ISSN

Displaying 1-40 of 127 results

  • White Papers // Jul 2013

    Prioritizing Competitive Strategies in Iranian SME's Based on AHP Approach in Severe Economic Sanctions

    Rapid and major changes in the current market environment emphasize on the necessity and importance of identifying, survey and prioritizing competitive strategies, and any organization which would go to a higher level than its clients' expectations and succeed in the business world has no other way except following such strategy....

    Provided By ISSN

  • White Papers // Jul 2013

    Transformation of Business Processes into UML Models: An SBVR Approach

    A business process is a set of activities that collectively perform and deliver a complex functionality. At a very early stage of software development, business semantics are discussed with stakeholders. A business analyst writes these semantics in his preferred language such as English. A software architect/manager understands them and creates...

    Provided By ISSN

  • White Papers // Jun 2013

    A Survey of Data Management System for Cloud Computing: Models and Searching Methods

    Cloud computing, as a new computing pattern having the capacity of sharing computing and storage, has been developed steadily and rapidly during recent years. It is selected by the famous scientific journal Technology Review published by MIT as one of the ten newly developed technologies which have changed the world....

    Provided By ISSN

  • White Papers // Jun 2013

    Review On: Design of Low Complexity LDPC Decoding Algorithm in LDPC Coded BICMOFDM Systems

    Digital Video Broadcasting-Terrestrial (DVB-T) is the most widely deployed digital terrestrial television system worldwide with services on air in over thirty countries. In order to increase its spectral efficiency and to enable new services the DVB consortium has developed a new standard named DVB-T2. Latest and next-generation wireless broadcasting standards,...

    Provided By ISSN

  • White Papers // Jun 2013

    Design of Cloud Computing Based ERP Model

    This ERP (Enterprise Resource Planning) is the information system about the management of the enterprise, which is developed on information technology and systematic management thinking, decision-making for businesses and employees to run the means to provide decision management platform, and it can integrate all resources of enterprise. The paper puts...

    Provided By ISSN

  • White Papers // May 2013

    Enterprise Architecture - A Tool for Business Innovation Realization in the Enterprise

    Enterprises globally are undergoing business transformation. Organizations and corporate world have been searching for ways to enhance their businesses in order to be agile and how development in Information Technology (IT) can help them achieve this in today's unstable economic climate. Large-scale changes in the business affect operations, which in...

    Provided By ISSN

  • White Papers // Apr 2013

    Multilayer Coding Mechanisms for Broadcasting over MIMO Networks

    In this paper, the authors first propose a design rule for constructing a proper multilayer code for Multiple-Input-Multiple-Output(MIMO) networks.. A number of recent source coding techniques compress the source signal into multiple layers such that a destination is able to reconstruct the original signal (with some distortion) even if it...

    Provided By ISSN

  • White Papers // Apr 2013

    CLOUD-SLA: Service Level Agreement for Cloud Computing

    In the last few years, the cloud computing becomes the most important developing platform for both scientific and commercial application. Clouds are rapidly becoming an important platform for scientific applications. In the Cloud environment with uncountable numeric nodes, resource is inevitably unreliable, which has a great effect on task execution...

    Provided By ISSN

  • White Papers // Apr 2013

    Mobile Cloud Computing: Approaches and Issues

    During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. Together with an explosive growth of the mobile computing and excellent promising technology of cloud computing concept, Mobile Cloud Computing (MCC) has been introduced to be a potential technology...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Data Management Interface Based Storage Virtualization Mechanism for Cloud Computing

    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper, the authors have proposed...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Computing: Just Fancy Name for Virtualization

    Cloud computing is a technology that uses the internet and central remote server to maintain data and application. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. This technology allows for much more efficient computing by centralizing...

    Provided By ISSN

  • White Papers // Mar 2013

    Effective Service Security Schemes In Cloud Computing

    The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on demand provisioning mechanism relying...

    Provided By ISSN

  • White Papers // Mar 2013

    Resource Security in the Cloud Computing

    Cloud computing has become nowadays a buzzword among IT and industry engineers. The cloud phenomenon is quickly growing towards becoming the de facto standard of computing, storage and hosting, both in industry and Internet. This paper presents analysis of security issues inside enterprise private clouds. The investigated security tools were:...

    Provided By ISSN

  • White Papers // Mar 2013

    Development of Optimized Resource Provisioning On-Demand Security Architecture for Secured Storage Services in Cloud Computing

    Cloud Computing makes it possible for providers to quickly deploy and scale services and obtain benefit from pay-by-use models under low cost, while users enjoy the flexibility of Internet-based computing services. Users find it difficult to fully trust cloud-based services because cloud-based data storage and protection methods are largely user...

