The Society of American Magicians

Displaying 1-40 of 68 results

  • White Papers // Sep 2014

    Data Center Architectures: Challenges and Opportunities

    Recently, data centers became a main part in information and communication technology. Data centers are facing many challenges because of the rapid and continuous growth of applications' size and complexity. In this paper, the authors present an overview of data center architectures challenges and their proposed solutions related to networking...

    Provided By The Society of American Magicians

  • White Papers // Jul 2014

    Autonomic Service Management in Mobile Cloud Infrastructures

    With the introduction and advancement of mobile cloud computing, endless opportunities for the provision of mobile phone services have ensued. Mobile cloud computing technology has brought about a breakthrough in information management by enabling the use of central servers which act as hosts, to deliver the required services, providing flexibility...

    Provided By The Society of American Magicians

  • White Papers // Jul 2014

    The Significance of Mandatory Data Breach Warnings to Identity Crime

    The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways...

    Provided By The Society of American Magicians

  • White Papers // Jul 2014

    Towards Maximizing Throughput for Multithreaded Processes in Linux

    CPU scheduler is a very important key concept in operating system which affects scheduling objectives and criteria. Choosing or modifying scheduling policy for running threads depends on predefined and specific objectives and criteria. In this paper, the authors investigate the effectiveness of Thread Weight Readjustment Scheduler (TWRS) for multithreaded processes...

    Provided By The Society of American Magicians

  • White Papers // Jun 2014

    Security and Integrity of Data in Cloud Computing Based on Feature Extraction of Handwriting Signature

    Cloud computing gains users to store their data into the cloud as the remotest manner so that they can be comforted from the trouble of local data save and maintenance. The user loses the control of his remotely located data. This feature has many security challenges such as the authority...

    Provided By The Society of American Magicians

  • White Papers // Jun 2014

    Using Semantic Web Technologies in Heterogeneous Distributed Database System: A Case Study for Managing Energy Data on Mobile Devices

    Managing energy data from multiple distributed and heterogeneous sources is an important issue worldwide. This paper focused on using semantic web technologies in an energy data management system. Specifically, the authors provided a federated approach - a mediator server - that allows users to access to multiple heterogeneous data sources,...

    Provided By The Society of American Magicians

  • White Papers // May 2014

    Developing Core Software Requirements of Energy Management System for Smart Campus with Advanced Software Engineering

    Higher educational institutions such as universities provide campus data and information to stakeholders such as students, faculty staff, administrators, media, and community members. They also analyze such data and information for decision making, planning and continuous improvement. They obtain necessary capabilities for collecting, providing and analyzing data and information by...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    Designing a New Fuzzy Genetic Gravity Algorithm for Data Mining

    Now-a-days, due to the high volume of data and their complexity and the human needs to the hidden knowledge in them, using an efficient method is necessary. In this paper, the authors' purpose is to present an efficient method of data mining in order to fetch knowledge of input data...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    An Efficient Data Aggregation Method in Wireless Sensor Network based on the SVD

    The Wireless Sensor Networks (WSN) consists of thousand small and inexpensive sensing devices (sensors) with a limited energy resources, memory, computational capability, and communication. In WSN, most of the limited energy will be expended during the communication process, both reception and transmissions. Thus, reducing the amount of energy consumption during...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    Investigating the Suitability of Wireless Web Services to Support Business Processes

    Now-a-days, the authors need to access information anytime from anywhere. This greatly increases their productivity and their quality of life. Previously web services were physically tied up to servers but wireless web services have proved to be very convenient and this convenience has been the most important factor behind the...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    Big Bang-Like Phenomenon in Multidimensional Data

    Notion of the big bang in data was introduced, when it was observed that the quantity of data grows very fast and the speed of this growth rises with time. This is parallel to the big bang of the universe which expands and the speed of the expansion is the...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    The Impact of KMS Success on Corporate Productivity: A Case Study at an IT Services Company

    As a class in IS that manage organizational knowledge, the positive contribution of KMS success to business performance has been published by many researcher. However, there are reports that casted a doubt on such a claim. This paper is one of another exploration on the subject that aimed at investigating...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    MUSYOP: Towards a Query Optimization for Heterogeneous Distributed Database System in Energy Data Management

    The integration of data from multiple distributed and heterogeneous sources has long been an important issue in information system research. In this paper, the authors considered the query access and its optimization in such an integration scenario in the context of energy management by using SPARQL. Specifically, they provided a...

