ISSN

Displaying 41-80 of 127 results

  • White Papers // Nov 2012

    Search Engines Using Evolutionary Algorithms

    Evolutionary Algorithm (EA) which involves evolutionary computation, a generic population based meta heuristic optimization algorithm. An EA uses some mechanisms inspired by biological evolution: reproduction, mutation, recombination, and selection. A Genetic Algorithm (GA) is a search technique used in computing to find exact or approximate solutions to optimization and search...

    Provided By ISSN

  • White Papers // Nov 2012

    Design and Development of Arm Based Embedded Intelligent Public Transport Vehicle Position System

    With ARM7 as the core, this paper discusses a kind of design of vehicle location system. The new mobile vehicle positioning architecture and working theory of this system is integrated by a lot of hardware modules such as ARM microprocessor LPC2129 as a control unit to combinative with GPS LR9548...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Sealed-Bid Auction Protocol with Bid Privacy and Bidder Privacy

    In this paper, a sealed-bid auction protocol which mainly focuses on security issues: bid privacy, bidder anonymity and fairness problem is presented. The new proposal is motivated by the conflict between bidder anonymity and DOS (Denial-Of-Service) attack from insider. It utilizes an efficient LPN-based authentication method to accomplish lightweight authentication....

    Provided By ISSN

  • White Papers // Nov 2012

    Technical Issues and Challenges of Biometric Applications as Access Control Tools of Information Security

    Recent advances in biometric technologies coupled with the increased threats in information security has proliferated the applications of biometric systems to safe-guard information and its supporting processes, systems and infrastructures. This paper discusses the technical issues and challenges faced by biometric technologies within the physical and logical access control applications...

    Provided By ISSN

  • White Papers // Nov 2012

    Privacy-Preserving Authentication Using Fingerprint

    Biometrics provides the user with an effective tool for authentication and is becoming a strong competitor in current authentication mechanisms. However, the concerns about biometrics regarding template security, privacy and revocability impede its further application to network-based scenarios. The authors propose a novel fingerprint minutiae-based scheme to achieve reliable mutual...

    Provided By ISSN

  • White Papers // Nov 2012

    Forecasting Risk and Risk Consequences on ERP Maintenance

    There are many studies which show that a number of IT projects fail. If focus is made on costs, it is possible that 80% of overall IT investment is waste of money, in other words, 20 per cent benefits and 80 per cent waste. Great efforts are made to adopt...

    Provided By ISSN

  • White Papers // Oct 2012

    Private Searching on Encrypted Cloud Data

    Cloud computing provides services like software, computation and storage services for which end-user need not worry about knowledge of the physical location and configuration of the system that delivers the services. Data leakage is a major problem in cloud computing and the privacy of user is under serious threat. The...

    Provided By ISSN

  • White Papers // Oct 2012

    Enhancement for Data Security in Cloud Computing Environment

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By ISSN

  • White Papers // Oct 2012

    Identification and Listing of Factors Affecting Software Quality Assurance

    Software quality assurance as per IEEE is a "Planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements". A set of activities designed to evaluate the process by which the products are developed or manufactured. IEEE Standard 12207...

    Provided By ISSN

  • White Papers // Oct 2012

    An Indiscernibility Approach for Pre Processing of Web Log Files

    World Wide Web has a spectacular growth not only in terms of the number of websites and volume of information, but also in terms of the number of visitors. Web log files contain tremendous information about the user traffic and behavior. A large amount of pre-processing is required for eliminating...

    Provided By ISSN

  • White Papers // Oct 2012

    Price Demand Model for a Cloud Cache

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By ISSN

  • White Papers // Oct 2012

    Three Tier Data Storage Security in Cloud Using Face Fuzzy Vault

    The well-known buzzword, says Cloud Computing, attracts the attention from both academy and industry across the world, because of its potential in achieving the long-held dream, says utility computing and opens a new era for new spawned companies to provide services above this new concept. At the same time hackers...

    Provided By ISSN

  • White Papers // Oct 2012

    An Optimized Conflict-Free Replicated Set

    Eventual consistency of replicated data supports concurrent updates, reduces latency and improves fault tolerance, but forgoes strong consistency. Accordingly, several cloud computing platforms implement eventually-consistent data types. The set is a widespread and useful abstraction, and many replicated set designs have been proposed. The authors present a reasoning abstraction, permutation...

