ARPN Journal of Systems and Software

Displaying 1-37 of 37 results

  • White Papers // Mar 2012

    A Novel Approach for Evaluating Software Testing Techniques for Reliability

    One of the major goals of software testing is to increase reliability of the software. As pointed out by many studies, fault detection does not necessarily increase the reliability of the software when all failures are considered to be equivalent to one another. Accordingly, the authors need to evaluate software...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    Five Aspects of Application Integration Requirements

    Most organizations use an increasing number of applications and services to solve specific business problems. In many cases, these applications and services exist on different platforms and were created at different times. The challenge that most organizations now face is to provide a method by which these applications can work...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    Performance Comparison and Improvement of Broadcasting Protocols in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is expected to be deployed in various scenarios having complex node mobility and connectivity dynamics in the future. Optimal broadcasting in mobile Ad-hoc networking is crucial for providing control and routing information for multicast and point to point communication algorithms. This paper presents an overview on...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    A Modified Desirability-Based Prioritization Technique for Software Requirements

    This paper presents a methodology for requirement prioritization. The approach provides a flexible and realistic approach that considers all attributes of particular requirements and fuses them into a unified metric, representative of all quality criteria identified for a specific software project. The derived quality measurement can be used as the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    Users' Perceptions on Facebook's Privacy Policies

    SNS are becoming increasingly popular in almost every age group. People are willing to get socially connected to friends, colleagues, coworkers, family members, groups, natives and even to people whom they are not on familiar terms with. This intensifying popularity of social networking sites and people's enthusiasm and involvement towards...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    The Contribution of the Information Architecture for the Definition of the IT Service Strategy

    The Information Technology Infrastructure Library - ITIL - provides a framework of best practices for managing IT services. The study of this framework, as regards the definition of the IT Service Strategy, allows them to see that it does not have space in its body for Information Architecture. One of...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    Performance Analysis of AODV Routing Protocol in Vehicular Ad-Hoc Network Service Discovery Architecture

    VANET is the special type of MANET (Mobile Ad hoc NETworks) where the mobile nodes are vehicles that move on roads at very high speed following traffic rules; they provide communication between Vehicle and Vehicle (V2V) and Vehicle and Road side Infrastructural unit (V 2 I). This paper explores the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    Stochastic Mining of Quantitative Association Rules Using Multi Agent Systems

    Discovering optimized intervals of numeric attributes in association rule mining has been recognized as an influential research problem over the last decade. There have been several stochastic optimization approaches such as evolutionary and swarm methods which try to find good intervals. One drawback of these approaches is sequential nature which...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    A Novel Method for Shelf Life Detection of Processed Cheese Using Cascade Single and Multi Layer Artificial Neural Network Computing Models

    The Cascade Backpropagation Algorithm (CBA) is the basis of a conceptual design for accelerating learning in ANNs. In this paper, input parameters were texture, aroma and flavour, moisture, free fatty acids. Sensory score was taken as output parameter. Bayesian regularization algorithm was used for training the network. Neurons in each...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jan 2012

    Effective Machine to Machine Communications in Smart Grid Networks

    The smart grid is generally characterized as the combination of communications-intensive IT applications with the electric power systems. Which is managed by Transmission and Distribution System Operators (TDSOs) outfitting 20th century electric grids with 21st century telecommunications technology. The smart grid purpose is to create near-real-time control mechanisms that improve...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Dec 2011

    Implementation of a Server Architecture for Secure Reconfiguration of Embedded Systems

    Field reconfigurable logic finds an increased integration in both industrial and consumer applications. A need for secure reconfiguration techniques on these devices arises as live firmware updates are essential for a guaranteed continuity of the application's performance. Ideally, a wide variety of different reconfigurable devices in a range of applications...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Dec 2011

    A Fuzzy Neural Network for Speech Recognition

    There are two problems when conditional T-S fuzzy Neural network is used directly in speech recognition system. One is the rule disaster problem, that is, the rule number will increase exponentially with the increase of input dimensions. Another problem is the network reasoning failure resulted from input dimensions too large....

