A Gaps Approach to Access the Efficiency and Effectiveness of IT-Initiatives In Rural Areas: case study of Samalta, a village in the central Himalayan Region of India
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 2
Abstract
This paper focuses on the effectiveness and efficiency of IT initiatives in rural areas where topology creates isolation to developmental activities. A village is selected for the study and information is gathered through interviews of village dwellers. These collected responses are then analyzed and a gaps model is proposed.
Authors and Affiliations
Kamal Ghanshala, Durgesh Pant, Jatin Pandey
A New Optimum Frequency Controller of Hybrid Pumping System: Bond Graph Modeling-Simulation and Practice with ARDUINO Board
The strategy of rural development in Tunisia needs to include as one of its priorities: the control of water. In seeking solutions for the energy control dedicated to pumping, it seems interesting to know the benefits of...
A Review and Classification of Widely used Offline Brain Datasets
Brain Computer Interfaces (BCI) are a natural extension to Human Computer Interaction (HCI) technologies. BCI is especially useful for people suffering from diseases, such as Amyotrophic Lateral Sclerosis (ALS) which cau...
CMMI-DEV Implementation Simplified
With the advance technology and increase in customer requirements, software organizations pursue to reduce cost and increase productivity by using standards and best practices. The Capability Maturity Model Integration (...
Expected Reliability of Everyday- and Ambient Assisted Living Technologies
To receive valuable information about expected reliability in everyday technologies compared to Ambient Assisted Living (AAL) technologies, an online survey was conducted including five everyday (train, dishwasher, navig...
Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks
This paper checks the correctness of our novel algorithm for secure, reliable and flexible transmission of big data in two-hop wireless networks using cooperative jamming scheme of attacker location unknown through Marko...