Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Engineering

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr Sep 2012

Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper presents results from a multi-disciplinary conceptual analysis of development theory and practice. It reviews issues raised and proposes a shift in the epistemology of possession towards an epistemology of practice which is guided by the following aspects (1) The consideration of the learning culture of parties involved, (2) the ability and willingness for decontextualisation of the knowledge by the source and (3) the ability to embedded it by recipients (embededness ), (4) the importance that is attached to knowledge of the host country as reflected through (5) Similarity in culture, values, understanding of context and knowledge bases; (6) …


Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo Sep 2012

Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo

Fernando Paulo Belfo

The inadequate specification of requirements remains being indicated as one of the main reasons for the failure of software development projects. A possible explanation for this failure is that requirements management tends to overvalue the technology side of requirements. However, the requirements management depends on other important issues beyond technology which are sometimes neglected. Good requirements are only assured by the right balance of three dimensions: people, organization and technology. Through the lens of each of these three dimensions, this paper reviews significant literature, identifying some of the key issues and concerns about the management of software requirements, particularly the …


Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub May 2012

Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub

Jeremy Straub

A multi-tier, multi-craft mission architecture has been proposed but, despite its apparent promise, limited use and testing of the architecture has been conducted. This paper proposes and details a mission concept and its implementation for testing this architecture in the terrestrial environment. It is expected that this testing will allow significant refinement of the proposed architecture as well as providing data on its suitability for use in both terrestrial and extra-terrestrial applications. Logistical and technical challenges with this testing are discussed.


Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra May 2012

Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

An email virus makes use of the email technology and attaches itself to an email to transfer itself from one computer to another. Some email viruses create and send new emails using the address book of the victim computer. The email viruses are a matter of concern as they can spread very fast via emails to different geographical locations.

The conventional scanners are file based and not good for scanning emails as the emails can contain different types of files as attachments. Besides they cannot detect viruses until the emails are downloaded and opened by the recipient in order to …


Implementing Virus Scanning In Computer Networks, Umakant Mishra May 2012

Implementing Virus Scanning In Computer Networks, Umakant Mishra

Umakant Mishra

Some viruses exploit the features and capabilities of computer networks to spread, operate and damage network environments. For example, the virus may copy itself to other computers in the network or may increase network activities congesting the network traffic. The conventional anti-viruses are not efficient enough to detect and control viruses in a network environment. As they are file based they cannot scan the data while being downloaded from the server.

Most of the drawbacks of conventional scanning are taken care by a firewall-based virus scanning. But this method requires high-end machines to withstand the load of centralized scanning. There …


Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr May 2012

Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr

Dr Deogratias Harorimana

With corporate strategy becoming more and more dependent on speed,focus, innovation and strategy, what can MIS do? and what should be MIS role ? what is the relationship between Corporate Strategy KPI and MIS? These questions are answered in an MBA Management Information Systems at USP. This programme is delivered across the entire Pacific region through the Graduate School of Business. It is my privilege to post here few questions that students who attended one of the course in Nadi, at Tanoa International Hotel had to answer in one of the Quiz test.


Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr Apr 2012

Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper discusses mining and mineral operations in the two countries Papua New Guinea and Solomon Islands with regards to its contribution to the overall Gross domestic Product and the economic development of each country.

Our finding shows that mining is an excellent contributor to economic growth and development as in the case of Papua New Guinea.Tax revenue from PNG Mining industries contributions to the PNG fiscal basket remains strong and growing steadily. The mining and minerals tax revenue remains an important contributor to the government fiscal budget over the last 10 years. This has been a strong contributor to …


Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr Apr 2012

Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr

Dr Deogratias Harorimana

No abstract provided.


Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr Apr 2012

Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr

Dr Deogratias Harorimana

The principal objective of this paper is to review the current Tuna Fisheries Policies in the Solomon Islands with a view to proposing strategies that will maximize Job creation while at the same time address the issues that currently exist in this sector. Although the Tuna Industry’s contribution to GDP is quite significant, the Solomon Island Government (SIG) gets little or close to nothing out of it in the form of revenue and Job creation with the majority of vessels being foreign owned and fishing license fees amongst the lowest in the Pacific. SOLTAI which is partly owned by the …


Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr Apr 2012

Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Solomon Islands is a nation with vast resources with huge potential to excel economically if proper business atmosphere is provided for both private sector development and small and medium enterprises entrepreneurship. Conducive policies that, not only, a mere statement but is broken down to workable strategies with quantitative expected outcome with a strong mentoring mechanism is very important. Previous governments have continuously ignored the importance of having small business policies until lately when NCRA government came up with a set of policies that strategically addresses the significance of small and medium businesses. However, notwithstanding foreign investment is very important in …


Using The Case Study Methodology In Teaching, Deogratias Harorimana Mr Jan 2012

Using The Case Study Methodology In Teaching, Deogratias Harorimana Mr

Dr Deogratias Harorimana

This paper reviews the Why, How, to use the Case Study Methods in MBA teaching. The Presentation was prepared for and delivered as part of MBA students induction Programme in the Graduate School of Business.


