Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (30)
- SelectedWorks (16)
- Selected Works (15)
- Walden University (11)
- Missouri University of Science and Technology (7)
-
- Institute of Business Administration (6)
- University of Nevada, Las Vegas (3)
- Wayne State University (2)
- Chapman University (1)
- Cleveland State University (1)
- Eastern Illinois University (1)
- Edith Cowan University (1)
- Kennesaw State University (1)
- New Jersey Institute of Technology (1)
- Purdue University (1)
- The University of San Francisco (1)
- University of Dayton (1)
- University of Nebraska - Lincoln (1)
- University of Texas Rio Grande Valley (1)
- University of Wollongong (1)
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (10)
- Management (10)
- Business administration (5)
- Innovation (5)
- And operations;management sciences and quantitative methods (3)
-
- And operations;management sciences and quantitative methods;databases and information systems (3)
- Location-Based Services (3)
- Austerity (2)
- Authority (2)
- Case Study (2)
- Cloud computing (2)
- Computer science (2)
- Conference Proceedings (2)
- E-learning (2)
- Emergency Management (2)
- General Innovation Methodologies (2)
- Government (2)
- ICT (2)
- Information Security (2)
- Information Warfare (2)
- Information storage and retrieval systems (2)
- Innovation Management (2)
- LBS (2)
- Legitimacy (2)
- Libraries — Automation (2)
- Multi-agent decision making (2)
- National Security (2)
- Online library catalogs (2)
- Open Government (2)
- Open government (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (28)
- Philadelphia University, Jordan (10)
- Walden Dissertations and Doctoral Studies (10)
- Arcot Desai NARASIMHALU (6)
- International Conference on Information and Communication Technologies (6)
-
- Business and Information Technology Faculty Research & Creative Works (5)
- Manoj Maharaj (3)
- Dr Deogratias Harorimana (2)
- Eileen O'Donnell (2)
- Jan Kallberg (2)
- Library Faculty Presentations (2)
- Masters Theses (2)
- Maurice Dawson (2)
- Wayne State University Dissertations (2)
- Associate Professor Katina Michael (1)
- Business Analytics and Information Systems (1)
- Business Faculty Articles and Research (1)
- Business Faculty Publications (1)
- Department of Industrial and Management Systems Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations (1)
- Dissertations and Theses Collection (Open Access) (1)
- Dr. Mutaz M. Al-Debei (1)
- Faculty Research & Creative Activity (1)
- Gordon C. Tibbitts III (1)
- Information Systems Faculty Publications and Presentations (1)
- M. G. Michael (1)
- MIS/OM/DS Faculty Publications (1)
- Management, Entrepreneurship and Technology Faculty Publications (1)
- Perspectives@SMU (1)
- Professor Katina Michael (1)
- Publication Type
Articles 1 - 30 of 102
Full-Text Articles in Business
Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp
Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp
Eileen O'Donnell
User feedback is very important in all areas of computer science especially in the development of computer applications. Hence, student feedback on the use of technology enhanced learning in higher education in Ireland is relevant to the quality of the learning resources to be created by learning designers and academics in the future. The book “Student Reactions to Learning with Technologies: Perceptions and Outcomes” (Moyle & Wijngaards, 2012) was published by IGI Global in October 2011. This book includes contributions from various authors who are interested in students’ feedback regarding how technology has impacted on their educational experience. This book …
User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun
User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun
Information Systems Faculty Publications and Presentations
Numerous computerized methods emerge to replace traditional methods in people’s personal, work and social lives, but many are hesitant to make the transition. This study examines the factors that influence human choice between different methods. According to Activity Theory, traditional and computerized methods are both tools that a person uses for a certain task. The situated experiences with various methods shape people’s attitude toward using them later in terms of tool readiness. The understanding leads to hypothesized relationships between user-, method- and task-specific factors and the dependent variable. The results from an empirical study support that method experiences have strong …
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston
Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston
Research Collection School Of Computing and Information Systems
A key feature of social media is that it allows individuals and businesses to contribute contents for public viewing. However, little is known about how content providers derive payoffs from such activities. In this study, we build a dynamic structural model to recover the utility function for content providers. Our model distinguishes short-term payoffs based on ad revenue sharing from long-term payoffs driven by content providers’ reputation. The model was estimated using a panel data of 914 top 1000 providers and 381 randomly selected providers on YouTube from Jun 7th, 2010, to Aug 7th, 2011. The two different sets of …
Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao
Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao
Research Collection School Of Computing and Information Systems
This study empirically examines the effect of a non-traditional information source, namely a firm's blog visibility on the capital market valuation of firms. After controlling for earnings, book value of equity and other value relevant variables, such as traditional media exposure, R&D spending, and advertising expense, we find a positive association between a firm's blog visibility and its capital market valuation. In addition, we find blog visibility Grange causes trading, not vice versa. Our findings indicate that non-traditional information sources such as blogs help disseminate information and influence consumers' investment decisions by capturing their attention.
Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne
Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne
Research Collection School Of Computing and Information Systems
Recommendation agents (RAs) have been used by many Internet businesses such as Amazon and Netflix. However, few authors have studied how consumer behavior is affected by those that make suggestions to online consumers based on their recent shopping behavior. Fewer still have examined the role that RAs play in influencing impulse purchasing decisions online. Our study developed a theoretical model to illustrate the impact of RAs on online consumer behavior. The model was tested through an online shopping simulation which used a collaborative filtering based product RA. Particular attention was paid to the effects of an RA on consumer behavior; …
The Valuation Of User-Generated Content: A Structural, Stylistic And Semantic Analysis Of Online Reviews, Noi Sian Koh
The Valuation Of User-Generated Content: A Structural, Stylistic And Semantic Analysis Of Online Reviews, Noi Sian Koh
Dissertations and Theses Collection (Open Access)
The ability and ease for users to create and publish content has provided vast amount of online product reviews. However, the amount of data is overwhelmingly large and unstructured, making information difficult to quantify. This creates challenge in understanding how online reviews affect consumers’ purchase decisions. In my dissertation, I explore the structural, stylistic and semantic content of online reviews. Firstly, I present a measurement that quantifies sentiments with respect to a multi-point scale and conduct a systematic study on the impact of online reviews on product sales. Using the sentiment metrics generated, I estimate the weight that customers place …
Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West
Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West
Research Collection School Of Computing and Information Systems
A recurring theme in the literature on technology and organizations is the concept of mirroring, which posits a duality between technological and organizational design decisions. In this paper we highlight a second, orthogonal duality between components and interfaces: designers of both products and organizations must decide what information to hide within component boundaries and what to expose to other designers. Although the component-interface duality appears in many settings, it presents especially vexing strategic challenges in the design and production of complex digital artifacts. We present a typology of four interlinked perspectives on these kinds of strategic design problems, and discuss …
New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn
New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn
Research Collection School Of Computing and Information Systems
This special issue includes six articles on different aspects of technology adoption that represent the development and application of different theoretical and methodological approaches to the business problems that they treat. In terms of theory, three of the articles use behavioral and organizational theories, including adaptive structuration theory, management fashion theory, the unified theory of technology acceptance, the technology acceptance model, and diffusion of innovation theory. The other two are based on economic theory, including network effects theory, and economic growth theory. The methods used are also dramatically different in each of the studies. Three studies use field research and …
From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons
From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons
Research Collection School Of Computing and Information Systems
We use an agent-based NK model to explore the conditions under which standard platforms emerge among competing products. Our findings were inconclusive. We find that the usual Darwinian conditions needed for the emergence of complexity are sufficient to yield a limited reliance upon platforms with a core of common components, simply because evolution causes the population to converge on a set of products that contain combinations that "work well," yielding what we call "coincidental platform emergence." Economies of scale yield more use of common components, or "production platform emergence." Positive participation externalities initially induce the highest degree of platform emergence …
Agile Innovation Management, Arcot Desai Narasimhalu
Agile Innovation Management, Arcot Desai Narasimhalu
Research Collection School Of Computing and Information Systems
The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
Associate Professor Katina Michael
The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …
No Fear: Leadership, "Digital Cowboys" And The "Playstation Generation", Singapore Management University
No Fear: Leadership, "Digital Cowboys" And The "Playstation Generation", Singapore Management University
Perspectives@SMU
Finnish entrepreneur Pekka Viljakainen would be considered as successful by most measures. At only 38 years of age, he has managed a staff of 8,000 across 20 countries from Munich. His information technology (IT) consultancy, Oy Visual Systems, had merged with Tieto, another European IT firm, and Viljakainen was made executive vice-president.
