ISSN

Displaying 81-120 of 129 results

  • White Papers // Feb 2012

    Model-Driven Security for Trusted Systems

    In this paper, the authors have classified stakeholders and objects, while concentrating on the specification for objects' usage at the stakeholder end. This will allow them to deploy their tools in an emulated environment, where these high level specifications will transform to platform independent administrative policies and administer the emulation...

    Provided By ISSN

  • White Papers // Feb 2012

    Disaster Recovery in Clouds

    Cloud computing has been a new buzzword of today's most enticing technology areas due to its cost-efficiency and flexibility. It offers mainframe or better infrastructure through a small set of services delivered globally over the Internet. As per one of the estimates from Gartner, by year 2012, 20% of enterprise...

    Provided By ISSN

  • White Papers // Feb 2012

    Survey on Mobile Cloud Computing

    The cloud heralds a new era of computing where application services are provided through the Internet. Cloud computing can enhance the computing capability of mobile systems, but is it the ultimate solution for extending such systems' battery lifetimes. Cloud computing promises to democratize parallel data processing by making large server...

    Provided By ISSN

  • White Papers // Jan 2012

    A General Approach for Securely Querying and Updating XML Data

    Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A few amount of works have studied the access rights for updates. In this paper, the authors present a general model for specifying access control on XML...

    Provided By ISSN

  • White Papers // Jan 2012

    Strategic Planning for Computer Science Security of Networks and Systems in SMEs

    The strategic planning adapted in the computer science security is observed in many senses as a military strategy, which takes advantage of their forces to operate the vulnerabilities of the organizations, attackers or competitors. The need of the companies and organizations to continuously adapt to the technological changes of the...

    Provided By ISSN

  • White Papers // Dec 2011

    Security Survey of Internet Browsers Data Managers

    The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data....

    Provided By ISSN

  • White Papers // Dec 2011

    Secure Querying of Recursive XML Views: A Standard XPath-Based Technique

    Most state-of-the art approaches for securing XML documents allow users to access data only through authorized views defined by annotating an XML grammar (e.g. DTD) with a collection of XPath expressions. To prevent improper disclosure of confidential information, user queries posed on these views need to be rewritten into equivalent...

    Provided By ISSN

  • White Papers // Dec 2011

    Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment

    Actually Information security becomes a very important part for the organization's intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, the authors need a standard or benchmark which regulates...

    Provided By ISSN

  • White Papers // Nov 2011

    An Approach for Effective Resource Management in Cloud Computing

    In High Performance Computing (HPC), providing adequate resources for user applications is crucial. For instance, a computing center that a user has access to cannot handle the user applications with short deadlines due to limited computing infrastructure in the center. Therefore, to get the application completed by the deadline, users...

    Provided By ISSN

  • White Papers // Nov 2011

    Adaptive Linearization Scheme for Power Amplifiers in OFDM Communication Systems

    An adaptive linearization scheme based on the Exact Model-Matching (EMM) approach is proposed to compensate nonlinearity of high power amplifiers (HPAs). It is illustrated that the input-output property of the broadband amplifier system can be approximated by a Memory Polynomial Model (MPM). Then, the compensation of HPA input is determined...

    Provided By ISSN

  • White Papers // Nov 2011

    Intelligent Access Scheme Design for Mobile Cloud Computing

    Mobile Cloud Computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing a new level of security by a centralized maintenance of security critical software for...

    Provided By ISSN

  • White Papers // Oct 2011

    Security Issues in Cloud Computing A Transparent View

    Cloud Computing is the next generation Architecture of the most IT enterprise. It made possible, the application to run without the burden of local hardware and software. It moved the data and the application software of the various enterprises to the centralized large data centre, where the security issue arises....

    Provided By ISSN

  • White Papers // Jun 2011

    LDPC Concatenated Space-Time Block Coded System in Multipath Fading Environment: Analysis and Evaluation

    Irregular Low-Density Parity-Check (LDPC) codes have been found to show exceptionally good performance for single antenna systems over a wide class of channels. In this paper, the performance of LDPC codes with multiple antenna systems is investigated in flat Rayleigh and Rician fading channels for different modulation schemes. The focus...