    Provided By ISSN

  • White Papers // Mar 2013

    Comparative Study Between Green Cloud Computing and Mobile Cloud Computing

    While searching for information about cloud computing over the internet, the author came across different computing keywords such as Green Computing and Mobile Computing. After so much of research on all these terms I myself tried to have the clear vision about them. This paper will help the researchers and...

    Provided By ISSN

  • White Papers // Mar 2013

    Survey on Resources Provisioning in Cloud Systems for Cost Benefits

    In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called...

    Provided By ISSN

  • White Papers // Mar 2013

    DoubleGuard: Detecting & Preventing Intrusions in Multitier Web Applications

    Internet services and applications have become an indivisible part of the authors' daily life. These applications and services are made available through Web Servers and they make use of Database, Servers for fulfillment of user's request. Both of these servers are prone to attacks. DoubleGuard provides Intrusion Prevention Systems at...

    Provided By ISSN

  • White Papers // Mar 2013

    A Survey on Security Threats and Vulnerabilities In Cloud Computing

    Cloud computing is a distributed computing paradigm capable of providing agile IT services to individual users and organizations. Cloud computing is a technology which will facilitate companies or organizations to host their services without worrying about IT infrastructure and other supporting services. Cloud computing providers can build large data centers...

    Provided By ISSN

  • White Papers // Mar 2013

    Business Process Modeling Notation

    Models as representations of real world entities may appear to the novice to be an unnecessary abstraction. Indeed, in small organizations where there are relatively few processes, there is little need to this paper activity. When it comes to large organizations, with hundreds or thousands of processes, the creation of...

    Provided By ISSN

  • White Papers // Feb 2013

    The Policy as Repudiation Factors of Adopting Cloud Computing in University Administration

    Cloud computing (CC) technology can be described as the next generation of Information technology for companies, educational institutions and governmental agencies; which provides easy and affordable access to state of the art technology; IT, technological application and services. Due to the growing needs for Information Technology (IT) and the current...

    Provided By ISSN

  • White Papers // Feb 2013

    Information Technology - Its Impact on Global Management

    21st century is the century of Information Technology (IT) and globalization. Information technology is playing its significant role in the betterment of the organizations. This paper explores another very important role of IT on global management i.e., IT helps to redefine the vision of global corporations which is the primary...

    Provided By ISSN

  • White Papers // Feb 2013

    Business Process Reengineering by Rational Unified Process (RUP) Methodology

    Business Process Reengineering is a holistic approach that preparing and heading organizations for \"Change\". This method considers the business processes as the main issues for Reengineering. But a close examination of BPR project indicates that the main reason of its failure is its structure and way of implementation. This paper...

    Provided By ISSN

  • White Papers // Feb 2013

    An Elementary Review of Linkages & Gaps Among BPR, SOA & Software Reverse Engineering

    Research on Business Process Reengineering has started as an effort in proposing methods and techniques for organizational restructuring in order to increase organizational efficiency and effectiveness. Later on researchers and consultants started using the tools of IT as part of BPR processes and ultimately they started to develop IT based...

    Provided By ISSN

  • White Papers // Feb 2013

    Critical Success Factors for Six Sigma Implementation by SMEs

    Six Sigma is a business strategy that enables organizations to increase their profits by optimizing their operations, improving quality and eliminating defects. Six Sigma is a business strategy for improving the bottom line of the businesses. In recent times the small and medium size enterprises also have started adopting the...

    Provided By ISSN

  • White Papers // Jan 2013

    Security Threats to Cloud Computing

    Cloud computing offer a new and exciting way of computing with various service models that facilitates different services to the users. As all the data of an enterprise processed remotely and exchanges via different networks. Security is an essential parameter and the service provider must ensure that there is no...

    Provided By ISSN

  • White Papers // Jan 2013

    A Novel Data Gathering Scheme for Monitoring-Oriented Wireless Sensor Networks

    Wireless sensor networks have great potential as a means of realizing a wide range of applications, such as natural environmental monitoring, environmental control in residential spaces or plants, and object tracking. As a frame to actualize these sensor applications, this paper assumes a monitoring-oriented wireless sensor network, which periodically gathers...