Profit-Maximizing Firm Investments In Customer Information Security, Yong Yick Lee, Robert J. Kauffman, Ryan Sougstad
Profit-Maximizing Firm Investments In Customer Information Security, Yong Yick Lee, Robert J. Kauffman, Ryan Sougstad
Research Collection School Of Computing and Information Systems
When a customer interacts with a firm, extensive personal information often is gathered without the individual's knowledge. Significant risks are associated with handling this kind of information. Providing protection may reduce the risk of the loss and misuse of private information, but it imposes some costs on both the firm and its customers. Nevertheless, customer information security breaches still may occur. They have several distinguishing characteristics: (1) typically it is hard to quantify monetary damages related to them; (2) customer information security breaches may be caused by intentional attacks, as well as through unintentional organizational and customer behaviors; and (3) …
Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo
Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo
Research Collection School Of Computing and Information Systems
Frequent new product release and technological uncertainty about the release time pose significant challenges for firms to manage successive generation of products. On the one hand, strategic consumers may delay their purchase decision and substitute the earlier generation with the newer generation product. On the other hand, the firm must fully anticipate consumer reactions and take into account the effect of their strategic behavior on product pricing and successive generation product diffusion. This paper proposes a prediction market to forecast new product release. We show that the market information aggregation mechanism can improve forecast accuracy of new product launch. Better …
Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn
Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn
The African Journal of Information Systems
This article reports on the recent implementation and current deployment of accounting information systems in Libyan commercial banks. A case study approach is adopted that moves from an initial screening of the 14 main Libyan banks to a final in-depth study of just three banks. Business process modeling and systems profiling are used to assess the status of the banks in terms of systems use, process change and information systems strategy development. Libyan banks are well advanced in their installation of modern packaged software but could be used to greater effect to optimize business processes and improve efficiencies. Training and …
Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault
Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault
Research Collection School Of Computing and Information Systems
We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1 billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely to affect decision-making by other firms in an industry. Then, we evaluate the role of different communication channels in the diffusion process of IT outsourcing by …
Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen
Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen
Research Collection School Of Computing and Information Systems
We study the link between price points and price rigidity using two data sets: weekly scanner data and Internet data. We find that ‘‘9’’ is the most frequent ending for the penny, dime, dollar, and ten-dollar digits; the most common price changes are those that keep the price endings at ‘‘9’’; 9-ending prices are less likely to change than non-9-ending prices; and the average size of price change is larger for 9-ending than non-9- ending prices. We conclude that 9-ending contributes to price rigidity from penny to dollar digits and across a wide range of product categories, retail formats, and …
A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr
A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr
Dr Deogratias Harorimana
The purpose of this paper is to critically assess the effectiveness of Fiscal and Monetary Policies in the South Pacific Island Countries. The paper tracks down the economic growth for the last 20 years between 1990-2010, and drawing from key fiscal and monetary policies in place during the time under consideration, as well as specific interventions in the region, we find that: 1) While the South Pacific Island Countries (SPICs) particularly the six major economies (Solomon Islands, Fiji, Vanuatu, PNG, Samoa, Tonga) pursued fiscal and monetary policies for promoting growth and diversification of their economies, their fiscal policies relied heavily …
Identifying Social Influence In Networks Using Randomized Experiments, Sinan Aral, Dylan Walker
Identifying Social Influence In Networks Using Randomized Experiments, Sinan Aral, Dylan Walker
Business Faculty Articles and Research
The recent availability of massive amounts of networked data generated by email, instant messaging, mobile phone communications, micro blogs, and online social networks is enabling studies of population-level human interaction on scales orders of magnitude greater than what was previously possible.1'2 One important goal of applying statistical inference techniques to large networked datasets is to understand how behavioral contagions spread in human social networks. More precisely, understanding how people influence or are influenced by their peers can help us understand the ebb and flow of market trends, product adoption and diffusion, the spread of health behaviors such as smoking and …
Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr
Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr
Dr Deogratias Harorimana
With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …
Strategic Responses To Standardization: Embrace, Extend Or Extinguish?, C. Jason Woodard, Joel West
Strategic Responses To Standardization: Embrace, Extend Or Extinguish?, C. Jason Woodard, Joel West
Research Collection School Of Computing and Information Systems
Prior research on technology standardization has focused on two common patterns: processes in which product developers and other stakeholders cooperate to achieve a consensus outcome, and “standards wars” in which competing technologies vie for dominance in the market. This study examines Microsoft's responses to 12 software technologies in the period between 1990 and 2005. Despite the company's reputed tendency to pursue a strategy dubbed “embrace, extend, and extinguish,” a content analysis of news articles from the same period reveals surprising diversity in Microsoft's responses at the product level.
