285,561 research outputs found
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment
Implementation of CAVENET and its usage for performance evaluation of AODV, OLSR and DYMO protocols in vehicular networks
Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour nodes. In this paper, we present a simulation system for VANET called CAVENET (Cellular Automaton based VEhicular NETwork). In CAVENET, the mobility patterns of nodes are generated by an 1-dimensional cellular automata. We improved CAVENET and implemented some routing protocols. We investigated the performance of the implemented routing protocols by CAVENET. The simulation results have shown that DYMO protocol has better performance than AODV and OLSR protocols.Peer ReviewedPostprint (published version
Evaluating tutor training for online PBL teamwork courses in first year engineering
The use of Problem-based Learning and other collaborative pedagogies in undergraduate engineering courses is recommended by a plethora of learning theory and research on educational best-practice, particularly for Applied Sciences such as Medicine and Engineering. One barrier to implementing and sustaining these curricular and pedagogical approaches lies in the development of the appropriate knowledge and skills and a consistent and appropriate approach in the teaching team. A significant change from the traditional pedagogies employed by tutors and the training of tutors is required, if PBL and similar methods are to be effective in delivering their numerous affordances, especially in asynchronous online environments for distance learning. This paper describes the development of a strategy to train engineering tutors in online PBL facilitation, and the evaluation framework used to assess the effectiveness of this training. Results of the evaluation of training and subsequent behavioural changes of the tutors are given. The evaluation revealed a variance between the message of the training and subsequent practice. Recommendations are made about the need for ongoing tutor development and support, and the necessity of evaluation in the implementation of PBL pedagogies
A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks
We consider a simple, yet widely studied, set-up in which a Fusion Center
(FC) is asked to make a binary decision about a sequence of system states by
relying on the possibly corrupted decisions provided by byzantine nodes, i.e.
nodes which deliberately alter the result of the local decision to induce an
error at the fusion center. When independent states are considered, the optimum
fusion rule over a batch of observations has already been derived, however its
complexity prevents its use in conjunction with large observation windows.
In this paper, we propose a near-optimal algorithm based on message passing
that greatly reduces the computational burden of the optimum fusion rule. In
addition, the proposed algorithm retains very good performance also in the case
of dependent system states. By first focusing on the case of small observation
windows, we use numerical simulations to show that the proposed scheme
introduces a negligible increase of the decision error probability compared to
the optimum fusion rule. We then analyse the performance of the new scheme when
the FC make its decision by relying on long observation windows. We do so by
considering both the case of independent and Markovian system states and show
that the obtained performance are superior to those obtained with prior
suboptimal schemes. As an additional result, we confirm the previous finding
that, in some cases, it is preferable for the byzantine nodes to minimise the
mutual information between the sequence system states and the reports submitted
to the FC, rather than always flipping the local decision
Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents
Intelligent agents are an advanced technology utilized in Web Intelligence. When searching information from a distributed Web environment, information is retrieved by multi-agents on the client site and fused on the broker site. The current information fusion techniques rely on cooperation of agents to provide statistics. Such techniques are computationally expensive and unrealistic in the real world. In this paper, we introduce a model that uses a world ontology constructed from the Dewey Decimal Classification to acquire user profiles. By search using specific and exhaustive user profiles, information fusion techniques no longer rely on the statistics provided by agents. The model has been successfully evaluated using the large INEX data set simulating the distributed Web environment
Error resilience analysis of wireless image transmission using JPEG, JPEG 2000 and JPWL
The wireless extension of the JPEG 2000 standard formally known as JPWL is the newest international standard for still image compression. Different from all previous standards, this new standard was created specifically for wireless imaging applications. This paper examines the error resilience performance of the JPEG, JPEG 2000 and JPWL standards in combating multi-path and fading impairments in Rayleigh fading channels. Comprehensive objective and subjective results are presented in relation to the error resilience performance of these three standards under various conditions. The major findings in this paper reveal that a CRC approach is not a viable option for protecting wireless image data when not used in
conjunction with an efficient retransmission strategy. In addition, the Reed-Solomon error correction codes in JPWL provide strong protection for wireless image transmission. However, any stronger protection beyond RS(64,32) yields diminishing returns
- …