A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
The higher education has been greatly impacted by worldwide trends. In a result, the universities throughout the world are focusing to enhance performance and efficiency in their workings. Therefore, the higher education has moved their systems to Enterprise Resource Planning (ERP) systems to cope with the needs of changing environment. However, the literature review indicates that there is void on the evaluation of success or failure of ERP systems in higher education Institutes in Pakistan.arXiv:1402.0116v1 fatcat:3or25yo3mndwfkw5wz7czoy67a
more »... overall, ERP systems implementation in higher education of Pakistan has not been given appropriate research focus. Thus, in this paper the authors have attempted to develop a conceptual framework for ERP evaluation in Universities of Pakistan. This seeks to expand the knowledge on ERP in higher educational institutes of Pakistan and focuses on understanding the ERP related critical success factors.
Evaluating the Adoption of Enterprise Application Integration in Health-Care Organizations KHALIL KHOUMBATI, MARINOS THEMISTOCLEOUS, AND ZAHIR IRANI KHALIL KHOUMBATI is a Researcher in the Department of ... All are using different IT hardware and 98 KHOUMBATI, THEMISTOCLEOUS, AND IRANI software applications. ...doi:10.2753/mis0742-1222220404 fatcat:cr3ulq3q4vaixe2dptnghswtki
Context-aware adaptation is a central aspect of pervasive computing applications, enabling them to adapt and perform tasks based on contextual information. One of the aspects of context-aware adaptation is reconfiguration in which bindings are created between application component and remote services in order to realize new behaviour in response to contextual information. Various research efforts provide reconfiguration support and allow the development of adaptive context-aware applicationsdoi:10.5121/iju.2011.2303 fatcat:owjihufl35dvfgna5d56xfmldi
more »... m high-level specifications, but don't consider failure conditions that might arise during execution of such applications, making bindings between application and remote services invalid. To this end, we propose and implement our design approach to reconfiguration to manage invalid bindings. The development and modification of adaptive context-aware applications is a complex task, and an issue of an invalidity of bindings further complicates development efforts. To reduce the development efforts, our approach provides an application-transparent solution where the issue of the invalidity of bindings is handled by our system, Policy-Based Contextual Reconfiguration and Adaptation (PCRA), not by an application developer. In this paper, we present and describe our approach to managing invalid bindings and compare it with other approaches to this problem. We also provide performance evaluation of our approach.
The research in Wireless Sensor Networks (WSNs) have increasingly been done since many year for its application-specific utilization. Depending on the environment, WSNs have been deployed for the sake data sensing, gathering and transmitting it to the nearest sink. Usually, the WSNs are small in size with limited computational capabilities. Therefore, an efficient routing scheme determine the usage of battery having minimal power. In this study, we develop a scenario with the deployment ofdoaj:1f438ebbe90f41bea44d6ab439ce934b fatcat:zi6u5mo3kzh33l3pohgscrjpom
more »... r nodes and sinks in the WSNs field. The sensor nodes are connected to the nearest possible sink. Then, we apply Genetic Algorithm (GA) with some basic modifications for the evaluation and optimization of the distance and energy consumption. If any node sensed the data and the path is optimized then the distance is reduced by multi-hop scheme, the lifetime of the sensor network is considerably maximized. Multi-hop routing scheme has an edge over the single hop or direct routing scheme where minimal energy is consumed in transmitting the data towards the nearest sink. For the sake of simulation, a variable number of sensor nodes with one or more sinks are deployed and the results are done in MATLAB. Further, these results are compared with TEEN (threshold sensitive energy efficient sensor network) protocol.
Optical character recognition is a technique that is used to recognized printed and handwritten text into editable text format. There has been a lot of work done through this technology in identifying characters of different languages with variety of scripts. In which Latin scripts with isolated characters (non-cursive) like English are easy to recognize and significant advances have been made in the recognition; whereas, Arabic and its related cursive languages like Urdu have more complicateddoaj:3e929bf8090a4c898866ea13725f0d83 fatcat:ll3mx3uujjftbpordvylpwgj2q
more »... nd intermingled scripts, are not much worked. This paper discusses a detail of various scripts of Urdu language also discuss issues and challenges regarding Urdu OCR. due to its cursive nature which include cursiveness, more characters dots, large set of characters for recognition, more base shape group characters, placement of dots, ambiguity between the characters and ligatures with very slight difference, context sensitive shapes, ligatures, noise, skew and fonts in Urdu OCR. This paper provides a better understanding toward all the possible engendering dilemmas related to Urdu character recognition.
