Mansoura University

Displaying 1-35 of 35 results

  • White Papers // Oct 2013

    Fuzzy Commitment Scheme for Masked Iris Codes

    The fuzzy commitment scheme is one of most popular biometric cryptosystems that aim at securing cryptographic keys using biometrics. Because of the high recognition accuracy exhibited by the iris, iris-based fuzzy commitment schemes, among other modalities, provide the most practical performance rates. Unfortunately, existing iris-based fuzzy commitment schemes do not...

    Provided By Mansoura University

  • White Papers // May 2013

    Secret Medical Image Sharing and EPR Data Embedding Scheme over Cloud Computing Environment

    The fast development in the term of telecommunication helps on the appearance of variety of modern applications such as the telemedicine where the patients' digital data can transfer over insecure mediums between the doctors for farther diagnosis and dealing with these transmitted data. Therefore, the protection of the exchanged medical...

    Provided By Mansoura University

  • White Papers // Mar 2013

    Enhanced Diffusion Encryption for Video Transmission over Mobile WiMax Networks

    As a promising broadband wireless technology, WiMax has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMax but it still exposes to various attacks in. In this paper, three proposed chaos encryption...

    Provided By Mansoura University

  • White Papers // Dec 2012

    New SpiroPlanck Heuristics for High Energy Physics Networking and Future Internet Testbeds

    The need for data intensive Grids, and advanced networks with high performance that support the people science has made the high energy physics community a leading and a key co-developer of leading edge wide area networks. This paper gives an overview of the status for the world's research networks and...

    Provided By Mansoura University

  • White Papers // Oct 2012

    Simulated Tom Thumb, the Rule of Thumb for Autonomous Robots

    For a mobile robot to be truly autonomous, it must solve the Simultaneous Localization And Mapping (SLAM) problem. The authors develop a new metaheuristic algorithm called Simulated Tom Thumb (STT), based on the detailed adventure of the clever Tom Thumb and advances in researches relating to path planning based on...

    Provided By Mansoura University

  • White Papers // Aug 2012

    A Personal Identification Framework Based on Facial Image and Fingerprint Fusion Biometric

    Biometric based person identity verification is gaining more and more attention. Several studies have shown that multimodal biometric identification systems improve the recognition accuracy and reliability compared with recognition using a single biometric. This paper introduces a new personal identification framework that is based on the fusion of face and...

    Provided By Mansoura University

  • White Papers // Jul 2012

    Improved Max-Min Algorithm in Cloud Computing

    In this paper, a unique modification of Max-min algorithm is proposed. The algorithm is built based on comprehensive study of the impact of RASA algorithm in scheduling tasks and the atom concept of Max-min strategy. An Improved version of Max-min algorithm is proposed to outperform scheduling map at least similar...

    Provided By Mansoura University

  • White Papers // Jul 2012

    Database Security Protection Based on a New Mechanism

    The database security is one of the important issues that should take a complete attention from researchers. Although applying the traditional security mechanisms, the database still violate from both of external and internal users. So, the researchers develop a DataBase Intrusion Detection System (DBIDS) to detect intrusion as soon as...

    Provided By Mansoura University

  • White Papers // Jun 2012

    Go Heuristics for Coverage of Dense Wireless Sensor Networks

    Integration and scalable coordination of many sensor nodes in a Wireless Sensor Network (WSN) is among this century challenges. To provide energy-efficient communication protocol and coordination algorithm for topology maintenance, this requires employing global optimization of communication and sensing. In designing a sensor network, there are certain QoS parameters that...

    Provided By Mansoura University

  • White Papers // Jun 2012

    Distributing Graphic Rendering Using Grid Computing with Load Balancing

    Graphic rendering is expensive in terms of computation. The authors investigate distributing it by applying the powerful computing technique called grid computing, and showing how this technology has a great effectiveness and high performance. The paper shows how to develop a java drawing framework for drawing in the distributed environment...

    Provided By Mansoura University

  • White Papers // Feb 2012

    Feature Level Fusion of Palm Veins and Signature Biometrics

    Traditional biometric systems that based on single biometric usually suffer from problems like imposters' attack or hacking, unacceptable error rate and low performance. So, the need of using multimodal biometric system occurred .In this paper, a study of multimodal palm veins and signature identification is presented. Features of both modalities...

