This contribution provides a critical appraisal of three of the contemporary project management approaches against e-Government challenges. Most of the project management approaches, put forward during e-Government pr...
详细信息
ISBN:
(纸本)9781424445134
This contribution provides a critical appraisal of three of the contemporary project management approaches against e-Government challenges. Most of the project management approaches, put forward during e-Government projects' implementation, are more suitable for the management of the overall development of information systems, rather than being directly targeted on the specific e-Government needs. The incorporation of information technologies in the public management raises different challenges compared to ones encountered in the private sector. This paper identifies the major challenges that characterize the management of e-Government initiatives. This paper recognizes the weaknesses of the contemporary project management approaches against the identified e-Government challenges to make the appraisal more systematic and more suitable for the successful management of e-Government projects. Future analysis of the results will guide the identification of project management gaps, contributing to the better understanding of the factors that lead to governmental IT projects success or failure.
Objects persistence has been popular recently since it has become a necessary practice to shuttle objects between in-memory and in-storage *** researchers focus on objects to relational data model mapping but few on o...
详细信息
Objects persistence has been popular recently since it has become a necessary practice to shuttle objects between in-memory and in-storage *** researchers focus on objects to relational data model mapping but few on objects to multivalued data model(O/M).Nevertheless,existing mapping mechanisms are either hard to be extended or difficult to be *** paper presents a mechanism for mapping from objects to multivalued databases.A detailed mapping solution is ***,an interactive mapping configuration facility has been developed to ease the configuration instead of manual scripts *** show that around 92% of the time is saved to configure the domain classes mapping by using the configuration facility of the proposed persistence mechanism in contrast to manual editing used in other similar mapping *** results show that this mapping mechanism not only shortens the overall development period,but also comparatively easy to be managed and extended.
Enable-based Clock Gating (ECG) during synthesis to reduce the pipeline power consumption is widely used in scaled technologies. However, the ECG does not provide optimal solution at all in terms of power because it i...
详细信息
ISBN:
(纸本)9781424450343;9781424450350
Enable-based Clock Gating (ECG) during synthesis to reduce the pipeline power consumption is widely used in scaled technologies. However, the ECG does not provide optimal solution at all in terms of power because it is synthesized by a global way and it does not consider the correlation between clock-enable signal and data signal. We propose a novel single comparator-based clock gating (SCCG) scheme to enhance the ECG for pipeline. In the proposed SCCG, enable signal is moved from data path to control logic, the data signal is analyzed, and only single comparator is used to implement the clock-gating for all the pipeline stages. Simulation results show that our proposed SCCG can save average 47.03% of total power with small 4-stage pipeline benchmark and can save 11.3% of total power with industrial multimedia-mobile processor design by using 90 nm industrial technology library comparing with the ECG-based designs.
Gaming is an old habit for humans and, with the advent of the PC this tradition has been changed by technology. Every year brings new challenges, in a digital format, that lead young and adults to spend hours in front...
详细信息
Gaming is an old habit for humans and, with the advent of the PC this tradition has been changed by technology. Every year brings new challenges, in a digital format, that lead young and adults to spend hours in front of a computer or TV screen in the attempt to overcome hurdles and reach an objective. The quality, sophistication, and constant innovation are attained through complex computer software that almost has the obligation to get better at each new title released, making game development a challenge that is as hard or even harder for their developers. Considering that a game title is software and thus faces the same restrictions of business applications, this article intends to analyze, under the optics of reuse, if game development resorts to re-use, and where and how this happens.
Due to the continue driving of the Moore's law, semiconductor technology make the tera-scale integration become possible. With so many transistors in a single chip, many dream applications become possible. Designe...
详细信息
Due to the continue driving of the Moore's law, semiconductor technology make the tera-scale integration become possible. With so many transistors in a single chip, many dream applications become possible. Designers are eager to use those tremendous capacity of the integration circuits to bring more intelligent, more smart functions. One of the challenge target is can we design the circuits to make the SOC perform tasks that humans do quickly and easily? Can we make the computer to recognize images, understand language, learn knowledge, and control robots? In this presentation, the concept of Bio-inspiring computing which takes the advantages of neural science will be described. Some previous studies tried to explain the behavior of the human neocortex and provide a framework for building models that could be implemented and executed with Tera-scale SOC. Research suggested that the structure of the neocortex is hierarchical, and that the emulation of 6 levels of hierarchy is sufficient to achieve sophisticated recognition and analysis of visual images. Some experimental results will be presented to demo the possibility. It could be the dawn of the age of intelligence machines and neocortical computing. There will be many opportunities that Tera-scale SOC could create.
