUDY OF TURKEY
Dr. John Akpesiri Olotewo, Department of Business Management
Girne American University
Girne-Mersin 10-Turkey, North Cyprus
E-mail: olotewo@yahoo.com
Dr. Samson Oluwaseun Fadiya, Department of Management Information system
Girne American University
Girne-Mersin 10-Turkey, North Cyprus
E-mail: greaterachiever@yahoo.com
Received: April, 29.2015.
Accepted: June, 29.2015.
Case Study

Abstract. Mobile marketing has gained immense


popularity in the contemporary business world because
of its convenience in sending promotional messages to
individual customers. In Turkey, this method of advertising has enhanced effective dissemination of information
and is thus highly regarded; both by the business community and the consumers. Mobile marketing is well
known for its ability to overcome barriers of place and
time that are often associated with traditional advertising
methods. Using mobile marketing, companies are in a
position to reach out to customers from wherever they
are due to the portable nature of the mobile phone. This
study seeks to explore the impact of mobile marketing
in Turkeys consumer market. It aims at establishing
whether mobile marketing is an effective marketing tool
in Turkeys consumer market, why there is an increasing
popularity of mobile marketing and whether there is a
general acceptability of mobile marketing in Turkey.
The study begins by exploring the concept of
mobile marketing and its effectiveness as a marketing
media. The nature and potential of mobile marketing are
discussed and so are the ethical issues affecting mobile
marketing. Given the level of popularity and convenience
that mobile marketing exudes, it can be established that
mobile marketing is an effective form of advertising in
the Turkish consumer market and that companies could
tap this potential to enhance profitability.
Olotewo Akpesiri John.

1. INTRODUCTION

Mobile marketing in Turkeys consumer


market has provided an efficient communication and marketing avenue that enhances the
dissemination of information in the consumer market; thereby enabling more informed
decision-making. This follows the increasing
momentum in the use of mobile marketing
in the contemporary business world. Mobile
marketing is now one of the most preferred
modes of advertisement, not only because of
its convenience but also because of the ability to deliver promotional messages regardless
of the customers geographical location. In essence, mobile marketing eliminates the place
constraint and time constraints which often
challenge other forms of advertisement in that
customers can get promotional messages any
time of the day through mobile marketing.
Mobile marketing is also preferred because
companies are assured that the messages
reach the intended audience through targeted
marketing. Mobile marketing has affected
the consumer market in a significant manner;
mostly concerning the acceptability of mobile
Keywords: Consumer, Ethics, Impact Market, marketing among consumers. This means that
Mobile
apart from allowing customers to get adequate
information on company products thus enhancing decision making, ethical issues have
also emanated from mobile marketing. ExCorresponding Author
amples include privacy issues, the need for
Dr. John Akpesiri Olotewo, Department of Business
companies to seek permission and acceptance
Management, Girne American University
before sending, marketing to children and the
Girne-Mersin 10-Turkey, North Cyprus
frequency of advertising. This paper seeks to
E-mail: olotewo@yahoo.com
www.ijsrise.com

69

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

establish the impact of mobile marketing in


the consumer market; with Turkey as the case
study. It will examine the perceptions of consumers on mobile marketing, general acceptability, and the kind of impact that this form of
marketing has had on them.
2. HYPOTHESIS

Mobile marketing in the Turkish
consumer market will experience increased
growth as the popularity of mobile marketing
increases in the market.
3. RESEARCH QUESTIONS
Is mobile marketing an effective promotional tool in the Turkish consumer market?
What are the reasons behind the increasing popularity of mobile marketing?
How is the general acceptability of mobile marketing in the Turkish market
4. LITERATURE REVIEW
4.1. Mobile marketing: Definition
There is no definite definition of the
term mobile marketing. It can be defined as
a set of practices that enhances engagement
and communication of organizations with
their audience in a manner that is interactive
and relevant through the use of mobile devices or networks. It entails the use of wireless
media that reaches out to the customers in a
bid to provide them with personalized information and that is determinant of the location and time the customer will find relevant.
This enhances the promotion ideas, services
and goods so as to bring forth the value for
the esteemed shareholders (Michael & Salter,
2006). Mobile marketing and in-game advertisements have been on the rise in the recent
years. Companies have taken advantage of the
increasing growth of mobile phone ownership
and technology to send content to consumers
using SMS (Short Message Services), MMS
(Multimedia Services), Bluetooth and infrared
(Pelau & Zegreanu, 2010). Internet enabled
phones also ensure that individuals can access
different social networks, such that companies
take this opportunity to advertise themselves.
70

In-game advertising is also growing in popularity, where companies sponsor the development of particular games and then put up
advertisements in between the levels (Cadin,
2006).
4.2. Rationale for mobile advertising
The fact that different homesteads have
mobile phones forms a basis to the argument
that mobile advertising is efficient in a companys advertisement of its products. The current wave of technological growth has contracted the world to global village and there
is increased connectivity between individuals
and companies thus making mobile marketing
a viable endeavor. The advancement in mobile
technology further makes the use of mobile
phones for advertising highly viable in the
contemporary world.
Before giving your customers the option
of mobile advertising, there are several questions you need to factor in:
Are your prospective customers in
possession of mobile phones or devices?
How can you create a cost effective
wireless tether so as to keep the
customers in a continuous loop of
communication?
Will the messages that you will send
open up new opportunities in business?
In a study conducted by Forester, the
findings were that by year 2005, sixty seen
per cent of the American citizens had at least
each a mobile phone in their homes (Business Communications Review, 2005). Most
of the homes had up to four phones. By the
year 2009 the mobile contracts had risen up to
4.6 billion worldwide, justifying the increase
of mobile phones (Pelau & Zegreanu, 2010).
the observance of this trend made the marketers to maximize on the usage of the phones.
Use of mobile phones enhanced communication to the potential and existing customers.
The mobile phones are highly flexible and
one can convey messages any time and any
place. Through advanced technology, marketers can send even photos and videos of their
products to the consumers. At one fell swoop,

