15 research outputs found

    Device readiness of tablet computer for classroom use

    Get PDF
    Tablet computer is an intriguing piece of device in today’s portable computing technology.It has many potential usages as work machine, educational tool or as entertainment gizmo.One of the potential usages of tablet computer is in education where it has the potential to replace textbook and provide essential tools for learning.It opens up new and exciting methods of delivering knowledge to the student.Although tablet computer is a powerful hardware supported by thousands of applications and games, the implementation readiness of the device is crucial when considering for reliable use of tablet computers in classroom environment.Thus, this paper attempts to discuss issues related to tablet computer implementation readiness for classroom use in term of hardware, cost, software, digital content, infrastructure and security. The potential issues highlighted might hinder the potential of tablet computer to be successfully implemented in classroom environmen

    Feasibility study of using IEEE 802.22 Wireless Regional Area Network (WRAN) in Malaysia

    Get PDF
    This paper introduces the implementation of IEEE 802.22 Wireless Regional Area Network (WRAN) for broadband Internet access in rural areas.It highlights the advantage of implementing such technology and feasibility to co-exist with Digital Video Broadcasting-Terrestrial (DVB-T) in Malaysia. It adopts a model to determine the maximum number of WRAN base stations (BSs) by analyzing its co-channel interference between the BSs. The analysis shown that maximum WRAN BSs that could co-exist is 8 to 19 BSs outside the protection contour of the DVB-T BS. Coverage areas of 30-100 km will also feasible to co-exist. By implementing the IEEE 802.22 WRAN, the digital divide can be narrowed and broadband penetration would be increased

    CogRadNet: Ubiquitous heterogeneous wireless networks

    Get PDF
    Mobile radio systems have shown rapid growth and hence increase the awareness for more efficient use of spectrum. With the advancements of technology, the development of radio systems that is dynamic and efficient in terms of spectrum usage can be realized. Cognitive radio system is one of the advancement that enhanced the adaptive capabilities of the systems that make the usage of spectrum more efficient, versatile and flexible. It also able to adapt their operations based on its internal and external factors by sensing its environment. The cognitive radio systems may be a solution for the spectrum scarcity faced by developer to tackle the issue of signal propagation and bigger coverage for broadband internet access. This paper will addressed the cognitive radio technology for ubiquitous broadband wireless internet access

    Layered multicast : Performance study of round trip time estimation for TCP-equation model

    Get PDF
    TCP-friendly layered multicast protocol employs TCP-equation model to estimate target reception rate.One of the parameter of a TCP-equation model is round trip time (RTT).The accuracy of RTT estimation affects the accuracy of target rate estimation and the protocol friendliness towards TCP flows.However, estimating RTT in a large multicast session is problematic due to implosion problems. Consequently, a typical acknowledgement technique is not suitable for layered multicast protocol.Estimating RTT without receiversâ feedback (acknowledgement) will not produce accurate RTT.These have resulted to a number of RTT estimation techniques have been proposed.This research intends to study the current RTT estimation techniques for layered multicast and evaluate their performance

    A survey of cellular IP in the next generation of network protocol

    Get PDF
    The main objective of mobility management in wireless data communication is to allows networks to search and locate (location management) mobile users while maintaining it’s connections (handoff management) whenever users move into a new network. Management of location and handoff divided into macromobility (for managing inter-domain network) and micromobility (for managing intra-domain network).For macromobility management, IETF has adopted Mobile IP and had perform very well for managing inter-domain mobility.However Mobile IP suffer from handover performance in intradomain network which is inefficient for mobile user with frequent handoff. For this defect,cellular IP protocol has been considered for managing intra-domain network for it’s fast handoff and interoperability with Mobile IP. This paper we present a review of different micro-mobility management protocols available to date. We also discuss various issues and challenges regarding mobility management for the next generation network protocol

    Server-based open system implementation for ICOSYS (ICOSYS2)

    Get PDF
    Information and communication services are developed to enhance the utilization of the ICT infrastructure.These services can be implemented either using proprietary or open source software platforms.This work focuses on the implementation of the open source services at the Faculty of Information Technology (FTM), Universiti Utara Malaysia. The study is part of the ICOSYS research intitiative.The underlying vision of ICOSYS2 is to create a conducive and efficient working environment using open source technologies.ICOSYS2 consists of four basic services that comprises file storage, application, printing and backup services.Firstly, ICOSYS2 files and storage services provide users with the ability of centrally storing and sharing data.Secondly, the ICOSYS2 application services provide access to the world of Linux-based open source applications.Thirdly, ICOSYS2 printing services allow users to send their print jobs to respective printers across the FTM network and pave the way for centralized printing administration.Finally, the ICOSYS2 backup services outlines a tertiary mean to backup the users' data.It is hoped the implementation of this ICOSYS2 project can facilitate academic and administrative tasks at FTM

    Issues of commercialization activities of biotechnology related researches in Malaysian research university

    Get PDF
    This study aims to explore issues of commercialization activities of research results among academic researchers who work in biotechnology related researches in Malaysian Research University. Accordingly, the conceptual framework based on ‘Innovation Implementation’ model has been assessed for its applicability in describing the phenomenon under study. Through interviews, elements as specified in the ‘Innovation Implementation’ model were found in this case study. Significant patterns and themes were also identified that suggest local industries, funding for research, development and commercialization as well as leadership, political interference, researcher’s attitude, transition management and legal are considered as the contextual factors that affect the commercialization activities of research results. Finally, the revised framework of commercialization activities implementation based on the findings from qualitative analysis was recommended

    Temporal dynamics modelling for aggression level of victims in disaster evacuation center

    Get PDF
    Natural disaster such as flood, earthquake, and typhoon poses a serious threat for humanity. However, post disaster is the hardest part to deal with. Assisting survivors who are looking for help always poses big challenges for volunteers to handle, especially when the number of victims is high.In this stage, emotional state of the victims is often unstable; and therefore, controlling them becomes a difficult task. This paper explained the idea of modelling individuals’ aggression levels in evacuation centers for floods (or any other natural disasters) victims. It described the development of a formal model that can be used as a base for building an intelligent agent or other types of software that can be helpful in training volunteers to handle victim’s aggressive.This will enhance the effectiveness of the volunteer work, thus improving the environment in the evacuation centers

    Security measurement as a trust in cloud computing service selection and monitoring

    Get PDF
    With the increase in the number of cloud service offerings by the cloud service providers nowadays, selecting the appropriate service provider becomes difficult for customers. This is true since most of the cloud service providers offer almost similar services at different costs. Thus, making cloud service selection a tedious process for customers. The selection of the cloud services from the security standpoint needs a distinct consideration from both the academia and the industry. Security is an important factor in cloud computing. Thus, any exploited vulnerability will have a negative effect on cloud computing adoption by customers. Hence, little attention has been paid to cloud service monitoring and selection from a security perspective. To solve this issue, we propose a security measurement as a trust (SMaaT) in the cloud computing selection. Finally, we propose Analytical Hierarchical Process (AHP) for service selection from the customers’ perspective
    corecore