ISSN

Displaying 41-80 of 129 results

  • White Papers // Nov 2012

    Survey of Vehicle Ad-Hoc Network

    In car network enable the direct communication in ad-hoc network among the car and between the car and road side communication device. the ad hoc networking provides a spontaneous and direct communication of a car with other cars or with fixed road-side access points in its vicinity. The communication is...

    Provided By ISSN

  • White Papers // Nov 2012

    Design and Development of Arm Based Embedded Intelligent Public Transport Vehicle Position System

    With ARM7 as the core, this paper discusses a kind of design of vehicle location system. The new mobile vehicle positioning architecture and working theory of this system is integrated by a lot of hardware modules such as ARM microprocessor LPC2129 as a control unit to combinative with GPS LR9548...

    Provided By ISSN

  • White Papers // Nov 2012

    Forecasting Risk and Risk Consequences on ERP Maintenance

    There are many studies which show that a number of IT projects fail. If focus is made on costs, it is possible that 80% of overall IT investment is waste of money, in other words, 20 per cent benefits and 80 per cent waste. Great efforts are made to adopt...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Sealed-Bid Auction Protocol with Bid Privacy and Bidder Privacy

    In this paper, a sealed-bid auction protocol which mainly focuses on security issues: bid privacy, bidder anonymity and fairness problem is presented. The new proposal is motivated by the conflict between bidder anonymity and DOS (Denial-Of-Service) attack from insider. It utilizes an efficient LPN-based authentication method to accomplish lightweight authentication....

    Provided By ISSN

  • White Papers // Nov 2012

    Technical Issues and Challenges of Biometric Applications as Access Control Tools of Information Security

    Recent advances in biometric technologies coupled with the increased threats in information security has proliferated the applications of biometric systems to safe-guard information and its supporting processes, systems and infrastructures. This paper discusses the technical issues and challenges faced by biometric technologies within the physical and logical access control applications...

    Provided By ISSN

  • White Papers // Nov 2012

    Privacy-Preserving Authentication Using Fingerprint

    Biometrics provides the user with an effective tool for authentication and is becoming a strong competitor in current authentication mechanisms. However, the concerns about biometrics regarding template security, privacy and revocability impede its further application to network-based scenarios. The authors propose a novel fingerprint minutiae-based scheme to achieve reliable mutual...

    Provided By ISSN

  • White Papers // Oct 2012

    Three Tier Data Storage Security in Cloud Using Face Fuzzy Vault

    The well-known buzzword, says Cloud Computing, attracts the attention from both academy and industry across the world, because of its potential in achieving the long-held dream, says utility computing and opens a new era for new spawned companies to provide services above this new concept. At the same time hackers...

    Provided By ISSN

  • White Papers // Oct 2012

    Private Searching on Encrypted Cloud Data

    Cloud computing provides services like software, computation and storage services for which end-user need not worry about knowledge of the physical location and configuration of the system that delivers the services. Data leakage is a major problem in cloud computing and the privacy of user is under serious threat. The...

    Provided By ISSN

  • White Papers // Oct 2012

    Enhancement for Data Security in Cloud Computing Environment

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By ISSN

  • White Papers // Oct 2012

    Identification and Listing of Factors Affecting Software Quality Assurance

    Software quality assurance as per IEEE is a "Planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements". A set of activities designed to evaluate the process by which the products are developed or manufactured. IEEE Standard 12207...

    Provided By ISSN

  • White Papers // Oct 2012

    An Indiscernibility Approach for Pre Processing of Web Log Files

    World Wide Web has a spectacular growth not only in terms of the number of websites and volume of information, but also in terms of the number of visitors. Web log files contain tremendous information about the user traffic and behavior. A large amount of pre-processing is required for eliminating...

