ISSN

Displaying 1-40 of 128 results

  • White Papers // Jul 2013

    Prioritizing Competitive Strategies in Iranian SME's Based on AHP Approach in Severe Economic Sanctions

    Rapid and major changes in the current market environment emphasize on the necessity and importance of identifying, survey and prioritizing competitive strategies, and any organization which would go to a higher level than its clients' expectations and succeed in the business world has no other way except following such strategy....

    Provided By ISSN

  • White Papers // Jul 2013

    Transformation of Business Processes into UML Models: An SBVR Approach

    A business process is a set of activities that collectively perform and deliver a complex functionality. At a very early stage of software development, business semantics are discussed with stakeholders. A business analyst writes these semantics in his preferred language such as English. A software architect/manager understands them and creates...

    Provided By ISSN

  • White Papers // Jun 2013

    A Survey of Data Management System for Cloud Computing: Models and Searching Methods

    Cloud computing, as a new computing pattern having the capacity of sharing computing and storage, has been developed steadily and rapidly during recent years. It is selected by the famous scientific journal Technology Review published by MIT as one of the ten newly developed technologies which have changed the world....

    Provided By ISSN

  • White Papers // Jun 2013

    Review On: Design of Low Complexity LDPC Decoding Algorithm in LDPC Coded BICMOFDM Systems

    Digital Video Broadcasting-Terrestrial (DVB-T) is the most widely deployed digital terrestrial television system worldwide with services on air in over thirty countries. In order to increase its spectral efficiency and to enable new services the DVB consortium has developed a new standard named DVB-T2. Latest and next-generation wireless broadcasting standards,...

    Provided By ISSN

  • White Papers // Jun 2013

    Design of Cloud Computing Based ERP Model

    This ERP (Enterprise Resource Planning) is the information system about the management of the enterprise, which is developed on information technology and systematic management thinking, decision-making for businesses and employees to run the means to provide decision management platform, and it can integrate all resources of enterprise. The paper puts...

    Provided By ISSN

  • White Papers // May 2013

    Enterprise Architecture - A Tool for Business Innovation Realization in the Enterprise

    Enterprises globally are undergoing business transformation. Organizations and corporate world have been searching for ways to enhance their businesses in order to be agile and how development in Information Technology (IT) can help them achieve this in today's unstable economic climate. Large-scale changes in the business affect operations, which in...

    Provided By ISSN

  • White Papers // Apr 2013

    Multilayer Coding Mechanisms for Broadcasting over MIMO Networks

    In this paper, the authors first propose a design rule for constructing a proper multilayer code for Multiple-Input-Multiple-Output(MIMO) networks.. A number of recent source coding techniques compress the source signal into multiple layers such that a destination is able to reconstruct the original signal (with some distortion) even if it...

    Provided By ISSN

  • White Papers // Apr 2013

    Mobile Cloud Computing: Approaches and Issues

    During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. Together with an explosive growth of the mobile computing and excellent promising technology of cloud computing concept, Mobile Cloud Computing (MCC) has been introduced to be a potential technology...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Data Management Interface Based Storage Virtualization Mechanism for Cloud Computing

    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper, the authors have proposed...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Computing: Just Fancy Name for Virtualization

    Cloud computing is a technology that uses the internet and central remote server to maintain data and application. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. This technology allows for much more efficient computing by centralizing...

    Provided By ISSN

  • White Papers // Apr 2013

    CLOUD-SLA: Service Level Agreement for Cloud Computing

    In the last few years, the cloud computing becomes the most important developing platform for both scientific and commercial application. Clouds are rapidly becoming an important platform for scientific applications. In the Cloud environment with uncountable numeric nodes, resource is inevitably unreliable, which has a great effect on task execution...

    Provided By ISSN

  • White Papers // Mar 2013

    Effective Service Security Schemes In Cloud Computing

    The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on demand provisioning mechanism relying...

    Provided By ISSN

  • White Papers // Mar 2013

    Resource Security in the Cloud Computing

    Cloud computing has become nowadays a buzzword among IT and industry engineers. The cloud phenomenon is quickly growing towards becoming the de facto standard of computing, storage and hosting, both in industry and Internet. This paper presents analysis of security issues inside enterprise private clouds. The investigated security tools were:...

    Provided By ISSN

  • White Papers // Mar 2013

    Comparative Study Between Green Cloud Computing and Mobile Cloud Computing

    While searching for information about cloud computing over the internet, the author came across different computing keywords such as Green Computing and Mobile Computing. After so much of research on all these terms I myself tried to have the clear vision about them. This paper will help the researchers and...