    Provided By ISSN

  • White Papers // Jun 2011

    A Novel Approach for Architecture Based Software Maintenance Prediction

    In the recent years, the success or failure of any software development effort is judged by the degree of achievement of various software quality attributes associated with it. In this paper, the authors have presented a novel approach to predict software maintenance effort at architecture level. They have used requirements,...

    Provided By ISSN

  • White Papers // Jun 2011

    A Graph-Based Concurrency Control Protocol for XML Metadata Knowledge Bases

    Providing efficient access for XML APIs in XML Metadata Knowledge Bases (XMKBs) is crucial, since XML is widely used to integrate data in XMKBs. In XMKBs, the types, contents and locations of heterogeneous data are illustrated in XML documents to provide a uniform interface for users to manipulate this data....

    Provided By ISSN

  • White Papers // May 2011

    Improving Business Performance with Web 2.0 Technologies

    In this paper, the authors explore the role of emerging Web 2.0 technologies in the workplace in terms of current trends, e-learning, and the value these new e-learning technologies can potentially provide organizations. This first reviews the literature in terms of current practices, benefits, and challenges, and defines several applications...

    Provided By ISSN

  • White Papers // May 2011

    A Navel Approach for Evaluating Completeness of Business Rules Using First Order Logic

    Organizations are under increasing scrutiny to develop the rules to regulate their business requirements and it is important to standardize the business rules to automate the complex process into simple logic. So several process modeling languages and rule modeling languages are evolved to modulate the organizational policies and procedures. Business...

    Provided By ISSN

  • White Papers // Apr 2011

    A Study of Issues Affecting ERP Implementation in SMEs

    Companies implement ERP systems to integrate the business processes of a company, and help organizations obtain a competitive advantage. Enterprise Resource Planning (ERP) is one of the solutions for the Small and Medium Enterprises (SMEs) in order to face the global challenges. This is to explore and identify issues affecting...

    Provided By ISSN

  • White Papers // Apr 2011

    Enterprise Resource Planning (ERP) System in Higher Education: A Literature Review

    ERP systems are the largest integrated software applications adopted by universities, along with quite significant investments in their implementation. However, unlike other applications little research has been conducted regarding these systems in a university environment. This paper aims at the impact of in-house and vendor or consultant's specific groups and...

    Provided By ISSN

  • White Papers // Apr 2011

    An Adaptive Technique Using Advanced Encryption Standard to Implement Hard Disk Security

    This paper is to explain and develop an efficient method for Hard Disk Drive (HDD) Security using Full Disk Encryption (FDE) with Advanced Encryption Standards (AES) for data security specifically for Personal Computers (PCS) and Laptops. The focus of this work is to authenticate and protect the content of HDD...

    Provided By ISSN

  • White Papers // Apr 2011

    Data Delivery with Mobility Control in Sparse Wireless Sensor Networks

    In this paper, the authors propose a sensor mobility control scheme for data delivery in sparse wireless sensor networks. All sensor nodes remain static once they have been deployed but are capable of moving in a controlled manner. Based on periodic beacon messages, local node locations are known to all...

    Provided By ISSN

  • White Papers // Apr 2011

    Chaos Synchronization-Based Data Transmission Scheme in Multiple Sink Wireless Sensor Networks

    In this paper, the authors study chaos synchronization-based data transmission scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate impulsive signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each...

    Provided By ISSN

  • White Papers // Mar 2011

    High Demand System Implementation Through BPM Software

    In this spare organization require Business Process Reengineering approach. Business Process Reengineering (BPR) is a management approach aiming at improvements by means of elevating efficiency and effectiveness of the processes that exist within and across organizations. The key to BPR is for organizations to look at their business processes from...

