King Saud University

Displaying 41-55 of 55 results

  • White Papers // Jan 2011

    Security Risks and Modern Cyber Security Technologies for Corporate Networks

    This paper aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate...

    Provided By King Saud University

  • White Papers // Jan 2011

    Justifying ERP Investment: The Role and Impacts of Business Case A Literature Survey

    Now-a-days, businesses are emerged to be expanded. And business stakeholders from different industries compete to open new markets in new geographic areas, which indeed raise the necessity to have ubiquitous systems to follow and simplifying these expanded and inflated enterprise organizations. ERP systems are booming these days. But it suffers...

    Provided By King Saud University

  • White Papers // Nov 2010

    Sensor Based Framework for Secure Multimedia Communication in VANET

    Multimedia communication has attracted the interest of the research community. Multimedia information includes several applications like television, chatting, gaming, internet, video/audio-on-demand, video conferencing, etc. Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper, the authors proposed a framework for...

    Provided By King Saud University

  • White Papers // Oct 2010

    A Modular Software System for Planning and Cost Modeling of a Wide Area Network

    This research presents a modular software system that computes the mathematical relationships needed to evaluate planning and business-oriented models for estimation of the cost of a set of current Wide Area Networks (WAN) transmission technologies. Based on the software modular design, a program for constructing a minimum-cost WAN design is...

    Provided By King Saud University

  • White Papers // Jun 2010

    Traffic Modeling and Provisioning of a P2P-Based VOD Architecture

    Building a scalable Video On Demand (VOD) architecture is essential for the optimization of the VOD service cost and to support a very large VOD content library. The Peer-To-Peer (P2P) VOD architecture works towards achieving this goal, by distributing the video files to the user's set-top boxes at the network...

    Provided By King Saud University

  • White Papers // Jun 2010

    Advance Security Warning System: Wireless Technologies

    This is a proven fact in the modern medical sciences that all human bodies develop from a combination of stem cells, which matures to form a fetus and so on into a neonate. This procedure is natural, (Until and unless, under certain circumstances where it may not be able occur...

    Provided By King Saud University

  • White Papers // Apr 2010

    Risk Identification and Preemptive Scheduling in Software Development Life Cycle

    Software development has emerged as a disciplined discipline and the use of process models to develop the software has increased over time. Although the software industry is blessed with quite a few tool driven approaches, and the usage of technology is increasing yet the amount of risks faced by the...

    Provided By King Saud University

  • White Papers // Mar 2010

    Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'

    User authentication in Wireless Sensor Networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, a two-factor...

    Provided By King Saud University

  • White Papers // Dec 2009

    The Wiimote With SAPI: Creating an Accessible Low-Cost, Human Computer Interface for the Physically Disabled

    In this paper the authors report on an inexpensive device that helps a person with physical disability to interact with the Web. The human computer interface is made through a head tracking pointer. The head tracking pointer consists of the Wii controller (Wiimote), a low cost and readily available game...

    Provided By King Saud University

  • White Papers // Oct 2009

    A Planning Methodology and Cost Models for Designing a Wide Area Network

    The planning and cost-modeling of large-scale computer Wide Area Networks (WANs) are important issues for carrier service providers, Internet Service Providers (ISP), and for large enterprises that use WANs. This paper develop several quantitative and business-oriented cost models that define the mathematical relationships needed to derive the cost estimate of...

    Provided By King Saud University

  • White Papers // Jul 2009

    An Empirical Performance Study of Connection Oriented Time Warp Parallel Simulation

    Time warp is a well-known optimistic mechanism for parallel execution of simulation programs. Implementing time warp using a connection-oriented communication approach is proposed in the literature as a way to improve time warp performance because it allows for the use of more efficient event queue implementations. However, no empirical performance...

    Provided By King Saud University

  • White Papers // Jun 2009

    The Role and Impact of Business Process Management in Enterprise Systems Implementation

    The purpose of this paper is to investigate the role and impact of Business Process Management (BPM) in successful Enterprises System (ES) software package implementation. A literature review was conducted to understand the critical success factors in successful ES implementation. This paper addresses the role and impact of BPM in...

    Provided By King Saud University

  • White Papers // Jun 2009

    Developing an Integrated Data Mining Environment in ERP-CRM Model - A Case Study of MADAR

    As Enterprise Resource Planning (ERP) implementation has become more popular and suitable for every business organization, it has become an essential factor for the success of a business. This paper shows the best integration of ERP with Customer Relationship Management (CRM). Data Mining is overwhelming the integration in this model...

    Provided By King Saud University

  • White Papers // May 2009

    The Effects of Data Mining in ERP-CRM Model - A Case Study of MADAR

    As Enterprise Resource Planning (ERP) implementation has become more popular and suitable for every business organization, it has become a essential factor for the success of a business. This paper shows the best integration of ERP with Customer Relationship Management (CRM). Data Mining is overwhelming the integration in this model...

    Provided By King Saud University

  • White Papers // Nov 2008

    Creating SMS-Based Applications: Using HyperTerminal to Send and Receive SMS Messages

    Short Message Service (SMS) is provided by all cell phone operators and is extensively used by cell phone users. There is a wide range of applications demand in which a user interacts with a PC application via SMS message. This series of papers provides step by step tutorial for creating...