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

the marketers get immediate answers or views


on their products from the consumers over the
social networks. This helps them plan on how
to come up with ideas that will facilitate consumer satisfaction (Michael & Salter, 2006).
4.3. Effectiveness of mobile marketing

Mobile marketing has been an effective


activity where the companies make significant sales to the already acquired customers.
Through this marketing, there is a possibility
of retaining customers due to the communication process that is done between the company representatives and individual customers.
There is an assurance that, the sent messages
will definitely get to their intended destinations
or individuals. Mobile marketing is highly innovative and a relevant tool in direct marketing in that an assumption that customers have
and must use their mobile phones (Anckar &
DIncau, 2002).
4.4. Pros and cons of mobile marketing
Through mobile marketing the businessman is in a position to meet other consumers
through the established relationship with the
initial consumers. This fosters customer loyalty as well as building customer experience.
There is also the freedom of the customers or
consumers in contacting the company directly.
The wireless marketing has come in to help
the company realize maximum profits because
the MMS and SMS services are not really expensive and saves money than the television
and print adverts (Michael & Salter, 2006).
There are various advantages and disadvantages that are found when using mobile
marketing programs. The level of acceptance
in mobile marketing is quite low but to the
few individuals who complied, the method is
highly effective. The use of mobile phones
is the best for it enhances privacy and ensuring that there is personal communication with
the concerned individual. It is a quite effective in that consumers are reached wherever
they are, because of the mobile phones. The
growth of technology has enhanced contracted
world making the world a global village. One
can access e mails from anywhere through the
internet enabled phones or network deices.

The potential consumers are reached through


the use of phones (Leek & Christodoulides,
2009).
Mobile marketing makes the process of
advertising very cheap and convenient. The
mobile ownership has really gone up thus encouraging the use of mobile marketing to be
highly effective and to fetch more consumers. The one on one communication with the
consumer places the application of the mobile
marketing program to serve its function in a
direct manner. The marketer is able to contact
the consumer any time and also make connections with the customers friends who can also
qualify to become the consumers too. In relation to the cost of marketing, mobile marketing is cheaper by far when compared to other
Medias like television and prints like newspapers and magazines. There is loyalty of consumers as well of that of companies. One is
able to give promotions and award to the consumers because of the rapport created between
the two.
The mobile marketing programs are
also bearing some disadvantages. For example, there are various attitudes that come with
the way the application of mobile marketing
is done. Most of the consumers have received
spam messages and confuse them with genuine ones. This makes them decline offers made
in their databases. This decreases the number
of consumer enrolment. The phones are not
in a position to detect the difference between
spam and genuine communication (McCarthy,
2005).
The intrusion done by the mobile marketing through sending of voluminous messages to the consumers who are intended or
to wrong ones makes they have a negative
attitude towards the brand and even end up
discouraging would-be consumers. When the
fears of consumers in the threats posed to them
in location, identity, information and choices,
the dislike of mobile marketing affects the
sales of a companys brand. Despite the fact
that consumers have phones, those phones, the
phones are not modified to received some sophisticated data like videos and photos. This
creates illusory marketing achievements that
bring zero or negligible results.

www.ijsrise.com

71

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

4.5. The potential of mobile marketing and to remove in their adverts. The positive attivalue creation
tude also comes in handy as the marketer will
be guided or be in a position to measure his
Mobile marketing promises to elevate work and estimated outcomes.
business communication through increased
The attitude factor is in most cases afconvenience and more targeted marketing and fected by the threats to the consumers privacy
can thus be considered a potentially valuable in: identity, information, choice and location
form of marketing. Mobile marketing is well annoying (Sultan & Rohm, 2008; Barutu,
known for its ability to overcome barriers of 2007). The customers are in perpetual fear
distance and time in that users can receive because they feel that when they expose their
promotional messages from wherever they are information, it is going to be accessed by the
and that they may receive the messages at any hackers. A study conducted in USA for ages
time as opposed to traditional methods where between 16 and 30 showed that just a51 %
a person for example would have to watch TV were satisfied by the mobile marketing while
or read a newspaper in order to know about 42% percent were not satisfied at all. The
a particular product (McCarthy, 2005). Mo- other cause of negative attitude is the volbile marketing therefore has potential due to umes of messages that are received on a daily
increased convenience and ease in use which basis. They are intrusive into people lies and
makes it highly preferred by marketers. The thus cause people to form a negative attitude
fact that mobile marketing can be used to con- in mobile marketing (Sultan & Rohm, 2008;
duct targeted marketing through concentrating Barutu, 2007).
on one region of the market denotes that moMost of the adults are no longer interbile marketing is highly useful where market ested with the mobile marketing messages,
segmentation has been done. Marketing also this is because the impromptu messages conpromises to reach a considerable number of tain content that is not pleasing to the adults
people due to the increased popularity of mo- or the brands being advertised are not in line
bile phones and mobile internet thus indicat- with what the adults want. On the contrary, the
ing that mobile marketing has great potential young generation is much welcoming the mes(Pelau & Zegreanu, 2010). Mobile marketing sages. This is an indication that the adults who
is expected to create value for companies that are one in position of purchasing the brands
use it to advertise in that it will ensure that the have a negative attitude towards the channels
messages reach the targeted markets at the used to advertise the brands (Barutu, 2007).
most cost effective manner. Notably, mobile
The attitude is determined by the fact
marketing is cheaper than traditional forms of that, a mobile phone ca not detects the differadvertisement because marketers mostly use ence between spam and genuine communiSMS and MMS that can be sent as broadcast cation. This ends up irritating customers and
messages. Accordingly, the marketers are able forces them want to refrain from the mobile
to reach a considerable number of people at a marketing messages. If the customer is interlow cost.
rupted in his/her daily routine or work, he develops hatred towards the brand. He would to
4.6. Customer attitudes towards mobile have a specific time to receive the messages
marketing (Acceptance)
or frequency to receive the messages in the
agreed time.
The fact that the customers have varying
The consumer attitudes differ in so
attitudes when it comes to accepting mobile many factors. This is influenced by so many
marketing affects the viability of mobile mar- factors: age, level of income or education.
keting. This affects the role of permission and Older people as opposed to younger generaacceptance in mobile marketing. The negative tion are not that welcoming to mobile marattitudes portrayed by the customers are not to keting. The younger people are appreciative
be neglected for they help the company repre- to the mobile marketing messages although
sentatives to know what to improve and what they do not have a higher purchasing power.
72