    Provided By ISSN

  • White Papers // Oct 2012

    Price Demand Model for a Cloud Cache

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By ISSN

  • White Papers // Oct 2012

    An Optimized Conflict-Free Replicated Set

    Eventual consistency of replicated data supports concurrent updates, reduces latency and improves fault tolerance, but forgoes strong consistency. Accordingly, several cloud computing platforms implement eventually-consistent data types. The set is a widespread and useful abstraction, and many replicated set designs have been proposed. The authors present a reasoning abstraction, permutation...

    Provided By ISSN

  • White Papers // Oct 2012

    Scheduling Tree-Shaped Task Graphs to Minimize Memory and Makespan

    This paper investigates the execution of tree-shaped task graphs using multiple processors. Each edge of such a tree represents a large IO file. A task can only be executed if all input and output files fit into memory, and a file can only be removed from memory after it has...

    Provided By ISSN

  • White Papers // Oct 2012

    Network Virtualization via Cloud Computing and its Security Issues

    Cloud is a concept of updating of resources without affecting the infrastructure to reduce the need of backup system and encourage the continuous execution of application. Cloud provides potential "Reliability" and "Scalability" for the applications either deployed or running on cloud. Cloud computing is offering utility oriented IT services to...

    Provided By ISSN

  • White Papers // Oct 2012

    Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task Computing (MTC) Applications

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By ISSN

  • White Papers // Oct 2012

    Welcome To The Future of Computing: Cloud Computing And Legal Issues

    As the civilization enters into the new millennium, the words of 19th century have suddenly taken a new meaning. The world is undergoing a remarkable technological change. The advancement of Internet along with the expansion of IT infrastructure at large level has revolutionized the way in which information and communication...

    Provided By ISSN

  • White Papers // Sep 2012

    Business Process Modeling for Web and Semantic Web

    BPM is one of the key technologies to benefit enterprise with higher efficiency and greater business values. Business process modeling is a discipline combining software Compatibilities and business expertise to enable process improvement and facilitate business innovation. BPM is generally a starting of business process management life cycle. Business Process...

    Provided By ISSN

  • White Papers // Aug 2012

    The Distributed Computing Paradigms: P2P, Grid, Cluster, Cloud, and Jungle

    The distributed computing is done on many systems to solve a large scale problem. The growing of high-speed broadband networks in developed and developing countries, the continual increase in computing power, and the rapid growth of the Internet have changed the way. In it the society manages information and information...

    Provided By ISSN

  • White Papers // Aug 2012

    Implementation of ERP in Business Process Based On Cloud Computing

    Software as service is linked to the concept of cloud computing is a style of computing where information technologies enable business products, services and solutions as a service over the internet. The concept of SAS (Software As Service) is currently in very early stages of development. There are a lot...

    Provided By ISSN

  • White Papers // Aug 2012

    Performance Comparison of Turbo Codes with other Forward Error Correcting Codes

    In this paper, the authors compare performance of turbo codes with different FEC codes presented in literatures. Performance and overall coding gain are compared for Convolutional codes, CTC, TPC and LDPC codes. Turbo Codes tend to work best at low code rates and not so well at high code rates....

    Provided By ISSN

  • White Papers // Aug 2012

    Implementation of Deming's Philosophy in a Construction Company: OPCO Limited - Wales Experience

    This paper describes how a Wales based construction company improves its operations, achieves quality standards and manages the overall business improvement through the implementation of Deming's philosophy. The paper describes, initially how the principles are applied within the organization successfully, how they helped in managing business processes and change, it...

    Provided By ISSN

  • White Papers // Aug 2012

    Towards a Business Process Reengineering Model for Managing the SMEs Information Technology Resources

    Now-a-days, most companies usually become aware of the problems regarding the implementation of business processes for managing IT resources. In such circumstances managers usually obtain a new integration of other models for enhancing the business and information processes according to the changed business needs. In the modern business practice, identifying...

    Provided By ISSN

  • White Papers // Jul 2012

    Implementation Benefit to Business Intelligence using Data Mining Techniques

    This paper is discussing data mining techniques and business operations areas includes marketing, finance, fraud detection, manufacturing, telecommunication to improve their business and found excellent results. A wide range of marketing companies requires the analysis of millions of shopping transaction records daily such as sales revenue by products to guide...

