Intelligent Contracting

Author(s):  
Tagelsir Mohamed Gasmelseid

The unprecedented advancements witnessed in the field of information and communication technology over the last couple of years are significantly affecting the nature and magnitude of B2B interactions, as well as their operational effectiveness and efficiency. However, interaction and contracting among global enterprises continued to be challenged by the difference of laws, authentication requirements, and endorsement constrains. With the rapidly increasing proliferation of mobile devices, wireless communication systems, and advanced computer networking protocols, the deployment of electronic contracting platforms and applications has provided many opportunities to enterprises; dictated new axioms for doing business; and gave rise to new paradigms. Together with the increasing institutional transformations, technological advancements motivated businesses to engage in an interactive process of contract formulation and negotiation.

2009 ◽  
pp. 800-821
Author(s):  
Tagelsir Mohamed Gasmelseid

The unprecedented advancements witnessed in the field of information and communication technology over the last couple of years are significantly affecting the nature and magnitude of B2B interactions as well as their operational effectiveness and efficiency. However, interaction and contracting among global enterprises continued to be challenged by the difference of laws, authentication requirements, and endorsement constrains. With the rapidly increasing proliferation of mobile devices, wireless communication systems, and advanced computer networking protocols, the deployment of electronic contracting platforms and applications has provided many opportunities to enterprises, dictated new axioms for doing business, and gave rise to new paradigms. Together with the increasing institutional transformations, technological advancements motivated businesses to engage in an interactive process of contract formulation and negotiation.


Author(s):  
Reza Sadeghi Rashed ◽  
Mohammad Bagher Mohammadi Lame

In the world, despite the efforts sparse for the use of information and communication technologies in some industries and businesses carried out, due to the lack of capacities and infrastructure required, preparation Forensic, causing a sharp drop in the performance of investments undertaken and the lack of benefits of ICT and mistrust and insecurity in And the vulnerability of information assets. In this regard Forensicpreparation assessment models provide the most help in understanding the status quo. Elements such as access mechanism, event tags, structure, communication systems and operating systems, intrusion detection systems, standards for data collection run by technical and non-technical factors affect protection of witnesses and the time this location. In this paper, according to the progress of society in the field of computer networking vacuum talk Forensic and preparedness in this area due to the emergence of e-government, there is discussed that requires the review process liable to digital evidence is in case any thing happened to information assets to risk losing assets and lowered consumer expenditure in this area to ensure future Forensic assets.


Author(s):  
Fawzan Galib Abdul Karim Bawahab ◽  
Elvan Yuniarti ◽  
Edi Kurniawan

Abstrak. Pada penelitian ini, telah dilakukan analisa karakterisasi pada teknologi Direct Sequence Spread Spectrum dan Frequency Hopping Spread Spectrum, sebagai salah satu teknik multiple-access pada sistem komunikasi. Karakterisasi dilakukan untuk mencari bagaimana cara meningkatkan keoptimalan kedua sistem tersebut, dalam mengatasi masalah interferensi dengan sistem dan channel yang sama. Dan juga untuk menentukan veriabel apa yang mempengaruhi keoptimalan kedua sistem tersebut. Karakterisasi dilakukan dengan menentukan variabel-variabel yang mempengaruhi keoptimalan keduanya. Hasil dari karakterisasi, diketahui variabel-variabel yang mempengaruhi kemampuan sistem DSSS yaitu nilai frekuensi spreading (). Sedangkan untuk sistem FHSS yaitu nilai frekuensi spreading ( dan ) dan selisih antara frekuensi hopping data dengan frekuensi hopping interferensi . Kata Kunci: BER, DSSS, FHSS, Interference, Spread spectrum. Abstract. In this study, characterization of Direct Sequence Spread Spectrum and Frequency Hopping Spread Spectrum technologies have been done, as one of the multiple-access techniques in communication systems. Characterization is done to find out how to improve the ability of the two systems, in solving interference problems with the same system and channel. And also to determine what veriabel affects the ability of the two systems. Characterization is done by determining the variables that affect the ability of both. The results of the characterization, known variables that affect the ability of the DSSS system are the spreading frequency value (). As for the FHSS system, the spreading frequency value ( and ) and the difference between frequency hopping data with frequency hopping interference .


Author(s):  
A. Suresh Babu ◽  
B. Anand

: A Linear Feedback Shift Register (LFSR) considers a linear function typically an XOR operation of the previous state as an input to the current state. This paper describes in detail the recent Wireless Communication Systems (WCS) and techniques related to LFSR. Cryptographic methods and reconfigurable computing are two different applications used in the proposed shift register with improved speed and decreased power consumption. Comparing with the existing individual applications, the proposed shift register obtained >15 to <=45% of decreased power consumption with 30% of reduced coverage area. Hence this proposed low power high speed LFSR design suits for various low power high speed applications, for example wireless communication. The entire design architecture is simulated and verified in VHDL language. To synthesis a standard cell library of 0.7um CMOS is used. A custom design tool has been developed for measuring the power. From the results, it is obtained that the cryptographic efficiency is improved regarding time and complexity comparing with the existing algorithms. Hence, the proposed LFSR architecture can be used for any wireless applications due to parallel processing, multiple access and cryptographic methods.


Sign in / Sign up

Export Citation Format

Share Document