Abstract: There have been many variations of technologies that helped educators in teaching & learning. From the past research it is evident that Information Technology significantly increases student participation and interactivity in the classrooms. This research started with a aim to find whether adoption of Wi-Fi environment by Malaysian Higher Educational Institutions (HEI) can benefit students and staff equally. The study was carried out in HEI-s of Klang Valley, Malaysia and the data is gathered through paper based surveys. A sample size of 237 units were randomly selected from 5 higher educational institutions in the Klang Valley using the Stratified Random sampling method and from the analysis of the data, it was found that the implementation of wireless technologies in HEIs have created lot of opportunities and also challenges.
Abstract: GSM has undoubtedly become the most widespread
cellular technology and has established itself as one of the most
promising technology in wireless communication. The next
generation of mobile telephones had also become more powerful and
innovative in a way that new services related to the user-s location
will arise. Other than the 911 requirements for emergency location
initiated by the Federal Communication Commission (FCC) of the
United States, GSM positioning can be highly integrated in cellular
communication technology for commercial use. However, GSM
positioning is facing many challenges. Issues like accuracy,
availability, reliability and suitable cost render the development and
implementation of GSM positioning a challenging task. In this paper,
we investigate the optimal mobile position tracking means. We
employ an innovative scheme by integrating the Kalman filter in the
localization process especially that it has great tracking
characteristics. When tracking in two dimensions, Kalman filter is
very powerful due to its reliable performance as it supports
estimation of past, present, and future states, even when performing
in unknown environments. We show that enhanced position tracking
results is achieved when implementing the Kalman filter for GSM
tracking.
Abstract: Business scenario is an important technique that may be used at various stages of the enterprise architecture to derive its characteristics based on the high-level requirements of the business. In terms of wireless deployments, they are used to help identify and understand business needs involving wireless services, and thereby to derive the business requirements that the architecture development has to address by taking into account of various wireless challenges. This study assesses the deployment of Wireless Local Area Network (WLAN) and Broadband Wireless Access (BWA) solutions for several business scenarios in Asia Pacific region. This paper focuses on the overview of the business and technology environments, whereby examples of existing (or suggested) wireless solutions (to be) adopted in Asia Pacific region will be discussed. Interactions of several players, enabling technologies, and key processes in the wireless environments are studied. The analysis and discussions associated to this study are divided into two divisions: healthcare and education, where the merits of wireless solutions in improving living quality are highlighted.
Abstract: As a result of the ever-changing environment and the demands of rganisations- customers, it is important to recognise the importance of some important managerial challenges. It is the sincere belief that failure to meet these challenges, will ultimately contribute to inevitable problems for organisations. This recognition
requires from managers and by implication organisations to be engaged in ethical behaviour, identity awareness and learning organisational behaviour. All these aspects actually reflect on the
importance of intellectual capital as the competitive weapons for
organisations in the future.
Abstract: This paper explores transformation of higher
education system in Kazakhstan since 1991. The research unravels
successful experience in the field and challenges. It covers issues of institutional change, faculty, research, university, funding, standards
and leadership. The paper offers recommendations in improving state of art in higher educational institutions of Kazakhstan based on
international approaches and local realities.
Abstract: Indian telecom services industry has been witnessing
a stupendous growth since 1990s. Over the years, subscriber base has
grown steadily and it crossed 950 million marks in March 2012.
India with second largest subscriber base also offers one of the
lowest call tariffs in the world. But in the euphoria of high growth in
services, the equipment manufacturing received least priority. India
mainly depends on imported components from China. Of late, it is
realized that lack of domestic manufacturing may pose a serious
challenge to India-s continued success in the telecom sector.
Therefore, the National Telecom Policy 2012 aims at developing a
strong equipment manufacturing base within India. This paper
realistically assesses India-s true potential in equipment
manufacturing and seeks to identify the emerging issues and
challenges before the Indian telecom equipment manufacturing sector
while it tries to make a transition from an import-dependent industry
to a global manufacturing hub.
Abstract: The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.
Abstract: With the advancement of wireless sensor network technology,
its practical utilization is becoming an important challange.
