Abstract: Mobile marketing through mobile messaging service
has highly impressive growth as it enables e-business firms to
communicate with their customers effectively. Educational
institutions hence start using this service to enhance communication
with their students. Previous studies, however, have limited
understanding of applying mobile messaging service in education.
This study proposes a theoretical model to understand the drivers of
students- intentions to use the university-s mobile messaging service.
The model indicates that social influence, perceived control and
attitudes affect students- intention to use the university-s mobile
messaging service. It also provides five antecedents of students-
attitudes–perceived utility (information utility, entertainment utility,
and social utility), innovativeness, information seeking, transaction
specificity (content specificity, sender specificity, and time
specificity) and privacy concern. The proposed model enables
universities to understand what students concern about the use of a
mobile messaging service in universities and handle the service more
effectively. The paper discusses the model development and
concludes with limitations and implications of the proposed model.
Abstract: In this paper usefulness of quasi-Newton iteration
procedure in parameters estimation of the conditional variance
equation within BHHH algorithm is presented. Analytical solution of
maximization of the likelihood function using first and second
derivatives is too complex when the variance is time-varying. The
advantage of BHHH algorithm in comparison to the other
optimization algorithms is that requires no third derivatives with
assured convergence. To simplify optimization procedure BHHH
algorithm uses the approximation of the matrix of second derivatives
according to information identity. However, parameters estimation in
a/symmetric GARCH(1,1) model assuming normal distribution of
returns is not that simple, i.e. it is difficult to solve it analytically.
Maximum of the likelihood function can be founded by iteration
procedure until no further increase can be found. Because the
solutions of the numerical optimization are very sensitive to the
initial values, GARCH(1,1) model starting parameters are defined.
The number of iterations can be reduced using starting values close
to the global maximum. Optimization procedure will be illustrated in
framework of modeling volatility on daily basis of the most liquid
stocks on Croatian capital market: Podravka stocks (food industry),
Petrokemija stocks (fertilizer industry) and Ericsson Nikola Tesla
stocks (information-s-communications industry).
Abstract: Information and Communication Technologies (ICT) in mathematical education is a very active field of research and innovation, where learning is understood to be meaningful and grasping multiple linked representation rather than rote memorization, a great amount of literature offering a wide range of theories, learning approaches, methodologies and interpretations, are generally stressing the potentialities for teaching and learning using ICT. Despite the utilization of new learning approaches with ICT, students experience difficulties in learning concepts relevant to understanding mathematics, much remains unclear about the relationship between the computer environment, the activities it might support, and the knowledge that might emerge from such activities. Many questions that might arise in this regard: to what extent does the use of ICT help students in the process of understanding and solving tasks or problems? Is it possible to identify what aspects or features of students' mathematical learning can be enhanced by the use of technology? This paper will highlight the interest of the integration of information and communication technologies (ICT) into the teaching and learning of mathematics (quadratic functions), it aims to investigate the effect of four instructional methods on students- mathematical understanding and problem solving. Quantitative and qualitative methods are used to report about 43 students in middle school. Results showed that mathematical thinking and problem solving evolves as students engage with ICT activities and learn cooperatively.
Abstract: Wireless location is to determine the mobile station (MS) location in a wireless cellular communications system. When fewer base stations (BSs) may be available for location purposes or the measurements with large errors in non-line-of-sight (NLOS) environments, it is necessary to integrate all available heterogeneous measurements to achieve high location accuracy. This paper illustrates a hybrid proposed schemes that combine time of arrival (TOA) at three BSs and angle of arrival (AOA) information at the serving BS to give a location estimate of the MS. The proposed schemes mitigate the NLOS effect simply by the weighted sum of the intersections between three TOA circles and the AOA line without requiring a priori information about the NLOS error. Simulation results show that the proposed methods can achieve better accuracy when compare with Taylor series algorithm (TSA) and the hybrid lines of position algorithm (HLOP).
Abstract: The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.