    Provided By ARPN Journal of Systems and Software

  • White Papers // Dec 2011

    Design and Simulation of a Reduced - Size VSAT Antenna With Appreciable Gain

    Information technology has become a very vital tool in the world today. There exist the need for the flow of information between arms of an organization such as banks, hospitals, business sectors and the like. Over the ages, different mechanisms of communication have been developed which include telephone exchange, fax,...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Nov 2011

    Comparative Study of PAPR Reduction Techniques in OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is considered to be a promising technique against the multipath fading channel for wireless communications. However, OFDM faces the Peak-to-Average Power Ratio (PAPR) problem that is a major drawback of multi-carrier transmission system which leads to power inefficiency in RF section of the transmitter. This...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    A Novel Medium Access Control Protocol for Routing Multimedia Traffic in Optical Networks by Exploiting Delays With Improved Dynamic Bandwidth Allocation

    Traditional Medium Access control (MAC) Protocol achieves better performance for the traffic type actually they have been assigned for but inadequate for other traffic types. The prevailing multimedia applications need that the MAC protocol should execute all traffic types unvaryingly. To ensure efficient transmission, an optical network should make use...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    Intelligent Manage for the Operating System Services

    The Operating system is very complicated software and its size is very large. The challenges managing operating systems services have huge number of services and operating systems updates software. In this paper, the authors concerned about Exokernel operating system structure for more generalization and reusability. For facilitate knowledge sharing and...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    Integrating Non-Interfering Versions of Software Architecture Descriptions

    During the last two decades the software evolution community has intensively tackled the program integration issue whose main objective is to merge in a consistent way different versions of source code descriptions corresponding to different and independent variants of the same system. Well established approaches, mainly based on the dependence...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    Feeding Position Effects on the Performance of Planar Inverted Folded Antenna

    PIFA's are used in many applications like PCS, mobile handsets, Bluetooth, WLAN, WI-FI etc. The position of the feed and the patch dimension will play a major role in the performance of the antenna along with substrate, material. The method of improving the bandwidth and reduction of size of the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Sep 2011

    A Proposed Engine Implementation Mechanism to Execute the Code of Relations Query/View/Transformation Language

    Depending on the authors' best knowledge and despite of the well documentation of the transformation language Query/View/Transformation QVT-Relation which is used as a tool in Model Driven Architecture (MDA) technique that provided by Object Management Group (OMG), there is still no specific description about the execution engine for the QVT-Relations...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Sep 2011

    A Prediction Model for Functional Defects in System Testing Using Six Sigma

    This paper demonstrates the industry-centric approach of predicting defects and controlling them within system testing phase to prevent any escapees to the next testing level and later, to the end users. The importance of knowing total number of defects to be found at the start of system testing phase is...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Aug 2011

    The Performance Pyramid Framework to Information Systems Security Management Process

    The investigation in this paper takes a social and organizational approach to information systems security management and proposes a framework which illustrates three important issues in the process of security management through goal setting, these are: trust, culture, and risk communication. Three case studies show evidence that there is a...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Aug 2011

    Supporting Component Oriented Development With Reusable Autonomous Classes

    Reuse during development of software systems has long been touted as a mechanism of reducing costs, increasing quality and speeding up development. At the same time the ability to develop systems using a predominantly graphical approach has long been promised but has never really delivered. The described development approach aims...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Aug 2011

    Mining Software Metrics From the Jazz Repository

    This paper describes the extraction of source code metrics from the Jazz repository and the systematic application of data mining techniques to identify the most useful of those metrics for predicting the success or failure of an attempt to construct a working instance of the software product. Results are presented...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jul 2011

    Web Services: A Solution to Interoperability Problems in Sharing Grid Resources

    Grid is a computing and data management infrastructure whose goal is to provide electronic underpinning for a global society in business, government, research, science and entertainment. Being a distributed system, grid is complex due to the heterogeneous nature of the underlying software and hardware resources forming it. The heterogeneous nature...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jul 2011

    Adoption of Fingerprinting as an Automated Access Control Technique in University Hostels