    Provided By ISSN

  • White Papers // Jul 2012

    Security Issues and Their Solution in Cloud Computing

    Cloud computing is model which uses combine concept of "software-as-a-service" and "Utility computing", provide convenient and on-demand services to requested end users. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloud service consumer should...

    Provided By ISSN

  • White Papers // Jul 2012

    Semantic Business Intelligence - a New Generation of Business Intelligence

    Business Intelligence Solutions represents applications used by companies to manage process and analyze data to provide substantiated decision. In the paper of Semantic Web development trend is to integrate semantic unstructured data, making business intelligence solutions to be redesigned in such a manner that can analyze, process and synthesize, in...

    Provided By ISSN

  • White Papers // Jul 2012

    Intruder Deducibility Constraints with Negation. Decidability and Application to Secured Service Compositions

    The problem of finding a mediator to compose secured services has been reduced in users' former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. The authors extend in this paper the mediator synthesis procedure by a construction for expressing that some data...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing: Towards Case Study of Data Security Mechanism

    Pick up any magazine or visit almost any IT website or blog, user will be sure to see talk about Cloud Computing. The only problem is that not everyone agrees on what it is exactly. Every individual has different views, but still there is a growing trend of using cloud...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing Issues and Benefits Modern Education

    Cloud computing, a rapidly developing information technology has brought new change & opportunities to IT industry and in the field of education. E-learning platform brings a brand new concept & is a kind of network information learning mode & also known as online learning to guide education. E-learning emphasizes on...

    Provided By ISSN

  • White Papers // Jun 2012

    Business Process Reengineering (BPR): Strategic Choice

    This paper reviews the Business Process Reengineering (BPR) vision of radical business process change, focusing upon the use of information technology, to facilitate a shift away from linear work organization towards parallel processing and multidisciplinary team working. To approach such a change, by focusing on the technologies aspect to the...

    Provided By ISSN

  • White Papers // Jun 2012

    FNet: An Index for Advanced Business Process Querying

    Now-a-days, more and more organizations describe their operations in terms of business processes. Consequently, it is common for organizations to have collections of hundreds or even thousands of business process models. This calls for techniques to quickly retrieve business process models that satisfy a given query. Some advanced techniques for...

    Provided By ISSN

  • White Papers // Jun 2012

    Intrusion Tolerance: Enhancement of Safety in Cloud Computing

    Cloud computing is a recent computing model; provides consistent access to wide area distributed resources facing many problems as its usage increases. Enormous loss to both cloud clients as well as cloud service providers happen even with small intrusions. The protection and defense of cloud infrastructure against malicious attacks can...

    Provided By ISSN

  • White Papers // May 2012

    Latest Programming Language Tools for Business Process Modelling

    Business Process Modeling (BPM) in systems engineering and software engineering is the process in which various steps and activities of an enterprise are analyzed and improved. BPM is typically performed by business analysts and managers who are seeking to improve process efficiency and quality. The purpose of this paper is...

    Provided By ISSN

  • White Papers // May 2012

    Design and Analysis of Location Control for Mobile Agent in Mobile Information Systems

    Retrieval of data using mobile agents has gained popularity, due to the advancements in mobile computing techniques. However, the transmission of wireless communication is still unreliable and bandwidth-limited. This paper investigates this issue and tries to find the most suitable location for a mobile agent in a vast network. The...

    Provided By ISSN

  • White Papers // Apr 2012

    Potential of Cloud Computing as a Catalyst for Growth of SMB's

    Technology has always been connected with words like \"Revolution\" & \"Change\". It has never given a chance for anything to become outdated. The needs of the users have always been satisfied with the rapid increase in the revolution of technology. \"Cloud Computing\" the new buzz in the IT Industry that...

