ISSN

Displaying 1-40 of 129 results

  • White Papers // Jul 2013

    Prioritizing Competitive Strategies in Iranian SME's Based on AHP Approach in Severe Economic Sanctions

    Rapid and major changes in the current market environment emphasize on the necessity and importance of identifying, survey and prioritizing competitive strategies, and any organization which would go to a higher level than its clients' expectations and succeed in the business world has no other way except following such strategy....

    Provided By ISSN

  • White Papers // Jul 2013

    Transformation of Business Processes into UML Models: An SBVR Approach

    A business process is a set of activities that collectively perform and deliver a complex functionality. At a very early stage of software development, business semantics are discussed with stakeholders. A business analyst writes these semantics in his preferred language such as English. A software architect/manager understands them and creates...

    Provided By ISSN

  • White Papers // Jun 2013

    A Survey of Data Management System for Cloud Computing: Models and Searching Methods

    Cloud computing, as a new computing pattern having the capacity of sharing computing and storage, has been developed steadily and rapidly during recent years. It is selected by the famous scientific journal Technology Review published by MIT as one of the ten newly developed technologies which have changed the world....

    Provided By ISSN

  • White Papers // Jun 2013

    Review On: Design of Low Complexity LDPC Decoding Algorithm in LDPC Coded BICMOFDM Systems

    Digital Video Broadcasting-Terrestrial (DVB-T) is the most widely deployed digital terrestrial television system worldwide with services on air in over thirty countries. In order to increase its spectral efficiency and to enable new services the DVB consortium has developed a new standard named DVB-T2. Latest and next-generation wireless broadcasting standards,...

    Provided By ISSN

  • White Papers // Jun 2013

    Design of Cloud Computing Based ERP Model

    This ERP (Enterprise Resource Planning) is the information system about the management of the enterprise, which is developed on information technology and systematic management thinking, decision-making for businesses and employees to run the means to provide decision management platform, and it can integrate all resources of enterprise. The paper puts...

    Provided By ISSN

  • White Papers // May 2013

    Enterprise Architecture - A Tool for Business Innovation Realization in the Enterprise

    Enterprises globally are undergoing business transformation. Organizations and corporate world have been searching for ways to enhance their businesses in order to be agile and how development in Information Technology (IT) can help them achieve this in today's unstable economic climate. Large-scale changes in the business affect operations, which in...

    Provided By ISSN

  • White Papers // Apr 2013

    Multilayer Coding Mechanisms for Broadcasting over MIMO Networks

    In this paper, the authors first propose a design rule for constructing a proper multilayer code for Multiple-Input-Multiple-Output(MIMO) networks.. A number of recent source coding techniques compress the source signal into multiple layers such that a destination is able to reconstruct the original signal (with some distortion) even if it...

    Provided By ISSN

  • White Papers // Apr 2013

    Mobile Cloud Computing: Approaches and Issues

    During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. Together with an explosive growth of the mobile computing and excellent promising technology of cloud computing concept, Mobile Cloud Computing (MCC) has been introduced to be a potential technology...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Data Management Interface Based Storage Virtualization Mechanism for Cloud Computing

    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper, the authors have proposed...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Computing: Just Fancy Name for Virtualization

    Cloud computing is a technology that uses the internet and central remote server to maintain data and application. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. This technology allows for much more efficient computing by centralizing...

    Provided By ISSN

  • White Papers // Apr 2013

    CLOUD-SLA: Service Level Agreement for Cloud Computing

    In the last few years, the cloud computing becomes the most important developing platform for both scientific and commercial application. Clouds are rapidly becoming an important platform for scientific applications. In the Cloud environment with uncountable numeric nodes, resource is inevitably unreliable, which has a great effect on task execution...

    Provided By ISSN

  • White Papers // Mar 2013

    Effective Service Security Schemes In Cloud Computing

    The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on demand provisioning mechanism relying...

    Provided By ISSN

  • White Papers // Mar 2013

    Resource Security in the Cloud Computing

    Cloud computing has become nowadays a buzzword among IT and industry engineers. The cloud phenomenon is quickly growing towards becoming the de facto standard of computing, storage and hosting, both in industry and Internet. This paper presents analysis of security issues inside enterprise private clouds. The investigated security tools were:...