    Provided By ISSN

  • White Papers // Mar 2013

    A Survey on Security Threats and Vulnerabilities In Cloud Computing

    Cloud computing is a distributed computing paradigm capable of providing agile IT services to individual users and organizations. Cloud computing is a technology which will facilitate companies or organizations to host their services without worrying about IT infrastructure and other supporting services. Cloud computing providers can build large data centers...

    Provided By ISSN

  • White Papers // Mar 2013

    Survey on Resources Provisioning in Cloud Systems for Cost Benefits

    In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called...

    Provided By ISSN

  • White Papers // Mar 2013

    Development of Optimized Resource Provisioning On-Demand Security Architecture for Secured Storage Services in Cloud Computing

    Cloud Computing makes it possible for providers to quickly deploy and scale services and obtain benefit from pay-by-use models under low cost, while users enjoy the flexibility of Internet-based computing services. Users find it difficult to fully trust cloud-based services because cloud-based data storage and protection methods are largely user...

    Provided By ISSN

  • White Papers // Mar 2013

    DoubleGuard: Detecting & Preventing Intrusions in Multitier Web Applications

    Internet services and applications have become an indivisible part of the authors' daily life. These applications and services are made available through Web Servers and they make use of Database, Servers for fulfillment of user's request. Both of these servers are prone to attacks. DoubleGuard provides Intrusion Prevention Systems at...

    Provided By ISSN

  • White Papers // Mar 2013

    Business Process Modeling Notation

    Models as representations of real world entities may appear to the novice to be an unnecessary abstraction. Indeed, in small organizations where there are relatively few processes, there is little need to this paper activity. When it comes to large organizations, with hundreds or thousands of processes, the creation of...

    Provided By ISSN

  • White Papers // Feb 2013

    The Policy as Repudiation Factors of Adopting Cloud Computing in University Administration

    Cloud computing (CC) technology can be described as the next generation of Information technology for companies, educational institutions and governmental agencies; which provides easy and affordable access to state of the art technology; IT, technological application and services. Due to the growing needs for Information Technology (IT) and the current...

    Provided By ISSN

  • White Papers // Feb 2013

    Information Technology - Its Impact on Global Management

    21st century is the century of Information Technology (IT) and globalization. Information technology is playing its significant role in the betterment of the organizations. This paper explores another very important role of IT on global management i.e., IT helps to redefine the vision of global corporations which is the primary...

    Provided By ISSN

  • White Papers // Feb 2013

    Business Process Reengineering by Rational Unified Process (RUP) Methodology

    Business Process Reengineering is a holistic approach that preparing and heading organizations for \"Change\". This method considers the business processes as the main issues for Reengineering. But a close examination of BPR project indicates that the main reason of its failure is its structure and way of implementation. This paper...

    Provided By ISSN

  • White Papers // Feb 2013

    An Elementary Review of Linkages & Gaps Among BPR, SOA & Software Reverse Engineering

    Research on Business Process Reengineering has started as an effort in proposing methods and techniques for organizational restructuring in order to increase organizational efficiency and effectiveness. Later on researchers and consultants started using the tools of IT as part of BPR processes and ultimately they started to develop IT based...

    Provided By ISSN

  • White Papers // Feb 2013

    Critical Success Factors for Six Sigma Implementation by SMEs

    Six Sigma is a business strategy that enables organizations to increase their profits by optimizing their operations, improving quality and eliminating defects. Six Sigma is a business strategy for improving the bottom line of the businesses. In recent times the small and medium size enterprises also have started adopting the...

    Provided By ISSN

  • White Papers // Jan 2013

    Security Threats to Cloud Computing

    Cloud computing offer a new and exciting way of computing with various service models that facilitates different services to the users. As all the data of an enterprise processed remotely and exchanges via different networks. Security is an essential parameter and the service provider must ensure that there is no...

    Provided By ISSN

  • White Papers // Jan 2013

    A Novel Data Gathering Scheme for Monitoring-Oriented Wireless Sensor Networks

    Wireless sensor networks have great potential as a means of realizing a wide range of applications, such as natural environmental monitoring, environmental control in residential spaces or plants, and object tracking. As a frame to actualize these sensor applications, this paper assumes a monitoring-oriented wireless sensor network, which periodically gathers...

