Science Publications

Displaying 1-40 of 384 results

  • White Papers // Apr 2015

    Organization Information Ecology and E-Commerce Adoption: Effect on Organizational SMEs Performance

    Electronic Commerce (EC) has recently become the subject of interest of many researchers involved in behavioral and technology acceptance. EC was heavily studied in developed countries, but there are only a few narrowly focused studies on EC adoption in developing countries, especially in the context of Small and Medium Enterprises...

    Provided By Science Publications

  • White Papers // Apr 2015

    Coupling Routing Algorithm and Data Encoding for Low Power Networks on Chip

    The routing algorithm used in a Network-on-Chip (NoC) has a strong impact on both the functional and non-functional indices of the overall system. Traditionally, routing algorithms have been designed considering performance and cost as the main objectives. In this paper, the authors focus on two important non-functional metrics, namely, power...

    Provided By Science Publications

  • White Papers // Mar 2015

    A Modified Key Partitioning for Bigdata Using MapReduce in Hadoop

    In the period of big data, massive amounts of structured and unstructured data are being created every day by a multitude of ever present sources. Big data is complicated to work with and needs extremely parallel software executing on a huge number of computers. MapReduce is a current programming model...

    Provided By Science Publications

  • White Papers // Mar 2015

    Document Clustering Based on Firefly Algorithm

    Document clustering is widely used in information retrieval however; existing clustering techniques suffer from local optima problem in determining the k-number of clusters. Various efforts have been put to address such drawback and this includes the utilization of swarm-based algorithms such as particle swarm optimization and ant colony optimization. This...

    Provided By Science Publications

  • White Papers // Mar 2015

    Integrating Correlation Clustering and Agglomerative Hierarchical Clustering for Holistic Schema Matching

    Holistic schema matching is the process of carrying off several numbers of schemas as an input and outputs the correspondences among them. Treating large number of schemas may consume longer time with poor quality. Therefore, several clustering approaches have been proposed in order to reduce the search space by partitioning...

    Provided By Science Publications

  • White Papers // Jan 2015

    Mining Level-Crossing Association Rules From Large Databases

    Existing algorithms for mining association rule at multiple concept level, restricted mining strong association among the concept at same level of a hierarchy. However, mining level-crossing association rule at multiple concept level may lead to the discovery of mining strong association among at different level of hierarchy. In this paper,...

    Provided By Science Publications

  • White Papers // Jan 2015

    Testing Virtual Reconfigurable Circuit Designed for a Fault Tolerant System

    In this paper, the authors describe about the testing of Virtual Reconfigurable Circuit (VRC) designed and implemented for a fault tolerant system which averages the (three) sensor inputs. The circuits that are to be tested are those which are successfully evolved in this system under different situations such as all...

    Provided By Science Publications

  • White Papers // Jan 2015

    Functional Link Artificial Neural Network for Classification Task in Data Mining

    In solving classification task of data mining, the traditional algorithm such as multi-layer perceptron takes longer time to optimize the weight vectors. At the same time, the complexity of the network increases as the number of layers increases. In this paper, the authors have used Functional Link Artificial Neural Networks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Some P-RAM Algorithms for Sparse Linear Systems

    In this paper, the authors will explain the method of representing a sparse matrix in parallel by using PRAM model. PRAM model is a shared memory model. According to the researchers, the PRAM model will survive as a theoretically convenient model of parallel computation and as a starting point for...

    Provided By Science Publications

  • White Papers // Jan 2015

    Exploring Spatial ARM (Spatial Association Rule Mining) for Geo-Decision Support System

    Geographical Decision Support System (Geo-DSS) is a demanding field, since enormous amount of spatial data have been collected in various applications, ranging from remote sensing to GIS, computer cartography, environmental assessment and planning. Although, some efforts were made to combine spatial mining with spatial decision support system but mostly researchers...