    Provided By ISSN

  • White Papers // Mar 2013

    Comparative Study Between Green Cloud Computing and Mobile Cloud Computing

    While searching for information about cloud computing over the internet, the author came across different computing keywords such as Green Computing and Mobile Computing. After so much of research on all these terms I myself tried to have the clear vision about them. This paper will help the researchers and...

    Provided By ISSN

  • White Papers // Mar 2013

    A Survey on Security Threats and Vulnerabilities In Cloud Computing

    Cloud computing is a distributed computing paradigm capable of providing agile IT services to individual users and organizations. Cloud computing is a technology which will facilitate companies or organizations to host their services without worrying about IT infrastructure and other supporting services. Cloud computing providers can build large data centers...

    Provided By ISSN

  • White Papers // Mar 2013

    Survey on Resources Provisioning in Cloud Systems for Cost Benefits

    In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called...

    Provided By ISSN

  • White Papers // Mar 2013

    Business Process Modeling Notation

    Models as representations of real world entities may appear to the novice to be an unnecessary abstraction. Indeed, in small organizations where there are relatively few processes, there is little need to this paper activity. When it comes to large organizations, with hundreds or thousands of processes, the creation of...

    Provided By ISSN

  • White Papers // Mar 2013

    Development of Optimized Resource Provisioning On-Demand Security Architecture for Secured Storage Services in Cloud Computing

    Cloud Computing makes it possible for providers to quickly deploy and scale services and obtain benefit from pay-by-use models under low cost, while users enjoy the flexibility of Internet-based computing services. Users find it difficult to fully trust cloud-based services because cloud-based data storage and protection methods are largely user...

    Provided By ISSN

  • White Papers // Mar 2013

    DoubleGuard: Detecting & Preventing Intrusions in Multitier Web Applications

    Internet services and applications have become an indivisible part of the authors' daily life. These applications and services are made available through Web Servers and they make use of Database, Servers for fulfillment of user's request. Both of these servers are prone to attacks. DoubleGuard provides Intrusion Prevention Systems at...

    Provided By ISSN

  • White Papers // Feb 2013

    The Policy as Repudiation Factors of Adopting Cloud Computing in University Administration

    Cloud computing (CC) technology can be described as the next generation of Information technology for companies, educational institutions and governmental agencies; which provides easy and affordable access to state of the art technology; IT, technological application and services. Due to the growing needs for Information Technology (IT) and the current...

    Provided By ISSN

  • White Papers // Feb 2013

    Business Process Reengineering by Rational Unified Process (RUP) Methodology

    Business Process Reengineering is a holistic approach that preparing and heading organizations for \"Change\". This method considers the business processes as the main issues for Reengineering. But a close examination of BPR project indicates that the main reason of its failure is its structure and way of implementation. This paper...

    Provided By ISSN

  • White Papers // Feb 2013

    Information Technology - Its Impact on Global Management

    21st century is the century of Information Technology (IT) and globalization. Information technology is playing its significant role in the betterment of the organizations. This paper explores another very important role of IT on global management i.e., IT helps to redefine the vision of global corporations which is the primary...

    Provided By ISSN

  • White Papers // Feb 2013

    An Elementary Review of Linkages & Gaps Among BPR, SOA & Software Reverse Engineering

    Research on Business Process Reengineering has started as an effort in proposing methods and techniques for organizational restructuring in order to increase organizational efficiency and effectiveness. Later on researchers and consultants started using the tools of IT as part of BPR processes and ultimately they started to develop IT based...

    Provided By ISSN

  • White Papers // Feb 2013

    Critical Success Factors for Six Sigma Implementation by SMEs

    Six Sigma is a business strategy that enables organizations to increase their profits by optimizing their operations, improving quality and eliminating defects. Six Sigma is a business strategy for improving the bottom line of the businesses. In recent times the small and medium size enterprises also have started adopting the...

    Provided By ISSN

  • White Papers // Jan 2013

    Security Threats to Cloud Computing

    Cloud computing offer a new and exciting way of computing with various service models that facilitates different services to the users. As all the data of an enterprise processed remotely and exchanges via different networks. Security is an essential parameter and the service provider must ensure that there is no...

    Provided By ISSN

  • White Papers // Jan 2013

    A Novel Data Gathering Scheme for Monitoring-Oriented Wireless Sensor Networks

    Wireless sensor networks have great potential as a means of realizing a wide range of applications, such as natural environmental monitoring, environmental control in residential spaces or plants, and object tracking. As a frame to actualize these sensor applications, this paper assumes a monitoring-oriented wireless sensor network, which periodically gathers...

