This document discusses the development of an asset management system for higher education institutions using Internet of Things (IoT) technology. It aims to 1) synthesize an asset management model for HEIs, 2) design an asset management system model for good governance using IoT, 3) evaluate the suitability of the asset management cycle for HEIs, and 4) evaluate the main components of the proposed asset management system model. The study developed a model and obtained feedback from 25 experts on the suitability of the asset management cycle and model components. The results showed that the asset management cycle and model components were deemed highly suitable for effective asset management in HEIs.
Data Management for Internet of things : A Survey and DiscussionIRJET Journal
This document discusses data management for the Internet of Things (IoT). It begins with an abstract that outlines the need for improved data management techniques to handle the massive volumes of data produced by IoT devices. The document then provides background on IoT data characteristics that make traditional database solutions inadequate. It surveys current research in IoT data management and proposes a framework that considers the full data lifecycle from collection to deletion. Finally, it performs a gap analysis of existing solutions based on factors like data format, storage architecture, processing speed, and server response time.
A Proposal of National Higher Education Student Information System Infrastruc...IRJET Journal
This document proposes a national higher education student information system infrastructure that allows for interoperability between the different student information systems used by universities in Turkey. It examines the technical feasibility of connecting the various software programs to a central database server to enable sharing of student data and statistics. The proposed system would standardize processes like military discharge of students and enrollment verification across universities. By improving data exchange, the system could help overcome current inefficiencies and issues that arise from universities using different information systems in isolation from each other.
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...cscpconf
This document discusses the development of a knowledge management system for long-term digital preservation on a semantic grid. It presents a conceptual model that integrates knowledge management principles with archival workflows. A logical architecture is described that realizes this model using a semantic datagrid infrastructure based on the OAIS reference model. The goal is to support flexible management of distributed digital archives while enabling new knowledge discovery and value creation through dynamic semantic annotations over time.
The document discusses the challenges of Internet of Things (IoT). It describes IoT as physical objects embedded with sensors, software and technologies to connect and exchange data over the internet. The number of connected IoT devices is expected to grow significantly in the coming years. Some key challenges of IoT include lack of encryption on many devices, limited computing/storage capabilities making devices vulnerable, and manufacturers prioritizing speed to market over security. As more everyday objects become connected, ensuring the security of IoT devices and protecting user data will remain an important challenge.
This document describes the development of a digital wallet app to allow users to securely store important documents such as ID cards, certificates, and notes. The app uses two-factor authentication for login involving biometric authentication and one-time passwords. Documents are stored in encrypted SQL databases. The app provides features for uploading documents, accessing and searching stored documents, and sharing documents with others through secure links. The goal is to provide a convenient way for users to digitally store and access important documents while maintaining high security and privacy standards.
Leveraging IoT Testing to manage Supply Chain Risks.pdfMindfire LLC
IoT is a game-changing technology that has had a significant impact on sectors like retail, transportation, banking, healthcare, and energy. When it comes to supply chain management, the Internet of Things can be extremely handy. Applications for management, forecasting, and supervision assist fleet managers in increasing operational distribution efficiency and adding transparency to decision-making.
Trends in Education and Information Technology in 2020 - IJMITIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations.
Empirical Study: Moroccan Information systems specificities for better IT Gov...INFOGAIN PUBLICATION
The spread of information systems (IS) use has become an essential criterion for judging today's overall development level of a country and its attractiveness for capital and investment. Many international rankings evaluate the performance of different countries at this level. And Morocco occupies a disappointing position compared to its potential. Paradoxically, Morocco is lagging behind, although in the telecom sector, it is ahead of many developing countries, Thus, in 2015, the index NRI (Networked Readiness Index), measuring the preparation of an economy to make effective use of new information technologies (IT) published by the World Economic Forum, ranks Morocco in the 87th place. Indeed, with the exception of large companies that have implemented a set of tools to automate the process, a large number of SMEs and SMIs are very late as far as IT use is concerned. It means that IS in Morocco is still unable to achieve business perspectives for benefits and processes optimization. The aim of this article is to understand the particularities of Moroccan IS to understand the week points to correct in order to govern well enterprise Information technologies.
Data Management for Internet of things : A Survey and DiscussionIRJET Journal
This document discusses data management for the Internet of Things (IoT). It begins with an abstract that outlines the need for improved data management techniques to handle the massive volumes of data produced by IoT devices. The document then provides background on IoT data characteristics that make traditional database solutions inadequate. It surveys current research in IoT data management and proposes a framework that considers the full data lifecycle from collection to deletion. Finally, it performs a gap analysis of existing solutions based on factors like data format, storage architecture, processing speed, and server response time.
A Proposal of National Higher Education Student Information System Infrastruc...IRJET Journal
This document proposes a national higher education student information system infrastructure that allows for interoperability between the different student information systems used by universities in Turkey. It examines the technical feasibility of connecting the various software programs to a central database server to enable sharing of student data and statistics. The proposed system would standardize processes like military discharge of students and enrollment verification across universities. By improving data exchange, the system could help overcome current inefficiencies and issues that arise from universities using different information systems in isolation from each other.
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...cscpconf
This document discusses the development of a knowledge management system for long-term digital preservation on a semantic grid. It presents a conceptual model that integrates knowledge management principles with archival workflows. A logical architecture is described that realizes this model using a semantic datagrid infrastructure based on the OAIS reference model. The goal is to support flexible management of distributed digital archives while enabling new knowledge discovery and value creation through dynamic semantic annotations over time.
The document discusses the challenges of Internet of Things (IoT). It describes IoT as physical objects embedded with sensors, software and technologies to connect and exchange data over the internet. The number of connected IoT devices is expected to grow significantly in the coming years. Some key challenges of IoT include lack of encryption on many devices, limited computing/storage capabilities making devices vulnerable, and manufacturers prioritizing speed to market over security. As more everyday objects become connected, ensuring the security of IoT devices and protecting user data will remain an important challenge.
This document describes the development of a digital wallet app to allow users to securely store important documents such as ID cards, certificates, and notes. The app uses two-factor authentication for login involving biometric authentication and one-time passwords. Documents are stored in encrypted SQL databases. The app provides features for uploading documents, accessing and searching stored documents, and sharing documents with others through secure links. The goal is to provide a convenient way for users to digitally store and access important documents while maintaining high security and privacy standards.
Leveraging IoT Testing to manage Supply Chain Risks.pdfMindfire LLC
IoT is a game-changing technology that has had a significant impact on sectors like retail, transportation, banking, healthcare, and energy. When it comes to supply chain management, the Internet of Things can be extremely handy. Applications for management, forecasting, and supervision assist fleet managers in increasing operational distribution efficiency and adding transparency to decision-making.
Trends in Education and Information Technology in 2020 - IJMITIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations.
Empirical Study: Moroccan Information systems specificities for better IT Gov...INFOGAIN PUBLICATION
The spread of information systems (IS) use has become an essential criterion for judging today's overall development level of a country and its attractiveness for capital and investment. Many international rankings evaluate the performance of different countries at this level. And Morocco occupies a disappointing position compared to its potential. Paradoxically, Morocco is lagging behind, although in the telecom sector, it is ahead of many developing countries, Thus, in 2015, the index NRI (Networked Readiness Index), measuring the preparation of an economy to make effective use of new information technologies (IT) published by the World Economic Forum, ranks Morocco in the 87th place. Indeed, with the exception of large companies that have implemented a set of tools to automate the process, a large number of SMEs and SMIs are very late as far as IT use is concerned. It means that IS in Morocco is still unable to achieve business perspectives for benefits and processes optimization. The aim of this article is to understand the particularities of Moroccan IS to understand the week points to correct in order to govern well enterprise Information technologies.