    Provided By Science Publications

  • White Papers // Jan 2015

    pmonpp: Pthread Monitor Preprocessor

    Monitors have become an exceedingly important synchronization mechanism because they are a natural generalization of the object-oriented programming. A monitor construct encapsulates private data with public methods to operate on that data. Although, the p-thread library contains dozens of functions for threading and synchronization, it does not provide direct support...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Iterative Method for Algorithms Implementation on a Limited Dynamically Reconfigurable Hardware

    In this paper, the authors propose a framework and a combined temporal partitioning and design space exploration method for run time reconfigurable processors. Their objective is to help designers to implement an algorithm in limited FPGA area resources while respecting the execution time constraint. The algorithm to be implemented is...

    Provided By Science Publications

  • White Papers // Jan 2015

    Stochastically Simulating Low Morale - A Risk Factor Effect on Risk Management

    One of the proposed purposes for software process simulation is the management of software development risks, usually discussed within the category of project planning/management. One of the proposed purposes for software process simulation is the management of software development risks, usually discussed within the category of project planning and management....

    Provided By Science Publications

  • White Papers // Jan 2015

    Towards a Temporal Multilevel Secure Database (TMSDB)

    Standard relational databases are used to store the state of reality at a single moment of time. Temporal databases are used to store time-varying data. Multi-level secure databases are used to securely store highly sensitive data. Each of these databases serves its purpose well, but if the authors were to...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effect of Data Processing on Data Quality

    Geographical Information Systems (GISs) are computer based system that is used to store, manipulate and analyze a very wide variety of subjects and fields dealing with: civil engineering, environment, natural science, administration, industry and economy. This leads to great variety of resources. This variety of resources and the large available...

    Provided By Science Publications

  • White Papers // Jan 2015

    Performance Analysis of Data Mining Tools Cumulating with a Proposed Data Mining Middleware

    Data mining has becoming increasingly popular in helping to reveal important knowledge from the organization's databases and has led to the emergence of a variety of data mining tools to help in decision making. Present paper described a test bed to investigate five major data mining tools, namely IBM intelligent...

    Provided By Science Publications

  • White Papers // Jan 2015

    FPGA Implementation of Power Aware FIR Filter Using Reduced Transition Pipelined Variable Precision Gating

    With the emergence of portable computing and communication system, power awareness is one of the major objectives of VLSI design. This is its ability to scale power consumption based on the time-varying nature of inputs. Even though the system is not designed for being power aware, systems display variations in...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effective Load Metric and Efficient Initial Job Placement for Dynamic Load Balancing in Cluster

    High performance clusters are being configured specially to give data centers that require extreme performance and the processing power they need. When the data is accessed across clusters the data latency time has significant impact on the performance. In the literature it is given that memory and I/O have become...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Reconfigurable Execution Core for Merged DSP Microcontroller

    In this paper, the authors present an execution core which can be reconfigured either for calculation of digital convolution or for computation of discrete orthogonal transform by appropriate local buffer initialization of processing cells. It is shown that the data flow pattern can be changed by a single bit control...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Efficient Approach for Computing Silhouette Coefficients

    One popular approach for finding the best number of clusters (K) in a data set is through computing the silhouette coefficients. The silhouette coefficients for different values of K, are first found and then the maximum value of these coefficients is chosen. However, computing the silhouette coefficient for different Ks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Low Power Hardware Implementation of High Speed FFT Core

    Fourier transforms play an important role in many digital signal processing applications including speech, signal and image processing. Applications based on Fast Fourier Transform (FFT) such as signal and image processing requires high computational power. This paper proposes the implementation of radix-4 based parallel pipelined fast fourier transform processor which...

    Provided By Science Publications

  • White Papers // Jan 2015

    Implementing a Large Data Bus VLIW Microprocessor

    Microprocessors have grown tremendously in its computing and data crunching capability since the early days of the invention of a microprocessor. Today, most microprocessors in the market are at 32 bits, while the latest microprocessors from IBM, Intel and AMD are at 64 bits. To further grow the computational capability...