    Provided By ISSN

  • White Papers // Jan 2013

    Research on Objective Sorting Algorithm of Geo Communication Satellite Based on Fuzzy Theory

    GEO (Geostationary Earth Orbit) communication satellites are important guarantee for the war. The authors should research the sorting for attack if they want to win the war. Performance parameters of GEO communication satellites are analyzed, and definitions of threat index are established. Subsequently, objective sorting algorithm of GEO communication satellites...

    Provided By ISSN

  • White Papers // Dec 2012

    Cellular Learning Automata Approach for Data Classification

    Data classification is a process that can categorize data to achieve the relationship between attributes and extract the suitable rules for prediction process. There are different learning methods in machine learning of which each has both advantages and disadvantages. In this paper, it will present a new method for data...

    Provided By ISSN

  • White Papers // Dec 2012

    Optimized Resource in Satellite Network Based on Genetic Algorithm

    Satellite network is an all-around network which has high-complexity, dynamic and enormous, and its resources are very limited. So, the authors have to optimize the resources on satellite network. This paper has studied the resources optimization for task in the satellite network. They established the flow chart and mathematical model...

    Provided By ISSN

  • White Papers // Nov 2012

    ACP Based Anonymous Secure Group Communication

    Anonymous secure group communication is a new research and application paradigm. In this paper Anonymity between two-party communication, Access control polynomial to multi-part group communication, group key management for secure group communication and secure set concepts has been proposed. Newly extended scheme enforces Anonymous group membership, group size, Anonymous group...

    Provided By ISSN

  • White Papers // Nov 2012

    A Survey on Vehicular Mobility Modeling: Flow Modeling

    Motion or movement patterns of vehicles communicating wirelessly play an important role in the simulation based evaluation of Vehicular Ad-hoc NETworks (VANETs). It is to know that recent research about mobility modeling has given direction for vehicular network study still to obtain realistic behavior of vehicles; developments in this area...

    Provided By ISSN

  • White Papers // Nov 2012

    Zero Knowledge Password Authentication Protocol

    In many applications, the password is sent as clear text to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has...

    Provided By ISSN

  • White Papers // Nov 2012

    A New Approach for Instigating Security Using Single Zoom Mouse Click Graphical Password

    Due to growing hazards to networked computer system, there is great need for security innovations. Authentication is the process of security to information. User authentication is one of the significant topics in information security. Commonly used authentication is alphanumeric passwords, biometrics and smart card. At present day upcoming popular method...

    Provided By ISSN

  • White Papers // Nov 2012

    Efficient Probe Station Placement and Probe Set Selection for Fault Localization

    Network fault management has been a focus of research activity with more emphasis on fault localization - zero down exact source of a failure from set of observed failures. Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and...

    Provided By ISSN

  • White Papers // Nov 2012

    Hybrid Channel Allocation in Wireless Cellular Networks

    The enormous growth of mobile telephone traffic, along with the limited number of channels available, requires efficient reuse of channels. Channel allocation schemes can be divided into three categories: Fixed Channel Allocation (FCA), Dynamic Channel Allocation (DCA) and Hybrid Channel Allocation (HCA). In HCA, channels are divided into two disjoint...

    Provided By ISSN

  • White Papers // Nov 2012

    Signal Strength and Energy Aware Reliable Route Discovery in Manet

    Frequent changes in network topology and confined battery capacity of the mobile devices are the main challenges for routing in ad-hoc networks. In this paper, the authors propose a novel, Signal strength and Energy Aware routing protocol (SEA-DSR), which directly incorporates signal strength and residual battery capacity of nodes into...

    Provided By ISSN

  • White Papers // Nov 2012

    Cyber Security Solutions for DLMS Meters Using GSM/GPRS Technology

    The Smart meters are used in the areas of generation, transmission, distribution and consumption. The capabilities of smart meter systems and grid networks, such as distributed intelligence and broadband capabilities can greatly enhance efficiency and reliability, but they may also create much new vulnerability if not deployed with the appropriate...

    Provided By ISSN

  • White Papers // Nov 2012

    Communicating with an Energy Meter Using IEC 62056 Through TCP/IP Protocol

    Device Language Message Specification (DLMS) is an application layer protocol designed to support messaging to and from energy distribution devices in a computer integrated environment. COSEM, the COmpanion Specification for Energy Metering, addresses the meter as an integrated part of a commercial process, which starts with the measurement of the...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Chaos-Based Optimization Algorithm Approach for Cryptography

    The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications....