Managing interference in the multi-radio networks is critical challenge; problem becomes even more serious in 2.4 GHz band due to minimal availability of orthogonal channels. This work attempts to propose a channel assignment scheme for interference zones of 2.4 GHz backhaul of Wireless Mesh Networks (WMN). The static nodes of Infrastructure based Backhaul employing directional antennas to connect static nodes, orthogonal channel zones introducing Interference are formatted with the selectiondoi:10.30537/sjcms.v5i2.817 fatcat:7p6kzfvv2bdihpexpsj3n3garm
more »... single tire direct hop and two tier directional hopes. The effort maintain the orthogonality of channels on system thus reduce the co-channel interference between inter flow and intra flow links. Group of non-overlapping channels of selected band are obtained by a mathematical procedure, interference is modeled by directed graph and Channel assignment is carried out with the help of greedy algorithms. Experimental analysis of the technical proposal is done by simulation through OPNET 14. Our framework can act as an imperative way to enhance the network performance resulting a leading improvement in system throughput and reduction in system delay
Khoumbati et al. The factor Barriers show equilibrium steady-state fixed point reaches within iteration 7. ... ., (2001) and Puschmann and Alt, (2004) estimate that for x applications, a total of x*(x-1)/2 interconnections are Khoumbati et al. ...doi:10.1108/17506160710778077 fatcat:eeo6fr6nava75lnonyjxeglxaq
Purpose: Identity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud management practices in online retail context. Therefore, this study aims at investigating the identity fraud management practices and presents a comprehensive set of practices for e-tail sector. Methodology: A systematic literature review approach was adopted, and the articles were selected through pre-setdoi:10.1108/jeim-06-2018-0110 fatcat:iaxm7ns3zna4fekupuup6cmjoa
more »... sion criteria. We synthesised existing literature to investigate identity fraud management in e-tail sector. Findings: The research finds that literature on practices for identity fraud management is scattered. Findings also reveal that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds. This research suggests e-tailers to deal this issue as a management challenge and counter strategies should be developed in technological, human and organisational aspects. Research limitations: This study is limited to the published sources of data. Studies, based on empirical data, will be helpful to support the argument of this study, additionally future studies are recommended to include a wide number of databases. Originality: This research makes unique contributions by synthesising existing literature at each stage of fraud management and encompasses social, organisational and technological aspects. It will also help academicians understanding a holistic view of available research and opens new lines for future research. Practical implications: This research will help e-tail organisations to understand the whole of identity fraud management and help them develop and implement a comprehensive set of practices at each stage, for effective management identity frauds.
This paper empirically examines the impact of socioeconomic determinants upon the adoption of a recent UK e-Government initiative, the "Government Gateway". Five socio-economic characteristics that provide insights to Government Gateway adopters and non-adopters, as they were identified from the literature review used in this study. These included age, gender, education, income and occupation. The data on these variables was collected on a nationwide scale employing a postal survey. Adoi:10.1504/eg.2006.010801 fatcat:lzf3bablgjh3pesgthlevk2hky
more »... istered questionnaire was sent to 1600 households with a total of 358 responses obtained from the respondents. The findings of this research suggest that the three variables of age, gender and occupation significantly differentiated the adopters from the nonadopters of the Government Gateway, whilst education and income were found to be non-significant. The implications of the findings are discussed in the context of promoting the adoption of emerging ICT technologies such as broadband and reducing the digital divide against less privileged parts of the population.
In higher education mobile devices are being used as vital educational technology component. Mobile devices in education make it possible for students to get knowledge, work in partnership, and contribute to thoughts among each other. Thus, the intend of this work is to investigate and recognize the vital facts that influence users' behavioral intension to accept m-learning with the particular focus in Sindh province and to explore in-depth understanding of users perceptive of m-learning. Thedoaj:003ebb4d19cc4530a126c4dc54ac6532 fatcat:he4v2ykikvgplbcsysioxxtzty
more »... search framework is grounded on technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT). According to the proposed intangible construction, behavioral intension to accept m-learning can be determined through exploratory variables such as perceived usefulness (PU), Perceived ease of use (PEOU), m-learning self-Efficacy (MLSE), Social influence (SI) and performance expectancy (PE). The conceptual framework is validated through SPSS version 21, based on the sample data of the responses.