    Provided By ISSN

  • White Papers // Jan 2013

    Research on Objective Sorting Algorithm of Geo Communication Satellite Based on Fuzzy Theory

    GEO (Geostationary Earth Orbit) communication satellites are important guarantee for the war. The authors should research the sorting for attack if they want to win the war. Performance parameters of GEO communication satellites are analyzed, and definitions of threat index are established. Subsequently, objective sorting algorithm of GEO communication satellites...

    Provided By ISSN

  • White Papers // Dec 2012

    Cellular Learning Automata Approach for Data Classification

    Data classification is a process that can categorize data to achieve the relationship between attributes and extract the suitable rules for prediction process. There are different learning methods in machine learning of which each has both advantages and disadvantages. In this paper, it will present a new method for data...

    Provided By ISSN

  • White Papers // Dec 2012

    Optimized Resource in Satellite Network Based on Genetic Algorithm

    Satellite network is an all-around network which has high-complexity, dynamic and enormous, and its resources are very limited. So, the authors have to optimize the resources on satellite network. This paper has studied the resources optimization for task in the satellite network. They established the flow chart and mathematical model...

    Provided By ISSN

  • White Papers // Nov 2012

    ACP Based Anonymous Secure Group Communication

    Anonymous secure group communication is a new research and application paradigm. In this paper Anonymity between two-party communication, Access control polynomial to multi-part group communication, group key management for secure group communication and secure set concepts has been proposed. Newly extended scheme enforces Anonymous group membership, group size, Anonymous group...

    Provided By ISSN

  • White Papers // Nov 2012

    A Survey on Vehicular Mobility Modeling: Flow Modeling

    Motion or movement patterns of vehicles communicating wirelessly play an important role in the simulation based evaluation of Vehicular Ad-hoc NETworks (VANETs). It is to know that recent research about mobility modeling has given direction for vehicular network study still to obtain realistic behavior of vehicles; developments in this area...

    Provided By ISSN

  • White Papers // Nov 2012

    Zero Knowledge Password Authentication Protocol

    In many applications, the password is sent as clear text to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has...

    Provided By ISSN

  • White Papers // Nov 2012

    A New Approach for Instigating Security Using Single Zoom Mouse Click Graphical Password

    Due to growing hazards to networked computer system, there is great need for security innovations. Authentication is the process of security to information. User authentication is one of the significant topics in information security. Commonly used authentication is alphanumeric passwords, biometrics and smart card. At present day upcoming popular method...

    Provided By ISSN

  • White Papers // Nov 2012

    Efficient Probe Station Placement and Probe Set Selection for Fault Localization

    Network fault management has been a focus of research activity with more emphasis on fault localization - zero down exact source of a failure from set of observed failures. Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and...

    Provided By ISSN

  • White Papers // Nov 2012

    Hybrid Channel Allocation in Wireless Cellular Networks

    The enormous growth of mobile telephone traffic, along with the limited number of channels available, requires efficient reuse of channels. Channel allocation schemes can be divided into three categories: Fixed Channel Allocation (FCA), Dynamic Channel Allocation (DCA) and Hybrid Channel Allocation (HCA). In HCA, channels are divided into two disjoint...

    Provided By ISSN

  • White Papers // Nov 2012

    Signal Strength and Energy Aware Reliable Route Discovery in Manet

    Frequent changes in network topology and confined battery capacity of the mobile devices are the main challenges for routing in ad-hoc networks. In this paper, the authors propose a novel, Signal strength and Energy Aware routing protocol (SEA-DSR), which directly incorporates signal strength and residual battery capacity of nodes into...

    Provided By ISSN

  • White Papers // Nov 2012

    Cyber Security Solutions for DLMS Meters Using GSM/GPRS Technology

    The Smart meters are used in the areas of generation, transmission, distribution and consumption. The capabilities of smart meter systems and grid networks, such as distributed intelligence and broadband capabilities can greatly enhance efficiency and reliability, but they may also create much new vulnerability if not deployed with the appropriate...

    Provided By ISSN

  • White Papers // Nov 2012

    Communicating with an Energy Meter Using IEC 62056 Through TCP/IP Protocol

    Device Language Message Specification (DLMS) is an application layer protocol designed to support messaging to and from energy distribution devices in a computer integrated environment. COSEM, the COmpanion Specification for Energy Metering, addresses the meter as an integrated part of a commercial process, which starts with the measurement of the...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Chaos-Based Optimization Algorithm Approach for Cryptography

    The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications....