    Provided By ISSN

  • White Papers // Nov 2012

    Survey of Vehicle Ad-Hoc Network

    In car network enable the direct communication in ad-hoc network among the car and between the car and road side communication device. the ad hoc networking provides a spontaneous and direct communication of a car with other cars or with fixed road-side access points in its vicinity. The communication is...

    Provided By ISSN

  • White Papers // Nov 2011

    Intelligent Access Scheme Design for Mobile Cloud Computing

    Mobile Cloud Computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing a new level of security by a centralized maintenance of security critical software for...

    Provided By ISSN

  • White Papers // Mar 2012

    Mobile Multimedia Storage: A Mobile Cloud Computing Application and Analysis

    Cloud computing will vividly diminish the obligation/requirement of advanced/modern handsets for running mobile applications, according/conferring to the study. During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. In this paper, the authors present study and comparative analyses of...

    Provided By ISSN

  • White Papers // Apr 2013

    Mobile Cloud Computing: Approaches and Issues

    During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. Together with an explosive growth of the mobile computing and excellent promising technology of cloud computing concept, Mobile Cloud Computing (MCC) has been introduced to be a potential technology...

    Provided By ISSN

  • White Papers // Mar 2013

    Comparative Study Between Green Cloud Computing and Mobile Cloud Computing

    While searching for information about cloud computing over the internet, the author came across different computing keywords such as Green Computing and Mobile Computing. After so much of research on all these terms I myself tried to have the clear vision about them. This paper will help the researchers and...

    Provided By ISSN

  • White Papers // Feb 2012

    Survey on Mobile Cloud Computing

    The cloud heralds a new era of computing where application services are provided through the Internet. Cloud computing can enhance the computing capability of mobile systems, but is it the ultimate solution for extending such systems' battery lifetimes. Cloud computing promises to democratize parallel data processing by making large server...

    Provided By ISSN

  • White Papers // Jul 2012

    Security Issues and Their Solution in Cloud Computing

    Cloud computing is model which uses combine concept of "software-as-a-service" and "Utility computing", provide convenient and on-demand services to requested end users. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloud service consumer should...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing Issues and Benefits Modern Education

    Cloud computing, a rapidly developing information technology has brought new change & opportunities to IT industry and in the field of education. E-learning platform brings a brand new concept & is a kind of network information learning mode & also known as online learning to guide education. E-learning emphasizes on...

    Provided By ISSN

  • White Papers // Oct 2012

    Welcome To The Future of Computing: Cloud Computing And Legal Issues

    As the civilization enters into the new millennium, the words of 19th century have suddenly taken a new meaning. The world is undergoing a remarkable technological change. The advancement of Internet along with the expansion of IT infrastructure at large level has revolutionized the way in which information and communication...

    Provided By ISSN

  • White Papers // Mar 2013

    A Survey on Security Threats and Vulnerabilities In Cloud Computing

    Cloud computing is a distributed computing paradigm capable of providing agile IT services to individual users and organizations. Cloud computing is a technology which will facilitate companies or organizations to host their services without worrying about IT infrastructure and other supporting services. Cloud computing providers can build large data centers...

    Provided By ISSN

  • White Papers // Mar 2012

    Cloud Computing Security Issues with Possible Solutions

    Cloud computing gets its name from the drawings typically used to describe the Internet. It is a new consumption and delivery model for IT services. Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many security risks. In this paper, the...

    Provided By ISSN

  • White Papers // Mar 2013

    Effective Service Security Schemes In Cloud Computing

    The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on demand provisioning mechanism relying...

    Provided By ISSN

  • White Papers // Jun 2012

    Intrusion Tolerance: Enhancement of Safety in Cloud Computing

    Cloud computing is a recent computing model; provides consistent access to wide area distributed resources facing many problems as its usage increases. Enormous loss to both cloud clients as well as cloud service providers happen even with small intrusions. The protection and defense of cloud infrastructure against malicious attacks can...

    Provided By ISSN

  • White Papers // Jan 2013

    Security Threats to Cloud Computing

    Cloud computing offer a new and exciting way of computing with various service models that facilitates different services to the users. As all the data of an enterprise processed remotely and exchanges via different networks. Security is an essential parameter and the service provider must ensure that there is no...

    Provided By ISSN

  • White Papers // Mar 2013

    Survey on Resources Provisioning in Cloud Systems for Cost Benefits

    In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called...

