Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285819
Árpád Huszák
Solar power is a promising source of energy to use for base stations in mobile networks in order to make telecommunication systems environmentally friendly. Solar energy is an economic and ecological source to supply mobile base stations, although its efficiency is depending on geographical location and the continuously changing weather conditions. In this paper new methods are introduced to calibrate solar cells and improve the availability of base stations by controlling consumption and energy storage. The developed power management algorithms can help to improve reliability of mobile services and provide acceptable quality of services for the customers.
{"title":"Bandwidth and consumption controller algorithms for solar-powered base stations","authors":"Árpád Huszák","doi":"10.1109/ICCITECHNOL.2012.6285819","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285819","url":null,"abstract":"Solar power is a promising source of energy to use for base stations in mobile networks in order to make telecommunication systems environmentally friendly. Solar energy is an economic and ecological source to supply mobile base stations, although its efficiency is depending on geographical location and the continuously changing weather conditions. In this paper new methods are introduced to calibrate solar cells and improve the availability of base stations by controlling consumption and energy storage. The developed power management algorithms can help to improve reliability of mobile services and provide acceptable quality of services for the customers.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285781
Mehdi Harounabadi, Mehdi Alireza
Ethernet Passive Optical Network (EPON) is a significant solution in the access layer of network that can provide large amount of bandwidth for different kind of traffic. Idle time in EPON is one of the challenges that could decrease the utilization of EPON channel. To decrease or remove the idle time in EPON network several dynamic bandwidth allocation algorithms have been proposed. Some of the proposed algorithms cannot remove the idle time efficiently in some cases. In this paper a dynamic bandwidth allocation algorithm in EPON has been proposed that efficiently removes the idle time. The proposed algorithm has not any additional cost and increases the channel utilization. The simulation results show the validity and effectiveness of the proposed algorithm.
{"title":"A novel high utilization idle time free dynamic bandwidth allocation algorithm in EPON","authors":"Mehdi Harounabadi, Mehdi Alireza","doi":"10.1109/ICCITECHNOL.2012.6285781","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285781","url":null,"abstract":"Ethernet Passive Optical Network (EPON) is a significant solution in the access layer of network that can provide large amount of bandwidth for different kind of traffic. Idle time in EPON is one of the challenges that could decrease the utilization of EPON channel. To decrease or remove the idle time in EPON network several dynamic bandwidth allocation algorithms have been proposed. Some of the proposed algorithms cannot remove the idle time efficiently in some cases. In this paper a dynamic bandwidth allocation algorithm in EPON has been proposed that efficiently removes the idle time. The proposed algorithm has not any additional cost and increases the channel utilization. The simulation results show the validity and effectiveness of the proposed algorithm.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121647334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285796
Nasreddine Hajlaoui, I. Jabri, Malek Taieb, M. B. Jemaa
The IEEE 802.11n standard promises to extend todays most popular WLAN standard by significantly increasing reach, reliability, and throughput. Ratified on september 2009, this standard defines many new physical and medium access control (MAC) layer enhancements. These enhancements aim to provide a data transmission rate of up to 600 Mbps. The frame aggregation mechanism of 802.11n MAC layer can improve the efficiency of channel utilization by reducing the protocol overheads. In this paper we investigate the effect of frame aggregation on the support of voice and video applications in wireless networks. We also propose a new frame aggregation scheduler that considers specific QoS requirements for multimedia applications. We dynamically adjust the aggregated frame size based on frame's access category defined in 802.11e standard.
{"title":"A frame aggregation scheduler for QoS-sensitive applications in IEEE 802.11n WLANs","authors":"Nasreddine Hajlaoui, I. Jabri, Malek Taieb, M. B. Jemaa","doi":"10.1109/ICCITECHNOL.2012.6285796","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285796","url":null,"abstract":"The IEEE 802.11n standard promises to extend todays most popular WLAN standard by significantly increasing reach, reliability, and throughput. Ratified on september 2009, this standard defines many new physical and medium access control (MAC) layer enhancements. These enhancements aim to provide a data transmission rate of up to 600 Mbps. The frame aggregation mechanism of 802.11n MAC layer can improve the efficiency of channel utilization by reducing the protocol overheads. In this paper we investigate the effect of frame aggregation on the support of voice and video applications in wireless networks. We also propose a new frame aggregation scheduler that considers specific QoS requirements for multimedia applications. We dynamically adjust the aggregated frame size based on frame's access category defined in 802.11e standard.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130400923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285772
M. Makhlouf
The in-depth case-study with two years of participant observation in a very large Telecommunication Operator that has implemented several process approaches shows that, despite the benefits that these approaches can bring to this enterprise, significant problems arise, particularly regarding information systems governance, agility and strategic flexibility. Rich literature on process approaches teaches us the benefits of each approach, however, the impact on IS governance, agility and strategic flexibility of the implementation of multiple process approaches within the same company has never been studied.
