Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

SelectedWorks

Discipline
Keyword
Publication

Articles 1 - 30 of 41

Full-Text Articles in Computer Engineering

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Efficient Delay And Energy Based Routing In Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Muhammad Sher, Muhammad Khalil Afzal Oct 2012

Efficient Delay And Energy Based Routing In Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Muhammad Sher, Muhammad Khalil Afzal

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are multi-hop, dynamic and self-configurable networks, which can communicate without any infrastructure support. Most of the research in CRAHNs has been already carried out on physical and media access control layers, but without effective routing protocols we cannot take full advantage of CRAHNs. In this paper, we discuss the problems in already proposed routing protocols for cognitive radio networks and proposed a novel protocol: Delay and Energy based Spectrum Aware Routing Protocol (DESAR), which consider both delay and energy for the computation of efficient path between source and destination. Simulation results show that DESAR …


Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp Oct 2012

Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp

Eric Copp

The DNA Safeguard project involves processing DNA sequence data in order to find nullomer sequences (non-existent short DNA sequences). While the fundamental algorithm for finding nullomer sequences is simple, it is complicated by the amount of data that must be handled. Four methods for handling terabytes of of data are investigated, single instance of a MySQL database, PVFS (Parallel Virtual File System), Hadoop, and a custom MPI (Message Passing Interface) program.


Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr Sep 2012

Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper presents results from a multi-disciplinary conceptual analysis of development theory and practice. It reviews issues raised and proposes a shift in the epistemology of possession towards an epistemology of practice which is guided by the following aspects (1) The consideration of the learning culture of parties involved, (2) the ability and willingness for decontextualisation of the knowledge by the source and (3) the ability to embedded it by recipients (embededness ), (4) the importance that is attached to knowledge of the host country as reflected through (5) Similarity in culture, values, understanding of context and knowledge bases; (6) …


Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo Sep 2012

Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo

Fernando Paulo Belfo

The inadequate specification of requirements remains being indicated as one of the main reasons for the failure of software development projects. A possible explanation for this failure is that requirements management tends to overvalue the technology side of requirements. However, the requirements management depends on other important issues beyond technology which are sometimes neglected. Good requirements are only assured by the right balance of three dimensions: people, organization and technology. Through the lens of each of these three dimensions, this paper reviews significant literature, identifying some of the key issues and concerns about the management of software requirements, particularly the …


Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess Jul 2012

Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess

M Ryan Hess

DePaul University's Library Web Services team investigated the potential of Springshare CampusGuides for serving as a web content management system. The team overrode system CSS, added JQuery libraries and features, integrated an external SQL database into the site and leveraged the workflows and functionalities of Campus Guides to make it a more powerful WCMS.


Controlling Virus Infections In Internet And Web Servers A Triz Based Analysis, Umakant Mishra Jun 2012

Controlling Virus Infections In Internet And Web Servers A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The viruses not only infect the stand-alone machines or client machines but also infect the web servers. When the web servers are infected with viruses, they disseminate infected content and thereby infect the client computers. The conventional anti-virus programs can run only on one machine. There is no way that an anti-virus in the client machine can determine whether the content of a website is virus safe or not. Hence, different methods are implemented to prevent the client computer from being infected by the infected content of a web server.

One proposed efficient method is to get scanned by the …


Inventions On Generic Detection Of Computer Viruses -A Triz Based Analysis, Umakant Mishra Jun 2012

Inventions On Generic Detection Of Computer Viruses -A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The conventional methods of signature scanning and heuristic testing depend on prior knowledge of individual virus signatures and virus behaviors. Hence these methods are capable of detecting only the known viruses or viruses behaving in known ways. Hence, these methods cannot detect the viruses unless they are created, released and infected the innocent users. This situation creates the need for generic detectors that can detect even the new and unknown viruses.

The generic scanning methods, in contrast, don’t depend on individual virus signatures or behaviors. Hence they are better applicable to detect the new and unknown viruses and viruses of …


Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub May 2012

Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub

Jeremy Straub

A multi-tier, multi-craft mission architecture has been proposed but, despite its apparent promise, limited use and testing of the architecture has been conducted. This paper proposes and details a mission concept and its implementation for testing this architecture in the terrestrial environment. It is expected that this testing will allow significant refinement of the proposed architecture as well as providing data on its suitability for use in both terrestrial and extra-terrestrial applications. Logistical and technical challenges with this testing are discussed.


Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra May 2012

Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

An email virus makes use of the email technology and attaches itself to an email to transfer itself from one computer to another. Some email viruses create and send new emails using the address book of the victim computer. The email viruses are a matter of concern as they can spread very fast via emails to different geographical locations.

The conventional scanners are file based and not good for scanning emails as the emails can contain different types of files as attachments. Besides they cannot detect viruses until the emails are downloaded and opened by the recipient in order to …


Implementing Virus Scanning In Computer Networks, Umakant Mishra May 2012

Implementing Virus Scanning In Computer Networks, Umakant Mishra

Umakant Mishra

Some viruses exploit the features and capabilities of computer networks to spread, operate and damage network environments. For example, the virus may copy itself to other computers in the network or may increase network activities congesting the network traffic. The conventional anti-viruses are not efficient enough to detect and control viruses in a network environment. As they are file based they cannot scan the data while being downloaded from the server.

Most of the drawbacks of conventional scanning are taken care by a firewall-based virus scanning. But this method requires high-end machines to withstand the load of centralized scanning. There …


Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr May 2012

Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr

Dr Deogratias Harorimana

With corporate strategy becoming more and more dependent on speed,focus, innovation and strategy, what can MIS do? and what should be MIS role ? what is the relationship between Corporate Strategy KPI and MIS? These questions are answered in an MBA Management Information Systems at USP. This programme is delivered across the entire Pacific region through the Graduate School of Business. It is my privilege to post here few questions that students who attended one of the course in Nadi, at Tanoa International Hotel had to answer in one of the Quiz test.


Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr Apr 2012

Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper discusses mining and mineral operations in the two countries Papua New Guinea and Solomon Islands with regards to its contribution to the overall Gross domestic Product and the economic development of each country.

Our finding shows that mining is an excellent contributor to economic growth and development as in the case of Papua New Guinea.Tax revenue from PNG Mining industries contributions to the PNG fiscal basket remains strong and growing steadily. The mining and minerals tax revenue remains an important contributor to the government fiscal budget over the last 10 years. This has been a strong contributor to …


Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr Apr 2012

Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr

Dr Deogratias Harorimana

No abstract provided.


Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr Apr 2012

Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr

Dr Deogratias Harorimana

The principal objective of this paper is to review the current Tuna Fisheries Policies in the Solomon Islands with a view to proposing strategies that will maximize Job creation while at the same time address the issues that currently exist in this sector. Although the Tuna Industry’s contribution to GDP is quite significant, the Solomon Island Government (SIG) gets little or close to nothing out of it in the form of revenue and Job creation with the majority of vessels being foreign owned and fishing license fees amongst the lowest in the Pacific. SOLTAI which is partly owned by the …


Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr Apr 2012

Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Solomon Islands is a nation with vast resources with huge potential to excel economically if proper business atmosphere is provided for both private sector development and small and medium enterprises entrepreneurship. Conducive policies that, not only, a mere statement but is broken down to workable strategies with quantitative expected outcome with a strong mentoring mechanism is very important. Previous governments have continuously ignored the importance of having small business policies until lately when NCRA government came up with a set of policies that strategically addresses the significance of small and medium businesses. However, notwithstanding foreign investment is very important in …


Using The Case Study Methodology In Teaching, Deogratias Harorimana Mr Jan 2012

Using The Case Study Methodology In Teaching, Deogratias Harorimana Mr

Dr Deogratias Harorimana

This paper reviews the Why, How, to use the Case Study Methods in MBA teaching. The Presentation was prepared for and delivered as part of MBA students induction Programme in the Graduate School of Business.


Pss And Tcsc Damping Controller Coordinated Design Using Gsa, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, Mohammad Khajehzadeh Jan 2012

Pss And Tcsc Damping Controller Coordinated Design Using Gsa, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, Mohammad Khajehzadeh

Dr. Mahdiyeh Eslami (مهدیه اسلامی)

No abstract provided.