    Provided By ISSN

  • White Papers // Oct 2012

    Scheduling Tree-Shaped Task Graphs to Minimize Memory and Makespan

    This paper investigates the execution of tree-shaped task graphs using multiple processors. Each edge of such a tree represents a large IO file. A task can only be executed if all input and output files fit into memory, and a file can only be removed from memory after it has...

    Provided By ISSN

  • White Papers // Oct 2012

    Welcome To The Future of Computing: Cloud Computing And Legal Issues

    As the civilization enters into the new millennium, the words of 19th century have suddenly taken a new meaning. The world is undergoing a remarkable technological change. The advancement of Internet along with the expansion of IT infrastructure at large level has revolutionized the way in which information and communication...

    Provided By ISSN

  • White Papers // Oct 2012

    Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task Computing (MTC) Applications

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By ISSN

  • White Papers // Oct 2012

    Network Virtualization via Cloud Computing and its Security Issues

    Cloud is a concept of updating of resources without affecting the infrastructure to reduce the need of backup system and encourage the continuous execution of application. Cloud provides potential "Reliability" and "Scalability" for the applications either deployed or running on cloud. Cloud computing is offering utility oriented IT services to...

    Provided By ISSN

  • White Papers // Sep 2012

    Business Process Modeling for Web and Semantic Web

    BPM is one of the key technologies to benefit enterprise with higher efficiency and greater business values. Business process modeling is a discipline combining software Compatibilities and business expertise to enable process improvement and facilitate business innovation. BPM is generally a starting of business process management life cycle. Business Process...

    Provided By ISSN

  • White Papers // Aug 2012

    The Distributed Computing Paradigms: P2P, Grid, Cluster, Cloud, and Jungle

    The distributed computing is done on many systems to solve a large scale problem. The growing of high-speed broadband networks in developed and developing countries, the continual increase in computing power, and the rapid growth of the Internet have changed the way. In it the society manages information and information...

    Provided By ISSN

  • White Papers // Aug 2012

    Implementation of ERP in Business Process Based On Cloud Computing

    Software as service is linked to the concept of cloud computing is a style of computing where information technologies enable business products, services and solutions as a service over the internet. The concept of SAS (Software As Service) is currently in very early stages of development. There are a lot...

    Provided By ISSN

  • White Papers // Aug 2012

    Performance Comparison of Turbo Codes with other Forward Error Correcting Codes

    In this paper, the authors compare performance of turbo codes with different FEC codes presented in literatures. Performance and overall coding gain are compared for Convolutional codes, CTC, TPC and LDPC codes. Turbo Codes tend to work best at low code rates and not so well at high code rates....

    Provided By ISSN

  • White Papers // Aug 2012

    Implementation of Deming's Philosophy in a Construction Company: OPCO Limited - Wales Experience

    This paper describes how a Wales based construction company improves its operations, achieves quality standards and manages the overall business improvement through the implementation of Deming's philosophy. The paper describes, initially how the principles are applied within the organization successfully, how they helped in managing business processes and change, it...

    Provided By ISSN

  • White Papers // Aug 2012

    Towards a Business Process Reengineering Model for Managing the SMEs Information Technology Resources

    Now-a-days, most companies usually become aware of the problems regarding the implementation of business processes for managing IT resources. In such circumstances managers usually obtain a new integration of other models for enhancing the business and information processes according to the changed business needs. In the modern business practice, identifying...

    Provided By ISSN

  • White Papers // Jul 2012

    Implementation Benefit to Business Intelligence using Data Mining Techniques

    This paper is discussing data mining techniques and business operations areas includes marketing, finance, fraud detection, manufacturing, telecommunication to improve their business and found excellent results. A wide range of marketing companies requires the analysis of millions of shopping transaction records daily such as sales revenue by products to guide...

    Provided By ISSN

  • White Papers // Jul 2012

    Security Issues and Their Solution in Cloud Computing

    Cloud computing is model which uses combine concept of "software-as-a-service" and "Utility computing", provide convenient and on-demand services to requested end users. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloud service consumer should...

    Provided By ISSN

  • White Papers // Jul 2012

    Semantic Business Intelligence - a New Generation of Business Intelligence

    Business Intelligence Solutions represents applications used by companies to manage process and analyze data to provide substantiated decision. In the paper of Semantic Web development trend is to integrate semantic unstructured data, making business intelligence solutions to be redesigned in such a manner that can analyze, process and synthesize, in...

