Pub Date : 2020-01-02DOI: 10.1080/13614576.2020.1742767
Arun Agarwal, S. Mehta
ABSTRACT The utilization of Multiple Input Multiple Output – Orthogonal Frequency Division Multiplexing (MIMO-OFDM) has rapidly gained popularity because of its improved performance capabilities in terms of enhanced spatial diversity gain, reliability as well as the spatial multiplexing Gain. This paper discusses the effect of spatial correlation in Forward Error Correction of MIMO-OFDM system. Here, the four error correction codes, namely, Convolutional Code (CC), Low-Density Parity Check (LDPC-CC), and Reed-Solomon code (RSC-CC) is validated under three channel models, namely, Rayleigh, Rician and Additive White Gaussian Noise (AWGN). The analysis is performed using four modulation schemes such as Quadrature Phase Shift Keying (QPSK), Binary Phase Shift Keying (BPSK), Quadrature Amplitude Modulation (QAM)-16, and QAM-64. It is performed under three antenna configurations like 2 × 2, 2 × 4, and 4 × 4. Moreover, the Peak Signal to Noise Ratio (PSNR) is exploited to identify the image transmission, as well as the Bit Error Rate (BER), is exploited to identify the data transmission. In experimental results, the Turbo-CC displays better performance.
{"title":"Examining Impacts of Spatial Correlation in Forward Error Correction Code","authors":"Arun Agarwal, S. Mehta","doi":"10.1080/13614576.2020.1742767","DOIUrl":"https://doi.org/10.1080/13614576.2020.1742767","url":null,"abstract":"ABSTRACT The utilization of Multiple Input Multiple Output – Orthogonal Frequency Division Multiplexing (MIMO-OFDM) has rapidly gained popularity because of its improved performance capabilities in terms of enhanced spatial diversity gain, reliability as well as the spatial multiplexing Gain. This paper discusses the effect of spatial correlation in Forward Error Correction of MIMO-OFDM system. Here, the four error correction codes, namely, Convolutional Code (CC), Low-Density Parity Check (LDPC-CC), and Reed-Solomon code (RSC-CC) is validated under three channel models, namely, Rayleigh, Rician and Additive White Gaussian Noise (AWGN). The analysis is performed using four modulation schemes such as Quadrature Phase Shift Keying (QPSK), Binary Phase Shift Keying (BPSK), Quadrature Amplitude Modulation (QAM)-16, and QAM-64. It is performed under three antenna configurations like 2 × 2, 2 × 4, and 4 × 4. Moreover, the Peak Signal to Noise Ratio (PSNR) is exploited to identify the image transmission, as well as the Bit Error Rate (BER), is exploited to identify the data transmission. In experimental results, the Turbo-CC displays better performance.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"25 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2020.1742767","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44617237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-02DOI: 10.1080/13614576.2020.1742770
S. Katuu
ABSTRACT The purpose of this article is to provide a broad overview of the history and development of ERPs and outline recent developments with the advent of digital innovations like cloud computing. The research approach in this article was to review literature from both academic journals and industry reports. The article found that ERPs have changed dramatically from precursor systems like integrated control (IC) packages and material resource planning (MRP) systems. They continue to change with the advent of cloud computing, as well as digital innovations like artificial intelligence. While several articles have addressed the evolution of ERPs, this article’s unique contribution is that it covers the most recent developments, including discussions on cloud ERPs and postmodern ERPs.