We propose a novel algorithm based on clustering to extract rules from artificial neural networks. After networks Beijing trained and pruned successfully,innerrules are generated by discrete activation values of hidde...
详细信息
We propose a novel algorithm based on clustering to extract rules from artificial neural networks. After networks Beijing trained and pruned successfully,innerrules are generated by discrete activation values of hidden units. Then,weights between input and hidden units are clustered to decrease the complexity of rules extraction. In clustering phase,the clustered number of weights can be adjusted dynamically according to activation values of their corresponding hidden units. The experimental results demonstrate that this algorithm is effective.
Speaker indexing of an audio database consists in organizing the audio data according to the speakers present in the *** paper investigates on segmenting and clustering continuous audio streams automatically by speake...
详细信息
Speaker indexing of an audio database consists in organizing the audio data according to the speakers present in the *** paper investigates on segmenting and clustering continuous audio streams automatically by speaker with no prior speaker *** is composed of two steps:(1) segmentation based on GLR distance measure and BIC refinement,(2) clustering based on agglomerative clustering and pruning *** aim is to produce just one pure cluster for every *** are presented using the data sets derived from the Switchboard corpus and the effectiveness of the proposed scheme is shown.
Biomedical literatures have been increased at the exponential *** find the useful and needed information from such a huge data set is a daunting task for *** mining is a powerful tool to solve this *** this paper,we s...
详细信息
Biomedical literatures have been increased at the exponential *** find the useful and needed information from such a huge data set is a daunting task for *** mining is a powerful tool to solve this *** this paper,we surveyed on text mining in Bioinformatics with emphasis on applications of text mining for *** this paper,the main research directions of text mining in bioinformatics are accompanied with detailed *** paper suited the need for the state-of-the-art of the field of text mining in Bioinformatics because of the rapid development in both text mining and ***,the problems and future way are identified at last.
Face detection is the cornerstone of a wide range of applications such as video surveillance, robotic vision and biometric authentication. One of the biggest challenges in face detection based applications is the spee...
详细信息
Face detection is the cornerstone of a wide range of applications such as video surveillance, robotic vision and biometric authentication. One of the biggest challenges in face detection based applications is the speed at which faces can be accurately detected. In this paper, we present a novel SoC (System on Chip) architecture for ultra fast face detection in video or other image rich content. Our implementation is based on an efficient and robust algorithm that uses a cascade of Artificial Neural Network (ANN) classifiers on AdaBoost trained Haar features. The face detector architecture extracts the coarse grained parallelism by efficiently overlapping different computation phases while taking advantage of the finegrained parallelism at the module level. We provide details on the parallelism extraction achieved by our architecture and show experimental results that portray the efficiency of our face detection implementation. For the implementation and evaluation of our architecture we used the Xilinx FX130T Virtex5 FPGA device on the ML510 development board. Our performance evaluations indicate that a speedup of around 100X can be achieved over a SSE-optimized software implementation running on a 2.4 GHz Core-2 Quad CPU. The detection speed reaches 625 frames per sec (fps).
In this paper, we present a new fault-tolerant Ethernet scheme called SAFE (scalable autonomous fault-tolerant ethernet). SAFE scheme is based on software approach which takes place in layer 2 and layer 3 of the OSIRM...
详细信息
In this paper, we present a new fault-tolerant Ethernet scheme called SAFE (scalable autonomous fault-tolerant ethernet). SAFE scheme is based on software approach which takes place in layer 2 and layer 3 of the OSIRM. The goal of SAFE is to provide scalability, autonomous fault detection and recovery. SAFE divides a network into several subnets and limits the number of nodes in a subnet. Network can be extended by adding additional subnets. All nodes in a subnet automatically detect faults and perform fail-over by sending and receiving Ethernet based heartbeat each other. For inter-subnet fault recovery, SAFE manages master nodes in each subnet. Master nodes communicate each other using IP packets to exchange the subnet status. We also propose a master election algorithm to recover faults of master node automatically. Proposed SAFE performs efficiently for large scale network and provides fast and autonomous fault recovery.
暂无评论