    Biometrics is defined as a distinguishable physiological or behavioural attribute that can be used to verify or authenticate an individual's identity. Fingerprint is a type of biometric trait. Authentication/verification and/or access control can be managed with the use of biometric-based systems. The problems encountered with these systems include among others...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jul 2011

    Stock Trend Prediction Using Regression Analysis - A Data Mining Approach

    Organizations have been collecting data for decades, building massive data warehouses in which to store the data. Even though this data is available, very few of these organizations have been able to realize the actual value stored in it. The question these organizations are asking is how to extract meaningful...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jun 2011

    Maturity Model of Software Product With Educational Maturity Model

    Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach include continuous improvements in...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jun 2011

    MISD Compiler for Feature Vector Computation in Serial Input Images

    In this paper a compiler capable of generate Multiple Instruction Single Data (MISD) architectures for feature vector calculation is presented. The input is a high-level language, avoiding to developers to involve in low level design. Instead, the output is expressed in a Hardware Description Language (HDL), and can be used...

    Provided By ARPN Journal of Systems and Software

  • White Papers // May 2011

    Software Architecture Recovery Through Graph Mining Technique and Reduction of Complexity Involved in A* Algorithm Through Stable Marriage Problem

    This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining Techniques. Generally Software Architecture is represented in terms of graphs with set of vertices and edges. Finding the frequent data sets is the major step in the software architecture recovery....

    Provided By ARPN Journal of Systems and Software

  • White Papers // May 2011

    Securing Watermarked-Relational Data by Using Encryption and Decryption

    Ownership rights on outsourced relational database are very crucial issue in today's internet environment and in many content distribution applications, because the rapid growth of the internet and related technologies offered an unprecedented ability to access and redistribute digital content. In earlier, existing systems the relational data will be watermarked...

    Provided By ARPN Journal of Systems and Software

  • White Papers // May 2011

    Heuristic Method for Effective Cellular Network Planning Design

    Channel allocation has been considered a NP complete problem, and involves a very important issue for the adequate dimensioning of wireless communication networks. In this paper, the authors apply the formulation of Minimum Span problem (MS-CAP) with heuristic method to three benchmarking problems, for some of which interference-free solutions cannot...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    An Improved, Prioritized Concurrency Control Scheme With Performance Gain in Mobile Environments

    In a mobile computing environment, clients can access shared data irrespective of their physical location and can be updated by each client independently. This leads to inconsistency of the data. Several concurrency control techniques are proposed in literature to prevent data inconsistency. In this paper, the authors first analyze the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Predictive Data Mining and Discovering Hidden Values of Data Warehouse

    Data Mining is an analytic process to explore data (usually large amounts of data - typically business or market related) in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new sets of data. The main target of...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Secure Strokes - A Security Mechanism for Authentication in Mobile Devices Using User's Behavioral Pattern of Keystrokes Dynamics With Visual Cues

    The aim is to develop a security system for mobile devices that eliminates the vulnerability of PIN (4-digit) security and which reduces the high end configuration and memory space requirements of biometrics security. The issues that the authors will be handling in the project work is the vulnerability of PIN...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Order Fulfillment Monitoring in Agile Supply Chain by Software Agents

    Nowadays, in turbulent and violate global markets, agility has been considered as a fundamental characteristic of a supply chain needed for survival. Consequently Agile Supply Chain is considered as a dominant competitive advantage. However, so far a little effort has been made for order fulfillment monitoring an agile supply chain...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Optimizing the Search Operation in P2P Networks

    As computer and internet usage grows from one day to another and there is the need for information and obtaining it as quickly as possible, the biggest issue is finding a specific resource efficiently. This paper presents the current status of P2P architectures, presenting their search mechanisms, and provides a...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Software Architecture Performance Quality Model: Qualitative Approach

    As a communication vehicle among stakeholders, software architecture gives the entire view of the system's major components, the behaviour of those components as visible to the rest of the system, and the ways in which these components interact and coordinate to achieve the system's goal. The architecture determines the non-functional...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    An Improved, Prioritized Concurrency Control Scheme With Performance Gain in Mobile Environments