{"title":"Enterprise Resource Planning: Past, Present, and Future","authors":"S. Katuu","doi":"10.1080/13614576.2020.1742770","DOIUrl":"https://doi.org/10.1080/13614576.2020.1742770","url":null,"abstract":"ABSTRACT The purpose of this article is to provide a broad overview of the history and development of ERPs and outline recent developments with the advent of digital innovations like cloud computing. The research approach in this article was to review literature from both academic journals and industry reports. The article found that ERPs have changed dramatically from precursor systems like integrated control (IC) packages and material resource planning (MRP) systems. They continue to change with the advent of cloud computing, as well as digital innovations like artificial intelligence. While several articles have addressed the evolution of ERPs, this article’s unique contribution is that it covers the most recent developments, including discussions on cloud ERPs and postmodern ERPs.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"25 1","pages":"37 - 46"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2020.1742770","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46946912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-02DOI: 10.1080/13614576.2020.1742768
P. Vishal, A. R. Babu
ABSTRACT Target coverage (TCOV) and network connectivity (NCON) are the most basic problems affecting robust data communication and environmental sensing in a wireless sensor network (WSN) application. This article proposes an intelligent Context Aware Sensor Network (CASN) for the process of sensor deployment in WSNs. Accordingly, the process is sub-divided into two phases. In the initial phase, optimal TCOV is performed; whereas, in the second phase, the proposed algorithm establishes NCON among the sensors. The objective model that meets both TCOV and NCON is evaluated as the minimization problem. This problem is solved by a new method that hybridizes the Artificial Bee Colony (ABC) algorithm and the Whale Optimization Algorithm (WOA) together, which is known as the Onlooker Probability-based WOA (OP-WOA) for the determination of optimal sensor locations. In addition, the adopted OP-WOA model is compared with the Genetic Algorithm (GA), the Particle Swarm Optimization (PSO), the ABC algorithm, Differential Evolution (DE), FireFly (FF), the WOA, and the Evolutionary Algorithm (EA)-based TCOV and NCON models. Finally, the results attained from the execution demonstrate the enhanced performance of the implemented OP-WOA technique.
{"title":"An Integrated Optimization Enabled Sensor Deployment Model in Wireless Sensor Network","authors":"P. Vishal, A. R. Babu","doi":"10.1080/13614576.2020.1742768","DOIUrl":"https://doi.org/10.1080/13614576.2020.1742768","url":null,"abstract":"ABSTRACT Target coverage (TCOV) and network connectivity (NCON) are the most basic problems affecting robust data communication and environmental sensing in a wireless sensor network (WSN) application. This article proposes an intelligent Context Aware Sensor Network (CASN) for the process of sensor deployment in WSNs. Accordingly, the process is sub-divided into two phases. In the initial phase, optimal TCOV is performed; whereas, in the second phase, the proposed algorithm establishes NCON among the sensors. The objective model that meets both TCOV and NCON is evaluated as the minimization problem. This problem is solved by a new method that hybridizes the Artificial Bee Colony (ABC) algorithm and the Whale Optimization Algorithm (WOA) together, which is known as the Onlooker Probability-based WOA (OP-WOA) for the determination of optimal sensor locations. In addition, the adopted OP-WOA model is compared with the Genetic Algorithm (GA), the Particle Swarm Optimization (PSO), the ABC algorithm, Differential Evolution (DE), FireFly (FF), the WOA, and the Evolutionary Algorithm (EA)-based TCOV and NCON models. Finally, the results attained from the execution demonstrate the enhanced performance of the implemented OP-WOA technique.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"25 1","pages":"47 - 70"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2020.1742768","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43847991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-03DOI: 10.1080/13614576.2019.1608580
Nidhi Lal, Shishupal Kumar
ABSTRACT To provide broadband access services to customers, which resides residential and enterprise field, Worldwide Interoperability for Microwave Access (WiMAX) is one of the famous wireless technologies. WiMAX can provide high-speed data rate with large-scale coverage such that it contains a high transmission range as well as it supports high mobility with a large number of nodes. It requires scheduling algorithm in the MAC layer of its protocol stack because the number of users that want service is high in number. One of the most used scheduling algorithms is the Earliest Deadline First (EDF) but it contains certain performance limitations. As well as there is a need for security before allocation of bandwidth to the users because WiMAX is a wireless technology and may be vulnerable to lots of security attacks and if once the bandwidth is allocated to any malicious user, then the system of WiMAX communication will be under dangerous attacks. In this paper, we proposed a secure heuristic earliest deadline first uplink scheduler in the MAC layer of the WiMAX with some authorization procedures. The proposed scheme protects the allocation of bandwidth to any malicious node such that the system will be prevented from security attacks like Denial of Service (DoS), flooding attack, etc., as well as it will use heuristic approach for scheduling. Therefore, it can efficiently schedule user’s request and provide fairness to the WiMAX system and we called as Secure Heuristic EDF Uplink Scheduler (SH-EDF). The performance of SH-EDF uplink scheduler will be evaluated in the provisions of various performance metrics.