Overcoming Limitations Of Signature Scanning -Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Overcoming Limitations Of Signature Scanning -Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

A virus signature is a sequence of bytes that may be found in a virus program code but unlikely to be found elsewhere. Signature scanning is a method of detecting a virus by scanning a target program to detect the presence of any virus signature. If the signature is found then the target program is deemed infected, otherwise the target program is deemed uninfected.

Signature scanning is the most popular method of virus scanning and is adopted by all anti-virus programs. Signature scanning is capable of detecting more than 80% of viruses. It uses a simple logic and uses less …


Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

As the number of viruses increases the amount of time to scan for those viruses also increase. This situation is worsened because of the increasing number of files typically stored in a computer system. Besides more complex tests are required to detect the modern day’s intelligent viruses. Thus a combination of all these factors makes a full virus scan very lingering and resource consuming. With thousands of types of viruses and gigabytes of storages, a typical virus scanning may take several hours. Because of this reason many users don’t like to virus scan their computers unless so required.

This article …


Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

The boot sector virus infects the boot record of the hard disk or floppy disks. It gets loaded onto the memory every time the computer is booted and remains resident in the memory till the computer is shut down. Once entered it alters the boot sector of the hard disk and remains in the hard disk permanently until the system is totally damaged and fails to boot.

While analyzing the problem from TRIZ prospective we try different possibilities to avoid boot sector viruses, such as, Can we do away with boot record? Can we avoid booting from floppies? Can we …


The Gatekeeper And The Knowledge Environment-Who They Are, How They Work Empirical Evidences From High-Tech Manufacturing And R&D Firms, Deogratias Harorimana Jan 2012

The Gatekeeper And The Knowledge Environment-Who They Are, How They Work Empirical Evidences From High-Tech Manufacturing And R&D Firms, Deogratias Harorimana

Dr Deogratias Harorimana

Purpose of the Study: The purpose of this study was to critically study the role of the Knowledge Gatekeeper within the manufacturing and high tech selected case studies and by explaining who they are, how they work and identify and analyse the barriers to knowledge creation and knowledge sharing. Methodology: The research was guided by an inductive approach with a multiple case study strategy. Research instruments included a questionnaire and interviews from respectively 105 and 40 respondents. Findings: In the African Manufacturing context, and in absence of sophisticated technologies and highly qualified personnel, technical knowledge can be obtained from organizational …


Review Of Economics Of Manamagement Information Systems, Deogratias Harorimana Sr Jan 2012

Review Of Economics Of Manamagement Information Systems, Deogratias Harorimana Sr

Dr Deogratias Harorimana

“Information technology is the "digital nervous system" of any business.” (Bill Gates, Chairman, Microsoft Corporation, 1997)

The way business is conducted in this era is phenomenal. Almost everything is a “click” away. The customers are satisfied, businesses are satisfied, Government is satisfied and the entire globe is gratified by the work of information technology (IT). This research discloses the several returns and shortcomings of IT, and how businesses use IT to realize their strategic goals.

The report presents discussion on two organisations, Dell Computer Corporation and Sydney Waters, which had a prosperous and disastrous implementation of IT systems respectively. The …


Using Mis To Deliver Essential Services:Case Of Healthcare Provision Support In Fiji, Deogratias Harorimana Sr Jan 2012

Using Mis To Deliver Essential Services:Case Of Healthcare Provision Support In Fiji, Deogratias Harorimana Sr

Dr Deogratias Harorimana

In comparison to other Pacific Island countries, Fiji’s health system is the most developed amongst Pacific Island countries (UNDP 2006) and has undergone significant change in the last decade. From 1999 – 2009, AusAid, a major donor to Fiji’s health system, has supported two stage health sector improvement programs. The first stage (1999 - 2003) was a management reform program designed to improve decision making by supporting a new model of decentralized management. The second phase (2004 – 2009) looked at improving governance, health systems performance, clinical outcomes and supported public health and infrastructure initiatives at the divisional level (WHO …


Impact Of Crm Systems On Organisational Performance: A Case Study Of Anz Bank, Deogratias Harorimana Sr Jan 2012

Impact Of Crm Systems On Organisational Performance: A Case Study Of Anz Bank, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper reports case study results analysis of the ANZ Bank in the Pacific Region. The case study results show that ANZ has a well-established CRM system supporting its marketing and sales activities, but equally the results indicate mixed scenarios. A positive relationship between CRM to performance was established. That is, it has a positive contribution to the bank’s performance, both financial and non-financial. There is also negative feedback on the bank’s CRM system which illustrates that CRM system can also have negative consequences. CRM success is questionable from a stand-alone perspective. Although there are encouraging results from the use …


Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor Jan 2012

Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor

Hooman Hoodeh

With the advance of Vehicular ad-hoc network, routing protocol has become one of the most important issues in transmitting data among Vehicles. The two routing protocol are DSDV and AODV which DSDV is known as a novel approach in proactive system; however, AODV has good performance in reactive system. In this paper, we compare the efficiency between DSDV & AODV in terms of packet-loss, end-to-end delay and throughput based on given scenarios. The comparison has implemented in various speeds for acquiring result with higher performance. The speeds consist of 5, 20 and 40km/s. then we analyze the explicit results according …


Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk Jan 2012

Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk

Jeremy Straub

No abstract provided.