{"title":"Case study: Impacts on information systems governance, agility and strategic flexibility of simultaneous implementation of several process approaches","authors":"M. Makhlouf","doi":"10.1109/ICCITECHNOL.2012.6285772","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285772","url":null,"abstract":"The in-depth case-study with two years of participant observation in a very large Telecommunication Operator that has implemented several process approaches shows that, despite the benefits that these approaches can bring to this enterprise, significant problems arise, particularly regarding information systems governance, agility and strategic flexibility. Rich literature on process approaches teaches us the benefits of each approach, however, the impact on IS governance, agility and strategic flexibility of the implementation of multiple process approaches within the same company has never been studied.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116597781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285845
Abdulaziz Alarifi, H. Tootell, P. Hyland
Although the Web, cell phone `apps' and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. While awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by the Malaysian Cyber Security Organization and KPMG. The survey attracted 633 respondents and the results confirmed that ISA in Saudi Arabia is quite low. Several of the areas of weakness in ISA appear to be related to the level of censorship or the patriarchical and tribal nature of Saudi culture.
{"title":"A study of information security awareness and practices in Saudi Arabia","authors":"Abdulaziz Alarifi, H. Tootell, P. Hyland","doi":"10.1109/ICCITECHNOL.2012.6285845","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285845","url":null,"abstract":"Although the Web, cell phone `apps' and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. While awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by the Malaysian Cyber Security Organization and KPMG. The survey attracted 633 respondents and the results confirmed that ISA in Saudi Arabia is quite low. Several of the areas of weakness in ISA appear to be related to the level of censorship or the patriarchical and tribal nature of Saudi culture.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129476088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285826
M. Salem, S. Jarboui, A. Bouallègue
In this paper, we derive for the first time the analytical expressions of the Cramer-Rao lower bound (CRLB) for non-data-aided (NDA) carrier frequency estimation from linearly modulated signals over flat Rayleigh fading channel (FRFC), where the fading gain is not constant during the observation window. Timing delay and phase offset are assumed as perfectly known. The second derivative of the neperian logarithm of the probability density function (PDF) p(x|γ) of the observation vector x parametrized by the carrier frequency offset, is theoretically built up. Then numerical Monte Carlo (MC) method is used to find out the true CRLB and the modified CRB (MCRB) from linearly modulated signals over FRFC with complex additive white Gaussian noise (CAWGN). Through the assessment of the CRLB and the MCRB for various observation window size our method is proven to be trustworthy. The reliability of the method is made obvious from both square quadrature amplitude modulation (QAM) and phase shift keying (PSK) modulated signals. The simulation result has shown that optimal NDA carrier frequency recovery depends on the constellation density for low SNR range. For both QAM and PSK modulations and for different modulation orders, it is shown that the CRLB is as low as the observation window length is larger. We also show that CRLB to MCRB ratio tends asymptotically towards 1 for larger SNR range as far as the modulation density increases. The derived bound provides an efficient standard to compare the performance of any unbiased NDA carrier frequency estimator for linearly modulated signals over FRFC.