{"title":"An Efficient Uplink Scheduler for WiMAX Communication System with Prevention from Security Attacks","authors":"Nidhi Lal, Shishupal Kumar","doi":"10.1080/13614576.2019.1608580","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608580","url":null,"abstract":"ABSTRACT To provide broadband access services to customers, which resides residential and enterprise field, Worldwide Interoperability for Microwave Access (WiMAX) is one of the famous wireless technologies. WiMAX can provide high-speed data rate with large-scale coverage such that it contains a high transmission range as well as it supports high mobility with a large number of nodes. It requires scheduling algorithm in the MAC layer of its protocol stack because the number of users that want service is high in number. One of the most used scheduling algorithms is the Earliest Deadline First (EDF) but it contains certain performance limitations. As well as there is a need for security before allocation of bandwidth to the users because WiMAX is a wireless technology and may be vulnerable to lots of security attacks and if once the bandwidth is allocated to any malicious user, then the system of WiMAX communication will be under dangerous attacks. In this paper, we proposed a secure heuristic earliest deadline first uplink scheduler in the MAC layer of the WiMAX with some authorization procedures. The proposed scheme protects the allocation of bandwidth to any malicious node such that the system will be prevented from security attacks like Denial of Service (DoS), flooding attack, etc., as well as it will use heuristic approach for scheduling. Therefore, it can efficiently schedule user’s request and provide fairness to the WiMAX system and we called as Secure Heuristic EDF Uplink Scheduler (SH-EDF). The performance of SH-EDF uplink scheduler will be evaluated in the provisions of various performance metrics.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"133 - 152"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608580","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42849840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-03DOI: 10.1080/13614576.2019.1615529
Taye Abdulkadir Edris, R. Sungkur
ABSTRACT In today’s Internet age, millions of articles in an unstructured format are created every second. Most of this information is available in the web in the form of free text articles. These unstructured free texts are difficult to process and almost impossible to use in decision making, especially those based on analysis of long term data. This research project tried to address knowledge discovery from free text through the extraction of Violent Events along with their attributes. Media monitoring tools such as the Africa Media Monitor can gather thousands of news articles every minute. These articles can be clustered and categorized. However, due to the lack of structure and the heterogeneity of information sources, access to these huge collections of information has been limited to browsing, searching, and reading through articles. To cope with that enormous amount of available data, Information Extraction Systems are needed whose goal is to extract structured information from unstructured documents or free texts. This research tried to address event extraction in one domain. The developed prototype successfully managed the extraction of the 5W (Who, What, Whom, Where, When) but could not manage the 1H (How) due to programming challenges and time constraints.
{"title":"Knowledge Discovery from Free Text: Extraction of Violent Events in the African Context","authors":"Taye Abdulkadir Edris, R. Sungkur","doi":"10.1080/13614576.2019.1615529","DOIUrl":"https://doi.org/10.1080/13614576.2019.1615529","url":null,"abstract":"ABSTRACT In today’s Internet age, millions of articles in an unstructured format are created every second. Most of this information is available in the web in the form of free text articles. These unstructured free texts are difficult to process and almost impossible to use in decision making, especially those based on analysis of long term data. This research project tried to address knowledge discovery from free text through the extraction of Violent Events along with their attributes. Media monitoring tools such as the Africa Media Monitor can gather thousands of news articles every minute. These articles can be clustered and categorized. However, due to the lack of structure and the heterogeneity of information sources, access to these huge collections of information has been limited to browsing, searching, and reading through articles. To cope with that enormous amount of available data, Information Extraction Systems are needed whose goal is to extract structured information from unstructured documents or free texts. This research tried to address event extraction in one domain. The developed prototype successfully managed the extraction of the 5W (Who, What, Whom, Where, When) but could not manage the 1H (How) due to programming challenges and time constraints.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"153 - 177"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1615529","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42009995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-03DOI: 10.1080/13614576.2019.1608577
M. Langelaar, J. Schuurman Hess, R. Rommelse
ABSTRACT In 2016 for the first time a fully digital archive was ingested in the trusted repository of the Municipality of Rotterdam: the archives of the City Region Rotterdam Rijnmond. The city region included fifteen municipalities. In 2015 the City Region was dissolved and was absorbed by the Rotterdam-The Hague metropolitan area. The archives should be deposited at the Municipal Archives of Rotterdam, but had to be accessible to the former partners. This article will focus on the problems we met in taking in the digital born archives (metadata and the mapping of metadata, formats, exporting from the original application) and in ensuring availability. Furthermore the focus will be on the requirements this type of archives imply for the design of systems and the need for (European) standards. Building on the experience with the City Region, we are now looking at the governance of chain informatisation within the social sector. Main focus with this part of the paper will be the governance of informatisation, the requirements this poses to systems and workflows and the way the inspection and the auditing of archives and workflows can be provided within chain informatisation.
