International Association of Engineers

Displaying 1-40 of 707 results

  • White Papers // Oct 2014

    Multichannel User Interfaces Towards Crossover Inclusive Computing

    In this paper, the authors summarize the present methods available for providing user interfaces for disability applications. Section 508 of the Rehabilitation Act of 1973 has contributed to providing accommodation to people with disability, and is generally considered a step in the right direction. As many modalities of interaction have...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Verifying Software Change Requirements Through Conceptual Class Diagrams Comparison

    An existing software system sometimes needs to be redesigned to accommodate various change requirements. A system analyst gathers new user requirements to analyze software requirements and create a conceptual model of the new version of the system. While certain requirements of the existing software system should remain in the new...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Bayesian Network Model for Risk Management in Cyber Situation

    The transformation in e-commerce with the advent of other internet based activities has increased the impact of cyber-attacks on organizations and nations at large. However, tracking these attacks and determining risks posed ensure the overall security in cyber situation and invariably enhances communication and economic growth. Consequently, this paper presents...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Xen Web-based Terminal for Learning Virtualization and Cloud Computing Management

    In this paper, the authors propose a web-based terminal for teaching the cloud. This method allows students and trainees to learn managing the cloud in a useful and secure manner. This paper promotes an appreciate educational environment by enabling students to practice the knowledge practically, teaching them the ethics of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Parallel Authenticated Encryption Sharing Scheme Based on Cellular Automata

    Multi-secret sharing scheme based on cellular automata have proven to be a secure encrypting algorithm, although it cannot guarantee data integrity and authenticity of shares of the participants, allowing a chosen cipher text attack. In this work, to improve the security of multiple Secret Sharing Scheme (SSS) against adaptive chosen...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Computing Interfaces for Everyone

    Companies, businesses and agencies rely on computing technology, taking advantage of its trends and benefits. Some categories of users - people with disabilities - have faced considerable challenges accessing the cloud to the point that they have become excluded. Many of the existing systems and companies still rely on assistive...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Efficient Certificateless One-Pass Key Agreement Protocols

    Key agreement is an essential component in any cryptosystem. In this paper, a new certificate-less two-party key agreement protocol is proposed. The protocol involves only one pass of exchanged messages, thus saving both time and bandwidth. The protocol provides implicit authentication of the identities of the two communicating parties. This...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Design of Customer-Oriented Cloud Products

    Cloud computing is defined as a scalable services consumption and delivery platform that allows enterprises and individual users to start from the small and increase resources only in case of service demand increase. The competitive environment of cloud service providers forces them to differentiate their products in terms of technical...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Subjective Assessment of Mobile Videos Quality for Long Term Evolution (LTE) Cellular Networks

    In this paper, the authors introduce a Mobile Video Quality Prediction (MVQP) project for Long Term Evolution (LTE). The MVQP aims to predict the quality of streaming video service over User Datagram Protocol (UDP) in LTE cellular networks. In this paper, 100 subjects evaluated video quality using smart phones based...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Object Manipulation Through Explicit Force Control Using Cooperative Mobile Multi-Robot Systems

    Transportation of objects by groups of mobile robots can be advantageous when an object is too large or heavy to be effectively manipulated by a single robot on its own. This paper proposes combining the cluster space control methodology with explicit force control to effectively and safely move such an...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Evaluating Protection of Computer Network in Education Sector

    The use of Information Technology (IT) in the higher education institutes was increased daily. Most of the literature mentioned that the ISO/IEC 27002:2005 is the most popular standard to follow in order to reach the best protection for computer Networks. A questionnaire was designed to determine the extent of satisfaction...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Problem Solving Hands-On Labware for Teaching Big Data Cybersecurity Analysis

    The rapid growth of big data analysis needs has resulted in a shortage of professionals in this area. Despite such great need, big data analytics and data science is not well represented in current academic programs. Although a few schools have offered new courses in this area but they all...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Distributed Versus Centralized Protection Schema for the Enterprise