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

The marketers are therefore supposed to put


in to consideration to the classification according to demographics in their planning and
implementation of the mobile marketing. The
consumers are supposed to be advised about
the policies in their privacy rights (Sultan &
Rohm, 2008; Barutu, 2007).
The mobile marketing message should
be able to entertain the consumer. In this way
there is the possibility of changing the attitude
of the consumer. The content should at most
be visual, or else be sensational to the consumer. It should also be able to convey it message: it should be aesthetic as well as functional in its purpose. To change the attitude
of the consumer, you need to be offering time
saying applications to busy businessmen. By
doing this, mobile marketing will obtain a lot
from different quarters, more so those that are
having a lot of money but dont have time to
go checking prices (Amen, 2010).
4.7. The role of permission and acceptance
in mobile marketing
The role of permission and acceptance
applies in the case where the marketers just
send messages to the consumers without the
latter are consent. This behavior leads to annoyance and at times dislike towards that company. This portrays a poor marketing strategy
where unintended messages get to customers
who never subscribed for them. Widespread
spamming and frustration in the user could
easily diminish the potential in the mobile
marketing (Haig, 2002).This brings the question of whether marketers should seek consent
of the consumers before sending them messages. In their researches, Barnes and Scornovacca (2004) arguethat the consumers would
be glad if they were allowed to make decision
on when to receive the messages fromthe
marketers, thus appreciating mobile marketing more.
Ensuring that the customers are given a
chance to make choices on when to be contacted gives the marketers an opportunity to
conduct mobile marketing in a more efficient
manner than forcing themselves into the customers. Conducting the process in the right
manner prevents the customers from wearing

out thus increasing the efficiency in the mobile


marketing (Barwise & Strong, 2002).
In reference to Barnes and Scornovacca
(2004) model, permission and acceptance,
there were factor to be considered in mobile
marketing: WSP, personalization and content, frequency, time, brand. The participants
agreed that, they will be receiving a limited
number of messages per day at a scheduled
time and with the only company and brands
they have subscribed. There was also wireless
service provider control. This enhanced filtering of the messages and the senders. The permission was also discussed in that, consumers
should have an opt in and out at any stage.
This shows that the consumer has a choice.
4.8. Ethical issues in mobile marketing
One major ethical issue in mobile marketing emanates from hacking the computer
systems or the internet systems. The marketers
are known to purchase information retrieved
from private individuals database accessed
without the owners consent and retrieve information that they expose to the children and
others who are vulnerable to internet advertisement. This act of violating privacy terms
ha contributed greatly in to having the customers shy away from accepting to be sent messages through mobile marketing.
The hacking of individual or customer
privacy has been facilitated by the legal system that is compromising with the hackers or
not asserting the right pressure on the wrong
doers. There are no key regulations on the
customers information hence the intrusion of
peoples privacy Gurdu and Ranchhod (2009).
A general study conducted by Amen (2010)
has confirmed the customer fears in that they
dont have any confidence in mobile marketing due to the security concerns. Some texts
that are sent to the customers cannot be replied
back for they are automated. They do not have
an option to reply and suggest what one wants.
Many of the customers, whose privacy rights
are messed with, do not really know what to
uphold in privacy rights. They are not exposed
when it comes to the legislation of their rights.
There are some threats that are associated with
mobile marketing: identity, location, informa-

www.ijsrise.com

73

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

tion and choices.


Threat to identity
Due the usage of open directory, the
marketers send advertisement with consumers numbers to other people. This exposes
their privacy thus making his/her identity exposed. The one in charge is to larger extent in
position to know the other content of the consumer and this can be really dangerous for the
customers.
Threat to location
With the use of a mobile phone that has
an enabled Geographical Positioning System
(GPS), the user can be traced easily. The one
in charge of sending the messages can easily
target the phone receiving the message as well
as the location of the owner. This robs the recipient of the message real privacy.
Threat to information
The users information is as well at risk
because, if the databases are exposed, his/her
whereabouts are exposed as well. This shows
that the information is not guarded as it is supposed to. When one sends opt- out message, it
confirms the existence of that number and the
database. This poses the threat of hackers and
can interfere with vital information. When you
also opt- out in this case, you confirm to the
other party that the database is active.
Threat to choices
The marketers do not give the consumer
freedom to make a choice. They push messages to the consumers as if they are forcing consumers to accept a new product.The random
advertisements that are for new brands are
pushed in the users phones; this is a threat to
the choice and also to the taste of the consumer. If the users opt-out, the message becomes a
confirmation that his number is active. In this
case the user feels that, mobile marketing is a
disturbance to his privacy. Users are at times
turning away to other brands for they feel that
mobile marketing is highly intrusive.