This document discusses the Internet of Things (IoT) and provides an overview of what IoT is, its architecture and applications. The key points are:
1) IoT connects physical objects through the internet and allows them to collect and transfer data without human assistance. It transitions communication from human-to-human to human-to-device and device-to-device.
2) IoT has six layers in its architecture - perception, network, middleware, application, and business layers. It connects objects through sensors and networks and processes the data through middleware before powering applications.
3) IoT will have over 50 billion connected devices by 2020 and has applications in traffic monitoring, healthcare, security,
Cloud management and monitoring: a systematic mapping studynooriasukmaningtyas
A key component of ensuring that services are available on the cloud at the right time in the right manner is adequate cloud management. This makes it possible to provide services that meets user demands. The purpose of this research is to carry out a systematic study of management and monitoring on the cloud. Three facets were applied in conducting the categorization. These are the contribution, research, and topic facets. The purpose was to determine the level of work so far carried out in the field of cloud management. This enabled the creation of a pictorial representation of the research coverage. The result of the study showed that there are no opinion research on cloud management. Generally, articles on experience research, philosophical research and metric are the lowest at 6.62%, 4.41% and 1.90% respectively, while articles on models, solution research and evaluation research are the highest with 52.38%, 46.32% and 31.62% respectively. The outcome of this study will stimulate further research in the area cloud management and systematic studies.
An internet of things ecosystem for planting of coriander (Coriandrum sativum...IJECEIAES
The internet of things (IoT) is a network of physical devices and is becoming a major area of innovation for computer-based systems. Agriculture is one of the areas which could be improved by utilizing this technology ranging from farming techniques to production efficiency. The objective of this research is to design an IoT to monitor local vegetable (Coriander; Coriandrum sativum L.) growth via sensors (light, humidity, temperature, water level) and combine with an automated watering system. This would provide planters with the ability to monitor field conditions from anywhere at any time. In this research, a group of local vegetables including coriander, cilantro, and dill weed were experimented. The prototype system consists of several smart sensors to accurately monitor the mentioned vegetable growth from seedling stage to a fully grown plant which will ensure the highest production levels from any field environment. Three different types coriander were measured under these parameters: height, trunk width, and leaf width. The result showed that IoT ecosystem for planting different types of coriander could produce effective and efficient plant growth and ready for harvest with a shorter time than conventional method.
The document provides a survey of trust management techniques for the Internet of Things (IoT). It summarizes four key trust management techniques:
1) E-LITHE enhances DTLS security for constrained IoT devices by adding a trusted third party to share secret keys and reduce denial-of-service attacks.
2) GTRS is a graph-based recommender system that calculates trust between IoT devices based on ratings and social relationships to select trusted service providers.
3) TWGA is a trustworthy gateway architecture that establishes trusted paths between domains using device identifiers and public/private keys to authenticate and forward data packets securely.
4) TBBS monitors the behavior and trust of vehicles in an Io
The document summarizes a literature review on existing digital lost and found systems. It identifies several common gaps across different papers, including issues related to location tracking, security, user incentives, and limited functionality. Specifically, papers often lack a holistic approach considering the full user experience and adaptability to different contexts. To address these gaps, future projects should aim for comprehensive solutions that enhance security, user engagement, inclusivity, and explore locating missing individuals and advanced search techniques. This could result in more effective, secure and user-friendly lost and found systems with broader applicability.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The document summarizes Mahdi Fahmideh's presentation on developing IoT based systems. It discusses key challenges in IoT development including security, interoperability, scalability, and data management. It emphasizes the importance of using information systems development methods to manage complexity when building IoT platforms. The presentation then outlines a generic IoT development method including phases, roles, and models. It provides recommendations for designing IoT methods and implications for research including tailoring methods based on scenarios and addressing requirements analysis and human aspects of IoT development.
Student Attendance Management System by Using Fingerprint ReaderIRJET Journal
The document presents a student attendance management system that uses fingerprint recognition to address issues with traditional manual attendance tracking methods. The system aims to streamline the attendance process, minimize errors, and enhance security by leveraging biometric technology. It employs fingerprint scans to uniquely identify each student and record attendance accurately while eliminating proxy attendance. The proposed methodology outlines developing the system by defining requirements, designing the architecture and interface, collecting and recognizing fingerprints, integrating hardware and software, testing functionality and security, and backing up data for recovery.
A Smart ITS based Sensor Network for Transport System with Integration of Io...IRJET Journal
This document discusses a proposed smart transportation system that integrates Internet of Things (IoT), big data approaches, and cloud computing. The system would use sensors to capture transportation data from vehicles and infrastructure in real-time. This IoT data would generate large volumes of diverse data (the "4Vs" of big data) that could be stored and analyzed in the cloud to provide insights for transportation planning and management. The proposed system aims to combine these technologies to develop intelligent transportation system cloud services to help optimize traffic flow and infrastructure usage.
New approaches of Data Mining for the Internet of things with systems: Litera...IRJET Journal
This document provides a literature review of new approaches to data mining for the Internet of Things (IoT). It discusses data mining from three perspectives: data view, method view, and application view. In the data view, it examines data mining functions like classification, clustering, association analysis, time series analysis, and anomaly detection. In the method view, it reviews machine learning, statistical, and deep learning techniques used for data mining. In the application view, it discusses data mining applications in industries like business, healthcare, and government. It also discusses challenges of big data mining for IoT and proposes a framework for large-scale IoT data mining using open source tools.
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOijcsit
For effective management and governance of education system, several efforts have been evolving
continuously by using Information Communication and Technology for Educational Management. The role
of the Information and Communication Technology (ICT) infrastructure particularly services require for
the data intensive and communication intensive application becomes more important. Further, due to the
massive growth of information, situation becomes difficult to manage these services. The present paper
discusses the related issues such as competence building, creation of appropriate ICT infrastructure, ICT
acceptance level etc. required for Information Technology for Educational Management(ITEM)
competence building framework, considered in an earlier approach for core competences for ITEM.
Therefore, it becomes essential to consider the global standard and relevant ICT infrastructure. This effort
will help in activities and resource management for effective implementation of the framework.
Forensic the word which indicate the detective work, which searches for and attempting to discover information. Mainly search is carried out for collecting evidence for investigation which is useful in criminal, civil or corporate investigations. Investigation is applicable in presence of some legal rules.
As criminals are getting smarter to perform crime that is, using data hiding techniques such as encryption and steganography, so forensic department has become alert has introduced a new concept called as Digital Forensic, which handles sensitive data which is responsible and confidential.
The construction industry is an industry that is always surrounded by
uncertainties and risks. The industry is always associated with a threatindustry which has a complex, tedious layout and techniques characterized by
unpredictable circumstances. It comprises a variety of human talents and the
coordination of different areas and activities associated with it. In this
competitive era of the construction industry, delays and cost overruns of the
project are often common in every project and the causes of that are also
common. One of the problems which we are trying to cater to is the improper
handling of materials at the construction site. In this paper, we propose
developing a system that is capable of tracking construction material on site
that would benefit the contractor and client for better control over inventory
on-site and to minimize loss of material that occurs due to theft and misplacing
of materials.
