Framework Model for Strategic Plan Using Dynamic Workflow Reyadh Shaker Naoum, Abdulameer Khalf Hussain Department of Information System Faculty of Information Technology, Middle East University, Jordan. Ziad Mohammad Abu-Hamour, Department of Information Technology, Free-Zones Company, Jordan. Abstract: This paper presents a first application trial of designing a strategic plan  depending on dynamic workflow. When designing such strategic plan, it is important  to study carefully the organization types.  The significant difference of this proposed  model from previous studies is that these studies concentrate on day-to-day work  while this model is applicable for long-term time strategic plan. The proposed  strategic plan is analyzed against different planning parameters and showed that it is  considered as a core work for different organizations instead of being a marginal work  as in the traditional strategic plans. The proposed strategic planning helps planers to  adjust human resources involved in that plan. Also this strategic plan is applied  successfully in Free Zone Company in Jordan which is related to products with free  tax. Keywords : Workflow; Strategic Plan; Key Performance Indictor; Processes. Robust Digital Image Watermarking Technique Based on Histogram Analysis Hamza A. Ali, Computer Engineering Department, College of Engineering, University of Basrah, Iraq.    Sama’a A. K. khamis, Electrical Engineering Department, College of Engineering, University of Basrah, Iraq. Abstract: Watermarking techniques can be classified into two main categories; Spatial  and Transformational approaches. They are characterized to rely on descriptive global  models through which each technique is formalized and structured using models of  Steganography and Encryption.  This paper presents a robust digital image watermarking technique that attributes the  watermarking process to signal modulation model. It is based on the histogram  analysis for maximum intensity value of pixels. First, carrier image is properly  segmented into blocks, then the histogram for each block is drawn and the peak  frequency of occurrence for intensity moments in the carrier image is identified. Then  bit values of the modulating (watermark) image are used to modulate the histogram  peaks of the intensity. Experimentation and analysis on the proposed algorithm show that it is not only  simpler and easier to implement, but also it is very effective, secure and robust  against different kinds of attacks such as noise, resizing and rotation. Therefore one  can conclude that it establishes a concrete judgment for ownership decision to  approve ownership in copy write and ownership disputes.  Keywords : Image in image hiding; Digital watermarking; Steganography; Histogram.  Evaluation of Workflow Strategic Plans Ziad Mohammad Abu-Hamour, Abdulameer Khalf Hussain  Department of Information Technology, Faculty of Information Technology, Middle East University, Jordan.   Abstract: This paper presents a new model to automate and evaluate manual strategic  plans to produce a standard plan depending on the recommended criteria for any  standard strategic plan. The difference between this model and the previous works is  that the latter studies construct the strategic plans manually, while the proposed  model depends on an automated implementation. In the evaluation phase of the  proposed model, it compares different manuals strategic plans and provides  guidelines for planers to improve their strategic plans. The results of this model  reveal many shortcomings in the construction of manual strategic plans, for example  the poor utilization of the plan’s resource and poor job assignments for different  human resource. Finally, this model is implemented successfully in Free Zones  Company in Jordan whose job is related to all free tax products.  Keywords : strategic plans; workflow processes; evaluation criteria; strategic  components. Multi-Level Support Vector Machine Milad Aghamohammadi, Morteza Analoui Department of Computer Engineering, Iran University of Science and Technology, Iran.  Abstract: Many type of classifiers have been presented in machine learning and large  margin classifier is one of them. Support Vector Machine (SVM) is the most famous of  large margin classifiers. SVM is a very useful classifier, but has some limitations. Only  patterns near the decision boundary are used as support vectors and decision making  in SVM is done locally. In this paper we propose a method that also uses information in  other patterns for classification which is called "Multi-Level Support Vector Machine"  (MLSVM). We compare our method with the original SVM and an artificial neural  network using some UCI datasets and the final results shows that our method is better  or equal to other methods.  Keywords : Pattern Recognition; Classification; Large Margin Classifier; Multi-Level  Support Vector Machine.  Evaluation and Comparison of Security Issues on Cloud Computing Environment Priyanka Arora, Arun Singh, IIMT Engineering College, Meerut UP, India. Himanshu Tyagi, Raj Kumar Goel Institute of Technology for Women, Ghaziabad, UP, India. Abstract: Cloud computing basically comes to focus on IT, a way to increase capacity  or add potentiality on the fly without investing in new infrastructure, training new  personnel, or licensing new software. It encompasses any subscription-based or pay-  per-use service that, in real time over the Internet, extends its existing capabilities.  It is often provided "as a service" over the Internet, typically in the form of  infrastructure as a service (IaaS), platform as a service (PaaS), or software as a  service (SaaS). Microsoft Azure and Google App Engine are the examples of platform  as a service. The fast growth in field of “cloud computing” also increases rigorous  security concerns.  This paper describes about the performance of different security algorithm on a cloud  network and also on a single processor for different input sizes and advanced  Encryption Standard security algorithm implemented for ensuring security framework.  Keywords : Encryption; Distributed applications; Performance attributes; Analysis of  security algorithms.