target for mobile marketers. Mobile marketing


use in the country is characterized by innovative strategies and as noted by eflek (2010),
Turkeys mobile marketing advancement is
set to cause ripples in a market where this new
trend is becoming increasingly popular. According to eflek (2010), 33 million ads are
viewed every month via AdMobs network
only; signifying the massive rate at which mobile marketing is picking up in Turkey.
The success of mobile marketing is enhanced by the growing number of populace
who possess mobile phones within the country
and the enthusiasm of youths toward mobile
marketing. As at the end of 2004, 50 percent
of the countrys population (34,707,549) had
adopted mobile phones and by 2007, there
were 58,055,434 mobile phone users in the
country (Turkish Statistical Institute, 2007;
Telecommunication Authority, 2007). Hurriyet Daily News notes that the mobile phone
market grew by 12 percent in the first quarter
of 2010 in terms of units sold. The youth in
Turkey form the highest percentage of mobile
marketing users and this generation is considered a vibrant market for companies using this
mode of advertising (eflek, 2010). The young
generation has readily adapted to this medium
Turkcells TonlaKazan service is among
the most successful mobile advertising campaign in Turkey. In this service, Turkcell attempts to cash in on ringtones through the use
of the WinBack Tone, which allows subscribers to select ad-funded content to serve as
their Ringback Tone. The users are then given
an opportunity to win prizes on the basis of
how many people listen to their tones eflek
(2010). The campaign is highly popular with
the youth who download their favorite music to use on their phones. The fact that the
youth who make up the largest mobile market
are mostly involved in this campaign makes it
even more successful.
Customers in Turkey have embraced
4.9. Mobile marketing in Turkeys consum- the idea of mobile marketing and a significant
er market
number of consumers attest to the fact mobile
marketing is an effective mode of advertising.
The mobile communication market in In a study conducted by Barutu (2007), there
Turkey has increased significantly since 1994, was a generally positive feedback concerning
both in terms of subscribers and GSM opera- mobile marketing, with a majority of
tors thus making the country a viable market respondents indicating that they would prefer
74

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

mobile marketing to receive advertisements


and to shop. On the contrary however,
respondents noted that mobile shopping could
pose security problems. The respondents
were asked to rate the survey question on a
five-point Likert scale where 1 represented
strongly agree while 5 represented strongly
agree. In the survey questions, a mean of 4.20
was recorded for the question on whether the
respondents found receiving advertisements
through mobile phones positive. On the
question on whether they found SMS and
MMS messages used for advertising useful,
a mean of 4.24 was recorded. This is an
indication that the level of agreement with this
survey question is quite high, given that the
maximum score is 5.
5. METHODOLOGY
The methodology section forms an
important part of the research because it determines whether the results obtained in the
study will effectively meet the needs aims and
objectives of the study. The study will utilize
primary and secondary data and will be qualitative in nature. Primary data was obtained
through the use of mail questionnaires sent out
to a random sample of 100 Turkish customers. Secondary data was obtained from printed
sources such as books and journals. Secondary
data was useful in setting the background for
the study and was thus considered vital.
Research Sample
Random email addresses were collected
from the Facebook social networking site and
100 mail questionnaires were sent along with
an introductory letter. The sample was selected from young and middle aged people up to
a maximum of 45 years from Turkey. Respondents were asked to mail back their responses using the sending email. In total 100 mail
questionnaires were sent out. Out of the 100
mails sent, 67 questionnaires were returned,
representing 67% of the total number of questionnaires. Further, 9 questionnaires were
rejected because they were incomplete. This
means that 58% of the questionnaires sent out
were used for the research as presented below:

Data collection
The results of the research indicated
that there mobile users in Turkey generally
have a positive outlook on mobile marketing and its potential in enhancing advertisement. 57% of the respondents noted that mobile marketing was bound to be effective in
advertising a company and that it could be
used as an alternative to traditional media.
As a matter of fact, they appreciated the mobile marketing messages sent to them because
they helped them to get adequate information
about the existing trends in the market. 49%
of them preferred to get promotional messages on their phones so that they would know
where to shop and where to find discounts.
Asked whether they would recommend
businesses to use mobile marketing in order
to reach their clients, 71% of the respondents
considered mobile marketing an effective tool
for advertising. The various reasons given
for their responses were that mobile marketing was a method that could reach the clients
wherever they are; mobile marketing is less
costly; mobile marketing messages are easy to
understand because they are simple and brief;
and that mobile marketing reaches a significant number of people among other factors.
In this regard, businesses could use mobile
marketing as their means of advertising the
companys products as opposed to placing advertisements in other traditional media such
as newspapers, radio and television; or as a
complimentary form of marketing within the
company.
The most common views on mobile
marketing were identified as follows. The
percentage indicates the proportion of respondents who mentioned the views presented.

www.ijsrise.com

75

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

7. DISCUSSION

Despite the high prevalence of mobile


phones among the respondents however, there
was a notable mistrust about mobile advertising. A significant number of respondents indicated that they did not appreciate the idea of
getting advertising messages on their phones
as they considered them a nuisance (19%). Out
of the 58 respondents whose questionnaires
were used for the research, 31 respondents expressed fears of privacy in regard to mobile
advertising; noting that there was a possibility
that their privacy would be compromised as a
result of allowing companies to use their numbers for mobile advertising. They feared that
the companies would misuse their information
for purposes that they would not approve of
and therefore felt that they were powerless as
far as their own privacy was concerned. Notably, the issue of the high frequency at which
companies send promotional messages was
a great cause of concern. 43% of the respondents indicated that they were not comfortable
with mobile marketing because companies often sent very many messages to the same user
every month. As a matter of fact, some expressed that there was a problem of duplicate
messages being received into their phones and
therefore they did not support the idea of mobile marketing.The views can be expressed in
a tabular form as follows:

