Volume 2, Issue 5, 2012

By | September 4, 2018

Framework Model for Strategic Plan Using Dynamic Workflow

Reyadh Shaker Naoum, Abdulameer Khalf Hussain
Department of Information System Faculty of Information Technology, Middle East University, Jordan.
Ziad Mohammad Abu-Hamour, Department of Information Technology, Free-Zones Company, Jordan.

Abstract: This paper presents a first application trial of designing a strategic plan depending on dynamic workflow. When designing such strategic plan, it is important to study carefully the organization types. The significant difference of this proposed model from previous studies is that these studies concentrate on day-to-day work while this model is applicable for long-term time strategic plan. The proposed strategic plan is analyzed against different planning parameters and showed that it is considered as a core work for different organizations instead of being a marginal work as in the traditional strategic plans. The proposed strategic planning helps planers to adjust human resources involved in that plan. Also this strategic plan is applied successfully in Free Zone Company in Jordan which is related to products with free tax.

Keywords : Workflow; Strategic Plan; Key Performance Indictor; Processes.

Robust Digital Image Watermarking Technique Based on Histogram Analysis

Hamza A. Ali, Computer Engineering Department, College of Engineering, University of Basrah, Iraq.
Sama’a A. K. khamis, Electrical Engineering Department, College of Engineering, University of Basrah, Iraq.

Abstract: Watermarking techniques can be classified into two main categories; Spatial and Transformational approaches. They are characterized to rely on descriptive global models through which each technique is formalized and structured using models of Steganography and Encryption. This paper presents a robust digital image watermarking technique that attributes the watermarking process to signal modulation model. It is based on the histogram analysis for maximum intensity value of pixels. First, carrier image is properly segmented into blocks, then the histogram for each block is drawn and the peak frequency of occurrence for intensity moments in the carrier image is identified. Then bit values of the modulating (watermark) image are used to modulate the histogram peaks of the intensity. Experimentation and analysis on the proposed algorithm show that it is not only simpler and easier to implement, but also it is very effective, secure and robust against different kinds of attacks such as noise, resizing and rotation. Therefore one can conclude that it establishes a concrete judgment for ownership decision to approve ownership in copy write and ownership disputes.

Keywords : Image in image hiding; Digital watermarking; Steganography; Histogram.

Evaluation of Workflow Strategic Plans

Ziad Mohammad Abu-Hamour, Abdulameer Khalf Hussain
Department of Information Technology, Faculty of Information Technology, Middle East University, Jordan.

Abstract: This paper presents a new model to automate and evaluate manual strategic plans to produce a standard plan depending on the recommended criteria for any standard strategic plan. The difference between this model and the previous works is that the latter studies construct the strategic plans manually, while the proposed model depends on an automated implementation. In the evaluation phase of the proposed model, it compares different manuals strategic plans and provides guidelines for planers to improve their strategic plans. The results of this model reveal many shortcomings in the construction of manual strategic plans, for example the poor utilization of the plan’s resource and poor job assignments for different human resource. Finally, this model is implemented successfully in Free Zones Company in Jordan whose job is related to all free tax products.

Keywords : strategic plans; workflow processes; evaluation criteria; strategic components.

Multi-Level Support Vector Machine

Milad Aghamohammadi, Morteza Analoui
Department of Computer Engineering, Iran University of Science and Technology, Iran.

Abstract: Many type of classifiers have been presented in machine learning and large margin classifier is one of them. Support Vector Machine (SVM) is the most famous of large margin classifiers. SVM is a very useful classifier, but has some limitations. Only patterns near the decision boundary are used as support vectors and decision making in SVM is done locally. In this paper we propose a method that also uses information in other patterns for classification which is called “Multi-Level Support Vector Machine” (MLSVM). We compare our method with the original SVM and an artificial neural network using some UCI datasets and the final results shows that our method is better or equal to other methods.

Keywords : Pattern Recognition; Classification; Large Margin Classifier; Multi-Level Support Vector Machine.

Evaluation and Comparison of Security Issues on Cloud Computing Environment

Priyanka Arora, Arun Singh, IIMT Engineering College, Meerut UP, India.
Himanshu Tyagi, Raj Kumar Goel, Institute of Technology for Women, Ghaziabad, UP, India.

Abstract: Cloud computing basically comes to focus on IT, a way to increase capacity or add potentiality on the fly without investing in new infrastructure, training new personnel, or licensing new software. It encompasses any subscription-based or pay- per-use service that, in real time over the Internet, extends its existing capabilities. It is often provided “as a service” over the Internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Microsoft Azure and Google App Engine are the examples of platform as a service. The fast growth in field of “cloud computing” also increases rigorous security concerns. This paper describes about the performance of different security algorithm on a cloud network and also on a single processor for different input sizes and advanced Encryption Standard security algorithm implemented for ensuring security framework.

Keywords : Encryption; Distributed applications; Performance attributes; Analysis of security algorithms.

Leave a Reply

Your email address will not be published. Required fields are marked *