Overcoming Limitations Of Signature Scanning -Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Overcoming Limitations Of Signature Scanning -Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

A virus signature is a sequence of bytes that may be found in a virus program code but unlikely to be found elsewhere. Signature scanning is a method of detecting a virus by scanning a target program to detect the presence of any virus signature. If the signature is found then the target program is deemed infected, otherwise the target program is deemed uninfected.

Signature scanning is the most popular method of virus scanning and is adopted by all anti-virus programs. Signature scanning is capable of detecting more than 80% of viruses. It uses a simple logic and uses less …


Solving Virus Problems By Anti-Virus Developers- A Triz Perspective, Umakant Mishra Jan 2012

Solving Virus Problems By Anti-Virus Developers- A Triz Perspective, Umakant Mishra

Umakant Mishra

The anti-virus developers play a very significant role in dealing with the computer viruses. They analyze the problems of different levels of users and find solutions for each of those problems. Their goal is not just to sell the product and make profit out of it. They undertake much greater responsibility to ensure that their product meets the expectations of the users and deals with the viruses efficiently.

Different levels of users dealing with computer face different types of problems. The developer must ensure that the product meets the needs of various levels of users and network administrators. The developer …


Detecting Macro Viruses - A Triz Based Analysis, Umakant Mishra Jan 2012

Detecting Macro Viruses - A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The macro viruses are easy to create but difficult to detect. Even for a virus scanner it is difficult to decide which macro is a virus and which macro is not, as a user macro may also create files, send emails and do all such activities that a macro virus can do. It is difficult to differentiate a genuine macro and a virus macro as both of them do similar type of jobs. Suspecting a macro to be virus just because it is “writing to a file” may result in false positives. It is necessary to improve the emulation method, …


Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

As the number of viruses increases the amount of time to scan for those viruses also increase. This situation is worsened because of the increasing number of files typically stored in a computer system. Besides more complex tests are required to detect the modern day’s intelligent viruses. Thus a combination of all these factors makes a full virus scan very lingering and resource consuming. With thousands of types of viruses and gigabytes of storages, a typical virus scanning may take several hours. Because of this reason many users don’t like to virus scan their computers unless so required.

This article …


Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

The boot sector virus infects the boot record of the hard disk or floppy disks. It gets loaded onto the memory every time the computer is booted and remains resident in the memory till the computer is shut down. Once entered it alters the boot sector of the hard disk and remains in the hard disk permanently until the system is totally damaged and fails to boot.

While analyzing the problem from TRIZ prospective we try different possibilities to avoid boot sector viruses, such as, Can we do away with boot record? Can we avoid booting from floppies? Can we …


Nachhaltiges It-Management Im Konzern - Von Den Unternehmenszielen Zur Leistungserbringung Der It, Michael Nilles, Enrico Senger Jan 2012

Nachhaltiges It-Management Im Konzern - Von Den Unternehmenszielen Zur Leistungserbringung Der It, Michael Nilles, Enrico Senger

Enrico Senger

Der Schindler-Konzern ist ein global führender Hersteller von Aufzügen, Fahrtreppen und Fahrsteigen. Der zentrale Wertbeitrag seiner ITOrganisation liegt in der effektiven und effizienten Unterstützung der Unternehmensziele mit Mitteln der Informationstechnologie. Dieser Beitrag illustriert, wie die Schindler Group IT die Instrumente des strategischen Informationsmanagements nutzt, um die Leistungserbringung an den Unternehmenszielen der Gruppe auszurichten.


The Gatekeeper And The Knowledge Environment-Who They Are, How They Work Empirical Evidences From High-Tech Manufacturing And R&D Firms, Deogratias Harorimana Jan 2012

The Gatekeeper And The Knowledge Environment-Who They Are, How They Work Empirical Evidences From High-Tech Manufacturing And R&D Firms, Deogratias Harorimana

Dr Deogratias Harorimana

Purpose of the Study: The purpose of this study was to critically study the role of the Knowledge Gatekeeper within the manufacturing and high tech selected case studies and by explaining who they are, how they work and identify and analyse the barriers to knowledge creation and knowledge sharing. Methodology: The research was guided by an inductive approach with a multiple case study strategy. Research instruments included a questionnaire and interviews from respectively 105 and 40 respondents. Findings: In the African Manufacturing context, and in absence of sophisticated technologies and highly qualified personnel, technical knowledge can be obtained from organizational …


