Major Problems related to Information Management
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 12, Issue 3
Abstract
Technological advancements in computing and communication technology have most recently grown rapidly. This growth has further been motivated by the high-speed networks and the declining cost of purchasing computers. The trend has enabled the running and fast transfers of various applications such as data and information, graphics, voice and movies. The use of computers and technology in communication has transformed various organizational systems to the digital era.
Authors and Affiliations
Rana Ibrahim Alabdan
IMPROVED ANT COLONY LOAD BALANCING ALGORITHM IN CLOUD COMPUTING
Cloud Computing is an emerging computing paradigm. It aims to share data, calculations, and service transparently over a scalable network of nodes. Since Cloud computing stores the data and disseminated resources in the...
A Comparative analysis of OFDM based Communication using different Mapping Schemes for Signal Modulation
OFDM is a multiplexing technique that is used to divide a frequency spectrum into sub-carriers that are orthogonal to each other. They are capable to carry high rate data transmission. The orthogonality is maintained by...
HYBRID-CMOS LOGIC STYLE DESIGN FOR FAST SELF-CHECKING ADDERS DATA PATHS
In this paper we present an efficient design for self-checking fast adders data paths. We investigate the implementation of concurrent error detection fast adders: carry look-ahead, Carry skip, Carry-select and Condition...
Chaos Baker-based Image Encryption in Operation Modes
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chai...
Mitigating Packet Classification for Header Information Retrieval in Wireless Network
Although encryption is used to protect data from being read by unintended recipients it still does not ensure complete safeness. The reason being that information can be gathered by an eavesdropper by indirect inferences...