    Provided By Mansoura University

  • White Papers // Oct 2011

    Iris Recognition Based on LBP and Combined LVQ Classifier

    Iris recognition is considered as one of the best biometric methods used for human identification and verification, this is because of its unique features that differ from one person to another, and its importance in the security field. This paper proposes an algorithm for iris recognition and classification using a...

    Provided By Mansoura University

  • White Papers // Apr 2011

    Behavior Analysis in a Learning Environment to Identify the Suitable Learning Style

    Personalized adaptive systems rely heavily on the learning style and the learner's behavior. Due to traditional teaching methods and high learner/teacher ratios, a teacher faces great obstacles in the classroom. In these methods, teachers deliver the content and learners just receive it. Moreover, teachers can't cope with the individual differences...

    Provided By Mansoura University

  • White Papers // Apr 2011

    Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

    The use of embedded software is growing very rapidly. Accessing the internet is a necessary service which has large range of applications in many fields. The Internet is based on TCP/IP which is a very important stack. Although TCP/IP is very important there is not a software engineering model describing...

    Provided By Mansoura University

  • White Papers // Feb 2011

    Location Aided Hybrid Routing Algorithm for MANET

    In this paper, the authors propose a new hybrid routing protocol for MANET called Location Aided Hybrid Routing Protocol for MANET (LAHRP). The proposed routing algorithm not only aims to optimize bandwidth usage of MANETs by reducing the routing overload, but also extends battery life of the mobile devices by...

    Provided By Mansoura University

  • White Papers // Jan 2011

    Improving Quality of Business Networks for Information Systems

    Computer networks are essential part in computer-based information systems. The performance of these networks has a great influence on the whole information system. Measuring the usability criteria and customers satisfaction on small computer network is very important. In this article, an effective approach for measuring the usability of business network...

    Provided By Mansoura University

  • White Papers // Jan 2011

    Demystifying Cloud Computing

    Cloud computing is a new terminology that was added to IT jargon in early 2007. Still, people overuse this idiom to refer to things that may not relate to its actual definition and scope. Is it all about web hosting? Is it an old thing in new clothes? Why should...

    Provided By Mansoura University

  • White Papers // Dec 2010

    Fast Complex Valued Time Delay Neural Networks

    Here, a new idea to speed up the operation of complex valued time delay neural networks is presented. The whole data are collected together in a long vector and then tested as a one input pattern. The proposed fast complex valued time delay neural networks uses cross correlation in the...

    Provided By Mansoura University

  • White Papers // Dec 2010

    Face Recognition: A Literature Review

    The task of face recognition has been actively researched in recent years. This paper provides an up-to-date review of major human face recognition research. The authors first present an overview of face recognition and its applications. Then, a literature review of the most recent face recognition techniques is presented. Description...

    Provided By Mansoura University

  • White Papers // Dec 2010

    A Proposed Web Accessibility Framework for the Arab Disabled

    E-learning is a useful tool that has contributed in facilitating education for people around the globe. There is a need, however, for making e-learning available to disabled people. This paper presents a Web accessibility framework which offers the ease of the Web accessing for the Arab disabled users and facilitates...

    Provided By Mansoura University

  • White Papers // Dec 2010

    A Proposed Security Model for Web Enabled Business Process Management System

    Business Process Management Systems (BPMS) and technologies are currently used in many organizations' IT applications. This could lead to a dramatic operational efficiency improvement on their business and administrative environments. With these atmospheres, the security issue is becoming a much more important challenge in the BPMS literature. The Role-Based Access...

    Provided By Mansoura University

  • White Papers // Nov 2010

    Simulation of WiMAX Physical Layer: IEEE 802.16e

    In modern world wireless communication systems are involved in every part of life. WiMAX is the upcoming wireless system which uses IEEE standard 802.16. By using WiMAX technology the authors can overcome the limitations of the existing wireless communication like short coverage area, lack of security and low data rate....

    Provided By Mansoura University

  • White Papers // Nov 2010

    A Novel DSS Framework for E-Government

    A variety of DSS have been postulated for describing the characteristics of DSS. These frameworks are helpful in organizing and identifying the relationships of DSS. The identification of DSS applications is important in planning organization strategy for the deployment of information technology. DSS is defined as the use of computer...