This paper overviews my past environmental monitoring project,
and discusses the process of starting the monitoring by classifying
it into four steps. The steps to start environmental monitoring can
be complicated, but not well discussed by researchers of wireless
sensor network technology. This paper demonstrates our activity and
challenges in each of the four steps to ease the process, and argues
future challenges to enable quick start of environmental monitoring.
Abstract: The Canadian aerospace industry faces many
challenges. One of them is the difficulty in estimating costs. In
particular, the design effort required in a project impacts resource
requirements and lead-time, and consequently the final cost. This
paper presents the findings of a case study conducted for recognized
global leader in the design and manufacturing of aircraft engines. The
study models parametric cost estimation relationships to estimate the
design effort of integrated blade-rotor low-pressure compressor fans.
Several effort drivers are selected to model the relationship.
Comparative analyses of three types of models are conducted. The
model with the best accuracy and significance in design estimation is
retained.
Abstract: The growing problem of youth unemployment in
Egypt after the 25th January Revolution has directed the attention of
some human resource experts towards considering remote
employment as a partial remedy for the unemployed youth instead of
the unavailable traditional jobs, a trend which will also help with the
congested offices and unsolved traffic problem in Cairo and spread
a flexible work culture, but despite of that, the main issue remains
unresolved for these organizations to deal with the system challenges.
In the past few years, in developed countries, there has been a
growing trend for many companies to shift to remote employment
instead of the traditional office employment for many reasons: due to
the growing technological advances that helped some employees do
their work from home on a part time basis, the need for achieving an
employee-s work balance in the middle of unbalanced complicated
life, top management focus on employee-s productivity rather their
time spent at work. The objective of this paper is to study and analyze
the advantages and challenges that Egypt-s labor force will be facing
in their implementation of remote or virtual employment in both
government and private organizations after the 25th January
revolution. Therefore, the research question will be: What are the
advantages and different challenges that Egyptian organizations
might face in their implementation for remote employment system
and how can they manage these challenges for the system to work
effectively? The study is divided into six main parts: the introduction,
objective and importance of the study, research problem,
methodology, experience of some countries that implemented remote
employment, advantages and challenges of implementing remote
employment in Egypt and then the conclusion which discuses the
results and recommendations of the study.
Abstract: It is claimed that a new style of urban planning and
policy intertwined with ICT is emerging and urban planning and ICT
policy are no longer considered as separate disciplines. The
interactions between electronic spaces and urban spaces are so
complex and uncertain that confront urban planners and policy makers
with great challenges. However, the assumption about the relationship
between ICT and urban planning is mainly based on North American
and European experiences. In the light of empirical evidence from
Taipei City, this paper shows that this new type of urban planning and
policy intertwined with ICT has existed in Asian city for a decade as
well. Based on these results, this paper further reviews how the Taipei
City government implements this new type of urban ICT planning and
the validity and realism of its underlying assumptions. Finally, it also
explores the extent to which urban ICT planning could promote
positive synergies between physical and electronic developments.
Abstract: Innovations in technology have created new ethical
challenges. Essential use of electronic communication in the
workplace has escalated at an astronomical rate over the past decade.
As such, legal and ethical dilemmas confronted by both the employer
and the employee concerning managerial control and ownership of einformation
have increased dramatically in the USA. From the
employer-s perspective, ownership and control of all information
created for the workplace is an undeniable source of economic
advantage and must be monitored zealously. From the perspective of
the employee, individual rights, such as privacy, freedom of speech,
and freedom from unreasonable search and seizure, continue to be
stalwart legal guarantees that employers are not legally or ethically
entitled to abridge in the workplace. These issues have been the
source of great debate and the catalyst for legal reform. The fine line
between ethical and legal has been complicated by emerging
technologies. This manuscript will identify and discuss a number of
specific legal and ethical issues raised by the dynamic electronic
workplace and conclude with suggestions that employers should
follow to respect the delicate balance between employees- legal
rights to privacy and the employer's right to protect its knowledge
systems and infrastructure.