    Provided By ISSN

  • White Papers // Jul 2012

    Intruder Deducibility Constraints with Negation. Decidability and Application to Secured Service Compositions

    The problem of finding a mediator to compose secured services has been reduced in users' former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. The authors extend in this paper the mediator synthesis procedure by a construction for expressing that some data...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing: Towards Case Study of Data Security Mechanism

    Pick up any magazine or visit almost any IT website or blog, user will be sure to see talk about Cloud Computing. The only problem is that not everyone agrees on what it is exactly. Every individual has different views, but still there is a growing trend of using cloud...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing Issues and Benefits Modern Education

    Cloud computing, a rapidly developing information technology has brought new change & opportunities to IT industry and in the field of education. E-learning platform brings a brand new concept & is a kind of network information learning mode & also known as online learning to guide education. E-learning emphasizes on...

    Provided By ISSN

  • White Papers // Jun 2012

    Business Process Reengineering (BPR): Strategic Choice

    This paper reviews the Business Process Reengineering (BPR) vision of radical business process change, focusing upon the use of information technology, to facilitate a shift away from linear work organization towards parallel processing and multidisciplinary team working. To approach such a change, by focusing on the technologies aspect to the...

    Provided By ISSN

  • White Papers // Jun 2012

    Intrusion Tolerance: Enhancement of Safety in Cloud Computing

    Cloud computing is a recent computing model; provides consistent access to wide area distributed resources facing many problems as its usage increases. Enormous loss to both cloud clients as well as cloud service providers happen even with small intrusions. The protection and defense of cloud infrastructure against malicious attacks can...

    Provided By ISSN

  • White Papers // Jun 2012

    FNet: An Index for Advanced Business Process Querying

    Now-a-days, more and more organizations describe their operations in terms of business processes. Consequently, it is common for organizations to have collections of hundreds or even thousands of business process models. This calls for techniques to quickly retrieve business process models that satisfy a given query. Some advanced techniques for...

    Provided By ISSN

  • White Papers // May 2012

    Design and Analysis of Location Control for Mobile Agent in Mobile Information Systems

    Retrieval of data using mobile agents has gained popularity, due to the advancements in mobile computing techniques. However, the transmission of wireless communication is still unreliable and bandwidth-limited. This paper investigates this issue and tries to find the most suitable location for a mobile agent in a vast network. The...

    Provided By ISSN

  • White Papers // May 2012

    Latest Programming Language Tools for Business Process Modelling

    Business Process Modeling (BPM) in systems engineering and software engineering is the process in which various steps and activities of an enterprise are analyzed and improved. BPM is typically performed by business analysts and managers who are seeking to improve process efficiency and quality. The purpose of this paper is...

    Provided By ISSN

  • White Papers // Apr 2012

    Potential of Cloud Computing as a Catalyst for Growth of SMB's

    Technology has always been connected with words like \"Revolution\" & \"Change\". It has never given a chance for anything to become outdated. The needs of the users have always been satisfied with the rapid increase in the revolution of technology. \"Cloud Computing\" the new buzz in the IT Industry that...

    Provided By ISSN

  • White Papers // Mar 2012

    Modeling and Simulation of Channel for Underwater Communication Network

    According to the characteristics of underwater acoustic channel, Thorp experience formula is adopted in order to simulate seawater absorption properties, on the basis of which, the path loss is solved by means of simulation. A Wenz model is also improved so as to approach the noise model of underwater acoustic...

    Provided By ISSN

  • White Papers // Mar 2012

    A Generalized Likelihood Ratio Test for a Fault-Tolerant Control System

    In this paper, the authors deal with the problem of diagnosis of multiple sequential faults using statistical test GLR. Based on the work of Willsky and Jones [50], they propose a modified Generalized Likelihood Ratio (GLR) test, allowing detection, isolation and estimation of multiple sequential faults. Their contribution aims to...

    Provided By ISSN

  • White Papers // Mar 2012

    Cloud Computing Security Issues with Possible Solutions

    Cloud computing gets its name from the drawings typically used to describe the Internet. It is a new consumption and delivery model for IT services. Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many security risks. In this paper, the...

    Provided By ISSN

  • White Papers // Mar 2012

    Demystifying Mobile Cloud Computing using Pandaboard

    Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. Mobile Cloud Computing (MCC) is simply cloud computing in which at least some of the devices involved are mobile. This paper goes over multiple techniques and...

    Provided By ISSN

  • White Papers // Mar 2012

    Mobile Multimedia Storage: A Mobile Cloud Computing Application and Analysis

    Cloud computing will vividly diminish the obligation/requirement of advanced/modern handsets for running mobile applications, according/conferring to the study. During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. In this paper, the authors present study and comparative analyses of...