    Provided By ISSN

  • White Papers // Mar 2011

    Optimizing MIMO-SDMA Smart Antennas by Using Linear Array Phase Perturbations Based on Particle Swarm Optimization

    In this paper, based on phase-only perturbation method, an innovative up-link Multiple-Intput Multiple-Output Spatial Division Multiple Access (MIMO-SDMA) optimization technique of smart antennas by is proposed. Particle Swarm Optimization (PSO) algorithm is used to search the optimal weighting vector of the phase shift perturbations for array factor. The deduced radiation...

    Provided By ISSN

  • White Papers // Feb 2011

    The SMEs Governance Mechanisms Practices and Financial Performance: Case of Tunisian Industrial SMEs

    Now-a-days, the issue of corporate governance occupies central paramount position among the preoccupations of the firms' decision-makers. Noteworthy, the relationship between governance and company performance is often stressed within the context of large companies and very few are those studies dealing with this subject as regard the Small and Medium...

    Provided By ISSN

  • White Papers // Feb 2011

    Scheduling Parallel Tasks with Intra-Communication Overhead in a Grid Computing Environment

    With the improvements in wide-area network performance and powerful computers, it is possible to integrate a large number of distributed machines belonging to different organizations as a single system, for example, a grid computing environment. A grid computing environment involves cooperation and sharing resources among distributed machines. In this paper,...

    Provided By ISSN

  • White Papers // Nov 2010

    The Factors Hindering Innovation at Iranian Smes

    Innovation is the key to the economic development in today's knowledge driven economy. World markets increasingly demand knowledge-intensive production and innovation-based competition. Iran still remains largely a natural-resource-based economy. To become competitive in today's market it needs urgent shift towards a more knowledge-based economy which requires strong innovation system. This...

    Provided By ISSN

  • White Papers // Nov 2010

    Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance

    In this paper, the authors propose an architectural solution to implement Virtual Private Network (VPN) test bed in campus environment. The objective of this evaluation is to measure the quality of the audio and video streaming on client server performance over different types of VPN technology. Virtual Private Network (VPN)...

    Provided By ISSN

  • White Papers // Oct 2010

    Knowledge Services in Business Process Management: A New Way for Increasing of Productivity?

    This paper represent the appropriate software support for Process Management, and those tools which are used in a whole range of Czech and world-class manufacturing production and non-manufacturing enterprises as well as in organizations and other public sector administration institutions. The innovation in the tuition process lies in the fact...

    Provided By ISSN

  • White Papers // Jul 2010

    Increasing Knowledge by Teaching of Modern BPM Systems

    This paper represent the appropriate software support for Process Management, and those tools which are used in a whole range of Czech and world-class manufacturing production and non-manufacturing enterprises as well as in organizations and other public sector administration institutions. The innovation in the tuition process lies in the fact...

    Provided By ISSN

  • White Papers // Jul 2010

    Cloud Computing: The Emerging Computing Technology

    Cloud computing is a style of computing where massively scalable IT-enabled capabilities are provided as a service over the network. It emerges as a new computing paradigm to support the maximum number of users and elastic services with the minimum resource. The evolution of Cloud computing can handle massive data...

    Provided By ISSN

  • White Papers // Mar 2010

    Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy

    Using information systems effectively requires an understanding of the organization, management, and the technology shaping the systems. All information systems can be described as organizational and management solutions to challenges posed by the environment. The advances in information systems have affect on the authors day-to-day lives. As the technology is...

    Provided By ISSN

  • White Papers // Feb 2010

    Performance-Centric Business Activity Monitoring Framework for Continuous Process Improvement

    For better business performance or continuous process improvement of an enterprise, real-time measurement and analysis of the performance of managerial activities is essential. Business Activity Monitoring (BAM) which provides real-time access to key performance indicators or business processes is one of core elements for successful BPM system. Since performance measurement...

    Provided By ISSN

  • White Papers // Jan 2010

    Information Technology and the Business Communities: A Case Study of Smallscale Business Enterprises in Nigeria

    The world is fast becoming a global village and a necessary tool for this process is information technology. Thus, this study examined the impact of information technology on the economies of small-scale business enterprises, specifically on business growth and income flow, job creation, efficient business management and crime rate reduction....

