Journal of Communication and Computer-David Publishing Company
About |  Help  |  Contact

  Journal of Communication and Computer

 Choose the Journal Year:
 Choose the Month:


Volume 9, Number 6, June 2012
Buy now

E-Government: Learning from a Success Story

Mohammad Nabil Almunawar, Patrick Kim Cheng Low and Mohammad Habibur Rahman


Abstract: The advancement of e-government in South Korea is a success story. Within few years, South Korea has advanced to the final stage of e-government evolution model [developed by the UNDESA (United Nations Department of Economics and Social Affairs)], while many countries that started their e-government projects at about the same time are still wandering around in early stages of evolution. The development of e-government in South Korea can be divided into two phases. The first phase started in 2001 during the Kim Dae-Jungs administration when a SCEG special committee for e-government) was formed and the second phase began in 2003 during the Roh Moo-Hyuns administration. This paper highlights and analyses several key success factors are identified, although perhaps the most significant one is the strong political will of the top leaders in making e-government as one of the most important agendas for government innovation and national development in South Korea.


Key words: E-government, South Koreas e-government, e-government evolution, e-government success factors.


Abstract: The surveillance system manipulates large amounts of video data especially for searching and querying the objects of interest, systematically acting as the CBVR (content-based video retrieval) system. Challengingly, the video retrieval technique must be accurate, reliable, and not complex due to time consuming according to amounts of data. In this paper, we propose a novel method of object-based video retrieval using color and spatial information of human appearance, applied for searching human object in the video surveillance system. Experimentally, our method archives at high precision and recall rate.


Key words: Video retrieval, spatial information, color histogram, surveillance system.


Some Conceptual Views on Information Security of the Society

Rasim Alguliev, Yadigar Imamverdiyev and Farhad Yusifov


Abstract: Mechanisms existing in the international practice on ensuring information security were studied, the work done in the direction of formation of a national legal and regulatory base in this area was investigated and proposals were put forward. As a key component of security of the society, duties of information security were specified, existing threats and their targets were investigated, proposals and recommendations to ensure information security of the society were given. 


Key words: Information security, information society, electronic science.


Abstract: With the rapid development of IT, the rapid processing of heterogeneous data in the distribution network has become the focus of increasing concern. In this paper, on the basis of Web services specifications, semantic Web services, XML (Extensible Markup Language) technology, and ontology, data source local ontology mapping was established, the heterogeneous data exchange layer model on distribution network based on SOA was proposed. The model is divided into four functional modules, including data exchange module, model management module, data conversion module and data access module.


Key words: SOA, data exchange, ontology mapping, distribution network.


Abstract: A majority of systems that take advantage of human motion in order to recognize gestures are developed through temporal image processing algorithms. However, thanks to the increasing development of acceleration sensors in recent years, it has become possible to use actual arm movements as an acquisition system. This feature could be used in more intuitive systems to communicate reach-to-grasp movements. This research proposes placing an accelerometer on a users arm to recognize grasping movements in an unique way. The most complex part of this problem revolves around the fact that an accelerometer is unable to evaluate whether a user is performing a reach-to-grasp movement. Given that the movement involves a temporary action, it is possible to use a hidden Markov system to dynamically predict user grasping movements. The results indicate that the model can correctly predict all movements with an F-score = 99% on average.


Key words: Hidden Markov model, human computer interaction, gesture recognition, accelerometers, grasping movements.


Abstract: this paper considered a new type of the feedback of control system, based on structure and extrapolation of a complex error function of control. Complex error function of control systems defined as complex difference between reference and output of a plant that allows considering their magnitude and phase difference. For calculating a complex error function and its structure used the Hilbert transform (HT), represented the reference and output of plant as analytical signals. For the xtrapolation of a complex error function and control its predicted values used it decomposition in power series. The gains of power series calculated with use of Wirtinger derivatives of complex error function at complex output of plant. 


Key words: Hilbert transform, structure of a complex error function, extrapolation of a complex error function, Wirtinger derivative.


Task-Based Visualization Using Merged View

Taeg Hyun Kang, Young Lee and Mais Nijim


Abstract: This paper presents the concept of a merged view, task-based visualization technique, and it discusses the benefits and limits of merged view. The time and cost of understanding and analyzing the software are main factors of software development cost. Therefore, large and complex modern software systems need automated tools to aid programmers to understand the software system. This paper investigates how the merged-view guides a maintainer to locate the interconnected modules.


Key words: Software visualization, aspect oriented software development, software maintenance, merged view.


Abstract: NG-PON systems present optical access infrastructures to support various applications of many service providers. Therefore, some general requirements for NG-PON networks are characterized and specified. The HPON network presents a necessary phase of the future transition from TDM to WDM multiplexing techniques utilized in passive optical networks. Requirements for the HPON are therefore also introduced. A main part of the paper is dedicated to presentation of parameters for the HPON network configurator that allows preparing the full-value design of NG-PON networks from a viewpoint of various specific network parameters. Finally, a comparison of two basic HPON options based on simulation results is presented.


Key words: Next-generation PON, the hybrid PON, the HPON network configurator.


Abstract: While configuring firewalls, rule configuration has to conform to the demands of the network security policies. As always, firewall rule editing, ordering, and distribution must be done very carefully on each of the cooperative firewalls, especially in a multi-firewall-equipped network. Nevertheless, network operators are prone to incorrectly configuring the firewalls since there are typically thousands or hundreds of thousands of filtering rules (i.e., rules in the access control list file; or access control list for short) which could be set up in a firewall; in addition, rules in each firewall can interact and adversely affect each other, making the matter worse. For this, our work is to build a feasible diagnosis system for checking the anomalies between firewalls rules which often lead to the inconsistency between the demands of network security policies and firewall rule configuration. The system collects the ACL rules from all of the firewalls in the managed network and then a RAR tree (rule anomaly relation tree) is created based on these collected firewall rules. By using the RAR tree, we can not only do the diagnosis of intra-ACL rule anomalies more efficiently, but make the diagnosis of inter-ACL rule anomalies much easier and more flexible.