76

The results of this study indicate that


mobile marketing is an effective form of advertising that not only enhances effective
communication between the company and
the consumers but which also ensures that the
information is disseminated in a convenient
manner. It has been established that with increased use of mobile phones, mobile marketing is bound to enhance advertising to a significant level. Most of the respondents found
the use of mobile marketing convenient in that
it informed them of the new trends in the market in good time and thus kept them up to date
with information. This insinuates that the popularity of mobile marketing is bound to rise as
consumers become increasingly aware of the
importance of mobile marketing. As noted by
eflek (2010), consumers love beneficial promotional messages and they are therefore likely to benefit from mobile marketing through
getting information on promotions and new
products in the market. This way, they are able
to make their purchase decisions more easily.
There are various advantages that have
been singled out in support of mobile marketing. To begin with, the use of mobile phones
across the world has increased vehemently
and most people now have at least one or
more mobile phones. This makes it effective
in reaching out to a large number of people.
Secondly, mobile devices assure that the message reaches the customer because the mobile
phone is highly personalized. This insinuates
that despite the location of the customer, he
or she must at one point look at his mobile
phone and see the advertisement. This is unlike in traditional media such as TV and radio
where the message only reaches those who
have switched on their devices at any particular time. Thirdly, the mobile nature of these
phones makes them effective in that there are
no geographical barriers as far as communication is concerned. This proposition is emphasized by King (2008) and Michael and Salter
(2006) who note that mobile phones transcend
the barriers caused by distance and go on to
provide the much desired publicity that the
company deserves without caring the location that the customer is in at any particular

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

time. Accordingly, marketing may be done at


any time of the day in preference to traditional
media which requires companies to advertise
during peak hours such as evening and weekends so that potential customers are already at
home. Fourthly and most importantly, the development of internet enabled phones through
mobile technology has increased the potential
of mobile phones in enhancing marketing.
This means that companies have the liberty to
advertise on websites and be assured that consumers can still access the advertisement on
phones thus easing their advertisement costs.
Companies can therefore use websites, social
sites and blogs to reach their customers. Internet enabled phones also ensure that consumers
have more access to important information to
assist in their decision making processes.
It is notable that while the use of mobile marketing promotes business, it is not
entirely popular among all users because they
feel that their privacy is violated. As indicted
in the study, customers feel that companies at
times exaggerate the number of messages sent
and that their private information may not be
safe in their hands. This is a factor that is expected to impact on the use of mobile marketing to a significant level and could thus reduce
its effectiveness. According to MMA (2009)
some companies are sharing or even selling
customer databases unscrupulously to other
companies thus raising the issue of privacy
for customers. It is a serious issue that may
cause customers to distrust the marketers thus
leading to ineffectiveness of the marketing
method. Mobile marketing elicits a significant
level of other ethical issues, mostly associated
with privacy and the reluctance of individuals
to be sent advertising messages (King, 2008).
Further, customers do not like the idea of being sent too many texts and are thus likely
to develop a delete on receipt kind of reaction whenever they get promotional messages
(Barwise & Strong, 2002). Another ethical issue that has arisen but which was not considered during the data collection stage is marketing to children; which is been considered
harmful due to the possibility of sending out
material that is not appropriate for their age
(Molina, 2007). This is exemplified by the fact
that children are now obtaining mobile phones

at a very young age and are therefore prone


to targeted promotions. Given that children
have little decision making power, the burden
of purchasing the advertised products may fall
on the parents as they try to meet their childrens demands. Further, children are likely to
develop immoral behavior such as stealing in
order to access credit to participate in mobile
competitions put up by advertising companies
or to purchase the advertised products (Smith,
2008).

8. CONCLUSION
This paper establishes that mobile marketing in the Turkish consumer market has a
huge potential for growth and this trend may
continue unless the marketers do not adhere
to the ethical rules of mobile marketing. It is
established that the ethics of mobile marketing
to a significant level impact on the ability of
the mobile marketing to perform the expected
functions. This is mostly associated with the
privacy of customer information, issues with
frequent messaging and sending messages that
are considered irrelevant to customers. The
issue of marketing to children is also taken
very seriously as far as mobile marketing is
concerned. In Turkey, mobile marketing has
had the impact of enhancing communication
between the customers and companies such
that customers can easily present their concerns. Mobile marketing has played the role of
keeping customers more informed about new
trends in the market thus making the purchasing process easier. It is notable that as mobile
technology advances, the use of internet marketing is no longer confined to computer use
and that individuals can access advertisements
placed on the internet through browsing websites and social networking sites. This in turn
insinuates that the potential for mobile marketing has grown significantly. In conclusion,
this paper establishes that the place of mobile
marketing in the Turkish consumer market
is growing tremendously and that businesses
could tap this potential to enhance profitability.

www.ijsrise.com

77

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Conflict of interests
Authors declare no conflict of interest.

REFERENCES

Turkish Statistical Institute-Telecommunication (TurkStat). (2007). Statistics. Retrieved April 18, 2007
from http://www.turkstat.gov.tr/Start.do;jsessio
nid=1gTTNKJNWs2vT9Q7byXVW4yD2sTM
zQJGRpp2y2hynlKSlST1QmkY!2104946810