    Provided By ISSN

  • White Papers // Dec 2009

    A Study of CAPTCHAs for Securing Web Services

    Atomizing various Web activities by replacing human to human interactions on the Internet has been made indispensable due to its enormous growth. However, bots also known as Web-bots which have a malicious intend and pretending to be humans pose a severe threat to various services on the Internet that implicitly...

    Provided By ISSN

  • White Papers // Sep 2009

    The Power of Open Source ERP

    The paper presents a sustainable business model for open source software tools, managing and disseminating documents in heterogeneous software (source code files, database objects, graphical objects, text files) for concurrent economic applications. The paper motivates the utilization of open source models for the maintenance and adaptation of the application or...

    Provided By ISSN

  • White Papers // Apr 2009

    Business Process Improvement in Organizational Design of e-Government Services

    This paper describes a business process and organizational re-design and implementation project for an e-government service organization. In this paper, the initial process execution time of a Virtual Private Network (VPN) connection request has been reduced from some 60 days to two days. This has been achieved by the use...

    Provided By ISSN

  • White Papers // Mar 2009

    Business Process Management Integration Solution in Financial Sector

    It is vital for financial services companies to ensure the rapid implementation of new processes to meet speed-to-market, service quality and compliance requirements. This has to be done against a background of increased complexity. An integrated approach to business processes allows products, processes, systems, data and the applications that underpin...

    Provided By ISSN

  • White Papers // Mar 2009

    Improving Business Process Visualizations

    Business processes are at the core of today's business world. They state precisely how given challenges are to be handled. Most of the effort put into business processes is either the task of designing a new process or the task of improving an existing process. In both cases, visualizations of...

    Provided By ISSN

  • White Papers // Feb 2009

    Business Process Measurement Model Based On the Fuzzy Multi Agent Systems

    The aim of this paper is to introduce a new model for measuring Business process based on the Fuzzy Multi Agent Systems. Some of features providing by this model are: simplicity of use enterprise look vision accuracy of measurement result focus on quantitative criteria to measure the performance of business,...

    Provided By ISSN

  • White Papers // Nov 2011

    An Approach for Effective Resource Management in Cloud Computing

    In High Performance Computing (HPC), providing adequate resources for user applications is crucial. For instance, a computing center that a user has access to cannot handle the user applications with short deadlines due to limited computing infrastructure in the center. Therefore, to get the application completed by the deadline, users...

    Provided By ISSN

  • White Papers // Jun 2013

    A Survey of Data Management System for Cloud Computing: Models and Searching Methods

    Cloud computing, as a new computing pattern having the capacity of sharing computing and storage, has been developed steadily and rapidly during recent years. It is selected by the famous scientific journal Technology Review published by MIT as one of the ten newly developed technologies which have changed the world....

    Provided By ISSN

  • White Papers // Feb 2012

    Disaster Recovery in Clouds

    Cloud computing has been a new buzzword of today's most enticing technology areas due to its cost-efficiency and flexibility. It offers mainframe or better infrastructure through a small set of services delivered globally over the Internet. As per one of the estimates from Gartner, by year 2012, 20% of enterprise...

    Provided By ISSN

  • White Papers // Mar 2013

    Development of Optimized Resource Provisioning On-Demand Security Architecture for Secured Storage Services in Cloud Computing

    Cloud Computing makes it possible for providers to quickly deploy and scale services and obtain benefit from pay-by-use models under low cost, while users enjoy the flexibility of Internet-based computing services. Users find it difficult to fully trust cloud-based services because cloud-based data storage and protection methods are largely user...

    Provided By ISSN

  • White Papers // Apr 2013

    CLOUD-SLA: Service Level Agreement for Cloud Computing

    In the last few years, the cloud computing becomes the most important developing platform for both scientific and commercial application. Clouds are rapidly becoming an important platform for scientific applications. In the Cloud environment with uncountable numeric nodes, resource is inevitably unreliable, which has a great effect on task execution...