    Entities in the enterprise are deployed with a standard configuration. Over time, patches, updates, new software versions, and mistakes or malicious activity all lead to deviations across the enterprise from this standard baseline. Malicious or unknown software on a system can cause harm or unexpected behavior. To mitigate these problems...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cryptography Based Authentication Methods

    In this paper, the authors review a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this paper, they show the main cryptographic services. As well as, this paper presents a specific discussion about authentication service. Since the authentication service...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Centralized Multimodal Unified Authentication Platform for Web-based Application

    Identifying a user or in technical terms, authentication, is a key process that must be performed before a service can be rendered to a person through electronic means. Common practice for user authentication is to challenge user to present authentication credential, user who can present the valid credential is considered...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Experimental Validation of Lafortune-Lecours Propagation Model at 1900 MHz

    With an ever increasing demand for cellular voice and data services, many of the cellular providers are finding deployment of the in-building infrastructure inevitable. The in-building deployments allow for further re-use of the allocated spectrum and hence, they provide one of the most effective ways for increasing the overall system...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    ITU-T Future Networks: A Step Towards Green Computing

    In the field of telecommunications, Information and Communication Technologies (ICTs) the United Nations specialized agency is termed as International Telecommunication Union (ITU) which is a standard. Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is identified to be responsible for studying technical, operation including tariff rates, grade...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Quality Measurement for Mobile Crop Production Management Applications

    Most ERP vendors proudly claim their solutions are available on mobile platforms, explaining that managers can access their ERP solution from their Smartphone's. The recent wave of Mobile-Enterprise Resource Planning (M-ERP) systems adoption is a significant commitment of resource and may affect almost all business processes. Mobile business boosting the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    An Alternative Approach for Investigating the Impact of Mobile Phone Technology on Speech

    Creating a database of mobile phone speech recordings is the first step to studying the impact of mobile phone networks on various speech applications. The conventional way of creating such a database involves transmitting speech between two mobile phone devices across an actual network. However, this can only encompasses a...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Mining Frequent Patterns in Software Risk Mitigation Factors: Frequent Pattern-Tree Algorithm Tracing

    Frequent-Pattern Tree (FP-Tree) algorithm plays a vital role in mining associations, patterns and other data mining related jobs. Currently a software risk mitigation intelligent decision network engine using rule based technique has been designed against software risk factors. A novel idea of finding the associations between different software risk mitigation...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Fingerprint Matching Using Features Mapping

    Fingerprint systems have been featuring prominently among Biometric identification systems for individuals. The dominance of fingerprint is been promoted through continuous emergence of different forms of Automated Fingerprint Identification Systems (AFIS). In the course of performing its assigned roles, an AFIS conducts several activities including fingerprint enrolment, creation of its...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Crop Production Recognize Frameworks using Mobile Enterprise Application

    In this paper, the authors propose an enterprise application framework using mobile that uses CBD (Component-Based Development) as development methodology and web services for information interchange in the RFID-based distributed computing environment for crop production in agricultural area. They tried to analyze the requirements of mobile applications architecture and mobile...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Software Architectural Design for Image Retrieval System Involving Data Streams and User Interactivity

    In the process of software development, the role played by the software architect is substantial. It is the software architect who splits the entire application into different components, understands the functions performed by each component and should possess sound knowledge on the interactions among these components. The software architect communicates...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Security Algorithm for Communication with Dynamic Routing

    The data transmission using cryptographic algorithm within multiple organization system with Randomizing delivery paths over wired and wireless networks has become the major issues for security of data communication over worldwide networks. This paper is to propose a dynamic routing with strong security. The strongest algorithm considered is Blow fish...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Review of Dynamic Spectrum Networks Using Cognitive Radio