    In a mobile computing environment, clients can access shared data irrespective of their physical location and can be updated by each client independently. This leads to inconsistency of the data. Several concurrency control techniques are proposed in literature to prevent data inconsistency. In this paper, the authors first analyze the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    A Novel Medium Access Control Protocol for Routing Multimedia Traffic in Optical Networks by Exploiting Delays With Improved Dynamic Bandwidth Allocation

    Traditional Medium Access control (MAC) Protocol achieves better performance for the traffic type actually they have been assigned for but inadequate for other traffic types. The prevailing multimedia applications need that the MAC protocol should execute all traffic types unvaryingly. To ensure efficient transmission, an optical network should make use...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    Intelligent Manage for the Operating System Services

    The Operating system is very complicated software and its size is very large. The challenges managing operating systems services have huge number of services and operating systems updates software. In this paper, the authors concerned about Exokernel operating system structure for more generalization and reusability. For facilitate knowledge sharing and...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    Integrating Non-Interfering Versions of Software Architecture Descriptions

    During the last two decades the software evolution community has intensively tackled the program integration issue whose main objective is to merge in a consistent way different versions of source code descriptions corresponding to different and independent variants of the same system. Well established approaches, mainly based on the dependence...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Sep 2011

    A Proposed Engine Implementation Mechanism to Execute the Code of Relations Query/View/Transformation Language

    Depending on the authors' best knowledge and despite of the well documentation of the transformation language Query/View/Transformation QVT-Relation which is used as a tool in Model Driven Architecture (MDA) technique that provided by Object Management Group (OMG), there is still no specific description about the execution engine for the QVT-Relations...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Sep 2011

    A Prediction Model for Functional Defects in System Testing Using Six Sigma

    This paper demonstrates the industry-centric approach of predicting defects and controlling them within system testing phase to prevent any escapees to the next testing level and later, to the end users. The importance of knowing total number of defects to be found at the start of system testing phase is...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Aug 2011

    The Performance Pyramid Framework to Information Systems Security Management Process

    The investigation in this paper takes a social and organizational approach to information systems security management and proposes a framework which illustrates three important issues in the process of security management through goal setting, these are: trust, culture, and risk communication. Three case studies show evidence that there is a...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Aug 2011

    Supporting Component Oriented Development With Reusable Autonomous Classes

    Reuse during development of software systems has long been touted as a mechanism of reducing costs, increasing quality and speeding up development. At the same time the ability to develop systems using a predominantly graphical approach has long been promised but has never really delivered. The described development approach aims...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Aug 2011

    Mining Software Metrics From the Jazz Repository

    This paper describes the extraction of source code metrics from the Jazz repository and the systematic application of data mining techniques to identify the most useful of those metrics for predicting the success or failure of an attempt to construct a working instance of the software product. Results are presented...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jul 2011

    Web Services: A Solution to Interoperability Problems in Sharing Grid Resources

    Grid is a computing and data management infrastructure whose goal is to provide electronic underpinning for a global society in business, government, research, science and entertainment. Being a distributed system, grid is complex due to the heterogeneous nature of the underlying software and hardware resources forming it. The heterogeneous nature...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jul 2011

    Adoption of Fingerprinting as an Automated Access Control Technique in University Hostels

    Biometrics is defined as a distinguishable physiological or behavioural attribute that can be used to verify or authenticate an individual's identity. Fingerprint is a type of biometric trait. Authentication/verification and/or access control can be managed with the use of biometric-based systems. The problems encountered with these systems include among others...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jul 2011

    Stock Trend Prediction Using Regression Analysis - A Data Mining Approach

    Organizations have been collecting data for decades, building massive data warehouses in which to store the data. Even though this data is available, very few of these organizations have been able to realize the actual value stored in it. The question these organizations are asking is how to extract meaningful...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jun 2011

    Maturity Model of Software Product With Educational Maturity Model

    Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach include continuous improvements in...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jun 2011

    MISD Compiler for Feature Vector Computation in Serial Input Images

    In this paper a compiler capable of generate Multiple Instruction Single Data (MISD) architectures for feature vector calculation is presented. The input is a high-level language, avoiding to developers to involve in low level design. Instead, the output is expressed in a Hardware Description Language (HDL), and can be used...