    Provided By Mansoura University

  • White Papers // Jul 2010

    Optimizing Network Routing by Deducing a QoS Metric Using Rough Sets

    The routing within networks must satisfy the QoS metrics. In traditional data networks, routing is concerned on connectivity or cost. Routing protocols usually characterize the network with one or more metric(s). However, in order to support a wide range of QoS requirements, routing protocols need to have a more complex...

    Provided By Mansoura University

  • White Papers // Jul 2010

    Performance Evaluation of XML Web Services for Real-Time Applications

    Service-Oriented Architecture (SOA) has been becoming one of the most widely used methodologies for building and integrating different types of software applications. This because the extreme benefits that it offers to their adopters including agility, dynamicity, and loose-coupling. These benefits are usually missed in traditional software terminologies and practices. XML...

    Provided By Mansoura University

  • White Papers // Apr 2010

    UML Analysis for Quality Assurance Management System for Higher Education

    One of the most important concerns of the current institutions of higher education is the management process to ensure quality. The most important problems facing these institutions is the quality assurance evaluation process. One of the best ways to overcome this problem building a system based on a computer to...

    Provided By Mansoura University

  • White Papers // Feb 2010

    Intelligent Adaptive Intrusion Detection Systems Using Neural Networks (Comparitive Study)

    Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS's responsibility is to detect suspicious or unacceptable system...

    Provided By Mansoura University

  • White Papers // Nov 2009

    Investigating Performance of XML Web Services in Real-Time Business Systems

    Service-Oriented Architecture (SOA) is being one of the widely accepted methodologies in software market for building and integrating different kinds of software systems. This acceptance comes from the extreme benefits that it offers to their adopters including agility, dynamicity, and loose-coupling. These benefits are usually missed in traditional software terminologies...

    Provided By Mansoura University

  • White Papers // Nov 2009

    Intrusion Detection Using Rough Set Parallel Genetic Programming Based Hybrid Model

    Recently machine learning-based Intrusion Detection systems (IDs) have been subjected to extensive researches because they can detect both misuse and anomaly. Most of existing IDs use all features in the network packet to look for known intrusive patterns. In this paper a new hybrid model RSC-PGP (Rough Set Classification -...

    Provided By Mansoura University

  • White Papers // Aug 2009

    Business Process Modeling Languages for Information System Development

    It is known that different process models are used during various phases of the Business Process Modeling (BPM) life cycle. Many efforts have been introduced to overcome the disintegration between these process models to provide a standard process model for design and execution. However this integration is still a problem...

    Provided By Mansoura University

  • White Papers // Jun 2009

    Enhancement Misconfiguration Management of Network Security Components Using Range Algorithm

    Many companies and organizations use firewalls to control the access to their network infrastructure. When processing packages, conflicts due to rule overlaps can occur within the filtering policy. To solve these conflicts most firewall implementation use a first matching strategy through the ordering of rules. This way each packet processed...

    Provided By Mansoura University

  • White Papers // May 2009

    Fast Detection of Specific Information in Voice Signal Over Internet Protocol

    The world telecommunications industry caters to both wireline and wireless business. In the present Fourth Generation (4G), wireless world rapid change is the only constant factor. The biggest paradigm change being the move from circuit switched to packet switched technologies. Voice over Packet (VoP) is transforming telephony by rapidly replacing...

    Provided By Mansoura University

  • White Papers // Dec 2008

    A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks

    It is highly desirable to protect data traffic from unexpected changes as well as provide effective network utilization in the internetworking era. In this paper, the QoS management issue that utilizing the active network technology is discussed. Such algorithm is based on the proposed work is presented. Active networks seem...

    Provided By Mansoura University

  • White Papers // Dec 2008

    A Real-Time Intrusion Detection Algorithm for Network Security

    E-government is an important issue which integrates existing local area networks into a global network that provide many services to the nation citizens. This network requires a strong security infrastructure to guarantee the confidentiality of national data and the availability of government services. In this paper, a framework for network...

    Provided By Mansoura University

  • White Papers // Sep 2008

    Aligning Service Oriented Architecture and Business Process Management Systems to Achieve Business Agility

    Business agility is a new paradigm that is a solution for maintaining enterprise competitive advantage. Business improvement approaches, such as Total Quality Management, Business Process Reengineering, and Workflow Management Systems attempted to satisfy business agility concepts and requirements, but suffered from fatal limitations like lack of concepts definition and measurement,...

