International Journal of Computer Networks and Communications Security

Volume 3, Issue 1, December 2014

 

 

 

Information Technology Sustainability in Nigeria

Pages: 62-66 (5) | [Full Text] PDF (174 KB)
JOSIAH AHAIWE and ONYEGBULE OLUCHI NGOZI
Dept. of Information Management Technology, Federal University of Technology, OWERRI, Nigeria
Dept. of Computer Science, ALVAN IKOKU Federal College of Education, OWERRI, Nigeria

Abstract -
Information technology has been the core tool for organizations operational efficiency. The rapid development in all sectors of our economic endeavours has encouraged the accommodation of technology providers. This can be testified by the presence of all sorts of information technology devices spread all over business premises to reduce human intervention in most of our business operations today. This paper addresses the issue of continuous sustainability of information technology in Nigeria. Information technology is identified with host of problems and solutions that are closely linked with sustainable development in low and middle income countries like Nigeria. IT offers possibilities for building infrastructures and creating opportunities.
 
Index Terms - Sustainable Development, Information Technology, Economic development, Social Development, Environment development
 

Multi-Context Development of Enterprise Application Software

Pages: 67-77 (11) | [Full Text] PDF (921 KB)
Rattikorn Hewett, Nacha Chondamrongkul and Phongphun Kijsanayothin
Department of Computer Science, Texas Tech University Lubbock, Texas, USA
School of Information Technology, Mah Fah Luang University Chiang Rai, Thailand

Abstract -
Todays enterprise application software (EAS) development needs to cope with complex business processes and large variability due to evolving requirements, diverse computing platforms, execution environments, and implementation technologies. To alleviate these difficulties, our research aims to provide supporting mechanisms that allow developers to (1) focus at the high-level models of EAS systems instead of dealing with the system intricacy at the low-level codes, and (2) adapt to multiple development contexts (e.g., platforms, execution environments, implementation technologies). This paper presents a framework that uses a model-driven development approach to deploy the EAS system models to automatically generate corresponding runtime applications based on its situational awareness of the development context. The framework supports platform evolution by providing an infrastructure that is robust to changing requirements resulting from new target platforms. We describe the architecture of the framework, its underlying infrastructure and mechanisms. We provide a case study of the development of runtime applications of two EAS systems: quote approval and product support as an illustrative example of how the framework can be used in multiple contexts.
 
Index Terms - Model-driven development, enterprise application software, run-time environments
 

A Survey of Big Data Cloud Computing Security

Pages: 78-85 (8) | [Full Text] PDF (479 KB)
Elmustafa Sayed Ali Ahmed and Rashid A.Saeed
Electrical and Electronic Engineering Department, Red Sea University Portsudan , Red Sea State, Sudan
School of Electronics Engineering, Sudan University of Science and Technology Khartoum , Khartoum State, Sudan

Abstract -
Big Data and cloud computing are two important issues in the recent years, enables computing resources to be provided as Information Technology services with high efficiency and effectiveness. Now a days big data is one of the most problems that researchers try to solve it and focusing their researches over it to get ride the problem of how big data could be handling in the recent systems and managed with the cloud of computing, and the one of the most important issue is how to gain a perfect security for big data in cloud computing, our paper reviews a Survey of big data with clouds computing security and the mechanisms that used to protect and secure also have a privacy for big data with an available clouds.
 
Index Terms - Cloud Computing, Big Data, Cloud Providers, NAS, Big Data Security, Big Data Privacy
 

Parametric Modeling of ICTAL Epilepsy EEG Signal Using Prony Method

Pages: 86-89 (4) | [Full Text] PDF (464 KB)
Osama A. Elsayed, Ayman Eldeib and Prof. Fatma Elhefnawi
Student Member, IEEE, Cairo University, NARSS, Egypt
Senior Member, IEEE, Cairo University, Egypt
Senior Life Member, IEEE, ERI,NARSS, Egypt

Abstract -
Pronys method is employed in spectral domain estimation to model epilepsy seizure from humans Electroencephalograph (EEG).This method assumes that the original signal is a sum of damped complex exponential sinusoids. The method has the best frequency resolution compared to Auto Regression (AR) parametric methods. Modeling of the ictal EEG Epilepsy signal is based on the poles of the signal. Computing the poles of the Pronys method, the signal Modeling is based on the location of the poles and number of poles. As we increase number of poles we can minimize the error due to signal reconstruction. The optimum number of poles is calculated to get the minimum error.
 
Index Terms - Electroencephalograph EEG, Epilepsy, Feature Extraction, Pronys Method, Poles