Amen, U. (2010). Consumer attitude towards mobile


advertising. International Journal of Contemporary Research in Business, 2(3), 75-105.
Anckar, B. & DIncau, D. (2002). Value creation in mobile commerce: findings from aconsumer survey.JITTA: Journal of Information Technology
Theory and Application, 4 (1), 43-65.
Barnes, S. J. & Scornovacca, E. (2004). Mobile marketing: the role of permission andAcceptance.International Journal of Mobile Communication,
2 (2), 128-139.
Barutu, S. (2007). Attitudes towards mobile marketing
tools: A study of Turkish consumers. Journal of
Targeting, Measurement and Analysis for Marketing, 16(1), 26-38.
Barwise, P. & Strong, C. (2002). Permission-based mobile advertising.Journal of Interactive Marketing,16 (1), 14-24.
Business Communications Review (2005), 35(6), 6-12
Gurdu, C. & Ranchhod, A. (2009). Consumer privacy
issues in mobile commerce: A comparative
study of British, French and Romanian consumers. Journal of Consumer Marketing, 26(7),
496-407.
Haig, M. (2002).Mobile Marketing: The Message Revolution. London: Kogan Page.
King, J. K. (2008). Direct marketing, mobile phones,
and consumer privacy: ensuring adequate disclosure and consent mechanisms for emerging
mobile advertising practices.Federal Communications Law Journal,60 (2), 239-334.
Leek, S. & Christodoulides, G. (2009). Next-generation mobile marketing: how young consumers
react to Bluetooth-enabled advertising. Journal
of Advertising Research, 49 (1), 44-53.
McCarthy, P. (2005).Towards a wireless world in marketing. New York: Lulu. Michael, A., Salter, B.
(2006).Mobile Marketing: Achieving Competitive Advantage through Wireless. Oxford:
Butterworth-Heinemann.
MMA (Mobile Marketing Association). (2009).Mobile
Advertising Overview, January, 2009.
New York, NY: Mobile Marketing Association.
Molina, M. M. (2007). Self-Regulation of mobile marketing aimed at children. An overview of the
Spanish case.Journal of Theoretical and Applied Electronic Commerce Research, 2(3), 8093.
Pelau, C. & Zegreanu, P. (2010). Mobile marketing
The marketing for the next generation. Management and Marketing,5(2), 101-116.
Seflek, M. (2010). Mobile phone advertising revolutionizes marketing. Retrieved May 10, 2011
from
http://www.todayszaman.com/news199491-105-mobile-phone-advertising-revolutionizes-marketing.html
Sultan, F. & Rohm, A. J. (2008). How to market to generation M (obile).MIT Sloan Management Review,49(4), 34-42.
Telecommunication Authority. (2007). Statistics. Retrieved October 26, 2007 from http://www.
tk.gov.tr/Yayin/istatistikler/istatistik/2007/
istatistik_2007_haziran_gsm.htm.
78

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

KNOWLEDGE-BASED AND ARTIFICIAL INTELLIGENCE


SYSTEM APPLICATION IN THE FUZZIFICATION AND
DE-FUZZIFICATION OF RISKS ASSOCIATED WITH
MARITIME DRILLING FACILITIES
Ezurike B.O, Ezurike O, Okoronkwo C.A, Osueke G.O, Igbokwe J.O
Department Of Mechanical Engineering, Federal University of Technology, P.M.B. 1526 Owerri, Imo State,
Nigeria. Department of Computer Science, Federal Polytechnic Nekede, Owerri, Imo State, Nigeria.
Email: ben4oke2000@yahoo.com
Received: April, 29.2015.
Accepted: June, 30.2015.
Articles

daily life. Furthermore, wherever risk exists,


the tendency to adequately mange it will be
found. However, on critical examination of the
maritime industry, one would see that formal
risk management has only become an integral
process in the past few decades. One of the
drivers for the recent sudden increased need to
manage risk is the rapid development of technology; as a result risk and its management
have turned to be wholly specialized subject.
When it comes to requiring numerical data,
these may be hard to trace or unreliable while
formulating a mathematical model may be difficult, costly, and even impossible. This means
that efforts to communicate an understanding
of the system and propose policies will have
to rely on natural language arguments in the
absence of formal models.
With the adequate assistance of risk
management two essential advantages will be
captured, more confidence can be given to the
estimated project costs and profits will be maximized (Baker et al., 1999). For the context of
this chapter, the available risk definitions from
business perspective will be revealed, and then
1. INTRODUCTION
the offered risk management practices will be
examined to depict the essential role of the
1.1. Risk Management Concept
identification and assessment steps in the risk
Every activity we carry out, involves management process. This paper however is
one form of risk or the other. Hence, risk is intended to provide an extensive literature resaid to be associated with every aspect of our view on how safety concept and system have
been used to develop several complex safety
Corresponding Author
management approaches to facilitate decision
Ezurike B.O, Department Of Mechanical Engineering,
making process. Current safety management
Federal University of Technology, P.M.B. 1526 Owerri,
systems and models are introduced, and their
Imo State, Nigeria.
processes are described and discussed in the
Email: ben4oke2000@yahoo.com
Abstract. So many Studies in artificial intelligence have been built upon the tools and techniques
of many different disciplines, including formal logic,
probability theory, decision theory, management science, linguistics and philosophy. However, the application of these disciplines in artificial intelligence
has necessitated the development of many enhancements and extensions. Among the most powerful of these are the methods of computational logic.
The design and installation of maritime drilling
facilities involve a very complicated process with attendant risks to people, environment, property or economic
assets. Failures of these drilling system equipment have
been studied and generally believed to be associated
with so many complications. Several other methods of
risk assessment especially in the maritime industry, have
not yielded the much required results, hence the need
to minimize risks associated with maritime operations
using fuzzy logic necessitated this study. Results from
the traditional methods of carrying out risk assessment
during installation and construction or after occurrence
of accidents were reviewed which proved to be costly
and often saddled with lack of flexibility for alternative
remedial options.
Keywords: Fuzzification, De-fuzzification, Maritime facilities, Artificial intelligence.