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
Information Technology (IT) is one of the most emerging
fields in today’s Internet world. IT can be defined in various ways,
but is broadly considered to encompass the use of computers and
telecommunications equipment to store, retrieve, transmit and
manipulate data. Infrastructure is the base for everything. IT also
has an infrastructure, which can be managed and maintained
properly. For an organization’s Information Technology,
Infrastructure Management (IM) is the management of essential
operation components, such as policies, processes, equipment,
data, human resources and external contacts, for overall
effectiveness.
In this paper, we propose a methodology to manage the IT
Infrastructure in a better way. Our methodology uses the tree-
structure based architecture to manage the infrastructure with less
manual power. The process of how to manage the infrastructure is
discussed with efficient methodology and necessary steps with
algorithm, in this paper. Also, in this paper, the process of workflow
management on IT infrastructure management has been provided.
Property growth, especially in high-rise buildings in developed and developing countries, has experienced a significant increase. The increasingly
expensive resources and the development of information technology
encourage the growth of smart buildings in almost all countries, especially in
developed and developing countries, and become a trend. The Internet of things (IoT) is the main driver in the development of smart buildings. Property
businesses are competing to adopt and implement smart buildings on their
properties. This is further strengthened by the development of smart cities in
almost all cities around the world, one of the criteria is a smart community.
The purpose of implementing smart buildings is to make property management effective and efficient. Using the systematic literature review,
this paper will discuss what components must be met for a property called a
smart building, then what is the role of smart buildings for an area or community, and how the current smart building trend will be in the future.
Role and Service of Cloud Computing for Higher Education SystemIRJET Journal
1) The document discusses how cloud computing can help address limitations in traditional higher education systems by providing flexible IT infrastructure and resources on an as-needed basis.
2) Traditional systems are limited by high costs of maintaining dedicated infrastructure, inability to adapt to different learning styles, and lack of digital content and tools.
3) Cloud computing allows educational institutions to access computing power, storage, applications, and other resources through the internet without having to build and maintain their own expensive infrastructure. Resources can be scaled up or down as needed.
4) This makes new technologies and digital learning materials more accessible for students and faculty while reducing costs for educational institutions compared to maintaining dedicated systems.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
Grid Computing For Collaborative Research Systems In Kenyan Universities theijes
Grid computing technologies have the potential of providing universities in this country with opportunities and mechanisms to utilize a wide range of heterogeneous, distributed resources for computational and dataintensive applications, and provide an avenue to heterogeneous collaborative research platforms that can be accessed by different hardware and software platforms. The objective of this paper was to find out which technologies are being used to support collaborative research and further investigate the opportunities, benefits provided by grid technologies in universities as well as the challenges faced. The study is carried out through an examination of reports and academic documents from universities in Kenya scientific research papers in journals and conference proceedings, and from online journals and. The paper concludes that there are many benefits of using grid technologies in collaborative research systems and therefore encourages researchers in universities of developing countries to consider utilizing these technologies since many universities are ready and willing to automate and integrate most of their systems that support research.
Policy Issue Paper Example What Are Policy BriefsTodd Turner
The document discusses the steps to request writing assistance from HelpWriting.net. It begins by having the user create an account with a password and email. They then complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample work. The request is posted for writers to bid on, and the user selects a writer based on qualifications, history, and feedback. After receiving the paper, the user can request revisions until satisfied, and HelpWriting offers refunds for plagiarized work. The document promotes the writing assistance services provided by HelpWriting.net.
Write Esse Argumentative Essay First ParagraphTodd Turner
The document provides instructions for creating an account and submitting a request on the HelpWriting.net website to have an assignment written. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied. It emphasizes the site's guarantee of original, high-quality work or a full refund.
More Related Content
Similar to Asset Management System For Good Governance Using The Internet Of Things
This document discusses the Internet of Things (IoT) and provides an overview of what IoT is, its architecture and applications. The key points are:
1) IoT connects physical objects through the internet and allows them to collect and transfer data without human assistance. It transitions communication from human-to-human to human-to-device and device-to-device.
2) IoT has six layers in its architecture - perception, network, middleware, application, and business layers. It connects objects through sensors and networks and processes the data through middleware before powering applications.
3) IoT will have over 50 billion connected devices by 2020 and has applications in traffic monitoring, healthcare, security,
Cloud management and monitoring: a systematic mapping studynooriasukmaningtyas
A key component of ensuring that services are available on the cloud at the right time in the right manner is adequate cloud management. This makes it possible to provide services that meets user demands. The purpose of this research is to carry out a systematic study of management and monitoring on the cloud. Three facets were applied in conducting the categorization. These are the contribution, research, and topic facets. The purpose was to determine the level of work so far carried out in the field of cloud management. This enabled the creation of a pictorial representation of the research coverage. The result of the study showed that there are no opinion research on cloud management. Generally, articles on experience research, philosophical research and metric are the lowest at 6.62%, 4.41% and 1.90% respectively, while articles on models, solution research and evaluation research are the highest with 52.38%, 46.32% and 31.62% respectively. The outcome of this study will stimulate further research in the area cloud management and systematic studies.
An internet of things ecosystem for planting of coriander (Coriandrum sativum...IJECEIAES
The internet of things (IoT) is a network of physical devices and is becoming a major area of innovation for computer-based systems. Agriculture is one of the areas which could be improved by utilizing this technology ranging from farming techniques to production efficiency. The objective of this research is to design an IoT to monitor local vegetable (Coriander; Coriandrum sativum L.) growth via sensors (light, humidity, temperature, water level) and combine with an automated watering system. This would provide planters with the ability to monitor field conditions from anywhere at any time. In this research, a group of local vegetables including coriander, cilantro, and dill weed were experimented. The prototype system consists of several smart sensors to accurately monitor the mentioned vegetable growth from seedling stage to a fully grown plant which will ensure the highest production levels from any field environment. Three different types coriander were measured under these parameters: height, trunk width, and leaf width. The result showed that IoT ecosystem for planting different types of coriander could produce effective and efficient plant growth and ready for harvest with a shorter time than conventional method.
The document provides a survey of trust management techniques for the Internet of Things (IoT). It summarizes four key trust management techniques:
1) E-LITHE enhances DTLS security for constrained IoT devices by adding a trusted third party to share secret keys and reduce denial-of-service attacks.
2) GTRS is a graph-based recommender system that calculates trust between IoT devices based on ratings and social relationships to select trusted service providers.
3) TWGA is a trustworthy gateway architecture that establishes trusted paths between domains using device identifiers and public/private keys to authenticate and forward data packets securely.
4) TBBS monitors the behavior and trust of vehicles in an Io
The document summarizes a literature review on existing digital lost and found systems. It identifies several common gaps across different papers, including issues related to location tracking, security, user incentives, and limited functionality. Specifically, papers often lack a holistic approach considering the full user experience and adaptability to different contexts. To address these gaps, future projects should aim for comprehensive solutions that enhance security, user engagement, inclusivity, and explore locating missing individuals and advanced search techniques. This could result in more effective, secure and user-friendly lost and found systems with broader applicability.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The document summarizes Mahdi Fahmideh's presentation on developing IoT based systems. It discusses key challenges in IoT development including security, interoperability, scalability, and data management. It emphasizes the importance of using information systems development methods to manage complexity when building IoT platforms. The presentation then outlines a generic IoT development method including phases, roles, and models. It provides recommendations for designing IoT methods and implications for research including tailoring methods based on scenarios and addressing requirements analysis and human aspects of IoT development.