    Provided By ISSN

  • White Papers // Mar 2012

    A Generalized Likelihood Ratio Test for a Fault-Tolerant Control System

    In this paper, the authors deal with the problem of diagnosis of multiple sequential faults using statistical test GLR. Based on the work of Willsky and Jones [50], they propose a modified Generalized Likelihood Ratio (GLR) test, allowing detection, isolation and estimation of multiple sequential faults. Their contribution aims to...

    Provided By ISSN

  • White Papers // Mar 2012

    Mobile Multimedia Storage: A Mobile Cloud Computing Application and Analysis

    Cloud computing will vividly diminish the obligation/requirement of advanced/modern handsets for running mobile applications, according/conferring to the study. During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. In this paper, the authors present study and comparative analyses of...

    Provided By ISSN

  • White Papers // Mar 2012

    Modeling and Simulation of Channel for Underwater Communication Network

    According to the characteristics of underwater acoustic channel, Thorp experience formula is adopted in order to simulate seawater absorption properties, on the basis of which, the path loss is solved by means of simulation. A Wenz model is also improved so as to approach the noise model of underwater acoustic...

    Provided By ISSN

  • White Papers // Mar 2012

    Demystifying Mobile Cloud Computing using Pandaboard

    Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. Mobile Cloud Computing (MCC) is simply cloud computing in which at least some of the devices involved are mobile. This paper goes over multiple techniques and...

    Provided By ISSN

  • White Papers // Mar 2012

    Cloud Computing Security Issues with Possible Solutions

    Cloud computing gets its name from the drawings typically used to describe the Internet. It is a new consumption and delivery model for IT services. Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many security risks. In this paper, the...

    Provided By ISSN

  • White Papers // Apr 2011

    An Adaptive Technique Using Advanced Encryption Standard to Implement Hard Disk Security

    This paper is to explain and develop an efficient method for Hard Disk Drive (HDD) Security using Full Disk Encryption (FDE) with Advanced Encryption Standards (AES) for data security specifically for Personal Computers (PCS) and Laptops. The focus of this work is to authenticate and protect the content of HDD...

    Provided By ISSN

  • White Papers // Oct 2012

    Three Tier Data Storage Security in Cloud Using Face Fuzzy Vault

    The well-known buzzword, says Cloud Computing, attracts the attention from both academy and industry across the world, because of its potential in achieving the long-held dream, says utility computing and opens a new era for new spawned companies to provide services above this new concept. At the same time hackers...

    Provided By ISSN

  • White Papers // Oct 2012

    Private Searching on Encrypted Cloud Data

    Cloud computing provides services like software, computation and storage services for which end-user need not worry about knowledge of the physical location and configuration of the system that delivers the services. Data leakage is a major problem in cloud computing and the privacy of user is under serious threat. The...

    Provided By ISSN

  • White Papers // Oct 2012

    Enhancement for Data Security in Cloud Computing Environment

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By ISSN

  • White Papers // Nov 2012

    Design and Development of Arm Based Embedded Intelligent Public Transport Vehicle Position System

    With ARM7 as the core, this paper discusses a kind of design of vehicle location system. The new mobile vehicle positioning architecture and working theory of this system is integrated by a lot of hardware modules such as ARM microprocessor LPC2129 as a control unit to combinative with GPS LR9548...

    Provided By ISSN

  • White Papers // Oct 2012

    Identification and Listing of Factors Affecting Software Quality Assurance

    Software quality assurance as per IEEE is a "Planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements". A set of activities designed to evaluate the process by which the products are developed or manufactured. IEEE Standard 12207...

    Provided By ISSN

  • White Papers // Oct 2012

    An Indiscernibility Approach for Pre Processing of Web Log Files

    World Wide Web has a spectacular growth not only in terms of the number of websites and volume of information, but also in terms of the number of visitors. Web log files contain tremendous information about the user traffic and behavior. A large amount of pre-processing is required for eliminating...