    Future wireless networks are expected to be spectrum agile and use cognitive radio technologies. The spectrum regulatory committees have been taking measurable steps with regards to laying down the rules and implementing them, which will open the doors to dynamic spectrum network technologies based on cognitive radio. The usage of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Theoretical Aspects of Ultra Wide Band

    Ultra Wide Band (UWB) technology can provide alternative communication solutions within the unlicensed band. Despite many years of development and deployment, UWB and its applications have been underutilized within the communications industry. Some reasons for this lack of acceptance are industry preference for more established technologies and a lack of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Outdoor-to-Indoor Propagation Characteristics of 850 MHz and 1900 MHz Bands in Macro -Cellular Environments

    Building penetration loss at 850 MHz and 1900 MHz bands in suburban environment is measured. The measurements are conducted in real GSM networks. Four buildings are studied aiming to provide first-order statistics of the signal coverage inside buildings. Results show that the mean building penetration loss for the ground floor...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wavelet Based Indoor Prediction of Global System for Mobile Communication (GSM) Signal Strength Attenuation

    In this paper, the authors monitored GSM signal strength (power) in an indoor environment and measured samples of the GSM signal strength on a Mobile Equipment (ME). They also, used one-dimensional multilevel wavelet to predict the fading phenomenon of the GSM signal measured and neural network clustering to determine the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wireless Sensor Deployment Method on 3D Environments to Maximize Quality of Coverage and Quality of Network Connectivity

    Sensor deployment is one of the most important issues which affect the overall performance of a Wireless Sensor Network (WSN). It is a challenging task to optimally deploy a limited number of sensors on Three Dimensional (3D) environments to maximize Quality of Coverage (QoC) and Quality of Network connectivity (QoN)....

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Neural Network Random Error Prediction on Wireless Local Area Network and Application of One-Dimensional Multi Resolution Wavelet De-Noising Technique

    Self-similarity is a phenomenon known as a random error in a discrete system and considered as one of the major factors that constitute a delay on a network; it affects the overall stability or performance and reduces the capacity utilization of the network. In view of this, an ON/OFF traffic...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Enhanced Bandwidth Sharing Scheme for Small and Medium Enterprises

    Small and Medium Enterprises (SMEs) setup wireless networks in order to make the process of communicating and sharing resources easier. SMEs implement wireless networks, because it's easy, fast and cheaper to implement. However, with the rapid growth within the SMEs sector. SMEs tend to hire more employees when they grow...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Effect of Threshold Voltage on Cylindrical Surrounding Double-Gate MOSFET for Wireless Sensor for Wireless RF Switches

    Wireless Sensor Network (WSN) technologies have potential applications in communication, entertainment, travel, retail, industry, medicine, environment monitoring, scientific observation, field surveillance, structure monitoring and many other areas. The Cylindrical Surrounding Double-Gate (CSDG) Silicon On Insulator (SOI) MOSFET is a leading device for nanotechnology. This paper presents an effect of threshold...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Gateway Location Protocol for Mesh Networks

    Wireless Mesh Network (WMN) is a promising technology that can provide broadband Internet access. Traffic often routed in Wireless Mesh Backbone (WMB). This also extended to the mesh clients and the Internet and forward to then to mesh gateways. Strategically providing efficient and supervising of WMN is a tedious task...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Comparative Study of IEEE 802.11 Standards for Non-Safety Applications on Vehicular Ad Hoc Networks: A Congestion Control Perspective

    Vehicular Ad-hoc NETworks (VANETs) is an important component within the Intelligent Transportation Systems (ITS) that have been part of global strategy and advanced applications. The aim is to provide innovative services relating to various modes of transportation and traffic management. These systems enable users to reach their destinations better, safer...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    FDTD Simulation of a Mobile Phone Operating Near a One Metal Cell

    In recent years mobile phones or smart phones have gained popularity because of its versatility: internet capabilities, navigation and cameras. Engineering research on the subject of wireless phones and Radio Frequency (RF) energy has been conducted worldwide for many years. This paper presents results of placing a one metal cell...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Text Mining in Business Practice: Automatic Analysis of Customer Reviews for Business Support