    Provided By Science Publications

  • White Papers // Jan 2015

    Distributed Shared Memory Consistency Object-Based Model

    Distributed Shared Memory (DSM) systems represent a successful hybrid of two parallel computer classes: shared-memory multiprocessors and distributed computer systems. They provide the shared memory abstraction in systems with physically distributed memories and consequently combine the advantages of both approaches. A novel model that describes consistency in shared memory was...

    Provided By Science Publications

  • White Papers // Jan 2015

    Teaching Computer Organization and Architecture Using Simulation and FPGA Applications

    In this paper, the authors present the design concepts and realization of incorporating micro-operation simulation and FPGA implementation into a teaching tool for computer organization and architecture. This teaching tool helps computer engineering and computer science students to be familiarized practically with computer organization and architecture through the development of...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases

    In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper, the authors presented a Secure Concurrency Control Protocol (SCCP) based on...

    Provided By Science Publications

  • White Papers // Jan 2015

    Communication Architecture Synthesis for Multi-Bus SoC

    In the System-on-Chip (SoC) design, the synthesis of communication architecture constitutes the bottleneck which can affect the performances of the system. Various schemes and protocols can be necessary, just as various topologies of interconnection. To reduce the complexity of the communications refinement, the authors present in this paper a model...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Fault Tolerant Reversible Gate for Nanotechnology Based Systems

    In this paper, the authors propose a novel reversible logic gate, NFT. It is a parity preserving reversible logic gate, that is, the parity of the outputs matches that of the inputs. They demonstrate that the NFT gate can implement all Boolean functions. It renders a wide class of circuit...

    Provided By Science Publications

  • White Papers // Jan 2015

    Performance Analysis of a 32-Bit Multiplier with a Carry-Look-Ahead Adder and a 32-Bit Multiplier with a Ripple Adder Using VHDL

    In this paper, the authors present a performance analysis of two different multipliers for unsigned data, one uses a carry-look-ahead adder and the second one uses a ripple adder. The paper's main focus is on the speed of the multiplication operation on these 32-bit multipliers which are modeled using VHDL,...

    Provided By Science Publications

  • White Papers // Jan 2015

    Efficient Reversible Montgomery Multiplier and Its Application to Hardware Cryptography

    Power analysis is a physical attack to crypto-systems such as smart card, tamperproof "Black box" and micro-chip. It exploits the fact that the power dissipation of an electronic circuit depends on the actions performed in it. The researchers describe Simple Power Analysis (SPA) and Differential Power Analysis (DPA) attacks which...

    Provided By Science Publications

  • White Papers // Dec 2014

    Android Based Energy Aware Framework for Porting Legacy Applications

    Trend is growing towards using complex multimedia functions on smaller devices. In this paper, the authors explore the effect of migrating legacy signal processing software applications algorithms from large form factor devices to the smaller one such as handheld mobile devices known as Energy Conscious Mobile Computing Systems (EConMCS). They...

    Provided By Science Publications

  • White Papers // Dec 2014

    Area Efficient Distributed Arithmetic Discrete Cosine Transform Using Modified Wallace Tree Multiplier

    In this paper, by using the modified Wallace tree multiplier, an error compensated adder tree is constructed in order to round off truncation errors and to obtain high through put discrete cosine transform design. Peak Signal to Noise Ratio (PSNR) is met efficiently since modified Wallace tree method is an...

    Provided By Science Publications

  • White Papers // Dec 2014

    RTOS Implementation of Non-Linear System Using Multi Tasking, Scheduling and Critical Section

    RTOS based embedded systems are designed with priority based multiple tasks. Inter task communication and data corruptions are major constraints in multi-tasking RTOS system. This paper the authors describe about the solution for these issues with an example real-time Liquid level control system. Message queue and mail box are used...