    Provided By ISSN

  • White Papers // Oct 2012

    Price Demand Model for a Cloud Cache

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By ISSN

  • White Papers // Nov 2012

    Forecasting Risk and Risk Consequences on ERP Maintenance

    There are many studies which show that a number of IT projects fail. If focus is made on costs, it is possible that 80% of overall IT investment is waste of money, in other words, 20 per cent benefits and 80 per cent waste. Great efforts are made to adopt...

    Provided By ISSN

  • White Papers // Mar 2013

    Business Process Modeling Notation

    Models as representations of real world entities may appear to the novice to be an unnecessary abstraction. Indeed, in small organizations where there are relatively few processes, there is little need to this paper activity. When it comes to large organizations, with hundreds or thousands of processes, the creation of...

    Provided By ISSN

  • White Papers // Jul 2013

    Prioritizing Competitive Strategies in Iranian SME's Based on AHP Approach in Severe Economic Sanctions

    Rapid and major changes in the current market environment emphasize on the necessity and importance of identifying, survey and prioritizing competitive strategies, and any organization which would go to a higher level than its clients' expectations and succeed in the business world has no other way except following such strategy....

    Provided By ISSN

  • White Papers // Feb 2011

    The SMEs Governance Mechanisms Practices and Financial Performance: Case of Tunisian Industrial SMEs

    Now-a-days, the issue of corporate governance occupies central paramount position among the preoccupations of the firms' decision-makers. Noteworthy, the relationship between governance and company performance is often stressed within the context of large companies and very few are those studies dealing with this subject as regard the Small and Medium...

    Provided By ISSN

  • White Papers // May 2012

    Latest Programming Language Tools for Business Process Modelling

    Business Process Modeling (BPM) in systems engineering and software engineering is the process in which various steps and activities of an enterprise are analyzed and improved. BPM is typically performed by business analysts and managers who are seeking to improve process efficiency and quality. The purpose of this paper is...

    Provided By ISSN

  • White Papers // Jun 2012

    FNet: An Index for Advanced Business Process Querying

    Now-a-days, more and more organizations describe their operations in terms of business processes. Consequently, it is common for organizations to have collections of hundreds or even thousands of business process models. This calls for techniques to quickly retrieve business process models that satisfy a given query. Some advanced techniques for...

    Provided By ISSN

  • White Papers // Feb 2013

    Business Process Reengineering by Rational Unified Process (RUP) Methodology

    Business Process Reengineering is a holistic approach that preparing and heading organizations for \"Change\". This method considers the business processes as the main issues for Reengineering. But a close examination of BPR project indicates that the main reason of its failure is its structure and way of implementation. This paper...

    Provided By ISSN

  • White Papers // Oct 2010

    Knowledge Services in Business Process Management: A New Way for Increasing of Productivity?

    This paper represent the appropriate software support for Process Management, and those tools which are used in a whole range of Czech and world-class manufacturing production and non-manufacturing enterprises as well as in organizations and other public sector administration institutions. The innovation in the tuition process lies in the fact...

    Provided By ISSN

  • White Papers // Sep 2008

    Principles for Support of the Business Processes

    This paper describes basic components and principles for support of the normatively regulated organizational activities. These activities are characterized by precise objective or purpose, participation of actors as role-holders, and norms and rules that govern the performance of these activities. In order to perform normatively regulated activities efficiently and effectively,...

    Provided By ISSN

  • White Papers // Feb 2010

    Performance-Centric Business Activity Monitoring Framework for Continuous Process Improvement

    For better business performance or continuous process improvement of an enterprise, real-time measurement and analysis of the performance of managerial activities is essential. Business Activity Monitoring (BAM) which provides real-time access to key performance indicators or business processes is one of core elements for successful BPM system. Since performance measurement...

    Provided By ISSN

  • White Papers // Dec 2008

    Platform Support for an Intelligent Enterprise Business Management

    The platform IDEA assists all the specific processes of an enterprise, from the meat processing industry, to help decision makers to manage performances by implementing the concepts Business Performance Management (BPM) and Business Intelligence (BI). The platform transforms data into information and then into knowledge being focused on business, technological...