Abstract: Children and adolescents developing in the worlds of today are facing a getting array of new and old challenges. School counselling is improving rapidly in contemporary education systems around the world. It can be said that counselling system in Turkey was newly borning. In this study, “Family of the Blood" activity is improved with respect to compherensive guidance school program. The sample included 22 adolescents who were high school students. The activity was carried out in 4 sessions, each of which lasted 45 minutes. In the first session, students- personal-social needs were determined. In the second session, in order to warm up, the students were asked three questions consisting of the constructional aspect. In the third session, the counselor and the teacher shared the results of students- responses obtained in the previous session. In the fourth session, the tables formed by students were presented in the classroom. In order to evaluate the activity, three questions were asked of the teacher and counselor. According to the results, the lesson aims of curriculum and counselling aims of curriculum were attained. In the light of literature, the results were discussed and some suggestions were made. It is taken into consideration that the activitiy was beneficial in many respects, similar studies should be carried out in the near future.
Abstract: In an open real-time system environment, the coexistence of different kinds of real-time and non real-time applications makes the system scheduling mechanism face new requirements and challenges. One two-level scheduling scheme of the open real-time systems is introduced, and points out that hard and soft real-time applications are scheduled non-distinctively as the same type real-time applications, the Quality of Service (QoS) cannot be guaranteed. It has two flaws: The first, it can not differentiate scheduling priorities of hard and soft real-time applications, that is to say, it neglects characteristic differences between hard real-time applications and soft ones, so it does not suit a more complex real-time environment. The second, the worst case execution time of soft real-time applications cannot be predicted exactly, so it is not worth while to cost much spending in order to assure all soft real-time applications not to miss their deadlines, and doing that may cause resource wasting. In order to solve this problem, a novel two-level real-time scheduling mechanism (including scheduling profile and scheduling algorithm) which adds the process of dealing with soft real-time applications is proposed. Finally, we verify real-time scheduling mechanism from two aspects of theory and experiment. The results indicate that our scheduling mechanism can achieve the following objectives. (1) It can reflect the difference of priority when scheduling hard and soft real-time applications. (2) It can ensure schedulability of hard real-time applications, that is, their rate of missing deadline is 0. (3) The overall rate of missing deadline of soft real-time applications can be less than 1. (4) The deadline of a non-real-time application is not set, whereas the scheduling algorithm that server 0 S uses can avoid the “starvation" of jobs and increase QOS. By doing that, our scheduling mechanism is more compatible with different types of applications and it will be applied more widely.
Abstract: In designing river intakes and diversion structures, it is paramount that the sediments entering the intake are minimized or, if possible, completely separated. Due to high water velocity, sediments can significantly damage hydraulic structures especially when mechanical equipment like pumps and turbines are used. This subsequently results in wasting water, electricity and further costs. Therefore, it is prudent to investigate and analyze the performance of lateral intakes affected by sediment control structures. Laboratory experiments, despite their vast potential and benefits, can face certain limitations and challenges. Some of these include: limitations in equipment and facilities, space constraints, equipment errors including lack of adequate precision or mal-operation, and finally, human error. Research has shown that in order to achieve the ultimate goal of intake structure design – which is to design longlasting and proficient structures – the best combination of sediment control structures (such as sill and submerged vanes) along with parameters that increase their performance (such as diversion angle and location) should be determined. Cost, difficulty of execution and environmental impacts should also be included in evaluating the optimal design. This solution can then be applied to similar problems in the future. Subsequently, the model used to arrive at the optimal design requires high level of accuracy and precision in order to avoid improper design and execution of projects. Process of creating and executing the design should be as comprehensive and applicable as possible. Therefore, it is important that influential parameters and vital criteria is fully understood and applied at all stages of choosing the optimal design. In this article, influential parameters on optimal performance of the intake, advantages and disadvantages, and efficiency of a given design are studied. Then, a multi-criterion decision matrix is utilized to choose the optimal model that can be used to determine the proper parameters in constructing the intake.
Abstract: Wireless sensor networks include small nodes which
have sensing ability; calculation and connection extend themselves
everywhere soon. Such networks have source limitation on
connection, calculation and energy consumption. So, since the nodes
have limited energy in sensor networks, the optimized energy
consumption in these networks is of more importance and has created
many challenges. The previous works have shown that by organizing
the network nodes in a number of clusters, the energy consumption
could be reduced considerably. So the lifetime of the network would
be increased. In this paper, we used the Queen-bee algorithm to
create energy efficient clusters in wireless sensor networks. The
Queen-bee (QB) is similar to nature in that the queen-bee plays a
major role in reproduction process. The QB is simulated with J-sim
simulator. The results of the simulation showed that the clustering by
the QB algorithm decreases the energy consumption with regard to
the other existing algorithms and increases the lifetime of the
network.
