Time filter

Source Type

Gaborone, Botswana

Syamsuddin I.,Center for Applied Research
Journal of Theoretical and Applied Information Technology | Year: 2016

This study aims to propose a novel gap analysis framework that can be used to identify any problems in Cloud Health Information Systems projects. Advance implementation of cloud computing to improve Health Information Systems needs a comprehensive gap analysis methodology considering many aspects associated with the technology. The new gap analysis is derived from two widely used methodologies namely ITPOSMO and ServQUAL. The way to integrate both techniques is discussed along with how it could be easily applied by evaluators of Cloud Health Information Systems projects. © 2005 - 2016 JATIT & LLS. All rights reserved. Source

Liu X.,Center for Applied Research | Lindroos M.,University of Helsinki | Sandal L.,Norwegian School of Management
Environmental and Resource Economics | Year: 2014

We studied cooperative and competitive solutions for managing a trans-boundary fish stock that has a stock-size dependent distribution and harvesting costs, using Norwegian spring-spawning (NSS) herring (Clupea harengus) as a case study. This is among the first studies to investigate the effect of a dynamic distribution in a partition function game framework, i.e., including externalities. The special feature of NSS herring is that it comes under the sole ownership of Norway when the stock size is sufficiently low. The three players in our game are differentiated by stock ownership, cost per unit effort and stock elasticity of harvest. We find that cost asymmetry improves the likelihood of forming a stable grand coalition as harvesting load can be assigned to each fishing zone according to a player’s relative cost level and the density of fish. A dynamic distribution increases the bargaining power of Norway because of her ability to control both the total stock and the stock shares in different zones, especially during the stock transition years. However, the bargaining power of Norway may disappear if her cost of harvesting exceeds that of the other players. This loss of bargaining power can take on two forms: first, a dynamic distribution may encourage a minor player to free ride because Norway, needing a coalition partner to improve her cost-effectiveness, would be less inclined to retaliate as retaliation hurts her ally as much as the free-rider; second, in a stable grand coalition, Norway is not guaranteed to receive an allocation of benefit shares in proportion to (not to say in excess of) her stock ownership. At the current stock condition, the strategy where Norway reduces stock abundance below the level where the stock becomes non-migratory is found attractive only if the discounting rate is sufficiently high. © 2014 Springer Science+Business Media Dordrecht Source

Syamsuddin I.,Center for Applied Research
International Journal on Smart Sensing and Intelligent Systems | Year: 2013

RFID technology has many potential applications that would ease object identification seamlessly. One of its potential benefits to government is the adoption of RFID tag as embedded smart material within vehicle license plate. However, adoption of RFID in vehicle license plate is fragile from various RFID attacks while efforts to improve its security will lead to additional cost. Enhancing RFID security without extra cost poses new challenges to researchers in the area. This study aims to provide a state of the art on RFID authentication protocols under low cost restriction as a foundation for decision maker for further development stage of RFID based vehicle license plate. In depth analysis is performed by assessing the protocols according to three features namely data protection, tracking prevention, and forward security. Finally, it is concluded that the protocols are vary in satisfying three aspects of security features. Source

Vanderpost C.,University of Botswana | Ringrose S.,University of Botswana | Matheson W.,SunArt Pty Ltd. | Arntzen J.,Center for Applied Research
Journal of Arid Environments | Year: 2011

A methodology was devised for comparison of generalised range condition over time, irrespective of the nature of original imagery used. It was applied for range condition change mapping throughout Botswana through 1984-2000. Results showed that range degradation was most widespread during the 1980s drought when 25% of the country was affected, decreased to 6.5% in 1994 and increased to 9.8% in 2000. This suggests that these semi-arid rangelands are fairly resilient and can withstand " normal" droughts even under conditions of heavy grazing pressure. However, degradation that persists during normal or above average rainfall years is related to increasing livestock and other pressures on rangelands and may represent areas with severe range recovery problems. This application meets some requirements of a semi-arid developing country looking to improve range condition monitoring over relatively remote areas. © 2010 Elsevier Ltd. Source

Syamsuddin I.,Center for Applied Research
ARPN Journal of Engineering and Applied Sciences | Year: 2016

RFID plays a significant role in current manufacturing automation. Automatic identification as fundamental characteristic of RFID enables manufactures to reduce cost and time which in turn let them increase total productivity. However, security is still regarded as a serious issue to entirely deploying RFID for whole identification processes of manufacturing systems. This paper proposes a new insight on how to tackle the security problem by taking into account cloud computing technology to current RFID based manufacturing system. After careful review on related literature, hash chain authentication protocols in different approaches were chosen as the viable option to address the problem. Using cloud computing paradigm, a novel cloud based RFID manufacturing system powered by hash chain authentication protocol is conceptualized from the perspective of Security Authentication as a Service. © 2006-2016 Asian Research Publishing Network (ARPN). Source

Discover hidden collaborations