    Provided By Science Publications

  • White Papers // Nov 2014

    From Data Mining and Knowledge Discovery to Big Data Analytics and Knowledge Extraction for Applications in Science

    Data mining for "Knowledge discovery in databases" and associated computational operations first introduced in the mid-1990 s can no longer cope with the analytical issues relating to the so-called "Big data". The recent buzzword big data refers to large volumes of diverse, dynamic, complex, longitudinal and/or distributed data generated from...

    Provided By Science Publications

  • White Papers // Nov 2014

    Resource Broker Management by Adopting Self-Adaptive Multi-Instance Broker Scheduling in Grid Computing

    A grid resource broker seeks to assign the appropriate jobs to the appropriate resources as part of resource management in the multi-grid environment. Multi instances of the broker system provide multiple instances of brokers to simultaneously process jobs between multiple resources in a hierarchical cluster grid environment. In this paper,...

    Provided By Science Publications

  • White Papers // Oct 2014

    The Impact of Cognitive Trust and E-WOM on Purchase Intention in C2C E-Commerce Site

    In the last few years, the number of Internet users in Indonesia was growing rapidly as many people started to use e-commerce sites. Utilization of C2C (Customer-To-Customer) e-commerce in particular has a risk that may reduce people interest in online shopping. Of the many factors that may influence online shopping...

    Provided By Science Publications

  • White Papers // Sep 2014

    A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining

    Websites on the internet are useful source of information in the authors' day-to-day activity. Web Usage Mining (WUM) is one of the major applications of data mining, artificial intelligence and so on to the web data to predict the user's visiting behaviors and obtains their interests by analyzing the patterns....

    Provided By Science Publications

  • White Papers // Aug 2014

    A Comparative Performance Analysis of Multiple-Input Multiple-Output Using MATLAB with Zero Forcing and Minimum Mean Square Error Equalizers

    One of the major bottlenecks encountered in the wireless channel has been multipath propagation. Over the years, methods have been devised to reduce its effect on the quality of information being transmitted. Multiple-Input Multiple-Output (MIMO) can be used to reduce power consumption and increase capacity it can also reduce both...

    Provided By Science Publications

  • White Papers // Aug 2014

    Inverse Discrete Fourier Transform-Discrete Fourier Transform Techniques for Generating and Receiving Spectrally Efficient Frequency Division Multiplexing Signals

    Demand from wireless communications has always necessitated a search for techniques to save the precious wireless spectrum. Orthogonal Frequency Division Multiplexing (OFDM) has been proposed as a multi-carrier scheme that provides immunity against the frequency selective channel, therefore, enabling efficient utilization of the spectrum. In OFDM, the subcarriers are placed...

    Provided By Science Publications

  • White Papers // Aug 2014

    Dynamic Partial Reconfiguration Contribution on System on Programmable Chip Architecture for Motor Drive Implementation

    Now-a-days, due to technology advances and also with the increasingly requirements from applications supported by contemporary embedded systems, they became more and more complex, which have a direct impact on the design of such systems. Besides low cost and tight time to market, other constraints, like for instance the limited...

    Provided By Science Publications

  • White Papers // Aug 2014

    Comparative of Mediator Approach for Database Integration

    Six applications which are based on mediator approach have been reviewed in this paper. In practice, the mediator is used to integrate and access data from different data sources. The important characteristics for the implementation of mediator approach have been identified. This includes types of data, file format and object...

    Provided By Science Publications

  • White Papers // Sep 2009

    A Performance Study of Reactive Multicast Routing Protocols in Virtual Class Room Using Mobile Ad Hoc Network

    A great deal of excitement has recently propelled Mobile Learning to the forefront of educational technology. The exponential growth of mobile technology in the recent years, increase in the availability of high-bandwidth network, advances in wireless technologies and popularity of handheld devices, have opened up new accessibility opportunities for education....

    Provided By Science Publications

  • White Papers // Jan 2010

    Building an e-Government e-Trust Infrastructure

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens. However, this was...