    Provided By Mansoura University

  • White Papers // Oct 2013

    Fuzzy Commitment Scheme for Masked Iris Codes

    The fuzzy commitment scheme is one of most popular biometric cryptosystems that aim at securing cryptographic keys using biometrics. Because of the high recognition accuracy exhibited by the iris, iris-based fuzzy commitment schemes, among other modalities, provide the most practical performance rates. Unfortunately, existing iris-based fuzzy commitment schemes do not...

    Provided By Mansoura University

  • White Papers // Oct 2011

    Iris Recognition Based on LBP and Combined LVQ Classifier

    Iris recognition is considered as one of the best biometric methods used for human identification and verification, this is because of its unique features that differ from one person to another, and its importance in the security field. This paper proposes an algorithm for iris recognition and classification using a...

    Provided By Mansoura University

  • White Papers // Jun 2009

    Enhancement Misconfiguration Management of Network Security Components Using Range Algorithm

    Many companies and organizations use firewalls to control the access to their network infrastructure. When processing packages, conflicts due to rule overlaps can occur within the filtering policy. To solve these conflicts most firewall implementation use a first matching strategy through the ordering of rules. This way each packet processed...

    Provided By Mansoura University

  • White Papers // Nov 2009

    Intrusion Detection Using Rough Set Parallel Genetic Programming Based Hybrid Model

    Recently machine learning-based Intrusion Detection systems (IDs) have been subjected to extensive researches because they can detect both misuse and anomaly. Most of existing IDs use all features in the network packet to look for known intrusive patterns. In this paper a new hybrid model RSC-PGP (Rough Set Classification -...

    Provided By Mansoura University

  • White Papers // Jul 2010

    Optimizing Network Routing by Deducing a QoS Metric Using Rough Sets

    The routing within networks must satisfy the QoS metrics. In traditional data networks, routing is concerned on connectivity or cost. Routing protocols usually characterize the network with one or more metric(s). However, in order to support a wide range of QoS requirements, routing protocols need to have a more complex...

    Provided By Mansoura University

  • White Papers // Apr 2010

    UML Analysis for Quality Assurance Management System for Higher Education

    One of the most important concerns of the current institutions of higher education is the management process to ensure quality. The most important problems facing these institutions is the quality assurance evaluation process. One of the best ways to overcome this problem building a system based on a computer to...

    Provided By Mansoura University

  • White Papers // Feb 2010

    Intelligent Adaptive Intrusion Detection Systems Using Neural Networks (Comparitive Study)

    Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS's responsibility is to detect suspicious or unacceptable system...

    Provided By Mansoura University

  • White Papers // Jul 2010

    Performance Evaluation of XML Web Services for Real-Time Applications

    Service-Oriented Architecture (SOA) has been becoming one of the most widely used methodologies for building and integrating different types of software applications. This because the extreme benefits that it offers to their adopters including agility, dynamicity, and loose-coupling. These benefits are usually missed in traditional software terminologies and practices. XML...

    Provided By Mansoura University

  • White Papers // Nov 2009

    Investigating Performance of XML Web Services in Real-Time Business Systems

    Service-Oriented Architecture (SOA) is being one of the widely accepted methodologies in software market for building and integrating different kinds of software systems. This acceptance comes from the extreme benefits that it offers to their adopters including agility, dynamicity, and loose-coupling. These benefits are usually missed in traditional software terminologies...

    Provided By Mansoura University

  • White Papers // Jan 2011

    Demystifying Cloud Computing

    Cloud computing is a new terminology that was added to IT jargon in early 2007. Still, people overuse this idiom to refer to things that may not relate to its actual definition and scope. Is it all about web hosting? Is it an old thing in new clothes? Why should...

    Provided By Mansoura University

  • White Papers // Nov 2010

    Simulation of WiMAX Physical Layer: IEEE 802.16e

    In modern world wireless communication systems are involved in every part of life. WiMAX is the upcoming wireless system which uses IEEE standard 802.16. By using WiMAX technology the authors can overcome the limitations of the existing wireless communication like short coverage area, lack of security and low data rate....

    Provided By Mansoura University

  • White Papers // Jan 2011

    Improving Quality of Business Networks for Information Systems

    Computer networks are essential part in computer-based information systems. The performance of these networks has a great influence on the whole information system. Measuring the usability criteria and customers satisfaction on small computer network is very important. In this article, an effective approach for measuring the usability of business network...

