{"title":"Strategic Analysis Towards Deriving Competitive Advantage with the Use of FOSS: The Case of a South African University","authors":"Kehinde Dehinbo, P. Pretorius, J. Dehinbo","doi":"10.1109/ITNG.2012.57","DOIUrl":"https://doi.org/10.1109/ITNG.2012.57","url":null,"abstract":"The Free and Open-Source Software (FOSS) presents certain freedoms in the use of software that could enhance the impact of ICT in the society while the Tshwane University of Technology (TUT) is yet to fully utilize these freedoms to their advantage. This study seeks ways of deriving competitive advantage with the use of FOSS in South African universities with specific reference to TUT. In other to achieve the above, the basics, problems and the benefits of FOSS are reviewed. Thereafter, the successful implementation of FOSS both in a developed country and a developing country are looked at. Furthermore, to enable an assessment of the possible impact of FOSS towards deriving competitive advantage, a SWOT analysis representing a synthesis between FOSS Strongpoint's, Weak points, and the Opportunities and Threats is presented in the South African context. Also done is an analysis based on the PESTE framework to identify the driving forces of change within the South African society in general as they relate to Political, Economic, Social Technological and Environmental factors that could have affected FOSS adoption. Similarly, Porter's 5 fundamental competitive forces are used to analyse the current FOSS phenomena towards the goal of enhancing FOSS adoption. A synthesis of these led to recommendations and concludes the study as a step towards increasing the awareness of FOSS and convincing users about the immense possibilities enabled by the silent revolution its double freedom in its enhanced form of Free/Libre Open Source Software (FLOSS) phenomenon towards deriving competitive advantage.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Coutinho, Johnny Cardoso Marques, S. Yelisetty, Samoel Mirachi, Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva, A. Cunha, L. Dias
{"title":"Developing a Smart Grids System as a PBL with Agile Method on Computer Engineering Courses","authors":"C. Coutinho, Johnny Cardoso Marques, S. Yelisetty, Samoel Mirachi, Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva, A. Cunha, L. Dias","doi":"10.1109/ITNG.2012.55","DOIUrl":"https://doi.org/10.1109/ITNG.2012.55","url":null,"abstract":"This paper describes an experiment of integrating three courses at the Brazilian Aeronautics Institute of Technology, within the Electronic and Computer Engineering Graduate Program on the 1st semester of 2011. A smart grids system was used as a Problem Based Learning (PBL) strategy together with an agile method and best practices within a project developed on three courses: CE-240 Database Systems Project, CE-245 Information Technologies, and CE-229 Software Testing. Students of these courses had to interact, in order to produce a prototype of a smart grids system, simulating a real project development. At the end, a survey among students has proved that the integration of practical exercises has provided higher levels of understanding and problem solving capabilities, improving students' knowledge. The survey also has shown that communication between students from different courses should be improved. The major findings of this paper were that the integration of the three courses was favorable by 83% of the surveyed students, and most students (73%) have considered that their knowledge was improved. Authors recommend the use of practical exercises, courses integration, and PBL to considerably increase the quality of electronic and computer engineering courses.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Detection in Cognitive Networks by Minimizing Hidden Terminal Problem","authors":"Y. Reddy","doi":"10.1109/ITNG.2012.20","DOIUrl":"https://doi.org/10.1109/ITNG.2012.20","url":null,"abstract":"In the wireless network, the node is visible but is not available for communication. Similarly, the primary signal is present and difficult to detect. The primary signal problem is similar to hidden node problem, but currently interpreted as false alarms. In this research, two models (probability based and Drake's equation) were designed and tested through simulations. The results show that Drake's equation with probability-based model performs better than basic probability-based model to detect the hidden signal.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan Pablo Cofré, Gabriel Moraga, Cristian Rusu, Iván Mercado, R. Inostroza, Cristhy Jiménez Granizo
{"title":"Developing a Touchscreen-based Domotic Tool for Users with Motor Disabilities","authors":"Juan Pablo Cofré, Gabriel Moraga, Cristian Rusu, Iván Mercado, R. Inostroza, Cristhy Jiménez Granizo","doi":"10.1109/ITNG.2012.139","DOIUrl":"https://doi.org/10.1109/ITNG.2012.139","url":null,"abstract":"Domotics refers to the set of informatics and electronics systems able to automate, control and monitor a home. Accessibility can be defined as the users' potential for interaction, regardless of their technical, cognitive or physical abilities. Domotics usually focuses on the \"intelligent home\" concept, without explicitly considering the benefits that accessible services can provide for people with special needs. The paper presents the developing process of a domotic tool prototype that allows users with motor disabilities to control the surrounding artifacts of their home through the use of a touch screen-based mobile device. The prototype was developed using a user-centered design process, which explicitly includes usability and accessibility issues. The validation of the tool was conducted through analysis that involved (1) usability specialists, (2) physical therapists, and (3) real users from Teleton Foundation, a Chilean institution focused on rehabilitation and integration into society of children and adolescents who have motor disabilities.