Table of Contents - Volume 8 Number 3

Context Driving Speed Limit Alert, Synchronized Monitoring System

Pages : 176-183

Abedalhakeem T. E. Issa

View:    Abstract |  PDF  |  XML|

Safe people transportation and Commitment to the specific speed limits is a big challenge facing the individuals and governments any time anywhere. Roads and Traffic control lie at the heart of the modern civilization, the integration of Geographic Information System (GIS) and Global Positioning System (GPS) technologies together can be achieved by a variety of ways and their applications are numerous [1].

Supervision and Management transportation systems are too many, which can efficiently observe and control the vehicles location, speed, traffic congestion and delay and so. GIS and GPS technology attached with wireless communication that are essential to the system for determining the vehicle location and speed and from the data collected by GPS receiver and that stored in Databases we can derived a lot of useful information in observing and managing transport [4].

In this paper, we determining the vehicle Context Driving Speed Limit Alert (CDSLA), one of the possibilities of the system are to provide a warning alarm to the driver when exceeding the speed limit somewhere En routecontravention in that place, Record and save the average speed En route of its primary functions. The proposed system entirely based on the integration of GPS and GIS.

Techniques to handle the huge amount of data associated to digital road maps and data that received from the GPS belongs to the coordinates and speed, in order to trace the accurate position within a reasonable time is Became possible Techniques progression.

To reduce the size of the collected data and processed information by the system has been relying on a client/server technology, the idea is to use two integrated databases the first one for the spatial data processing and the second is for textual as an alternative database to store text coordinates and related information of the spatial data to eliminate the processing time of GIS data, and a cache method to improve the system performance [4].

Hide Abstract


Views 
   PDF Download PDF Downloads: 1243
[hupso]


The Moderating Effect of Knowledge Stocks Capability ‎ on the Relationship Between Business Process Reengineering Factors and Organizational Performance Services Firms

Pages : 184-204

Osman Khalifa1, Siddig Balal Ibrahimand Abdel Hafiez Ali2

View:    Abstract |  PDF  |  XML|

The purpose of this study is to analyze the potential effect of knowledge stocks in the relationship of Business Process Reengineering and the organizational performance. Business Process Reengineering constructs are change management systems and culture, organizational change, top management commitment, information technology infrastructure, and management competence. To analyze this objective, this study reviews various literatures and developed a research model. To examine the research model, Data was collected through a hand-delivery method by sending questionnaires to 221 firms (Financial, Communication and Education). This study used purposive sampling proportionate to the numbers of the firms for sample selection. The findings showed that knowledge stocks moderated the relationship between Business Process Reengineering factors such as change management system and culture, organizational change, top management commitment and overall organizational performance of the firms. Furthermore, the result revealed that knowledge stocks moderated the relationship between management system and culture, organizational change, top management commitment and organizational performance. The outcome of this study provides interest insight to researchers for understanding on the effects of Business Process Reengineering and knowledge stocks on organizational performance

Hide Abstract


Views 
   PDF Download PDF Downloads: 1265
[hupso]


Text Based Image Compression Using Hexadecimal Conversion

Pages : 216-221

Hema Suresh Yaragunti1, and T. Bhaskara Reddy2

View:    Abstract |  PDF  |  XML|

Easy and less-time-consuming transmission of high quality digital images requires the compression-decompression technique to be as simple as possible and to be completely lossless. Keeping this demand into mind, we proposed the lossless image compression technique i.e Text Based Image Compression using Hexadecimal Conversion (TBICH).   The key idea is to increase redundancy of data presented in an image to get the better compression. We are concerned with lossless image compression in this paper .Our proposed technique is Text Based Image compression using Hexadecimal conversion (TBICH). Our approach works as follows: firstly an image is encoded and converts it into text file by using hexadecimal numbers and LZ77 text compression is applied on this encoded file to reduce size. While decompressing, decompress the encoded file and convert into image which is same as original image. The main objective of this proposed technique is to reduce the size of the image without loss and also to provide security.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1713
[hupso]


High Level Security Trust Zones for Private Clouds

Pages : 222-227

R. Vinoth*, B. Guruprasath and B. N. Karthik

View:    Abstract |  PDF  |  XML|

The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is significant. So a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP) is used. Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud architectures equipped with alternative cloud security controls and to show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs

Hide Abstract


Views 
   PDF Download PDF Downloads: 1294
[hupso]


Advantages and Challeging in E Agriculture

Pages : 228-233

Rajkumar M. Chauhan

View:    Abstract |  PDF  |  XML|

E-Agriculture focuse on the enhancement of agricultural and rural development through improved information and communication processes. More specifically, e-Agriculture involves the conceptualization, design, development, evaluation and application of innovative ways to use information and communication technologies (IT) in the rural domain, with a primary focus on agriculture. E-Agriculture is a relatively new term and we fully expect its scope to change and evolve as our understanding of the area grows. Indian Agriculture contributes to 18.6 per cent of India’s GDP, and approximately 59 per cent Indians derive their livelihood from the agricultural sector. Private sector initiatives like contract farming have commercialized the Indian agricultural sector. To enable Community members to exchange opinions, experiences, good practices and resources related to e-Agriculture, and to ensure that the knowledge created is effectively shared and used worldwide.But There is some advantages and drawback which reside in every technology.This paper gives some glims What the technologies give and take in area of agriculture.

Hide Abstract


Views 
   PDF Download PDF Downloads: 5109
[hupso]


Scheduling Strategies in Hadoop: A Survey

Pages : 234-240

S Rashmi1 and  Anirban Basu2

View:    Abstract |  PDF  |  XML|

Hadoop-MapReduce is one of the dominant parallel data processing tool designed for large scale data-intensive cloud computing platforms. Hadoop Mapreduce framework requires a proficient mechanism to allocate and schedule computing resources   which makes it liable to accomplishthe desired preferences for the specific business application. In this paper, an analysis of a few scheduler improvement methods that improves the completion time of the job or the task  has been carried out  in order  to facilitate a judicious choice of the scheduler  based on the requirement and application expectations .

Hide Abstract


Views 
   PDF Download PDF Downloads: 1545
[hupso]


Hybrid Approach for Load Balancing in Cloud Computing

Pages : 241-246

Vineet Richhariya, Ratnesh Dubey and Rozina Siddiqui

View:    Abstract |  PDF  |  XML|

Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good  efficient  strategy to   several   inquiries  residing  inside  cloud computing environment set. complete  balancing must  acquire   straight into   accounts   two     tasks,  one   will be the  resource provisioning as well as  resource allocation  along with   will be   task  scheduling  throughout  distributed System. Round robin algorithm can be   via far  the   Easiest  algorithm  shown   to help  distribute  populate  among nodes. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing  by introducing a concept of assigning different time slices to individual processes depending on their are priorities.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1660
[hupso]


Semantic Web: XML and RDF Roles

Pages : 247-254

Fadi Al kalani

View:    Abstract |  PDF  |  XML|

This research paper presents an overview of the main concepts of the semantic web, and is aiming to present some ideas of developing the concept of semantic web using XML and RDF. In particular, the research reveals the positive impact of using RDF instead of XML through the concept of “Semantic Web”, with the knowledge that many of the researches demonstrated the preference of RDF for the many reasons including simplicity, abstract syntax, and providing a data model. In particular, our main goal is to define the appropriate elements to develop a semantic web using both XML and RDF. Our approach is achieved by developing a simulated web search engine to describe and emphasize the positive role of using RDF rather than XML in web search.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1354
[hupso]