    Automatic or semi-automatic (human-assisted) analysis of text sources can be a crucial key element in the business process. Modern companies face a growing competitive environment in which they do not compete only with their market competitors, but in a certain sense even with their customers. It is the customers who...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    The Comparative Analysis Between Sensory and Cognitive in Online Customer Reviews of Baby Formula

    Based on a big data service platform for industry informatization, the authors made a comparative analysis between sensory and cognitive in online customer reviews of baby formula. Three aspects of the customer reviews are analyzed. In the first part, the descriptive analysis was conducted to evaluate the customer reviews propensity...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cerebration of Privacy Preserving Data Mining Algorithms

    Recent advances in data intensive information processing systems is becoming increasingly important to make decisions in business organizations. Precious & sensitive knowledgeable patterns may reside in the process of business analysis. Recently privacy preserving data mining have acquired a great extent by data mining and Information security community researchers in...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Data Analysis and Prediction of Power Generated by Photovoltaic Systems

    The increasing demand for renewable energy from sources such as wind and solar has attracted the researchers to study the behavior and attributes of these energy resources in more depth. One of the important aspects of renewable energy resources is their uncertainty/unpredictability. To have a balance between the power demand...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Prediction of Work Integrated Learning Placement Using Data Mining Algorithms

    Data mining in education is used to study data and discover new patterns that can be used for decision making. The classification algorithms are applied on educational data set for predicting work integrated learning placement based on student performance. J48, Bayes Net, Naive Bayes, Simple Cart, and REPTREE algorithms are...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    The Less Communicated Story of Location Based Service in Retail Applications

    Location based applications have been on the front pages of technological innovations and business transformations in recent years. Retail among all has been the most mature industry where LBS have flourished. The ability to weave consumer location context into browsing, social sharing and buying activities is the common mandate of...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Accurate Bluetooth Positioning Using Large Number of Devices Measurements

    In this paper it considers using the built-in Bluetooth in the cell phone as the positioning device; it is able from the measured RSSI (Received Signal Strength Indication) strength to locate the target or the cell phone position. From experimental measurements using Bluetooth positioning technique in various environments, the authors...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

    Recently, due to the rapid spread of wireless devices such as cell phones, mobile social networks have attracted considerable attention. In the mobile social networks, privacy issues have to be addressed and messages have to be transmitted effectively. In this paper, in order to resolve both the issues for the...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Application of Fuzzy Logic to Multimedia Streaming Dissemination System for Vehicular Networks

    A seamless streaming dissemination system for vehicular networks is presented in this paper. An adaptive streaming system is established at each local server to prefetch and buffer stream data. The adaptive streaming system computes the parts of prefetched stream data for each user and stores them temporarily at the local...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Low-PAPR Spectral Filter for Carrier Aggregated Transmission System

    Carrier Aggregation (CA) is one the techniques to increase the system bandwidth but with carrier aggregation it increases the Peak-to-Average Power Ratio (PAPR) level to worsen the system performance. In this paper, the authors consider to include a spectral filter with roll-off square-root raised cosine structure or to include the...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    A Study on Security Threats and Dynamic Access Control Technology for BYOD, Smart-Work Environment

    The term BYOD (Bring Your Own Device) collectively refers to the related technologies, concepts and policies, where employees do works by accessing corporate internal IT resources, such as database and applications, using their personal mobile devices like smart phones, laptop computers and tablet PCs. As operational convenience has improved with...