    Provided By ARPN Journal of Systems and Software

  • White Papers // May 2011

    Software Architecture Recovery Through Graph Mining Technique and Reduction of Complexity Involved in A* Algorithm Through Stable Marriage Problem

    This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining Techniques. Generally Software Architecture is represented in terms of graphs with set of vertices and edges. Finding the frequent data sets is the major step in the software architecture recovery....

    Provided By ARPN Journal of Systems and Software

  • White Papers // May 2011

    Securing Watermarked-Relational Data by Using Encryption and Decryption

    Ownership rights on outsourced relational database are very crucial issue in today's internet environment and in many content distribution applications, because the rapid growth of the internet and related technologies offered an unprecedented ability to access and redistribute digital content. In earlier, existing systems the relational data will be watermarked...

    Provided By ARPN Journal of Systems and Software

  • White Papers // May 2011

    Heuristic Method for Effective Cellular Network Planning Design

    Channel allocation has been considered a NP complete problem, and involves a very important issue for the adequate dimensioning of wireless communication networks. In this paper, the authors apply the formulation of Minimum Span problem (MS-CAP) with heuristic method to three benchmarking problems, for some of which interference-free solutions cannot...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Predictive Data Mining and Discovering Hidden Values of Data Warehouse

    Data Mining is an analytic process to explore data (usually large amounts of data - typically business or market related) in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new sets of data. The main target of...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Secure Strokes - A Security Mechanism for Authentication in Mobile Devices Using User's Behavioral Pattern of Keystrokes Dynamics With Visual Cues

    The aim is to develop a security system for mobile devices that eliminates the vulnerability of PIN (4-digit) security and which reduces the high end configuration and memory space requirements of biometrics security. The issues that the authors will be handling in the project work is the vulnerability of PIN...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Order Fulfillment Monitoring in Agile Supply Chain by Software Agents

    Nowadays, in turbulent and violate global markets, agility has been considered as a fundamental characteristic of a supply chain needed for survival. Consequently Agile Supply Chain is considered as a dominant competitive advantage. However, so far a little effort has been made for order fulfillment monitoring an agile supply chain...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Optimizing the Search Operation in P2P Networks

    As computer and internet usage grows from one day to another and there is the need for information and obtaining it as quickly as possible, the biggest issue is finding a specific resource efficiently. This paper presents the current status of P2P architectures, presenting their search mechanisms, and provides a...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    The Contribution of the Information Architecture for the Definition of the IT Service Strategy

    The Information Technology Infrastructure Library - ITIL - provides a framework of best practices for managing IT services. The study of this framework, as regards the definition of the IT Service Strategy, allows them to see that it does not have space in its body for Information Architecture. One of...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    Performance Analysis of AODV Routing Protocol in Vehicular Ad-Hoc Network Service Discovery Architecture

    VANET is the special type of MANET (Mobile Ad hoc NETworks) where the mobile nodes are vehicles that move on roads at very high speed following traffic rules; they provide communication between Vehicle and Vehicle (V2V) and Vehicle and Road side Infrastructural unit (V 2 I). This paper explores the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    Stochastic Mining of Quantitative Association Rules Using Multi Agent Systems

    Discovering optimized intervals of numeric attributes in association rule mining has been recognized as an influential research problem over the last decade. There have been several stochastic optimization approaches such as evolutionary and swarm methods which try to find good intervals. One drawback of these approaches is sequential nature which...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Feb 2012

    A Novel Method for Shelf Life Detection of Processed Cheese Using Cascade Single and Multi Layer Artificial Neural Network Computing Models

    The Cascade Backpropagation Algorithm (CBA) is the basis of a conceptual design for accelerating learning in ANNs. In this paper, input parameters were texture, aroma and flavour, moisture, free fatty acids. Sensory score was taken as output parameter. Bayesian regularization algorithm was used for training the network. Neurons in each...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Jan 2012