    Provided By ISSN

  • White Papers // Oct 2012

    Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task Computing (MTC) Applications

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By ISSN

  • White Papers // Feb 2013

    The Policy as Repudiation Factors of Adopting Cloud Computing in University Administration

    Cloud computing (CC) technology can be described as the next generation of Information technology for companies, educational institutions and governmental agencies; which provides easy and affordable access to state of the art technology; IT, technological application and services. Due to the growing needs for Information Technology (IT) and the current...

    Provided By ISSN

  • White Papers // Mar 2012

    Demystifying Mobile Cloud Computing using Pandaboard

    Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. Mobile Cloud Computing (MCC) is simply cloud computing in which at least some of the devices involved are mobile. This paper goes over multiple techniques and...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Data Management Interface Based Storage Virtualization Mechanism for Cloud Computing

    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper, the authors have proposed...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Computing: Just Fancy Name for Virtualization

    Cloud computing is a technology that uses the internet and central remote server to maintain data and application. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. This technology allows for much more efficient computing by centralizing...

    Provided By ISSN

  • White Papers // Oct 2011

    Security Issues in Cloud Computing A Transparent View

    Cloud Computing is the next generation Architecture of the most IT enterprise. It made possible, the application to run without the burden of local hardware and software. It moved the data and the application software of the various enterprises to the centralized large data centre, where the security issue arises....

    Provided By ISSN

  • White Papers // Nov 2012

    Privacy-Preserving Authentication Using Fingerprint

    Biometrics provides the user with an effective tool for authentication and is becoming a strong competitor in current authentication mechanisms. However, the concerns about biometrics regarding template security, privacy and revocability impede its further application to network-based scenarios. The authors propose a novel fingerprint minutiae-based scheme to achieve reliable mutual...

    Provided By ISSN

  • White Papers // May 2012

    Design and Analysis of Location Control for Mobile Agent in Mobile Information Systems

    Retrieval of data using mobile agents has gained popularity, due to the advancements in mobile computing techniques. However, the transmission of wireless communication is still unreliable and bandwidth-limited. This paper investigates this issue and tries to find the most suitable location for a mobile agent in a vast network. The...

    Provided By ISSN

  • White Papers // Mar 2012

    Modeling and Simulation of Channel for Underwater Communication Network

    According to the characteristics of underwater acoustic channel, Thorp experience formula is adopted in order to simulate seawater absorption properties, on the basis of which, the path loss is solved by means of simulation. A Wenz model is also improved so as to approach the noise model of underwater acoustic...

    Provided By ISSN

  • White Papers // Mar 2012

    A Generalized Likelihood Ratio Test for a Fault-Tolerant Control System

    In this paper, the authors deal with the problem of diagnosis of multiple sequential faults using statistical test GLR. Based on the work of Willsky and Jones [50], they propose a modified Generalized Likelihood Ratio (GLR) test, allowing detection, isolation and estimation of multiple sequential faults. Their contribution aims to...

    Provided By ISSN

  • White Papers // Feb 2012

    Model-Driven Security for Trusted Systems

    In this paper, the authors have classified stakeholders and objects, while concentrating on the specification for objects' usage at the stakeholder end. This will allow them to deploy their tools in an emulated environment, where these high level specifications will transform to platform independent administrative policies and administer the emulation...

    Provided By ISSN

  • White Papers // Nov 2011

    Adaptive Linearization Scheme for Power Amplifiers in OFDM Communication Systems

    An adaptive linearization scheme based on the Exact Model-Matching (EMM) approach is proposed to compensate nonlinearity of high power amplifiers (HPAs). It is illustrated that the input-output property of the broadband amplifier system can be approximated by a Memory Polynomial Model (MPM). Then, the compensation of HPA input is determined...

    Provided By ISSN

  • White Papers // Jun 2011

    A Novel Approach for Architecture Based Software Maintenance Prediction

    In the recent years, the success or failure of any software development effort is judged by the degree of achievement of various software quality attributes associated with it. In this paper, the authors have presented a novel approach to predict software maintenance effort at architecture level. They have used requirements,...

    Provided By ISSN

  • White Papers // Jun 2011

    A Graph-Based Concurrency Control Protocol for XML Metadata Knowledge Bases

    Providing efficient access for XML APIs in XML Metadata Knowledge Bases (XMKBs) is crucial, since XML is widely used to integrate data in XMKBs. In XMKBs, the types, contents and locations of heterogeneous data are illustrated in XML documents to provide a uniform interface for users to manipulate this data....