    Provided By ISSN

  • White Papers // Jan 2010

    Information Technology and the Business Communities: A Case Study of Smallscale Business Enterprises in Nigeria

    The world is fast becoming a global village and a necessary tool for this process is information technology. Thus, this study examined the impact of information technology on the economies of small-scale business enterprises, specifically on business growth and income flow, job creation, efficient business management and crime rate reduction....

    Provided By ISSN

  • White Papers // Mar 2010

    Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy

    Using information systems effectively requires an understanding of the organization, management, and the technology shaping the systems. All information systems can be described as organizational and management solutions to challenges posed by the environment. The advances in information systems have affect on the authors day-to-day lives. As the technology is...

    Provided By ISSN

  • White Papers // Feb 2013

    Information Technology - Its Impact on Global Management

    21st century is the century of Information Technology (IT) and globalization. Information technology is playing its significant role in the betterment of the organizations. This paper explores another very important role of IT on global management i.e., IT helps to redefine the vision of global corporations which is the primary...

    Provided By ISSN

  • White Papers // Apr 2011

    A Study of Issues Affecting ERP Implementation in SMEs

    Companies implement ERP systems to integrate the business processes of a company, and help organizations obtain a competitive advantage. Enterprise Resource Planning (ERP) is one of the solutions for the Small and Medium Enterprises (SMEs) in order to face the global challenges. This is to explore and identify issues affecting...

    Provided By ISSN

  • White Papers // Mar 2013

    DoubleGuard: Detecting & Preventing Intrusions in Multitier Web Applications

    Internet services and applications have become an indivisible part of the authors' daily life. These applications and services are made available through Web Servers and they make use of Database, Servers for fulfillment of user's request. Both of these servers are prone to attacks. DoubleGuard provides Intrusion Prevention Systems at...

    Provided By ISSN

  • White Papers // Nov 2010

    Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance

    In this paper, the authors propose an architectural solution to implement Virtual Private Network (VPN) test bed in campus environment. The objective of this evaluation is to measure the quality of the audio and video streaming on client server performance over different types of VPN technology. Virtual Private Network (VPN)...

    Provided By ISSN

  • White Papers // Oct 2012

    Network Virtualization via Cloud Computing and its Security Issues

    Cloud is a concept of updating of resources without affecting the infrastructure to reduce the need of backup system and encourage the continuous execution of application. Cloud provides potential "Reliability" and "Scalability" for the applications either deployed or running on cloud. Cloud computing is offering utility oriented IT services to...

    Provided By ISSN

  • White Papers // Aug 2012

    Implementation of ERP in Business Process Based On Cloud Computing

    Software as service is linked to the concept of cloud computing is a style of computing where information technologies enable business products, services and solutions as a service over the internet. The concept of SAS (Software As Service) is currently in very early stages of development. There are a lot...

    Provided By ISSN

  • White Papers // Nov 2012

    Forecasting Risk and Risk Consequences on ERP Maintenance

    There are many studies which show that a number of IT projects fail. If focus is made on costs, it is possible that 80% of overall IT investment is waste of money, in other words, 20 per cent benefits and 80 per cent waste. Great efforts are made to adopt...

    Provided By ISSN

  • White Papers // Aug 2012

    The Distributed Computing Paradigms: P2P, Grid, Cluster, Cloud, and Jungle

    The distributed computing is done on many systems to solve a large scale problem. The growing of high-speed broadband networks in developed and developing countries, the continual increase in computing power, and the rapid growth of the Internet have changed the way. In it the society manages information and information...

    Provided By ISSN

  • White Papers // Jun 2013

    A Survey of Data Management System for Cloud Computing: Models and Searching Methods

    Cloud computing, as a new computing pattern having the capacity of sharing computing and storage, has been developed steadily and rapidly during recent years. It is selected by the famous scientific journal Technology Review published by MIT as one of the ten newly developed technologies which have changed the world....

    Provided By ISSN

  • White Papers // Feb 2012

    Disaster Recovery in Clouds

    Cloud computing has been a new buzzword of today's most enticing technology areas due to its cost-efficiency and flexibility. It offers mainframe or better infrastructure through a small set of services delivered globally over the Internet. As per one of the estimates from Gartner, by year 2012, 20% of enterprise...