    Provided By ISSN

  • White Papers // Nov 2011

    Intelligent Access Scheme Design for Mobile Cloud Computing

    Mobile Cloud Computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing a new level of security by a centralized maintenance of security critical software for...

    Provided By ISSN

  • White Papers // Mar 2012

    Mobile Multimedia Storage: A Mobile Cloud Computing Application and Analysis

    Cloud computing will vividly diminish the obligation/requirement of advanced/modern handsets for running mobile applications, according/conferring to the study. During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. In this paper, the authors present study and comparative analyses of...

    Provided By ISSN

  • White Papers // Apr 2013

    Mobile Cloud Computing: Approaches and Issues

    During the last few years, there is a revolutionary development in the field of mobile computing, multimedia communication and wireless technology. Together with an explosive growth of the mobile computing and excellent promising technology of cloud computing concept, Mobile Cloud Computing (MCC) has been introduced to be a potential technology...

    Provided By ISSN

  • White Papers // Nov 2012

    ACP Based Anonymous Secure Group Communication

    Anonymous secure group communication is a new research and application paradigm. In this paper Anonymity between two-party communication, Access control polynomial to multi-part group communication, group key management for secure group communication and secure set concepts has been proposed. Newly extended scheme enforces Anonymous group membership, group size, Anonymous group...

    Provided By ISSN

  • White Papers // Nov 2012

    Search Engines Using Evolutionary Algorithms

    Evolutionary Algorithm (EA) which involves evolutionary computation, a generic population based meta heuristic optimization algorithm. An EA uses some mechanisms inspired by biological evolution: reproduction, mutation, recombination, and selection. A Genetic Algorithm (GA) is a search technique used in computing to find exact or approximate solutions to optimization and search...

    Provided By ISSN

  • White Papers // Jan 2013

    A Novel Data Gathering Scheme for Monitoring-Oriented Wireless Sensor Networks

    Wireless sensor networks have great potential as a means of realizing a wide range of applications, such as natural environmental monitoring, environmental control in residential spaces or plants, and object tracking. As a frame to actualize these sensor applications, this paper assumes a monitoring-oriented wireless sensor network, which periodically gathers...

    Provided By ISSN

  • White Papers // Jan 2013

    Research on Objective Sorting Algorithm of Geo Communication Satellite Based on Fuzzy Theory

    GEO (Geostationary Earth Orbit) communication satellites are important guarantee for the war. The authors should research the sorting for attack if they want to win the war. Performance parameters of GEO communication satellites are analyzed, and definitions of threat index are established. Subsequently, objective sorting algorithm of GEO communication satellites...

    Provided By ISSN

  • White Papers // Dec 2012

    Cellular Learning Automata Approach for Data Classification

    Data classification is a process that can categorize data to achieve the relationship between attributes and extract the suitable rules for prediction process. There are different learning methods in machine learning of which each has both advantages and disadvantages. In this paper, it will present a new method for data...

    Provided By ISSN

  • White Papers // Dec 2012

    Optimized Resource in Satellite Network Based on Genetic Algorithm

    Satellite network is an all-around network which has high-complexity, dynamic and enormous, and its resources are very limited. So, the authors have to optimize the resources on satellite network. This paper has studied the resources optimization for task in the satellite network. They established the flow chart and mathematical model...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Sealed-Bid Auction Protocol with Bid Privacy and Bidder Privacy

    In this paper, a sealed-bid auction protocol which mainly focuses on security issues: bid privacy, bidder anonymity and fairness problem is presented. The new proposal is motivated by the conflict between bidder anonymity and DOS (Denial-Of-Service) attack from insider. It utilizes an efficient LPN-based authentication method to accomplish lightweight authentication....

    Provided By ISSN

  • White Papers // Nov 2012

    Technical Issues and Challenges of Biometric Applications as Access Control Tools of Information Security

    Recent advances in biometric technologies coupled with the increased threats in information security has proliferated the applications of biometric systems to safe-guard information and its supporting processes, systems and infrastructures. This paper discusses the technical issues and challenges faced by biometric technologies within the physical and logical access control applications...