Abstract: Nowadays, people are going more and more mobile, both in terms of devices and associated applications. Moreover, services that these devices are offering are getting wider and much more complex. Even though actual handheld devices have considerable computing power, their contexts of utilization are different. These contexts are affected by the availability of connection, high latency of wireless networks, battery life, size of the screen, on-screen or hard keyboard, etc. Consequently, development of mobile applications and their associated mobile Web services, if any, should follow a concise methodology so they will provide a high Quality of Service. The aim of this paper is to highlight and discuss main issues to consider when developing mobile applications and mobile Web services and then propose a framework that leads developers through different steps and modules toward development of efficient and secure mobile applications. First, different challenges in developing such applications are elicited and deeply discussed. Second, a development framework is presented with different modules addressing each of these challenges. Third, the paper presents an example of a mobile application, Eivom Cinema Guide, which benefits from following our development framework.
Abstract: Data stream analysis is the process of computing
various summaries and derived values from large amounts of data
which are continuously generated at a rapid rate. The nature of a
stream does not allow a revisit on each data element. Furthermore,
data processing must be fast to produce timely analysis results. These
requirements impose constraints on the design of the algorithms to
balance correctness against timely responses. Several techniques
have been proposed over the past few years to address these
challenges. These techniques can be categorized as either dataoriented
or task-oriented. The data-oriented approach analyzes a
subset of data or a smaller transformed representation, whereas taskoriented
scheme solves the problem directly via approximation
techniques. We propose a hybrid approach to tackle the data stream
analysis problem. The data stream has been both statistically
transformed to a smaller size and computationally approximated its
characteristics. We adopt a Monte Carlo method in the approximation
step. The data reduction has been performed horizontally and
vertically through our EMR sampling method. The proposed method
is analyzed by a series of experiments. We apply our algorithm on
clustering and classification tasks to evaluate the utility of our
approach.
Abstract: Information and communication technology (ICT) has
become, within a very short time, one of the basic building blocks of
modern society. Many countries now understanding the importance
of ICT and mastering the basic skills and concepts of it as part of the
core of education. Organizations, experts and practitioners in the
education sector increasingly recognizing the importance of ICT in
supporting educational improvement and reform. This paper
addresses the convergence of ICT and education. When two
technologies are converging to each other, together they will generate
some great opportunities and challenges. This paper focuses on these
issues. In introduction section, it explains the ICT, education, and
ICT-enhanced education. In next section it describes need of ICT in
education, relationship between ICT skills and education, and stages
of teaching learning process. The next two sections describe
opportunities and challenges in integrating ICT in education. Finally
the concluding section summaries the idea and its usefulness.
Abstract: Social media has led to paradigm shifts in ways
people work and do business, interact and socialize, learn and obtain
knowledge. So much so that social media has established itself as an
important spatial extension of this nation-s historicity and challenges.
Regardless of the enabling reputation and recommendation features
through social networks embedded in the social media system, the
overflow of broadcasted and publicized media contents turns the
table around from engendering trust to doubting the trust system.
When the trust is at doubt, the effects include deactivation of
accounts and creation of multiple profiles, which lead to the overflow
of 'ghost' contents (i.e. “the abundance of abandoned ships"). In
most literature, the study of trust can be related to culture; hence the
difference between Western-s “openness" and Eastern-s “blue-chip"
concepts in networking and relationships. From a survey on issues
and challenges among Malaysian social media users, 'authenticity'
emerges as one of the main factors that causes and is caused by other
factors. The other issue that has surfaced is credibility either in terms
of message/content and source. Another is the quality of the
knowledge that is shared. This paper explores the terrains of this
critical space which in recent years has been dominated increasingly
by, arguably, social networks embedded in the social media system,
the overflow of broadcasted and publicized media content.