    Provided By ISSN

  • White Papers // Jan 2013

    Research on Objective Sorting Algorithm of Geo Communication Satellite Based on Fuzzy Theory

    GEO (Geostationary Earth Orbit) communication satellites are important guarantee for the war. The authors should research the sorting for attack if they want to win the war. Performance parameters of GEO communication satellites are analyzed, and definitions of threat index are established. Subsequently, objective sorting algorithm of GEO communication satellites...

    Provided By ISSN

  • White Papers // Dec 2012

    Cellular Learning Automata Approach for Data Classification

    Data classification is a process that can categorize data to achieve the relationship between attributes and extract the suitable rules for prediction process. There are different learning methods in machine learning of which each has both advantages and disadvantages. In this paper, it will present a new method for data...

    Provided By ISSN

  • White Papers // Dec 2012

    Optimized Resource in Satellite Network Based on Genetic Algorithm

    Satellite network is an all-around network which has high-complexity, dynamic and enormous, and its resources are very limited. So, the authors have to optimize the resources on satellite network. This paper has studied the resources optimization for task in the satellite network. They established the flow chart and mathematical model...

    Provided By ISSN

  • White Papers // Nov 2012

    Search Engines Using Evolutionary Algorithms

    Evolutionary Algorithm (EA) which involves evolutionary computation, a generic population based meta heuristic optimization algorithm. An EA uses some mechanisms inspired by biological evolution: reproduction, mutation, recombination, and selection. A Genetic Algorithm (GA) is a search technique used in computing to find exact or approximate solutions to optimization and search...

    Provided By ISSN

  • White Papers // Nov 2012

    ACP Based Anonymous Secure Group Communication

    Anonymous secure group communication is a new research and application paradigm. In this paper Anonymity between two-party communication, Access control polynomial to multi-part group communication, group key management for secure group communication and secure set concepts has been proposed. Newly extended scheme enforces Anonymous group membership, group size, Anonymous group...

    Provided By ISSN

  • White Papers // Nov 2012

    A Survey on Vehicular Mobility Modeling: Flow Modeling

    Motion or movement patterns of vehicles communicating wirelessly play an important role in the simulation based evaluation of Vehicular Ad-hoc NETworks (VANETs). It is to know that recent research about mobility modeling has given direction for vehicular network study still to obtain realistic behavior of vehicles; developments in this area...

    Provided By ISSN

  • White Papers // Nov 2012

    Zero Knowledge Password Authentication Protocol

    In many applications, the password is sent as clear text to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has...

    Provided By ISSN

  • White Papers // Nov 2012

    A New Approach for Instigating Security Using Single Zoom Mouse Click Graphical Password

    Due to growing hazards to networked computer system, there is great need for security innovations. Authentication is the process of security to information. User authentication is one of the significant topics in information security. Commonly used authentication is alphanumeric passwords, biometrics and smart card. At present day upcoming popular method...

    Provided By ISSN

  • White Papers // Nov 2012

    Efficient Probe Station Placement and Probe Set Selection for Fault Localization

    Network fault management has been a focus of research activity with more emphasis on fault localization - zero down exact source of a failure from set of observed failures. Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and...

    Provided By ISSN

  • White Papers // Nov 2012

    Hybrid Channel Allocation in Wireless Cellular Networks

    The enormous growth of mobile telephone traffic, along with the limited number of channels available, requires efficient reuse of channels. Channel allocation schemes can be divided into three categories: Fixed Channel Allocation (FCA), Dynamic Channel Allocation (DCA) and Hybrid Channel Allocation (HCA). In HCA, channels are divided into two disjoint...

    Provided By ISSN

  • White Papers // Nov 2012

    Signal Strength and Energy Aware Reliable Route Discovery in Manet

    Frequent changes in network topology and confined battery capacity of the mobile devices are the main challenges for routing in ad-hoc networks. In this paper, the authors propose a novel, Signal strength and Energy Aware routing protocol (SEA-DSR), which directly incorporates signal strength and residual battery capacity of nodes into...

    Provided By ISSN

  • White Papers // Nov 2012

    Cyber Security Solutions for DLMS Meters Using GSM/GPRS Technology

    The Smart meters are used in the areas of generation, transmission, distribution and consumption. The capabilities of smart meter systems and grid networks, such as distributed intelligence and broadband capabilities can greatly enhance efficiency and reliability, but they may also create much new vulnerability if not deployed with the appropriate...