{"title":"Chain Informatisation and the Challenges for Governance","authors":"M. Langelaar, J. Schuurman Hess, R. Rommelse","doi":"10.1080/13614576.2019.1608577","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608577","url":null,"abstract":"ABSTRACT In 2016 for the first time a fully digital archive was ingested in the trusted repository of the Municipality of Rotterdam: the archives of the City Region Rotterdam Rijnmond. The city region included fifteen municipalities. In 2015 the City Region was dissolved and was absorbed by the Rotterdam-The Hague metropolitan area. The archives should be deposited at the Municipal Archives of Rotterdam, but had to be accessible to the former partners. This article will focus on the problems we met in taking in the digital born archives (metadata and the mapping of metadata, formats, exporting from the original application) and in ensuring availability. Furthermore the focus will be on the requirements this type of archives imply for the design of systems and the need for (European) standards. Building on the experience with the City Region, we are now looking at the governance of chain informatisation within the social sector. Main focus with this part of the paper will be the governance of informatisation, the requirements this poses to systems and workflows and the way the inspection and the auditing of archives and workflows can be provided within chain informatisation.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"121 - 132"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608577","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44136870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-03DOI: 10.1080/13614576.2019.1608575
Sindiso Bhebhe, N. Khumalo, M. Masuku
ABSTRACT Stringent budgets have led to calls for all entities in the public sector, including national archival institutions, to justify their existence. This has seen scholars and archivists trying to market archives in order to attract more clientele. However, archives are not created for a target market, neither is their value determined by the frequency of their use. This paper therefore seeks to contest the notion of marketing archives and concludes that the marketing of archives is neither necessary nor worth pursuing as the products (the archives) do not diminish in value even if not consulted.
{"title":"“Worthiness” of Marketing Public Archives","authors":"Sindiso Bhebhe, N. Khumalo, M. Masuku","doi":"10.1080/13614576.2019.1608575","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608575","url":null,"abstract":"ABSTRACT Stringent budgets have led to calls for all entities in the public sector, including national archival institutions, to justify their existence. This has seen scholars and archivists trying to market archives in order to attract more clientele. However, archives are not created for a target market, neither is their value determined by the frequency of their use. This paper therefore seeks to contest the notion of marketing archives and concludes that the marketing of archives is neither necessary nor worth pursuing as the products (the archives) do not diminish in value even if not consulted.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"105 - 120"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608575","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45173014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-03DOI: 10.1080/13614576.2019.1618197
Patrick Ajibade, S. Mutula
ABSTRACT Business records management plays a vital role in enabling organizations to maintain accountability, curb corruption, and prevent mismanagement, while promoting efficient running of daily activities and effective decision-making. It is important for business organization to efficiently manage both digital and manually created recorded business information. In the digital and networked environment, and within the global economy, records are created as consequences of business transaction. Even though many companies have been processing network-generated business information and digital business records, many companies have not been able to manage their business process using the capabilities of information technology infrastructure. This article presented a simplify models using service oriented (software) design to assist companies especially the small and medium enterprises (SMEs) to manage their business intelligence (business records) in a networked environment. Taking into account the modernisation of information technology to integrate and promote efficient business records management. The article concluded that the use of service-oriented design methodology, if adapted by the SMEs will improve business records management and sustainability, and improve compliance with the records management Acts, standards, policy, and regulations.
