263,481 research outputs found

    A web of stakeholders and strategies: A case of broadband diffusion in South Korea

    Get PDF
    When a new technology is launched, its diffusion becomes an issue of importance. There are various stakeholders that influence diffusion. The question that remains to be determined is their identification and roles. This paper outlines how the strategies pursued by a government acting as the key stakeholder affected the diffusion of a new technology. The analysis is based on a theoretical framework derived from innovation diffusion and stakeholder theories. The empirical evidence comes from a study of broadband development in South Korea. A web of stakeholders and strategies is drawn in order to identify the major stakeholders involved and highlight their relations. The case of South Korea offers implications for other countries that are pursuing broadband diffusion strategies

    Information and Communication Technologies for Veterinary Sciences and Animal Husbandry in Jammu and Kashmir

    Full text link
    Use of Information and Communication Technology (ICT) is growing in all spheres of activity. Veterinary Sciences andAnimal Husbandry should therefore be no exception. Efforts are needed to incorporate ICT in all endeavours related to livestock development in Jammu and Kashmir. All organizations and departments concerned with Veterinary Sciences andAnimal Husbandry need to realize the potential of ICT for the speedy and timely dissemination of information modules to the livestock rearers.The awareness among livestock rearers about the information and availability of ICT services is the first step to be taken to increase livestock rearers' participation in ICT initiatives.Access to information and communication is essential to the stakeholders at alllevels in the process of development. Various information and communication technology tools in knowledge and information dissemination needed for livestock rearers and possible IT application tools in realizing their needs in Jammu and Kashmir are discussed

    Design and implementation of an intelligent USB peripheral controller

    Get PDF
    This paper presents the design and implementation of an intelligent, re-programmable device that is capable of au-tomatically detecting USB peripherals on insertion and per-forming various tasks accordingly. Examples include the au-tomatic transfer of data between pen drives or the automatic printing of a file located on a pen drive. The performance of the system was analyzed and results for the execution time and CPU utilization of the programs performing the tasks were obtained. A comparison was made with the same pro-grams running on a laptop, which was set as a benchmark.peer-reviewe

    A software development framework for hardware centric applications: an architectural perspective

    Get PDF
    Throughout the history of Software Engineering, software development has been looked at from various perspectives, in terms of: usability, suitability for proposed problem, speed of development, relevance to real world scenarios, as well as in terms of the hardware that it needs to manifest itself in the real world. This paper delves deeper into the aspect of the actual core concept in software engineering: that of mapping software onto hardware[1], focused specifically on Hardware Centric systems (HCS), (systems where the hardware dictates to an influential level, the actual nature of the software); examining the various frameworks and concepts that exist for displaying this mapping from an architecture point of view, so as to establish if there is a need for a more complete and/or effective framework. It also proposes a roadmap proposal for a base architecture framework for the development of Hardware Centric applications, which will then be employed to determine if a suitable framework already exists.peer-reviewe

    Offline handwritten signature verification using radial basis function neural network

    Get PDF
    This study investigates the effectiveness of Radial Basis Function Neural Networks (RBFNNs) for Of- fline Handwritten Signature Verification (OHSV). A signature database is collected using intrapersonal variations for evaluation. Global, grid and texture features are used as feature sets. A number of exper- iments were carried out to compare the effectiveness of each separate set and their combination. The system is extensively tested with random signature forgeries and the high recognition rates obtained demonstrate the effectiveness of the architecture. The best results are obtained when global and grid features are combined producing a feature vector of 592 elements. In this case a Mean Error Rate (MER) of 2.04% with a False Rejection Rate (FRR) of 1.58% and a False Acceptance Rate (FAR) of 2.5% are achieved, which are generally better than those reported in the literature.peer-reviewe
    corecore