    Provided By Science Publications

  • White Papers // Mar 2010

    Advanced Information Technology of Slot-Switching Network Schemes for on All-Optical Variable-Length Packet

    The purpose of this paper was to investigate all optical packet switching, because it was the key to the success of the future Internet. It can meet the stringent bandwidth requirement of future Internet applications, such as real-time video streaming. Due to the lack of optical Random Access Memory (RAM),...

    Provided By Science Publications

  • White Papers // Jan 2010

    Developing a Secure Web Service Architecture for SVG Image Delivery

    Web Services are substantially growing and become vital for businesses and organizations. A major concern, especially for mission-critical applications is Security. This study focuses on developing Scalable Vector Graphics (SVG) as Web services. In particular, the authors develop a service oriented architecture that securely manages SVG Web services using the...

    Provided By Science Publications

  • White Papers // Jan 2010

    Heterogeneous GPRS-WLAN Integration Based on Ad-Hoc Networks

    In heterogeneous architecture vertical handoffs let users have service from both GPRS and WLAN without any session termination and seamless to the end user. In international literature there are many researches trying to propose the merging of WLAN and GPRS networks into one heterogeneous interworking system. The loose coupling and...

    Provided By Science Publications

  • White Papers // Feb 2010

    Exploring Critical Determinants in Deploying Mobile Commerce Technology

    The research's problem lies in the fact that deploying m-commerce technology in Jordan represents the first serious trail to understand and explore the critical determinants that affect deploying mobile commerce technology. Approach: This research applied TAM model using the following variables: Perceived trust, perceived usefulness, perceived ease of use, social...

    Provided By Science Publications

  • White Papers // Jan 2010

    Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network

    This study presents a technique for improving the Quality of Service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a given QoS and low priority cells are allowed to enter the buffer, to...

    Provided By Science Publications

  • White Papers // Oct 2009

    Chemical Composition of Propolis From Different Regions in Java and Their Cytotoxic Activity

    Propolis samples from tropical zones, such as Java (Indonesia) with its vast biodiversity, have become a subject of increasing scientific and economic attention. The association of the chemical composition of propolis from different geographic regions with cytotoxic activities led to the identification of active principles, a fundamental tool to achieve...

    Provided By Science Publications

  • White Papers // Jan 2010

    A Free Educational Java Framework for Graph Algorithms

    In the teaching of graph theory algorithms it is important that students can experiment them on numerical instances in order to fully understand their logical meaning and to learn how they can be implemented. The framework, which is currently in use at the University of Bologna, and is available on-line,...

    Provided By Science Publications

  • White Papers // Jan 2010

    JBOOM: Java Based Object Oriented Model of Software Configuration Management

    Most of the present Software Configuration Management systems deal with version and configurations in the form of files and directories, the need today is to have a Software Configuration Management system that handles versions and configurations directly in terms of functions (Program Module). A major objective of this research is...

    Provided By Science Publications

  • White Papers // Nov 2009

    The Impact Of CRM On The Customer Satisfaction In Agricultural Bank

    The last several years saw the rise of Customer Relationship Management (CRM) as important business approach. CRM is a strategy that goes beyond increasing transaction volume. Its objectives are to increase profitability, revenue and customer satisfaction. To achieve CRM, a companywide set of tools, technologies and procedures promote the relationship...

    Provided By Science Publications

  • White Papers // Mar 2010

    UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams From an Event Table

    Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive...

    Provided By Science Publications

  • White Papers // Dec 2009

    Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks

    A Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications

  • White Papers // Jul 2010

    Business Continuity Planning: Are We Prepared for Future Disasters

    ? Natural and man-made disasters could cause a lot of monetary, mortality and morbidity losses for the business' operations such as: Activities, products and services. In order to minimize losses from such disasters, it is essential to prepare and implement effective business continuity plans that could deal with abnormal conditions....

    Provided By Science Publications

  • White Papers // Jan 2010

    An Approach for Detecting Attacks in Mobile Adhoc Networks

    The security of data becomes more important with the increased use of commercial applications over wireless network environments. The authors presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node...