    Provided By ISSN

  • White Papers // Mar 2013

    Resource Security in the Cloud Computing

    Cloud computing has become nowadays a buzzword among IT and industry engineers. The cloud phenomenon is quickly growing towards becoming the de facto standard of computing, storage and hosting, both in industry and Internet. This paper presents analysis of security issues inside enterprise private clouds. The investigated security tools were:...

    Provided By ISSN

  • White Papers // Nov 2011

    An Approach for Effective Resource Management in Cloud Computing

    In High Performance Computing (HPC), providing adequate resources for user applications is crucial. For instance, a computing center that a user has access to cannot handle the user applications with short deadlines due to limited computing infrastructure in the center. Therefore, to get the application completed by the deadline, users...

    Provided By ISSN

  • White Papers // Jul 2012

    Cloud Computing: Towards Case Study of Data Security Mechanism

    Pick up any magazine or visit almost any IT website or blog, user will be sure to see talk about Cloud Computing. The only problem is that not everyone agrees on what it is exactly. Every individual has different views, but still there is a growing trend of using cloud...

    Provided By ISSN

  • White Papers // Aug 2012

    Performance Comparison of Turbo Codes with other Forward Error Correcting Codes

    In this paper, the authors compare performance of turbo codes with different FEC codes presented in literatures. Performance and overall coding gain are compared for Convolutional codes, CTC, TPC and LDPC codes. Turbo Codes tend to work best at low code rates and not so well at high code rates....

    Provided By ISSN

  • White Papers // Mar 2008

    Decentralized Metadata Development for Open B2B Electronic Business

    In Information Technology, but also in Ontology engineering, a strict distinction is made between metadata and data, or, in Object Oriented terms, between classes and instances. This paper presents a mechanism to maintain metadata in a decentralized way, in order to flexibilize open electronic business. By defining instances assets, data...

    Provided By ISSN

  • White Papers // Feb 2013

    An Elementary Review of Linkages & Gaps Among BPR, SOA & Software Reverse Engineering

    Research on Business Process Reengineering has started as an effort in proposing methods and techniques for organizational restructuring in order to increase organizational efficiency and effectiveness. Later on researchers and consultants started using the tools of IT as part of BPR processes and ultimately they started to develop IT based...

    Provided By ISSN

  • White Papers // Sep 2012

    Business Process Modeling for Web and Semantic Web

    BPM is one of the key technologies to benefit enterprise with higher efficiency and greater business values. Business process modeling is a discipline combining software Compatibilities and business expertise to enable process improvement and facilitate business innovation. BPM is generally a starting of business process management life cycle. Business Process...

    Provided By ISSN

  • White Papers // May 2011

    Improving Business Performance with Web 2.0 Technologies

    In this paper, the authors explore the role of emerging Web 2.0 technologies in the workplace in terms of current trends, e-learning, and the value these new e-learning technologies can potentially provide organizations. This first reviews the literature in terms of current practices, benefits, and challenges, and defines several applications...

    Provided By ISSN

  • White Papers // Aug 2012

    Towards a Business Process Reengineering Model for Managing the SMEs Information Technology Resources

    Now-a-days, most companies usually become aware of the problems regarding the implementation of business processes for managing IT resources. In such circumstances managers usually obtain a new integration of other models for enhancing the business and information processes according to the changed business needs. In the modern business practice, identifying...

    Provided By ISSN

  • White Papers // Feb 2013

    Critical Success Factors for Six Sigma Implementation by SMEs

    Six Sigma is a business strategy that enables organizations to increase their profits by optimizing their operations, improving quality and eliminating defects. Six Sigma is a business strategy for improving the bottom line of the businesses. In recent times the small and medium size enterprises also have started adopting the...

    Provided By ISSN

  • White Papers // May 2011

    A Navel Approach for Evaluating Completeness of Business Rules Using First Order Logic

    Organizations are under increasing scrutiny to develop the rules to regulate their business requirements and it is important to standardize the business rules to automate the complex process into simple logic. So several process modeling languages and rule modeling languages are evolved to modulate the organizational policies and procedures. Business...

    Provided By ISSN

  • White Papers // Mar 2013

    A Survey on Security Threats and Vulnerabilities In Cloud Computing

    Cloud computing is a distributed computing paradigm capable of providing agile IT services to individual users and organizations. Cloud computing is a technology which will facilitate companies or organizations to host their services without worrying about IT infrastructure and other supporting services. Cloud computing providers can build large data centers...