    Provided By ISSN

  • White Papers // Nov 2012

    Communicating with an Energy Meter Using IEC 62056 Through TCP/IP Protocol

    Device Language Message Specification (DLMS) is an application layer protocol designed to support messaging to and from energy distribution devices in a computer integrated environment. COSEM, the COmpanion Specification for Energy Metering, addresses the meter as an integrated part of a commercial process, which starts with the measurement of the...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Chaos-Based Optimization Algorithm Approach for Cryptography

    The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications....

    Provided By ISSN

  • White Papers // Jul 2010

    Cloud Computing: The Emerging Computing Technology

    Cloud computing is a style of computing where massively scalable IT-enabled capabilities are provided as a service over the network. It emerges as a new computing paradigm to support the maximum number of users and elastic services with the minimum resource. The evolution of Cloud computing can handle massive data...

    Provided By ISSN

  • White Papers // Nov 2012

    Search Engines Using Evolutionary Algorithms

    Evolutionary Algorithm (EA) which involves evolutionary computation, a generic population based meta heuristic optimization algorithm. An EA uses some mechanisms inspired by biological evolution: reproduction, mutation, recombination, and selection. A Genetic Algorithm (GA) is a search technique used in computing to find exact or approximate solutions to optimization and search...

    Provided By ISSN

  • White Papers // Nov 2012

    ACP Based Anonymous Secure Group Communication

    Anonymous secure group communication is a new research and application paradigm. In this paper Anonymity between two-party communication, Access control polynomial to multi-part group communication, group key management for secure group communication and secure set concepts has been proposed. Newly extended scheme enforces Anonymous group membership, group size, Anonymous group...

    Provided By ISSN

  • White Papers // Nov 2012

    A Survey on Vehicular Mobility Modeling: Flow Modeling

    Motion or movement patterns of vehicles communicating wirelessly play an important role in the simulation based evaluation of Vehicular Ad-hoc NETworks (VANETs). It is to know that recent research about mobility modeling has given direction for vehicular network study still to obtain realistic behavior of vehicles; developments in this area...

    Provided By ISSN

  • White Papers // Nov 2012

    Zero Knowledge Password Authentication Protocol

    In many applications, the password is sent as clear text to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has...

    Provided By ISSN

  • White Papers // Nov 2012

    A New Approach for Instigating Security Using Single Zoom Mouse Click Graphical Password

    Due to growing hazards to networked computer system, there is great need for security innovations. Authentication is the process of security to information. User authentication is one of the significant topics in information security. Commonly used authentication is alphanumeric passwords, biometrics and smart card. At present day upcoming popular method...

    Provided By ISSN

  • White Papers // Nov 2012

    Efficient Probe Station Placement and Probe Set Selection for Fault Localization

    Network fault management has been a focus of research activity with more emphasis on fault localization - zero down exact source of a failure from set of observed failures. Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and...

    Provided By ISSN

  • White Papers // Nov 2012

    Hybrid Channel Allocation in Wireless Cellular Networks

    The enormous growth of mobile telephone traffic, along with the limited number of channels available, requires efficient reuse of channels. Channel allocation schemes can be divided into three categories: Fixed Channel Allocation (FCA), Dynamic Channel Allocation (DCA) and Hybrid Channel Allocation (HCA). In HCA, channels are divided into two disjoint...

    Provided By ISSN

  • White Papers // Nov 2012

    Signal Strength and Energy Aware Reliable Route Discovery in Manet

    Frequent changes in network topology and confined battery capacity of the mobile devices are the main challenges for routing in ad-hoc networks. In this paper, the authors propose a novel, Signal strength and Energy Aware routing protocol (SEA-DSR), which directly incorporates signal strength and residual battery capacity of nodes into...

    Provided By ISSN

  • White Papers // Nov 2012

    Cyber Security Solutions for DLMS Meters Using GSM/GPRS Technology

    The Smart meters are used in the areas of generation, transmission, distribution and consumption. The capabilities of smart meter systems and grid networks, such as distributed intelligence and broadband capabilities can greatly enhance efficiency and reliability, but they may also create much new vulnerability if not deployed with the appropriate...

    Provided By ISSN

  • White Papers // Nov 2012

    Communicating with an Energy Meter Using IEC 62056 Through TCP/IP Protocol

    Device Language Message Specification (DLMS) is an application layer protocol designed to support messaging to and from energy distribution devices in a computer integrated environment. COSEM, the COmpanion Specification for Energy Metering, addresses the meter as an integrated part of a commercial process, which starts with the measurement of the...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Chaos-Based Optimization Algorithm Approach for Cryptography

    The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications....