    Provided By ISSN

  • White Papers // Nov 2012

    Privacy-Preserving Authentication Using Fingerprint

    Biometrics provides the user with an effective tool for authentication and is becoming a strong competitor in current authentication mechanisms. However, the concerns about biometrics regarding template security, privacy and revocability impede its further application to network-based scenarios. The authors propose a novel fingerprint minutiae-based scheme to achieve reliable mutual...

    Provided By ISSN

  • White Papers // May 2012

    Design and Analysis of Location Control for Mobile Agent in Mobile Information Systems

    Retrieval of data using mobile agents has gained popularity, due to the advancements in mobile computing techniques. However, the transmission of wireless communication is still unreliable and bandwidth-limited. This paper investigates this issue and tries to find the most suitable location for a mobile agent in a vast network. The...

    Provided By ISSN

  • White Papers // Mar 2012

    Modeling and Simulation of Channel for Underwater Communication Network

    According to the characteristics of underwater acoustic channel, Thorp experience formula is adopted in order to simulate seawater absorption properties, on the basis of which, the path loss is solved by means of simulation. A Wenz model is also improved so as to approach the noise model of underwater acoustic...

    Provided By ISSN

  • White Papers // Nov 2012

    A Survey on Vehicular Mobility Modeling: Flow Modeling

    Motion or movement patterns of vehicles communicating wirelessly play an important role in the simulation based evaluation of Vehicular Ad-hoc NETworks (VANETs). It is to know that recent research about mobility modeling has given direction for vehicular network study still to obtain realistic behavior of vehicles; developments in this area...

    Provided By ISSN

  • White Papers // Nov 2012

    Zero Knowledge Password Authentication Protocol

    In many applications, the password is sent as clear text to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has...

    Provided By ISSN

  • White Papers // Nov 2012

    A New Approach for Instigating Security Using Single Zoom Mouse Click Graphical Password

    Due to growing hazards to networked computer system, there is great need for security innovations. Authentication is the process of security to information. User authentication is one of the significant topics in information security. Commonly used authentication is alphanumeric passwords, biometrics and smart card. At present day upcoming popular method...

    Provided By ISSN

  • White Papers // Nov 2012

    Efficient Probe Station Placement and Probe Set Selection for Fault Localization

    Network fault management has been a focus of research activity with more emphasis on fault localization - zero down exact source of a failure from set of observed failures. Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and...

    Provided By ISSN

  • White Papers // Nov 2012

    Hybrid Channel Allocation in Wireless Cellular Networks

    The enormous growth of mobile telephone traffic, along with the limited number of channels available, requires efficient reuse of channels. Channel allocation schemes can be divided into three categories: Fixed Channel Allocation (FCA), Dynamic Channel Allocation (DCA) and Hybrid Channel Allocation (HCA). In HCA, channels are divided into two disjoint...

    Provided By ISSN

  • White Papers // Nov 2012

    Signal Strength and Energy Aware Reliable Route Discovery in Manet

    Frequent changes in network topology and confined battery capacity of the mobile devices are the main challenges for routing in ad-hoc networks. In this paper, the authors propose a novel, Signal strength and Energy Aware routing protocol (SEA-DSR), which directly incorporates signal strength and residual battery capacity of nodes into...

    Provided By ISSN

  • White Papers // Nov 2012

    Cyber Security Solutions for DLMS Meters Using GSM/GPRS Technology

    The Smart meters are used in the areas of generation, transmission, distribution and consumption. The capabilities of smart meter systems and grid networks, such as distributed intelligence and broadband capabilities can greatly enhance efficiency and reliability, but they may also create much new vulnerability if not deployed with the appropriate...