Abstract: This article presents the developments of efficient
algorithms for tablet copies comparison. Image recognition has
specialized use in digital systems such as medical imaging,
computer vision, defense, communication etc. Comparison between
two images that look indistinguishable is a formidable task. Two
images taken from different sources might look identical but due to
different digitizing properties they are not. Whereas small variation
in image information such as cropping, rotation, and slight
photometric alteration are unsuitable for based matching
techniques. In this paper we introduce different matching
algorithms designed to facilitate, for art centers, identifying real
painting images from fake ones. Different vision algorithms for
local image features are implemented using MATLAB. In this
framework a Table Comparison Computer Tool “TCCT" is
designed to facilitate our research. The TCCT is a Graphical Unit
Interface (GUI) tool used to identify images by its shapes and
objects. Parameter of vision system is fully accessible to user
through this graphical unit interface. And then for matching, it
applies different description technique that can identify exact
figures of objects.
Abstract: The present paper represent the efforts undertaken for
the development of an semi-automatic robot that may be used for
various post-disaster rescue operation planning and their subsequent
execution using one-way communication of video and data from the
robot to the controller and controller to the robot respectively.
Wireless communication has been used for the purpose so that the
robot may access the unapproachable places easily without any
difficulties. It is expected that the information obtained from the
robot would be of definite help to the rescue team for better planning
and execution of their operations.
Abstract: This research attempts to explore gaps in Information
Systems (IS) and innovation literatures by developing a model of
Information Technology (IT) capability in enabling innovation. The
research was conducted by using semi-structured interview with six
innovators in business consulting, financial, healthcare and academic
organizations. The interview results suggest four elements of ITenabled
innovation capability which are information (ability to
capture ideas and knowledge), connectivity (ability to bridge
geographical boundary and mobilize human resources),
communication (ability to attain and engage relationships between
human resources) and transformation (ability to change the functions
and process integrations) in defining IT-enabled innovation platform.
The results also suggests innovators- roles and IT capability.
Abstract: Tanzania secondary schools in rural areas are geographically and socially isolated, hence face a number of problems in getting learning materials resulting in poor performance in National examinations. E-learning as defined to be the use of information and communication technology (ICT) for supporting the educational processes has motivated Tanzania to apply ICT in its education system. There has been effort to improve secondary school education using ICT through several projects. ICT for e-learning to Tanzania rural secondary school is one of the research projects conceived by the University of Dar-es-Salaam through its College of Engineering and Technology. The main objective of the project is to develop a tool to enable ICT support rural secondary school. The project is comprehensive with a number of components, one being development of e-learning management system (e-LMS) for Tanzania secondary schools. This paper presents strategies of developing e-LMS. It shows the importance of integrating action research methodology with the modeling methods as presented by model driven architecture (MDA) and the usefulness of Unified Modeling Language (UML) on the issue of modeling. The benefit of MDA will go along with the development based on software development life cycle (SDLC) process, from analysis and requirement phase through design and implementation stages as employed by object oriented system analysis and design approach. The paper also explains the employment of open source code reuse from open source learning platforms for the context sensitive development of the e-LMS for Tanzania secondary schools.
Abstract: Utilization of various sensors has made it possible to
extend capabilities of industrial robots. Among these are vision
sensors that are used for providing visual information to assist robot
controllers. This paper presents a method of integrating a vision
system and a simulation program with an industrial robot. The vision
system is employed to detect a target object and compute its location
in the robot environment. Then, the target object-s information is sent
to the robot controller via parallel communication port. The robot
controller uses the extracted object information and the simulation
program to control the robot arm for approaching, grasping and
relocating the object. This paper presents technical details of system
components and describes the methodology used for this integration.
It also provides a case study to prove the validity of the methodology
developed.