    Provided By The Society of American Magicians

  • White Papers // Mar 2014

    Realization of IP Core for Robot Controlled Trenching System

    An IP core of a robot based trenching system has been designed modeled on Intel's 8051 microcontroller. The designed IP core realizes all 256 instructions of 8051 and also the resources available on a generic 8051 chip. The designed system has both internal and external ROM and RAM, an address...

    Provided By The Society of American Magicians

  • White Papers // Feb 2014

    A New Orthogonal Cryptographic System for Database Security Based on Cellular Automata and Hash Algorithm

    In this paper, the authors have developed a new orthogonal cryptographic system for database security that has used both cellular automata and Hash algorithm. Their algorithm consists of two different parts; encryption/decryption of database tables as well as the generation of the authentication Tag for the activation of the attack...

    Provided By The Society of American Magicians

  • White Papers // Feb 2014

    Security Method: Cloud Computing Approach Based on Mobile Agents

    The cloud computing is a new computer model that provide computer services in the form of services on demand, accessible from anywhere, anytime and by anyone, the cloud computing are mainly used for the treatment of loads computer work very intensive and provide very large storage of data, these two...

    Provided By The Society of American Magicians

  • White Papers // Jan 2014

    Application-Agnostic Interactive Big Data: Managing HCI Complexity at the Source

    In the domain of Human Computer Interaction (HCI), the communication between humans and software is an ongoing challenge. On the one hand, humans have growing needs and expectations. On the other hand, software has more advanced features and functionalities. This dual complexity growth results in difficulty in interaction. User interface...

    Provided By The Society of American Magicians

  • White Papers // Nov 2013

    Mining Positive and Negative Association Rules: An Approach for Binary Trees

    Mining association rules and especially the negative ones has received a lot of attention and has been proved to be useful in the real world. In this work, a set of algorithms for finding both positive and Negative Association Rules (NAR) in databases is presented. A variant of the Apriori,...

    Provided By The Society of American Magicians

  • White Papers // Oct 2013

    A Modified Task Scheduling Algorithm of Task Graph without Communication Time

    The scheduling of tasks on the processors is considered to be a very critical problem in the multiprocessor system. Here, the problem is divided into subtasks and it is assigned on the processors. The overall objective of task scheduling is to minimize the execution time. Considering that the task scheduling...

    Provided By The Society of American Magicians

  • White Papers // Aug 2013

    PKI in B2C E-Commerce

    General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilizing these PKI categories for securing e-commerce transactions. While the former protocol categorized as a general purpose PKI...

    Provided By The Society of American Magicians

  • White Papers // Aug 2013

    Task Scheduling in Multiprocessor System using Fork-Join Method (TSFJ)

    The performance of the multiprocessor system depends on how the tasks are scheduled in multiprocessors. If the authors allocate tasks wisely then they can get good performance of the system. The primary goal of task scheduling in multiprocessor system is to minimize the total execution time, so that they can...

    Provided By The Society of American Magicians

  • White Papers // Jul 2013

    A Survey on Amdahl's Law Extension in Multicore Architectures

    Multicore architectures represent the future of computing since they provide cost effective solutions to improve throughput and performance of parallel programs while keeping power consumption manageable. Amdahl's law continues to serve as a guideline for parallel programmers to assess the upper bounds of attainable performance in multicore architectures. In this...

    Provided By The Society of American Magicians

  • White Papers // Apr 2013

    Processing XML with Java - A Performance Benchmark

    Over time, XML markup language has acquired a considerable importance in applications development, standards definition and in the representation of large volumes of data, such as databases. Today, processing XML documents in a short period of time is a critical activity in a large range of applications, which imposes choosing...

    Provided By The Society of American Magicians

  • White Papers // Apr 2013

    Ultra-Low Complexity Control Mechanisms for Sensor Networks and Robotic Swarms

    Biologically inspired swarms of autonomous robots have been used successfully in a variety of robotic applications ranging from various kinds of ground-based robots, to unmanned aerial vehicles. Typically, all of these systems use digital communications among swarm agents to implement their behavioral rules (e.g., because they need to exchange information...

    Provided By The Society of American Magicians

  • White Papers // Apr 2013

    Scheduling Techniques to Classify Wear Particles on Multi-Computers

    Processor scheduling techniques are used in conjunction to exploit the major paradigms of algorithmic parallelism, geometric parallelism, and processor farming. Static process scheduling techniques are successfully used with algorithmic and geometric parallelism, whilst dynamic process scheduling is better suited in dealing with the independent processes inherent in the processor farming...