    Provided By King Saud University

  • White Papers // Jun 2013

    Towards Pervasive Computing Environments with Cloud Services

    Pervasive computing aims at creating environments saturated with embedded and portable computing devices surrounding the users and providing them with many interesting services. It has been gradually applied into the people everyday life and its applications are becoming more and more extensive day by day. However, exploiting its full potential...

    Provided By King Saud University

  • White Papers // Jan 2014

    Secure Routing and Data Transmission in Mobile Ad Hoc Networks

    In this paper, the authors present an IDentity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a...

    Provided By King Saud University

  • White Papers // May 2012

    Representing Access Control Policies in Use Cases

    Security requirements of a software product need to receive attention throughout its development lifecycle. This paper proposes the required notation and format to represent security requirements, especially access control policies in use case diagram and use case description. Such enhancements offer simple representation for positive and negative authorization, grouping sensitive...

    Provided By King Saud University

  • White Papers // Jan 2013

    Cyber Security Using Arabic CAPTCHA Scheme

    Bots are programs that crawl through the web site and make auto registrations. CAPTCHAs, using Latin script, are widely used to prevent automated bots from abusing online services on the World Wide Web. However, many of the existing English based CAPTCHAs have some inherent problems and cannot assure the security...

    Provided By King Saud University

  • White Papers // Oct 2013

    Can a Single Security Framework Address Information Security Risks Adequately?

    There is no doubt that modern society depends heavily on information technology in nearly every facet of human activity. Organizations of all kinds are increasingly exposed to various kinds of risks, including information technology risks. There are many security standards and frameworks available to help organizations manage these risks. The...

    Provided By King Saud University

  • White Papers // Nov 2012

    A Survey on Sensor-Cloud: Architecture, Applications, and Approaches

    Now-a-days, Wireless Sensor Network (WSN) applications have been used in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. However, due to the limitations of WSNs in terms of memory, energy, computation, communication, and scalability, efficient management of the large number of WSNs data in...

    Provided By King Saud University

  • White Papers // Apr 2013

    An Efficient Biometric Authentication Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. User authentication is necessary for legitimate access control in WSNs. Sensors have limited processing power, bandwidth, memory, and limited communication...

    Provided By King Saud University

  • White Papers // Mar 2010

    Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'

    User authentication in Wireless Sensor Networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, a two-factor...

    Provided By King Saud University

  • White Papers // Jun 2009

    The Role and Impact of Business Process Management in Enterprise Systems Implementation

    The purpose of this paper is to investigate the role and impact of Business Process Management (BPM) in successful Enterprises System (ES) software package implementation. A literature review was conducted to understand the critical success factors in successful ES implementation. This paper addresses the role and impact of BPM in...

    Provided By King Saud University

  • White Papers // Jan 2011

    Justifying ERP Investment: The Role and Impacts of Business Case A Literature Survey

    Now-a-days, businesses are emerged to be expanded. And business stakeholders from different industries compete to open new markets in new geographic areas, which indeed raise the necessity to have ubiquitous systems to follow and simplifying these expanded and inflated enterprise organizations. ERP systems are booming these days. But it suffers...

    Provided By King Saud University

  • White Papers // Oct 2011

    A Model Approach for the Analysis of Dominant Factors in ERP Software Implementation

    The recent advancement and development in Enterprise Resource Planning (ERP) Software Systems has been a major incident in the software industry in the last decades and their application is rising hastily in all industries. The recent research shows that the total revenue in the ERP software market is approaching to...

    Provided By King Saud University

  • White Papers // Apr 2013

    A Comparative Analysis and Evaluation of Open Source ERP Systems

    An ERP system is a system that needs to create integrated solutions in order to manage the bulk of operations inside a company or organization. Also ERP system is a critical and important investment that can affect the overall performance of a company. Open source ERP systems are often targeted...

    Provided By King Saud University

  • White Papers // Jun 2009

    Developing an Integrated Data Mining Environment in ERP-CRM Model - A Case Study of MADAR

    As Enterprise Resource Planning (ERP) implementation has become more popular and suitable for every business organization, it has become an essential factor for the success of a business. This paper shows the best integration of ERP with Customer Relationship Management (CRM). Data Mining is overwhelming the integration in this model...

    Provided By King Saud University

  • White Papers // Nov 2010

    Sensor Based Framework for Secure Multimedia Communication in VANET

    Multimedia communication has attracted the interest of the research community. Multimedia information includes several applications like television, chatting, gaming, internet, video/audio-on-demand, video conferencing, etc. Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper, the authors proposed a framework for...

    Provided By King Saud University

  • White Papers // Apr 2013

    Intrusion Detection Systems in Wireless Sensor Networks: A Review

    Wireless Sensor Networks (WSNs) are composed of sensor nodes and sinks. Sensor nodes have the capability of self-healing and self-organizing. Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. Their distributed nature, multi-hop data forwarding, and open wireless medium are the...

    Provided By King Saud University