Key words: Rule anomalies among firewalls, local diagnosis reuse, rule anomaly relation tree, defense in depth.


A Synthetic Impulse Noise Environment for DSL Access Networks

Radu Dragomir, Sorin Pușcoci and Dorina Dragomir


Abstract: In this paper a multi-statistics model of the impulse noise is presented. An impressive experimental noise data collection acquired from digital access loops provides the synthetic noise environment with the most convenient probability density functions. Internal and external impulse noise sources within communications copper lines are briefly surveyed. A wide-band noise measuring circuit is used to determine the impulse noise properties. Our model gives a full description of the impulse statistics in the time and frequency domains, enables generation of impulses with statistically appropriate both time and spectral characteristics. It is based on recent measurements and reflects the current statistics of impulse noise in digital networks, is based on wide-band measurements, agrees with empirical statistics from different access networks in different places.


Key words: DSL, digital transmission, impulse noise, noise statistics.


Communicating Environmental Issues in an Undergraduate Journal

Lucille Mazo, Andrea Church, Melissa Cloutier, Danielle A. Paradis and Davin Robertson


Abstract: As Faculty in the Bachelor of Communication Studies program at MacEwan University in Edmonton, Alberta, Canada, the importance of providing a venue for undergraduate students to communicate and disseminate their research in the areas of conservation, sustainability, and global warming has been addressed through the development of a new publication. Over the past 10 months, a team of undergraduate communication students have been working collaboratively to create and develop a new online publication called Earth Common Journal. This paper presents information about how these students in the critical roles of editor, writer, and designer played a significant role in ensuring that this peer-reviewed journal offered a research voice for undergraduate students, as well as offered a venue where they can disseminate their research findings both locally and globally. It also discusses how an undergraduate peer-reviewed research journal can be used to reach the student masses from other parts of the world, which can be used to facilitate a broader discussion regarding critical environmental issues in the areas of conservation, sustainability, and global warming.


Key words: Earth Common Journal, undergraduate, environmental, mass media.


Abstract: This paper introduces a novel distributed algorithm, which converges to the optimum power vector for uplink wireless network. The proposed algorithm achieves the maximum possible SINR for all terminals taking into account the maximum power constraint as well as the interference and background noise. It is always feasible and gives the best solutions without dropping or buffering any link. The algorithm is simple to implement, yet powerful compared to the existing distributed power allocation algorithms. One possible application is for the wireless free Internet networks where providers do not guarantee any QoS, yet want their networks to be maximally utilized. Moreover, modified algorithm that guarantees some minimum allowed QoS is also given. The algorithm can be applied for several multiple access techniques such as CDMA and TDMA/OFDMA with beam forming antennas. The convergence properties are discussed theoretically and shown by simulations.


Key words: Power control, non-scalable QoS, DPC (distributed power control), CDMA.


Abstract: This paper presents a study of software implementations of ECC (Elliptic Curve Cryptography) over binary and prime fields in WSN (Wireless Sensor Networks). An analytical study of the underlying finite field, representation basis, and performance of these implementations is conducted. The study shows that the fastest prime field implementation, among all reported ones that use 160-bit on 8-bit, took 0.57 s. As for the implementations over binary field, the study demonstrates that the majority of these implementations are carried out using polynomial basis representation, expect for one implementation that uses normal basis representation. Where the fastest binary field implementation, among all reported ones that use 163-bit on 8-bit, took 0.67 s.


Key words: Wireless sensor networks, elliptic curve cryptography, GF(p), GF(2m), normal basis, polynomial basis.


Abstract: The paper introduces architecture of qualitative models for monitoring of the landscape development. Data model, class, state, sequence models, process, and emergent and mastoid models are introduced The architecture and the interaction of models allow forming a global view to ecosystem needed for qualified assessment of human activities in the landscape. The first goal of the paper is to model situations associated with violations of the SWC (small water cycle) in the modeled ecosystem, and to contribute to formation of acceptable solutions. The second goal of the paper is to present qualitative models for monitoring the stability of the landscape development and to support approaches of integrated environmental modeling.


Key words: Qualitative models, architecture of models, monitoring, small water cycle, the landscape, integrated environmental modeling.


Abstract: The ANTARES underwater neutrino telescope is located in the Mediterranean Sea about 40 km from Toulon at a depth of 2,475 m. In its 12 line configuration it has almost 900 photomultipliers in 295 floors. The performance of the detector is discussed and several results are presented, including the measurements of downgoing muons, atmospheric neutrinos, searches for a diffuse flux of high energy muon neutrinos, searches for cosmic point sources of neutrinos, multi messenger astronomy, searches for fast magnetic monopoles and slow nuclearites. A short discussion is also made on Earth and Sea Science studies with a neutrino telescope.


Keywords: Neutrino telescope, cosmic point sources, diffuse neutrino flux, dark matter, monopoles, nuclear.




$450(USD)                $320(USD)




Database of EBSCO, Massachusetts, USA

Chinese Database of CEPS, Airiti Inc. & OCLC

Chinese Scientific Journals Database, VIP Corporation, Chongqing, P.R.China

CSA Technology Research Database

Ulrich Periodicals Directory

Summon Serials Solutions

Google scholar

Electronic Journals Library
CiteFactor (USA)
Scientific Indexing Services