Student Attendance Management System by Using Fingerprint ReaderIRJET Journal
The document presents a student attendance management system that uses fingerprint recognition to address issues with traditional manual attendance tracking methods. The system aims to streamline the attendance process, minimize errors, and enhance security by leveraging biometric technology. It employs fingerprint scans to uniquely identify each student and record attendance accurately while eliminating proxy attendance. The proposed methodology outlines developing the system by defining requirements, designing the architecture and interface, collecting and recognizing fingerprints, integrating hardware and software, testing functionality and security, and backing up data for recovery.
A Smart ITS based Sensor Network for Transport System with Integration of Io...IRJET Journal
This document discusses a proposed smart transportation system that integrates Internet of Things (IoT), big data approaches, and cloud computing. The system would use sensors to capture transportation data from vehicles and infrastructure in real-time. This IoT data would generate large volumes of diverse data (the "4Vs" of big data) that could be stored and analyzed in the cloud to provide insights for transportation planning and management. The proposed system aims to combine these technologies to develop intelligent transportation system cloud services to help optimize traffic flow and infrastructure usage.
New approaches of Data Mining for the Internet of things with systems: Litera...IRJET Journal
This document provides a literature review of new approaches to data mining for the Internet of Things (IoT). It discusses data mining from three perspectives: data view, method view, and application view. In the data view, it examines data mining functions like classification, clustering, association analysis, time series analysis, and anomaly detection. In the method view, it reviews machine learning, statistical, and deep learning techniques used for data mining. In the application view, it discusses data mining applications in industries like business, healthcare, and government. It also discusses challenges of big data mining for IoT and proposes a framework for large-scale IoT data mining using open source tools.
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOijcsit
For effective management and governance of education system, several efforts have been evolving
continuously by using Information Communication and Technology for Educational Management. The role
of the Information and Communication Technology (ICT) infrastructure particularly services require for
the data intensive and communication intensive application becomes more important. Further, due to the
massive growth of information, situation becomes difficult to manage these services. The present paper
discusses the related issues such as competence building, creation of appropriate ICT infrastructure, ICT
acceptance level etc. required for Information Technology for Educational Management(ITEM)
competence building framework, considered in an earlier approach for core competences for ITEM.
Therefore, it becomes essential to consider the global standard and relevant ICT infrastructure. This effort
will help in activities and resource management for effective implementation of the framework.
Forensic the word which indicate the detective work, which searches for and attempting to discover information. Mainly search is carried out for collecting evidence for investigation which is useful in criminal, civil or corporate investigations. Investigation is applicable in presence of some legal rules.
As criminals are getting smarter to perform crime that is, using data hiding techniques such as encryption and steganography, so forensic department has become alert has introduced a new concept called as Digital Forensic, which handles sensitive data which is responsible and confidential.
The construction industry is an industry that is always surrounded by
uncertainties and risks. The industry is always associated with a threatindustry which has a complex, tedious layout and techniques characterized by
unpredictable circumstances. It comprises a variety of human talents and the
coordination of different areas and activities associated with it. In this
competitive era of the construction industry, delays and cost overruns of the
project are often common in every project and the causes of that are also
common. One of the problems which we are trying to cater to is the improper
handling of materials at the construction site. In this paper, we propose
developing a system that is capable of tracking construction material on site
that would benefit the contractor and client for better control over inventory
on-site and to minimize loss of material that occurs due to theft and misplacing
of materials.
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
Information Technology (IT) is one of the most emerging
fields in today’s Internet world. IT can be defined in various ways,
but is broadly considered to encompass the use of computers and
telecommunications equipment to store, retrieve, transmit and
manipulate data. Infrastructure is the base for everything. IT also
has an infrastructure, which can be managed and maintained
properly. For an organization’s Information Technology,
Infrastructure Management (IM) is the management of essential
operation components, such as policies, processes, equipment,
data, human resources and external contacts, for overall
effectiveness.
In this paper, we propose a methodology to manage the IT
Infrastructure in a better way. Our methodology uses the tree-
structure based architecture to manage the infrastructure with less
manual power. The process of how to manage the infrastructure is
discussed with efficient methodology and necessary steps with
algorithm, in this paper. Also, in this paper, the process of workflow
management on IT infrastructure management has been provided.
Property growth, especially in high-rise buildings in developed and developing countries, has experienced a significant increase. The increasingly
expensive resources and the development of information technology
encourage the growth of smart buildings in almost all countries, especially in
developed and developing countries, and become a trend. The Internet of things (IoT) is the main driver in the development of smart buildings. Property
businesses are competing to adopt and implement smart buildings on their
properties. This is further strengthened by the development of smart cities in
almost all cities around the world, one of the criteria is a smart community.
The purpose of implementing smart buildings is to make property management effective and efficient. Using the systematic literature review,
this paper will discuss what components must be met for a property called a
smart building, then what is the role of smart buildings for an area or community, and how the current smart building trend will be in the future.
Role and Service of Cloud Computing for Higher Education SystemIRJET Journal
1) The document discusses how cloud computing can help address limitations in traditional higher education systems by providing flexible IT infrastructure and resources on an as-needed basis.
2) Traditional systems are limited by high costs of maintaining dedicated infrastructure, inability to adapt to different learning styles, and lack of digital content and tools.
3) Cloud computing allows educational institutions to access computing power, storage, applications, and other resources through the internet without having to build and maintain their own expensive infrastructure. Resources can be scaled up or down as needed.
4) This makes new technologies and digital learning materials more accessible for students and faculty while reducing costs for educational institutions compared to maintaining dedicated systems.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
Grid Computing For Collaborative Research Systems In Kenyan Universities theijes
Grid computing technologies have the potential of providing universities in this country with opportunities and mechanisms to utilize a wide range of heterogeneous, distributed resources for computational and dataintensive applications, and provide an avenue to heterogeneous collaborative research platforms that can be accessed by different hardware and software platforms. The objective of this paper was to find out which technologies are being used to support collaborative research and further investigate the opportunities, benefits provided by grid technologies in universities as well as the challenges faced. The study is carried out through an examination of reports and academic documents from universities in Kenya scientific research papers in journals and conference proceedings, and from online journals and. The paper concludes that there are many benefits of using grid technologies in collaborative research systems and therefore encourages researchers in universities of developing countries to consider utilizing these technologies since many universities are ready and willing to automate and integrate most of their systems that support research.
Similar to Asset Management System For Good Governance Using The Internet Of Things (20)
Policy Issue Paper Example What Are Policy BriefsTodd Turner
The document discusses the steps to request writing assistance from HelpWriting.net. It begins by having the user create an account with a password and email. They then complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample work. The request is posted for writers to bid on, and the user selects a writer based on qualifications, history, and feedback. After receiving the paper, the user can request revisions until satisfied, and HelpWriting offers refunds for plagiarized work. The document promotes the writing assistance services provided by HelpWriting.net.