    Provided By ISSN

  • White Papers // Oct 2012

    Welcome To The Future of Computing: Cloud Computing And Legal Issues

    As the civilization enters into the new millennium, the words of 19th century have suddenly taken a new meaning. The world is undergoing a remarkable technological change. The advancement of Internet along with the expansion of IT infrastructure at large level has revolutionized the way in which information and communication...

    Provided By ISSN

  • White Papers // Mar 2012

    Cloud Computing Security Issues with Possible Solutions

    Cloud computing gets its name from the drawings typically used to describe the Internet. It is a new consumption and delivery model for IT services. Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many security risks. In this paper, the...

    Provided By ISSN

  • White Papers // Apr 2009

    Business Process Improvement in Organizational Design of e-Government Services

    This paper describes a business process and organizational re-design and implementation project for an e-government service organization. In this paper, the initial process execution time of a Virtual Private Network (VPN) connection request has been reduced from some 60 days to two days. This has been achieved by the use...

    Provided By ISSN

  • White Papers // Apr 2012

    Potential of Cloud Computing as a Catalyst for Growth of SMB's

    Technology has always been connected with words like \"Revolution\" & \"Change\". It has never given a chance for anything to become outdated. The needs of the users have always been satisfied with the rapid increase in the revolution of technology. \"Cloud Computing\" the new buzz in the IT Industry that...

    Provided By ISSN

  • White Papers // Mar 2012

    Demystifying Mobile Cloud Computing using Pandaboard

    Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. Mobile Cloud Computing (MCC) is simply cloud computing in which at least some of the devices involved are mobile. This paper goes over multiple techniques and...

    Provided By ISSN

  • White Papers // Jun 2013

    Review On: Design of Low Complexity LDPC Decoding Algorithm in LDPC Coded BICMOFDM Systems

    Digital Video Broadcasting-Terrestrial (DVB-T) is the most widely deployed digital terrestrial television system worldwide with services on air in over thirty countries. In order to increase its spectral efficiency and to enable new services the DVB consortium has developed a new standard named DVB-T2. Latest and next-generation wireless broadcasting standards,...

    Provided By ISSN

  • White Papers // Mar 2013

    Survey on Resources Provisioning in Cloud Systems for Cost Benefits

    In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called...

    Provided By ISSN

  • White Papers // Oct 2012

    Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task Computing (MTC) Applications

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By ISSN

  • White Papers // Feb 2013

    The Policy as Repudiation Factors of Adopting Cloud Computing in University Administration

    Cloud computing (CC) technology can be described as the next generation of Information technology for companies, educational institutions and governmental agencies; which provides easy and affordable access to state of the art technology; IT, technological application and services. Due to the growing needs for Information Technology (IT) and the current...

    Provided By ISSN

  • White Papers // Jun 2011

    LDPC Concatenated Space-Time Block Coded System in Multipath Fading Environment: Analysis and Evaluation

    Irregular Low-Density Parity-Check (LDPC) codes have been found to show exceptionally good performance for single antenna systems over a wide class of channels. In this paper, the performance of LDPC codes with multiple antenna systems is investigated in flat Rayleigh and Rician fading channels for different modulation schemes. The focus...

    Provided By ISSN

  • White Papers // Apr 2013

    Multilayer Coding Mechanisms for Broadcasting over MIMO Networks

    In this paper, the authors first propose a design rule for constructing a proper multilayer code for Multiple-Input-Multiple-Output(MIMO) networks.. A number of recent source coding techniques compress the source signal into multiple layers such that a destination is able to reconstruct the original signal (with some distortion) even if it...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Data Management Interface Based Storage Virtualization Mechanism for Cloud Computing

    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper, the authors have proposed...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Computing: Just Fancy Name for Virtualization

    Cloud computing is a technology that uses the internet and central remote server to maintain data and application. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. This technology allows for much more efficient computing by centralizing...

    Provided By ISSN

  • White Papers // Oct 2011

    Security Issues in Cloud Computing A Transparent View

    Cloud Computing is the next generation Architecture of the most IT enterprise. It made possible, the application to run without the burden of local hardware and software. It moved the data and the application software of the various enterprises to the centralized large data centre, where the security issue arises....

    Provided By ISSN

  • White Papers // Dec 2011

    Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment

    Actually Information security becomes a very important part for the organization's intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, the authors need a standard or benchmark which regulates...

    Provided By ISSN

  • White Papers // Jan 2012

    A General Approach for Securely Querying and Updating XML Data

    Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A few amount of works have studied the access rights for updates. In this paper, the authors present a general model for specifying access control on XML...

    Provided By ISSN