    Provided By ISSN

  • White Papers // Nov 2012

    Communicating with an Energy Meter Using IEC 62056 Through TCP/IP Protocol

    Device Language Message Specification (DLMS) is an application layer protocol designed to support messaging to and from energy distribution devices in a computer integrated environment. COSEM, the COmpanion Specification for Energy Metering, addresses the meter as an integrated part of a commercial process, which starts with the measurement of the...

    Provided By ISSN

  • White Papers // Nov 2012

    An Efficient Chaos-Based Optimization Algorithm Approach for Cryptography

    The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications....

    Provided By ISSN

  • White Papers // Nov 2012

    Survey of Vehicle Ad-Hoc Network

    In car network enable the direct communication in ad-hoc network among the car and between the car and road side communication device. the ad hoc networking provides a spontaneous and direct communication of a car with other cars or with fixed road-side access points in its vicinity. The communication is...

    Provided By ISSN

  • White Papers // Mar 2013

    Survey on Resources Provisioning in Cloud Systems for Cost Benefits

    In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called...

    Provided By ISSN

  • White Papers // Oct 2012

    Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task Computing (MTC) Applications

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By ISSN

  • White Papers // Feb 2013

    The Policy as Repudiation Factors of Adopting Cloud Computing in University Administration

    Cloud computing (CC) technology can be described as the next generation of Information technology for companies, educational institutions and governmental agencies; which provides easy and affordable access to state of the art technology; IT, technological application and services. Due to the growing needs for Information Technology (IT) and the current...

    Provided By ISSN

  • White Papers // Mar 2012

    Demystifying Mobile Cloud Computing using Pandaboard

    Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. Mobile Cloud Computing (MCC) is simply cloud computing in which at least some of the devices involved are mobile. This paper goes over multiple techniques and...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Data Management Interface Based Storage Virtualization Mechanism for Cloud Computing

    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper, the authors have proposed...

    Provided By ISSN

  • White Papers // Apr 2013

    Cloud Computing: Just Fancy Name for Virtualization

    Cloud computing is a technology that uses the internet and central remote server to maintain data and application. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. This technology allows for much more efficient computing by centralizing...

    Provided By ISSN

  • White Papers // Oct 2011

    Security Issues in Cloud Computing A Transparent View

    Cloud Computing is the next generation Architecture of the most IT enterprise. It made possible, the application to run without the burden of local hardware and software. It moved the data and the application software of the various enterprises to the centralized large data centre, where the security issue arises....

    Provided By ISSN

  • White Papers // Jun 2013

    Review On: Design of Low Complexity LDPC Decoding Algorithm in LDPC Coded BICMOFDM Systems

    Digital Video Broadcasting-Terrestrial (DVB-T) is the most widely deployed digital terrestrial television system worldwide with services on air in over thirty countries. In order to increase its spectral efficiency and to enable new services the DVB consortium has developed a new standard named DVB-T2. Latest and next-generation wireless broadcasting standards,...

    Provided By ISSN

  • White Papers // Jun 2011

    LDPC Concatenated Space-Time Block Coded System in Multipath Fading Environment: Analysis and Evaluation

    Irregular Low-Density Parity-Check (LDPC) codes have been found to show exceptionally good performance for single antenna systems over a wide class of channels. In this paper, the performance of LDPC codes with multiple antenna systems is investigated in flat Rayleigh and Rician fading channels for different modulation schemes. The focus...

    Provided By ISSN

  • White Papers // Apr 2013

    Multilayer Coding Mechanisms for Broadcasting over MIMO Networks

    In this paper, the authors first propose a design rule for constructing a proper multilayer code for Multiple-Input-Multiple-Output(MIMO) networks.. A number of recent source coding techniques compress the source signal into multiple layers such that a destination is able to reconstruct the original signal (with some distortion) even if it...

    Provided By ISSN

  • White Papers // Mar 2013

    Comparative Study Between Green Cloud Computing and Mobile Cloud Computing

    While searching for information about cloud computing over the internet, the author came across different computing keywords such as Green Computing and Mobile Computing. After so much of research on all these terms I myself tried to have the clear vision about them. This paper will help the researchers and...

    Provided By ISSN