{"title":"Integrated Records Management: Using Software Design Approach to Support Business Process Management and Compliance in the Networked Environment","authors":"Patrick Ajibade, S. Mutula","doi":"10.1080/13614576.2019.1618197","DOIUrl":"https://doi.org/10.1080/13614576.2019.1618197","url":null,"abstract":"ABSTRACT Business records management plays a vital role in enabling organizations to maintain accountability, curb corruption, and prevent mismanagement, while promoting efficient running of daily activities and effective decision-making. It is important for business organization to efficiently manage both digital and manually created recorded business information. In the digital and networked environment, and within the global economy, records are created as consequences of business transaction. Even though many companies have been processing network-generated business information and digital business records, many companies have not been able to manage their business process using the capabilities of information technology infrastructure. This article presented a simplify models using service oriented (software) design to assist companies especially the small and medium enterprises (SMEs) to manage their business intelligence (business records) in a networked environment. Taking into account the modernisation of information technology to integrate and promote efficient business records management. The article concluded that the use of service-oriented design methodology, if adapted by the SMEs will improve business records management and sustainability, and improve compliance with the records management Acts, standards, policy, and regulations.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"178 - 192"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1618197","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42866524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-02DOI: 10.1080/13614576.2019.1608581
Jitendra Nath Shaw, Tanmay De Sarkar
ABSTRACT The purpose of this article is to provide a cloud computing system-based architecture for library automation services. In this article, a consortium-based library automation system has been conceptualized and a model architecture has been proposed. The article describes the benefit of virtualization (Virtual Machine as a library) of cloud computing toward libraries and why/how a librarian can shift from an on-premise based library system to cloud-based system to overcome infrastructure requirement, staff requirements for administration, system maintenance, costs for backup, and so forth. The article outlines the traditional system of library automation. The proposed model provides cloud platform and application virtualization solutions for deploying and managing Service Oriented Architecture (SOA) for libraries. The model illustrates how a group of libraries, participating into a consortia, could collaborately obtain access to LMS software application through the virtual platform. This article is one of the first of its kind to propose such architecture for library automation.
{"title":"Model Architecture for Cloud Computing-Based Library Management","authors":"Jitendra Nath Shaw, Tanmay De Sarkar","doi":"10.1080/13614576.2019.1608581","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608581","url":null,"abstract":"ABSTRACT The purpose of this article is to provide a cloud computing system-based architecture for library automation services. In this article, a consortium-based library automation system has been conceptualized and a model architecture has been proposed. The article describes the benefit of virtualization (Virtual Machine as a library) of cloud computing toward libraries and why/how a librarian can shift from an on-premise based library system to cloud-based system to overcome infrastructure requirement, staff requirements for administration, system maintenance, costs for backup, and so forth. The article outlines the traditional system of library automation. The proposed model provides cloud platform and application virtualization solutions for deploying and managing Service Oriented Architecture (SOA) for libraries. The model illustrates how a group of libraries, participating into a consortia, could collaborately obtain access to LMS software application through the virtual platform. This article is one of the first of its kind to propose such architecture for library automation.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"17 - 30"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608581","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48434546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-02DOI: 10.1080/13614576.2019.1608576
A. Lusigi
ABSTRACT A healthy and skilled workforce is at the heart of Africa’s economic and social transformation agenda and countries with leading institutions of higher learning are among the most diversified economies in Africa. This paper examines the gaps in the performance of Africa’s higher learning institutions, identifies structural barriers to transformation and proposes better utilization of information technology to meet the emerging needs for equity and access. Based on best practices from the use of ICTs in South Africa and the rollout of digital libraries in 20 countries three key recommendations are provided to overcome gaps related to investment, digital literacy, and policy coherence.
{"title":"Higher Education, Technology, and Equity in Africa","authors":"A. Lusigi","doi":"10.1080/13614576.2019.1608576","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608576","url":null,"abstract":"ABSTRACT A healthy and skilled workforce is at the heart of Africa’s economic and social transformation agenda and countries with leading institutions of higher learning are among the most diversified economies in Africa. This paper examines the gaps in the performance of Africa’s higher learning institutions, identifies structural barriers to transformation and proposes better utilization of information technology to meet the emerging needs for equity and access. Based on best practices from the use of ICTs in South Africa and the rollout of digital libraries in 20 countries three key recommendations are provided to overcome gaps related to investment, digital literacy, and policy coherence.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"1 - 16"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608576","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49076333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}