acm - an acm publication

2008 - April

  • Triple layer data security

    The growth of high speed computer networks and that of Internet, in particular, has hiked the ease of Data Communication. But in the other hand this growth is also responsible for the snooping of Data at the same time. The ease, by which digital information can be duplicated and distributed, has led to the need for effective protection tools. Various encryption techniques like cryptography, digital watermarking, steganography etc have already been introduced in attempt to address these growing concerns. In this paper, an algorithmic approach is proposed in which along with the combination of cryptography and steganography (taken as security layers), an extra layer of security has been imposed in between them to obtain a completely secured data transmission scheme.

  • Employee retention: By way of management control systems

    Loyalty is passé in the modern time and professionalism is the buzzword in the contemporary corporate world. The reasons of employee attrition are also changing. Now-a-days employee leaves an organization for many reasons. Some leave for growth, some leave for some family problems but majority of people switchover jobs due to only one reason that is DISSATISFACTION. Undoubtedly satisfaction and dissatisfaction sort of things have different meaning for different people but having majority of people satisfied is pretty germane for sustainable growth and high level of productivity in any organization. A threadbare analysis of attrition brings some major concerns like not having objectivity in job allocation, employee recognition and fairness in career advancements for consideration. They are also important causes of dissatisfaction for employees in organizations. This dissatisfaction finally gets a vent in the form of changing the job. This subjectivity in the issues of employee handling is the key for dissatisfaction. Management Control System is fully capable of bringing objectivity in the organization and managing this dissatisfaction which would finally be translated into high employee retention, and better productivity and better organizations.

  • On degree sequence
    I ndi got her BS in Computer Science from Cal Poly and began her master's at Colorado State. She then worked as a software engineer, later managing Web applications that focused on the user. Her concepts in mental models derive from attempting to bridge the developer-user gap. Her expertise ranges from structuring crossfunctional teams, to managing participant recruiting, and conducting user interviews, thereby creating effective tools for exchanging results.
  • Mental Models: Aligning design strategy with human behavior
    I ndi got her BS in Computer Science from Cal Poly and began her master's at Colorado State. She then worked as a software engineer, later managing Web applications that focused on the user. Her concepts in mental models derive from attempting to bridge the developer-user gap. Her expertise ranges from structuring crossfunctional teams, to managing participant recruiting, and conducting user interviews, thereby creating effective tools for exchanging results.
  • Knowledge mechanics and its temporal nature

    Wordnet defines knowledge as the psychological result of perception, learning and reasoning [1]. Like mechanics is the study of the way matter and force interact with each other, knowledge mechanics refers to the study of intermingling between the two facets of knowledge- tacit and explicit. Tacit knowledge is personal knowledge which is difficult to express and communicate. On the other hand explicit knowledge has been or can be articulated, codified and stored in certain media. The transformation of knowledge among these two facets has been the main topic of study among the researchers. This paper also explores the temporal nature of knowledge i.e. how time relates to knowledge and the factors involved in the natural decay of knowledge.

  • A fuzzy modeling approach to evaluate faculty performance

    Performance of a teacher is vital both for students and institution and must be measured and evaluated for positive reinforcement to teaching. This paper presents a mathematical model to evaluate faculty's teaching performance using fuzzy logic In this proposed evaluation the degree of satisfaction is defined in advance by experts with respect to levels of performance. Evaluator awards fuzzy marks into the fuzzy performance sheet according to each level of performance. From this, the degree of satisfaction of a subject topic is calculated and the result is calculated based on all the topics in the subject. The obtained results from the proposed approach are compared with the conventional non-fuzzy approach and the comparative results are presented.

  • How to use presentation slides to best effect
    How often have you attended a presentation where great attention apparently went into designing the slides - and apparently none into how they were used? Or the speaker played with the slides as if to entertain rather than edify?
  • Smart phones: A tutorial
    1. INTRODUCTION Pervasive Computing integrates computation in the environment rather than computers which are distinct objects. Other terms for pervasive computing ubiquitous computing, calm technology, things that think and everyware. In other pervasive computing means computers everywhere, making them available the physical environment while making them effectively invisible to the user. having a desktop or a laptop machine, the technology pervasive computing embedded in the environment. Ubiquitous technology is often wireless, networked making its users more connected to the world around them and the it. Through pervasive computing, users use today's digital tools like laptops, phones, PDAs, smartphones to communicate and exchange information in different and conceive and use the geographical and temporal spaces differently. In being an aspect of information dissemination, pervasive or ubiquitous computing global and local, social and personal, invisible and visible at the same time.
  • The rise and fall of a good programmer
    Of all the sayings I dislike, the most vapid is one I have heard as long as I have been working with IT: We will have the paperless toilet before we have a paperless office. Normally uttered with a dry cackle and a finger pointed towards my office, which does not lack for paper.
  • Time to get serious about the paperless office
    Of all the sayings I dislike, the most vapid is one I have heard as long as I have been working with IT: We will have the paperless toilet before we have a paperless office. Normally uttered with a dry cackle and a finger pointed towards my office, which does not lack for paper.
  • Anticipating and resolving resource overloads
    The Concept of a Project Resource In the context of project management, a resource is any entity that contributes to the accomplishment of project activities. Most project resources perform work and include such entities as personnel, equipment and contractors. However, the concept of a resource (and the techniques of resource management presented in this paper) can also be applied to entities that do not perform work, but which must be available in order for work to be performed. Examples include materials, cash, and workspace. This paper focuses on the resource that is of greatest concern to most organizations personnel. In a project management system, personnel resources may be identified as individuals by name or as functional groups, such as computer programmers.
  • Avoiding disaster when your hard drive fails
    No one really expects a disk crash, but they do happen, usually at the most unconvenient times. Having a quick and easy-to-restore backup can eliminate both the distress and expense of the prolonged downtime normally associated with a hard drive failure. When restoring from a drive failure, the best kind of backup to have is an image backup.
  • An Interview with Vaughan Merlyn on Management
    Vaughan Merlyn, who is a management consultant, researcher, and author, has had as his primary focus for more than three decades now has been the use of information and information technology for business value creation. He was interviewed about software consulting and management.