Write Esse Argumentative Essay First ParagraphTodd Turner
The document provides instructions for creating an account and submitting a request on the HelpWriting.net website to have an assignment written. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied. It emphasizes the site's guarantee of original, high-quality work or a full refund.
Cover Page For Essay The Best Place To Buy Same DTodd Turner
The document provides instructions for creating an account on a writing assistance website and submitting requests for papers to be written. It outlines a 5-step process: 1) Create an account with an email and password. 2) Submit a request with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied. It notes the site uses a bidding system and guarantees original, high-quality work or a refund.
10 Printable Lined Paper Templates - Realia ProjectTodd Turner
The document discusses racism in the United States. It notes that while the US has the largest economy in the world, comprising around 17-22% of global GDP, it still experiences issues with racism. It then briefly discusses Christianity as the dominant religion in the US before shifting to discuss the author's personal experiences with culture and lack of witnessed racism in the Philippines.
How To Pay Someone To Write My Essay. Online assignment writing service.Todd Turner
The document provides instructions on how to pay someone to write an essay. It outlines a 5-step process: 1) Create an account, 2) Complete an order form providing instructions and deadline, 3) Review bids from writers and choose one, 4) Review the completed paper and authorize payment, 5) Request revisions to ensure satisfaction and receive a refund if plagiarized. The purpose is to guide customers through outsourcing the writing of their essay to professional writers.
(PDF) The Issue Of Poverty In The Provision Of Quality EduTodd Turner
The document provides instructions for how to request and receive writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied with the work. It emphasizes that original, high-quality content is guaranteed or a full refund will be provided.
Essay Writing Tricks How To Write EssayTodd Turner
The document provides instructions for writing essays through online services, including creating an account, completing an order form with instructions and deadline, reviewing writer bids and authorizing payment upon approval of the completed work, which can be revised multiple times to ensure satisfaction.
The document provides instructions for creating an account, submitting a paper request, reviewing bids from writers, and revising papers on the HelpWriting.net writing assistance website. It explains that users can create an account, complete an order form with instructions and deadlines, choose a writer based on qualifications and reviews, and receive unlimited revisions to ensure satisfaction. The website aims to provide original, high-quality content and refunds if papers are plagiarized.
Pin On Preschool Resources. Online assignment writing service.Todd Turner
I apologize, upon further reflection I do not feel comfortable generating fictional creative writing without more context or direction. How else may I assist you?
About Us - Mandarin Class Hong Kong E-Learning SiteTodd Turner
The document discusses a school district considering changing from a K-6 to a K-8 grade configuration to address overcrowding issues. It outlines how the district reviewed research on the benefits of K-8 schools versus traditional middle schools and identified pros like improved student performance as well as cons such as costs of changing school facilities and resistance from parents accustomed to the prior model. A research report was submitted to the school board comparing the configurations and their impacts.
The Public Works Department in Lake Success Village is responsible for maintaining parks, streets, sanitary sewers, storm drains, and more. It cleans streets, plows snow, cuts grass, plants trees, and constructs signs. Residents also have access to some Town of North Hempstead services like parks, pools, golf courses, and emergency planning through tax payments. Local churches and synagogues provide religious community.
Marco Materazzi Archive Outlining A Hunt Paper IdeTodd Turner
The document outlines the composition and charge of a Digital Curation Task Force (DCTF) at a small university. The DCTF is tasked with developing a digital curation plan for the university archives. The plan will focus on building a digital repository program to provide better access to the archives' holdings. The task force should include members from the archives, library, and other parts of the university with relevant expertise, such as digital curation, metadata, software development, and more. Creating the repository will require a creative, feasible, and sustainable strategy given current budget constraints.
Custom WritingThesis I. Online assignment writing service.Todd Turner
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account, 2) Complete an order form providing instructions, sources, and deadline, 3) Receive bids from writers and select one, 4) Review the paper and authorize payment, 5) Request revisions to ensure satisfaction. The service aims to provide original, high-quality content and offers refunds for plagiarized work.
Comparing Two Poems Essay Example - PHDessTodd Turner
The document provides an outline for an essay analyzing the role of the sky goddess Nut in Egyptian mythology. It discusses how Nut was depicted as the sky and mother to the stars and sun, swallowing the sun god each night and giving birth to him each day to control the passage of time. It also notes that Nut controlled the passage of the deceased between life and death. The outline then examines Nut's role in Egyptian art as the bearer of the gods and keeper of time through her control of the sun and movements of constellations.
Printable Thanksgiving Writing Paper (Pack 1) - NTodd Turner
The document discusses the steps involved in requesting and receiving writing assistance from HelpWriting.net. It outlines 5 steps: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund offered for plagiarized work. The process involves registering, placing an order, selecting a writer, reviewing the work, and requesting revisions.
Discover How To Write A Term Paper And Find New Examples - PaperWritingProTodd Turner
This document provides instructions for writing a term paper by using the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email; 2) Complete an order form with instructions, sources, and deadline; 3) Review writer bids and choose one to start the assignment; 4) Review the completed paper and authorize payment if satisfied; 5) Request revisions until fully satisfied, with a refund option for plagiarized work. The goal is to help students confidently get high-quality, original term papers written.
How To Format Essays - Ocean County CollegeTodd Turner
Kepler discovered three laws of planetary motion: 1) Planets move in ellipses with the sun at one focus. 2) A line connecting a planet to the sun sweeps out equal areas in equal times. 3) The square of a planet's orbital period is proportional to the cube of its average distance from the sun.
Format For A Research Paper A Research Guide For StuTodd Turner
The document provides a 5-step guide for students to get writing assistance from HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline and sample work.
3. Review bids from writers and choose one based on qualifications, history and feedback.
4. Receive the paper and ensure it meets expectations, then pay the writer.
5. Request revisions until fully satisfied, with a refund option for plagiarized work.
Halloween Pumpkins Letterhead For Kids Writing PTodd Turner
1. The document discusses the theme of manipulation in the play Medea. It describes how Jason manipulated Medea to help him capture the Golden Fleece, but then abandoned her to marry the princess of Corinth for power and wealth, establishing a pattern of his manipulation.
2. Jason then manipulates the past by lying about it and blaming Medea for the problems, using omission to deceive others and make his story more believable. The power of manipulation is discussed and how it can be misused or taken too far, harming people.
3. Medea is described as observant and manipulative as well in the play.
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Receive the paper and authorize payment if pleased. 5) Request revisions until fully satisfied, with the option of a full refund for plagiarized work. The process aims to ensure original, high-quality content that meets the customer's needs.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Thesis Statement for students diagnonsed withADHD.ppt
Asset Management System For Good Governance Using The Internet Of Things
1. Asset Management System for Good Governance Using the
Internet of Things
Watjanarat Kuandee1*, Prachyanun Nilsook1,2, Panita Wannapiroon1,3
1 Division of Information and Communication Technology for Education, King Mongkut's University of
Technology North Bangkok, Bangkok, Thailand.
2 Vocational Educational Technology Research Center, King Mongkut's University of Technology North
Bangkok, Bangkok, Thailand.
3 Innovation and Technology Management Research Center, Science and Technology Research Institute, King
Mongkut's University of Technology North Bangkok, Bangkok, Thailand.
* Corresponding author. Tel.: +66891899891; email: watjanarat.k@gmail.com
Manuscript submitted March 25, 2018; accepted May 16, 2018.