Review Of Economics Of Manamagement Information Systems, Deogratias Harorimana Sr Jan 2012

Review Of Economics Of Manamagement Information Systems, Deogratias Harorimana Sr

Dr Deogratias Harorimana

“Information technology is the "digital nervous system" of any business.” (Bill Gates, Chairman, Microsoft Corporation, 1997)

The way business is conducted in this era is phenomenal. Almost everything is a “click” away. The customers are satisfied, businesses are satisfied, Government is satisfied and the entire globe is gratified by the work of information technology (IT). This research discloses the several returns and shortcomings of IT, and how businesses use IT to realize their strategic goals.

The report presents discussion on two organisations, Dell Computer Corporation and Sydney Waters, which had a prosperous and disastrous implementation of IT systems respectively. The …


Using Mis To Deliver Essential Services:Case Of Healthcare Provision Support In Fiji, Deogratias Harorimana Sr Jan 2012

Using Mis To Deliver Essential Services:Case Of Healthcare Provision Support In Fiji, Deogratias Harorimana Sr

Dr Deogratias Harorimana

In comparison to other Pacific Island countries, Fiji’s health system is the most developed amongst Pacific Island countries (UNDP 2006) and has undergone significant change in the last decade. From 1999 – 2009, AusAid, a major donor to Fiji’s health system, has supported two stage health sector improvement programs. The first stage (1999 - 2003) was a management reform program designed to improve decision making by supporting a new model of decentralized management. The second phase (2004 – 2009) looked at improving governance, health systems performance, clinical outcomes and supported public health and infrastructure initiatives at the divisional level (WHO …


Impact Of Crm Systems On Organisational Performance: A Case Study Of Anz Bank, Deogratias Harorimana Sr Jan 2012

Impact Of Crm Systems On Organisational Performance: A Case Study Of Anz Bank, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper reports case study results analysis of the ANZ Bank in the Pacific Region. The case study results show that ANZ has a well-established CRM system supporting its marketing and sales activities, but equally the results indicate mixed scenarios. A positive relationship between CRM to performance was established. That is, it has a positive contribution to the bank’s performance, both financial and non-financial. There is also negative feedback on the bank’s CRM system which illustrates that CRM system can also have negative consequences. CRM success is questionable from a stand-alone perspective. Although there are encouraging results from the use …


Portals And Task Innovation: A Theoretical Framework Founded On Business Intelligence Thinking, Mutaz M. Al-Debei, Dima Jalal Jan 2012

Portals And Task Innovation: A Theoretical Framework Founded On Business Intelligence Thinking, Mutaz M. Al-Debei, Dima Jalal

Dr. Mutaz M. Al-Debei

The main aim of this study is to develop a theoretical framework for the success of Web portals in promoting task innovation. This is deemed significant as yet little research has tackled this important domain from the business intelligence perspective. The D&M IS Success Model was used as a foundational theory and then was refined to match the context of the current research. Importantly, in this study, system quality and information quality constructs were defined on the basis of portals' characteristics since a mapping was conducted between the most significant functions and features of Web portals and quality constructs. The …


A Framework Of Value Exchange And Role Playing In Web 2.0 Websites, Mutaz M. Al-Debei, Enas M. Al-Lozi Jan 2012

A Framework Of Value Exchange And Role Playing In Web 2.0 Websites, Mutaz M. Al-Debei, Enas M. Al-Lozi

Dr. Mutaz M. Al-Debei

Digitally engaged communities can be described as communities created and evolved within Web 2.0 Websites such as Facebook, Bebo, and Twitter. The growing importance of digitally engaged communities calls for the need to efficiently manage the building blocks of sustaining a healthy community. The initial operation of any digitally-engaged community depends on the existence of its own members, the beneficial values created and exchanged, and the relationships interlinking both. However, the level of contribution and involvement might vary depending on the benefits being gratified from engaging in such communities. In other words, motivations for participating and getting involved are purposive; …