    Provided By ISSN

  • White Papers // Apr 2011

    Data Delivery with Mobility Control in Sparse Wireless Sensor Networks

    In this paper, the authors propose a sensor mobility control scheme for data delivery in sparse wireless sensor networks. All sensor nodes remain static once they have been deployed but are capable of moving in a controlled manner. Based on periodic beacon messages, local node locations are known to all...

    Provided By ISSN

  • White Papers // Apr 2011

    Chaos Synchronization-Based Data Transmission Scheme in Multiple Sink Wireless Sensor Networks

    In this paper, the authors study chaos synchronization-based data transmission scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate impulsive signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each...

    Provided By ISSN

  • White Papers // Mar 2011

    Optimizing MIMO-SDMA Smart Antennas by Using Linear Array Phase Perturbations Based on Particle Swarm Optimization

    In this paper, based on phase-only perturbation method, an innovative up-link Multiple-Intput Multiple-Output Spatial Division Multiple Access (MIMO-SDMA) optimization technique of smart antennas by is proposed. Particle Swarm Optimization (PSO) algorithm is used to search the optimal weighting vector of the phase shift perturbations for array factor. The deduced radiation...

    Provided By ISSN

  • White Papers // Feb 2011

    Scheduling Parallel Tasks with Intra-Communication Overhead in a Grid Computing Environment

    With the improvements in wide-area network performance and powerful computers, it is possible to integrate a large number of distributed machines belonging to different organizations as a single system, for example, a grid computing environment. A grid computing environment involves cooperation and sharing resources among distributed machines. In this paper,...

    Provided By ISSN

  • White Papers // Aug 2012

    The Distributed Computing Paradigms: P2P, Grid, Cluster, Cloud, and Jungle

    The distributed computing is done on many systems to solve a large scale problem. The growing of high-speed broadband networks in developed and developing countries, the continual increase in computing power, and the rapid growth of the Internet have changed the way. In it the society manages information and information...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing: Towards Case Study of Data Security Mechanism

    Pick up any magazine or visit almost any IT website or blog, user will be sure to see talk about Cloud Computing. The only problem is that not everyone agrees on what it is exactly. Every individual has different views, but still there is a growing trend of using cloud...

    Provided By ISSN

  • White Papers // Mar 2013

    Resource Security in the Cloud Computing

    Cloud computing has become nowadays a buzzword among IT and industry engineers. The cloud phenomenon is quickly growing towards becoming the de facto standard of computing, storage and hosting, both in industry and Internet. This paper presents analysis of security issues inside enterprise private clouds. The investigated security tools were:...

    Provided By ISSN

  • White Papers // Nov 2011

    An Approach for Effective Resource Management in Cloud Computing

    In High Performance Computing (HPC), providing adequate resources for user applications is crucial. For instance, a computing center that a user has access to cannot handle the user applications with short deadlines due to limited computing infrastructure in the center. Therefore, to get the application completed by the deadline, users...

    Provided By ISSN

  • White Papers // Jun 2013

    A Survey of Data Management System for Cloud Computing: Models and Searching Methods

    Cloud computing, as a new computing pattern having the capacity of sharing computing and storage, has been developed steadily and rapidly during recent years. It is selected by the famous scientific journal Technology Review published by MIT as one of the ten newly developed technologies which have changed the world....

    Provided By ISSN

  • White Papers // Feb 2012

    Disaster Recovery in Clouds

    Cloud computing has been a new buzzword of today's most enticing technology areas due to its cost-efficiency and flexibility. It offers mainframe or better infrastructure through a small set of services delivered globally over the Internet. As per one of the estimates from Gartner, by year 2012, 20% of enterprise...

    Provided By ISSN

  • White Papers // Mar 2013

    Development of Optimized Resource Provisioning On-Demand Security Architecture for Secured Storage Services in Cloud Computing

    Cloud Computing makes it possible for providers to quickly deploy and scale services and obtain benefit from pay-by-use models under low cost, while users enjoy the flexibility of Internet-based computing services. Users find it difficult to fully trust cloud-based services because cloud-based data storage and protection methods are largely user...

    Provided By ISSN

  • White Papers // Apr 2013

    CLOUD-SLA: Service Level Agreement for Cloud Computing

    In the last few years, the cloud computing becomes the most important developing platform for both scientific and commercial application. Clouds are rapidly becoming an important platform for scientific applications. In the Cloud environment with uncountable numeric nodes, resource is inevitably unreliable, which has a great effect on task execution...

    Provided By ISSN