Khoumbati et al.  developed a model for the evaluation of EAI in healthcare organizations. ... Khoumbati et al.  developed a model for the evaluation of EAI in healthcare organizations. ... ABOUT THE AUTHORS Professor Khalil Khoumbati is a professor at the Institute of Information Technology, University of Sindh, Pakistan. ...doi:10.17705/1cais.02205 fatcat:s54e3kusozd2dj5l23vdrki274
He has edited special issue journals, and publishes his scholarly work in leading journals that include: Professor Khalil Khoumbati is a professor at the Institute of Information Technology, University ... Factors that Support EAI Adoption in Healthcare Organizations (MAESTRO) - Source: Khoumbati et al.  The model proposed by Khoumbati et al.  is based on a factor-oriented approach, which ... Many private and public organisations have deployed EAI solutions [Irani et al. 2003] , with the healthcare sector having recently realised its effectiveness and functionality [Khoumbati et al. 2006 ...doi:10.17705/1cais.02206 fatcat:l5rleekdkzdu3fhhiral6xuypq
WSN (Wireless Sensor Network) comprises of small-sized and constraint-capability SN (Sensor Nodes) which record, send and receive data, sensed to a sink. The network lifetime and energy usability are important challenges to be dealt with. During the working of the SN, the maximum amount of energy is consumed than sensing and processing of data. Therefore, an efficient transmission of the data is required so that the energy can be saved. In this paper, a novel routing and scheduling method fordoi:10.22581/muet1982.1904.06 fatcat:qlhuqb33qraojng5tm3fxszt7a
more »... Ns using GA (Genetic Algorithm) is presented, where the sinks employed on four sides of the sensor field. These sinks collect the data from the SNs having the optimal distance towards the respective sink. The proposed scheme finds the optimized path using GA, during transmission of data from SN to the nearest sink. First, we run the GA for determination of routing paths, where a source SN finds the possible number of optimal hops. Second, the hops or intermediate relay SNs are assumed to relay the data towards the sink, efficiently. The performance is experimented and evaluated using MATLAB R2016b. The simulations have carried out through comparing the proposed scheme with TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The results of simulation comprise of 10 and 20 number of SNs, discretely. Additionally, the direct distance of each node is calculated and the distance through multiple hops from/to the nearest sink is also evaluated. The achievements of the proposed technique are to save both energy and distance for the sake of network longevity and optimal and precise data delivery by multiple hops.
The main idea of this research is to develop the conceptual framework for the learning use of social network tools among undergraduate students of Sindh university. The development of the framework is based on different factors that are adopted from previous tested research theories. The impact of conceptual model is basically examining the Student's perceptions, EOU, Self-efficacy & their interaction towards Social media tools. Based on the previous studies and tested theories in the field ofdoaj:1085ed5867e94dd389a759f90c7707ea fatcat:bbwclcor4bc35pazryz3ndra2e
more »... IS/IS a conceptual model of social media as active learning strategy has been developed. To test & validate the Framework empirically the positivist research approach has been used to quantitatively analyze the data. As firstly, the framework has been developed through various investigation in the field of literature and then it became finalized by the experts. The initial step to start with various previous research theories with the help of literature review process, by investigating the use of different theories the technology acceptance model has established to determine the Student's perceptions, ease of use, Self-efficacy and their participation in social network sites, in this phenomena the questionnaire developed to test the framework. Further the data were statistically analyzed by means and St. Deviations to test the pilot results.
Nowadays, advancements in mobile technology have boosted the utilization of mobile-based health technologies referred as mobile health. The Goal of these systems is to providing quick response regarding person's health condition. The Rising acceptance of mobile phones constructs the recent opportunities of "pervasive health". Recent numerous mobile-based monitoring systems those are designed, with the ability to compute a broad range of physiological signals. Mobile devices have enhanced thedoaj:1a0b844f5675445c9d235df907b97763 fatcat:4xs3474yunferm4cealpz4mufy
more »... ess of health information for patients and healthcare provider. It delivers timely healthcare reminder to patients. These devices are giving healthcare facilities at low cost. Although, with all these are several problems and challenges in the deployment of mobile healthcare applications. In this paper, issues, challenges and problems are described regarding mobile healthcare applications.
« Previous Showing results 1 — 15 out of 23 results