International Journal of Information Engineering and Electronic Business (IJIEEB)

IJIEEB Vol. 7, No. 3, May. 2015

Cover page and Table of Contents: PDF (size: 135KB)

Table Of Contents

REGULAR PAPERS

Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems

By Sohag Kabir A S M Ashraful Alam Tanzima Azad

DOI: https://doi.org/10.5815/ijieeb.2015.03.01, Pub. Date: 8 May 2015

Time delays in system states or control may result into unacceptable system operation or uncertainty in specialised technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability, traceability, flexible management, reliability, and safety of such systems with time-delays, has been one of the primary research focuses of the last few decades. In parallel computing, different computing subunits share their tasks to balance loads to increase performance and throughput. In order to do so, subsystems have to communicate among themselves, adding further delay on top of existing system delay. It is possible to maintain performance and stability of the whole system, by designing observer for every subsystem in the system, overseeing the system state and compensating for existing time-delay. This paper reviews present literature to identify a linear time-delay system for load balancing and evaluates the stability and load balancing performance of the system with and without an observer. Stability is analysed in terms of oscillation in the system responses and performance is evaluated as the speed of load-balancing operation.

[...] Read more.
Effects of Network Infrastructure sharing Challenges on Open Information Communication Technology Infrastructure Sharing among Mobile Service Providers in Kenya

By Peter Namisiko Maurice Sakwa Mwangi Waweru

DOI: https://doi.org/10.5815/ijieeb.2015.03.02, Pub. Date: 8 May 2015

The study sought to investigate the effects of network infrastructure challenges on open ICT infrastructure sharing by Mobile Service Providers in Kenya. Specifically, the study investigated network sharing challenges as the main determinants to open ICT infrastructure sharing by Mobile Service Providers in Kenya. The empirical literature revealed that Open ICT Infrastructure sharing can substantially reduce capital and operational expenditure thereby increasing the speed of network rollouts, improve coverage and help meet the capacity demands of increased data traffic. Other reviews revealed that each sharing environment is different and may have pressures and priorities that change throughout the process of establishing a partnership between two operators with a view to developing a framework for Open ICT infrastructure sharing. Data was collected from employees from Safaricom, Airtel and Orange in order to study the population. A target population of 800 employees from the three Mobile Service Providers in Kenya was considered. Both Stratified and purposive sampling techniques were used to identify the respondents. A sample size of 86 respondents was used in this study using both structured questionnaires and scheduled interviews. Both descriptive and inferential statistics were used to analyse data collected from respondents in this study. Network service control and Coverage, Network growth and Experience and Resources were identified as the main challenges facing Network sharing by Mobile Service Providers. It is hoped that the results obtained from this study will be beneficial to stakeholders in Mobile Service industry formulate policies that promote ICT Infrastructure sharing with a view to promoting universal access and saving on expenditures.

[...] Read more.
Increasing ERP Implementation Success Ratio by Focusing on Data Quality & User Participation

By M. Rizwan Jameel Qureshi Alnamer M. Abdulkhalaq

DOI: https://doi.org/10.5815/ijieeb.2015.03.03, Pub. Date: 8 May 2015

ERP systems projects have been spread widely across many organizations in general and small and medium enterprises (SMEs) in particular. Regrettably, failures were the results for most of the ERP implementations. As a result of that, critical failure and success factors (CFFs & CSFs) have been identified with the help of large number of researches. Accordingly, data quality and user participation were categorized as two of the most critical factors that threaten the success of the ERP projects. In order to raise the success percentage of such projects, a data cleansing methodology and some guidelines for user participation have been proposed.

[...] Read more.
ADPCM Image Compression Techniques for Remote Sensing Applications

By Ashok Kumar Rajiv Kumaran Sandip Paul Sanjeev Mehta

DOI: https://doi.org/10.5815/ijieeb.2015.03.04, Pub. Date: 8 May 2015

ISRO's remote sensing continuity mission Resourcesat-II provided better radiometric performance as compared to Resourcesat-I. However, this improvement required implementation of onboard image compression techniques to maintain same transmission interface. In LISS-4 payload, prediction based DPCM technique with 10:7 compression ratio was implemented. Based on received data from this payload, some ringing artifacts were reported at high contrast targets, which degrade image quality significantly. However occurrences of such instances were very few. For future missions, efforts are made to develop an improved low complex image compression technique with better radiometry and lesser artifacts. Adaptive DPCM (ADPCM) technique provides better radiometric performance. This technique has been implemented onboard by other space agencies with their own proprietary algorithm. To maintain existing 10:7 compression ratio, novel ADPCM techniques with adaptive quantizers are developed. Developed ADPCM techniques are unique w.r.t. predictor and encoding. Developed techniques improve RMSE from 1.3 to 10 times depending on image contrast. Ringing artifacts are reduced to 1% from 38% with previous technique. Developed techniques are of low complexity and can be implemented in low end FPGA.