    Provided By The Society of American Magicians

  • White Papers // Feb 2013

    A Survey on Security Solutions in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is deployed in sensitive and unattended areas that cannot be reached by human beings. Therefore, it is difficult to maintain them. In addition, sensors are of limited memory, processing power and energy by nature. By consequence, this makes WSN subject to attacks such as network failure,...

    Provided By The Society of American Magicians

  • White Papers // Feb 2013

    Information Security Management Beyond Certification and Accreditation

    Traditional information security approaches rely too heavily on system Certification & Accreditation (C&A) to ensure that a system is sufficiently secure. Such approaches inadequately address security during acquisition and/or development, which increase the risk of the system containing inherent computer vulnerabilities and exposures that may lead to inappropriate issuance of...

    Provided By The Society of American Magicians

  • White Papers // Feb 2013

    Design and Implementation of Cache Manager for Hybrid Storage

    The technology and cost barrier of the SSD motivated many research groups and companies to merge the SSD with low cost and large capacity storage device, Hard Disk Drive (HDD). As the NAND flash memory technology is getting more advanced, price of NAND flash memory dropped dramatically. As number of...

    Provided By The Society of American Magicians

  • White Papers // Feb 2013

    Database Optimization for Large-Scale Web Access Log Management

    In this paper, the authors investigate an optimal method of commercial DBMS for analyzing large-scale web access log. Also, they develop the pre-processor in memory structure to improve performance and the user management tool for user friendliness. The optimal method of DBMS for management of large-scale web access log is...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Analysis of SaaS Multi-Tenant Database in a Cloud Environment

    Recently, cloud computing became a dominant field in the information technology world. It prevails over both academia and industry. Cloud Service Providers (CSP) provides many services such as storage, platform and applications. However, security is the most critical concern that impedes the dominance of cloud usage. Since Software-as-a-Service (SaaS) security...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Fractal Based Data Separation in Data Mining

    The separation of the searched data from the rest is an important task in data mining. Three separation/classification methods are presented. Considering data as points in a metric space, the methods are based on transformed distances of neighbors of a given point in a multidimensional space via a function that...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Spatial Subspace Clustering for Hyperspectral Data Segmentation

    The authors propose a novel method called Spatial Subspace Clustering (SpatSC) for 1D hyperspectral data segmentation problem, e.g. hyperspectral data taken from a drill hole. Addressing this problem has several practical uses such as improving interpretability of the data, and especially a better understanding of the mineralogy. Spatial subspace clustering...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Regulators of Timeliness Data Quality Dimension for Changing Data Quality in Information Manufacturing System (IMS)

    The Information Manufacturing System (IMS) is the information system that manufactures information from raw data. This system works in both real time and non-real time environment in the real world organizations for providing information or decision support. Delivered information from the information manufacturing system could be poor quality for the...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    A Study on Providing Natural Two-handed Interaction Using a Hybrid Camera

    Systems for Human-Computer Interaction (HCI) have been steadily researched; however, interfaces for the systems have been received relatively little attention. Hands play a key role in human-computer interactions. Thus, this paper proposes a hand shape recognition method for implementing hand-based interfaces. The proposed method works robustly in real-time because it...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Error Modeling of Depth Measurement Using FIR Stereo Camera Systems

    In this paper, the authors deal with an error model and its evaluation in estimating the 3-D depth information using stereo camera system. This paper defines an error model caused by stereo matching, and evaluates the error bound empirically in estimating the depth information. The proposed error model is that...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Efficient Temperature Aware Design for Portable Processors

    Efficient temperature aware design in modern portable computers is becoming increasingly important. As technology moves into deep submicron feature sizes, the static or leakage power is expected to increase because of the exponential increase in leakage currents with technology scaling. Within die-process variation is increasing in nanometer technologies, it is...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    NFC Application Interface for Smart Phones and Appliances

    Near Field Communication (NFC) is an emerging short-range wireless communication protocol based on Radio Frequency IDentification (RFID) technology. This paper demonstrates a design of NFC application interface for NFC-enabled smart phones and appliances. The object of this design is to provide an NFC interface for appliances and devices, simplifying the...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Cloud Computing Services in Mobile Devices Using Android Face Detector Api and Rest Communication

    The identity of a person in social networking becomes very important especially when the people want to identify a person. Search for detailed-identity can easily be conducted through a search engines or existing social networking website using computer or laptop. This method is not effective and practical when the authors...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    A New Architecture of an Autonomous System in Cloud Computing