    Effective Machine to Machine Communications in Smart Grid Networks

    The smart grid is generally characterized as the combination of communications-intensive IT applications with the electric power systems. Which is managed by Transmission and Distribution System Operators (TDSOs) outfitting 20th century electric grids with 21st century telecommunications technology. The smart grid purpose is to create near-real-time control mechanisms that improve...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Dec 2011

    Implementation of a Server Architecture for Secure Reconfiguration of Embedded Systems

    Field reconfigurable logic finds an increased integration in both industrial and consumer applications. A need for secure reconfiguration techniques on these devices arises as live firmware updates are essential for a guaranteed continuity of the application's performance. Ideally, a wide variety of different reconfigurable devices in a range of applications...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Dec 2011

    A Fuzzy Neural Network for Speech Recognition

    There are two problems when conditional T-S fuzzy Neural network is used directly in speech recognition system. One is the rule disaster problem, that is, the rule number will increase exponentially with the increase of input dimensions. Another problem is the network reasoning failure resulted from input dimensions too large....

    Provided By ARPN Journal of Systems and Software

  • White Papers // Dec 2011

    Design and Simulation of a Reduced - Size VSAT Antenna With Appreciable Gain

    Information technology has become a very vital tool in the world today. There exist the need for the flow of information between arms of an organization such as banks, hospitals, business sectors and the like. Over the ages, different mechanisms of communication have been developed which include telephone exchange, fax,...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Nov 2011

    Comparative Study of PAPR Reduction Techniques in OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is considered to be a promising technique against the multipath fading channel for wireless communications. However, OFDM faces the Peak-to-Average Power Ratio (PAPR) problem that is a major drawback of multi-carrier transmission system which leads to power inefficiency in RF section of the transmitter. This...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Oct 2011

    Feeding Position Effects on the Performance of Planar Inverted Folded Antenna

    PIFA's are used in many applications like PCS, mobile handsets, Bluetooth, WLAN, WI-FI etc. The position of the feed and the patch dimension will play a major role in the performance of the antenna along with substrate, material. The method of improving the bandwidth and reduction of size of the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Apr 2011

    Software Architecture Performance Quality Model: Qualitative Approach

    As a communication vehicle among stakeholders, software architecture gives the entire view of the system's major components, the behaviour of those components as visible to the rest of the system, and the ways in which these components interact and coordinate to achieve the system's goal. The architecture determines the non-functional...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    A Novel Approach for Evaluating Software Testing Techniques for Reliability

    One of the major goals of software testing is to increase reliability of the software. As pointed out by many studies, fault detection does not necessarily increase the reliability of the software when all failures are considered to be equivalent to one another. Accordingly, the authors need to evaluate software...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    Five Aspects of Application Integration Requirements

    Most organizations use an increasing number of applications and services to solve specific business problems. In many cases, these applications and services exist on different platforms and were created at different times. The challenge that most organizations now face is to provide a method by which these applications can work...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    Performance Comparison and Improvement of Broadcasting Protocols in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is expected to be deployed in various scenarios having complex node mobility and connectivity dynamics in the future. Optimal broadcasting in mobile Ad-hoc networking is crucial for providing control and routing information for multicast and point to point communication algorithms. This paper presents an overview on...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    A Modified Desirability-Based Prioritization Technique for Software Requirements

    This paper presents a methodology for requirement prioritization. The approach provides a flexible and realistic approach that considers all attributes of particular requirements and fuses them into a unified metric, representative of all quality criteria identified for a specific software project. The derived quality measurement can be used as the...

    Provided By ARPN Journal of Systems and Software

  • White Papers // Mar 2012

    Users' Perceptions on Facebook's Privacy Policies

    SNS are becoming increasingly popular in almost every age group. People are willing to get socially connected to friends, colleagues, coworkers, family members, groups, natives and even to people whom they are not on familiar terms with. This intensifying popularity of social networking sites and people's enthusiasm and involvement towards...

    Provided By ARPN Journal of Systems and Software