Abstract: The purposes of the study were: (1) to synthesise an asset management for higher education
institutions (HEIs), (2) to design the model of the asset management system for good governance using the
Internet of Things, (3) to evaluate the suitability of the asset management cycle for HEIs, and (4) to evaluate
the suitability of the main components of the model of the asset management system for good governance
using the Internet of Things. The sample consisted of twenty-five experts who each have more than five
years’ experience in asset management and information technology and were selected by purposive
sampling. The instruments used for gathering data were: (1) an evaluation form as to the suitability of the
asset management cycle and (2) an evaluation form of the main components of the model. After analyzing
the data, it showed that: (1) the evaluation of the results with regard to the suitability of the asset
management cycle for HEIs can be seen to be at the highest appropriate level and (2) the evaluation of the
suitability of the results in terms of the main components of the model of an asset management system for
good governance using the Internet of Things can be seen to be at the highest appropriate level.
Key words: Asset management systems, good governance, internet of things.
1. Introduction
Information and communication technology is currently progressing and achieving rapid development. It
is the heart of operations in both public and private organizations [1]. Companies demand information and
communication technology in different ways [2], yet it is intended for the same purpose, i.e. information
technology is used to communicate between different devices [3], [4], or, perhaps for communication
through the Internet, people to people using the Internet or on a device. New technologies are generated
every year and communication between objects through the Internet is prevalent. Various items,
accessories and equipment are using the Internet to communicate information technology between
themselves (Internet of Things: IoT).
Higher education institutions (HEIs) in Thailand have assets under their control that are used for
operating activities and other benefits for the organization. When these assets are increased, it is recorded
and stored on the computer, in order for it to become easier to find. However, doing so does not measure the
condition of each asset, property, inventory shift, etc. Even with the use of computers to store data, it takes
International Journal of e-Education, e-Business, e-Management and e-Learning
316 Volume 9, Number 4, December 2019
doi: 10.17706/ijeeee.2019.9.4.316-323
2. time to inspect the availability and condition of the assets. The use of paper to record or edit the
information and then to save it to the computer can be too troublesome. It can lead to problems regarding
an information request to an application for equipment, which may cause an error during the process that
cannot be controlled or monitored.
Asset management in higher education institutions using Supply Chain Management (SCM),
incorporating the introduction of the concept of the Internet of Things, can be used to communicate
information between Smart Devices (Smart Phones or Tablets) through sensor and tags technology. So
electronic devices can communicate with each other [5], manage activities and issues that occur over asset
control, in order to enhance efficiency [6] such as inspection of assets status, monitoring, asset age analysis,
reported assets, etc. This will add value throughout the workflow in the supply chain, total system wide
costs and the exchange of information in the system will become more accurate [7], [8] with real time
information [6], [9]. The sharing of information must be throughout the supply chain. The information will
be used to support decisions in different areas [10] or for forecasting future assets, transparency in
administration, cost, accountability and good governance principles.
Therefore, this research is studying asset management using the Internet of Things to aid further
development and implementation of an Asset Management System for the operation of asset management
with good governance.
2. Literature Review
2.1. Asset Management of Higher Education Institutions
The assets under the control of higher education institutions are materials, equipment, land and
buildings used in operating activities for the maximum benefit of the organization. Items that are
considered as materials can be broken down into three categories (1) durable materials, including materials
that are durable but do not last for long when deployed and damaged and which cannot be repaired or are
badly repaired, (2) non-durable materials, including materials that once used, will be changed within a
short time and not maintain their original form and (3) material components and spare parts, including
items that are used as accessories or spare parts for the repair and maintenance of assets [11], [12].
Durable assets are characterised by their durability, long lasting and, once damaged, can be repaired [12].
Universities in Thailand have lots of assets in their possession and they need to manage those assets to
meet their needs and use them to their maximum benefit until the asset becomes obsolete or damaged and
they need to assign responsibilities in proper asset management [13]-[15]. They could consider using
Supply Chain management (SCM) when managing assets in the university to act as a strategy or tactic when
it comes to managing activities and relationships within the organization. Planning the appropriate asset,
control and maintenance, sale or destruction and by giving importance to information exchange, data
analysis and sharing, they can ensure efficiency throughout the process [7], [8], [16]-[18].
2.2. Internet of Things
The Internet of Things (IoT) is used to enable objects, tools or devices to connect and communicate
across the Internet [19], [20]. There is a network of physical devices, vehicles, buildings and other items
—embedded with electronics, software, sensors, actuators and network connectivity that enable these
objects to collect and exchange data [21]. With the objective of standardising access to all kinds of
ubiquitous devices, facilities and assets [22], the Internet of Things has developed from industries that
adapt to support collaboration between machines (M2M) by focusing on real time data logging solutions
across complex structures and widely diverse sections [22]-[24]. There are three basic application modes
for the Internet of Things as follows: (1) object intellectual label such as barcode, QR code, RFID, NFC.
International Journal of e-Education, e-Business, e-Management and e-Learning
317 Volume 9, Number 4, December 2019
3. Technology is employed to identify specific objects in order to distinguish the objects from one another, (2)
environment monitoring and object tracking where various types of sensors and widely spread sensor
networks are used to acquire the real state of objects and monitor the specific behaviour of objects and (3)
object intellectual control, based on a cloud computing platform and intellectual network, decisions can be
made by data obtained from the sensor network and the behaviour of objects can be changed to control and
feedback [25].
Examples of Tags technologies those are adapted to use with IoT to support management of universities’
assets.
• Radio-frequency identification (RFID) is used to specify various assets in an organization [26]. RFID
uses radio frequency in the form of an RFID Tag that can be read via radio waves to monitor remotely and to
record data embedded or attached to objects such as tables, chairs, cabinets, computers etc. [27]. RFID tags
have an excellent potential for warehousing and asset tracking and make it possible to know exactly how
much of something exists in real-time and reducing the risk of mis-counting the inventory [28]. RFID is also
adapted for use in higher education institutions such as libraries, food centers and to specify entry and exit
times in access control systems [26].
• Near Field Communication (NFC) is a standards-based short-range wireless connectivity technology at
a distance of less than 10 cm that enables simple and safe peer-to-peer interconnections between electronic
devices [27], [29]-[31]. NFC is a contactless technology based on the RFID, it uses the magnetic field
induction to communicate between electronic devices [31], [32]. This technology has high safety and is easy
to use. NFC is often used in sending and receiving a certain amount of data in a short period of time, which
makes it appropriate for mobile devices such as mobile phones and tablets [33]. It helps to make everyday
life more convenient including payments, transport, tracking and monitoring assets, marketing and
information access [28].
• Barcode is a technology used to monitor products’ status, monitor sales, inventory and asset tracking
[34]. Barcodes can be read by using a barcode scanner or barcode reader, which is a faster way compared to
entering data into the computer by scanning a laser on to barcodes. The scanner acts as a hardware device
and transmits data to a computer [35]. Nowadays, the use of barcodes with a mobile computer allows goods
to become more portable for storage, display, monitoring and processing. Moreover, it could also be applied
to higher education institutions, such as to monitoring the status of relocating assets, equipment, etc.
• QR Code is used to store text information. QR Codes can be applied in various formats, such as to store
a website’s URL, telephone number and various other text data, in which a smart phone can be used to scan
the QR Code to track products, name cards and magazines and it will automatically display the information
recorded [28], [35]. Aside from this, it is also popular in the format of name cards where personal
information is stored in the QR Code such as name, position, address, phone number and email address.