[...] Read more.
Self-Healing Mechanism for Reliable Architecture with Focus on Failure Detection

By Eslam Nazemi Tahere Talebi Hadi Elyasi

DOI: https://doi.org/10.5815/ijieeb.2015.03.05, Pub. Date: 8 May 2015

Many companies are embracing e-commerce, or business conducted on-line over electronically networks, as a means of expanding markets, improving customer service, reducing costs, and enhancing productivity. Like other companies, banks are taking steps to expand the use of computer science technology in their business operations. On the other hand, in recent years, the adoption of e-banking began to occur quite extensively as a channel of distribution for financial services due to rapid advances in IT and intensive competitive banking markets. For a bank that wants to remain in the competition, it's more important that each e-banking service have some features such as reliability, availability, extensibility. So we have represented a new e-banking framework which used a biology concept so called self-healing. In our framework, we presented some additional services respect to self-healing cycle for decrease the failure frequency and consequently increase services reliability.

[...] Read more.
An Approach for Effective Image Retrievals Based on Semantic Tagging and Generalized Gaussian Mixture Model

By Anuradha. Padala Srinivas Yarramalle MHM Krishna Prasad

DOI: https://doi.org/10.5815/ijieeb.2015.03.06, Pub. Date: 8 May 2015

The present day users navigate more using electronic gadgets, interacting with social networking sites and retrieving the images of interest from the information groups or similar groups. Most of the retrievals techniques are not much effective due to the semantic gap. Many models have been discussed for effective retrievals of the images based on feature extraction, label based and semantic rules. However effective retrievals of images are still a challenging task, model based techniques together with semantic attributes provide alternatives for efficient retrievals. This article is developed with the concepts of Generalized Gaussian Mixture Models and Semantic attributes. Flicker dataset is considered to experiment the model and efficiency is measured using Precision and Recall.

[...] Read more.
Integration of Heterogeneous Cloud Storages through an Intermediate WCF Service

By Parvinder Kaur Manish Mahajan

DOI: https://doi.org/10.5815/ijieeb.2015.03.07, Pub. Date: 8 May 2015

Many organizations provide computing resources or services to the client like hardware, software, storage etc. Storage is one of important service that is popular and commonly used today and it provides storage space online to store the data. Service providers give a storage space to consumers on the basis of renting criteria with a trust of high and powerful security. Consumer and organizations uses these storages to secure own personal data. There are many reasons come across that causes to move data from one place to another. Some of them are: reconstruction of storage, backup, new technologies, security etc. So, data migration, data transfer between different cloud storages, often requires. Achieving mechanism of Data migration between clouds is very difficult because of its different architecture to store data. For example Window Azure cloud storage creates a primary key name ID automatically whenever a new table is created. Architecture of cloud storage is depending upon its implementation done by corresponding cloud vendors (like Microsoft). 
The main vision of this research work is to provide an intermediate service to move the data between both homogeneous and heterogeneous cloud storages. This intermediate service is a two way strategy that built in a SOA technology called WCF that helps the clients, organizations to move data between same and different cloud storages (Window Azure and Go Daddy cloud storages mainly used in this research work).

[...] Read more.
An Image Steganography-based Novel Approach to develop 8-Share Integrated Security Toolkit (ISTI-8)

By Sabyasachi Samanta Saurabh Dutta Gautam Sanyal

DOI: https://doi.org/10.5815/ijieeb.2015.03.08, Pub. Date: 8 May 2015

Encryption is a process or algorithm to make information hidden or secret and considered as a subset of cryptography. Using encryption data are being transformed into some another form that appears to be meaningless and incomprehensible. Here we have embedded encrypted data bits about the entire image to some suitable nonlinear pixel positions using key. After that we have formed several shares of image and key using R, G and B components and character or digits respectively. At the decryption end through appropriate arrangement of shares of image and key, make possible to retrieve hidden data bits from stego-image and reform into its original content.

[...] Read more.