    Provided By ISSN

  • White Papers // Nov 2012

    Survey of Vehicle Ad-Hoc Network

    In car network enable the direct communication in ad-hoc network among the car and between the car and road side communication device. the ad hoc networking provides a spontaneous and direct communication of a car with other cars or with fixed road-side access points in its vicinity. The communication is...

    Provided By ISSN

  • White Papers // Oct 2012

    An Indiscernibility Approach for Pre Processing of Web Log Files

    World Wide Web has a spectacular growth not only in terms of the number of websites and volume of information, but also in terms of the number of visitors. Web log files contain tremendous information about the user traffic and behavior. A large amount of pre-processing is required for eliminating...

    Provided By ISSN

  • White Papers // Oct 2012

    Price Demand Model for a Cloud Cache

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By ISSN

  • White Papers // Oct 2012

    Three Tier Data Storage Security in Cloud Using Face Fuzzy Vault

    The well-known buzzword, says Cloud Computing, attracts the attention from both academy and industry across the world, because of its potential in achieving the long-held dream, says utility computing and opens a new era for new spawned companies to provide services above this new concept. At the same time hackers...

    Provided By ISSN

  • White Papers // Oct 2012

    Private Searching on Encrypted Cloud Data

    Cloud computing provides services like software, computation and storage services for which end-user need not worry about knowledge of the physical location and configuration of the system that delivers the services. Data leakage is a major problem in cloud computing and the privacy of user is under serious threat. The...

    Provided By ISSN

  • White Papers // Oct 2012

    Enhancement for Data Security in Cloud Computing Environment

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By ISSN

  • White Papers // Nov 2012

    Design and Development of Arm Based Embedded Intelligent Public Transport Vehicle Position System

    With ARM7 as the core, this paper discusses a kind of design of vehicle location system. The new mobile vehicle positioning architecture and working theory of this system is integrated by a lot of hardware modules such as ARM microprocessor LPC2129 as a control unit to combinative with GPS LR9548...

    Provided By ISSN

  • White Papers // Oct 2012

    Identification and Listing of Factors Affecting Software Quality Assurance

    Software quality assurance as per IEEE is a "Planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements". A set of activities designed to evaluate the process by which the products are developed or manufactured. IEEE Standard 12207...

    Provided By ISSN

  • White Papers // Dec 2011

    Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment

    Actually Information security becomes a very important part for the organization's intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, the authors need a standard or benchmark which regulates...

    Provided By ISSN

  • White Papers // Apr 2011

    An Adaptive Technique Using Advanced Encryption Standard to Implement Hard Disk Security

    This paper is to explain and develop an efficient method for Hard Disk Drive (HDD) Security using Full Disk Encryption (FDE) with Advanced Encryption Standards (AES) for data security specifically for Personal Computers (PCS) and Laptops. The focus of this work is to authenticate and protect the content of HDD...

    Provided By ISSN

  • White Papers // Jan 2012

    A General Approach for Securely Querying and Updating XML Data

    Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A few amount of works have studied the access rights for updates. In this paper, the authors present a general model for specifying access control on XML...

    Provided By ISSN

  • White Papers // Dec 2011

    Security Survey of Internet Browsers Data Managers

    The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data....

    Provided By ISSN

  • White Papers // Dec 2009

    A Study of CAPTCHAs for Securing Web Services

    Atomizing various Web activities by replacing human to human interactions on the Internet has been made indispensable due to its enormous growth. However, bots also known as Web-bots which have a malicious intend and pretending to be humans pose a severe threat to various services on the Internet that implicitly...

    Provided By ISSN

  • White Papers // Dec 2011

    Secure Querying of Recursive XML Views: A Standard XPath-Based Technique

    Most state-of-the art approaches for securing XML documents allow users to access data only through authorized views defined by annotating an XML grammar (e.g. DTD) with a collection of XPath expressions. To prevent improper disclosure of confidential information, user queries posed on these views need to be rewritten into equivalent...

    Provided By ISSN

  • White Papers // Apr 2011

    A Study of Issues Affecting ERP Implementation in SMEs

    Companies implement ERP systems to integrate the business processes of a company, and help organizations obtain a competitive advantage. Enterprise Resource Planning (ERP) is one of the solutions for the Small and Medium Enterprises (SMEs) in order to face the global challenges. This is to explore and identify issues affecting...