{"title":"True Cramer-Rao lower bound for NDA carrier frequency estimation from general M-QAM modulated signals over flat Rayleigh fading channel","authors":"M. Salem, S. Jarboui, A. Bouallègue","doi":"10.1109/ICCITECHNOL.2012.6285826","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285826","url":null,"abstract":"In this paper, we derive for the first time the analytical expressions of the Cramer-Rao lower bound (CRLB) for non-data-aided (NDA) carrier frequency estimation from linearly modulated signals over flat Rayleigh fading channel (FRFC), where the fading gain is not constant during the observation window. Timing delay and phase offset are assumed as perfectly known. The second derivative of the neperian logarithm of the probability density function (PDF) p(x|γ) of the observation vector x parametrized by the carrier frequency offset, is theoretically built up. Then numerical Monte Carlo (MC) method is used to find out the true CRLB and the modified CRB (MCRB) from linearly modulated signals over FRFC with complex additive white Gaussian noise (CAWGN). Through the assessment of the CRLB and the MCRB for various observation window size our method is proven to be trustworthy. The reliability of the method is made obvious from both square quadrature amplitude modulation (QAM) and phase shift keying (PSK) modulated signals. The simulation result has shown that optimal NDA carrier frequency recovery depends on the constellation density for low SNR range. For both QAM and PSK modulations and for different modulation orders, it is shown that the CRLB is as low as the observation window length is larger. We also show that CRLB to MCRB ratio tends asymptotically towards 1 for larger SNR range as far as the modulation density increases. The derived bound provides an efficient standard to compare the performance of any unbiased NDA carrier frequency estimator for linearly modulated signals over FRFC.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285777
Elmahdi Driouch, W. Ajib
Cognitive radio is regarded as an emerging technique developed to enhance the efficiency of spectrum usage. In this paper, we consider a point-to-multipoint secondary network sharing frequency bands with several primary transmitters and receivers. Assuming a cognitive base station equipped with multiple transmit antennas and single antenna receivers, we propose a greedy spectrum sharing algorithm in order to approach the maximum achievable sum rate of the secondary network. First, we model the overall studied system as a weighted graph, and then we formulate the spectrum sharing as a vertex coloring problem. Second, we show that the two problems are similar and we design a greedy algorithm to solve both problems using two selection criteria. We show through computer simulations that the proposed algorithm is able to achieve near-optimal performances with very low computational complexity.
{"title":"Greedy spectrum sharing for cognitive MIMO networks","authors":"Elmahdi Driouch, W. Ajib","doi":"10.1109/ICCITECHNOL.2012.6285777","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285777","url":null,"abstract":"Cognitive radio is regarded as an emerging technique developed to enhance the efficiency of spectrum usage. In this paper, we consider a point-to-multipoint secondary network sharing frequency bands with several primary transmitters and receivers. Assuming a cognitive base station equipped with multiple transmit antennas and single antenna receivers, we propose a greedy spectrum sharing algorithm in order to approach the maximum achievable sum rate of the secondary network. First, we model the overall studied system as a weighted graph, and then we formulate the spectrum sharing as a vertex coloring problem. Second, we show that the two problems are similar and we design a greedy algorithm to solve both problems using two selection criteria. We show through computer simulations that the proposed algorithm is able to achieve near-optimal performances with very low computational complexity.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285839
Ahmed M. Almradi, S. Dianat
In this paper, the Cramer-Rao Lower Bounds (CRLB) for the estimation of Non Data Aided (NDA) Signal to Noise Ratio (SNR) estimation of Binary Phase Shift keying (BPSK) modulated signals over Multiple Input Single Output (MISO) with Space Time Block Codes (STBC) channels is derived. The Alamouti transmit diversity model is used in this paper. Our assumption is that the received signal is corrupted by additive white Gaussian noise (AWGN) with unknown variance, and scaled by fixed unknown complex channel gain. The lower bounds were derived for non-data aided estimation when the transmitted symbols are unknown to the receiver. The NDA bound is then compared to the Data Aided (DA) estimation where the transmitted symbols are known to the receiver. Numerical integration is being used to find the Fisher Information Matrix (FIM) elements in order to calculate the CRLB in the NDA case. It is shown that there is a significant improvement when compared to the Single Input Single Output (SISO) CRLB. In addition, the difference between the NDA and DA CRLBs become smaller at low SNR when diversity is used.