    Provided By ISSN

  • White Papers // Dec 2008

    Business Intelligence Systems: a Comparative Analysis

    Data warehouse is the central core of a Business Intelligence (BI) system and it is usually the most expensive component to manage. A set of evaluation criteria is described and considered for comparing some popular OLAP systems that support Business Intelligence. These criteria involve critical aspects such as: information delivery,...

    Provided By ISSN

  • White Papers // Feb 2009

    Business Process Measurement Model Based On the Fuzzy Multi Agent Systems

    The aim of this paper is to introduce a new model for measuring Business process based on the Fuzzy Multi Agent Systems. Some of features providing by this model are: simplicity of use enterprise look vision accuracy of measurement result focus on quantitative criteria to measure the performance of business,...

    Provided By ISSN

  • White Papers // Sep 2009

    The Power of Open Source ERP

    The paper presents a sustainable business model for open source software tools, managing and disseminating documents in heterogeneous software (source code files, database objects, graphical objects, text files) for concurrent economic applications. The paper motivates the utilization of open source models for the maintenance and adaptation of the application or...

    Provided By ISSN

  • White Papers // Jun 2008

    Multiagent Based Global Enterprise Resource Planning: Conceptual View

    In recent decade, the business of manufacturing and service organizations alike is strongly conditioned by unpredictable changes taking place in a global market. The question is how to provide efficient and cost-effective responses on time. Current systems such as Extended Enterprise Resource Planning (EERP) and Supply Chain Management (SCM) do...

    Provided By ISSN

  • White Papers // Jul 2012

    Implementation Benefit to Business Intelligence using Data Mining Techniques

    This paper is discussing data mining techniques and business operations areas includes marketing, finance, fraud detection, manufacturing, telecommunication to improve their business and found excellent results. A wide range of marketing companies requires the analysis of millions of shopping transaction records daily such as sales revenue by products to guide...

    Provided By ISSN

  • White Papers // May 2013

    Enterprise Architecture - A Tool for Business Innovation Realization in the Enterprise

    Enterprises globally are undergoing business transformation. Organizations and corporate world have been searching for ways to enhance their businesses in order to be agile and how development in Information Technology (IT) can help them achieve this in today's unstable economic climate. Large-scale changes in the business affect operations, which in...

    Provided By ISSN

  • White Papers // Jan 2009

    Management of Business Processes with the BPRules Language in Service Oriented Computing

    Quality of Service (QoS) concerns are an important topic for the realization of business processes. While BPEL is considered the de facto standard for web service compositions, QoS requirements are not part of its specification. The authors present the BPRules (Business Process Rules) language for the management of business processes...

    Provided By ISSN

  • White Papers // Mar 2011

    High Demand System Implementation Through BPM Software

    In this spare organization require Business Process Reengineering approach. Business Process Reengineering (BPR) is a management approach aiming at improvements by means of elevating efficiency and effectiveness of the processes that exist within and across organizations. The key to BPR is for organizations to look at their business processes from...

    Provided By ISSN

  • White Papers // Jul 2010

    Increasing Knowledge by Teaching of Modern BPM Systems

    This paper represent the appropriate software support for Process Management, and those tools which are used in a whole range of Czech and world-class manufacturing production and non-manufacturing enterprises as well as in organizations and other public sector administration institutions. The innovation in the tuition process lies in the fact...

    Provided By ISSN

  • White Papers // Mar 2012

    A Generalized Likelihood Ratio Test for a Fault-Tolerant Control System

    In this paper, the authors deal with the problem of diagnosis of multiple sequential faults using statistical test GLR. Based on the work of Willsky and Jones [50], they propose a modified Generalized Likelihood Ratio (GLR) test, allowing detection, isolation and estimation of multiple sequential faults. Their contribution aims to...

    Provided By ISSN

  • White Papers // Feb 2012

    Model-Driven Security for Trusted Systems

    In this paper, the authors have classified stakeholders and objects, while concentrating on the specification for objects' usage at the stakeholder end. This will allow them to deploy their tools in an emulated environment, where these high level specifications will transform to platform independent administrative policies and administer the emulation...