www.ijsrise.com

79

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

following sections.
As mentioned above, there are many
forms of safety management systems but the
most commonly used ones are (i) the traditional method of safety and, (ii) the proactive
methods and philosophies of quality in conjunction with safety. Safety professionals in
companies adopting the traditional method
of safety directly ensure that workers comply
with the expected company safety standards
and regulations as well as enforce laws and
government regulations. They are informed
on new regulations, devoted to impose rules
and regulations to their employees, carry out
inspections, audit the system, direct investigations of accidents and injuries, and establish recommendations in order to prevent accidents and injuries in future. For the safety
professionals, adhering to this concept means
modifying the behavior of the workers, motivating them, and using prizes and incentives
to help them work in a safer way. Rewards
are given only to those workers or departments that meet the pre-set safety objectives
(Council, 1989). The traditional safety management programmes do not always improve
the results of safety because they are centered
exclusively on the technical requirements and
achievement of short-term results. It has been
observed that organizations adopting the traditional safety management only respond after
occurrence of accidents or injuries.
Another shortcoming of the traditional
safety management program is that the program is isolated and most times disconnected
with the rest of the functions of an organization. The common elements of traditional
safety management structure include: safety
director, safety committee meetings relating to
safety, list of rules pertaining to safety, posting
of slogans, posters, and programs of safety incentives. The responsibility of the safety program falls on the safety director, who occupies
a position inside the organization of the company and, in many cases, does not have the
authority to make changes (Council, 1989).

80

1.2. The Fuzzy Reasoning Approach


A fuzzy set A on a universe of discourse
U is defined as a set of ordered pairs (Bojadziev & Bojadziev, 1995)

Where A (x) is called the membership


function (MF) of x in A that takes values in the
interval [0, 1]. The element x is characterized
by linguistic values e.g. in offshore risk assessment, the failure probability or likelihood
(FP) is defined as very low, low, average, high
and very high; the consequence severity (CS)
is defined as negligible, marginal, moderate,
severe, and catastrophic; and the risk level
(RL) is defined as minor, tolerable, major, and
intolerable. In fuzzy reasoning various types
of MFs can be used, such as triangular, trapezoidal, generalized bell-shaped and Gaussian
functions. However, the most frequently used
in risk analysis practice are triangular and
trapezoidal MFs. It is also important to note
that, the most common fuzzy set operations
are union and intersection, and that they essentially correspond to OR and AND operators,
respectively for example consider two sets A
and B to be two fuzzy sets (An et al, 2007;
Bojadziev & Bojadziev, 1995; Maseguerra et
al, 2003).
Union: - The union of A and B, denoted
by ABor A OR B ,contains all elements in
either AorB , which is calculated by the maximum operation and its MF is defined as (Bojadziev &Bojadziev, 1995):

As stated earlier FRA is a rule-based


methodology developed from human knowledge in the form of fuzzy ifthen rules expressed in form of statement in which some
words are characterized by continuous MFs;
e.g. the following is a frequently used fuzzy

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

ifthen rule in risk assessment (An et al, 2007).


If failure probability (FP) is high AND
consequence severity (CS) is severe, then risk
level (RL) of the failure event is major.
Here, FP, CS, and RL are linguistic variables while high, severe and major are linguistic terms characterized by MFs.
A fuzzy rule base consists of A set
of fuzzy ifthen rules. Consider the input
space

from a fuzzy set A and U to a fuzzy set B in


V Following the fuzzification of inputs, these
fuzzified values are applied to each rule to determine whether the rule will be fired. If a rule
has a true value in its antecedent (input part), it
will be fired and then contribute to the consequent (output part). If the antecedent of a given
rule has more than one part, the fuzzy operator
will then be applied to evaluate the composite
firing strength of the rule for example assume
an i-th rule has two parts its antecedent or input part (An et al, 2006 & 2007).

and the output space V R . Only the


multi-inputsingle-output case is considered where i = 1,.2,...,.r
here, as a multi-output system can always be
decomposed into a collection of single-output
systems. To be precise, a. fuzzy rule base
1.5. De-fuzzication Process in
comprises the following fuzzy ifthen rules
Artificial Intelligence System
(Bojadziev & Bojadziev, 1995):

1.3. Fuzzification Process in An Artificial


Intelligence System
The fuzzification process consists of two
basic steps. During the first step the interval
of each concept is analyzed into trapezoidal
membership functions, as shown in Figure 1.
Since the concept activation levels fall in the
range between 0 and +1, the concept intervals
themselves must also fall in this range. The
minimum and maximum number of intervals
in our model is two and eight respectively having a fixed width or variable length, as show

An

As we have already pointed out the defuzzification process is more complicated than
the fuzzification and consists of four basic
iterative stages which include the iteration,
max-min computation, categorization and inference realization .
The aggregate output fuzzy set is used as
input for the defuzzification process to obtain
an output in a single number. Although fuzziness is required during the intermediate steps
for the evaluation of the rule, the defuzzification is still necessary in order to determine a
crisp value of the output.

Even though the defuzzified single value


is calculated using Equation (6) shown above,
its discrete form is always used for simplic1.4. Fuzzy Rule Evaluation
ity. This discrete form is given in Equation (3)
Evaluation of fuzzy rules is conducted to below and will thus be applied to compute to
determine which rule in the rule base is fired obtain the crisp value of the output as below:
or not through the application of fuzzy logic
principles to combine fuzzy if then rules in
fuzzy rule base into a mapping for example
www.ijsrise.com

81

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Conflict of interests
Authors declare no conflict of interest.
REFERENCES
where;
n = the number of aggregated risk level
conclusions
yi = the support value at which the i-th
membership function reaches its maximum
value
uagg ( yi ) = the degree of truth of the
i-th membership function ydef = the Weighted
Mean value of Maximum conclusion
2. ANALYSIS AND CONCLUSION
As mentioned earlier, Fuzzy algorithm,
like every other artificial intelligence model
have been built upon the tools and techniques
of many different disciplines, including formal logic, probability theory, decision theory,
management science, linguistics and philosophy. This is a modernized approach to solving
risk problems. Due to the extreme difficulty
in conducting probabilistic risk assessment in
analyzing and estimating the occurrence likelihood of hazards and the magnitudes of their
possible consequences because of the uncertainty in the risk data, however, the application of FRA in risk assessment may fill the gap
created by other methods due to the following
advantages (An, 2007).
The risk can be evaluated directly by
using qualitative descriptors;
It is tolerant of imprecise data and
ambiguous information;
It gives a more flexible structure
for combining qualitative as well as
quantitative information.
It focuses on qualitative descriptors
in natural language and aims to provide fundamentals for approximate
reasoning with imprecise propositions.