    Provided By Mansoura University

  • White Papers // Dec 2010

    A Proposed Security Model for Web Enabled Business Process Management System

    Business Process Management Systems (BPMS) and technologies are currently used in many organizations' IT applications. This could lead to a dramatic operational efficiency improvement on their business and administrative environments. With these atmospheres, the security issue is becoming a much more important challenge in the BPMS literature. The Role-Based Access...

    Provided By Mansoura University

  • White Papers // Dec 2010

    A Proposed Web Accessibility Framework for the Arab Disabled

    E-learning is a useful tool that has contributed in facilitating education for people around the globe. There is a need, however, for making e-learning available to disabled people. This paper presents a Web accessibility framework which offers the ease of the Web accessing for the Arab disabled users and facilitates...

    Provided By Mansoura University

  • White Papers // Apr 2011

    Behavior Analysis in a Learning Environment to Identify the Suitable Learning Style

    Personalized adaptive systems rely heavily on the learning style and the learner's behavior. Due to traditional teaching methods and high learner/teacher ratios, a teacher faces great obstacles in the classroom. In these methods, teachers deliver the content and learners just receive it. Moreover, teachers can't cope with the individual differences...

    Provided By Mansoura University

  • White Papers // Apr 2011

    Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

    The use of embedded software is growing very rapidly. Accessing the internet is a necessary service which has large range of applications in many fields. The Internet is based on TCP/IP which is a very important stack. Although TCP/IP is very important there is not a software engineering model describing...

    Provided By Mansoura University

  • White Papers // Dec 2010

    Fast Complex Valued Time Delay Neural Networks

    Here, a new idea to speed up the operation of complex valued time delay neural networks is presented. The whole data are collected together in a long vector and then tested as a one input pattern. The proposed fast complex valued time delay neural networks uses cross correlation in the...

    Provided By Mansoura University

  • White Papers // Dec 2010

    Face Recognition: A Literature Review

    The task of face recognition has been actively researched in recent years. This paper provides an up-to-date review of major human face recognition research. The authors first present an overview of face recognition and its applications. Then, a literature review of the most recent face recognition techniques is presented. Description...

    Provided By Mansoura University

  • White Papers // Nov 2010

    A Novel DSS Framework for E-Government

    A variety of DSS have been postulated for describing the characteristics of DSS. These frameworks are helpful in organizing and identifying the relationships of DSS. The identification of DSS applications is important in planning organization strategy for the deployment of information technology. DSS is defined as the use of computer...

    Provided By Mansoura University

  • White Papers // Feb 2011

    Location Aided Hybrid Routing Algorithm for MANET

    In this paper, the authors propose a new hybrid routing protocol for MANET called Location Aided Hybrid Routing Protocol for MANET (LAHRP). The proposed routing algorithm not only aims to optimize bandwidth usage of MANETs by reducing the routing overload, but also extends battery life of the mobile devices by...

    Provided By Mansoura University

  • White Papers // Feb 2012

    Feature Level Fusion of Palm Veins and Signature Biometrics

    Traditional biometric systems that based on single biometric usually suffer from problems like imposters' attack or hacking, unacceptable error rate and low performance. So, the need of using multimodal biometric system occurred .In this paper, a study of multimodal palm veins and signature identification is presented. Features of both modalities...

    Provided By Mansoura University

  • White Papers // Jun 2012

    Go Heuristics for Coverage of Dense Wireless Sensor Networks

    Integration and scalable coordination of many sensor nodes in a Wireless Sensor Network (WSN) is among this century challenges. To provide energy-efficient communication protocol and coordination algorithm for topology maintenance, this requires employing global optimization of communication and sensing. In designing a sensor network, there are certain QoS parameters that...

    Provided By Mansoura University

  • White Papers // Oct 2012

    Simulated Tom Thumb, the Rule of Thumb for Autonomous Robots

    For a mobile robot to be truly autonomous, it must solve the Simultaneous Localization And Mapping (SLAM) problem. The authors develop a new metaheuristic algorithm called Simulated Tom Thumb (STT), based on the detailed adventure of the clever Tom Thumb and advances in researches relating to path planning based on...

