Of late, many research studies try to address the complex information science and technology issues in wider perspectives. Besides, many functions such as distribution, intelligent processing and agents become embedded in many themes and areas of Computing.
Thus, the Journal of Digital Information Management in its ninth year of publication tries to address and focus new innovative and emerging areas in computing paradigm. The current issue has six novel papers. In the opening paper, Tomas Nestorovic has given a useful architecture for intelligent agents. The proposed architecture will expected to have profound applications not merely in intelligent computing but in many different themes. Andreas S. Rath, Didier Devaurs, and Stefanie N. Lindstaedt have proposed 'An Ontology-Based Approach for Detecting Knowledge Intensive Tasks'. The authors have demonstrated that the knowledge intensive tasks cannot be accurately classified using only the window title.
Dais George and Sebastian have proposed the Esscher transformed Laplace distribution model to reflect the file size distribution of Web servers in their paper on 'Application of Esscher Transformed Laplace Distribution in Web Server Data'. Using both simulation and real time data, they have established the goodness of fit of the proposed distribution to the file size distribution of a Web server data. Khaled Suwais and Azman Samsudin in their paper on LTSC-128: Stream Cipher Based on the Intractable Shortest Vector Problem in Lattice have found that the encryption rate of LTSC128 cipher is optimum in Lattice space. They have demonstrated that the LTSC-128 has achieved better encryption rate of 71Mbit/second on dual-core processor. Adrian Florea, Arpad Gellert, Traian Anghel and Delilah Florea in their paper on 'Enhanced Learning and Educational Management Technologies' have developed the Education Management Tool (EDM), a visual, interactive and collaborative e-Learning solution. They have found that the EDM is free, easy to use, and helps to improve quality and performance in e-Learning, providing flexibility, extensibility and interactivity.
Finally, Defa Hu and Qiaoliang Li in their paper on 'A practical and secure buyer-seller watermarking protocol', have proposed a new buyer-seller watermarking protocol. One core finding in their study is that the final quality of the watermarked content is higher and the result of the watermark detection is more accurate.
Thus, we are pleased to bring the first issue of the ninth volume with the papers providing more elegant designs, architectures and inferences.
|Printer friendly Cite/link Email Feedback|
|Title Annotation:||In this issue|
|Publication:||Journal of Digital Information Management|
|Date:||Feb 1, 2011|
|Previous Article:||A practical and secure buyer-seller watermarking protocol.|
|Next Article:||Fast remote user authentication scheme with smart card based on quadratic residue.|