{"title":"Cramer-Rao Lower Bounds of NDA SNR estimation for BPSK modulated signals over MISO with STBC channels","authors":"Ahmed M. Almradi, S. Dianat","doi":"10.1109/ICCITECHNOL.2012.6285839","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285839","url":null,"abstract":"In this paper, the Cramer-Rao Lower Bounds (CRLB) for the estimation of Non Data Aided (NDA) Signal to Noise Ratio (SNR) estimation of Binary Phase Shift keying (BPSK) modulated signals over Multiple Input Single Output (MISO) with Space Time Block Codes (STBC) channels is derived. The Alamouti transmit diversity model is used in this paper. Our assumption is that the received signal is corrupted by additive white Gaussian noise (AWGN) with unknown variance, and scaled by fixed unknown complex channel gain. The lower bounds were derived for non-data aided estimation when the transmitted symbols are unknown to the receiver. The NDA bound is then compared to the Data Aided (DA) estimation where the transmitted symbols are known to the receiver. Numerical integration is being used to find the Fisher Information Matrix (FIM) elements in order to calculate the CRLB in the NDA case. It is shown that there is a significant improvement when compared to the Single Input Single Output (SISO) CRLB. In addition, the difference between the NDA and DA CRLBs become smaller at low SNR when diversity is used.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285778
Jinka Parthasarathi, K. Sundararaman, G. S. V. Rao
Social networks usually involve rich collections of objects, which are jointly linked into complex relational networks. Analyzing these networks for information has gained significant attention in recent years, largely due to the success of online social networking and media-sharing sites like FaceBook, and the consequent availability of a wealth of social network data. Recent past has seen an enormous increase in the research of different problems and methods for social data analysis. Since there is a huge gap between research community and the business groups, the potential business impact of this research is still largely unexplored. In this paper we discuss a well known business problem of emotion analysis of online posts and suggest a new framework named `Perisikan' that could address the problem in a more efficient way. Also we discuss a case study that is built based on this framework which provides real time information.
{"title":"Perisikan: An intelligent framework for social network data analysis","authors":"Jinka Parthasarathi, K. Sundararaman, G. S. V. Rao","doi":"10.1109/ICCITECHNOL.2012.6285778","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285778","url":null,"abstract":"Social networks usually involve rich collections of objects, which are jointly linked into complex relational networks. Analyzing these networks for information has gained significant attention in recent years, largely due to the success of online social networking and media-sharing sites like FaceBook, and the consequent availability of a wealth of social network data. Recent past has seen an enormous increase in the research of different problems and methods for social data analysis. Since there is a huge gap between research community and the business groups, the potential business impact of this research is still largely unexplored. In this paper we discuss a well known business problem of emotion analysis of online posts and suggest a new framework named `Perisikan' that could address the problem in a more efficient way. Also we discuss a case study that is built based on this framework which provides real time information.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122014023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285849
L. Hasan
This research evaluated the usability of educational websites. In particular, it focused on nine Jordanian university websites. Evaluation criteria for assessing the usability of educational websites were developed; these consisted of five categories: navigation, architecture / organisation, ease of use and communication, design and content. Then 237 students were asked to provide ratings for nine Jordanian university websites using the developed usability criteria and their categories. Students were also asked to report qualitatively what they liked and disliked regarding the design of the tested websites. The results provided detailed information for each tested website regarding their conformance with the developed usability criteria. The results showed that the majority of the students were satisfied with the usability of the Jordanian university websites. Specifically, the results showed that the students were satisfied with the content and navigation (ease of use) issues of the tested websites, but were dissatisfied with the design of the websites. Common and unique strengths and weaknesses related to design issues of the investigated websites were identified based on the quantitative results and the qualitative data obtained from the open-ended questions.
{"title":"Evaluating the usability of nine Jordanian university websites","authors":"L. Hasan","doi":"10.1109/ICCITECHNOL.2012.6285849","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285849","url":null,"abstract":"This research evaluated the usability of educational websites. In particular, it focused on nine Jordanian university websites. Evaluation criteria for assessing the usability of educational websites were developed; these consisted of five categories: navigation, architecture / organisation, ease of use and communication, design and content. Then 237 students were asked to provide ratings for nine Jordanian university websites using the developed usability criteria and their categories. Students were also asked to report qualitatively what they liked and disliked regarding the design of the tested websites. The results provided detailed information for each tested website regarding their conformance with the developed usability criteria. The results showed that the majority of the students were satisfied with the usability of the Jordanian university websites. Specifically, the results showed that the students were satisfied with the content and navigation (ease of use) issues of the tested websites, but were dissatisfied with the design of the websites. Common and unique strengths and weaknesses related to design issues of the investigated websites were identified based on the quantitative results and the qualitative data obtained from the open-ended questions.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125979457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}