    Provided By ISSN

  • White Papers // Nov 2011

    Adaptive Linearization Scheme for Power Amplifiers in OFDM Communication Systems

    An adaptive linearization scheme based on the Exact Model-Matching (EMM) approach is proposed to compensate nonlinearity of high power amplifiers (HPAs). It is illustrated that the input-output property of the broadband amplifier system can be approximated by a Memory Polynomial Model (MPM). Then, the compensation of HPA input is determined...

    Provided By ISSN

  • White Papers // Jun 2011

    A Novel Approach for Architecture Based Software Maintenance Prediction

    In the recent years, the success or failure of any software development effort is judged by the degree of achievement of various software quality attributes associated with it. In this paper, the authors have presented a novel approach to predict software maintenance effort at architecture level. They have used requirements,...

    Provided By ISSN

  • White Papers // Jun 2011

    A Graph-Based Concurrency Control Protocol for XML Metadata Knowledge Bases

    Providing efficient access for XML APIs in XML Metadata Knowledge Bases (XMKBs) is crucial, since XML is widely used to integrate data in XMKBs. In XMKBs, the types, contents and locations of heterogeneous data are illustrated in XML documents to provide a uniform interface for users to manipulate this data....

    Provided By ISSN

  • White Papers // Apr 2011

    Data Delivery with Mobility Control in Sparse Wireless Sensor Networks

    In this paper, the authors propose a sensor mobility control scheme for data delivery in sparse wireless sensor networks. All sensor nodes remain static once they have been deployed but are capable of moving in a controlled manner. Based on periodic beacon messages, local node locations are known to all...

    Provided By ISSN

  • White Papers // Apr 2011

    Chaos Synchronization-Based Data Transmission Scheme in Multiple Sink Wireless Sensor Networks

    In this paper, the authors study chaos synchronization-based data transmission scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate impulsive signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each...

    Provided By ISSN

  • White Papers // Mar 2011

    Optimizing MIMO-SDMA Smart Antennas by Using Linear Array Phase Perturbations Based on Particle Swarm Optimization

    In this paper, based on phase-only perturbation method, an innovative up-link Multiple-Intput Multiple-Output Spatial Division Multiple Access (MIMO-SDMA) optimization technique of smart antennas by is proposed. Particle Swarm Optimization (PSO) algorithm is used to search the optimal weighting vector of the phase shift perturbations for array factor. The deduced radiation...

    Provided By ISSN

  • White Papers // Feb 2011

    Scheduling Parallel Tasks with Intra-Communication Overhead in a Grid Computing Environment

    With the improvements in wide-area network performance and powerful computers, it is possible to integrate a large number of distributed machines belonging to different organizations as a single system, for example, a grid computing environment. A grid computing environment involves cooperation and sharing resources among distributed machines. In this paper,...

    Provided By ISSN

  • White Papers // Aug 2012

    The Distributed Computing Paradigms: P2P, Grid, Cluster, Cloud, and Jungle

    The distributed computing is done on many systems to solve a large scale problem. The growing of high-speed broadband networks in developed and developing countries, the continual increase in computing power, and the rapid growth of the Internet have changed the way. In it the society manages information and information...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing: Towards Case Study of Data Security Mechanism

    Pick up any magazine or visit almost any IT website or blog, user will be sure to see talk about Cloud Computing. The only problem is that not everyone agrees on what it is exactly. Every individual has different views, but still there is a growing trend of using cloud...

    Provided By ISSN

  • White Papers // Mar 2013

    Resource Security in the Cloud Computing

    Cloud computing has become nowadays a buzzword among IT and industry engineers. The cloud phenomenon is quickly growing towards becoming the de facto standard of computing, storage and hosting, both in industry and Internet. This paper presents analysis of security issues inside enterprise private clouds. The investigated security tools were:...

    Provided By ISSN