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125299544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavior Modeling of Programmable Metallization Cell Using Verilog-A","authors":"Darshan A. Dimplu, Fei Wang","doi":"10.1109/ITNG.2012.107","DOIUrl":"https://doi.org/10.1109/ITNG.2012.107","url":null,"abstract":"Programmable metallization is a promising type of non-volatile memory that displays several advantages over the currently wide spread flash memory, such as higher writing speed, better scalability, and longer data retention period. The unique electrical behavior of programmable metallization cell has not been included in any popular EAD tools yet. Therefore, a behavior model of Programmable Metallization Cell is designed using Verilog-A language in this paper. This model can be easily imported into PSPICE to enhance circuit level design related to programmable metallization cell.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116239047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Exploration of the E-Learning Standard Test System","authors":"Xinyu Zhang, Qian Wang, Yiqian Lu","doi":"10.1109/ITNG.2012.65","DOIUrl":"https://doi.org/10.1109/ITNG.2012.65","url":null,"abstract":"The paper designs and implements the E-Learning Standard Test System. It is composed of three loosely coupled components: XSD translated from the E-Learning standard, the XML parsing and validating package and the test result displaying package.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acoustic Signature Based Intelligent Health Monitoring of Air Compressors with Selected Features","authors":"N. Verma, Tarun Maini, A. Salour","doi":"10.1109/ITNG.2012.67","DOIUrl":"https://doi.org/10.1109/ITNG.2012.67","url":null,"abstract":"Dimensionality reduction and identification of relevant features are important for the classification accuracy. Selecting large number of features increases computational complexity whereas selection of too few features may not contain sufficient information required for the classification. This paper presents the comparative performance of different feature selection techniques namely Principal Component Analysis (PCA), Independent Component Analysis (ICA), Mutual Information (MI) methods: MIFS, mRMR, NMIFS, MIFS-U, and Bhattacharyya Distance (BD) in order to select optimal feature set for attaining better classification accuracy. With the results of comparative performance analysis one can get valuable insight about the effectiveness of different feature selection techniques, which in turn allows us to use the most suitable feature selection technique for enhanced fault diagnosis using CBM of air compressor.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Two-tier Bitwise Interest Oriented QRP Data Structure for High Clustering through Interest Similarity in SWB P2P Systems","authors":"T. Lim, Yong Liang Choong, A. Lee","doi":"10.1109/ITNG.2012.32","DOIUrl":"https://doi.org/10.1109/ITNG.2012.32","url":null,"abstract":"The concept of \"Small-World\" paradigm has been used by many peer-to-peer (P2P) systems to achieve high clustering and low number of hops to arrive to its desired target. This approach intends to improve performance of P2P systems. The Small world concept requires that the architecture of a P2P system to achieve high cluster coefficient and low average hop between any two randomly chosen peers. In this research, we propose an enhanced hierarchical overlay network by incorporating the concept of Small world into the base hierarchical architecture. This research adopts the Query Routing Protocol (QRP) data structure of a hierarchical P2P network by storing the interest information of files in the leaf peers in the network. The QRP in the leaf peers will be aggregated and propagated to the Super Peer so that interest information could be used to form short-range, medium-range and long-range links with other Super Peers to achieve low average hop. As peers join and leave the network, a proposed rewiring protocol is used to ensure peers are clustered by interest to form high clustering coefficient so that search activities are yielding higher relevance results in a more predictable fashion. We simulated the porposed small world P2P using test scenarios to evaluate recall rate of the small world P2P system. Our simulated results evaluate and benchmark our proposed Small-World Bee (SWB) overlay network with iCluster [3], Firework Query Model [5] and Lime wire [1] to assess performance obtained and goals achieved in the research work so that future research directions could be planned.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CIDS: A Framework for Intrusion Detection in Cloud Systems","authors":"H. Kholidy, F. Baiardi","doi":"10.1109/ITNG.2012.94","DOIUrl":"https://doi.org/10.1109/ITNG.2012.94","url":null,"abstract":"By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for \"CIDS\" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Use of Knowledge Management Systems to Support Knowledge Creation and Sharing Activities among Employees -- A Survey Based Study of IT Shared Services Company","authors":"A. Lee, T. Lim","doi":"10.1109/ITNG.2012.33","DOIUrl":"https://doi.org/10.1109/ITNG.2012.33","url":null,"abstract":"The use of knowledge management systems to support knowledge creation and sharing activities has become the priority of organizations to stay competitive in the global market. This is a case study that focuses on how IT Shared Services Company adopted knowledge management system as an automated IT tool and there action of the employees with respect to the organization when the system is implemented using few strategies to cultivate knowledge creation and sharing environment and culture in the organization. Due to many unknown variables and factors, the research undertaken and presented in this paper is an exploratory study with objectives to analyse and investigate the outcomes from the implementation of knowledge management system in the organization. The results revealed that the use of knowledge management system in the organization depends on the employees \"taskgroup\" classifications which had been categorized based on their daily job activities, whereas for the types of incentives [6, 8] provided to the employees as a motivating factor to employees varies among staff who have served the organization for a number of years. The findings of this study is able to help both practitioners and researcher to build a fundamental understanding of how knowledge management system is being used by employees from different types of job category who are more likely to use knowledge management system in an IT Shared Services company.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129000091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}