Abstract: Exact expressions for bit-error probability (BEP) for
coherent square detection of uncoded and coded M-ary quadrature
amplitude modulation (MQAM) using an array of antennas with
maximal ratio combining (MRC) in a flat fading channel interference
limited system in a Nakagami-m fading environment is derived. The
analysis assumes an arbitrary number of independent and identically
distributed Nakagami interferers. The results for coded MQAM are
computed numerically for the case of (24,12) extended Golay code
and compared with uncoded MQAM by plotting error probabilities
versus average signal-to-interference ratio (SIR) for various values of
order of diversity N, number of distinct symbols M, in order to
examine the effect of cochannel interferers on the performance of the
digital communication system. The diversity gains and net gains are
also presented in tabular form in order to examine the performance of
digital communication system in the presence of interferers, as the
order of diversity increases. The analytical results presented in this
paper are expected to provide useful information needed for design
and analysis of digital communication systems with space diversity
in wireless fading channels.
Abstract: With the approaching of digital era, various interactive
service platforms and systems support human beings- needs in lives by
different contents and measures. Design strategies have gradually
turned from function-based to user-oriented, and are often customized.
In other words, how designers include users- value reaction in creation
becomes the goal. Creative design service of interior design requires
positive interaction and communication to allow users to obtain full
design information, recognize the style and process of personal needs,
develop creative service design, lower communication time and cost
and satisfy users- sense of achievement. Thus, by constructing a
co-design method, based on the communication between interior
designers and users, this study recognizes users- real needs and
provides the measure of co-design for designers and users.
Abstract: In this study, a system of encryption based on chaotic
sequences is described. The system is used for encrypting digital
image data for the purpose of secure image transmission. An image
secure communication scheme based on Logistic map chaotic
sequences with a nonlinear function is proposed in this paper.
Encryption and decryption keys are obtained by one-dimensional
Logistic map that generates secret key for the input of the nonlinear
function. Receiver can recover the information using the received
signal and identical key sequences through the inverse system
technique. The results of computer simulations indicate that the
transmitted source image can be correctly and reliably recovered by
using proposed scheme even under the noisy channel. The
performance of the system will be discussed through evaluating the
quality of recovered image with and without channel noise.
Abstract: Indigenous Knowledge (IK) has many social and
economic benefits. However, IK is at the risk of extinction due to the
difficulties to preserve it as most of the IK largely remains
undocumented. This study aims to design a model of the factors
affecting the adoption of Information and Communication
Technologies (ICTs) for the preservation of IK. The proposed model
is based on theoretical frameworks on ICT adoption. It was designed
following a literature review of ICT adoption theories for households,
and of the factors affecting ICT adoption for IK. The theory that
fitted to the best all factors was then chosen as the basis for the
proposed model. This study found that the Model of Adoption of
Technology in Households (MATH) is the most suitable theoretical
framework for modeling ICT adoption factors for the preservation of
IK.
Abstract: Avoiding learning failures in mathematics e-learning environments caused by emotional problems in students with autism has become an important topic for combining of special education with information and communications technology. This study presents an adaptive emotional adjustment model in mathematics e-learning for students with autism, emphasizing the lack of emotional perception in mathematics e-learning systems. In addition, an emotion classification for students with autism was developed by inducing emotions in mathematical learning environments to record changes in the physiological signals and facial expressions of students. Using these methods, 58 emotional features were obtained. These features were then processed using one-way ANOVA and information gain (IG). After reducing the feature dimension, methods of support vector machines (SVM), k-nearest neighbors (KNN), and classification and regression trees (CART) were used to classify four emotional categories: baseline, happy, angry, and anxious. After testing and comparisons, in a situation without feature selection, the accuracy rate of the SVM classification can reach as high as 79.3-%. After using IG to reduce the feature dimension, with only 28 features remaining, SVM still has a classification accuracy of 78.2-%. The results of this research could enhance the effectiveness of eLearning in special education.