We classify these responses using a typology that treats “embrace” and “extend” …
Allocating Resources In Multiagent Flowshops With Adaptive Auctions, Hoong Chuin Lau, Zhengyi Zhao, Sam Shuzhi Ge, Thong Heng Lee
Allocating Resources In Multiagent Flowshops With Adaptive Auctions, Hoong Chuin Lau, Zhengyi Zhao, Sam Shuzhi Ge, Thong Heng Lee
Research Collection School Of Computing and Information Systems
In this paper, we consider the problem of allocating machine resources among multiple agents, each of which is responsible to solve a flowshop scheduling problem. We present an iterated combinatorial auction mechanism in which bid generation is performed within each agent, while a price adjustment procedure is performed by a centralized auctioneer. While this approach is fairly well-studied in the literature, our primary innovation is in an adaptive price adjustment procedure, utilizing variable step-size inspired by adaptive PID-control theory coupled with utility pricing inspired by classical microeconomics. We compare with the conventional price adjustment scheme proposed in Fisher (1985), and …
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Professor Katina Michael
Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …
The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade
The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade
Eileen O'Donnell
The human computer interaction issues associated with the creation of personalized role playing simulations are discussed in this paper. This paper is aimed at those who are interested in building authoring applications which enable educators to build role playing simulated e-learning resources to use with their students. One of the main issues which have come to our attention is that many learning designers and educators do not understand what exactly it is we are trying to achieve by creating personalized role playing simulations. Also, how to gauge the pedagogic merits which can be achieved by using these e-learning resources. Potential …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Jan Kallberg
Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Jan Kallberg
Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …
Taxisim: A Multiagent Simulation Platform For Evaluating Taxi Fleet Operations, Shih-Fen Cheng, Thi Duong Nguyen
Taxisim: A Multiagent Simulation Platform For Evaluating Taxi Fleet Operations, Shih-Fen Cheng, Thi Duong Nguyen
Research Collection School Of Computing and Information Systems
Taxi service is an important mode of public transportation in most metropolitan areas since it provides door-to-door convenience in the public domain. Unfortunately, despite all the convenience taxis bring, taxi fleets are also extremely inefficient to the point that over 50% of its operation time could be spent in idling state. Improving taxi fleet operation is an extremely challenging problem, not just because of its scale, but also due to fact that taxi drivers are self-interested agents that cannot be controlled centrally. To facilitate the study of such complex and decentralized system, we propose to construct a multiagent simulation platform …
Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique
Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique
International Conference on Information and Communication Technologies
Rapidly growing demand in mobile communication system required technology which will provide minimum errors and maximize SNR in a particular angle/direction. Smart antenna has a system for directed a beam towards desired angle/direction and suppress/cancel interference from undesired angle/direction. MUSIC (Multiple Signal Classification) has capability to estimate number of signals in an array and angle/direction of arrival of desired signal. ESPRIT (Estimation of Signal Parameters via Rotational Invariance Techniques) is used for the estimation of direction of arrival of multiple sets of identical doublets, provides parallel processing. This Paper provides comparative analysis and simulation of angle of arrival (AOA) estimation, …