This reduces the waste in natural resources, such as paper. Simply use a smart phone to scan the QR Code
and the information will be displayed and stored in the smart phone automatically.
Tags technologies could be adapted for use in asset management of higher education institutions in order
to control and keep track of information on the assets and to classify what they are, which budget was used
for the purchase, who is the person in charge and where it is placed. Additionally, it can be used for repair
history and its relocation, which is contactless and need not be seen as it works by using the reader.
2.3. Good Governance
Good governance is a concept, a basic principle and a way in which operations or managements abide by
moral and ethical systems. It is a way of managing and supervising various processes to follow fair
procedures [9], [36]. Good Governance shall be six elements including: (1) Rule of Law, (2) Ethics, (3)
Transparency, (4) Participation, (5) Accountability, and (6) Value.
International Journal of e-Education, e-Business, e-Management and e-Learning
318 Volume 9, Number 4, December 2019
4. 3. Results
From the study documents and literature review, it has been is divided into three sections as follows:
1) Synthesised results of asset management for higher education institutions, summarised in Table 1.
Table 1. Analysis of Asset Management Processes for Higher Education Institutions
Stages of Process
Comptroller
[14]
N.
Siriprasomsup
[15]
Internal
Audit
Ministry
of
the
Interior
[13]
P.
Nitipanprapat
[37]
KMUTNB
[38]
Good Governance
The
Rule
of
Law
Ethics
Transparency
Participation
Accountability
Value
1. Specify needs
2. Management of Acquiring
Assets
3 .Control
4 .Maintenance
5 .Sale of asset
6 .Destruction
From Table 1, it is found that the cycle of asset management for higher education institutions is divided
into four stages: (1) Planning (2) Management of Acquiring Assets (3) Control and Maintenance (4)
Distribution. Each process will work in accordance with Good Governance. Good Governance is consistent
with every process, which is the Rule of Law, Transparency and Value.
2) Results from the model of the asset management system for good governance using the Internet of
Things are indicated in Fig. 1.
Fig. 1. The model of an asset management system for good governance
using the Internet of things.
Fig. 1 shows an asset management system for good governance using the Internet of Things, which
consists of two parts including:
Part 1: The Asset Management System (AMS) is a system which applies the idea of the IoT to manage
International Journal of e-Education, e-Business, e-Management and e-Learning
319 Volume 9, Number 4, December 2019
5. assets in higher education institutions. It is divided into three tiers: (1) an Asset Detection Tier involves an
asset detection system using AMS applications in NFC-compatible smartphones. NFC-compatible
smartphones will send radio signal at a certain frequency to detect the asset attached with a NFC Tag at a
specific distance. After connecting with the asset, the system requesting and responding data through
TCP/IP by exchanging JSON format with interfacing REST Service in order to post/get data, process, and
store the data in a web server and a database server on cloud technology in the IoT management tier. The
process is able to distinguish and identify which data the asset contains. If the data is incorrect, the user can
edit and save the data in real time, (2) the IoT Management Tier provides services to users with regard to
using AMS. The process is divided into two major aspects: (2.1) REST Services is a communication
architecture accessed using HTTP Method (GET, POST, PUT, and DELETE). The service is stateless, using
URI/URL of the request to search and process data, and the response in the form of XML, HTML or JSON.
AMS applies REST services for communicating and exchanging services, using the components of
Headquarter AMS Online Transaction Processing (HQ AMS OLTP), (2.2) Cloud Server include web server
and database server: this collects and processes the received request, and responds to the user. In this
process, authentication is provided and user permission is obtained from Active Directory/LDAP storing in
Users’ LDAP Catalog, (2.3) Reporting system acts as a headquarter for analyzing asset data and reports
related to these assets. The user can choose to view such reports in the form of documents or statistical
presentations, and (2.4) System management which is HQ AMS OLTP is divided into four main parts: (2.4.1)
Asset Transaction Processing, (2.4.2) Master Maintenance and Backend Operation System containing six
parts: asset register, asset control (depreciation), asset circulation, asset transaction history tracking, asset
repair history tracking, and recording asset data into NFC tag, (2.4.3) Batch Jobs, and (2.4.4) Monitoring
System, and (3) Information Management Tier. This is a process which the user can manage information in
the backend of the system through a web browser in order to manage data in a system management and
reporting system running on cloud computing. The system will immediately evaluate data by processing
forms from the web server and database server in the IoT management tier.
Part 2: Good Governance is applying the idea of supply chain management and Near Field Communication
(NFC) to use as guidelines in developing the Asset Management System. The system creates reliability and
trust with regard to an organization according to the following three principles: (1) The Rule of Law:
adhering to the requisite rules and regulations, (2) Transparency: being able to keep track and investigate
each procedure in all working processes, and (3) Value: using assets most efficiently and most beneficially
to the public.
3) After synthesizing the asset management processes for HEIs and the model of an asset management
system for good governance using the Internet of Things, the researchers created a questionnaire to
ascertain the opinions of experts in the Asset Management and Information Technology fields with
more than five years’ experience. Twenty-five experts were selected using a purposive sampling
method. In brief, the evaluation of the suitability of the results with regard to asset management for
HEIs can be divided into two parts: (1) the evaluation of the results with regard to the suitability of
the asset management cycle for HEIs can be seen to be at the highest appropriate level (x ̅= 4.67, S.D.
= 0.51). The asset management cycle for higher education institutions is at the highest level in terms
of quality (x ̅= 4.59, S.D. = 0.55) and good governance (x ̅= 4.77, S.D. = 0.42). (2) the evaluation of the
suitability of the results in terms of the main components of the model of an asset management
system for good governance using the Internet of Things can be seen to be at the highest appropriate
level (x ̅= 4.59, S.D. = 0.49). The main components of the Asset Detection Tier is measured at the
highest level (x ̅= 4.60, S.D. = 0.50) as are the main components of the IoT Management Tier (x ̅= 4.64,
S.D. = 0.49). The main components of Information Management Tier is measured at the highest level
International Journal of e-Education, e-Business, e-Management and e-Learning
320 Volume 9, Number 4, December 2019
6. (x ̅= 4.60, S.D. = 0.50); similarly, the model that is appropriate for real utilization is at the highest
level (x ̅= 4.52, S.D. = 0.51).
4. Conclusion
Effective asset management is the key to achieving good results from planning to acquire assets to sale or
destruction. By focusing on asset management, it enables organizations to achieve their goals [6]. Use of
assets is efficient and rewarding, reducing overall expenses and reducing demand for new assets that are
not required through a proper system of planning and management [39], [40]. Each institution should
consider the choice of Tags technology for IoT to support an asset management system in Good Governance.
For higher education institutions, each one should consider, according to the nature of the organization,
from strategic management, the benefits from investment in Tags (RFID, NFC, Barcode, QR Code and others)
and the IoT technologies which are available and their costs, as the environment of institutions differ [25],
[26], [41]. Choosing the proper technology appropriate for the organization will allow the information
system to be accurate and ready for use in order to assist in decision making in various situations in a
timely manner, transparent and accountable [9]. These are factors that allow management to be effective
and reduce operating time.