    Provided By ISSN

  • White Papers // Nov 2012

    Survey of Vehicle Ad-Hoc Network

    In car network enable the direct communication in ad-hoc network among the car and between the car and road side communication device. the ad hoc networking provides a spontaneous and direct communication of a car with other cars or with fixed road-side access points in its vicinity. The communication is...

    Provided By ISSN

  • White Papers // Nov 2011

    Intelligent Access Scheme Design for Mobile Cloud Computing

    Mobile Cloud Computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing a new level of security by a centralized maintenance of security critical software for...

    Provided By ISSN

  • White Papers // Mar 2012

    Mobile Multimedia Storage: A Mobile Cloud Computing Application and Analysis

    Cloud computing will vividly diminish the obligation/requirement of advanced/modern handsets for running mobile applications, according/conferring to the study. During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. In this paper, the authors present study and comparative analyses of...

    Provided By ISSN

  • White Papers // Apr 2013

    Mobile Cloud Computing: Approaches and Issues

    During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. Together with an explosive growth of the mobile computing and excellent promising technology of cloud computing concept, Mobile Cloud Computing (MCC) has been introduced to be a potential technology...

    Provided By ISSN

  • White Papers // Mar 2013

    Comparative Study Between Green Cloud Computing and Mobile Cloud Computing

    While searching for information about cloud computing over the internet, the author came across different computing keywords such as Green Computing and Mobile Computing. After so much of research on all these terms I myself tried to have the clear vision about them. This paper will help the researchers and...

    Provided By ISSN

  • White Papers // Feb 2012

    Survey on Mobile Cloud Computing

    The cloud heralds a new era of computing where application services are provided through the Internet. Cloud computing can enhance the computing capability of mobile systems, but is it the ultimate solution for extending such systems' battery lifetimes. Cloud computing promises to democratize parallel data processing by making large server...

    Provided By ISSN

  • White Papers // Jul 2012

    Security Issues and Their Solution in Cloud Computing

    Cloud computing is model which uses combine concept of "software-as-a-service" and "Utility computing", provide convenient and on-demand services to requested end users. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloud service consumer should...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing Issues and Benefits Modern Education

    Cloud computing, a rapidly developing information technology has brought new change & opportunities to IT industry and in the field of education. E-learning platform brings a brand new concept & is a kind of network information learning mode & also known as online learning to guide education. E-learning emphasizes on...

    Provided By ISSN

  • White Papers // Oct 2012

    Welcome To The Future of Computing: Cloud Computing And Legal Issues

    As the civilization enters into the new millennium, the words of 19th century have suddenly taken a new meaning. The world is undergoing a remarkable technological change. The advancement of Internet along with the expansion of IT infrastructure at large level has revolutionized the way in which information and communication...

    Provided By ISSN

  • White Papers // Mar 2013

    A Survey on Security Threats and Vulnerabilities In Cloud Computing

    Cloud computing is a distributed computing paradigm capable of providing agile IT services to individual users and organizations. Cloud computing is a technology which will facilitate companies or organizations to host their services without worrying about IT infrastructure and other supporting services. Cloud computing providers can build large data centers...

    Provided By ISSN

  • White Papers // Mar 2012

    Cloud Computing Security Issues with Possible Solutions

    Cloud computing gets its name from the drawings typically used to describe the Internet. It is a new consumption and delivery model for IT services. Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many security risks. In this paper, the...

    Provided By ISSN

  • White Papers // Mar 2013

    Effective Service Security Schemes In Cloud Computing

    The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on demand provisioning mechanism relying...

    Provided By ISSN

  • White Papers // Jun 2012

    Intrusion Tolerance: Enhancement of Safety in Cloud Computing

    Cloud computing is a recent computing model; provides consistent access to wide area distributed resources facing many problems as its usage increases. Enormous loss to both cloud clients as well as cloud service providers happen even with small intrusions. The protection and defense of cloud infrastructure against malicious attacks can...

    Provided By ISSN

  • White Papers // Jan 2013

    Security Threats to Cloud Computing

    Cloud computing offer a new and exciting way of computing with various service models that facilitates different services to the users. As all the data of an enterprise processed remotely and exchanges via different networks. Security is an essential parameter and the service provider must ensure that there is no...