    Provided By Science Publications

  • White Papers // Mar 2010

    Automated Position System Implementation Over Vehicular Ad Hoc Networks in 2-Dimension Space

    The real world scenario have changed from the wired connection to wireless connection. Over the years software development has responded to the increasing growth of wireless connectivity in developing network enabled software. The problem arises in the wireless domain due to random packet loss in transport layer and as well...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Jan 2010

    Operating System Support for Wireless Sensor Networks

    In a wireless sensor network, several sensor nodes obtain local data and communicate among themselves in order to create a global vision of an object of study. The idea of a self-managed network of low-power, autonomous devices, that collects data from an environment and propagates information through a wireless link...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Dec 2010

    Hybrid Algorithm for Privacy Preserving Association Rule Mining

    The objective of the hybrid algorithm for privacy preserving data mining is to hide certain sensitive information so that they cannot be discovered through association rule mining techniques. The sensitive items whether in Left Hand Side (LHS) or Right Hand Side (RHS) of the rule cannot be inferred through association...

    Provided By Science Publications

  • White Papers // Jan 2015

    Mining Level-Crossing Association Rules From Large Databases

    Existing algorithms for mining association rule at multiple concept level, restricted mining strong association among the concept at same level of a hierarchy. However, mining level-crossing association rule at multiple concept level may lead to the discovery of mining strong association among at different level of hierarchy. In this paper,...

    Provided By Science Publications

  • White Papers // Jul 2014

    Effects of Consumers' Trust and Attitude Toward Online Shopping

    In this paper, the authors investigated the effects of consumers' trust and attitude toward online shopping. Attitude is referred to as a positive or negative evaluation of people, activities, ideas, objects, event or just about anything in the environment. Different facets of the e-shopping behavior of consumers have been investigated...

    Provided By Science Publications

  • White Papers // Jun 2009

    Managers Empowering Employees

    An effective way for managers to deal with direct reports is to empower them more, but many managers seem unable to let go. Once employees in the organization are empowered by management, shared values provide the only practical way to ensure that everyone is aimed in the same direction. Corporate...

    Provided By Science Publications

  • White Papers // Nov 2010

    Forecasting Daily Demand in Cash Supply Chains

    Cash supply chains play a vital role for the efficiency of banking systems. This complex string of interrelations required to circulate currency from central banks to end users and back, is a special case of closed-loop supply chains. Currency circulates freely between different stages, such as central bank, Cash In...

    Provided By Science Publications

  • White Papers // Sep 2011

    Investigating Individuals' Intention to be Involved in Knowledge Management Process

    The business environment has changed over the past decades and the foundation of industrialized economics has shifted from natural resources to intellectual assets. Thus, knowledge is increasingly becoming the main asset that contributes to the competitive advantage of many organizations. As a consequence, Knowledge Management (KM) processes implementation is wide...

    Provided By Science Publications

  • White Papers // Sep 2011

    Trade Promotions and Suppliers' Market Power

    Trade promotions are usually negotiated reductions in invoiced dollars from manufacturers to retailers and are not a particularly new phenomenon. However, research into how they work, particularly from a supplier's perspective, needs considerable development. The lack of firm-level data has seriously hampered the research into trade promotions, as most firms...

    Provided By Science Publications

  • White Papers // Feb 2011

    Using Metadata Analysis and Base Analysis Techniques in Data Qualities Framework for Data Warehouses

    The qualities of data contain in the enterprise information systems have a significant impact and crucial to the decision maker. Many researchers have proved a lack of DQ (Data Quality) may results failures in respective subject areas. As example, researchers have conducted the DQ impact in healthcare area, information system,...

    Provided By Science Publications

  • White Papers // Jan 2014

    Application Specific Integrated Circuits Design and Implementation of Rademacher and Walsh Functions

    The orthogonal functions, specially the Rademacher and Walsh functions are being increasingly used in Digital Signal Processing (DSP). Today's DSP applications require fast processing time in order to meet the challenges of the real-time systems. State-of-the-art implementation technologies are therefore being used. This paper describes the design and implementation of...