    Provided By Mansoura University

  • White Papers // Dec 2012

    New SpiroPlanck Heuristics for High Energy Physics Networking and Future Internet Testbeds

    The need for data intensive Grids, and advanced networks with high performance that support the people science has made the high energy physics community a leading and a key co-developer of leading edge wide area networks. This paper gives an overview of the status for the world's research networks and...

    Provided By Mansoura University

  • White Papers // May 2009

    Fast Detection of Specific Information in Voice Signal Over Internet Protocol

    The world telecommunications industry caters to both wireline and wireless business. In the present Fourth Generation (4G), wireless world rapid change is the only constant factor. The biggest paradigm change being the move from circuit switched to packet switched technologies. Voice over Packet (VoP) is transforming telephony by rapidly replacing...

    Provided By Mansoura University

  • White Papers // Dec 2008

    A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks

    It is highly desirable to protect data traffic from unexpected changes as well as provide effective network utilization in the internetworking era. In this paper, the QoS management issue that utilizing the active network technology is discussed. Such algorithm is based on the proposed work is presented. Active networks seem...

    Provided By Mansoura University

  • White Papers // Dec 2008

    A Real-Time Intrusion Detection Algorithm for Network Security

    E-government is an important issue which integrates existing local area networks into a global network that provide many services to the nation citizens. This network requires a strong security infrastructure to guarantee the confidentiality of national data and the availability of government services. In this paper, a framework for network...

    Provided By Mansoura University

  • White Papers // Aug 2012

    A Personal Identification Framework Based on Facial Image and Fingerprint Fusion Biometric

    Biometric based person identity verification is gaining more and more attention. Several studies have shown that multimodal biometric identification systems improve the recognition accuracy and reliability compared with recognition using a single biometric. This paper introduces a new personal identification framework that is based on the fusion of face and...

    Provided By Mansoura University

  • White Papers // Jul 2012

    Improved Max-Min Algorithm in Cloud Computing

    In this paper, a unique modification of Max-min algorithm is proposed. The algorithm is built based on comprehensive study of the impact of RASA algorithm in scheduling tasks and the atom concept of Max-min strategy. An Improved version of Max-min algorithm is proposed to outperform scheduling map at least similar...

    Provided By Mansoura University

  • White Papers // Jul 2012

    Database Security Protection Based on a New Mechanism

    The database security is one of the important issues that should take a complete attention from researchers. Although applying the traditional security mechanisms, the database still violate from both of external and internal users. So, the researchers develop a DataBase Intrusion Detection System (DBIDS) to detect intrusion as soon as...

    Provided By Mansoura University

  • White Papers // Jun 2012

    Distributing Graphic Rendering Using Grid Computing with Load Balancing

    Graphic rendering is expensive in terms of computation. The authors investigate distributing it by applying the powerful computing technique called grid computing, and showing how this technology has a great effectiveness and high performance. The paper shows how to develop a java drawing framework for drawing in the distributed environment...

    Provided By Mansoura University

  • White Papers // Mar 2013

    Enhanced Diffusion Encryption for Video Transmission over Mobile WiMax Networks

    As a promising broadband wireless technology, WiMax has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMax but it still exposes to various attacks in. In this paper, three proposed chaos encryption...

    Provided By Mansoura University

  • White Papers // May 2013

    Secret Medical Image Sharing and EPR Data Embedding Scheme over Cloud Computing Environment

    The fast development in the term of telecommunication helps on the appearance of variety of modern applications such as the telemedicine where the patients' digital data can transfer over insecure mediums between the doctors for farther diagnosis and dealing with these transmitted data. Therefore, the protection of the exchanged medical...

    Provided By Mansoura University

  • White Papers // Aug 2009

    Business Process Modeling Languages for Information System Development

    It is known that different process models are used during various phases of the Business Process Modeling (BPM) life cycle. Many efforts have been introduced to overcome the disintegration between these process models to provide a standard process model for design and execution. However this integration is still a problem...

    Provided By Mansoura University

  • White Papers // Sep 2008

    Aligning Service Oriented Architecture and Business Process Management Systems to Achieve Business Agility

    Business agility is a new paradigm that is a solution for maintaining enterprise competitive advantage. Business improvement approaches, such as Total Quality Management, Business Process Reengineering, and Workflow Management Systems attempted to satisfy business agility concepts and requirements, but suffered from fatal limitations like lack of concepts definition and measurement,...

    Provided By Mansoura University