    The continuous increase of network devices complicates the management task of appliances and services. The complexity and the dynamism of the current global network system require an interacting architecture. This should be able to autonomously change the system's structure and functionality with little human intervention. Moreover, the cloud elastic nature...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Convergence of Cloud Computing, Service Oriented Architecture and Enterprise Architecture

    In this paper, the authors argue that there is a convergence of interoperability of Cloud Computing (CC), Service Oriented Architecture (SOA) and Enterprise Architecture (EA). Furthermore, the paper outlines the existing non dynamic links between EA and SOA that are currently practiced in the industry and confirmed by scholarly papers;...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Conception of Service Over Heterogeneous Network, Experimentation

    Mapping between two heterogeneous networks, Multi Protocol Label Switching (MPLS) and IEEE 802.11e is choice of future technology as it has ability to perform traffic engineering and create the corresponds between LSP (Label Switch Path) and AC (Access Category). This paper discusses the mapping between IEEE 802.11 MPLS integration to...

    Provided By The Society of American Magicians

  • White Papers // Oct 2013

    A Modified Task Scheduling Algorithm of Task Graph without Communication Time

    The scheduling of tasks on the processors is considered to be a very critical problem in the multiprocessor system. Here, the problem is divided into subtasks and it is assigned on the processors. The overall objective of task scheduling is to minimize the execution time. Considering that the task scheduling...

    Provided By The Society of American Magicians

  • White Papers // Jul 2013

    A Survey on Amdahl's Law Extension in Multicore Architectures

    Multicore architectures represent the future of computing since they provide cost effective solutions to improve throughput and performance of parallel programs while keeping power consumption manageable. Amdahl's law continues to serve as a guideline for parallel programmers to assess the upper bounds of attainable performance in multicore architectures. In this...

    Provided By The Society of American Magicians

  • White Papers // Aug 2013

    Task Scheduling in Multiprocessor System using Fork-Join Method (TSFJ)

    The performance of the multiprocessor system depends on how the tasks are scheduled in multiprocessors. If the authors allocate tasks wisely then they can get good performance of the system. The primary goal of task scheduling in multiprocessor system is to minimize the total execution time, so that they can...

    Provided By The Society of American Magicians

  • White Papers // Nov 2013

    Mining Positive and Negative Association Rules: An Approach for Binary Trees

    Mining association rules and especially the negative ones has received a lot of attention and has been proved to be useful in the real world. In this work, a set of algorithms for finding both positive and Negative Association Rules (NAR) in databases is presented. A variant of the Apriori,...

    Provided By The Society of American Magicians

  • White Papers // Feb 2013

    A Survey on Security Solutions in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is deployed in sensitive and unattended areas that cannot be reached by human beings. Therefore, it is difficult to maintain them. In addition, sensors are of limited memory, processing power and energy by nature. By consequence, this makes WSN subject to attacks such as network failure,...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard

    Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and inefficient implementation. This paper proposes a...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Genetic Algorithm Approach for Risk Reduction of Information Security

    Now-a-days, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research paper and standards In Security Risk Management (ISRM) including NIST 800-30...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Secure Network Communication Based on Text-to-Image Encryption

    Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is recognized by its IP address. Unfortunately, an IP address is attacked by hackers; this is where one host claims to have the...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Certificate Revocation Management in VANET

    Vehicular Ad hoc Network security is one of the hottest topics of research in the field of network security. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this research new security mechanism is proposed to reduce the...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Security Measurement Based on GQM to Improve Application Security During Requirements Stage

    Developing secure web applications that can withstand malicious attacks requires a careful injection of security considerations into early stages of development lifecycle. Assessing security at the requirement analysis stage of the application development life cycle may help in mitigating security defects before they spread their wings into the latter stages...

    Provided By The Society of American Magicians

  • White Papers // Feb 2013

    Information Security Management Beyond Certification and Accreditation

    Traditional information security approaches rely too heavily on system Certification & Accreditation (C&A) to ensure that a system is sufficiently secure. Such approaches inadequately address security during acquisition and/or development, which increase the risk of the system containing inherent computer vulnerabilities and exposures that may lead to inappropriate issuance of...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    An Algorithmic Approach to Database Normalization

    When an attempt is made to modify tables that have not been sufficiently normalized undesirable side-effects may follow. This can be further specified as an update, insertion or deletion anomaly depending on whether the action that causes the error is a row update, insertion or deletion respectively. Most of the...