Acknowledgment
The researchers would like to thank Faculty of Science and Technology, Surindra Rajabhat University,
Division of Information and Communication Technology for Education, Faculty of Technical Education,
Vocational Education Technology Research Center, Innovation and Technology Management Research
Center at Science and Technology Research Institute, King Mongkut’s University of Technology North
Bangkok, which supported this research.
References
[1] Kuandee, W., & Wannapiroon, P. (2015). System analysis of open educational resources management
system for higher education based on cloud technology. Proceedings of International e-Learning
Conference 2015 (pp. 335-339).
[2] Nilsook, P., & Wannapiroon, P. (2012). Blended e-learning activities for the information and innovation
management course: Its outcomes of graduate students’ Bangkok-Thonburi University. Proceedings of
International e-Learning Conference 2012 (IEC2012), Bangkok, Thailand.
[3] Nilsook, P., & Sriwongkol, T. (2009). The development of multi-weblog with knowledge management for
Thailand’s higher education. Proceedings of International Conference on Information and Multimedia
Technology (ICIMT 2009), Jeju Island, South Korea.
[4] Nilsook, P., & Wannapiroon, P. (2014). International distance consulting via web conferencing.
International Journal of Emerging Technologies in Learning, 9(4), 60-64.
[5] Sentell, J. (2014). Barcodes and the Internet of Things.
[6] Jun, L., & Fang, M. (2013). The design of asset management service platform in universities based on
cloud computing model. Mechatronic Sciences, Electric Engineering and Computer (MEC), 1649-1652.
[7] Mentzer, J. T., DeWitt, W., Keebler, J. S., Min, S., Nix, N. W., Smith, C. D., & Zacharia, Z. G. (2001). What is
supply chain management. Supply Chain Management, 1-25.
[8] Nagurney, A. (2006). Supply Chain Network Economics: Dynamics of Prices, Flows, and Profits. Edward
Elgar Publishing.
[9] Adamov, A., Erguvan, M., & Durmaz, S. (2010). Towards good governance through implementation of
University Management Information System: Qafqaz University's Experience. Application of
International Journal of e-Education, e-Business, e-Management and e-Learning
321 Volume 9, Number 4, December 2019
7. Information and Communication Technologies (AICT).
[10] Nilsook, P., Utakrit, N., & Clayden, J. (2014). Imagineering in education: A framework to enhance
students' learning performance and creativity in thinking, educational technology. 54(1). 14-20.
[11] Budget Office. (2015). Improving the categorization of expenditure budgets.
[12] Budget Office. (2016). Guidelines for determining what material and equipment are supplied by the
categorization of expenditure budgets.
[13] Internal Audit Ministry of the Interior. (2012). Operations manual inspection. Control of Material and
Equipment.
[14] Office of Standard Accounting Practice. Comptroller. (2014). Asset Management.
[15] Siriprasomsup, N. (2013). How to Optimize Asset Management.
[16] Chopra, S., &Meindl, P. (2007). Supply Chain Management: Strategy, Planning and Operation. New Jersey,
Prentice Hall, Inc.
[17] Kuandee, W. (2016). Supply chain management for higher education in Thailand. Journal of Vocational
and Technical Education (JVTE), 6(12), 36-45.
[18] Office of the National Economic and Social Development Board. (2013). Strategic Plan for the
development of logistics of Thailand Vol.2 (2013-2017).
[19] Ketcham, M. (2016). Internet of Things (IoT).
[20] Wing, M., Stanford-Clark, A.. & Tolva, J. (2010). The Internet of Things.
[21] ITU. (2015). Internet of Things Global Standards Initiative.
[22] Kanjanalap, C., & Kiattisin, S. (2015). Enabling IOT in enterprise mobility management to support
business continuity plans. Big Data, IoT, and Cloud Computing (BIC 2015).
[23] Holler, J., Tsiatsis, V., Mulligan, C., Karnouskos, S., Avesand, S., & Boyle, D. (2014). From
Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence. Elsevier,
Waltham, MA, USA.
[24] Zhou, H. (2013). The Internet of Things in the Cloud: A Middleware Perspective. Baca Raton: CRC Press,
Taylor & Francis Group.
[25] Li, Z., & Xiao, X. (2012). Design of asset supply chain management system based on internet of things
for Chinese universities. Proceedings of Computer Science and Electronics Engineering (ICCSEE) (pp.
396-400).
[26] Wei, Z., Zhang, Y., & Yang, J. (2013). Confidential assets management system based on RFID and cloud
computing. Consumer Electronics, Communications and Networks (CECNet), 196-198.
[27] Postscapes. (2016). IoT Technology Guidebook.
[28] Sutter, B. (2015). Future of barcodes, RFID, & image barcodes. How They Will Impact IOT.
[29] Agrawal, P., & Bhuraria, S. (2012). Near field communication. SETLabs Bridfings, 10(1), 67-74.
[30] Ecma International. (2013). Near Field Communication Interface and Protocol -2 (NFCIP-2).
[31] Maorapong, V. (2013). NFC Technology for the Future.
[32] Wu, S., & Yang, C. (2013). Promoting collaborative mobile payment by using NFC-Micro SD technology.
Services Computing (SCC), 454-461.
[33] Raja, H. Q. (2011). What Is NFC, How It Works And What Are Its Practical Applications.
[34] Trujillo, P. (2014). Barcodes and the Internet of Things.
[35] Produce Label and Ribbon. (2011). What Is Barcode.
[36] Pholwathana, L. (2014). Good governance for university administration. Journal of Educational
Administration: Burapha University, 8(2), 16-27.
[37] Nitipanprapat, P. (2016). Professional Supply Management.
[38] Procurement Division. (2012). KMUTNB Regulation on Procurement Act 2551 and amendment. (No. 2)
International Journal of e-Education, e-Business, e-Management and e-Learning
322 Volume 9, Number 4, December 2019
8. 2555 and (No. 3) 2555.
[39] Habib, M., Tewari, V., & Raman, V. (2011). An Exploratory Research on Educational Supply Chain
Management, 242-246.
[40] Pathik, B. B., Chowdhury, M. T., & Habib, M. (2012). A descriptive study on supply chain management
model for the academia. Proceedings of Management of Innovation and Technology (ICMIT) (pp.
191-196).
[41] Benyo, B., Sodor, B., Doktor, T., & Fordos, G. (2012). Student attendance monitoring at the university
using NFC. Wireless Telecommunications Symposium (WTS).
Watjanarat Kuandee is a Ph.D. candidate in information and communication technology
for education, Faculty of Technical Education, King Mongkut’s University of Technology
North Bangkok (KMUTNB), Bangkok, Thailand.
Prachyanun Nilsook is an associate professor at the Division of Information and
Communication Technology for Education, King Mongkut's University of Technology
North Bangkok (KMUTNB), Thailand. He currently works in the field of ICT for education.
He is a member of Professional Societies in the Association for Educational Technology of
Thailand (AETT).
Panita Wannapiroon is an assistant professor at the Division of Information and
Communication Technology for Education, King Mongkut's University of Technology,
North Bangkok (KMUTNB), Thailand. Presently, she works in the field of ICT in education.
She is a member of Professional Societies in the Apec Learning Community Builders,
Thailand (ALCoB), and Association for Educational Technology of Thailand (AETT).
International Journal of e-Education, e-Business, e-Management and e-Learning
323 Volume 9, Number 4, December 2019