Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Physical Sciences and Mathematics

Networks - I: Pre-Coordination Mechanism For Self Configuration Of Neighborhood Cells In Mobile Wi-Max, Abdul Qadeer, Khalid Khan Dec 2011

Networks - I: Pre-Coordination Mechanism For Self Configuration Of Neighborhood Cells In Mobile Wi-Max, Abdul Qadeer, Khalid Khan

International Conference on Information and Communication Technologies

WiMax broadband services successfully providing triple play (Voice, Video and Data) support with combating the challenges of better quality and interoperability. Support for smooth mobility in real time with no wired infrastructure and being surrounded by GSM waves demanding a comprehensive and powerful network. Covering large areas through number of base stations which not only require time to configure but also need resources for implementation with a recurring cost of functionality. Automation is everywhere and to provide novel wireless services it is necessary to come up with some distinct features like intelligent base stations which have the capability of doing …


Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique Jul 2011

Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique

International Conference on Information and Communication Technologies

Rapidly growing demand in mobile communication system required technology which will provide minimum errors and maximize SNR in a particular angle/direction. Smart antenna has a system for directed a beam towards desired angle/direction and suppress/cancel interference from undesired angle/direction. MUSIC (Multiple Signal Classification) has capability to estimate number of signals in an array and angle/direction of arrival of desired signal. ESPRIT (Estimation of Signal Parameters via Rotational Invariance Techniques) is used for the estimation of direction of arrival of multiple sets of identical doublets, provides parallel processing. This Paper provides comparative analysis and simulation of angle of arrival (AOA) estimation, …


Networks - Ii: A Survey Of Data Management Issues & Frameworks For Mobile Ad Hoc Networks, Noman Islam, Zubair A. Shaikh Jul 2011

Networks - Ii: A Survey Of Data Management Issues & Frameworks For Mobile Ad Hoc Networks, Noman Islam, Zubair A. Shaikh

International Conference on Information and Communication Technologies

Data Management is the execution of a pool of activities on a set of data to conform to the end user data requisitions. MANET is an emerging discipline of computer networks in which a group of roaming hosts spontaneously establishes the network among themselves. The employment of data management in MANET can engender a number of useful applications. However, data management in MANET is a taxing job as it requires deliberation on a number of research issues (e.g. knowledge representation, knowledge discovery, caching, and security etc.). This paper provides a detailed account of the data management problem and its issues, …


Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain Jul 2011

Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain

International Conference on Information and Communication Technologies

Wireless communication is known as key to global development. Wireless and mobile communication is gaining more importance in our life. Protecting information is one the aspects which we need to focus on the wireless networks. Universal mobile telecommunication system (UMTS) is evolution of the third generation mobile communication system. It was built on the success of global system for mobile communication (GSM). Universal mobile telecommunication system's security is also built on global system for mobile communication (GSM). The paper reviews the literature of the security aspects of the Universal mobile telecommunication system. A critical evaluation of the proposed solutions is …


Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan Jul 2011

Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan

International Conference on Information and Communication Technologies

On Demand Transmission Power Control (ODTPC) is a well known transmission power control strategy that is used to reduce high power consumption in wireless sensor networks (WSNs). In this paper, we propose an extension to ODTPC and thus, a modified version of ODTPC is proposed named MODTPC. Simulation results show that performance of MODTPC is better than ODTPC in terms of efficiency and energy saving.


Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar Jul 2011

Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar

International Conference on Information and Communication Technologies

Voice over IP “VoIP” is a form of voice speech that uses data networks, for transmission of voice traffic over IP-based networks to transmit voice signals. The signal is correctly encoded at one end of the communication channel, sent as packets through the data network, then decoded at the receiving end and transformed back into a voice signal. It has a potential and offering a choice to the traditional telephony systems due to its high resource utilization and cost efficiency. Meanwhile, Wireless Local Area Networks (WLANs) have become an ever present networking technology that has been deployed around the world. …


Networks - I: Computational Intelligence Based Optimization In Wireless Sensor Network, Rabia Iram, Muhammad Irfan Sheikh, Sohail Jabbar, Abid Ali Minhas Jul 2011

Networks - I: Computational Intelligence Based Optimization In Wireless Sensor Network, Rabia Iram, Muhammad Irfan Sheikh, Sohail Jabbar, Abid Ali Minhas

International Conference on Information and Communication Technologies

There are only two ways to live your life. One is as though nothing is a miracle. The other is as though everything is a miracle and so the technology advancement which proved to be a miracle of the miracles. Wireless Sensor Network (WSN) is one such miracle of the wireless technology which opens up the new dimensions for the researchers to write the technology of the future i.e. ubiquitous computing and intelligence. Nevertheless nature has played its ultimate role as well to give an idea of perfection in optimizing the teething issues in any field and so in WSN. …


Networks - I: A Dynamic Transmission Power Control Routing Protocol To Avoid Network Partitioning In Wireless Sensor Networks, Ghufran Ahmed, Noor M. Khan, Mirza M Yasir Masood Jul 2011

Networks - I: A Dynamic Transmission Power Control Routing Protocol To Avoid Network Partitioning In Wireless Sensor Networks, Ghufran Ahmed, Noor M. Khan, Mirza M Yasir Masood

International Conference on Information and Communication Technologies

Power utilization in an efficient manner is a hot research issue in wireless sensor networks (WSNs). WSNs consist of energy hungry sensor nodes. Researchers have been trying to increase the lifetime of WSN since the development of WSN technology. Dynamic Transmission Power Control (DTPC) is a method for an efficient utilization of the energy resource and thus leads to an increase in lifetime. It has been used for the determination of minimum transmission power. A valuable study about the impact of variable transmission power on link quality has already been present in literature. In contrast to DTPC, transmitting data at …