    Provided By The Society of American Magicians

  • White Papers // Feb 2014

    Security Method: Cloud Computing Approach Based on Mobile Agents

    The cloud computing is a new computer model that provide computer services in the form of services on demand, accessible from anywhere, anytime and by anyone, the cloud computing are mainly used for the treatment of loads computer work very intensive and provide very large storage of data, these two...

    Provided By The Society of American Magicians

  • White Papers // Feb 2014

    A New Orthogonal Cryptographic System for Database Security Based on Cellular Automata and Hash Algorithm

    In this paper, the authors have developed a new orthogonal cryptographic system for database security that has used both cellular automata and Hash algorithm. Their algorithm consists of two different parts; encryption/decryption of database tables as well as the generation of the authentication Tag for the activation of the attack...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Exploration on Scalability of Database Bulk Insertion with Multi-threading

    The advancement of database engine and multi-core processors technologies have enable database insertion to be implemented concurrently via multithreading programming. In this paper, the authors evaluate the performance of using multithreading technique to perform database insertion of large data set with known size to enhance the performance of Data Access...

    Provided By The Society of American Magicians

  • White Papers // Aug 2013

    PKI in B2C E-Commerce

    General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilizing these PKI categories for securing e-commerce transactions. While the former protocol categorized as a general purpose PKI...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Service Availability and Accessibility of Requirements Using Clustering in Cloud Environment

    Cloud computing is one contemporary technology in which the research community has recently embarked. Cloud computing faces many of the challenges and difficulties. Meeting the user needs is the important issue in any business environment. The need for quality services that satisfies both customers and service providers is very essential....

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Metadata-Derived Keywords for Effective Navigation and Access in Personal File Hierarchies

    Computer systems provide users with abilities to create, organize, store and access information. Most of this information is in the form of documents in files organized in the hierarchical folder structures provided by operating systems. Operating system provided access is mainly through navigation of the file hierarchy, and through keyword...

    Provided By The Society of American Magicians

  • White Papers // Mar 2014

    Realization of IP Core for Robot Controlled Trenching System

    An IP core of a robot based trenching system has been designed modeled on Intel's 8051 microcontroller. The designed IP core realizes all 256 instructions of 8051 and also the resources available on a generic 8051 chip. The designed system has both internal and external ROM and RAM, an address...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Analysis of Fixed Priority SWAP Scheduling Policy for Real-time and Non Real-time Jobs

    Scheduling of real-time jobs is challenging given the fact that they are delay sensitive. In order to improve the performance of such jobs, a number of scheduling policies have been proposed. SWAP, a non-preemptive threshold based policy has been suggested to approximate the Shortest Job First (SJF) policy which is...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Analysis of SaaS Multi-Tenant Database in a Cloud Environment

    Recently, cloud computing became a dominant field in the information technology world. It prevails over both academia and industry. Cloud Service Providers (CSP) provides many services such as storage, platform and applications. However, security is the most critical concern that impedes the dominance of cloud usage. Since Software-as-a-Service (SaaS) security...

    Provided By The Society of American Magicians

  • White Papers // Feb 2013

    Database Optimization for Large-Scale Web Access Log Management

    In this paper, the authors investigate an optimal method of commercial DBMS for analyzing large-scale web access log. Also, they develop the pre-processor in memory structure to improve performance and the user management tool for user friendliness. The optimal method of DBMS for management of large-scale web access log is...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Fractal Based Data Separation in Data Mining

    The separation of the searched data from the rest is an important task in data mining. Three separation/classification methods are presented. Considering data as points in a metric space, the methods are based on transformed distances of neighbors of a given point in a multidimensional space via a function that...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Spatial Subspace Clustering for Hyperspectral Data Segmentation

    The authors propose a novel method called Spatial Subspace Clustering (SpatSC) for 1D hyperspectral data segmentation problem, e.g. hyperspectral data taken from a drill hole. Addressing this problem has several practical uses such as improving interpretability of the data, and especially a better understanding of the mineralogy. Spatial subspace clustering...