    Provided By Science Publications

  • White Papers // Jan 2015

    Testing Virtual Reconfigurable Circuit Designed for a Fault Tolerant System

    In this paper, the authors describe about the testing of Virtual Reconfigurable Circuit (VRC) designed and implemented for a fault tolerant system which averages the (three) sensor inputs. The circuits that are to be tested are those which are successfully evolved in this system under different situations such as all...

    Provided By Science Publications

  • White Papers // Jan 2015

    Functional Link Artificial Neural Network for Classification Task in Data Mining

    In solving classification task of data mining, the traditional algorithm such as multi-layer perceptron takes longer time to optimize the weight vectors. At the same time, the complexity of the network increases as the number of layers increases. In this paper, the authors have used Functional Link Artificial Neural Networks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Some P-RAM Algorithms for Sparse Linear Systems

    In this paper, the authors will explain the method of representing a sparse matrix in parallel by using PRAM model. PRAM model is a shared memory model. According to the researchers, the PRAM model will survive as a theoretically convenient model of parallel computation and as a starting point for...

    Provided By Science Publications

  • White Papers // Jan 2015

    Exploring Spatial ARM (Spatial Association Rule Mining) for Geo-Decision Support System

    Geographical Decision Support System (Geo-DSS) is a demanding field, since enormous amount of spatial data have been collected in various applications, ranging from remote sensing to GIS, computer cartography, environmental assessment and planning. Although, some efforts were made to combine spatial mining with spatial decision support system but mostly researchers...

    Provided By Science Publications

  • White Papers // Jan 2015

    pmonpp: Pthread Monitor Preprocessor

    Monitors have become an exceedingly important synchronization mechanism because they are a natural generalization of the object-oriented programming. A monitor construct encapsulates private data with public methods to operate on that data. Although, the p-thread library contains dozens of functions for threading and synchronization, it does not provide direct support...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Iterative Method for Algorithms Implementation on a Limited Dynamically Reconfigurable Hardware

    In this paper, the authors propose a framework and a combined temporal partitioning and design space exploration method for run time reconfigurable processors. Their objective is to help designers to implement an algorithm in limited FPGA area resources while respecting the execution time constraint. The algorithm to be implemented is...

    Provided By Science Publications

  • White Papers // Jan 2015

    Stochastically Simulating Low Morale - A Risk Factor Effect on Risk Management

    One of the proposed purposes for software process simulation is the management of software development risks, usually discussed within the category of project planning/management. One of the proposed purposes for software process simulation is the management of software development risks, usually discussed within the category of project planning and management....

    Provided By Science Publications

  • White Papers // Jan 2015

    Towards a Temporal Multilevel Secure Database (TMSDB)

    Standard relational databases are used to store the state of reality at a single moment of time. Temporal databases are used to store time-varying data. Multi-level secure databases are used to securely store highly sensitive data. Each of these databases serves its purpose well, but if the authors were to...

    Provided By Science Publications

  • White Papers // Sep 2009

    Intrusion Preventing System Using Intrusion Detection System Decision Tree Data Mining

    With the global Internet connection, network security has gained significant attention in research and industrial communities. Due to the increasing threat of network attacks, firewalls have become important elements of the security policy is generally. Firewall can be allow or deny access network packet, but firewall cannot detect intrusion or...

    Provided By Science Publications

  • White Papers // Oct 2008

    A Novel Integrated SET Based Inverter for Nano Power Electronic Applications

    In this paper, the authors survive an emerging field of power electronics in nanotechnology. This application-based technology today is called nano-power electronics. It utilizes nano-electronic transistors in switching applications in the range of nano-power for signal shaping purposes. In recent years, single electron transistors are highly interested in nano-electronic applications....

    Provided By Science Publications