    Provided By ISSN

  • White Papers // Mar 2013

    Survey on Resources Provisioning in Cloud Systems for Cost Benefits

    In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called...

    Provided By ISSN

  • White Papers // Oct 2012

    Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task Computing (MTC) Applications

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By ISSN

  • White Papers // Feb 2013

    The Policy as Repudiation Factors of Adopting Cloud Computing in University Administration

    Cloud computing (CC) technology can be described as the next generation of Information technology for companies, educational institutions and governmental agencies; which provides easy and affordable access to state of the art technology; IT, technological application and services. Due to the growing needs for Information Technology (IT) and the current...

    Provided By ISSN

  • White Papers // Mar 2012

    Demystifying Mobile Cloud Computing using Pandaboard

    Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. Mobile Cloud Computing (MCC) is simply cloud computing in which at least some of the devices involved are mobile. This paper goes over multiple techniques and...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Data Management Interface Based Storage Virtualization Mechanism for Cloud Computing

    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper, the authors have proposed...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Computing: Just Fancy Name for Virtualization

    Cloud computing is a technology that uses the internet and central remote server to maintain data and application. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. This technology allows for much more efficient computing by centralizing...

    Provided By ISSN

  • White Papers // Oct 2011

    Security Issues in Cloud Computing A Transparent View

    Cloud Computing is the next generation Architecture of the most IT enterprise. It made possible, the application to run without the burden of local hardware and software. It moved the data and the application software of the various enterprises to the centralized large data centre, where the security issue arises....

    Provided By ISSN

  • White Papers // Apr 2009

    Business Process Improvement in Organizational Design of e-Government Services

    This paper describes a business process and organizational re-design and implementation project for an e-government service organization. In this paper, the initial process execution time of a Virtual Private Network (VPN) connection request has been reduced from some 60 days to two days. This has been achieved by the use...

    Provided By ISSN

  • White Papers // Apr 2011

    A Study of Issues Affecting ERP Implementation in SMEs

    Companies implement ERP systems to integrate the business processes of a company, and help organizations obtain a competitive advantage. Enterprise Resource Planning (ERP) is one of the solutions for the Small and Medium Enterprises (SMEs) in order to face the global challenges. This is to explore and identify issues affecting...

    Provided By ISSN

  • White Papers // Aug 2012

    Implementation of ERP in Business Process Based On Cloud Computing

    Software as service is linked to the concept of cloud computing is a style of computing where information technologies enable business products, services and solutions as a service over the internet. The concept of SAS (Software As Service) is currently in very early stages of development. There are a lot...

    Provided By ISSN

  • White Papers // Nov 2012

    Forecasting Risk and Risk Consequences on ERP Maintenance

    There are many studies which show that a number of IT projects fail. If focus is made on costs, it is possible that 80% of overall IT investment is waste of money, in other words, 20 per cent benefits and 80 per cent waste. Great efforts are made to adopt...

    Provided By ISSN

  • White Papers // Mar 2013

    Business Process Modeling Notation

    Models as representations of real world entities may appear to the novice to be an unnecessary abstraction. Indeed, in small organizations where there are relatively few processes, there is little need to this paper activity. When it comes to large organizations, with hundreds or thousands of processes, the creation of...

    Provided By ISSN

  • White Papers // Jul 2013

    Prioritizing Competitive Strategies in Iranian SME's Based on AHP Approach in Severe Economic Sanctions

    Rapid and major changes in the current market environment emphasize on the necessity and importance of identifying, survey and prioritizing competitive strategies, and any organization which would go to a higher level than its clients' expectations and succeed in the business world has no other way except following such strategy....

    Provided By ISSN

  • White Papers // Feb 2011

    The SMEs Governance Mechanisms Practices and Financial Performance: Case of Tunisian Industrial SMEs

    Now-a-days, the issue of corporate governance occupies central paramount position among the preoccupations of the firms' decision-makers. Noteworthy, the relationship between governance and company performance is often stressed within the context of large companies and very few are those studies dealing with this subject as regard the Small and Medium...

    Provided By ISSN

  • White Papers // May 2012

    Latest Programming Language Tools for Business Process Modelling

    Business Process Modeling (BPM) in systems engineering and software engineering is the process in which various steps and activities of an enterprise are analyzed and improved. BPM is typically performed by business analysts and managers who are seeking to improve process efficiency and quality. The purpose of this paper is...