    Provided By The Society of American Magicians

  • White Papers // Jan 2013

    Regulators of Timeliness Data Quality Dimension for Changing Data Quality in Information Manufacturing System (IMS)

    The Information Manufacturing System (IMS) is the information system that manufactures information from raw data. This system works in both real time and non-real time environment in the real world organizations for providing information or decision support. Delivered information from the information manufacturing system could be poor quality for the...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    Designing a New Fuzzy Genetic Gravity Algorithm for Data Mining

    Now-a-days, due to the high volume of data and their complexity and the human needs to the hidden knowledge in them, using an efficient method is necessary. In this paper, the authors' purpose is to present an efficient method of data mining in order to fetch knowledge of input data...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    An Efficient Data Aggregation Method in Wireless Sensor Network based on the SVD

    The Wireless Sensor Networks (WSN) consists of thousand small and inexpensive sensing devices (sensors) with a limited energy resources, memory, computational capability, and communication. In WSN, most of the limited energy will be expended during the communication process, both reception and transmissions. Thus, reducing the amount of energy consumption during...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    Investigating the Suitability of Wireless Web Services to Support Business Processes

    Now-a-days, the authors need to access information anytime from anywhere. This greatly increases their productivity and their quality of life. Previously web services were physically tied up to servers but wireless web services have proved to be very convenient and this convenience has been the most important factor behind the...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    Big Bang-Like Phenomenon in Multidimensional Data

    Notion of the big bang in data was introduced, when it was observed that the quantity of data grows very fast and the speed of this growth rises with time. This is parallel to the big bang of the universe which expands and the speed of the expansion is the...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    The Impact of KMS Success on Corporate Productivity: A Case Study at an IT Services Company

    As a class in IS that manage organizational knowledge, the positive contribution of KMS success to business performance has been published by many researcher. However, there are reports that casted a doubt on such a claim. This paper is one of another exploration on the subject that aimed at investigating...

    Provided By The Society of American Magicians

  • White Papers // Apr 2014

    MUSYOP: Towards a Query Optimization for Heterogeneous Distributed Database System in Energy Data Management

    The integration of data from multiple distributed and heterogeneous sources has long been an important issue in information system research. In this paper, the authors considered the query access and its optimization in such an integration scenario in the context of energy management by using SPARQL. Specifically, they provided a...

    Provided By The Society of American Magicians

  • White Papers // Jul 2014

    The Significance of Mandatory Data Breach Warnings to Identity Crime

    The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways...

    Provided By The Society of American Magicians

  • White Papers // Jun 2014

    Security and Integrity of Data in Cloud Computing Based on Feature Extraction of Handwriting Signature

    Cloud computing gains users to store their data into the cloud as the remotest manner so that they can be comforted from the trouble of local data save and maintenance. The user loses the control of his remotely located data. This feature has many security challenges such as the authority...

    Provided By The Society of American Magicians

  • White Papers // Dec 2012

    Using Solid State Disks for HPC Applications

    In this paper, the authors aim to analyze the behavior of SSDs in a HPC context. The characteristics of HPC applications are captured from real and long term HPC running applications, and then they are used to generate representative I/O work-loads. Typical data storage hardware for HPC is adopted and...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    A Survey on Service Availability and Accessibility Issues in Cloud Environment

    Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. The datacenter hardware and software is what the authors will call a \"Cloud\". The idea of cloud computing is evolved from parallel processing, distributed...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Taking \"Anak Emas\" System (MyAnakEmas) to the Cloud

    In this paper, the authors seek to put forth a novel vision, namely the combined deployment of Quadruple Helix Model (QHM) collaboration mooted by Agensi Inovasi Malaysia, \"Whole-of-government\" concept of ICT implementation across the Malaysian government agencies mooted by MAMPU, and the advances in cloud computing that can be used...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    Simulation Framework of Partitioned PUAS Scheduling Algorithm in Multicore Environment

    One of the scheduling paradigms in adaptive real time system environment is known as TUF/UA (Time Utility Function/Utility Accrual) scheduling paradigm. This paper presents the simulation design of Partition PUAS (PPUAS) that is a TUF/UA real time scheduling algorithm for multicore environment using partitioned scheduling scheme. PPUAS solved the overloaded...

    Provided By The Society of American Magicians

  • White Papers // Sep 2012

    A Study on the Translation Mechanism From Relational-Based Database to Column-Based Database

    Lately, Column-based DataBase (CDB) has been considered as a standard solution dealing with the big data. But there is no standard translation mechanism mapping from Relational DataBase (RDB) to CDB. In this paper, the authors proposed a mechanism translating RDB to CDB. They use HBase as their CDB platform. HBase...

    Provided By The Society of American Magicians

  • White Papers // May 2012

    Designing a Tool to Map UML Class Diagram Into Relational Database

    The majority of computer information system developments utilize an object oriented technology such as java to construct the application interface and at the same time relying on the relational database to store the enterprise data. Connecting these two paradigms is not a straightforward task and requires a systematic mapping from...

    Provided By The Society of American Magicians