Investigating the user profile of potential users of e-government in Yemen
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 1
Abstract
Understanding the citizens’ needs by e-government decision makers offers great opportunities to make communication more effective and efficient, to infer and predict citizens’ behaviour and to even influence behaviour. The decision makers need to know more about citizens’ attitude, skills, and willingness to use e-government online services. The aim of this paper is to investigate the user profile of e-government in Yemen. We built a tool to collect the data online from internet users [7]. The results will help the decision makers to understand the users’ needs and plan to improve the online services for e-government to its users.
Authors and Affiliations
Asma A. Alhashmi, Abdulbasit Darem, Sur esha
The Effect of NCT Techniques on SC-FDMA System in presence of HPA
In this paper, a companding technique is used to reduce the Peak-to-Average Power Ratio (PAPR) in Single-Carrier Frequency Division Multiple Access (SC-FDMA) systems. By Nonlinear Companding Transform (NCT) technique...
A Digital Harmonic Rejection Mixer with Analog Harmonic Pre-suppression
A harmonic rejection mixer (HRM) employing analog harmonic pre-suppression and subsequent digital domain harmonic suppression is proposed and investigated. The analog harmonic pre-suppression relaxes the dynamic rang...
Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure
A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although usi...
Design of Intelligent Transport Related Issue System Based On ARM7
There are millions of vehicles are passing through roads every day. Time, safety and efficiency are the major factors, While mode of transportation plays an important role in urbanization. Through this paper integrat...
A Survey on Distributed Network Services Using SSO for Secure Mechanism
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...