    Provided By ISSN

  • White Papers // Jun 2012

    FNet: An Index for Advanced Business Process Querying

    Now-a-days, more and more organizations describe their operations in terms of business processes. Consequently, it is common for organizations to have collections of hundreds or even thousands of business process models. This calls for techniques to quickly retrieve business process models that satisfy a given query. Some advanced techniques for...

    Provided By ISSN

  • White Papers // Feb 2013

    Business Process Reengineering by Rational Unified Process (RUP) Methodology

    Business Process Reengineering is a holistic approach that preparing and heading organizations for \"Change\". This method considers the business processes as the main issues for Reengineering. But a close examination of BPR project indicates that the main reason of its failure is its structure and way of implementation. This paper...

    Provided By ISSN

  • White Papers // Oct 2010

    Knowledge Services in Business Process Management: A New Way for Increasing of Productivity?

    This paper represent the appropriate software support for Process Management, and those tools which are used in a whole range of Czech and world-class manufacturing production and non-manufacturing enterprises as well as in organizations and other public sector administration institutions. The innovation in the tuition process lies in the fact...

    Provided By ISSN

  • White Papers // Sep 2008

    Principles for Support of the Business Processes

    This paper describes basic components and principles for support of the normatively regulated organizational activities. These activities are characterized by precise objective or purpose, participation of actors as role-holders, and norms and rules that govern the performance of these activities. In order to perform normatively regulated activities efficiently and effectively,...

    Provided By ISSN

  • White Papers // Feb 2010

    Performance-Centric Business Activity Monitoring Framework for Continuous Process Improvement

    For better business performance or continuous process improvement of an enterprise, real-time measurement and analysis of the performance of managerial activities is essential. Business Activity Monitoring (BAM) which provides real-time access to key performance indicators or business processes is one of core elements for successful BPM system. Since performance measurement...

    Provided By ISSN

  • White Papers // Dec 2008

    Platform Support for an Intelligent Enterprise Business Management

    The platform IDEA assists all the specific processes of an enterprise, from the meat processing industry, to help decision makers to manage performances by implementing the concepts Business Performance Management (BPM) and Business Intelligence (BI). The platform transforms data into information and then into knowledge being focused on business, technological...

    Provided By ISSN

  • White Papers // Dec 2008

    Business Intelligence Systems: a Comparative Analysis

    Data warehouse is the central core of a Business Intelligence (BI) system and it is usually the most expensive component to manage. A set of evaluation criteria is described and considered for comparing some popular OLAP systems that support Business Intelligence. These criteria involve critical aspects such as: information delivery,...

    Provided By ISSN

  • White Papers // Feb 2009

    Business Process Measurement Model Based On the Fuzzy Multi Agent Systems

    The aim of this paper is to introduce a new model for measuring Business process based on the Fuzzy Multi Agent Systems. Some of features providing by this model are: simplicity of use enterprise look vision accuracy of measurement result focus on quantitative criteria to measure the performance of business,...

    Provided By ISSN

  • White Papers // Sep 2009

    The Power of Open Source ERP

    The paper presents a sustainable business model for open source software tools, managing and disseminating documents in heterogeneous software (source code files, database objects, graphical objects, text files) for concurrent economic applications. The paper motivates the utilization of open source models for the maintenance and adaptation of the application or...

    Provided By ISSN

  • White Papers // Jun 2008

    Multiagent Based Global Enterprise Resource Planning: Conceptual View

    In recent decade, the business of manufacturing and service organizations alike is strongly conditioned by unpredictable changes taking place in a global market. The question is how to provide efficient and cost-effective responses on time. Current systems such as Extended Enterprise Resource Planning (EERP) and Supply Chain Management (SCM) do...

    Provided By ISSN

  • White Papers // Jul 2012

    Implementation Benefit to Business Intelligence using Data Mining Techniques

    This paper is discussing data mining techniques and business operations areas includes marketing, finance, fraud detection, manufacturing, telecommunication to improve their business and found excellent results. A wide range of marketing companies requires the analysis of millions of shopping transaction records daily such as sales revenue by products to guide...

    Provided By ISSN

  • White Papers // May 2013

    Enterprise Architecture - A Tool for Business Innovation Realization in the Enterprise

    Enterprises globally are undergoing business transformation. Organizations and corporate world have been searching for ways to enhance their businesses in order to be agile and how development in Information Technology (IT) can help them achieve this in today's unstable economic climate. Large-scale changes in the business affect operations, which in...

    Provided By ISSN