    Provided By International Association of Engineers

  • White Papers // Feb 2014

    Fusion Framework for Multimodal Biometric Person Authentication System

    In recent years, biometric based authentication systems have gained more attention due to frequent fraudulent attacks. Hence, this paper aims at developing a multi-modal, multi-sensor based Person Authentication System (PAS) using Joint Directors of Laboratories (JDL) fusion model. This paper investigates the need for multiple sensors, multiple recognition algorithms and...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    A SIP -Based VoIP Application in Enhanced Ethernet Passive Optical Network Architecture

    Since the inception of telephony, the Public Switch Telephone Network (PSTN) has had major impact in everyday life. The widespread adoption of VoIP has totally revolutionized the telephony industry. With many free services for the users, VoIP is favored over the traditional PSTN. A major concern for VoIP is voice...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    RFID-Based Location Tracking System Using a Peer-to-Peer Network Architecture

    In recent years, the Global Positioning System (GPS) has been commonly employed for outdoor positioning and location tracking. On the other hand, there has also been growing interest in developing indoor location tracking systems. Advancements in Radio Frequency IDentification (RFID) technology make it a promising technology for use in indoor...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Using Software-Defined Networking for Real-Time Internet Applications

    The authors consider an emerging class of challenging Internet applications called Real-time Online Interactive Applications (ROIA). Examples of ROIA are multiplayer online games, computation and interaction-intensive training, simulation based e-learning, etc. These applications make high QoS demands on the underlying network which involve the number of users and the actual...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Software Engineering Practices in Embedded System Design Using Discrete Modeling Techniques

    Embedded systems most often need real time programming. Real-time operating systems and their working are generally shown by two methods: finite state machine, Petri-nets. But these two modeling methods have shown certain limitations as many sophisticated embedded systems are multiprocessor systems and the processes have short latencies. This paper highlights...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Towards An Analysis of Software Supply Chain Risk Management

    Now-a-days, software supply chain participants have become international distributors, which make software supply chain more and more complex. This complexity makes manager understand, acquire, monitor and manage software supply chain products and processes more difficult than ever, and then relevant security problems happen, such as software with security holes. But...

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    Conceptual Prototype of a Planning Software for the CONWIP Production Control System

    In order to achieve the goals that are defined by the logistical positioning of manufacturing companies, the optimal design of the Production Planning and Control (PPC) is required. Many approaches exist, each showing different properties in different environments. Decisions regarding PPC design can be classified as strategic, while parameterization issues...

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    Ethernet-Based Communication Architecture Design and Fault-Tolerant System

    The designs of Ethernet based communication architectures are moving toward the integration of a fault-recovery and fault-detection algorithm on hardware. Each port on the same Network-Interface Card (NIC) design is required to provide highly scalable and low latency communication. In this paper, the authors present a study of the dual-port...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Software Quality Psychology

    In this paper, the authors analysis non-technical aspects of software quality perception and proposes further research activities for this subject. Cognitive science, psychology, micro economics and other human-oriented sciences do analyze human behavior, cognition and decision processes. On the other hand engineering disciplines, including software engineering, propose many formal and...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Feature Selection Using Decision Tree Induction in Class Level Metrics Dataset for Software Defect Predictions

    The importance of software testing for quality assurance cannot be over emphasized. The estimation of quality factors is important for minimizing the cost and improving the effectiveness of the software testing process. One of the quality factors is fault proneness, for which unfortunately there is no generalized technique available to...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Design and Development of Personalized Contents-Feed Apps Intended for Web-of-Things

    In this paper, the authors focus on design and development of a prototype app under windows platform. The function of this app is that it dynamically consolidates news feeds for the intended users. The app can be configured to personalized mode as per users need. They have reviewed current research,...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    Lessons Learned Building Reusable OO Telecommunication Software Frameworks

    Developers in certain well-traveled domains have successfully applied OO techniques and tools for years. For instance, the Microsoft MFC GUI framework and OCX components are in fact industry standards for creating graphical business applications on PC platforms. Developing complex software systems is expensive and error-prone. Object-Oriented (OO) programming languages are...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    ConWIP-Based Packing Order Planning Software Prototype for Variant-Centered Manufacturing

    In this paper, the authors focus on the concept, design, and implementation of a production planning software prototype built upon the methods of the Constant Work In Process (ConWIP) manufacturing system. The paper discusses various aspects revolving around the field of application and system implementation itself. As an introduction, basics...

