Saturday 4 June 2011

Maturity Models in Information Security

Author Boris Stevanovic
On Pages 44-47
Volume No. 1
Issue No. 2
Issue Date June 01, 2011
Publishing Date June 01, 2011
Keywords Maturity Model, ISM3, SSE-CMM, Information security


Abstract 

 

This paper explains appliance of maturity models in information security. Two information security standards which are using maturity models are explained and compared. 


Download link

http://esjournals.org//Download_June_pdf_1.php

Morphological Edge Detection Algorithm Based on Multi-Structure Elements of Different Directions

Author C.NagaRaju ,S.NagaMani,G.rakesh Prasad,S.Sunitha
On Pages 37-43
Volume No. 1
Issue No. 1
Issue Date May 01, 2011
Publishing Date May 01, 2011
Keywords Fragmentation, edge detection, SE, catchment basins, MSE


Abstract

 

Edge detection is one of the important pre-processing steps in image analysis. Edges characterize boundaries and edge detection is one of the most difficult tasks in image processing hence it is a problem of fundamental importance in image processing. Edges in images are areas with strong intensity contrasts and a jump in intensity from one pixel to the next can create major variation in the picture quality. Edge detection of an image significantly reduces the amount of data and filters out useless information, while preserving the important structural properties in an image. Conventionally, mathematical morphology edge detection methods use single and symmetrical structure elements. But they are difficult to detect complex edge feature, because they are only sensitive to image edge which has the same direction of structure elements. This paper proposed a novel edge detection algorithm based on multi-structure elements morphology of eight different directions. The eight different edge detection results are obtained by using morphological gradient algorithm respectively, and final edge results are obtained by using synthetic weighted method. The experimental results showed that the proposed algorithm is more efficient for edge detection than conventional mathematical morphological edge detection algorithms and differential edge detection operators.

Download link

The Enterprise Content Management can develop the Organizational Value through Knowledge Management


Author Alessandro Zardini, Lapo Mola, Cecilia Rossignoli
On Pages 27-36
Volume No. 1
Issue No. 1
Issue Date May 01, 2011
Publishing Date May 01, 2011
Keywords Knowledge Management, Knowledge-Based View, Enterprise Content Management Systems, Multiview2

Abstract

This study analyzes how Enterprise Content Management systems (ECMs), which manage enterprise knowledge directly correlated with learning in organizational memory, help generate such value by investigating the extent to which developing such technologies actually contributes to improving the efficacy and efficiency of the decision-making processes. For the analysis of the case study we used the action research method, and specifically Multiview2. Hence, a continuous interaction between analysts and method, including the present situation and the future scenario that originated by application of the methodology. The final effects of the reorganization process help reduce the time to market for the design, production, and sale of new products from 24 months to 18 months after the implementation. The ECM system thus optimizes information management in organizational memory, perfects the decision-making process, and improves company performance through competitiveness. Through empirical analyses, various authors have stressed that ECM systems increase efficiency and reduce management and research costs. Few studies consider the impacts of these tools on the organization or company processes. In particular, no research has highlighted the strategic role of the knowledge in “content” as a means to improve and speed up the decision-making process.

Download link:

E-Learning for Car Faulty Diagnosis

Author Adsavakulchai, S, Ngamdumrongkiat N, Chuchirdkiatskul E
On Pages 20-26
Volume No. 1
Issue No. 1
Issue Date May 01, 2011
Publishing Date May 01, 2011
Keywords E-learning, car faulty diagnosis, rule-based

 
Abstract

 

Car fault identification is not easy for inexperienced mechanical engineer or driver because it is needed a lot of knowledge for finding the fault. Therefore, they extremely depend on expert mechanical engineer. In this study, to develop e-learning for car faulty diagnosis by using 19 rule-based of the knowledge-base is collected from mechanical engineer experts, specialized books, and from different car websites. The three knowledge bases of car start problem, break problem, and cooling system problem are created after compiling enough information for each problem using Visual Basic and Microsoft Access. The system is designed to meet user’s needs in terms of ease of use and understandability and convenience that are the most necessary factors that attract users to use the system. Moreover, the system indicated that an expert system will be practical and can be useful in providing consistent car problem detection. It can be concluded that e-learning for car faulty diagnosis is helpful although it might not give a complete guide and help as a human expert namely mechanical engineer do, but at least the e-learning for car faulty diagnosis can give a temporary assistance to those who are in need of an instance help. 

Download Link:

A New Algorithm for Static Task Scheduling For Heterogeneous Distributed Computing Systems

Author Nirmeen A. Bahnasawy, Fatma Omara, Magdy A. Koutb, Mervat Mosa
On Pages 10-19
Volume No. 1
Issue No. 1
Issue Date May 01, 2011
Publishing Date May 01, 2011
Keywords Task scheduling; directed acyclic graph; heuristics; parallel processing; heterogeneous distributed computing systems


Abstract

 

Effective task scheduling is essential for obtaining high performance in Heterogeneous Distributed Computing Systems (HeDCSs). However, finding an effective task scheduling in HeDCSs should take into consideration the heterogeneity of processors and inter-processor communication over head, which results from non-trivial data movement between tasks scheduled on different processors. In this paper, a new high performance task scheduling algorithm called Sorted Nodes in Leveled DAG Division (SNLDD) is presented for HeDCSs with considering a bounded number of processors. The main concept of the proposed algorithm is to divide the Directed Acyclic Graph DAG into levels and tasks in each level are sorted in descending order according to their computation size. A new attribute has been introduced and used to efficiently select tasks for scheduling in HeDCSs. This selection of tasks enables the proposed SNLDD algorithm to generate high-quality task schedule in a heterogeneous computing environment. To evaluate the performance of the proposed SNLDD algorithm, a comparison study has been done between it and the Longest Dynamic Critical Path (LDCP) algorithm which is considered the most efficient algorithm. According the comparative results, it is found that the performance of the proposed algorithm provides better performance than the LDCP algorithm in terms of speedup, efficiency, complexity, and quality.

Download Link:

One-Level Buffer for Call Admission Control in Mobile Cellular Systems


Author Ojesanmi O.A, Ojesanmi S.O, Oyebisi T.O, Odim M
On Pages 6-9
Volume No. 1
Issue No. 1
Issue Date May 01, 2011
Publishing Date May 01, 2011
Keywords Handoff call, network, real-time call, non-real-time call, buffer, channel.


Abstract


Mobile wireless network supports different multimedia applications with different quality of service (QoS) requirements. Meeting these demands requires an efficient allocation of channels in order to cater appropriately for each application. In this paper, we propose a multi-threshold channel allocation scheme with one buffer to care of real time and non-real-time handoff calls in a wireless mobile network with priority. The different traffics considered are, Real-time new call, Real-time handoff call, Non-real-time new call, and non-real-time handoff call. The size of each threshold is dynamically adjusted based on the in-coming traffic rate. The channels in each cell are divided into three parts: one is for real-time new call, the second is for real-time handoff, the third is for non-real-time handoff call and the last one is for non-real-time new call. In addition, a real-time handoff call can preempt non-real-time handoff call in the buffer to be allocated free channels available. The scheme is simulated under different scenarios and simulation results demonstrate that the proposed scheme is able to simultaneously provide satisfactory QoS to the different call types and maintain relatively high resource utilization in a dynamic traffic load environment.