Abstract: Information and communication service providers
(ICSP) that are significant in size and provide Internet-based services
take administrative, technical, and physical protection measures via
the information security check service (ISCS). These protection
measures are the minimum action necessary to secure the stability and
continuity of the information and communication services (ICS) that
they provide. Thus, information assets are essential to providing ICS,
and deciding the relative importance of target assets for protection is a
critical procedure. The risk analysis model designed to decide the
relative importance of information assets, which is described in this
study, evaluates information assets from many angles, in order to
choose which ones should be given priority when it comes to
protection. Many-sided risk analysis (MSRS) grades the importance of
information assets, based on evaluation of major security check items,
evaluation of the dependency on the information and communication
facility (ICF) and influence on potential incidents, and evaluation of
major items according to their service classification, in order to
identify the ISCS target. MSRS could be an efficient risk analysis
model to help ICSPs to identify their core information assets and take
information protection measures first, so that stability of the ICS can
be ensured.
Abstract: These days wireless local area networks has become
very popular, when the initial IEEE802.11 is the standard for
providing wireless connectivity to automatic machinery, equipment
and stations that require rapid deployment, which may be portable,
handheld or which may be mounted on moving vehicles within a
local area. IEEE802.11 Wireless local area network is a sharedmedium
communication network that transmits information over
wireless links for all IEEE802.11 stations in its transmission range to
receive. When a user is moving from one location to another, how
the other user knows about the required station inside WLAN. For
that we designed and implemented a system to locate a mobile user
inside the wireless local area network based on RSSI with the help of
four specially designed architectures. These architectures are based
on statistical or we can say manual configuration of mapping and
radio map of indoor and outdoor location with the help of available
Sniffer based and cluster based techniques. We found a better
location of a mobile user in WLAN. We tested this work in indoor
and outdoor environments with different locations with the help of
Pamvotis, a simulator for WLAN.
Abstract: Industrial design engineering is an information and
knowledge intensive job. Although Wikipedia offers a lot of this
information, design engineers are better served with a wiki tailored to
their job, offering information in a compact manner and functioning
as a design tool. For that reason WikID has been developed.
However for the viability of a wiki, an active user community is
essential. The main subject of this paper is a study to the influence of
the communication and the contents of WikID on the user-s
willingness to contribute.
At first the theory about a website-s first impression, general
usability guidelines and user motivation in an online community is
studied. Using this theory, the aspects of the current site are analyzed
on their suitability. These results have been verified with a
questionnaire amongst 66 industrial design engineers (or students
industrial design engineering).
The main conclusion is that design engineers are enchanted with
the existence of WikID and its knowledge structure (taxonomy) but
this structure has not become clear without any guidance. In other
words, the knowledge structure is very helpful for inspiring and
guiding design engineers through their tailored knowledge domain in
WikID but this taxonomy has to be better communicated on the main
page. Thereby the main page needs to be fitted more to the target
group preferences.
Abstract: An information procuring and processing emerging technology wireless sensor network (WSN) Consists of autonomous nodes with versatile devices underpinned by applications. Nodes are equipped with different capabilities such as sensing, computing, actuation and wireless communications etc. based on application requirements. A WSN application ranges from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. The nodes are deployed independently to cooperatively monitor the physical and environmental conditions. The architecture of WSN differs based on the application requirements and focus on low cost, flexibility, fault tolerance capability, deployment process as well as conserve energy. In this paper we have present the characteristics, architecture design objective and architecture of WSN
Abstract: This paper describes the NEAR (Navigating Exhibitions, Annotations and Resources) panel, a novel interactive visualization technique designed to help people navigate and interpret groups of resources, exhibitions and annotations by revealing hidden relations such as similarities and references. NEAR is implemented on A•VI•RE, an extended online information repository. A•VI•RE supports a semi-structured collection of exhibitions containing various resources and annotations. Users are encouraged to contribute, share, annotate and interpret resources in the system by building their own exhibitions and annotations. However, it is hard to navigate smoothly and efficiently in A•VI•RE because of its high capacity and complexity. We present a visual panel that implements new navigation and communication approaches that support discovery of implied relations. By quickly scanning and interacting with NEAR, users can see not only implied relations but also potential connections among different data elements. NEAR was tested by several users in the A•VI•RE system and shown to be a supportive navigation tool. In the paper, we further analyze the design, report the evaluation and consider its usage in other applications.