82

Tsadiras AK, Margaritis KG, Using Certainly Neurons in Fuzzy Cognitive Maps. Neural Network
World, Vol.6, 1996, pp.719-728
Tsadiras AK, Kouskouvelis I, Margaritis KG, Making
Political Decision using Fuzzy Cognitive Maps:
The FYROM crisis. Proceedings of the 8th Panhellenic Conference on Informatics,Vol.1, 2001,
pp.501-510
Zadeh LA, An introduction to fuzzy logic applications
in intelligent systems,1st edn. Kluwer Academic
Publisher, Boston, 1992
An, M. (2003b). Application of a knowledge- based
intelligent safety prediction. A Lecture note for
construction management course, University of
Birmingham.
An, M., Wang, J. &Ruxton, T (2000a).The development
of fuzzy linguistic risk level for analysis of offshore engineering products using approximate
reasoning approach. Proceedings of OMAE
2000, the 19th International Conference of offshore mechanics and Arctic Engineering. New
Orleans, USA. pp.321-329.
Bazovesky, I. (1961). Reliability theory and practice.
New Jersey, Prentice Hall, Eaglewood Cliffs.
Bojadziev, G. Bojadziev., M (1995). Fuzzy sets, Fuzzy
logic, Applications. Singapore, World Scientific.

www.ijsrise.com

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

AUTHOR GUIDELINES
Types of contributions
Original Research, Review Articles, Studies and articles, Book Reviews, Case Studies
and Monographic studies.
Submission declaration and verification
Submit your article
Please submit your article via
http://ijsrise.com/index.php/ijsrise/about/submissions#onlineSubmissions
NEW SUBMISSIONS
Manuscripts must submit only online, proceeds are totally online and you will be guided
stepwise through the creation and uploading of your files. Electronic submission reduces the
editorial processing and reviewing times and reduces the time of submission to publication.
You have to use IJSRISE template to prepare your article and this version upload via
http://ijsrise.com/index.php/ijsrise/about/submissions#onlineSubmissions
Formatting requirements
The prepared article should be formatted with IJSRISE template. There is some parameters for authors.
If your article includes any Videos and/or other Supplementary material, this should be
included in your initial submission for peer review purposes.
Divide the article into clearly defined sections.
Structure of Manuscripts
Title Page
The title page should include:
The name(s) of the author(s)
A concise and informative title
The affiliation(s) and address(es) of the author(s)
The e-mail address of the corresponding author
Abstract
Abstract should contain a maximum of 250 words. The abstracts should avoid any abbreviations and mathematical formulas.
Keywords should include 4-6 keywords.
Text Formatting
Manuscripts should be submitted in Word, A4, Times New Roman, 10-point for abstract
and keywords and 12-points for text.
A complete manuscript falls need to be maximum 8,000 words excluding references,
tables, and figures. Depending on the research and work purposes, the editor decides the acceptance of a larger number of pages
For numerations of pages use the automatic page numbering function.
In the text for emphasis use italics.
The use of abbreviations should be avoided. If using the first Abbreviations should be
used throughout the text the same.
For headings use maximum three levels.
Footnotes should be avoided. If used, footnotes should only contain additional text (comment), and not information about sources used.
Acknowledgments should be placed in a separate section before the reference list.
Introduction State the objectives of the work and provide an adequate background,
avoiding a detailed literature survey or a summary of the results.
Materials and Methods Provide sufficient detail to allow the work to be reproduced.
www.ijsrise.com

83

International journal of scientific research in information systems and engineering (IJSRISE)


Vol. 1, No.1, 2015.

Methods already published should be indicated by a reference: only relevant modifications


should be described.
Results Results should be clear and concise.
Discussions This should explore the significance of the results of the work, not repeat
them. A combined Results and Discussion section is often appropriate. Avoid extensive citations and discussion of published literature.
Conclusions - The main conclusions of the study may be presented in a short Conclusions section, which may stand alone or form a subsection of a Discussion or Results and Discussion section.
Appendices - If there is more than one appendix, they should be identified as A, B, etc.
Formulae and equations in appendices should be given separate numbering: Eq. (A.1), Eq.
(A.2), etc.; in a subsequent appendix, Eq. (B.1) and so on. Similarly for tables and figures: Table
A.1; Fig. A.1, etc.
Acknowledgments - Collate acknowledgments in a separate section at the end of the
article before the references and do not, therefore, include them on the title page, as a footnote
to the title or otherwise. List here those individuals who provided help during the research (e.g.,
providing language help, writing assistance or proof reading the article, etc.).
Reference Style All manuscripts should be formatted using the American Psychological
Association (APA) citation style, which is used primarily in the social sciences.
Use of DOI is highly encouraged.
Citation in text
Please ensure that every reference cited in the text is also present in the reference list (and
vice versa). Any references cited in the abstract must be given in full. Citation of a reference as
in press implies that the item has been accepted for publication.

84

www.ijsrise.com

You might also like