    Provided By International Association of Engineers

  • White Papers // Oct 2011

    Investigating the Possibility of Transmitting and Receiving Multiple Signals at Low Baseband Frequencies

    Software Defined Radio (SDR) technology is one area in the field of Radio communications technology that has advanced considerably over the past years. There are several challenges that are faced in ensuring that Radio communications. Traditionally, most signal processing algorithms have been done at Radio frequencies. However with the coming...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Web Applications Quality Perception

    In this paper, the authors analyze experiment results regarding subjective perception of a web application. Software quality models, since the first publications on this subject, propose a prescriptive approach. Although most of the models are well explained and applicable, they still do not describe the real process taking place in...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    A Java Approach for Implementing Organizational Information System on NetBeans Integrated Development Environment

    An Organizational Information System (OIS) has been designed and implemented using visual web Java Server Faces (JSF) on NetBeans Integrated Development Environment (IDE) 6.5 in instrumentation and informatics research laboratory, department of electronics science, Gauhati University, India. The database for the system is developed using My Structured Query Language Version...

    Provided By International Association of Engineers

  • White Papers // Mar 2008

    Self-Organizing Business Networks, SOA and Software Maintenance

    These actual business leverages on software service to improve general firm performance. Software is always more a strategic asset to sustain business. In meantime business is changing continuously: there is a transition from centralized to distributed and cooperative organizations. This paper describes a software maintenance process strictly integrated with enterprise...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    Modular Design and Adoption of Embedded System Courseware with Portable Labs in a Box

    Teaching embedded system in universities and colleges that have limited resources faces difficulties due to the lack of dedicated embedded system labs and specialized embedded system instructors. To overcome these difficulties, the authors developed a new embedded system courseware with real labs that is portable, modular, and easy-to-adopt. An important...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    A Multi-Agent-Based RFID Framework for Smart-Object Applications

    Coupled with software agent technology, RFID can transform everyday objects into smart objects. Currently, in most applications, agent definitions are not encoded directly on the tags due to tag memory limitations, and RFID technology is used purely for identification. Such approaches cannot provide the benefits of flexibility and modularization supplied...

    Provided By International Association of Engineers

  • White Papers // Mar 2013

    A Test Case Selection From Using Use Case Description Changes

    The software industry is in a strong market competition. The software development method to support the present market with rapid requirement changes should reduce the time to market with customer needs. Developers are able to reduce the implementation time but to have adequate quality of software spends much development time....

    Provided By International Association of Engineers

  • White Papers // Oct 2007

    Application of DESA Design Method in Object-Oriented Software Systems

    To reduce complexity in software systems it is essential to minimize the functional dependencies in them. Functional dependency can be caused by the internal logic (model) of the system as well as the user interface. It is then vital to locate the source of the dependency, so that it can...

    Provided By International Association of Engineers

  • White Papers // Jul 2007

    Exploring the Interdependencies Among Communication, Knowledgeability and Performance of Multi-Agent Systems

    The advent of ubiquitous computing has revolutionized distributed Multi-Agent Systems (MAS). Consequently, there are many software projects focusing on MAS. However, its successful application is subject to the adoption of effective agents' communication that would be needed to share expertise for achieving goals of MAS. Communication among agents and agents'...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Generating State-Based Polymorphic Interaction Graph From UML Diagrams for Object Oriented Testing

    Object Oriented (OO) Design provides three main features to improve the quality of software development-i.e., inheritance, polymorphism, and dynamic binding. Object Oriented (OO) features such as inheritance, polymorphism, and dynamic binding provide not only efficient development of software for even complex system, but also new challenges for software testing. Recently,...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Automated Test Data Generation for Programs Having Array of Variable Length and Loops with Variable Number of Iteration

