285,561 research outputs found

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    Implementation of CAVENET and its usage for performance evaluation of AODV, OLSR and DYMO protocols in vehicular networks

    Get PDF
    Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour nodes. In this paper, we present a simulation system for VANET called CAVENET (Cellular Automaton based VEhicular NETwork). In CAVENET, the mobility patterns of nodes are generated by an 1-dimensional cellular automata. We improved CAVENET and implemented some routing protocols. We investigated the performance of the implemented routing protocols by CAVENET. The simulation results have shown that DYMO protocol has better performance than AODV and OLSR protocols.Peer ReviewedPostprint (published version

    Evaluating tutor training for online PBL teamwork courses in first year engineering

    Get PDF
    The use of Problem-based Learning and other collaborative pedagogies in undergraduate engineering courses is recommended by a plethora of learning theory and research on educational best-practice, particularly for Applied Sciences such as Medicine and Engineering. One barrier to implementing and sustaining these curricular and pedagogical approaches lies in the development of the appropriate knowledge and skills and a consistent and appropriate approach in the teaching team. A significant change from the traditional pedagogies employed by tutors and the training of tutors is required, if PBL and similar methods are to be effective in delivering their numerous affordances, especially in asynchronous online environments for distance learning. This paper describes the development of a strategy to train engineering tutors in online PBL facilitation, and the evaluation framework used to assess the effectiveness of this training. Results of the evaluation of training and subsequent behavioural changes of the tutors are given. The evaluation revealed a variance between the message of the training and subsequent practice. Recommendations are made about the need for ongoing tutor development and support, and the necessity of evaluation in the implementation of PBL pedagogies

    A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks

    Full text link
    We consider a simple, yet widely studied, set-up in which a Fusion Center (FC) is asked to make a binary decision about a sequence of system states by relying on the possibly corrupted decisions provided by byzantine nodes, i.e. nodes which deliberately alter the result of the local decision to induce an error at the fusion center. When independent states are considered, the optimum fusion rule over a batch of observations has already been derived, however its complexity prevents its use in conjunction with large observation windows. In this paper, we propose a near-optimal algorithm based on message passing that greatly reduces the computational burden of the optimum fusion rule. In addition, the proposed algorithm retains very good performance also in the case of dependent system states. By first focusing on the case of small observation windows, we use numerical simulations to show that the proposed scheme introduces a negligible increase of the decision error probability compared to the optimum fusion rule. We then analyse the performance of the new scheme when the FC make its decision by relying on long observation windows. We do so by considering both the case of independent and Markovian system states and show that the obtained performance are superior to those obtained with prior suboptimal schemes. As an additional result, we confirm the previous finding that, in some cases, it is preferable for the byzantine nodes to minimise the mutual information between the sequence system states and the reports submitted to the FC, rather than always flipping the local decision

    Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents

    Get PDF
    Intelligent agents are an advanced technology utilized in Web Intelligence. When searching information from a distributed Web environment, information is retrieved by multi-agents on the client site and fused on the broker site. The current information fusion techniques rely on cooperation of agents to provide statistics. Such techniques are computationally expensive and unrealistic in the real world. In this paper, we introduce a model that uses a world ontology constructed from the Dewey Decimal Classification to acquire user profiles. By search using specific and exhaustive user profiles, information fusion techniques no longer rely on the statistics provided by agents. The model has been successfully evaluated using the large INEX data set simulating the distributed Web environment

    Error resilience analysis of wireless image transmission using JPEG, JPEG 2000 and JPWL

    Get PDF
    The wireless extension of the JPEG 2000 standard formally known as JPWL is the newest international standard for still image compression. Different from all previous standards, this new standard was created specifically for wireless imaging applications. This paper examines the error resilience performance of the JPEG, JPEG 2000 and JPWL standards in combating multi-path and fading impairments in Rayleigh fading channels. Comprehensive objective and subjective results are presented in relation to the error resilience performance of these three standards under various conditions. The major findings in this paper reveal that a CRC approach is not a viable option for protecting wireless image data when not used in conjunction with an efficient retransmission strategy. In addition, the Reed-Solomon error correction codes in JPWL provide strong protection for wireless image transmission. However, any stronger protection beyond RS(64,32) yields diminishing returns
    • …
    corecore