Networks - I: A Comparative Analysis Of Energy-Aware Routing Protocols In Wireless Sensor Networks, Mohsin Raza, Ghufran Ahmed, Noor M. Khan, M Awais, Qasim Badar Jul 2011

Networks - I: A Comparative Analysis Of Energy-Aware Routing Protocols In Wireless Sensor Networks, Mohsin Raza, Ghufran Ahmed, Noor M. Khan, M Awais, Qasim Badar

International Conference on Information and Communication Technologies

This paper presents the implementation of two routing protocols for Wireless Sensor Networks (WSNs): GRACE (GRAdient Cost Establishment for Energy Aware routing) and GRAB (GRAdient Broadcasting) along with their comparative analysis using Sun SPOT sensor nodes, developed by Sun Microsystems. The performance of both the routing protocols is evaluated on the basis of various performance metrics including network lifetime, throughput and network energy etc. However in papers where these routing protocols presented, practical limitations of wireless sensor nodes were ignored. The communication of sensor nodes is established using multiple communication channels for proper implementation of both the routing protocols, GRACE …


Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand Jul 2011

Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand

International Conference on Information and Communication Technologies

Emerging trends of mobile communication and ever growing demand of mobile users with high speed data requirements and migrating towards 4G, Co-Channel interference and multipath in urban/dense urban environment will limit the capacity of the network. Smart antenna is now recognized by its higher user capacity in 4G wireless networks by efficiently reducing multipath and co-channel interference. Smart Antenna use adaptive beam forming algorithms in a dynamic environment continuously adjusting the weight of antenna arrays for creating a beam to track desired users automatically, and minimize interference from other users by placing nulls in their directions. This research work provides …


Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari Aug 2009

Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari

International Conference on Information and Communication Technologies

As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.


Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha Aug 2009

Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha

International Conference on Information and Communication Technologies

Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer Aug 2009

Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer

International Conference on Information and Communication Technologies

Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the …


Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel Aug 2009

Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel

International Conference on Information and Communication Technologies

Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …


Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit Aug 2009

Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit

International Conference on Information and Communication Technologies

Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood Aug 2009

Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood

International Conference on Information and Communication Technologies

New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …


Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain Aug 2009

Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain

International Conference on Information and Communication Technologies

An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …


Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq Aug 2009

Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq

International Conference on Information and Communication Technologies

The effective cooperation and coordination of nodes is necessary for performance improvement in the P2P network. In this paper, we focus on the problem of maintaining considerable amount of cooperation and friendship in P2P networks of selfish peers. For this purpose we will analyze the performance of SLAC. It is a simple algorithm that maintains excessive levels of cooperation and friendship in a network while performing tasks. A simulation model ldquoPrisoners' Dilemmardquo is presented that puts this algorithm to work in a Peersim environment. For providing random sampling, an existing protocol called ldquoNEWSCASTrdquo has been used. The extensive computer simulations …


A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed Aug 2005

A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed

International Conference on Information and Communication Technologies

Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and …


Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar Aug 2005

Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar

International Conference on Information and Communication Technologies

Mobile Ad Hoc Networks is dynamic multi-hop network that is formed by a set of mobile wireless nodes that are sharing the same bandwidth. So every node possibly acts as a host as well as a router. In traditional networks, hosts can depend on the central servers like DHCP for IP assignment and management, but it cannot be extended to MANET due to its distributed and dynamic nature. Many solutions have been proposed, amongst them some are try to extend the stateless configuration of IPv6 for MANET; others distribute IP addresses among nodes (using binary distribution). Most of these proposed …


Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan Aug 2005

Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan

International Conference on Information and Communication Technologies

The paper presents an analysis of energy efficient routing protocols with direct communication protocol. A comparison of these protocols is made analyzing energy consumption at each node and explaining system lifetime after certain rounds. The paper also proposes a novel energy conscious cluster head selection algorithm for making system more reliable and efficient. Simulation shows that our proposed algorithm enhances the system reliability and accuracy.


Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz Aug 2005

Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz

International Conference on Information and Communication Technologies

Remote sensing encounters different types of objects with similar spectral signatures. Multi-sensors form the solution of the problem with spectral different parts of the spectrum and the resulting information is then processed using digital signal processing techniques. Artificial neural networks provide another method for processing this information. The research describes how neural networks may be used to classify objects on the basis of their spectral response to different frequencies.


Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon Aug 2005

Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon

International Conference on Information and Communication Technologies

The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …


Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan Aug 2005

Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan

International Conference on Information and Communication Technologies

In this paper we discuss an emerging trend in high performance computing-the social or community computing. The emergence of screensaver computing, grid computing, peer-to-peer systems, and their demonstrated ability to garner computing power as potent as the supercomputers seems to be auspicious. In this paper we discuss the new phenomenon of community computing-including their potential applications in solving a new set of grand challenge problems. We also discuss the previously uncharted technological challenges architects of these new paradigms are addressing.


Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton Aug 2005

Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton

International Conference on Information and Communication Technologies

This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec …


Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad Aug 2005

Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad

International Conference on Information and Communication Technologies

Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.


Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan Aug 2005

Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan

International Conference on Information and Communication Technologies

Global technology has quickly progressed to provide more accessible business modes of communication. The image of the traditional workplace as a particular place to go to work is being replaced with employees working wherever they can be most efficient and productive, whether at home, on a plane, on the road, or a telework center. The availability of affordable technology has been one of the major contributors to the "any time, any place" telecommuting trend. The purpose of this study is to investigate the possibility of the implementation of teleworking at University Utara Malaysia (UUM), the suitable job selection criteria, the …