    In this paper, the authors propose a heuristic called longest path criterion for test data generation of programs having arrays of variable length, loops with variable number of iteration. Their heuristic is computed by a mathematical relation of array size (arr) and number of iteration (k). The relation they found...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Educational Tool for Understanding Algorithm Building and Learning Programming Languages

    In this paper, the authors present a new concept of using a single tool to associate syntax of various programming languages, algorithms and basic coding techniques. A simple framework has been programmed in Python that helps students learn skills to develop algorithms, and implement them in various programming languages. The...

    Provided By International Association of Engineers

  • White Papers // Dec 2013

    An Approach to Software Selection Using Semantic Web

    For a selection of software applications well-fitting to business needs, accurate knowledge of the needs and available technical skills are required. In a survey, the authors conducted, most of the participants indicated that they consult industry solutions and employ Internet search engines to find suitable software products. However, since a...

    Provided By International Association of Engineers

  • White Papers // Mar 2008

    Performance Analysis of Proprietary and Non-Proprietary Software

    One of the most powerful movements in the information technology community today is the widespread adoption of open-source software. Using the right software is increasingly critical to project success, but the choices keep getting wider and more confusing. Open Source Software (OSS) has entered the mix, leaving the traditional confines...

    Provided By International Association of Engineers

  • White Papers // Mar 2008

    A Software Reliability Estimation Tool Using Artificial Immune Recognition System

    Software is an integral part of many critical and non-critical applications and virtually any industries dependent on computers for their basic functioning. As computer software permeates the people modern society and will continue to do so at an increasing pace in the future, the assurance of its quality becomes an...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    ETHOM, an Ethernet Over SCI and DX Driver for Linux

    Now-a-days, high computing demands are often tackled by clusters of computers, each of which is basically an assembly of a growing number of CPU cores and main memory; these nodes are connected by some kind of communication network. With the growing speed and number of CPU cores, the network becomes...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    An Error Code Highlighting Function in Java Programming Learning Assistant System Using Test-Driven Development Method

    Recently, the objected-oriented programming language Java has been used in many practical systems including enterprise servers, smart phones, and embedded systems due to its high reliability and portability. To enhance effects of Java programming educations, the authors have developed a Web-based Java Programming Learning Assistant System (JPLAS). JPLAS adopts the...

    Provided By International Association of Engineers

  • White Papers // Jul 2007

    Simulating the Latent Effect of Attrition on Project Management

    Staff attrition is a problem often faced by software development organizations. The authors used process modeling and simulation to estimate the effect of different staffing policies on the project cost. A simulation technique has been used for analyzing the effect of the policies pertaining to replacement for engineers who leave...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Utilization of Statistical Process Control in Defined Level Software Companies to Manage Processes Using Control Charts with Three Sigma

    Monitoring the stability of the software process in the lower level companies is a challenging issue to software engineers. In this paper, SPC is applied to software metrics. Defect density, review performance and rework percentage and results after applying the SPC to various processes of software are discussed and analyzed,...

    Provided By International Association of Engineers

  • White Papers // Feb 2013

    A Java Programming Learning Assistant System Using Test-Driven Development Method

    Recently, the object-oriented programming language java has been used in many practical systems including enterprise servers, smart phones, and embedded systems, due to its high safety and portability. Thus, a lot of educational institutes have offered java programming courses to foster java engineers. In this paper, the authors propose a...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Comparative Study of Complexities of Breadth-First Search and Depth-First Search Algorithms Using Software Complexity Measures

    In this paper, two different software complexity measures were applied to breadth-first search and depth-first search algorithms. The intention is to study what kind of new information about the algorithm the complexity measures (Halstead's volume and Cylomatic number) are able to give and to study which software complexity measure is...

    Provided By International Association of Engineers