    Provided By ISSN

  • White Papers // Jul 2013

    Prioritizing Competitive Strategies in Iranian SME's Based on AHP Approach in Severe Economic Sanctions

    Rapid and major changes in the current market environment emphasize on the necessity and importance of identifying, survey and prioritizing competitive strategies, and any organization which would go to a higher level than its clients' expectations and succeed in the business world has no other way except following such strategy....

    Provided By ISSN

  • White Papers // Feb 2011

    The SMEs Governance Mechanisms Practices and Financial Performance: Case of Tunisian Industrial SMEs

    Now-a-days, the issue of corporate governance occupies central paramount position among the preoccupations of the firms' decision-makers. Noteworthy, the relationship between governance and company performance is often stressed within the context of large companies and very few are those studies dealing with this subject as regard the Small and Medium...

    Provided By ISSN

  • White Papers // Jun 2012

    FNet: An Index for Advanced Business Process Querying

    Now-a-days, more and more organizations describe their operations in terms of business processes. Consequently, it is common for organizations to have collections of hundreds or even thousands of business process models. This calls for techniques to quickly retrieve business process models that satisfy a given query. Some advanced techniques for...

    Provided By ISSN

  • White Papers // May 2012

    Latest Programming Language Tools for Business Process Modelling

    Business Process Modeling (BPM) in systems engineering and software engineering is the process in which various steps and activities of an enterprise are analyzed and improved. BPM is typically performed by business analysts and managers who are seeking to improve process efficiency and quality. The purpose of this paper is...

    Provided By ISSN

  • White Papers // Jul 2012

    Semantic Business Intelligence - a New Generation of Business Intelligence

    Business Intelligence Solutions represents applications used by companies to manage process and analyze data to provide substantiated decision. In the paper of Semantic Web development trend is to integrate semantic unstructured data, making business intelligence solutions to be redesigned in such a manner that can analyze, process and synthesize, in...

    Provided By ISSN

  • White Papers // Jun 2013

    Design of Cloud Computing Based ERP Model

    This ERP (Enterprise Resource Planning) is the information system about the management of the enterprise, which is developed on information technology and systematic management thinking, decision-making for businesses and employees to run the means to provide decision management platform, and it can integrate all resources of enterprise. The paper puts...

    Provided By ISSN

  • White Papers // Nov 2007

    Components of a Business Intelligence Software Solution

    Business Intelligence (BI) is a business management term which refers to applications and technologies which are used to gather, provide access to, and analyze data and information about company operations. Business intelligence systems can help companies have a more comprehensive knowledge of the factors affecting their business, such as metrics...

    Provided By ISSN

  • White Papers // Mar 2009

    Business Process Management Integration Solution in Financial Sector

    It is vital for financial services companies to ensure the rapid implementation of new processes to meet speed-to-market, service quality and compliance requirements. This has to be done against a background of increased complexity. An integrated approach to business processes allows products, processes, systems, data and the applications that underpin...

    Provided By ISSN

  • White Papers // Mar 2013

    Development of Optimized Resource Provisioning On-Demand Security Architecture for Secured Storage Services in Cloud Computing

    Cloud Computing makes it possible for providers to quickly deploy and scale services and obtain benefit from pay-by-use models under low cost, while users enjoy the flexibility of Internet-based computing services. Users find it difficult to fully trust cloud-based services because cloud-based data storage and protection methods are largely user...

    Provided By ISSN

  • White Papers // Apr 2013

    CLOUD-SLA: Service Level Agreement for Cloud Computing

    In the last few years, the cloud computing becomes the most important developing platform for both scientific and commercial application. Clouds are rapidly becoming an important platform for scientific applications. In the Cloud environment with uncountable numeric nodes, resource is inevitably unreliable, which has a great effect on task execution...

    Provided By ISSN

  • White Papers // Nov 2011

    Intelligent Access Scheme Design for Mobile Cloud Computing

    Mobile Cloud Computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing a new level of security by a centralized maintenance of security critical software for...

    Provided By ISSN

  • White Papers // Mar 2012

    Mobile Multimedia Storage: A Mobile Cloud Computing Application and Analysis

    Cloud computing will vividly diminish the obligation/requirement of advanced/modern handsets for running mobile applications, according/conferring to the study. During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. In this paper, the authors present study and comparative analyses of...

    Provided By ISSN

  • White Papers // Apr 2013

    Mobile Cloud Computing: Approaches and Issues

    During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. Together with an explosive growth of the mobile computing and excellent promising technology of cloud computing concept, Mobile Cloud Computing (MCC) has been introduced to be a potential technology...

    Provided By ISSN